scispace - formally typeset
B

Barry E. Mullins

Researcher at Air Force Institute of Technology

Publications -  103
Citations -  1372

Barry E. Mullins is an academic researcher from Air Force Institute of Technology. The author has contributed to research in topics: Wireless sensor network & Wireless network. The author has an hindex of 18, co-authored 102 publications receiving 1235 citations. Previous affiliations of Barry E. Mullins include United States Air Force Academy & Wright-Patterson Air Force Base.

Papers
More filters
Journal ArticleDOI

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices

TL;DR: The functionality of the Shodan computer search engine is investigated and a potential mitigation strategy that employs service banner manipulation to limit the exposure to Shodan queries is described.
Proceedings ArticleDOI

An analysis of XML compression efficiency

TL;DR: An XML test corpus and a combined efficiency metric integrating compression ratio and execution speed are presented and it is shown that XMill or WBXML may be useful in some instances, but a general-purpose compressor is often the best choice.
Proceedings ArticleDOI

Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles

TL;DR: It has been proposed that a wireless network where nodes have on average 5.1774 log n neighbors, where n is the total number of network nodes, has a high probability of having no partitions, by decreasing transmission range and implementing multi-hop routing between nodes, while ensuring network connectivity is maintained, spatial multiplexing of the wireless channel.
Book

Using Relocatable Bitstreams for Fault Tolerance

TL;DR: The bitstream translation program relocates modules on an FPGA by changing the partial bitstream of the module, to take advantage of relocatable modules.
Journal ArticleDOI

The Z-Wave routing protocol and its security implications

TL;DR: A Black Hole attack is conducted on a real-world Z-Wave network to demonstrate a well-known routing attack that exploits the exposed vulnerabilities and several recommendations are made to enhance the security of the routing protocol.