scispace - formally typeset
R

Richard R. Brooks

Researcher at Clemson University

Publications -  169
Citations -  5263

Richard R. Brooks is an academic researcher from Clemson University. The author has contributed to research in topics: Wireless sensor network & Encryption. The author has an hindex of 32, co-authored 167 publications receiving 4631 citations. Previous affiliations of Richard R. Brooks include Pennsylvania State University & California State University, Monterey Bay.

Papers
More filters
Proceedings ArticleDOI

Adaptive routing using emergent protocols in wireless ad hoc sensor networks

TL;DR: This paper presents distributed adaptation techniques for use in wireless sensor networks that perform global adaptation using only locally available information, have strong stochastic components, and use both positive and negative feedback to steer themselves.
Proceedings ArticleDOI

An interacting automata model for network protection

TL;DR: Using the authors' model, empirical evidence that a link exists between the behavior of a network and its entropy is found, and potential extensions of this work to entropy-based intrusion detection systems (IDS) are discussed.
Proceedings ArticleDOI

Robot algorithm evaluation by simulating sensor faults

TL;DR: A preliminary discussion of a system capable of quantitative comparison of several algorithms for robot navigation in unknown terrains is presented, and promises to provide a testbed for future robot navigation research.
Proceedings ArticleDOI

Security experimentation using operational systems

TL;DR: In this study, an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic is designed and can easily be generalized to apply to smart power grids.
Book ChapterDOI

Secure execution of computations in untrusted hosts

TL;DR: It is demonstrated that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.