R
Richard R. Brooks
Researcher at Clemson University
Publications - 169
Citations - 5263
Richard R. Brooks is an academic researcher from Clemson University. The author has contributed to research in topics: Wireless sensor network & Encryption. The author has an hindex of 32, co-authored 167 publications receiving 4631 citations. Previous affiliations of Richard R. Brooks include Pennsylvania State University & California State University, Monterey Bay.
Papers
More filters
Proceedings ArticleDOI
Adaptive routing using emergent protocols in wireless ad hoc sensor networks
TL;DR: This paper presents distributed adaptation techniques for use in wireless sensor networks that perform global adaptation using only locally available information, have strong stochastic components, and use both positive and negative feedback to steer themselves.
Proceedings ArticleDOI
An interacting automata model for network protection
TL;DR: Using the authors' model, empirical evidence that a link exists between the behavior of a network and its entropy is found, and potential extensions of this work to entropy-based intrusion detection systems (IDS) are discussed.
Proceedings ArticleDOI
Robot algorithm evaluation by simulating sensor faults
TL;DR: A preliminary discussion of a system capable of quantitative comparison of several algorithms for robot navigation in unknown terrains is presented, and promises to provide a testbed for future robot navigation research.
Proceedings ArticleDOI
Security experimentation using operational systems
Ilker Ozcelik,Richard R. Brooks +1 more
TL;DR: In this study, an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic is designed and can easily be generalized to apply to smart power grids.
Book ChapterDOI
Secure execution of computations in untrusted hosts
TL;DR: It is demonstrated that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.