Dr. Richard R. Brooks
Clemson University, USA
Associate Professor
Email: rrb@clemson.edu
Qualifications
1996 Ph.D., Computer Science, Louisiana State University, USA
1979 B.A., Mathematical Sciences, The Johns Hopkins University, USA
Publications (selected)
Refereed Journal Publications
-
R. R. Brooks, C. Griffin, and D. S. Friedlander, “Self-Organized Distributed Sensor Network Entity Tracking,” International Journal of High Performance Computer Applications, 16 (3), 207-220 (2002).
-
R. R. Brooks, and N. Orr, “A Model for Mobile Code using Interacting Automata,” IEEE Transactions on Mobile Computing, 1 (4), 313-326 (2002).
-
D. Friendlander, C. Griffin, N. Jacobson, S. Phoha, and R. R. Brooks, “Dynamic Agent Classification using an ad hoc Mobile Acoustic Sensor Networks,” EURASIP J. Applied Signal Processing, 4, 371-377 (2003).
-
J. M. Zachary and R. R. Brooks, “Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware,” Mobile Networks and Applications, 8, 137-143 (2003).
-
R. R. Brooks, P. Ramanathan, and A. Sayeed, “Distributed Target Tracking and Classification in Sensor Networks,” Proceedings of the IEEE, 91 (8), 1163-1171 (2003).
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. R. Brooks, S. Kim, and W. Zhang, “Masking the Energy Behavior of DES Encryption,” IEE Proceedings: Computers and Digital Techniques, 150 (5,22), 274-284, (2003).
-
R. R. Brooks, “Mobile Code Paradigms and Security Iissues,” IEEE Internet Computing, 8 (3), 54-59 (2004).
-
R. R. Brooks and T. Keiser, “Mobile Code Daemons for Networks of Embedded Systems,” IEEE Internet Computing, 8 (4), 72-79 (2004).
-
R. R. Brooks, D. Friedlander, J. Koch, and S. Phoha, "Tracking Multiple Targets with Self-Organizing Distributed Ground Sensors," Journal of Parallel and Distributed Computing, 64 (7), 74-84 (2004).
-
M. Zhu, R. R. Brooks, J. Lamb, and S. S. Iyengar, “Aspect Oriented Design of Sensor Networks,” Journal of Parallel and Distributed Computing, 64 (7), 853-865 (2004).
-
E. Swankoski, N. Vijaykrishnan, R. Brooks, M. Kandemir, and M. J. Irwin, “Symmetric Encryption in Reconfigurable and Custom Hardware,” International Journal of Embedded Systems, Invited Paper, 1 (3,4) 205-217 (2005).
-
C. Griffin and R. R. Brooks, “A note on the spread of worms in scale-free networks,” IEEE Transactions on Systems Man and Cybernetics, Part B: Cybernetics, 36 (1) 198-202 (2006).
-
R. R. Brooks, B. Pillai, S. Rai, and S. Racunas, “Mobile Network Analysis Using Probabilistic Connectivity Matrices,” IEEE Transactions on Systems Man and Cybernetics, Part C: Applications and Reviews, 37(4), pp. 694-702 (2007).
-
R. R. Brooks, P. Y .Govindaraju, M. Pirretti, N. Vijaykrishnan and M. Kandemir, “On the detection of clones in sensor networks using random key predistribution”, IEEE Transactions on System Man and Cybernetics, Part C: Applications and Reviews, 37(6), pp. 1246-1258 (2007).
-
J.-E. Pang, R. R. Brooks, and C. Griffin, “Game Theory and Information Theory Analysis of Electronic Counter Measures in Pursuit-Evasion Games,” IEEE Transactions on System Man and Cybernetics, Part A: System and Humans, 38(6), pp. 1281-1294, (2008).
-
R. R. Brooks, J. Schwier, and C. Griffin, “Markovian Search Games in Heterogeneous Spaces,” IEEE Transactions on System Man and Cybernetics, Part B: Cybernetics, 39(3), pp. 626-635, (2009).
-
R. R. Brooks, B. J. Pillai, M. C. Weigele, and M. G. Pirretti, “Multicast encryption infrastructure for security in sensor networks,” International Journal of Distributed Sensor Networks, 5(2), pp. 139-157, (2009).
-
R. R. Brooks and H. Siddulgari, “Adaptive Optimizations for Surveillance Network Longevity,” International Journal of Distributed Sensor Networks, 5(2) 158-184, (2009).
-
R. R. Brooks, P. Y .Govindaraju, M. Pirretti, N. Vijaykrishnan and M. Kandemir, “Clone detection in sensor networks with ad hoc and grid topologies”, International Journal of Distributed Sensor Networks, 5(3) 209-223, (2009).
-
R. R. Brooks, “Sensor Network Self-Organization Using Random Graphs,” International Journal of Distributed Sensor Networks, 5(3) 201-208, (2009).
-
R. R. Brooks, J. M. Schwier, and C. Griffin, “Behavior Detection Using Confidence Intervals of Hidden Markov Models,” IEEE Transactions on System Man and Cybernetics, Part B: Cybernetics, 39(6) 1484-1492 (2009).
-
R. R. Brooks, S. Sander, J. Deng, and J. Taiber, “Survey of Vehicle Security Issues,” IEEE Vehicular Technologies, 4(2) 52-64 (2009).
-
M. Zhu and R. R. Brooks, “Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks,” International Journal of Distributed Sensor Networks, 5(05) 480-501 (2009).
-
J. Schwier, C. Griffin, and R.R. Brooks, “Zero Knowledge Hidden Markov Model Inference,” Pattern Recognition Letters, 30(14) 1273-1280 http://dx.doi.org/10.1016/j.patrec.2009.06.008 (2009).
-
M. Zhu, Q. Wu, S. Ding, N. S. V. Rao, R. R. Brooks, and S. S. Iyengar, “Fusion of Threshold Rules for Target Detection in Wireless Sensor Networks,” ACM Transactions on Sensor Networks, 6(2) 18:1-18:7, (2010).
-
C. Dingankar, S. Karandikar, C. Griffin, and R. R. Brooks, "On Bandwidth limited Sum of Games Problems," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 41(2) 341-349, March 2011.
-
J. Schwier, R. R. Brooks, and C. Griffin, “Methods to window data to differentiate between Markov models,” IEEE Transactions on System Man and Cybernetics, Part B: Cybernetics, Accepted for Publication. August, 2010.
-
R. R. Brooks, “Would You Like Vulnerabilities With Your Computer System?” The ITEA Journal, 31(4) 512-517, December 2010.
Refereed Conference Publications
-
Lynne Grewe and R. R. Brooks, "On localization of objects in the wavelet domain" 1997 IEEE Symposium on Computational Intelligence in Robotics and Automation, IEEE, Monterey, CA (July 1997).
-
R. R. Brooks, M. Byrne, C. Griffin, S. Phoha, E. Grele, M. Edwards, P. Dicke, D. Friedlander, and B. Button, "Experimental verification of C2 hierarchies," Second Defense Advanced Research Projects Agency JFACC Symposium on Advances in Enterprise Control, Defense Advanced Research Projects Agency, Minneapolis, MN (July 2000).
-
J. Moore, T. Keiser, R. R. Brooks, S. Phoha, D. Friedlander, J. Koch, A. Reggio, and N. Jacobson, “Tracking targets with self-organizing distributed ground sensors,” 2003 IEEE Aerospace Conference, IEEE, Big Sky, MN (March 2003).
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. Brooks, S. Kim, and W. Zhang. “Masking the energy behavior of DES encryption,” Proceedings. 6th Design Automation and Test in Europe Conference (DATE'03), IEEE, Munich, Germany (March 2003).
-
H. Saputra, R. R. Brooks, N. Vijaykrishnan, M. Kandemir, and M. J. Irwin, “Exploiting value locality for secure energy aware communication,” IEEE Workshop on Signal Processing, IEEE, Seoul, Korea (August 2003).
-
R. R. Brooks, M. Piretti, M. Zhu, and S. S. Iyengar, “Distributed adaptation methods for wireless sensor networks,” Globecom 2003, IEEE, San Francisco, CA (December 2003).
-
E. Swankoski, R. R. Brooks, N. Vijaykrishnan, M. Kandemir, and M. J. Irwin, “A parallel architecture for secure FPGA symmetric encryption,” Reconfigurable Architectures Workshop 2004, IEEE, Santa Fe, NM (April 2004).
-
H. Saputra, R. R. Brooks, N. Vijaykrishnan, M. Kandemir, and M. J. Irwin, “Code protection for resource-constrained embedded devices,” Conference on Languages, Compilers, and Tools for Embedded Systems, IEEE, Washington, DC (June 2004).
-
F. Li, G. Chen, M. Kandemir, and R. Brooks, “A Compiler Based Approach to Data Security,” European Conferences on Theory and Practice of Software ETAPS 2005, Edinburgh, UK, (April 2005).
-
R. R. Brooks, S. Armanath, and H. Siddul, “On Adaptation to Extend the Lifetime of Surveillance Sensor Networks,” Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Bethesda, MD (October 2005).
-
M. Pirretti, N. Vijaykrishnan, M. Kandemir, and R. R. Brooks, “Realistic Models for Sensor Networks Using Key Predistribution Schemes,” Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Bethesda, MD (October 2005).
-
M. Pirretti, S. Zhu, N. Vijaykrishnan, M. Kandemir, P. McDaniel, and R. R. Brooks, “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense,” (Best Paper Award), Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Bethesda, MD (October 2005).
-
S. H. K. Narayanan, M. T. Kandemir, R. R. Brooks, and I. Kolcu, “Secure Execution of Computations in Untrusted Hosts,” (Best Presentation Award), 11th Ada-Europe International Conference on Reliable Software, Porto, Portugal, (June 2006).
-
M. G. Cerruti, A. Ashenfelter, R. Brooks, G. Chen, S. Das, G. Raven, M. Sudit, and E. Wright, “Pedigree Information for Enhanced Situation and Threat Assessment,” Fusion 2006, Florence Italy, (July 2006).
-
R. R. Brooks and B. Pillai, “Power Consumption Analysis for Sensor Network Security using Multicast and Point-to-Point Communication,” 2nd Annual Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Arlington, VA (October 2006).
-
S. H. K. Narayanan, M. Kandemir, and R. R. Brooks, “Performance Aware Secure Code Partitioning,” Design, Automation, and Test in Europe 2007, Nice, France, 2007.
-
R. R. Brooks, and S. Sander, “Hardware/Software Security,” Cyber Security and Information Intelligence Research Workshop, TN (May 2007). Oak Ridge
-
C. Dingankar, and R. R. Brooks, “Denial of Service Games,” Cyber Security and Information Intelligence Research Workshop, TN (May 2007). Oak Ridge
-
R. R. Brooks, J. Schwier, and C. Griffin, “Online Behavior Recognition for Situation and Threat Assessment,” (Invited Presentation), Infotech American Institute of Aeronautics and Astronautics, Sonoma, CA (2007).
-
R. R. Brooks, J. Schwier, and C. Griffin, “Sensor Stream Analysis for Behavior Recognition,” 3rd Annual Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Shreveport, LA (November 2007).
-
C. Dingankar, S. Krarandakar, and R. R. Brooks, “Optimal Distributed Denial of Service Attacks,” Cyberspace Research Workshop, Shreveport, LA (November 2007).
-
R. R. Brooks, “Sensor Network Self-Organization Using Random Graphs,” Proceedings of International Symposium on Advances in Computer and Sensor Networks and Systems, Zhengzhou, China (April 2008).
-
R. R. Brooks, S. Sander, J. Deng, and J. Taiber, “Automotive Systems Security: Challenges and State of the Art,” Cyber Security and Information Intelligence Research Workshop, TN (May 2008). Oak Ridge
-
R.R. Brooks and J. Deng, “Lies and the Lying Liars that Tell Them: A Fair and Balanced Look at TLS,” 6th Annual Cyber Security and Information Intelligence Workshop, Oak Ridge, TN (April 2010).
-
R. Craven, C. Abbott, H. Bhanu, J. Deng and R.R. Brooks, “Orwell was an Optimist,” 6th Annual Cyber Security and Information Intelligence Workshop, Oak Ridge, TN (April 2010).
Books/ Edited Books
-
R. R. Brooks and S. S. Iyengar, Multi-Sensor Fusion: Fundamentals and Applications with Software, (1998) Prentice Hall PTR, Upper Saddle River, NJ.
-
S. S. Iyengar and R. R. Brooks, ed.’s, Distributed Sensor Networks, (2005) Chapman & Hall, Boca Raton, FLA.
-
R. R. Brooks, Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks, (2005) CRC Press, Boca Raton, FLA.
-
S. S. Iyengar and R. R. Brooks, ed.’s, Distributed Sensor Networks 2nd Edition, (2011) Chapman & Hall, Boca Raton, FLA.
-
R. R. Brooks, Introduction to Computer and Network Security: Navigating Shades of Gray, (2005) CRC Press, Boca Raton, FLA
Profile Details
NULL