Back
Return
Biography
richard

Dr. Richard R. Brooks

Clemson University, USA

Associate Professor


Email: rrb@clemson.edu


Qualifications


1996 Ph.D., Computer Science, Louisiana State University, USA

1979 B.A., Mathematical Sciences, The Johns Hopkins University, USA


Publications (selected)

Refereed Journal Publications
  1. R. R. Brooks, C. Griffin, and D. S. Friedlander, “Self-Organized Distributed Sensor Network Entity Tracking,” International Journal of High Performance Computer Applications, 16 (3), 207-220 (2002).
  2. R. R. Brooks, and N. Orr, “A Model for Mobile Code using Interacting Automata,” IEEE Transactions on Mobile Computing, 1 (4), 313-326 (2002).
  3. D. Friendlander, C. Griffin, N. Jacobson, S. Phoha, and R. R. Brooks, “Dynamic Agent Classification using an ad hoc Mobile Acoustic Sensor Networks,” EURASIP J. Applied Signal Processing, 4, 371-377 (2003).
  4. J. M. Zachary and R. R. Brooks, “Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware,” Mobile Networks and Applications, 8, 137-143 (2003).
  5. R. R. Brooks, P. Ramanathan, and A. Sayeed, “Distributed Target Tracking and Classification in Sensor Networks,” Proceedings of the IEEE, 91 (8), 1163-1171 (2003).
  6. H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. R. Brooks, S. Kim, and W. Zhang, “Masking the Energy Behavior of DES Encryption,” IEE Proceedings: Computers and Digital Techniques, 150 (5,22), 274-284, (2003).
  7. R. R. Brooks, “Mobile Code Paradigms and Security Iissues,” IEEE Internet Computing, 8 (3), 54-59 (2004).
  8. R. R. Brooks and T. Keiser, “Mobile Code Daemons for Networks of Embedded Systems,” IEEE Internet Computing, 8 (4), 72-79 (2004).
  9. R. R. Brooks, D. Friedlander, J. Koch, and S. Phoha, "Tracking Multiple Targets with Self-Organizing Distributed Ground Sensors," Journal of Parallel and Distributed Computing, 64 (7), 74-84 (2004).
  10. M. Zhu, R. R. Brooks, J. Lamb, and S. S. Iyengar, “Aspect Oriented Design of Sensor Networks,” Journal of Parallel and Distributed Computing, 64 (7), 853-865 (2004).
  11. E. Swankoski, N. Vijaykrishnan, R. Brooks, M. Kandemir, and M. J. Irwin, “Symmetric Encryption in Reconfigurable and Custom Hardware,” International Journal of Embedded Systems, Invited Paper, 1 (3,4) 205-217 (2005).
  12. C. Griffin and R. R. Brooks, “A note on the spread of worms in scale-free networks,” IEEE Transactions on Systems Man and Cybernetics, Part B: Cybernetics, 36 (1) 198-202 (2006).
  13. R. R. Brooks, B. Pillai, S. Rai, and S. Racunas, “Mobile Network Analysis Using Probabilistic Connectivity Matrices,” IEEE Transactions on Systems Man and Cybernetics, Part C: Applications and Reviews, 37(4), pp. 694-702 (2007).
  14. R. R. Brooks, P. Y .Govindaraju, M. Pirretti, N. Vijaykrishnan and M. Kandemir, “On the detection of clones in sensor networks using random key predistribution”, IEEE Transactions on System Man and Cybernetics, Part C: Applications and Reviews, 37(6), pp. 1246-1258 (2007).
  15. J.-E. Pang, R. R. Brooks, and C. Griffin, “Game Theory and Information Theory Analysis of Electronic Counter Measures in Pursuit-Evasion Games,” IEEE Transactions on System Man and Cybernetics, Part A: System and Humans, 38(6), pp. 1281-1294, (2008).
  16. R. R. Brooks, J. Schwier, and C. Griffin, “Markovian Search Games in Heterogeneous Spaces,” IEEE Transactions on System Man and Cybernetics, Part B: Cybernetics, 39(3), pp. 626-635, (2009).
  17. R. R. Brooks, B. J. Pillai, M. C. Weigele, and M. G. Pirretti, “Multicast encryption infrastructure for security in sensor networks,” International Journal of Distributed Sensor Networks, 5(2), pp. 139-157, (2009).
  18. R. R. Brooks and H. Siddulgari, “Adaptive Optimizations for Surveillance Network Longevity,” International Journal of Distributed Sensor Networks, 5(2) 158-184, (2009).
  19. R. R. Brooks, P. Y .Govindaraju, M. Pirretti, N. Vijaykrishnan and M. Kandemir, “Clone detection in sensor networks with ad hoc and grid topologies”, International Journal of Distributed Sensor Networks, 5(3) 209-223, (2009).
  20. R. R. Brooks, “Sensor Network Self-Organization Using Random Graphs,” International Journal of Distributed Sensor Networks, 5(3) 201-208, (2009).
  21. R. R. Brooks, J. M. Schwier, and C. Griffin, “Behavior Detection Using Confidence Intervals of Hidden Markov Models,” IEEE Transactions on System Man and Cybernetics, Part B: Cybernetics, 39(6) 1484-1492 (2009).
  22. R. R. Brooks, S. Sander, J. Deng, and J. Taiber, “Survey of Vehicle Security Issues,” IEEE Vehicular Technologies, 4(2) 52-64 (2009).
  23. M. Zhu and R. R. Brooks, “Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks,” International Journal of Distributed Sensor Networks, 5(05) 480-501 (2009).
  24. J. Schwier, C. Griffin, and R.R. Brooks, “Zero Knowledge Hidden Markov Model Inference,” Pattern Recognition Letters, 30(14) 1273-1280  http://dx.doi.org/10.1016/j.patrec.2009.06.008 (2009).
  25. M. Zhu, Q. Wu, S. Ding, N. S. V. Rao, R. R. Brooks, and S. S. Iyengar, “Fusion of Threshold Rules for Target Detection in Wireless Sensor Networks,” ACM Transactions on Sensor Networks, 6(2) 18:1-18:7, (2010).
  26. C. Dingankar, S. Karandikar, C. Griffin, and R. R. Brooks, "On Bandwidth limited Sum of Games Problems," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 41(2) 341-349, March 2011.
  27. J. Schwier, R. R. Brooks, and C. Griffin, “Methods to window data to differentiate between Markov models,” IEEE Transactions on System Man and Cybernetics, Part B: Cybernetics, Accepted for Publication. August, 2010.
  28. R. R. Brooks, “Would You Like Vulnerabilities With Your Computer System?” The ITEA Journal, 31(4) 512-517, December 2010.
Refereed Conference Publications
  1. Lynne Grewe and R. R. Brooks, "On localization of objects in the wavelet domain" 1997 IEEE Symposium on Computational Intelligence in Robotics and Automation, IEEE, Monterey, CA (July 1997).
  2. R. R. Brooks, M. Byrne, C. Griffin, S. Phoha, E. Grele, M. Edwards, P. Dicke, D. Friedlander, and B. Button, "Experimental verification of C2 hierarchies," Second Defense Advanced Research Projects Agency JFACC Symposium on Advances in Enterprise Control, Defense Advanced Research Projects Agency, Minneapolis, MN (July 2000).
  3. J. Moore, T. Keiser, R. R. Brooks, S. Phoha, D. Friedlander, J. Koch, A. Reggio, and N. Jacobson, “Tracking targets with self-organizing distributed ground sensors,” 2003 IEEE Aerospace Conference, IEEE, Big Sky, MN (March 2003).
  4. H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. Brooks, S. Kim, and W. Zhang. “Masking the energy behavior of DES encryption,” Proceedings. 6th Design Automation and Test in Europe Conference (DATE'03), IEEE, Munich, Germany (March 2003).
  5. H. Saputra, R. R. Brooks, N. Vijaykrishnan, M. Kandemir, and M. J. Irwin, “Exploiting value locality for secure energy aware communication,” IEEE Workshop on Signal Processing, IEEE, Seoul, Korea (August 2003).
  6. R. R. Brooks, M. Piretti, M. Zhu, and S. S. Iyengar, “Distributed adaptation methods for wireless sensor networks,” Globecom 2003, IEEE, San Francisco, CA (December 2003).
  7. E. Swankoski, R. R. Brooks, N. Vijaykrishnan, M. Kandemir, and M. J. Irwin, “A parallel architecture for secure FPGA symmetric encryption,” Reconfigurable Architectures Workshop 2004, IEEE, Santa Fe, NM (April 2004).
  8. H. Saputra, R. R. Brooks, N. Vijaykrishnan, M. Kandemir, and M. J. Irwin, “Code protection for resource-constrained embedded devices,” Conference on Languages, Compilers, and Tools for Embedded Systems, IEEE, Washington, DC (June 2004).
  9. F. Li, G. Chen, M. Kandemir, and R. Brooks, “A Compiler Based Approach to Data Security,” European Conferences on Theory and Practice of Software ETAPS 2005, Edinburgh, UK, (April 2005).
  10. R. R. Brooks, S. Armanath, and H. Siddul, “On Adaptation to Extend the Lifetime of Surveillance Sensor Networks,” Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Bethesda, MD (October 2005).
  11. M. Pirretti, N. Vijaykrishnan, M. Kandemir, and R. R. Brooks, “Realistic Models for Sensor Networks Using Key Predistribution Schemes,” Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Bethesda, MD (October 2005).
  12. M. Pirretti, S. Zhu, N. Vijaykrishnan, M. Kandemir, P. McDaniel, and R. R. Brooks, “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense,” (Best Paper Award), Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Bethesda, MD (October 2005).
  13. S. H. K. Narayanan, M. T. Kandemir, R. R. Brooks, and I. Kolcu, “Secure Execution of Computations in Untrusted Hosts,” (Best Presentation Award), 11th Ada-Europe International Conference on Reliable Software, Porto, Portugal, (June 2006).
  14. M. G. Cerruti, A. Ashenfelter, R. Brooks, G. Chen, S. Das, G. Raven, M. Sudit, and E. Wright, “Pedigree Information for Enhanced Situation and Threat Assessment,” Fusion 2006, Florence Italy, (July 2006).
  15. R. R. Brooks and B. Pillai, “Power Consumption Analysis for Sensor Network Security using Multicast and Point-to-Point Communication,” 2nd Annual Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Arlington, VA (October 2006).
  16. S. H. K. Narayanan, M. Kandemir, and R. R. Brooks, “Performance Aware Secure Code Partitioning,” Design, Automation, and Test in Europe 2007, Nice, France, 2007.
  17. R. R. Brooks, and S. Sander, “Hardware/Software Security,” Cyber Security and Information Intelligence Research Workshop, TN (May 2007). Oak Ridge
  18. C. Dingankar, and R. R. Brooks, “Denial of Service Games,” Cyber Security and Information Intelligence Research Workshop, TN (May 2007). Oak Ridge
  19. R. R. Brooks, J. Schwier, and C. Griffin, “Online Behavior Recognition for Situation and Threat Assessment,” (Invited Presentation), Infotech American Institute of Aeronautics and Astronautics, Sonoma, CA (2007).
  20. R. R. Brooks, J. Schwier, and C. Griffin, “Sensor Stream Analysis for Behavior Recognition,” 3rd Annual Innovations and Commercial Applications of Distributed Sensor Networks Symposium, Shreveport, LA (November 2007).
  21. C. Dingankar, S. Krarandakar, and R. R. Brooks, “Optimal Distributed Denial of Service Attacks,” Cyberspace Research Workshop, Shreveport, LA (November 2007).
  22. R. R. Brooks, “Sensor Network Self-Organization Using Random Graphs,” Proceedings of International Symposium on Advances in Computer and Sensor Networks and Systems, Zhengzhou, China (April 2008).
  23. R. R. Brooks, S. Sander, J. Deng, and J. Taiber, “Automotive Systems Security: Challenges and State of the Art,” Cyber Security and Information Intelligence Research Workshop, TN (May 2008). Oak Ridge
  24. R.R. Brooks and J. Deng, “Lies and the Lying Liars that Tell Them: A Fair and Balanced Look at TLS,” 6th Annual Cyber Security and Information Intelligence Workshop, Oak Ridge, TN (April 2010).
  25. R. Craven, C. Abbott, H. Bhanu, J. Deng and R.R. Brooks, “Orwell was an Optimist,” 6th Annual Cyber Security and Information Intelligence Workshop, Oak Ridge, TN (April 2010).
Books/ Edited Books
  1. R. R. Brooks and S. S. Iyengar, Multi-Sensor Fusion: Fundamentals and Applications with Software, (1998) Prentice Hall PTR, Upper Saddle River, NJ.
  2. S. S. Iyengar and R. R. Brooks, ed.’s, Distributed Sensor Networks, (2005) Chapman & Hall, Boca Raton, FLA.
  3. R. R. Brooks, Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks, (2005) CRC Press, Boca Raton, FLA.
  4. S. S. Iyengar and R. R. Brooks, ed.’s, Distributed Sensor Networks 2nd Edition, (2011) Chapman & Hall, Boca Raton, FLA.
  5. R. R. Brooks, Introduction to Computer and Network Security: Navigating Shades of Gray, (2005) CRC Press, Boca Raton, FLA

Profile Details

NULL