Alan Lin
Alan Lin
Air Force Institute of Technology
Verified email at us.af.mil
Title
Cited by
Cited by
Year
A security evaluation of popular internet of things protocols for manufacturers
D Celebucki, MA Lin, S Graham
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2018
162018
Software Obfuscation with Symmetric Cryptography
AC Lin
AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING AND …, 2008
42008
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot Study
N Flack, C Voltz, R Dill, A Lin, M Reith
ICCWS 2020 15th International Conference on Cyber Warfare and Security, 155, 2020
22020
Applying Game Elements to Cyber eLearning: An Experimental Design
L Tomcho, A Lin, D Long, M Coggins, M Reith
International Conference on Cyber Warfare and Security, 422-XV, 2019
22019
Activity Pattern Discovery From Network Captures
AC Lin, GL Peterson
IEEE Symposium on Security and Privacy Workshops, 334-342, 2016
22016
PeerAppear: A distributed geospatial index supporting collaborative world model construction and maintenance
AJ Compton, JM Pecarina, AC Lin, KM Hopkinson
Future Generation Computer Systems 95, 802-815, 2019
12019
Hosting distributed databases on internet of things-scale devices
DP Richardson, AC Lin, JM Pecarina
Dependable and Secure Computing, 2017 IEEE Conference on, 2017
12017
Overcoming challenges to air force satellite ground control automation.
MJ Bentley, AC Lin, DD Hodson
Cognitive and Computational Aspects of Situation Management (CogSIMA), 1-7, 2017
12017
Battlespace Next (TM)
N Flack, A Lin, G Peterson, M Reith
International Journal of Serious Games 7 (2), 49-70, 2020
2020
Predicting Trouble Ticket Resolution
KR Sample, AC Lin, BJ Borghetti, GL Peterson
The Thirty-First International Flairs Conference, 2018
2018
Narrowing the scope of failure prediction using targeted fault load injection
PL Jordan, GL Peterson, AC Lin, MJ Mendenhall, AJ Sellers
Enterprise Information Systems, 16, 2017
2017
Analyzing Functional Entropy of Software Intent Protection Schemes
JT McDonald, ED Trias, AC Lin
Proceedings of the 4th International Conference on Information Warfare and …, 0
The system can't perform the operation now. Try again later.
Articles 1–12