Suivre
Thomas A. Babbitt
Thomas A. Babbitt
Associate Professor, United States Military Academy
Adresse e-mail validée de westpoint.edu
Titre
Citée par
Citée par
Année
Self-selecting reliable paths for wireless sensor network routing
TA Babbitt, C Morrell, BK Szymanski, JW Branch
Computer Communications 31 (16), 3799-3809, 2008
522008
Hacking competitions and their untapped potential for security education
G Conti, T Babbitt, J Nelson
IEEE Security & Privacy 9 (3), 56-59, 2011
472011
Punch Cards to Python: A Case Study of a CS0 Core Course
T Babbitt, C Schooler, K King
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
132019
Self-selecting reliable path routing in diverse wireless sensor network environments
T Babbitt, C Morrell, B Szymanski
2009 IEEE Symposium on Computers and Communications, 1-7, 2009
102009
Trust management in delay tolerant networks utilizing erasure coding
TA Babbitt, BK Szymanski
2015 IEEE International Conference on Communications (ICC), 6331-6337, 2015
92015
Biologically inspired self selective routing with preferred path selection
BK Szymanski, C Morrell, SC Geyik, T Babbitt
Bio-Inspired Computing and Communication, 229-240, 2008
92008
Trust based secure routing in delay tolerant networks
TA Babbitt, BK Szymanski
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
72016
Visualization in sensor network simulator, sense and its use in protocol verification
C Morrell, T Babbitt, BK Szymanski
Rensselaer Computer Science, 2008
72008
Designing a Raspberry Pi sensor network for remote observation of wildlife
BH Curtin, RH David, ED Dunham, CD Johnson, N Shyamkumar, ...
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
62019
Trust metric integration in resource constrained networks via data fusion
TA Babbitt, BK Szymanski
2015 18th International Conference on Information Fusion (Fusion), 582-589, 2015
62015
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security
C Johnson, B Curtin, N Shyamkumar, R David, E Dunham, PC Haney, ...
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019
32019
Trust management in resource constraint networks
TA Babbitt, BK Szymanski
Proceedings of the 10th Annual Symposium on Information Assurance, 2-3, 2015
32015
Signals of Opportunity: Spoof Detection with Low-Cost Hardware and Edge Devices
P Toth, T Babbitt, T Graziano
2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile …, 2023
12023
Hacking the Non-Technical Brain: Maximizing Retention in a Core Introductory IT Course
EM Sturzinger, DS Hawthorne, TA Babbitt
Proceedings of the 20th Annual SIG Conference on Information Technology …, 2019
12019
Airborne geo-location for search and rescue applications
M Love, M Greene, H Burgess, M Luehrmann, S Mead, T Babbitt
Proceedings of the 3rd International Conference on Computing for Geospatial …, 2012
12012
A raspberry Pi sensor network for wildlife conservation
A Arnold, P Corapi, M Nasta, K Wolgast, TA Babbitt
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-3, 2020
2020
Information Assurance in Resource Constraint Networks
TA Babbitt
Rensselaer Polytechnic Institute, 2016
2016
Self-selecting reliable path routing for all environments using SENSE with visualization
TA Babbitt
Rensselaer Theses and Dissertations Online Collection, 2009
2009
The Importance of Using Hacker Contests and Mindset in Teaching Networks and Information Assurance
TA Babbitt
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–19