Dr. Barry E. Mullins
Professor

 

Contact:
Comm: 937-255-3636 x7979
DSN: 785-3636 x7979
Click to Email

View Department

Education

Ph.D., Electrical Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, 1997 Dissertation Title: CATER: An Opportunistic Medium Access Control Protocol for Wireless Local Area Networks, Advisor: Dr. Nathaniel J. Davis IV

M.S., Computer Engineering, Air Force Institute of Technology, WPAFB, OH, 1987, Thesis Title: The Integration of Artificial Intelligence Techniques to Improve the Effectiveness of Electronic Countermeasures Strategies in a Tactical Environment, Advisor: Dr. Stephen E. Cross

B.S., Computer Engineering (Cum Laude), University of Evansville, Evansville, IN, 1983, Field of Concentration: Microcomputer Design

Professional Certifications:

  • Certified SCADA Security Architect (CSSA) – Information Assurance Certification Review Board
  • National Security Agency INFOSEC Evaluation Methodology (IEM)
  • National Security Agency INFOSEC Assessment Methodology (IAM)
  • Professional Engineer (in EE), Colorado
  • Federal Communications Commission, Amateur Radio - Extra Class

Awards

2018          Research Advisor for Chancellor’s Award Recipient (Best AFIT thesis), S. Beyer – Mar 18

2018          Research Advisor for AOC Academic Research Excellence Award–Information Superiority (Best Information Superiority thesis), S. Beyer – Mar 18

2018          Research Advisor for CCR-United States Cyber Command Cyberspace Research Excellence Award (Best Cyber thesis), S. Beyer – Mar 18

2017          Best Masters Paper and Presentation at the12th International Conference on Cyber Warfare and Security – Mar 17

2014          Southwestern Ohio Consortium of Higher Education (SOCHE) Teaching Excellence Award – Nov 14

2014          Research Advisor for AOC Academic Research Excellence Award–Information Superiority, S. Solomon – Mar 14

2013          Ohio Magazine’s Excellence in Education Award – Nov 13

2012          Cage H. Crocker Outstanding Professor Award for CY2011, awarded by AFIT Board of Visitor.

2012          John A. Curtis Lecture Award from the Computers in Education Division, American Society for Engineering Education (ASEE) Annual Conference; Best paper and presentation – #1 of 68

2011          2011 International Information Systems Security Certification Consortium, Inc., (ISC)2 U.S. Government Information Security Leadership Award – Workforce Improvement – Team Award – Cyberspace 200/300 Professional Continuing Education Team, Air Force Cyber Technical Center of Excellence – 18 Oct 11

2011          2010 Colloquium for Information Systems Security Education (CISSE) Outstanding Educator Award nominee from AFIT – Jun 11

2011          2010 IEEE and Eta Kappa Nu – C. Holmes MacDonald Outstanding Electrical and Computer Engineering Teacher Award – 14 Mar 11

2011          AFIT Team of the Year for 2010 – Cyber 200 and 300 Professional Continuing Education – 4 Feb 11

2010          AFIT Team of the Quarter – Cyber 200 and 300 Professional Continuing Education – Third Quarter 2010 – 5 Oct 10

2010          AETC Educator of the Year for 1 Jul 09 – 30 Jun 10 – AFIT Nominee – 13 Sep 10

2010          Air Force Science and Engineering Educator of the Year – 18 Aug 10

2010          Research Advisor for AFIT Polk Award, B. D. Thomas – 17 Jun 10

2010          Research Advisor for AFIT Cyberspace Research Excellence Award, M. L. Stamat – 25 Mar 10

2009          AFIT Instructor of the Quarter – Winter Quarter 2009 – 16 Jul 09

2009          Top Student Blue Dart for CY2008 – B. W. Ramsey and B. E. Mullins, “VoIP: I Can Hear You Now, but So Can the Enemy,” Air University Blue Dart – 11 May 09

2009          AETC Educator of the Year for 1 Jul 08 – 30 Jun 09 – AFIT Nominee.

2009          Professor Ezra Kotcher Award for CY2008, awarded by AFIT Board of Visitor – 23 Apr 09

2009          AFIT Civilian of the Quarter-Category III – First Quarter 2009 – 23 Apr 09

2009          Dr. Leslie M. Norton Teaching Excellence Award for CY2008, awarded by AFIT Student Association – 26 Mar 09

2009          Outstanding Teaching Award, Eta Kappa Nu, Delta Xi Chapter, Electrical Engineering / Computer Engineering for CY2008 – 26 Mar 09

2009          AFIT Thesis Advisor Award, Tau Beta Pi, Ohio Eta Chapter, for K. R. Schrader thesis – 26 Mar 09

2009          Research Advisor for AFIT Cyberspace Research Excellence Award, K. R. Schrader – 26 Mar 09

2008          Best Paper, C. J. Antosh and B. E. Mullins, “The Scalability of Secure Lock,” 1st IEEE International Workshop on Information and Data Assurance in conjunction with the IEEE IPCCC 2008 (27th IEEE International Performance Computing and Communications Conference), Austin TX, 7-9 December 2008, pp. 507-512

2008          Harold Brown Award, Department nominee for CY2008, Award recognizes significant achievements in research and development

2008          Best Presentation in Computer Sciences, K. R. Schrader, Fourth Annual Dayton Engineering Sciences Symposium, Wright State University

2008          AFIT Instructor of the Quarter – Winter Quarter 2008

2008          Outstanding Teaching Award, Nominee, Eta Kappa Nu, Delta Xi Chapter Electrical Engineering / Computer Engineering

2007          Research Advisor for Research Excellence Award, Armed Forces Communications-Electronics Association (AFCEA) Command, Control, Communications, Computers and Intelligence (C4I), J.R. Seyba

2006          Outstanding Teaching Award, Nominee, Eta Kappa Nu, Delta Xi Chapter Electrical Engineering / Computer Engineering

2006          Best Student Paper, K. M. Morris, B. E. Mullins, D. J. Pack, G. W. P. York and R. O. Baldwin, “Impact of Limited Communications on a Cooperative Search Algorithm for Multiple UAVs,” IEEE International Conference On Networking, Sensing and Control (ICNSC 2006), Ft. Lauderdale FL, April 2006, pp. 572-577

2004          Outstanding Performer for teaching excellence, Operational Readiness Inspection (ORI), Air Force Institute of Technology

2002          U.S. Air Force Academy's (USAFA) Outstanding Academy Educator award

1993, 1994 USAFA's Brig. Gen. R. E. Thomas award for outstanding contribution to cadet education twice

Publications

[1 =student advised by me, 2 = student advised by others, 3 = other non-faculty AFIT researchers, 4 = research faculty and staff scientists or engineers, 5 = other collaborators within the School, 6 = external collaborators.]

Books and Chapters (12)

  1. H. Lin2, M. J. Rice4, S. Dunlap4, and B. E. Mullins, “Generating Honeypot Traffic For Industrial Control Systems”, Critical Infrastructure Protection XI, M. Rice and S. Shenoi, eds., Springer, New York, NY, November 2017, pp. 193-223.
  2. C. E. Mays2, M. Rice4, B. W. Ramsey6, J. M. Pecarina4, and B. E. Mullins, “Defending Building Automation Systems Using Decoy Networks”, Critical Infrastructure Protection XI, M. Rice and S. Shenoi, eds., Springer, New York, NY, November 2017, pp. 29-49.
  3. K. A. Girtz1, B. E. Mullins, M. Rice4, and J. Lopez Jr.3, “Practical Application Layer Emulation In Industrial Control System Honeypots”, Critical Infrastructure Protection X, M. Rice and S. Shenoi, eds., Springer, New York, NY, November 2016, pp. 83-98.
  4. J. Lopez2, M. A. Temple4, and B. E. Mullins, “Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State”, Critical Information Infrastructures Security, Panayiotou et al, eds., Springer LNCS 8985, February 2016, pp. 24-30.
  5. R. M. Jaromin1, B. E. Mullins, and J. W. Butts4, “Design and Implementation of Industrial Control Emulators”, Critical Infrastructure Protection VII, J. Butts and S. Shenoi, eds., Springer, New York, NY, 12 December 2013, pp. 35-46.
  6. B. W. Ramsey1 and B. E. Mullins, “Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks”, Critical Infrastructure Protection VII, J. Butts and S. Shenoi, eds., Springer, New York, NY, 12 December 2013, pp. 63-79.
  7. B. D. Thomas1, B. E. Mullins, G. L. Peterson4 and R. F. Mills4, “An FPGA System for Detecting Malicious DNS Network Traffic,” Advances in Digital Forensics VII, G. Peterson and S. Shenoi, eds., Springer Science+Business Media, New York, NY, 13 October 2011, pp. 195-208.
  8. K. R. Schrader1, B. E. Mullins, G. L. Peterson4 and R. F. Mills4, “A Digital Forensic Tool for Detecting and Tracking Contraband Digital Files Transmitted Via the BitTorrent Peer-to-Peer Protocol,” Advances in Digital Forensics V, S. Shenoi and P. Craiger, eds., Springer Science+Business Media, New York, NY, 2 September 2009, pp. 159-174.
  9. D. W. Marsh2, R. O. Baldwin4 and B. E. Mullins, “Wireless Sensor Network Authorization Specification Language:  A Formal Model,” Security in Ad-hoc and Sensor Networks, World Scientific Press, July 2009, pp. 333-368.
  10. B. E. Mullins, “Resistive Circuits,” in An Introduction to Electrical Engineering: A Course for Students not Majoring in Electrical Engineering (D. E. Peterson and C. H. G. Wright, eds.), chap. 10, Government Printing Office, U.S. Air Force Academy, 2001.
  11. M. L. Brauer6, C. H. G. Wright6 and B. E. Mullins, eds., Introduction to Electrical Engineering, McGraw-Hill, 1994.
  12. B. E. Mullins, “Computer Architecture,” in Introduction to Electrical Engineering (M. L. Brauer, C. H. G. Wright and B. E. Mullins, eds.), chap. 9, McGraw-Hill, 1994.

 Archival Journal Publications (41)

  1. C. W. Badenhop1, S. R. Graham4, B. W. Ramsey6, B. E. Mullins, L. O. Mailloux4, “The Z-Wave Routing Protocol and its Security Implications”, Journal of Computer and Security, Elsevier, vol. 68, April 2017, pp. 112-129.
  2. S. Dunlap2, J. W. Butts6, J. Lopez Jr.3, M. J. Rice4, and B. E. Mullins, “Using Timing-Based Side Channels For Anomaly Detection In Industrial Control Systems”, International Journal of Critical Infrastructure Protection, Publisher: Elsevier, http://dx.doi.org/10.1016/j.ijcip.2016.07.003, vol. 15, December 2016, pp. 12-26.
  3. C. W. Badenhop1, B. W. Ramsey4, B. E. Mullins, L. O. Mailloux4, “Extraction and Analysis of Non-volatile Memory of the ZW0301 Module, a Z-wave Transceiver”, Digital Investigation, Publisher: Elsevier, vol. 17, no. 14, June 2016, pp. 14-27.
  4. C. W. Badenhop1, B. W. Ramsey4, and B. E. Mullins, “An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols”, International Journal of Network Security (IJNS), Publisher: National Chung Hsing University, vol. 18, no. 4, January 2016, pp. 667-677.
  5. B. W. Ramsey1, B. E. Mullins, M. A. Temple4, and M. R. Grimaila4, “Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation”, IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 5, September/October 2015, pp. 585-596.
  6. M. M. Winn2, M. J. Rice4, S. Dunlap3, J. Lopez3, B. E. Mullins, “Constructing Cost-Effective And Targetable Industrial Control System Honeypots For Production Networks”, International Journal of Critical Infrastructure Protection, 1 May 2015, Elsevier, DOI: http://dx.doi.org/10.1016/j.ijcip.2015.04.002, pp. 47-58.
  7. B. W. Ramsey1, T. D. Stubbs2, B. E. Mullins, M. A. Temple4, and M. A. Buchner6, “Wireless critical infrastructure protection using low-cost RF fingerprinting receivers”, International Journal of Critical Infrastructure Protection, 11 Dec 2014, Elsevier, DOI: 10.1016/j.ijcip.2014.11.002, pp. 1-20.
  8. J. T. Hagen1 and B. E. Mullins, “Network Vulnerability Analysis of the Player Command and Control Protocol”, International Journal of Security and Networks (IJSN), Inderscience Publishers, vol. 9, no. 3, 2014, pp. 154-166.
  9. N. J. Kulesza1, B. W. Ramsey1, and B. E. Mullins, “Radio Frequency Fingerprinting through Preamble Manipulation”, The Journal of Information Warfare, Peregrine Technical Solutions, vol. 13, no. 2, 2014, pp. 23-32.
  10. R. Bodenheim2, J. W. Butts4, S. Dunlap3, and B. E. Mullins, “Evaluation of the Ability of the Shodan Engine to Identify Internet-Facing Industrial Control Devices”, International Journal of Critical Infrastructure Protection, Elsevier, vol. 7, no. 2, 2014, pp. 114-123.
  11. C. W. Badenhop1 and B. E. Mullins, “A Black Hole Attack Model Using Topology Approximation for Reactive Ad-hoc Routing Protocols”, International Journal of Security and Networks (IJSN), Inderscience Publishers, vol. 9, no. 2, 2014, pp. 63-77.
  12. W. C. Henry1 and B. E. Mullins, “VANISH: A Variable Advanced Network IRC Stealth Handling System”, International Journal of Security and Networks (IJSN), Inderscience Publishers, vol. 9, no. 2, 2014, pp. 114-123.
  13. M. B. Reynolds2, D. R. Hulce6, K. H. Hopkinson4, M. E. Oxley4 and B. E. Mullins, “A Bin Packing Heuristic for On-Line Service Placement and Performance Control,” IEEE Transactions on Network and Service Management, vol. 10, no. 3, 2013, pp. 326-339.
  14. D. R. Karrels2, G. L. Peterson4 and B. E. Mullins, “Large-scale cooperative task distribution on peer-to-peer networks,” Web Intelligence and Agent Systems, Web Intelligence Consortium, vol. 11, no. 1, 2013, pp. 67-79.
  15. B. E. Mullins, “Developing Cyber Warriors from Computer Engineers et al.,” American Society for Engineering Education (ASEE) Computers in Education Journal, vol. 3, no. 4, October-December 2012, pp. 26-35.
  16. D. J. Kelly2, R. A. Raines4, R. O. Baldwin4, M. R. Grimaila4 and B. E. Mullins, “Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, June 2012, pp. 579-606.
  17. T. H. Lacey2, R. F. Mills4, B. E. Mullins, R. A. Raines4, M. E. Oxley4, and S. K. Rogers6, “RIPsec – Using Reputation-Based Multilayer Security to Protect MANETs,” Computers &  Security, Elsevier, vol. 31, no. 1, February 2012, pp. 122-136.
  18. D. T. Merritt1 and B. E. Mullins, “Identifying Cyber Espionage: Towards a Synthesis Approach,” Journal of Network Forensics, Edith Cowan University Security Research Institute, vol. 3, no.1, Autumn 2011, pp. 48-59.
  19. B. W. Ramsey1, B. E. Mullins, R. W. Thomas4 and T. R. Andel4, “Subjective Audio Quality over a Secure IEEE 802.11n Network,” International Journal of Security and Networks (IJSN), Inderscience Publishers, vol. 6, no. 1, 2011, pp. 53-63.
  20. K. R. Schrader1, B. E. Mullins, G. L. Peterson4 and R. F. Mills4, “An FPGA-based System for Tracking Digital Information Transmitted via Peer-to-Peer Protocols,” International Journal of Security and Networks (IJSN), Inderscience Publishers, vol. 5, no. 4, 2011, pp. 236-247.
  21. C. J. Antosh1, B. E. Mullins, R. O. Baldwin4 and R. A. Raines4, “A Comparison of Keying Methods in the Hubenko Architecture as Applied to Wireless Sensor Networks,” International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Inderscience Publishers, vol. 3, no. 3, April 2010, pp. 350-368.
  22. D. R. Karrels2, G. L. Peterson4 and B. E. Mullins, “Structured P2P Systems for Distributed Command and Control,” Peer-to-Peer Networking and Applications, Springer, 7 March 2009, DOI 10.1007/s12083-009-0033-y, pp. 1-23.
  23. B. E. Mullins, J. R. Seyba1, R. A. Raines4, B. W. Ramsey1 and P. D. Williams4, “Voice and Video Capacity of a Secure IEEE 802.11g Wireless Network,” Mobile Computing and Communications Review, ACM, vol. 13, no. 1, January 2009, pp. 26-34.
  24. D. W. Marsh2, R. O. Baldwin4, B. E. Mullins, R. F. Mills4 and M. R. Grimaila4, “A Security Policy Language for Wireless Sensor Networks,” Journal of Systems and Software, Elsevier,
    vol. 82, no. 1, January 2009, pp. 101-111.
  25. A. N. Phillips1, B. E. Mullins, R. A. Raines4 and R. O. Baldwin4, “A Secure Group Communication Architecture for Autonomous Unmanned Aerial Vehicles,” Security and Communication Networks, Wiley, DOI: 10.1002/sec.55, October 2008, pp. 55-69.
  26. C. R. Mann2, R. O. Baldwin4, J. P. Kharoufeh4 and B. E. Mullins, “A Queueing Approach to Optimal Resource Replication in Wireless Sensor Networks,” Performance Evaluation, Elsevier, vol. 65, no. 10, October 2008, pp. 689-700.
  27. G. J. Jordt2, R. O. Baldwin4, J. F. Raquet4 and B. E. Mullins, “Energy Cost and Error Performance of Range-Aware, Anchor-Free Localization Algorithms,” Ad Hoc Networks, Elsevier, vol. 6, no. 4, June 2008, pp. 539-559.
  28. C. R. Mann2, R. O. Baldwin4, J. P. Kharoufeh4 and B. E. Mullins, “Energy-efficient Search for Finite-lifetime Resources in Sensor Networks with Time-constrained Queries,” Mobile Computing and Communications Review, ACM, vol. 12, no. 2, April 2008, pp. 31-39.
  29. T. E. Dube2, B. D. Birrer2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins, R. F. Bennington6 and C. E. Reuter6, “Hindering Reverse Engineering: Thinking Outside the Box,” IEEE Security and Privacy, vol. 6, no. 2, March/April 2008, pp. 58-65.
  30. C. J. Augeri1, B. E. Mullins, L. C. Baird6, D. A. Bulutoglu4 and R. O. Baldwin4, “An Algorithm for Determining Isomorphism Using Lexicographic Sorting and the Matrix Inverse,” Congressus Numerantium, Utilitas Mathematica Publishing, vol. 184, December 2007, pp. 97-120.
  31. V. P. Hubenko, Jr.2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins, R. F. Mills4 and M. R. Grimaila4, “Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements,” IEEE Network, vol. 21, no. 4, July/August 2007, pp. 51-56.
  32. C. R. Mann2, R. O. Baldwin4, J. P. Kharoufeh4 and B. E. Mullins, “A Trajectory-based Selective Broadcast Query Protocol for Large-Scale, High Density Wireless Sensor Networks,” Telecommunication Systems: Modeling, Analysis, Design and Management, Springer, vol. 35, no. 1-2, June 2007, pp. 67-86.
  33. B. E. Mullins, T. H. Lacey4, R. F. Mills4, J. M. Trechter2 and S. D. Bass2, “How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum,” IEEE Security and Privacy, vol. 5, no. 5, September/October 2007, pp. 40-49.
  34. G. R. Roelke2, R. O. Baldwin4, B. E. Mullins and Y. C. Kim4, “A Cache Architecture for Extremely Unreliable Nanotechnologies,” IEEE Transactions on Reliability, vol. 56, no. 2, June 2007, pp. 182-197.
  35. K. M. Finnigin1, B. E. Mullins, R. A. Raines4 and H. B. Potoczny4, “Cryptanalysis of an Elliptic Curve Cryptosystem for Wireless Sensor Networks,” International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, Inderscience Publishers, vol. 2, no. 3/4, 2007, pp. 260-271.
  36. V. P. Hubenko2, R. A. Raines4, R. F. Mills4, R. O. Baldwin4, B. E. Mullins and M. R. Grimaila4,   “Improving the Global Information Grid’s Performance Through Satellite Communications Layer Enhancements,” IEEE Communications, vol. 44, no. 11, November 2006, pp. 66-72.
  37. S. E. Jeffers2, R. O. Baldwin4 and B. E. Mullins, “Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards,” SIMULATION: Transactions of The Society for Modeling and Simulation International, The Society for Modeling & Simulation International, vol. 82, no. 8, August 2006, pp. 549-558.
  38. D. J. Chaboya2, R. A. Raines4, R. O. Baldwin4 and B. E. Mullins, “Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion,” IEEE Security and Privacy, vol. 4, no. 6, November/December 2006, pp. 36-43.
  39. B. E. Mullins and D. J. Pack6, “Migration from the MC68HC11 to the MC68HC12 within an Electrical & Computer Engineering Curriculum,” American Society for Engineering Education (ASEE) Computers in Education Journal, vol. 14, no. 1, January-March 2004, pp. 58-64.
  40. B. E. Mullins and B. S. Peterson6, “BattleBots and the Electrical Engineering Education,” American Society for Engineering Education (ASEE) Computers in Education Journal, vol. 13, no. 1, January-March 2003, pp. 64-72.
  41. B. E. Mullins, N. J. Davis IV4 and S. F. Midkiff6, “An Adaptive Wireless Local Area Network Protocol That Improves Throughput Via Adaptive Control of Direct Sequence Spread Spectrum Parameters,” ACM Mobile Computing and Communication Review, vol. 1, no. 3, September 1997, pp. 9-16.

 Refereed Conference Publications (76)

  1. L. Bradford1, B E. Mullins, S. Dunlap4, and M. Reith4, “Developing Low-cost and Effective ICS Cyber Training Environments”, 13th International Conference on Cyber Warfare and Security ICCWS-2018, Washington DC, pp. 47-51.
  2. S. Mayer1, M. Reith4, and B E. Mullins, “Look Again Neo: A Software Defined Networking Moving Target Defense”, 13th International Conference on Cyber Warfare and Security ICCWS-2018, pp. 602-610.
  3. M. E. Aust1 and B. E. Mullins, “Proactive Host Mutation in Software Defined Networking,” 12th International Conference on Cyber Warfare and Security ICCWS-2017, Dayton OH, 2-3 March 2017, pp. 453-460.
  4. J. S. Goodgion1 and B. E. Mullins, “Active Network Response Using Host-Based IDS and Software Defined Networking,” 12th International Conference on Cyber Warfare and Security ICCWS-2017, Dayton OH, 2-3 March 2017, pp. 469-478.
  5. A. A. Portante1 and B. E. Mullins, “Analysis of the OpenFlow Protocol in Software Defined Networks,” 12th International Conference on Cyber Warfare and Security ICCWS-2017, Dayton OH, 2-3 March 2017, pp. 479-488.  Best Masters Presentation/Paper
  6. J. P. Wylie2, S. J. Stone4, and B. E. Mullins, “Detecting a Weakened Encryption Algorithm in Microcontrollers Using Correlation?Based Anomaly Detection”, 11th International Conference on Cyber Warfare and Security ICCWS-2016, Boston MA, 17-18 March 2016, pp. 335-343.
  7. D. J. Casey1, and B. E. Mullins, “SDN Shim: Controlling Legacy Devices”, 40th Annual IEEE Conference on Local Computer Networks, Clearwater Beach FL, 26-29 October 2015, pp. 169-172.
  8. B. W. Ramsey1, B. E. Mullins, W. M. Lowder2, and R. M. Speers6, “Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking”, IEEE Military Communications Conference 2014 (MILCOM 2014), Baltimore MD, 6-8 October 2014, pp. 104-109.
  9. N. J. Kulesza1, B. W. Ramsey1, and B. E. Mullins, “Wireless Intrusion Detection through Preamble Manipulation”, 9th International Conference on Cyber Warfare and Security ICCWS-2014, West Lafayette IN, 24-25 March 2014, pp. 132-139.
  10. S. Y. Sonya1 and B. E. Mullins, “Secured Distributed-Access Protection System – A New Construct Engineered for Digital Security Paradigms”, 9th International Conference on Cyber Warfare and Security ICCWS-2014, West Lafayette IN, 24-25 March 2014, pp. 201-210.
  11. B. W. Ramsey1, B. E. Mullins, R. Speers6, and K. A. Batterton4, “Watching for Weakness in Wild WPANs”, IEEE Military Communications Conference 2013 (MILCOM 2013), San Diego CA, 18-20 November 2013, pp. 1404-1409.
  12. J. T. Hagen1 and B. E. Mullins, “TCP Veto: A Novel Network Attack and its Application to SCADA Protocols”, 2013 IEEE PES Conference on Innovative Smart Grid Technologies, Washington DC, February 2013, pp. 1-6.
  13. B. W. Ramsey1, M. A. Temple4, and B. E. Mullins, “PHY Foundation for Multi-Factor ZigBee Node Authentication”, 2012 IEEE Global Communications Conference (GLOBECOM 12), Anaheim CA, December 2012, pp. 813-818.
  14. B. W. Ramsey1, B. E. Mullins, and Edward D. White4, “Improved Tools for Indoor Zigbee Warwalking”, IEEE 7th International Workshop on Practical Issues in Building Sensor Network Applications 2012 (SenseApp 2012), Clearwater FL, October 2012, pp. 925-928.
  15. B. E. Mullins, “Developing Cyber Warriors from Computer Engineers et al.,” 2012 American Society for Engineering Education Annual Conference, San Antonio TX, June 2012, pp. 1-12.  (Best Paper in the Computers in Education Division)
  16. M. B. Reynolds2, K. H. Hopkinson4, M. E. Oxley4 and B. E. Mullins, “Provisioning Norm: An Asymmetric Quality Measure For SaaS Resource Allocation,” IEEE International Conference on Services Computing (IEEE SCC), Washington DC, July 2011, pp. 112-119.
  17. D. T. Merritt1 and B. E. Mullins, “Identifying Cyber Espionage: Towards a Synthesis Approach,” 6th International Conference on Information Warfare and Security (ICIW 2011), George Washington University, Washington DC, 17-18 March 2011, pp. 180-187.
  18. M. B. Reynolds2, K. H. Hopkinson4, M. E. Oxley4 and B. E. Mullins, “Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants,” Hawaii International Conference on System Sciences (HICSS-45), Maui HI, January 2011, pp. 5546-5555.
  19. M. L. Stamat1, B. E. Mullins, J. W. Humphries4 and M. R. Grimaila4, “VIPER: A Virtual Infrastructure for Public-key Evaluation and Research,” IEEE Military Communications Conference (MILCOM 2010), October 2010, San Jose CA, pp. 1-6.  Classified paper.
  20. M. B. Reynolds2, K. H. Hopkinson4, M. E. Oxley4 and B. E. Mullins, “Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation,” 2010 IEEE 6th World Congress on Services, Miami FL, July 2010, pp. 156-157.
  21. J. R. Erskine2, G. L. Peterson4, B. E. Mullins and M. R. Grimaila4, “Developing Cyberspace Data Understanding: Using CRISP-DM for Host-based IDS Feature Mining,” Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW 10) April 2010, Oak Ridge, TN, pp. 1-4.
  22. D. A. Dodge1, B. E. Mullins, G. L. Peterson4 and J. S. Okolica4, “Simulating Windows-Based Cyber Attacks Using Live Virtual Machine Introspection,” Summer Computer Simulation Conference (SCSC10), Ottawa, Canada, July 2010, pp. 550-555.
  23. C.P. Barnard1 and B. E. Mullins, “BotNet Communication in an Asymmetric Information Warfare Campaign,” 5th International Conference on Information Warfare and Security (ICIW 2010), Air Force Institute of Technology, Wright-Patterson AFB OH, 8-9 April 2010, pp. 23-27.
  24. N. S. Kovach1 and B. E. Mullins, “Malware Detection via a Graphics Processing Unit,” 5th International Conference on Information Warfare and Security (ICIW 2010), Air Force Institute of Technology, Wright-Patterson AFB OH, 8-9 April 2010, pp. 212-215.
  25. B. D. Thomas1 and B. E. Mullins, “An FPGA-based Malicious DNS Packet Detection Tool,” 5th International Conference on Information Warfare and Security (ICIW 2010), Air Force Institute of Technology, Wright-Patterson AFB OH, 8-9 April 2010, pp. 337-342.
  26. D. R. Karrels2, G. L. Peterson4 and B. E. Mullins, “RC-Chord: Resource Clustering in a Large-Scale Hierarchical Peer-to-Peer System,” IEEE Military Communications Conference (MILCOM 2009), October 2009, pp. 1-7.
  27. M. T. Woelfle2, M. A. Temple4, B. E. Mullins and M. J. Mendenhall4, “Detecting, Identifying and Locating Bluetooth Devices Using RF Fingerprints,” IEEE Military Communications Conference (MILCOM 2009), October 2009, classified session.
  28. D. J. Kelly2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and M. R. Grimaila4, “Towards a Taxonomy of Wired and Wireless Anonymous Networks,” IEEE International Communications Conference 2009, Dresden Germany, June 2009, pp. 1-8.
  29. L. N. P. Santos1, B. E. Mullins, R. O. Baldwin4 and R. W. Thomas4, “VoIP over MANETS:  A Performance Analysis of OLSR,” 4th International Conference on Information Warfare and Security (ICIW 2009), Breakwater Lodge, Cape Town, South Africa, 26-27 March 2009, pp. 90-100.
  30. M. G. Wabiszewski2, T. R. Andel4, B. E. Mullins and R. W. Thomas4, “Enhancing Realistic Hands-On Network Training in a Virtual Environment,” Military Modeling and Simulation Symposium (MMS'09), San Diego CA, 22-27 March 2009, pp. 1-8.
  31. R. L. Lidowski1, B. E. Mullins and R. O. Baldwin4, “A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission,” Seventh IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, 9-13 March 2009, pp. 162-168.
  32. D. J. Kelly2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and M. R. Grimaila4, “Towards a Tree-based Taxonomy of Anonymous Networks,” 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009), Las Vegas, Nevada, 10-13 January 2009, pp. 1-2.
  33. D. J. Kelly2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and M. R. Grimaila4, “'Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary,” 27th IEEE International Performance Computing and Communications Conference/Workshop on Information and Data Assurance, Austin TX, December 2008, pp. 1-8.
  34. B. W. Ramsey1, B. E. Mullins, R. W. Thomas4 and T. R. Andel4, “Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks,” 1st IEEE International Workshop on Network Security and Privacy in conjunction with the IEEE IPCCC 2008 (27th IEEE International Performance Computing and Communications Conference), Austin TX, 7-9 December 2008, pp. 469-474.
  35. C. J. Antosh1 and B. E. Mullins, “The Scalability of Secure Lock,” 1st IEEE International Workshop on Information and Data Assurance in conjunction with the IEEE IPCCC 2008 (27th IEEE International Performance Computing and Communications Conference), Austin TX, 7-9 December 2008, pp. 507-512, Best Paper Award.
  36. S. J. Hopp2, M. A. Temple4, B. E. Mullins and R. O. Baldwin4, “Coexistent Performance Characterization of a Simulated GMSK System Using Operational Parameters,” IEEE Military Communications Conference (MILCOM 2008), San Diego CA, November 2008, pp. 1-5.
  37. D. J. Kelly2, R. A. Raines4, M. R. Grimaila4, R. O. Baldwin4 and B. E. Mullins, “A Survey of State-of-the-Art in Anonymous Metrics,” First ACM Workshop on Network Data Anonymization (NDA 2008), Alexandria VA, 31 October 2008, pp. 1-9.
  38. M. G. Judge2, P. D. Williams4, Y. C. Kim4 and B. E. Mullins, “Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information,” Workshop in Information Security Theory and Practices, Sevilla, Spain, 13-16 May 2008, pp. 36-48.
  39. J. E. Gorsuch1, B. E. Mullins, R. A. Raines4 and R. O. Baldwin4, “Analysis of Routing Worm Infection Rates on an IPv4 Network” 3rd International Conference on Information Warfare and Security, Omaha NE, 24-25 April 2008, pp. 143-152.
  40. D. J. Kelly2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and M. R. Grimaila4, “Analyzing Anonymity in Cyberspace,” 3rd International Conference on Information Warfare and Security, Omaha NE, 24-25 April 2008, pp. 221-232.
  41. D. J. Kelly2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and M. R. Grimaila4, “A Framework for Classifying Anonymous Networks in Cyberspace,” 3rd International Conference on Information Warfare and Security, Omaha NE, 24-25 April 2008, pp. 233-244.
  42. V. P. Hubenko2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins, R. F. Mills4 and M. R. Grimaila4, “A Secure and Efficient Satellite-based Multicast Architecture,” IEEE Radio and Wireless Symposium 2008, Orlando FL, 21-23 January 2008, pp. 227-230, Third place in Best Student papers.
  43. V. P. Hubenko2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins, R. F. Mills4 and M. R. Grimaila4,   “Applying A Secure And Efficient Low Earth Orbit Satellite-Based Multicast Architecture in a Deployed Environment,” IEEE Military Communications Conference (MILCOM 2007), Orlando FL, October 2007, pp. 1-7.
  44. A. D. Todd2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and S. K. Rogers6, “Alert Verification Evasion Through Server Response Forging,” Recent Advances in Intrusion Detection (RAID) 2007, 10th International Symposium, Queensland, Australia, 5-7 September 2007, pp. 256-275.
  45. B. D. Birrer2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and R. F. Bennington6, “Program Fragmentation as a Metamorphic Software Protection,” The Third International Symposium on Information Assurance and Security, Manchester, United Kingdom, 29-31 August 2007, pp. 369-374.
  46. D. P. Montminy2, R. O. Baldwin4, P. D. Williams4 and B. E. Mullins, “Using Relocatable Bitstreams for Fault Tolerance,” NASA/ESA Conference on Adaptive Hardware and Systems (AHS-2007), University of Edinburgh, Scotland, August 2007, pp. 701-708.
  47. G. J. Brault1, C. J. Augeri1, B. E. Mullins, C. B. Mayer4 and R. O. Baldwin4, “Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes,” 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS 2007), Philadelphia PA, August 2007, pp. 1-8.
  48. G. J. Brault1, C. J. Augeri1, B. E. Mullins, R. O. Baldwin4 and C. B. Mayer4, “Enabling Skip Graphs to Process k-Dimensional Range Queries In A Mobile Sensor Network,” 6th IEEE International Symposium on Network Computing and Applications (IEEE NCA07), Cambridge MA, July 2007, pp. 273-282.
  49. N. A. Fraser2, D. J. Kelly2, R. A. Raines4, R. O. Baldwin4 and B. E. Mullins, “Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment,” 2007 IEEE International Communications Conference, Glasgow, Scotland, June 2007, pp. 1197-1202.
  50. C. J. Augeri1, B. E. Mullins, L. C. Baird6, D. A. Bulutoglu4 and R. O. Baldwin4, “An Analysis of XML Compression Efficiency,” ACM Workshop on Experimental Computer Science, San Diego CA, 13-14 June 2007, pp. 1-12.
  51. M. T. Hyland1, B. E. Mullins, R. O. Baldwin4 and M. A. Temple4, “Simulation-based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles,” IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-07), Niagara Falls, Canada, May 2007, pp. 249-256.
  52. J. R. Seyba1, B. E. Mullins and G. L. Bonafede6, “Audio-Video Capacity of an IEEE 802.11g Wireless LAN,” 2007 ACM/IEEE International Symposium on Collaborative Technologies and Systems (CTS 2007), Orlando FL, May 2007, pp. 372-378.
  53. C. Mann2, R. O. Baldwin4 and B. E. Mullins, “Wireless Sensor Networks: Guidelines for Development and a Survey of Current Research,” 10th ACM Communication and Networking Simulation Symposium (CNS '07), Norfolk VA, March 2007, pp. 41-50.
  54. B. E. Mullins, T. H. Lacey4, R. F. Mills4, J. M. Trechter2 and S. D. Bass2, “The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology,” Hawaii International Conference on System Sciences (HICSS-40), Waikoloa HI, January 2007, pp. 1-9.
  55. J. T. Kautz1, B. E. Mullins, R. O. Baldwin4, S. R. Graham4, “An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks,” Hawaii International Conference on System Sciences (HICSS-40), Waikoloa HI, January 2007, pp. 1-6.
  56. C. J. Augeri1, K. M. Morris1 and B. E. Mullins, “HARVEST: A Framework and Co-Simulation Environment for Analyzing Unmanned Aerial Vehicle Swarms,” IEEE Military Communications Conference (MILCOM 2006), Washington DC, October 2006, pp. 1-7.
  57. J. L. Ives2, R. O. Baldwin4, B. E. Mullins and R. A. Raines4, “Evaluation of a Field Programmable Gate Array Circuit Reconfiguration System,” 2006 NASA Military and Aerospace Programmable Logic Devices (MAPLD) International Conference, Washington DC, September 2006, pp. A.114.1-A.114.8.
  58. C. J. Augeri1, K. M. Morris1 and B. E. Mullins, “JOCosim Using Java, OPNET and C to Enable Mobile Co-Simulation,” OPNETWORK 2006, Washington DC, August 2006, pp. 1-8.
  59. D. J. Chaboya2, R. A. Raines4, R. O. Baldwin4 and B. E. Mullins, “Reliably Determining The Outcome of Computer Network Attacks,” The 18th Forum of Incident Response and Security Teams (FIRST) Conference, Baltimore MD, June 2006, pp. 1-10.
  60. G. Roelke2, R. O. Baldwin4, B. E. Mullins and Y C. Kim4, “A Fault Tolerant Content Addressable Memory Cache Architecture for Nanotechnologies” 2nd IEEE International Workshop on Defect and Fault Tolerant Nanoscale Architectures (NANOARCH 2006), Boston MA, June 2006, pp. 17-24.
  61. K. M. Morris1, B. E. Mullins, D. J. Pack6, G. W. P. York6 and R. O. Baldwin4, “Impact of Limited Communications on a Cooperative Search Algorithm for Multiple UAVs,” IEEE International Conference On Networking, Sensing and Control (ICNSC 2006), Ft. Lauderdale FL, April 2006, pp. 572-577, Best Student Paper Award.
  62. T. E. Dube2, K. S. Edge2, R. A. Raines4, R. O. Baldwin4, B. E. Mullins and C. Reuter6, “Metamorphism as a Software Protection,”  The International Conference on Information Warfare and Security (ICIW 2006), Eastern Shores MD, March 2006, pp. 57-66.
  63. K. S. Edge2, T. E. Dube2, R. A. Raines4, R. O. Baldwin4 and B. E. Mullins, "A Taxonomy of Protections Used in Computer Viruses And Their Applications to Software Protection," The International Conference on Information Warfare and Security (ICIW 2006), Eastern Shores MD, March 2006, pp. 67-76.
  64. D. J. Chaboya2, R. A. Raines4, R. O. Baldwin4 and B. E. Mullins, “Social Engineering the Network Security Analyst:  An Advanced Study in Intrusion Detection System Evasion,” IEEE Military Communications Conference (MILCOM 2005), Atlantic City NJ, October 2005, pp. 1-8.
  65. T. W. Gilbert1, B. E. Mullins and D. J. Pack6, “Designing and Implementing an Embedded Microcontroller System: Tetris Game,” 2005 American Society for Engineering Education Annual Conference, Portland OR, June 2005, pp. 1-7.
  66. D. J. Pack6 and B. E. Mullins, “Toward Finding a Universal Search Algorithm for Swarm Robots,” IEEE/RSJ 2003 International Conference on Intelligent Robotics Systems (IROS), Las Vegas NV, October 2003, pp. 1945-1950.
  67. D. J. Pack6 and B. E. Mullins, “A Portable Microcontroller-based HTTP Tunneling Activity Detection System,” IEEE 2003 International Conference on System, Man, Cybernetics, Washington DC, October 2003, pp. 1544-1549.
  68. D. J. Pack6 and B. E. Mullins, “Computational Complexity on Pose Updates for Swarm Robots,” The 7th World Multiconference on Systemics, Cybernetics and Informatics, Orlando FL, July 2003, pp. 118-123.
  69. J. P. Perlin2, D. J. Pack6, B. E. Mullins and R. E. Speakman6, “Senior Capstone Design Experience: Hovering Robot,” 2003 American Society for Engineering Education Annual Conference, Nashville TN, June 2003, Session 2793, Paper 2003-2551, pp. 1-10.
  70. B. E. Mullins and D. J. Pack6, “Migration from the MC68HC11 to the MC68HC12 within an Electrical & Computer Engineering Curriculum,” 2002 American Society for Engineering Education Annual Conference, Montreal Quebec, Canada, June 2002, Session 1420, Paper 2002-991, pp. 1-9.
  71. B. E. Mullins and B. S. Peterson6, “BattleBots and the Electrical Engineering Education,” 2002 American Society for Engineering Education Annual Conference, Montreal Quebec, Canada, June 2002, Session 2620, Paper 2002-996, pp. 1-9.
  72. B. E. Mullins, N. J. Davis IV4 and S. F. Midkiff6, “A Wireless Local Area Network Protocol That Improves Throughput Via Adaptive Control,” 1997 IEEE International Conference on Communications, June 1997, Montreal Quebec, Canada, pp. 1427-1431.
  73. B. E. Mullins, “Common Ada Missile Packages (CAMP),” Guidance and Control Panel 52nd Symposium on Software for Guidance and Control, 7-10 May 1991, Thessaloniki, Greece, Sponsored by the Advisory Group for Aerospace Research & Development (AGARD), DTIC number: ADP006488, AGARD number: AGARD-CP-503, pp. 24-1 thru 24-6.
  74. B. E. Mullins, “The Expert Missile Maintenance Aid Program - Four Years Later and in the Field,” NASA/USAF Space Operations, Applications and Research Symposium (SOAR '90), 26-28 June 1990, Albuquerque NM, Sponsored by the National Aeronautics and Space Administration, Johnson Space Center, the U.S. Air Force, Space Technology Center and the University of New Mexico, DTIC number: ADA223589, Report Number: AFATL-TP-90-13.
  75. B. E. Mullins, “Diagnosing Munition Faults: The EMMA Approach,” 27th Aerospace Sciences Meeting, 9-12 January 1989, Reno, Nevada, Sponsored by the American Institute of Aeronautics and Astronautics (AIAA), Washington DC., AIAA-1989-380, DTIC number: ADA202442, Report Number: AFATL-TR-88-147, pp. 1-9.
  76. B. E. Mullins, “EMMA: The Expert System For Munition Maintenance,” Second Annual Workshop on Space Operations Automation and Robotics (SOAR ’88), Wright State University, Dayton, OH, 20-23 July 1988, Sponsored by the National Aeronautics and Space Administration, Washington DC. and the U.S. Air Force, Washington DC., NASA Conference Publication 3019, Pages 31-39, DTIC Number ADA202558, Report Number: AFATL-TR-88-88.

Other Publications (21)

  1. K. Huber1 and B. E. Mullins, “Hiding the Windows Operating System,” Air University Blue Dart, June 2011.
  2. J. M. Stange1 and B. E. Mullins, “Proactive Defensive Security,” Air University Blue Dart, June 2011.
  3. W. C. Henry1 and B. E. Mullins, “Communicating Under the Radar,” Air University Blue Dart, March 2011.
  4. R. T. Ostler1 and B. E. Mullins, “Smoking cyber craters: where are they now?,” Air University Blue Dart, March 2011.
  5. D. T. Merritt1 and B. E. Mullins, “Internet License and Registration, Please,” Air University Blue Dart, March 2011.
  6. C. P. Barnard1 and B. E. Mullins, “Communicating in the Shadows,” Air University Blue Dart, September 2010.
  7. D. A. Dodge1 and B. E. Mullins, “Hypervisors: The UAV of Cyberspace,” Air University Blue Dart, September 2010.
  8. N. S. Kovach1 and B. E. Mullins, “The Hidden Power Within Your Computer,” Air University Blue Dart, September 2010.
  9. B. D. Thomas1 and B. E. Mullins, “New Technology Detects Malicious Traffic Traversing Government and Military Networks,” Air University Blue Dart, June 2010.
  10. M. L. Stamat1 and B. E. Mullins, “Training ≠ Education: Putting Secure Software Engineering Back in the Classroom,” Air University Blue Dart, March 2010.
  11. B. A. Pagel1 and B. E. Mullins, “Virtualization: The Supermax Prison for Your Computer,” Air University Blue Dart, March 2009.
  12. L. N. P. Santos1 and B. E. Mullins, “Using Mobile Ad Hoc Networks for Communications,” Air University Blue Dart, March 2009.
  13. C. J. Antosh1 and B. E. Mullins, “AFIT Research Supports Replacement of Landmines,” Air University Blue Dart, March 2009.
  14. K. R. Schrader1 and B. E. Mullins, “TRAPPing Contraband File Sharers on Government Networks,” Air University Blue Dart, February 2009.
  15. B. W. Ramsey1 and B. E. Mullins, “VoIP: I Can Hear You Now, but So Can the Enemy,” Air University Blue Dart, November 2008.  Top Student Blue Dart for CY2008.
  16. B. E. Mullins, T. H. Lacey4, R. F. Mills4 and R. A. Raines4, “The Morphing of a Cyber Operations Curriculum at AFIT,” IAnewsletter - The Newsletter for Information Assurance Technology Professionals, Information Assurance Technology Analysis Center, Falls Church, VA, vol. 10, no. 1, Spring 2007, pp. 26-30.
  17. B. E. Mullins, “USAF Academy Department of Electrical Engineering Computer Engineering Division Computer Engineering Working Group Observations and Conclusions,” Department of Electrical Engineering, U.S. Air Force Academy, CO, October 1992.
  18. B. E. Mullins, ed.  “Expert Missile Maintenance Aid (EMMA) Field-Level Fielding – Rockwell,” Air Force Armament Laboratory (AFATL), September 1990, DTIC Number ADB150518, Report Number: AFATL-TR-90-76.
  19. B. E. Mullins, “Intelligent Computers to Aid in Diagnosing Faults,” Eglin Eagle, Niceville FL, 20 October 1989.
  20. B. E. Mullins, ed.  “Expert Missile Maintenance Aid (EMMA) Phase 2 – Raytheon, Volume 1, Technical Discussion,” Air Force Armament Laboratory (AFATL), June 1989, DTIC Number ADB134427, Report Number: AFATL-TR-89-29.
  21. B. E. Mullins, ed.  “Expert Missile Maintenance Aid (EMMA) Phase 2 – Rockwell International, Volume 1, Technical Discussion,” Air Force Armament Laboratory (AFATL), June 1989, DTIC Number ADB134417, Report Number: AFATL-TR-89-30.
⇑ Return to top ⇑