LTC David R. Raymond
Assistant Professor Contact: Office: Phone:
LTC Raymond is an Armor Officer. His previous military assignments include Deputy Commander of Operations Group Bravo, Battle Command Training Program, Tank Battalion Executive Officer in 3rd Brigade, 1st Infantry Division, Tank Company Commander and Headquarters Company Commander in 2nd Brigade, 4th Infantry division, and Tank Platoon Leader, Tank Company Executive Officer, and Battalion Maintenance Officer in 1st Brigade, 1st Armored Division. He deployed to Operation Desert Shield/Desert Storm as a Tank Platoon Leader in 4th Battalion, 67th Armor and to Operation Iraqi Freedom as Battalion Executive Officer of 2nd Battalion, 63rd Armor. He is a graduate of the Command and General Staff Officer's Course, Cavalry Leader's Course, Armor Officer Basic and Advanced Courses, Airborne School, and Air Assault School. His awards and decorations include the Silver Star, the Bronze Star Medal, and the Army Meritorious Service Medal with three Oak Leaf Clusters, among others. LTC Raymond's research interests include wireless sensor and mobile ad hoc networks, wireless network security, and energy-efficient MAC protocols.
- Ph.D., Computer Engineering, Virginia Polytechnic and State University, 2008
- M.S., Computer Science , Duke University, 1998
- B.S., Computer Science, United States Military Academy, 1989
Journals and Magazines
- G. Conti and D. Raymond, “Leadership of Cyber Warriors: Enduring Principles and New Directions,” in Small Wars Journal, 11 July 2011.
- G. Conti, D. Larkin, D. Raymond and E. Sobiesk, “The military's cultural disregard for personal information,” in Small Wars Journal, 6 Dec. 2010.
- D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff, “Effects of denial of sleep attacks on wireless sensor network MAC protocols,” in IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp 367-380, Jan 2009.
- D. Raymond and S. Midkiff, “Denial-of-service in wireless sensor networks: Attacks and defenses,” in IEEE Pervasive Computing Magazine, vol. 7, no. 1, pp. 74-81, Jan.-Mar. 2008.
- C. Bowen III, D. Raymond, and T. Martin, “Location privacy for users of wireless devices through cloaking,” in 41st Hawaii International Conference on System Sciences, pp. 295-305, Waikoloa, HI, Jan. 2008.
- D. Raymond and S. Midkiff, “Adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks,” in IEEE/AFCEA Military Communications Conference, pp. 1-7, Orlando, FL, Oct. 2007.
- Y. Zhao, D. Raymond, C. da Silva, J. Reed, and S. Midkiff, “Performance evaluation of radio environment map-enabled cognitive spectrum-sharing networks,” in IEEE/AFCEA Military Communications Conference, pp. 1-7, Orlando, FL, Oct. 2007.
- D. Raymond and Scott Midkiff, “Analyzing wireless sensor network denial-of-sleep attacks and defenses using OPNET Modeler,” in OPNETWORK 2007, Washington, DC, Aug. 2007.
- D. Raymond, R. Marchany, and S. Midkiff, “Scalable, cluster-based anti-replay protection for wireless sensor networks,” in 8th Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, pp. 127-134, West Point, NY, June 2007.
- D. Raymond, I. Burbey, Y. Zhao, S. Midkiff, and C. P. Koelling, “Impact of mobility models on simulated ad hoc network performance,” in 9th International Symposium on Wireless Personal Multimedia Communications, pp. 398-402, San Diego, CA, Sept. 2006.
- D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff, “Effects of denial of sleep attacks on wireless sensor network MAC protocols,” in 7th Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, pp. 297-304, West Point, NY, June 2006. (Best paper award nominee.)
- J. Schumacher, D. Raymond, and D. Welch, “Teaching introductory programming, problem solving, and IT with robots at West Point,” in 31st Annual ASEE/IEEE Frontiers In Education Conference, pp. F1B2-7-F1B2-11, Reno, NV, Oct. 2001.
- D. Raymond and D. Welch, “Integrating information technology and programming in a freshman computer science course,” in 30th Annual ASEE/IEEE Frontiers In Education Conference, pp. T4C7-T4C11, Kansas City, MO, Oct. 2000.
- A. Lebeck, D. Raymond, C. Yang, and M. Thottethodi, “Annotated memory references, a mechanism for informed cache management,” in European Conference on Parallel Computing, pp. 1251- 1254, Toulouse, France, Sept. 1999.
- G. C. Hadjichristofi, L. A. DaSilva, A. B. MacKenzie, S. F. Midkiff, M. T. Refaei, K. N. Wood, J. Suris, and D. Raymond, “Monitoring cooperation: a reputation-based mechanism for isolating selfish nodes in mobile ad hoc networks (demonstration),” in Twelfth Annual International Conference on Mobile Computing and Networking, Los Angeles, CA, Sept. 2006.
- Wireless sensor and mobile ad hoc networks; network security and privacy.