Lanier A. Watkins
Orcid: 0000-0002-3322-1833Affiliations:
- Johns Hopkins University, Whiting School of Engineering, Baltimore, MD, USA
- Johns Hopkins University, Applied Physics Laboratory, Baltimore, MD, USA
- Georgia State University, Atlanta, GA, USA (PhD 2010)
According to our database1,
Lanier A. Watkins
authored at least 45 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on isi.jhu.edu
-
on ep.jhu.edu
On csauthors.net:
Bibliography
2024
Eliciting and Measuring Toxic Bias in Human-to-Machine Interactions in Large Language Models.
Proceedings of the 15th IEEE Annual Ubiquitous Computing, 2024
2023
Agile services and analysis framework for autonomous and autonomic critical infrastructure.
Innov. Syst. Softw. Eng., June, 2023
The Roles of Autonomy and Assurance in the Future of Uncrewed Aircraft Systems in Low-Altitude Airspace Operations.
Computer, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023
2022
Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach.
Proceedings of the Critical Infrastructure Protection XVI, 2022
Proceedings of the IEEE International Conference on Assured Autonomy, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2021
An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021
2020
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the Critical Infrastructure Protection XIV, 2020
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020
Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020
2018
Network-based detection of mobile malware exhibiting obfuscated or silent network behavior.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Using semi-supervised machine learning to address the Big Data problem in DNS networks.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
Int. J. Cyber Warf. Terror., 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
2015
ACM Trans. Embed. Comput. Syst., 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Remotely inferring device manipulation of industrial control systems via network behavior.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015
2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Constructing timing-based covert channels in mobile networks by adjusting CPU frequency.
Proceedings of the HASP 2014, 2014
Proceedings of the International Conference on Computing, Networking and Communications, 2014
2011
IEEE Trans. Parallel Distributed Syst., 2011
2010
A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters.
IEEE Trans. Netw. Serv. Manag., 2010
2009
Int. J. Secur. Networks, 2009
2008
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
Proceedings of IEEE International Conference on Communications, 2008
2007
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007
Proceedings of the Global Communications Conference, 2007