Raheem A. Beyah

Orcid: 0000-0002-9188-3464

Affiliations:
  • Georgia Institute of Technology, Atlanta, USA


According to our database1, Raheem A. Beyah authored at least 181 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting.
ACM Trans. Sens. Networks, March, 2024

Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.
IEEE Trans. Consumer Electron., February, 2024

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
AC Power Consumption Dataset.
Dataset, November, 2023

Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022

Adversarial CAPTCHAs.
IEEE Trans. Cybern., 2022

V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.
IEEE Trans. Cybern., 2022

OnAI-Comp: An Online AI Experts Competing Framework for Early Sepsis Detection.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses.
Proceedings of the 31st USENIX Security Symposium, 2022

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

EMS: History-Driven Mutation for Coverage-based Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SLIME: program-sensitive energy allocation for fuzzing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Physical Logic Bombs in 3D Printers via Emerging 4D Techniques.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers.
IEEE Trans. Inf. Forensics Secur., 2020

Introduction to the Special Issue on User-Centric Security and Safety for CPS.
ACM Trans. Cyber Phys. Syst., 2020

De-Health: All Your Online Health Information Are Belong to Us.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home.
Wirel. Networks, 2019

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2019

Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2019

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data.
IEEE Trans. Dependable Secur. Comput., 2019

A privacy-preserving multifactor authentication system.
Secur. Priv., 2019

ShareSafe: An Improved Version of SecGraph.
KSII Trans. Internet Inf. Syst., 2019

Enabling a Decentralized Smart Grid Using Autonomous Edge Control Devices.
IEEE Internet Things J., 2019

On Evaluating the Effectiveness of the HoneyBot: A Case Study.
CoRR, 2019

De-Health: All Your Online Health Information Are Belong to Us.
CoRR, 2019

FDI: Quantifying Feature-based Data Inferability.
CoRR, 2019

Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019

MOPT: Optimized Mutation Scheduling for Fuzzers.
Proceedings of the 28th USENIX Security Symposium, 2019

RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019

2018
DPPG: A Dynamic Password Policy Generation System.
IEEE Trans. Inf. Forensics Secur., 2018

HoneyBot: A Honeypot for Robotic Systems.
Proc. IEEE, 2018

Edge Computing for the Internet of Things.
IEEE Netw., 2018

Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too.
IEEE Secur. Priv., 2018

Cloud repository as a malicious service: challenge, identification and implication.
Cybersecur., 2018

Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator.
CoRR, 2018

Emerging Technologies for Connected and Smart Vehicles.
IEEE Commun. Mag., 2018

Lowering the Barriers to Industrial Control System Security with GRFICS.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

SOTA: Secure Over-the-Air Programming of IoT Devices.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2017
On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis.
IEEE Trans. Multi Scale Comput. Syst., 2017

Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017

A Case Study in Power Substation Network Dynamics.
Proc. ACM Meas. Anal. Comput. Syst., 2017

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey.
IEEE Commun. Surv. Tutorials, 2017

See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing.
Proceedings of the 26th USENIX Security Symposium, 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

HSTS Measurement and an Enhanced Stripping Attack Against HTTPS.
Proceedings of the Security and Privacy in Communication Networks, 2017

Password correlation: Quantification, evaluation and application.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Structural Data De-Anonymization: Theory and Practice.
IEEE/ACM Trans. Netw., 2016

Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2016

General Graph Data De-Anonymization: From Mobility Traces to Social Networks.
ACM Trans. Inf. Syst. Secur., 2016

Seed-Based De-Anonymizability Quantification of Social Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Rethinking the Honeypot for Cyber-Physical Systems.
IEEE Internet Comput., 2016

A simple visualization and programming framework for wireless sensor networks: PROVIZ.
Ad Hoc Networks, 2016

Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.
Proceedings of the 25th International Conference on World Wide Web, 2016

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

On the relative de-anonymizability of graph data: Quantification and evaluation.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Attacking and securing beacon-enabled 802.15.4 networks.
Wirel. Networks, 2015

Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015

Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation.
ACM Trans. Embed. Comput. Syst., 2015

GTID: A Technique for Physical Device and Device Type Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2015

Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm.
Trans. Emerg. Telecommun. Technol., 2015

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015

Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Primary social behavior aware routing and scheduling for Cognitive Radio Networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

InterSec: An interaction system for network security applications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cyber Security and Operational Reliability.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Information Leakage in Encrypted IP Video Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

PARS: A Uniform and Open-source Password Analysis and Research System.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

A first look at machine-to-machine power grid network traffic.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

A physical overlay framework for insider threat mitigation of power system devices.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Minimum-sized influential node set selection for social networks under the independent cascade model.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Structure Based Data De-Anonymization of Social Networks and Mobility Traces.
Proceedings of the Information Security - 17th International Conference, 2014

MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Active deception model for securing cloud infrastructure.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Towards Secure Metering Data Analysis via Distributed Differential Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Sensory channel threats to Cyber Physical Systems: A wake-up call.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A multi-factor re-authentication framework with user privacy.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Structural Data De-anonymization: Quantification, Practice, and Implications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

An Empirical Study of TCP Vulnerabilities in Critical Power System Devices.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2013
Orthogonal frequency division multiple access resource allocation in mobile multihop relay networks using an adaptive frame structure.
Wirel. Commun. Mob. Comput., 2013

Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Cell-based snapshot and continuous data collection in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Practical unicast and convergecast scheduling schemes for cognitive radio networks.
J. Comb. Optim., 2013

<i>NAVSEC</i>: a recommender system for 3D network security visualizations.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

PROVIZ: An integrated visualization and programming framework for WSNs.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Examining the characteristics and implications of sensor side channels.
Proceedings of IEEE International Conference on Communications, 2013

P3D: A parallel 3D coordinate visualization for advanced network scans.
Proceedings of IEEE International Conference on Communications, 2013

CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking.
Proceedings of IEEE International Conference on Communications, 2013

Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A passive technique for fingerprinting wireless devices with Wired-side Observations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

S-Match: An efficient privacy-preserving profile matching scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
An 802.11 MAC layer covert channel.
Wirel. Commun. Mob. Comput., 2012

On the construction of k-connected m-dominating sets in wireless networks.
J. Comb. Optim., 2012

An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP).
Ad Hoc Networks, 2012

The Monitoring Core: A framework for sensor security application development.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Plugging the leaks without unplugging your network in the midst of Disaster.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

EDR<sup>2</sup>: A sink failure resilient approach for WSNs.
Proceedings of IEEE International Conference on Communications, 2012

SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions.
IEEE Secur. Priv., 2011

Sensor scheduling for <i>p</i>-percent coverage in wireless sensor networks.
Clust. Comput., 2011

A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor Networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2010

A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters.
IEEE Trans. Netw. Serv. Manag., 2010

VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Advances In Wireless Test beds and Research Infrastructures.
Mob. Networks Appl., 2010

Attacking Beacon-Enabled 802.15.4 Networks.
Proceedings of the Security and Privacy in Communication Networks, 2010

A Wired-Side Approach to MAC Misbehavior Detection.
Proceedings of IEEE International Conference on Communications, 2010

DEEP: A Deployable Energy Efficient 802.15.4 MAC Protocol for Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Analysis of Varying AS Path Lengths from the Edge of the Network.
Proceedings of IEEE International Conference on Communications, 2010

Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

A passive approach to wireless device fingerprinting.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
On the performance of using Covert Timing Channels for node authentication.
Secur. Commun. Networks, 2009

Key challenges in securing WiMAX mesh networks.
Secur. Commun. Networks, 2009

Using link RTT to passively detect unapproved wireless nodes.
Int. J. Secur. Networks, 2009

Authentic delay bounded event detection in heterogeneous wireless sensor networks.
Ad Hoc Networks, 2009

Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC.
Proceedings of the Security and Privacy in Communication Networks, 2009

Toward Revealing Kernel Malware Behavior in Virtual Execution Environments.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Authentication in 802.11 LANs Using a Covert Side Channel.
Proceedings of IEEE International Conference on Communications, 2009

Shepherding Loadable Kernel Modules through On-demand Emulation.
Proceedings of the Detection of Intrusions and Malware, 2009

Security in Ad Hoc and Sensor Networks
Computer and Network Security 3, World Scientific, ISBN: 978-981-4468-30-5, 2009

2008
Passive classification of wireless NICs during active scanning.
Int. J. Inf. Sec., 2008

Passive Classification of Wireless NICs during Rate Switching.
EURASIP J. Wirel. Commun. Netw., 2008

Designing Secure Protocols for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2008

A Performance Analysis of Authentication Using Covert Timing Channels.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure.
Proceedings of IEEE International Conference on Communications, 2008

Filtering Spam by Using Factors Hyperbolic Tree.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A Characterization of Wireless NIC Active Scanning Algorithms.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Composite Event Detection in Wireless Sensor Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007

A Passive Approach to Rogue Access Point Detection.
Proceedings of the Global Communications Conference, 2007

2006
Galo: a Deployable Framework for Providing Better than Best-Effort Quality of Service.
J. Interconnect. Networks, 2006

A Passive Approach to Wireless NIC Identification.
Proceedings of IEEE International Conference on Communications, 2006

The case for collaborative distributed wireless intrusion detection systems.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2005
Visual Firewall: Real-time Network Security Monito.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

2004
Rogue access point detection using temporal traffic characteristics.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Implementation of an efficient transport for real-time game applications on HFC cable networks.
Proceedings of IEEE International Conference on Communications, 2003

Application layer switching: a deployable technique for providing quality of service.
Proceedings of the Global Telecommunications Conference, 2003


  Loading...