Raheem A. Beyah
Orcid: 0000-0002-9188-3464Affiliations:
- Georgia Institute of Technology, Atlanta, USA
According to our database1,
Raheem A. Beyah
authored at least 181 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting.
ACM Trans. Sens. Networks, March, 2024
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.
IEEE Trans. Consumer Electron., February, 2024
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cybern., 2022
IEEE ACM Trans. Comput. Biol. Bioinform., 2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2021
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers.
IEEE Trans. Inf. Forensics Secur., 2020
ACM Trans. Cyber Phys. Syst., 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home.
Wirel. Networks, 2019
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2019
Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Internet Things J., 2019
Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Secur. Priv., 2018
Cybersecur., 2018
Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator.
CoRR, 2018
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
2017
On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis.
IEEE Trans. Multi Scale Comput. Syst., 2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017
Proc. ACM Meas. Anal. Comput. Syst., 2017
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey.
IEEE Commun. Surv. Tutorials, 2017
See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing.
Proceedings of the 26th USENIX Security Symposium, 2017
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
IEEE Trans. Mob. Comput., 2016
ACM Trans. Inf. Syst. Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
A simple visualization and programming framework for wireless sensor networks: PROVIZ.
Ad Hoc Networks, 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015
ACM Trans. Embed. Comput. Syst., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm.
Trans. Emerg. Telecommun. Technol., 2015
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015
Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Trans. Mob. Comput., 2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Minimum-sized influential node set selection for social networks under the independent cascade model.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Proceedings of the Information Security - 17th International Conference, 2014
MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
2013
Orthogonal frequency division multiple access resource allocation in mobile multihop relay networks using an adaptive frame structure.
Wirel. Commun. Mob. Comput., 2013
IEEE Trans. Parallel Distributed Syst., 2013
ACM Trans. Sens. Networks, 2013
J. Comb. Optim., 2013
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of IEEE International Conference on Communications, 2013
CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
A passive technique for fingerprinting wireless devices with Wired-side Observations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
J. Comb. Optim., 2012
Ad Hoc Networks, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
IEEE Secur. Priv., 2011
Clust. Comput., 2011
A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor Networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2010
A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters.
IEEE Trans. Netw. Serv. Manag., 2010
IEEE Trans. Mob. Comput., 2010
Mob. Networks Appl., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Secur. Commun. Networks, 2009
Int. J. Secur. Networks, 2009
Ad Hoc Networks, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Computer and Network Security 3, World Scientific, ISBN: 978-981-4468-30-5, 2009
2008
Int. J. Inf. Sec., 2008
EURASIP J. Wirel. Commun. Netw., 2008
Proceedings of the Wireless Algorithms, 2008
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007
Proceedings of the Global Communications Conference, 2007
2006
Galo: a Deployable Framework for Providing Better than Best-Effort Quality of Service.
J. Interconnect. Networks, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
2005
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Implementation of an efficient transport for real-time game applications on HFC cable networks.
Proceedings of IEEE International Conference on Communications, 2003
Application layer switching: a deployable technique for providing quality of service.
Proceedings of the Global Telecommunications Conference, 2003