Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Raheem A. Beyah
@article{DBLP:journals/tosn/HongLZSSBW24, author = {Zhen Hong and Lingling Lu and Dehua Zheng and Jiahui Suo and Peng Sun and Raheem Beyah and Zhenyu Wen}, title = {Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {2}, pages = {29:1--29:27}, year = {2024}, url = {https://doi.org/10.1145/3582691}, doi = {10.1145/3582691}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/HongLZSSBW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuXJLZLDZWB23, author = {Yiming Wu and Zhiyuan Xie and Shouling Ji and Zhenguang Liu and Xuhong Zhang and Changting Lin and Shuiguang Deng and Jun Zhou and Ting Wang and Raheem Beyah}, title = {Fraud-Agents Detection in Online Microfinance: {A} Large-Scale Empirical Study}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1169--1185}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3151132}, doi = {10.1109/TDSC.2022.3151132}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuXJLZLDZWB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhaoJ00WPLB23, author = {Binbin Zhao and Shouling Ji and Xuhong Zhang and Yuan Tian and Qinying Wang and Yuwen Pu and Chenyang Lyu and Raheem Beyah}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{UVSCAN:} Detecting Third-Party Component Usage Violations in IoT Firmware}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3421--3438}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhao-binbin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhaoJ00WPLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LyuXJ0WZPC0B23, author = {Chenyang Lyu and Jiacheng Xu and Shouling Ji and Xuhong Zhang and Qinying Wang and Binbin Zhao and Gaoning Pan and Wei Cao and Peng Cheng and Raheem Beyah}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{MINER:} {A} Hybrid Data-Driven Approach for {REST} {API} Fuzzing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4517--4534}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/lyu}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LyuXJ0WZPC0B23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-02545, author = {Chenyang Lyu and Jiacheng Xu and Shouling Ji and Xuhong Zhang and Qinying Wang and Binbin Zhao and Gaoning Pan and Wei Cao and Raheem Beyah}, title = {{MINER:} {A} Hybrid Data-Driven Approach for {REST} {API} Fuzzing}, journal = {CoRR}, volume = {abs/2303.02545}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.02545}, doi = {10.48550/ARXIV.2303.02545}, eprinttype = {arXiv}, eprint = {2303.02545}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-02545.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-11206, author = {Binbin Zhao and Shouling Ji and Xuhong Zhang and Yuan Tian and Qinying Wang and Yuwen Pu and Chenyang Lyu and Raheem Beyah}, title = {{UVSCAN:} Detecting Third-Party Component Usage Violations in IoT Firmware}, journal = {CoRR}, volume = {abs/2306.11206}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.11206}, doi = {10.48550/ARXIV.2306.11206}, eprinttype = {arXiv}, eprint = {2306.11206}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-11206.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-14742, author = {Qinying Wang and Boyu Chang and Shouling Ji and Yuan Tian and Xuhong Zhang and Binbin Zhao and Gaoning Pan and Chenyang Lyu and Mathias Payer and Wenhai Wang and Raheem Beyah}, title = {SyzTrust: State-aware Fuzzing on Trusted {OS} Designed for IoT Devices}, journal = {CoRR}, volume = {abs/2309.14742}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.14742}, doi = {10.48550/ARXIV.2309.14742}, eprinttype = {arXiv}, eprint = {2309.14742}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-14742.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/DuJWHLLWJBW22, author = {Tianyu Du and Shouling Ji and Bo Wang and Sirui He and Jinfeng Li and Bo Li and Tao Wei and Yunhan Jia and Raheem Beyah and Ting Wang}, title = {DetectS ec: Evaluating the robustness of object detection models to adversarial attacks}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {9}, pages = {6463--6492}, year = {2022}, url = {https://doi.org/10.1002/int.22851}, doi = {10.1002/INT.22851}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/DuJWHLLWJBW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/ZhouBK22, author = {Anni Zhou and Raheem Beyah and Rishikesan Kamaleswaran}, title = {OnAI-Comp: An Online {AI} Experts Competing Framework for Early Sepsis Detection}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {19}, number = {6}, pages = {3595--3603}, year = {2022}, url = {https://doi.org/10.1109/TCBB.2021.3122405}, doi = {10.1109/TCBB.2021.3122405}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/ZhouBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/LiJLCCGWB22, author = {Yuwei Li and Shouling Ji and Chenyang Lyu and Yuan Chen and Jianhai Chen and Qinchen Gu and Chunming Wu and Raheem Beyah}, title = {V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {5}, pages = {3745--3756}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3013675}, doi = {10.1109/TCYB.2020.3013675}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/LiJLCCGWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/ShiXJBCB022, author = {Chenghui Shi and Xiaogang Xu and Shouling Ji and Kai Bu and Jianhai Chen and Raheem Beyah and Ting Wang}, title = {Adversarial CAPTCHAs}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {7}, pages = {6095--6108}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2021.3071395}, doi = {10.1109/TCYB.2021.3071395}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/ShiXJBCB022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoJLLWWZFB22, author = {Binbin Zhao and Shouling Ji and Wei{-}Han Lee and Changting Lin and Haiqin Weng and Jingzheng Wu and Pan Zhou and Liming Fang and Raheem Beyah}, title = {A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1826--1840}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3037908}, doi = {10.1109/TDSC.2020.3037908}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoJLLWWZFB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuFJSBB22, author = {Qinchen Gu and David Formby and Shouling Ji and Brendan Saltaformaggio and Anu G. Bourgeois and Raheem Beyah}, title = {This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3218--3230}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3089163}, doi = {10.1109/TDSC.2021.3089163}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuFJSBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiJWLSBGWW22, author = {Changjiang Li and Shouling Ji and Haiqin Weng and Bo Li and Jie Shi and Raheem Beyah and Shanqing Guo and Zonghui Wang and Ting Wang}, title = {Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3987--4001}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3116105}, doi = {10.1109/TDSC.2021.3116105}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiJWLSBGWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/LyuLJ0ZHLWWB22, author = {Chenyang Lyu and Hong Liang and Shouling Ji and Xuhong Zhang and Binbin Zhao and Meng Han and Yun Li and Zhe Wang and Wenhai Wang and Raheem Beyah}, editor = {Sukyoung Ryu and Yannis Smaragdakis}, title = {{SLIME:} program-sensitive energy allocation for fuzzing}, booktitle = {{ISSTA} '22: 31st {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022}, pages = {365--377}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3533767.3534385}, doi = {10.1145/3533767.3534385}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/LyuLJ0ZHLWWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ZhaoJX0WWL0LWB22, author = {Binbin Zhao and Shouling Ji and Jiacheng Xu and Yuan Tian and Qiuyang Wei and Qinying Wang and Chenyang Lyu and Xuhong Zhang and Changting Lin and Jingzheng Wu and Raheem Beyah}, editor = {Sukyoung Ryu and Yannis Smaragdakis}, title = {A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware}, booktitle = {{ISSTA} '22: 31st {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022}, pages = {442--454}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3533767.3534366}, doi = {10.1145/3533767.3534366}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/ZhaoJX0WWL0LWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiangZB22, author = {Sizhuang Liang and Saman A. Zonouz and Raheem Beyah}, title = {Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-216/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiangZB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LyuJ0LZLB22, author = {Chenyang Lyu and Shouling Ji and Xuhong Zhang and Hong Liang and Binbin Zhao and Kangjie Lu and Raheem Beyah}, title = {{EMS:} History-Driven Mutation for Coverage-based Fuzzing}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-201/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LyuJ0LZLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaoFWJ0LZLB022, author = {Yuhao Mao and Chong Fu and Saizhuo Wang and Shouling Ji and Xuhong Zhang and Zhenguang Liu and Jun Zhou and Alex X. Liu and Raheem Beyah and Ting Wang}, title = {Transfer Attacks Revisited: {A} Large-Scale Empirical Study in Real Computer Vision Settings}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1423--1439}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833783}, doi = {10.1109/SP46214.2022.9833783}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaoFWJ0LZLB022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShekariCB22, author = {Tohid Shekari and Alvaro A. C{\'{a}}rdenas and Raheem Beyah}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3539--3556}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/shekari}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShekariCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-04063, author = {Yuhao Mao and Chong Fu and Saizhuo Wang and Shouling Ji and Xuhong Zhang and Zhenguang Liu and Jun Zhou and Alex X. Liu and Raheem Beyah and Ting Wang}, title = {Transfer Attacks Revisited: {A} Large-Scale Empirical Study in Real Computer Vision Settings}, journal = {CoRR}, volume = {abs/2204.04063}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.04063}, doi = {10.48550/ARXIV.2204.04063}, eprinttype = {arXiv}, eprint = {2204.04063}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-04063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-08751, author = {Qinying Wang and Shouling Ji and Yuan Tian and Xuhong Zhang and Binbin Zhao and Yuhong Kan and Zhaowei Lin and Changting Lin and Shuiguang Deng and Alex X. Liu and Raheem Beyah}, title = {MPInspector: {A} Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols}, journal = {CoRR}, volume = {abs/2208.08751}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.08751}, doi = {10.48550/ARXIV.2208.08751}, eprinttype = {arXiv}, eprint = {2208.08751}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-08751.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-13716, author = {Binbin Zhao and Shouling Ji and Jiacheng Xu and Yuan Tian and Qiuyang Wei and Qinying Wang and Chenyang Lyu and Xuhong Zhang and Changting Lin and Jingzheng Wu and Raheem Beyah}, title = {One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware}, journal = {CoRR}, volume = {abs/2212.13716}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.13716}, doi = {10.48550/ARXIV.2212.13716}, eprinttype = {arXiv}, eprint = {2212.13716}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-13716.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0005TYSB21, author = {Long Cheng and Ke Tian and Danfeng Daphne Yao and Lui Sha and Raheem A. Beyah}, title = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {825--842}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2906161}, doi = {10.1109/TDSC.2019.2906161}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0005TYSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WeiGJCWB21, author = {Chengkun Wei and Qinchen Gu and Shouling Ji and Wenzhi Chen and Zonghui Wang and Raheem Beyah}, title = {{OB-WSPES:} {A} Uniform Evaluation System for Obfuscation-Based Web Search Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2719--2735}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2962440}, doi = {10.1109/TDSC.2019.2962440}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WeiGJCWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeELPQJZB21, author = {Tuan Le and Sriharsha Etigowni and Sizhuang Liang and Xirui Peng and H. Jerry Qi and Mehdi Javanmard and Saman A. Zonouz and Raheem Beyah}, title = {Physical Logic Bombs in 3D Printers via Emerging 4D Techniques}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {732--747}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485880}, doi = {10.1145/3485832.3485880}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LeELPQJZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuJSZLSFYB021, author = {Tianyu Du and Shouling Ji and Lujia Shen and Yao Zhang and Jinfeng Li and Jie Shi and Chengfang Fang and Jianwei Yin and Raheem Beyah and Ting Wang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {516--534}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484538}, doi = {10.1145/3460120.3484538}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuJSZLSFYB021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShekariICB21, author = {Tohid Shekari and Celine Irvene and Alvaro A. C{\'{a}}rdenas and Raheem Beyah}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1338--1356}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484581}, doi = {10.1145/3460120.3484581}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShekariICB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/EtigowniLZB21, author = {Sriharsha Etigowni and Sizhuang Liang and Saman A. Zonouz and Raheem Beyah}, title = {Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {507--518}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00060}, doi = {10.1109/DSN48987.2021.00060}, timestamp = {Mon, 09 Aug 2021 14:50:25 +0200}, biburl = {https://dblp.org/rec/conf/dsn/EtigowniLZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiangPQZB21, author = {Sizhuang Liang and Xirui Peng and H. Jerry Qi and Saman A. Zonouz and Raheem Beyah}, title = {A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems}, booktitle = {41st {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2021, Washington DC, USA, July 7-10, 2021}, pages = {1075--1087}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDCS51616.2021.00106}, doi = {10.1109/ICDCS51616.2021.00106}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/LiangPQZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/LiuJ0DLFCCWB21, author = {Peiyu Liu and Shouling Ji and Xuhong Zhang and Qinming Dai and Kangjie Lu and Lirong Fu and Wenzhi Chen and Peng Cheng and Wenhai Wang and Raheem Beyah}, title = {{IFIZZ:} Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {805--816}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678785}, doi = {10.1109/ASE51524.2021.9678785}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/LiuJ0DLFCCWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiJCLLCLWBCL021, author = {Yuwei Li and Shouling Ji and Yuan Chen and Sizhuang Liang and Wei{-}Han Lee and Yueyao Chen and Chenyang Lyu and Chunming Wu and Raheem Beyah and Peng Cheng and Kangjie Lu and Ting Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2777--2794}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yuwei}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiJCLLCLWBCL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangJT0ZKLLDLB21, author = {Qinying Wang and Shouling Ji and Yuan Tian and Xuhong Zhang and Binbin Zhao and Yuhong Kan and Zhaowei Lin and Changting Lin and Shuiguang Deng and Alex X. Liu and Raheem Beyah}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {MPInspector: {A} Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4205--4222}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-qinying}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangJT0ZKLLDLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/SaxenaCBLCC20, author = {Neetesh Saxena and Alvaro A. C{\'{a}}rdenas and Raheem Beyah and Rongxing Lu and Kim{-}Kwang Raymond Choo and Yiran Chen}, title = {Introduction to the Special Issue on User-Centric Security and Safety for {CPS}}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {4}, number = {3}, pages = {29:1--29:2}, year = {2020}, url = {https://doi.org/10.1145/3392715}, doi = {10.1145/3392715}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/SaxenaCBLCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FormbyB20, author = {David Formby and Raheem Beyah}, title = {Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1455--1469}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2940890}, doi = {10.1109/TIFS.2019.2940890}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FormbyB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuJLGWB20, author = {Tianyu Du and Shouling Ji and Jinfeng Li and Qinchen Gu and Ting Wang and Raheem Beyah}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {357--369}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384733}, doi = {10.1145/3320269.3384733}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DuJLGWB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShiJLLCHLBW20, author = {Chenghui Shi and Shouling Ji and Qianjun Liu and Changchang Liu and Yuefeng Chen and Yuan He and Zhe Liu and Raheem Beyah and Ting Wang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Text Captcha Is Dead? {A} Large Scale Deployment and Empirical Study}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1391--1406}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417258}, doi = {10.1145/3372297.3417258}, timestamp = {Fri, 16 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShiJLLCHLBW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuJFLZLLCB20, author = {Peiyu Liu and Shouling Ji and Lirong Fu and Kangjie Lu and Xuhong Zhang and Wei{-}Han Lee and Tao Lu and Wenzhi Chen and Raheem Beyah}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Understanding the Security Risks of Docker Hub}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {257--276}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_13}, doi = {10.1007/978-3-030-58951-6\_13}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuJFLZLLCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/JiGWLZCLBW20, author = {Shouling Ji and Qinchen Gu and Haiqin Weng and Qianjun Liu and Pan Zhou and Jing Chen and Zhao Li and Raheem Beyah and Ting Wang}, title = {De-Health: All Your Online Health Information Are Belong to Us}, booktitle = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020, Dallas, TX, USA, April 20-24, 2020}, pages = {1609--1620}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDE48307.2020.00143}, doi = {10.1109/ICDE48307.2020.00143}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/JiGWLZCLBW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-01785, author = {Yuwei Li and Shouling Ji and Yuan Chen and Sizhuang Liang and Wei{-}Han Lee and Yueyao Chen and Chenyang Lyu and Chunming Wu and Raheem Beyah and Peng Cheng and Kangjie Lu and Ting Wang}, title = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers}, journal = {CoRR}, volume = {abs/2010.01785}, year = {2020}, url = {https://arxiv.org/abs/2010.01785}, eprinttype = {arXiv}, eprint = {2010.01785}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-01785.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdatama/WengZJCWHB19, author = {Haiqin Weng and Binbin Zhao and Shouling Ji and Jianhai Chen and Ting Wang and Qinming He and Raheem Beyah}, title = {Towards understanding the security of modern image captchas and underground captcha-solving services}, journal = {Big Data Min. Anal.}, volume = {2}, number = {2}, pages = {118--144}, year = {2019}, url = {https://doi.org/10.26599/BDMA.2019.9020001}, doi = {10.26599/BDMA.2019.9020001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdatama/WengZJCWHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KulkarniGMPLBD19, author = {Shreyas Kulkarni and Qinchen Gu and Eric Myers and Lalith Polepeddi and Szil{\'{a}}rd Lipt{\'{a}}k and Raheem Beyah and Deepak Divan}, title = {Enabling a Decentralized Smart Grid Using Autonomous Edge Control Devices}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {7406--7419}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2898837}, doi = {10.1109/JIOT.2019.2898837}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KulkarniGMPLBD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TangHGZBJ19, author = {Kaiyu Tang and Meng Han and Qinchen Gu and Anni Zhou and Raheem Beyah and Shouling Ji}, title = {ShareSafe: An Improved Version of SecGraph}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {11}, pages = {5731--5754}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.11.025}, doi = {10.3837/TIIS.2019.11.025}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TangHGZBJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AcarLBAU19, author = {Abbas Acar and Wenyi Liu and Raheem Beyah and Kemal Akkaya and Arif Selcuk Uluagac}, title = {A privacy-preserving multifactor authentication system}, journal = {Secur. Priv.}, volume = {2}, number = {5}, year = {2019}, url = {https://doi.org/10.1002/spy2.88}, doi = {10.1002/SPY2.88}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AcarLBAU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AcarLBAU19a, author = {Abbas Acar and Wenyi Liu and Raheem Beyah and Kemal Akkaya and Arif Selcuk Uluagac}, title = {A privacy-preserving multifactor authentication system}, journal = {Secur. Priv.}, volume = {2}, number = {6}, year = {2019}, url = {https://doi.org/10.1002/spy2.94}, doi = {10.1002/SPY2.94}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AcarLBAU19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiWCLMB19, author = {Shouling Ji and Ting Wang and Jianhai Chen and Weiqing Li and Prateek Mittal and Raheem Beyah}, title = {De-SAG: On the De-Anonymization of Structure-Attribute Graph Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {594--607}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2712150}, doi = {10.1109/TDSC.2017.2712150}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiWCLMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiaoSFB19, author = {Xiaojing Liao and Preethi Srinivasan and David Formby and Raheem A. Beyah}, title = {Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1026--1039}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2717826}, doi = {10.1109/TDSC.2017.2717826}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiaoSFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongWJB19, author = {Zhen Hong and Rui Wang and Shouling Ji and Raheem Beyah}, title = {Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {5}, pages = {1337--1350}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2876839}, doi = {10.1109/TIFS.2018.2876839}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HongWJB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/HongSLB19, author = {Zhen Hong and Qian Shao and Xiaojing Liao and Raheem Beyah}, title = {A secure routing protocol with regional partitioned clustering and Beta trust management in smart home}, journal = {Wirel. Networks}, volume = {25}, number = {7}, pages = {3805--3823}, year = {2019}, url = {https://doi.org/10.1007/s11276-018-01916-1}, doi = {10.1007/S11276-018-01916-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/HongSLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/IrveneSFB19, author = {Celine Irvene and Tohid Shekari and David Formby and Raheem Beyah}, title = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security using Power Substation Traffic}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {48--59}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372324}, doi = {10.1145/3372318.3372324}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShekariBCGB19, author = {Tohid Shekari and Christian Bayens and Morris Cohen and Lukas Graber and Raheem Beyah}, title = {{RFDIDS:} Radio Frequency-based Distributed Intrusion Detection System for the Power Grid}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/rfdids-radio-frequency-based-distributed-intrusion-detection-system-for-the-power-grid/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShekariBCGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LyuJZLLSB19, author = {Chenyang Lyu and Shouling Ji and Chao Zhang and Yuwei Li and Wei{-}Han Lee and Yu Song and Raheem Beyah}, editor = {Nadia Heninger and Patrick Traynor}, title = {{MOPT:} Optimized Mutation Scheduling for Fuzzers}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1949--1966}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/lyu}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/LyuJZLLSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-01107, author = {Chenghui Shi and Xiaogang Xu and Shouling Ji and Kai Bu and Jianhai Chen and Raheem A. Beyah and Ting Wang}, title = {Adversarial CAPTCHAs}, journal = {CoRR}, volume = {abs/1901.01107}, year = {2019}, url = {http://arxiv.org/abs/1901.01107}, eprinttype = {arXiv}, eprint = {1901.01107}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-01107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-00714, author = {Shouling Ji and Haiqin Weng and Yiming Wu and Pan Zhou and Qinming He and Raheem Beyah and Ting Wang}, title = {{FDI:} Quantifying Feature-based Data Inferability}, journal = {CoRR}, volume = {abs/1902.00714}, year = {2019}, url = {http://arxiv.org/abs/1902.00714}, eprinttype = {arXiv}, eprint = {1902.00714}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-00714.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-00717, author = {Shouling Ji and Qinchen Gu and Haiqin Weng and Qianjun Liu and Pan Zhou and Qinming He and Raheem Beyah and Ting Wang}, title = {De-Health: All Your Online Health Information Are Belong to Us}, journal = {CoRR}, volume = {abs/1902.00717}, year = {2019}, url = {http://arxiv.org/abs/1902.00717}, eprinttype = {arXiv}, eprint = {1902.00717}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-00717.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-12061, author = {Celine Irvene and David Formby and Raheem Beyah}, title = {On Evaluating the Effectiveness of the HoneyBot: {A} Case Study}, journal = {CoRR}, volume = {abs/1905.12061}, year = {2019}, url = {http://arxiv.org/abs/1905.12061}, eprinttype = {arXiv}, eprint = {1905.12061}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-12061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AhmedBLKBSG18, author = {Syed Hassan Ahmed and Jalel Ben{-}Othman and Jaime Lloret and Ashfaq A. Khokhar and Raheem Beyah and Antonio S{\'{a}}nchez and Wael Guib{\`{e}}ne}, title = {Emerging Technologies for Connected and Smart Vehicles}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {10}, pages = {20--21}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.8493112}, doi = {10.1109/MCOM.2018.8493112}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/AhmedBLKBSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/LiaoAYX0HB18, author = {Xiaojing Liao and Sumayah A. Alrwais and Kan Yuan and Luyi Xing and XiaoFeng Wang and Shuang Hao and Raheem Beyah}, title = {Cloud repository as a malicious service: challenge, identification and implication}, journal = {Cybersecur.}, volume = {1}, number = {1}, pages = {14}, year = {2018}, url = {https://doi.org/10.1186/s42400-018-0015-6}, doi = {10.1186/S42400-018-0015-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/LiaoAYX0HB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GuFJCB18, author = {Qinchen Gu and David Formby and Shouling Ji and Hasan Cam and Raheem A. Beyah}, title = {Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {49--59}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761722}, doi = {10.1109/MSP.2018.3761722}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GuFJCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/RenPGB18, author = {Ju Ren and Yi Pan and Andrzej Goscinski and Raheem A. Beyah}, title = {Edge Computing for the Internet of Things}, journal = {{IEEE} Netw.}, volume = {32}, number = {1}, pages = {6--7}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.8270624}, doi = {10.1109/MNET.2018.8270624}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/RenPGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/IrveneFLB18, author = {Celine Irvene and David Formby and Samuel Litchfield and Raheem A. Beyah}, title = {HoneyBot: {A} Honeypot for Robotic Systems}, journal = {Proc. {IEEE}}, volume = {106}, number = {1}, pages = {61--70}, year = {2018}, url = {https://doi.org/10.1109/JPROC.2017.2748421}, doi = {10.1109/JPROC.2017.2748421}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/IrveneFLB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangJB18, author = {Shukun Yang and Shouling Ji and Raheem A. Beyah}, title = {{DPPG:} {A} Dynamic Password Policy Generation System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {545--558}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2737971}, doi = {10.1109/TIFS.2017.2737971}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoWJCWHB18, author = {Binbin Zhao and Haiqin Weng and Shouling Ji and Jianhai Chen and Ting Wang and Qinming He and Reheem Beyah}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {85--96}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270104}, doi = {10.1145/3270101.3270104}, timestamp = {Tue, 07 Mar 2023 16:37:45 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoWJCWHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JiDHWB18, author = {Shouling Ji and Tianyu Du and Zhen Hong and Ting Wang and Raheem A. Beyah}, title = {Quantifying Graph Anonymity, Utility, and De-anonymity}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {1736--1744}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486356}, doi = {10.1109/INFOCOM.2018.8486356}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JiDHWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/YesilyurtAUB18, author = {Halim Burak Yesilyurt and Hidayet Aksu and A. Selcuk Uluagac and Raheem A. Beyah}, title = {{SOTA:} Secure Over-the-Air Programming of IoT Devices}, booktitle = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los Angeles, CA, USA, October 29-31, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MILCOM.2018.8599705}, doi = {10.1109/MILCOM.2018.8599705}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/YesilyurtAUB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangML0YQB18, author = {Peng Wang and Xianghang Mi and Xiaojing Liao and XiaoFeng Wang and Kan Yuan and Feng Qian and Raheem A. Beyah}, title = {Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07A-1\_Wang\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/WangML0YQB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FormbyRB18, author = {David Formby and Milad Rad and Raheem A. Beyah}, editor = {Wu{-}chang Feng and Ashley L. Podhradsky}, title = {Lowering the Barriers to Industrial Control System Security with {GRFICS}}, booktitle = {2018 {USENIX} Workshop on Advances in Security Education, {ASE} 2018, Baltimore, MD, USA, August 13, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/ase18/presentation/formby}, timestamp = {Mon, 01 Feb 2021 08:43:07 +0100}, biburl = {https://dblp.org/rec/conf/uss/FormbyRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2018-1, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9}, doi = {10.1007/978-3-030-01701-9}, isbn = {978-3-030-01700-2}, timestamp = {Fri, 11 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2018-2, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0}, doi = {10.1007/978-3-030-01704-0}, isbn = {978-3-030-01703-3}, timestamp = {Fri, 11 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-09096, author = {Monodeep Kar and Arvind Singh and Sanu Mathew and Santosh Ghosh and Anand Rajan and Vivek De and Raheem A. Beyah and Saibal Mukhopadhyay}, title = {Blindsight: Blinding {EM} Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator}, journal = {CoRR}, volume = {abs/1802.09096}, year = {2018}, url = {http://arxiv.org/abs/1802.09096}, eprinttype = {arXiv}, eprint = {1802.09096}, timestamp = {Fri, 12 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-09096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-00074, author = {Long Cheng and Ke Tian and Danfeng Yao and Lui Sha and Raheem A. Beyah}, title = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/1805.00074}, year = {2018}, url = {http://arxiv.org/abs/1805.00074}, eprinttype = {arXiv}, eprint = {1805.00074}, timestamp = {Mon, 06 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-00074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/JiMB17, author = {Shouling Ji and Prateek Mittal and Raheem A. Beyah}, title = {Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: {A} Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {19}, number = {2}, pages = {1305--1326}, year = {2017}, url = {https://doi.org/10.1109/COMST.2016.2633620}, doi = {10.1109/COMST.2016.2633620}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/JiMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/FormbyWB17, author = {David Formby and Anwar Walid and Raheem A. Beyah}, title = {A Case Study in Power Substation Network Dynamics}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {1}, number = {1}, pages = {19:1--19:24}, year = {2017}, url = {https://doi.org/10.1145/3084456}, doi = {10.1145/3084456}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pomacs/FormbyWB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiYHHLB17, author = {Shouling Ji and Shukun Yang and Xin Hu and Weili Han and Zhigong Li and Raheem A. Beyah}, title = {Zero-Sum Password Cracking Game: {A} Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {550--564}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2481884}, doi = {10.1109/TDSC.2015.2481884}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiYHHLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmscs/ReeceSRB17, author = {Trey Reece and Supreeth Sathyanarayana and William H. Robinson and Raheem A. Beyah}, title = {On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis}, journal = {{IEEE} Trans. Multi Scale Comput. Syst.}, volume = {3}, number = {1}, pages = {50--61}, year = {2017}, url = {https://doi.org/10.1109/TMSCS.2016.2631534}, doi = {10.1109/TMSCS.2016.2631534}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmscs/ReeceSRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JiYDHB17, author = {Shouling Ji and Shukun Yang and Anupam Das and Xin Hu and Raheem A. Beyah}, title = {Password correlation: Quantification, evaluation and application}, booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017, Atlanta, GA, USA, May 1-4, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFOCOM.2017.8057067}, doi = {10.1109/INFOCOM.2017.8057067}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JiYDHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiWJGB17, author = {Xurong Li and Chunming Wu and Shouling Ji and Qinchen Gu and Raheem A. Beyah}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {{HSTS} Measurement and an Enhanced Stripping Attack Against {HTTPS}}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {489--509}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_25}, doi = {10.1007/978-3-319-78813-5\_25}, timestamp = {Wed, 22 Dec 2021 13:40:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/LiWJGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/FormbyWB17, author = {David Formby and Anwar I. Walid and Raheem A. Beyah}, editor = {Bruce E. Hajek and Sewoong Oh and Augustin Chaintreau and Leana Golubchik and Zhi{-}Li Zhang}, title = {A Case Study in Power Substation Network Dynamics}, booktitle = {Proceedings of the 2017 {ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05 - 09, 2017}, pages = {66}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078505.3078525}, doi = {10.1145/3078505.3078525}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/FormbyWB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AlrwaisLMWWQBM17, author = {Sumayah A. Alrwais and Xiaojing Liao and Xianghang Mi and Peng Wang and Xiaofeng Wang and Feng Qian and Raheem A. Beyah and Damon McCoy}, title = {Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {805--823}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.32}, doi = {10.1109/SP.2017.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AlrwaisLMWWQBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BayensLGBJZ17, author = {Christian Bayens and Tuan Le and Luis Garcia and Raheem A. Beyah and Mehdi Javanmard and Saman A. Zonouz}, editor = {Engin Kirda and Thomas Ristenpart}, title = {See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1181--1198}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/bayens}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BayensLGBJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/RavichandranCUB16, author = {Shruthi Ravichandran and Ramalingam K. Chandrasekar and A. Selcuk Uluagac and Raheem A. Beyah}, title = {A simple visualization and programming framework for wireless sensor networks: {PROVIZ}}, journal = {Ad Hoc Networks}, volume = {53}, pages = {1--16}, year = {2016}, url = {https://doi.org/10.1016/j.adhoc.2016.06.015}, doi = {10.1016/J.ADHOC.2016.06.015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/RavichandranCUB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/LitchfieldFRMB16, author = {Samuel Litchfield and David Formby and Jonathan D. Rogers and A. P. Sakis Meliopoulos and Raheem A. Beyah}, title = {Rethinking the Honeypot for Cyber-Physical Systems}, journal = {{IEEE} Internet Comput.}, volume = {20}, number = {5}, pages = {9--17}, year = {2016}, url = {https://doi.org/10.1109/MIC.2016.103}, doi = {10.1109/MIC.2016.103}, timestamp = {Wed, 16 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/LitchfieldFRMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiLGMB16, author = {Shouling Ji and Weiqing Li and Neil Zhenqiang Gong and Prateek Mittal and Raheem A. Beyah}, title = {Seed-Based De-Anonymizability Quantification of Social Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1398--1411}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2529591}, doi = {10.1109/TIFS.2016.2529591}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiLGMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JiLSHB16, author = {Shouling Ji and Weiqing Li and Mudhakar Srivatsa and Jing (Selena) He and Raheem A. Beyah}, title = {General Graph Data De-Anonymization: From Mobility Traces to Social Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {4}, pages = {12:1--12:29}, year = {2016}, url = {https://doi.org/10.1145/2894760}, doi = {10.1145/2894760}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JiLSHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/JiYBC16, author = {Shouling Ji and Mingyuan Yan and Raheem A. Beyah and Zhipeng Cai}, title = {Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {15}, number = {4}, pages = {996--1008}, year = {2016}, url = {https://doi.org/10.1109/TMC.2015.2442250}, doi = {10.1109/TMC.2015.2442250}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/JiYBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/JiLSB16, author = {Shouling Ji and Weiqing Li and Mudhakar Srivatsa and Raheem A. Beyah}, title = {Structural Data De-Anonymization: Theory and Practice}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {6}, pages = {3523--3536}, year = {2016}, url = {https://doi.org/10.1109/TNET.2016.2536479}, doi = {10.1109/TNET.2016.2536479}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/JiLSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiaoYWLXB16, author = {Xiaojing Liao and Kan Yuan and XiaoFeng Wang and Zhou Li and Luyi Xing and Raheem A. Beyah}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Acing the {IOC} Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {755--766}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978315}, doi = {10.1145/2976749.2978315}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiaoYWLXB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiaoAYXWHB16, author = {Xiaojing Liao and Sumayah A. Alrwais and Kan Yuan and Luyi Xing and XiaoFeng Wang and Shuang Hao and Raheem A. Beyah}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1541--1552}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978349}, doi = {10.1145/2976749.2978349}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiaoAYXWHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JiLYMB16, author = {Shouling Ji and Weiqing Li and Shukun Yang and Prateek Mittal and Raheem A. Beyah}, title = {On the relative de-anonymizability of graph data: Quantification and evaluation}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524585}, doi = {10.1109/INFOCOM.2016.7524585}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JiLYMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/FormbySLRB16, author = {David Formby and Preethi Srinivasan and Andrew M. Leonard and Jonathan D. Rogers and Raheem A. Beyah}, title = {Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/who-control-your-control-system-device-fingerprinting-cyber-physical-systems.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/FormbySLRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiaoYWPYCDDAAXB16, author = {Xiaojing Liao and Kan Yuan and XiaoFeng Wang and Zhongyu Pei and Hao Yang and Jianjun Chen and Hai{-}Xin Duan and Kun Du and Eihal Alowaisheq and Sumayah A. Alrwais and Luyi Xing and Raheem A. Beyah}, title = {Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {707--723}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.48}, doi = {10.1109/SP.2016.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiaoYWPYCDDAAXB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiaoLMSHB16, author = {Xiaojing Liao and Chang Liu and Damon McCoy and Elaine Shi and Shuang Hao and Raheem A. Beyah}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Characterizing Long-tail {SEO} Spam on Cloud Web Hosting Services}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, pages = {321--332}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872427.2883008}, doi = {10.1145/2872427.2883008}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/www/LiaoLMSHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/HeJBXL15, author = {Jing (Selena) He and Shouling Ji and Raheem A. Beyah and Ying Xie and Yingshu Li}, title = {Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {26}, number = {2}, pages = {147--163}, year = {2015}, url = {https://doi.org/10.1002/ett.2797}, doi = {10.1002/ETT.2797}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/HeJBXL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RadhakrishnanUB15, author = {Sakthi Vignesh Radhakrishnan and A. Selcuk Uluagac and Raheem A. Beyah}, title = {{GTID:} {A} Technique for Physical Device and Device Type Fingerprinting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {519--532}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2369033}, doi = {10.1109/TDSC.2014.2369033}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RadhakrishnanUB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/WatkinsRB15, author = {Lanier A. Watkins and William H. Robinson and Raheem A. Beyah}, title = {Using Network Traffic to Infer Hardware State: {A} Kernel-Level Investigation}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {14}, number = {3}, pages = {55:1--55:22}, year = {2015}, url = {https://doi.org/10.1145/2700094}, doi = {10.1145/2700094}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/WatkinsRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/JiBC15, author = {Shouling Ji and Raheem A. Beyah and Zhipeng Cai}, title = {Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {64}, number = {7}, pages = {3090--3097}, year = {2015}, url = {https://doi.org/10.1109/TVT.2014.2353856}, doi = {10.1109/TVT.2014.2353856}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/JiBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/JungVBB15, author = {Sang Shin Jung and Marco Valero and Anu G. Bourgeois and Raheem A. Beyah}, title = {Attacking and securing beacon-enabled 802.15.4 networks}, journal = {Wirel. Networks}, volume = {21}, number = {5}, pages = {1517--1535}, year = {2015}, url = {https://doi.org/10.1007/s11276-014-0855-2}, doi = {10.1007/S11276-014-0855-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/JungVBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JiYWLLB15, author = {Shouling Ji and Shukun Yang and Ting Wang and Changchang Liu and Wei{-}Han Lee and Raheem A. Beyah}, title = {{PARS:} {A} Uniform and Open-source Password Analysis and Research System}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {321--330}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818018}, doi = {10.1145/2818000.2818018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JiYWLLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WamplerUB15, author = {Christopher Wampler and A. Selcuk Uluagac and Raheem A. Beyah}, title = {Information Leakage in Encrypted {IP} Video Traffic}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417767}, doi = {10.1109/GLOCOM.2014.7417767}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WamplerUB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/MeliopoulosCBWM15, author = {A. P. Sakis Meliopoulos and George J. Cokkinides and Raheem A. Beyah and Seth Walters and Paul Myrda}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Cyber Security and Operational Reliability}, booktitle = {48th Hawaii International Conference on System Sciences, {HICSS} 2015, Kauai, Hawaii, USA, January 5-8, 2015}, pages = {2655--2663}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HICSS.2015.320}, doi = {10.1109/HICSS.2015.320}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/MeliopoulosCBWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/NunnallyUB15, author = {Troy J. Nunnally and A. Selcuk Uluagac and Raheem A. Beyah}, title = {InterSec: An interaction system for network security applications}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7132--7138}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249464}, doi = {10.1109/ICC.2015.7249464}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/NunnallyUB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JiLGMB15, author = {Shouling Ji and Weiqing Li and Neil Zhenqiang Gong and Prateek Mittal and Raheem A. Beyah}, title = {On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/your-social-network-de-anonymizablity-quantification-and-large-scale-evaluation-seed-knowledge}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JiLGMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/JiCHB15, author = {Shouling Ji and Zhipeng Cai and Jing (Selena) He and Raheem A. Beyah}, title = {Primary social behavior aware routing and scheduling for Cognitive Radio Networks}, booktitle = {12th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2015, Seattle, WA, USA, June 22-25, 2015}, pages = {417--425}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SAHCN.2015.7338342}, doi = {10.1109/SAHCN.2015.7338342}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/JiCHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/JiCHB15a, author = {Shouling Ji and Zhipeng Cai and Meng Han and Raheem A. Beyah}, title = {Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective}, booktitle = {12th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2015, Seattle, WA, USA, June 22-25, 2015}, pages = {435--443}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SAHCN.2015.7338344}, doi = {10.1109/SAHCN.2015.7338344}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/JiCHB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiLMHB15, author = {Shouling Ji and Weiqing Li and Prateek Mittal and Xin Hu and Raheem A. Beyah}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {SecGraph: {A} Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {303--318}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ji}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiLMHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/JiBC14, author = {Shouling Ji and Raheem A. Beyah and Zhipeng Cai}, title = {Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {3}, pages = {626--637}, year = {2014}, url = {https://doi.org/10.1109/TMC.2013.30}, doi = {10.1109/TMC.2013.30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/JiBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FormbyJCB14, author = {David Formby and Sang Shin Jung and John A. Copeland and Raheem A. Beyah}, editor = {Klaus Kursawe and Benessa Defend}, title = {An Empirical Study of {TCP} Vulnerabilities in Critical Power System Devices}, booktitle = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {39--44}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2667190.2667196}, doi = {10.1145/2667190.2667196}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FormbyJCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiLSB14, author = {Shouling Ji and Weiqing Li and Mudhakar Srivatsa and Raheem A. Beyah}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Structural Data De-anonymization: Quantification, Practice, and Implications}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1040--1053}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660278}, doi = {10.1145/2660267.2660278}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiLSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacSB14, author = {A. Selcuk Uluagac and Venkatachalam Subramanian and Raheem A. Beyah}, title = {Sensory channel threats to Cyber Physical Systems: {A} wake-up call}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {301--309}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997498}, doi = {10.1109/CNS.2014.6997498}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacLB14, author = {A. Selcuk Uluagac and Wenyi Liu and Raheem A. Beyah}, title = {A multi-factor re-authentication framework with user privacy}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {504--505}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997526}, doi = {10.1109/CNS.2014.6997526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiaoUB14, author = {Xiaojing Liao and A. Selcuk Uluagac and Raheem A. Beyah}, title = {{S-MATCH:} Verifiable Privacy-Preserving Profile Matching for Mobile Social Services}, booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014}, pages = {287--298}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSN.2014.37}, doi = {10.1109/DSN.2014.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiaoUB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiaoFDB14, author = {Xiaojing Liao and David Formby and Carson Day and Raheem A. Beyah}, title = {Towards Secure Metering Data Analysis via Distributed Differential Privacy}, booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014}, pages = {780--785}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSN.2014.82}, doi = {10.1109/DSN.2014.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiaoFDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuUB14, author = {Wenyi Liu and A. Selcuk Uluagac and Raheem A. Beyah}, title = {{MACA:} {A} privacy-preserving multi-factor cloud authentication system utilizing big data}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {518--523}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849285}, doi = {10.1109/INFCOMW.2014.6849285}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuUB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BrzeczkoUBC14, author = {Albert Brzeczko and A. Selcuk Uluagac and Raheem A. Beyah and John A. Copeland}, title = {Active deception model for securing cloud infrastructure}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {535--540}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849288}, doi = {10.1109/INFCOMW.2014.6849288}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BrzeczkoUBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JiLSHB14, author = {Shouling Ji and Weiqing Li and Mudhakar Srivatsa and Jing (Selena) He and Raheem A. Beyah}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Structure Based Data De-Anonymization of Social Networks and Mobility Traces}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {237--254}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_14}, doi = {10.1007/978-3-319-13257-0\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JiLSHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/HeJBC14, author = {Jing (Selena) He and Shouling Ji and Raheem A. Beyah and Zhipeng Cai}, editor = {Jie Wu and Xiuzhen Cheng and Xiang{-}Yang Li and Saswati Sarkar}, title = {Minimum-sized influential node set selection for social networks under the independent cascade model}, booktitle = {The Fifteenth {ACM} International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'14, Philadelphia, PA, USA, August 11-14, 2014}, pages = {93--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2632951.2632975}, doi = {10.1145/2632951.2632975}, timestamp = {Thu, 10 Mar 2022 09:31:34 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/HeJBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/JungFDB14, author = {Sang Shin Jung and David Formby and Carson Day and Raheem A. Beyah}, title = {A first look at machine-to-machine power grid network traffic}, booktitle = {2014 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2014, Venice, Italy, November 3-6, 2014}, pages = {884--889}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SmartGridComm.2014.7007760}, doi = {10.1109/SMARTGRIDCOMM.2014.7007760}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/JungFDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/FormbyJWB14, author = {David Formby and Sang Shin Jung and Seth Walters and Raheem A. Beyah}, title = {A physical overlay framework for insider threat mitigation of power system devices}, booktitle = {2014 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2014, Venice, Italy, November 3-6, 2014}, pages = {970--975}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SmartGridComm.2014.7007774}, doi = {10.1109/SMARTGRIDCOMM.2014.7007774}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/FormbyJWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jco/JiUBC13, author = {Shouling Ji and A. Selcuk Uluagac and Raheem A. Beyah and Zhipeng Cai}, title = {Practical unicast and convergecast scheduling schemes for cognitive radio networks}, journal = {J. Comb. Optim.}, volume = {26}, number = {1}, pages = {161--177}, year = {2013}, url = {https://doi.org/10.1007/s10878-011-9446-7}, doi = {10.1007/S10878-011-9446-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jco/JiUBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/JiHUBL13, author = {Shouling Ji and Jing (Selena) He and A. Selcuk Uluagac and Raheem A. Beyah and Yingshu Li}, title = {Cell-based snapshot and continuous data collection in wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {9}, number = {4}, pages = {47:1--47:29}, year = {2013}, url = {https://doi.org/10.1145/2489253.2489264}, doi = {10.1145/2489253.2489264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/JiHUBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/UluagacBC13, author = {A. Selcuk Uluagac and Raheem A. Beyah and John A. Copeland}, title = {Secure SOurce-BAsed Loose Synchronization {(SOBAS)} for Wireless Sensor Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {4}, pages = {803--813}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2012.170}, doi = {10.1109/TPDS.2012.170}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/UluagacBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/KwonBLC13, author = {Bongkyoung Kwon and Raheem A. Beyah and Myounghwan Lee and John A. Copeland}, title = {Orthogonal frequency division multiple access resource allocation in mobile multihop relay networks using an adaptive frame structure}, journal = {Wirel. Commun. Mob. Comput.}, volume = {13}, number = {10}, pages = {967--984}, year = {2013}, url = {https://doi.org/10.1002/wcm.1156}, doi = {10.1002/WCM.1156}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/KwonBLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacRCBB13, author = {A. Selcuk Uluagac and Sakthi V. Radhakrishnan and Cherita L. Corbett and Antony Baca and Raheem A. Beyah}, title = {A passive technique for fingerprinting wireless devices with Wired-side Observations}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {305--313}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682720}, doi = {10.1109/CNS.2013.6682720}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacRCBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiaoUB13, author = {Xiaojing Liao and A. Selcuk Uluagac and Raheem A. Beyah}, title = {S-Match: An efficient privacy-preserving profile matching scheme}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {377--378}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682736}, doi = {10.1109/CNS.2013.6682736}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiaoUB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HeJBL13, author = {Jing He and Shouling Ji and Raheem A. Beyah and Yingshu Li}, title = {A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {261--266}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831081}, doi = {10.1109/GLOCOM.2013.6831081}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HeJBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RadhakrishnanUB13, author = {Sakthi V. Radhakrishnan and A. Selcuk Uluagac and Raheem A. Beyah}, title = {Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {722--728}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831158}, doi = {10.1109/GLOCOM.2013.6831158}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/RadhakrishnanUB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/NunnallyCAUCB13, author = {Troy J. Nunnally and Penyen Chi and Kulsoom Abdullah and A. Selcuk Uluagac and John A. Copeland and Raheem A. Beyah}, title = {{P3D:} {A} parallel 3D coordinate visualization for advanced network scans}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {2052--2057}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654828}, doi = {10.1109/ICC.2013.6654828}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/NunnallyCAUCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SubramanianUCB13, author = {Venkatachalam Subramanian and A. Selcuk Uluagac and Hasan Cam and Raheem A. Beyah}, title = {Examining the characteristics and implications of sensor side channels}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {2205--2210}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654855}, doi = {10.1109/ICC.2013.6654855}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/SubramanianUCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HeathOBS13, author = {Laura Heath and Henry Owen and Raheem A. Beyah and Radu State}, title = {{CLIP:} Content labeling in IPv6, a layer 3 protocol for information centric networking}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {3732--3737}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6655135}, doi = {10.1109/ICC.2013.6655135}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/HeathOBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/HeJLHB13, author = {Jing He and Shouling Ji and Xiaojing Liao and Hisham M. Haddad and Raheem A. Beyah}, title = {Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences}, booktitle = {{IEEE} 32nd International Performance Computing and Communications Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PCCC.2013.6742792}, doi = {10.1109/PCCC.2013.6742792}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/HeJLHB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ChandrasekarUB13, author = {Ramalingam K. Chandrasekar and A. Selcuk Uluagac and Raheem A. Beyah}, title = {{PROVIZ:} An integrated visualization and programming framework for WSNs}, booktitle = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013 - Workshop Proceedings}, pages = {146--149}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/LCNW.2013.6758511}, doi = {10.1109/LCNW.2013.6758511}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ChandrasekarUB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/JiYBC13, author = {Shouling Ji and Mingyuan Yan and Raheem A. Beyah and Zhipeng Cai}, title = {Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks}, booktitle = {{IEEE} 10th International Conference on Mobile Ad-Hoc and Sensor Systems, {MASS} 2013, Hangzhou, China, October 14-16, 2013}, pages = {168--172}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MASS.2013.48}, doi = {10.1109/MASS.2013.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/JiYBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/JiBC13, author = {Shouling Ji and Raheem A. Beyah and Zhipeng Cai}, title = {Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks}, booktitle = {10th Annual {IEEE} International Conference on Sensing, Communications and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013}, pages = {389--397}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SAHCN.2013.6645009}, doi = {10.1109/SAHCN.2013.6645009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/JiBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NunnallyAUCB13, author = {Troy J. Nunnally and Kulsoom Abdullah and A. Selcuk Uluagac and John A. Copeland and Raheem A. Beyah}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {\emph{NAVSEC}: a recommender system for 3D network security visualizations}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {41--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517963}, doi = {10.1145/2517957.2517963}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/NunnallyAUCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ValeroJBB12, author = {Marco Valero and Sang Shin Jung and Anu G. Bourgeois and Raheem A. Beyah}, title = {An incrementally deployable energy efficient 802.15.4 {MAC} protocol {(DEEP)}}, journal = {Ad Hoc Networks}, volume = {10}, number = {7}, pages = {1238--1252}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2012.03.008}, doi = {10.1016/J.ADHOC.2012.03.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ValeroJBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jco/LiWAB12, author = {Yingshu Li and Yiwei Wu and Chunyu Ai and Raheem A. Beyah}, title = {On the construction of k-connected m-dominating sets in wireless networks}, journal = {J. Comb. Optim.}, volume = {23}, number = {1}, pages = {118--139}, year = {2012}, url = {https://doi.org/10.1007/s10878-010-9346-2}, doi = {10.1007/S10878-010-9346-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jco/LiWAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/CalhounCLB12, author = {Telvis E. Calhoun and Xiaojun Cao and Yingshu Li and Raheem A. Beyah}, title = {An 802.11 {MAC} layer covert channel}, journal = {Wirel. Commun. Mob. Comput.}, volume = {12}, number = {5}, pages = {393--405}, year = {2012}, url = {https://doi.org/10.1002/wcm.969}, doi = {10.1002/WCM.969}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/CalhounCLB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RamalingamSUB12, author = {K. C. Ramalingam and Venkatachalam Subramanian and A. Selcuk Uluagac and Raheem A. Beyah}, title = {{SIMAGE:} Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {616--621}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503181}, doi = {10.1109/GLOCOM.2012.6503181}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/RamalingamSUB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ValeroXMSB12, author = {Marco Valero and Mingsen Xu and Nicholas Mancuso and Wen{-}Zhan Song and Raheem A. Beyah}, title = {EDR\({}^{\mbox{2}}\): {A} sink failure resilient approach for WSNs}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {616--621}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6363781}, doi = {10.1109/ICC.2012.6363781}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ValeroXMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ValeroJULB12, author = {Marco Valero and Sang Shin Jung and A. Selcuk Uluagac and Yingshu Li and Raheem A. Beyah}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Di-Sec: {A} distributed security framework for heterogeneous Wireless Sensor Networks}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {585--593}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195801}, doi = {10.1109/INFCOM.2012.6195801}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ValeroJULB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JiBC12, author = {Shouling Ji and Raheem A. Beyah and Zhipeng Cai}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {1035--1043}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195459}, doi = {10.1109/INFCOM.2012.6195459}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JiBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/NunnallyUCB12, author = {Troy J. Nunnally and A. Selcuk Uluagac and John A. Copeland and Raheem A. Beyah}, title = {3DSVAT: {A} 3D Stereoscopic Vulnerability Assessment Tool for network security}, booktitle = {37th Annual {IEEE} Conference on Local Computer Networks, Clearwater Beach, FL, USA, October 22-25, 2012}, pages = {111--118}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/LCN.2012.6423586}, doi = {10.1109/LCN.2012.6423586}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/NunnallyUCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/GoldmanUBC12, author = {Aaron D. Goldman and A. Selcuk Uluagac and Raheem A. Beyah and John A. Copeland}, title = {Plugging the leaks without unplugging your network in the midst of Disaster}, booktitle = {37th Annual {IEEE} Conference on Local Computer Networks, Clearwater Beach, FL, USA, October 22-25, 2012}, pages = {248--251}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/LCN.2012.6423620}, doi = {10.1109/LCN.2012.6423620}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/GoldmanUBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/ValeroUVRB12, author = {Marco Valero and A. Selcuk Uluagac and S. Venkatachalam and K. C. Ramalingam and Raheem A. Beyah}, title = {The Monitoring Core: {A} framework for sensor security application development}, booktitle = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems, {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012}, pages = {263--271}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MASS.2012.6502525}, doi = {10.1109/MASS.2012.6502525}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/ValeroUVRB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/LiACB11, author = {Yingshu Li and Chunyu Ai and Zhipeng Cai and Raheem A. Beyah}, title = {Sensor scheduling for \emph{p}-percent coverage in wireless sensor networks}, journal = {Clust. Comput.}, volume = {14}, number = {1}, pages = {27--40}, year = {2011}, url = {https://doi.org/10.1007/s10586-009-0088-9}, doi = {10.1007/S10586-009-0088-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/LiACB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BeyahV11, author = {Raheem A. Beyah and Aravind Venkataraman}, title = {Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {5}, pages = {56--61}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.75}, doi = {10.1109/MSP.2011.75}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BeyahV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WatkinsRB11, author = {Lanier A. Watkins and William H. Robinson and Raheem A. Beyah}, title = {A Passive Solution to the {CPU} Resource Discovery Problem in Cluster Grid Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {22}, number = {12}, pages = {2000--2007}, year = {2011}, url = {https://doi.org/10.1109/TPDS.2011.89}, doi = {10.1109/TPDS.2011.89}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/WatkinsRB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GuoBL11, author = {Longjiang Guo and Raheem A. Beyah and Yingshu Li}, title = {{SMITE:} {A} stochastic compressive data collection protocol for Mobile Wireless Sensor Networks}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1611--1619}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934953}, doi = {10.1109/INFCOM.2011.5934953}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GuoBL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/JiBL11, author = {Shouling Ji and Raheem A. Beyah and Yingshu Li}, title = {Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model}, booktitle = {{IEEE} 8th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2011, Valencia, Spain, October 17-22, 2011}, pages = {222--231}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MASS.2011.29}, doi = {10.1109/MASS.2011.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/JiBL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/HollowayB11, author = {Russell Holloway and Raheem A. Beyah}, title = {Covert {DCF:} {A} DCF-Based Covert Timing Channel in 802.11 Networks}, booktitle = {{IEEE} 8th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2011, Valencia, Spain, October 17-22, 2011}, pages = {570--579}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MASS.2011.60}, doi = {10.1109/MASS.2011.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/HollowayB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/HeCJBP11, author = {Jing He and Zhipeng Cai and Shouling Ji and Raheem A. Beyah and Yi Pan}, editor = {Yu Cheng and Do Young Eun and Zhiguang Qin and Min Song and Kai Xing}, title = {A Genetic Algorithm for Constructing a Reliable {MCDS} in Probabilistic Wireless Networks}, booktitle = {Wireless Algorithms, Systems, and Applications - 6th International Conference, {WASA} 2011, Chengdu, China, August 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6843}, pages = {96--107}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23490-3\_9}, doi = {10.1007/978-3-642-23490-3\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/HeCJBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/LeonMSSMBM10, author = {Miguel Ponce de Leon and Shiwen Mao and Frank Steuer and Jens Schumacher and Thomas Magedanz and Raheem A. Beyah and Scott F. Midkiff}, title = {Advances In Wireless Test beds and Research Infrastructures}, journal = {Mob. Networks Appl.}, volume = {15}, number = {3}, pages = {311--314}, year = {2010}, url = {https://doi.org/10.1007/s11036-010-0230-1}, doi = {10.1007/S11036-010-0230-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/LeonMSSMBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/UluagacBLC10, author = {A. Selcuk Uluagac and Raheem A. Beyah and Yingshu Li and John A. Copeland}, title = {{VEBEK:} Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {9}, number = {7}, pages = {994--1007}, year = {2010}, url = {https://doi.org/10.1109/TMC.2010.51}, doi = {10.1109/TMC.2010.51}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/UluagacBLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/WatkinsRB10, author = {Lanier A. Watkins and William H. Robinson and Raheem A. Beyah}, title = {A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {7}, number = {4}, pages = {218--230}, year = {2010}, url = {https://doi.org/10.1109/TNSM.2010.1012.0326}, doi = {10.1109/TNSM.2010.1012.0326}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/WatkinsRB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LiAVPB10, author = {Yingshu Li and Chunyu Ai and Chinh T. Vu and Yi Pan and Raheem A. Beyah}, title = {Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {21}, number = {9}, pages = {1373--1385}, year = {2010}, url = {https://doi.org/10.1109/TPDS.2009.129}, doi = {10.1109/TPDS.2009.129}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LiAVPB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/GaoCB10, author = {Ke Gao and Cherita L. Corbett and Raheem A. Beyah}, title = {A passive approach to wireless device fingerprinting}, booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July 1 2010}, pages = {383--392}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSN.2010.5544294}, doi = {10.1109/DSN.2010.5544294}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/GaoCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/UluagacBC10, author = {A. Selcuk Uluagac and Raheem A. Beyah and John A. Copeland}, title = {Time-Based DynamiC Keying and En-Route Filtering {(TICK)} for Wireless Sensor Networks}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683787}, doi = {10.1109/GLOCOM.2010.5683787}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/UluagacBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/UluagacBKJC10, author = {A. Selcuk Uluagac and Raheem A. Beyah and Roma Kane and Siddharth Joshi and John A. Copeland}, title = {Analysis of Varying {AS} Path Lengths from the Edge of the Network}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502709}, doi = {10.1109/ICC.2010.5502709}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/UluagacBKJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ValeroBB10, author = {Marco Valero and Anu G. Bourgeois and Raheem A. Beyah}, title = {{DEEP:} {A} Deployable Energy Efficient 802.15.4 {MAC} Protocol for Sensor Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5501955}, doi = {10.1109/ICC.2010.5501955}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ValeroBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/VenkataramaCB10, author = {A. Venkatarama and Cherita L. Corbett and Raheem A. Beyah}, title = {A Wired-Side Approach to {MAC} Misbehavior Detection}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502291}, doi = {10.1109/ICC.2010.5502291}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/VenkataramaCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JungVBB10, author = {Sang Shin Jung and Marco Valero and Anu G. Bourgeois and Raheem A. Beyah}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Attacking Beacon-Enabled 802.15.4 Networks}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {253--271}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_15}, doi = {10.1007/978-3-642-16161-2\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/JungVBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ws/BeyahMC09, author = {Raheem A. Beyah and Janise McNair and Cherita L. Corbett}, title = {Security in Ad Hoc and Sensor Networks}, series = {Computer and Network Security}, volume = {3}, publisher = {World Scientific}, year = {2009}, url = {https://doi.org/10.1142/7239}, doi = {10.1142/7239}, isbn = {978-981-4271-08-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ws/BeyahMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AiHLB09, author = {Chunyu Ai and Hailong Hou and Yingshu Li and Raheem A. Beyah}, title = {Authentic delay bounded event detection in heterogeneous wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {3}, pages = {599--613}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2008.07.004}, doi = {10.1016/J.ADHOC.2008.07.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AiHLB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WatkinsBC09, author = {Lanier A. Watkins and Raheem A. Beyah and Cherita L. Corbett}, title = {Using link {RTT} to passively detect unapproved wireless nodes}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {3}, pages = {153--163}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.027341}, doi = {10.1504/IJSN.2009.027341}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WatkinsBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KwonBC09, author = {Bongkyoung Kwon and Raheem A. Beyah and John A. Copeland}, title = {Key challenges in securing WiMAX mesh networks}, journal = {Secur. Commun. Networks}, volume = {2}, number = {5}, pages = {413--426}, year = {2009}, url = {https://doi.org/10.1002/sec.125}, doi = {10.1002/SEC.125}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KwonBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NewmanB09, author = {Reed Newman and Raheem A. Beyah}, title = {On the performance of using Covert Timing Channels for node authentication}, journal = {Secur. Commun. Networks}, volume = {2}, number = {6}, pages = {492--506}, year = {2009}, url = {https://doi.org/10.1002/sec.87}, doi = {10.1002/SEC.87}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NewmanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/XuanCB09, author = {Chaoting Xuan and John A. Copeland and Raheem A. Beyah}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {Shepherding Loadable Kernel Modules through On-demand Emulation}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {48--67}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_4}, doi = {10.1007/978-3-642-02918-9\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/XuanCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CalhounNB09, author = {Telvis E. Calhoun and Reed Newman and Raheem A. Beyah}, title = {Authentication in 802.11 LANs Using a Covert Side Channel}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198769}, doi = {10.1109/ICC.2009.5198769}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/CalhounNB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuanCB09, author = {Chaoting Xuan and John A. Copeland and Raheem A. Beyah}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Toward Revealing Kernel Malware Behavior in Virtual Execution Environments}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {304--325}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_16}, doi = {10.1007/978-3-642-04342-0\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuanCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/VenkataramanB09, author = {Aravind Venkataraman and Raheem A. Beyah}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Rogue Access Point Detection Using Innate Characteristics of the 802.11 {MAC}}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {394--416}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_23}, doi = {10.1007/978-3-642-05284-2\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/VenkataramanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/CorbettBC08, author = {Cherita L. Corbett and Raheem A. Beyah and John A. Copeland}, title = {Passive Classification of Wireless NICs during Rate Switching}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/495070}, doi = {10.1155/2008/495070}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/CorbettBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CorbettBC08, author = {Cherita L. Corbett and Raheem A. Beyah and John A. Copeland}, title = {Passive classification of wireless NICs during active scanning}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {5}, pages = {335--348}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0053-7}, doi = {10.1007/S10207-007-0053-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CorbettBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HouCBZ08, author = {Hailong Hou and Yan Chen and Raheem A. Beyah and Yan{-}Qing Zhang}, title = {Filtering Spam by Using Factors Hyperbolic Tree}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {1872--1876}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.362}, doi = {10.1109/GLOCOM.2008.ECP.362}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/HouCBZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WatkinsBC08, author = {Lanier A. Watkins and Raheem A. Beyah and Cherita L. Corbett}, title = {Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {408--413}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.82}, doi = {10.1109/ICC.2008.82}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WatkinsBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AbdullahCB08, author = {Kulsoom Abdullah and Gregory J. Conti and Raheem A. Beyah}, title = {A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {1700--1707}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.328}, doi = {10.1109/ICC.2008.328}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/AbdullahCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/NewmanB08, author = {Reed Newman and Raheem A. Beyah}, editor = {Amitabha Das and Hung Keng Pung and Francis Bu{-}Sung Lee and Lawrence Wai{-}Choong Wong}, title = {A Performance Analysis of Authentication Using Covert Timing Channels}, booktitle = {{NETWORKING} 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International {IFIP-TC6} Networking Conference, Singapore, May 5-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4982}, pages = {149--161}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79549-0\_13}, doi = {10.1007/978-3-540-79549-0\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/NewmanB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/UluagacLBC08, author = {A. Selcuk Uluagac and Christopher P. Lee and Raheem A. Beyah and John A. Copeland}, editor = {Yingshu Li and Dung T. Huynh and Sajal K. Das and Ding{-}Zhu Du}, title = {Designing Secure Protocols for Wireless Sensor Networks}, booktitle = {Wireless Algorithms, Systems, and Applications, Third International Conference, {WASA} 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5258}, pages = {503--514}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88582-5\_47}, doi = {10.1007/978-3-540-88582-5\_47}, timestamp = {Tue, 10 Sep 2019 13:47:28 +0200}, biburl = {https://dblp.org/rec/conf/wasa/UluagacLBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WatkinsBC07, author = {Lanier A. Watkins and Raheem A. Beyah and Cherita L. Corbett}, title = {A Passive Approach to Rogue Access Point Detection}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {355--360}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.73}, doi = {10.1109/GLOCOM.2007.73}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WatkinsBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gridnets/WatkinsBC07, author = {Lanier A. Watkins and Raheem A. Beyah and Cherita L. Corbett}, editor = {Pascale Vicat{-}Blanc Primet and Michael Welzl}, title = {Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments}, booktitle = {1st International {ICST} Conference on Networks for Grid Applications, GridNets 2007, Lyon, France, October 17-19, 2007}, pages = {16}, publisher = {{ICST}}, year = {2007}, url = {https://doi.org/10.4108/gridnets.2007.2070}, doi = {10.4108/GRIDNETS.2007.2070}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gridnets/WatkinsBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/VuBL07, author = {Chinh T. Vu and Raheem A. Beyah and Yingshu Li}, title = {Composite Event Detection in Wireless Sensor Networks}, booktitle = {Proceedings of the 26th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New Orleans, Louisiana, {USA}}, pages = {264--271}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PCCC.2007.358903}, doi = {10.1109/PCCC.2007.358903}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/VuBL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/GuptaBC07, author = {Vaibhav Gupta and Raheem A. Beyah and Cherita L. Corbett}, title = {A Characterization of Wireless {NIC} Active Scanning Algorithms}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007, Hong Kong, China, 11-15 March, 2007}, pages = {2385--2390}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/WCNC.2007.445}, doi = {10.1109/WCNC.2007.445}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/GuptaBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/join/BeyahSC06, author = {Raheem A. Beyah and Raghupathy Sivakumar and John A. Copeland}, title = {Galo: a Deployable Framework for Providing Better than Best-Effort Quality of Service}, journal = {J. Interconnect. Networks}, volume = {7}, number = {3}, pages = {319--351}, year = {2006}, url = {https://doi.org/10.1142/S0219265906001727}, doi = {10.1142/S0219265906001727}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/join/BeyahSC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/BeyahCC06, author = {Raheem A. Beyah and Cherita L. Corbett and John A. Copeland}, title = {The case for collaborative distributed wireless intrusion detection systems}, booktitle = {2006 {IEEE} International Conference on Granular Computing, GrC 2006, Atlanta, Georgia, USA, May 10-12, 2006}, pages = {782--787}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GRC.2006.1635917}, doi = {10.1109/GRC.2006.1635917}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/grc/BeyahCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CorbettBC06, author = {Cherita L. Corbett and Raheem A. Beyah and John A. Copeland}, title = {A Passive Approach to Wireless {NIC} Identification}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2329--2334}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255117}, doi = {10.1109/ICC.2006.255117}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/CorbettBC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LeeTGBC05, author = {Christopher P. Lee and Jason Trost and Nicholas Gibbs and Raheem A. Beyah and John A. Copeland}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visual Firewall: Real-time Network Security Monito}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {16}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.20}, doi = {10.1109/VIZSEC.2005.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LeeTGBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BeyahKYSC04, author = {Raheem A. Beyah and Shantanu Kangude and George Yu and Brian Strickland and John A. Copeland}, title = {Rogue access point detection using temporal traffic characteristics}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {2271--2275}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378413}, doi = {10.1109/GLOCOM.2004.1378413}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/BeyahKYSC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BeyahSC03, author = {Raheem A. Beyah and Raghupathy Sivakumar and John A. Copeland}, title = {Application layer switching: a deployable technique for providing quality of service}, booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM} '03, San Francisco, CA, USA, 1-5 December 2003}, pages = {3694--3699}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/GLOCOM.2003.1258923}, doi = {10.1109/GLOCOM.2003.1258923}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/BeyahSC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiuBC03, author = {Jian Liu and Raheem A. Beyah and John A. Copeland}, title = {Implementation of an efficient transport for real-time game applications on {HFC} cable networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2003, Anchorage, Alaska, USA, 11-15 May, 2003}, pages = {12--16}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICC.2003.1204134}, doi = {10.1109/ICC.2003.1204134}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/LiuBC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.