BibTeX records: Raheem A. Beyah

download as .bib file

@article{DBLP:journals/tosn/HongLZSSBW24,
  author       = {Zhen Hong and
                  Lingling Lu and
                  Dehua Zheng and
                  Jiahui Suo and
                  Peng Sun and
                  Raheem Beyah and
                  Zhenyu Wen},
  title        = {Detect Insider Attacks in Industrial Cyber-physical Systems Using
                  Multi-physical Features-based Fingerprinting},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {2},
  pages        = {29:1--29:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3582691},
  doi          = {10.1145/3582691},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/HongLZSSBW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuXJLZLDZWB23,
  author       = {Yiming Wu and
                  Zhiyuan Xie and
                  Shouling Ji and
                  Zhenguang Liu and
                  Xuhong Zhang and
                  Changting Lin and
                  Shuiguang Deng and
                  Jun Zhou and
                  Ting Wang and
                  Raheem Beyah},
  title        = {Fraud-Agents Detection in Online Microfinance: {A} Large-Scale Empirical
                  Study},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1169--1185},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3151132},
  doi          = {10.1109/TDSC.2022.3151132},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuXJLZLDZWB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhaoJ00WPLB23,
  author       = {Binbin Zhao and
                  Shouling Ji and
                  Xuhong Zhang and
                  Yuan Tian and
                  Qinying Wang and
                  Yuwen Pu and
                  Chenyang Lyu and
                  Raheem Beyah},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{UVSCAN:} Detecting Third-Party Component Usage Violations in IoT
                  Firmware},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3421--3438},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhao-binbin},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhaoJ00WPLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LyuXJ0WZPC0B23,
  author       = {Chenyang Lyu and
                  Jiacheng Xu and
                  Shouling Ji and
                  Xuhong Zhang and
                  Qinying Wang and
                  Binbin Zhao and
                  Gaoning Pan and
                  Wei Cao and
                  Peng Cheng and
                  Raheem Beyah},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{MINER:} {A} Hybrid Data-Driven Approach for {REST} {API} Fuzzing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4517--4534},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/lyu},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LyuXJ0WZPC0B23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-02545,
  author       = {Chenyang Lyu and
                  Jiacheng Xu and
                  Shouling Ji and
                  Xuhong Zhang and
                  Qinying Wang and
                  Binbin Zhao and
                  Gaoning Pan and
                  Wei Cao and
                  Raheem Beyah},
  title        = {{MINER:} {A} Hybrid Data-Driven Approach for {REST} {API} Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2303.02545},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.02545},
  doi          = {10.48550/ARXIV.2303.02545},
  eprinttype    = {arXiv},
  eprint       = {2303.02545},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-02545.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-11206,
  author       = {Binbin Zhao and
                  Shouling Ji and
                  Xuhong Zhang and
                  Yuan Tian and
                  Qinying Wang and
                  Yuwen Pu and
                  Chenyang Lyu and
                  Raheem Beyah},
  title        = {{UVSCAN:} Detecting Third-Party Component Usage Violations in IoT
                  Firmware},
  journal      = {CoRR},
  volume       = {abs/2306.11206},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.11206},
  doi          = {10.48550/ARXIV.2306.11206},
  eprinttype    = {arXiv},
  eprint       = {2306.11206},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-11206.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-14742,
  author       = {Qinying Wang and
                  Boyu Chang and
                  Shouling Ji and
                  Yuan Tian and
                  Xuhong Zhang and
                  Binbin Zhao and
                  Gaoning Pan and
                  Chenyang Lyu and
                  Mathias Payer and
                  Wenhai Wang and
                  Raheem Beyah},
  title        = {SyzTrust: State-aware Fuzzing on Trusted {OS} Designed for IoT Devices},
  journal      = {CoRR},
  volume       = {abs/2309.14742},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.14742},
  doi          = {10.48550/ARXIV.2309.14742},
  eprinttype    = {arXiv},
  eprint       = {2309.14742},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-14742.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/DuJWHLLWJBW22,
  author       = {Tianyu Du and
                  Shouling Ji and
                  Bo Wang and
                  Sirui He and
                  Jinfeng Li and
                  Bo Li and
                  Tao Wei and
                  Yunhan Jia and
                  Raheem Beyah and
                  Ting Wang},
  title        = {DetectS ec: Evaluating the robustness of object detection models to
                  adversarial attacks},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {9},
  pages        = {6463--6492},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22851},
  doi          = {10.1002/INT.22851},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/DuJWHLLWJBW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/ZhouBK22,
  author       = {Anni Zhou and
                  Raheem Beyah and
                  Rishikesan Kamaleswaran},
  title        = {OnAI-Comp: An Online {AI} Experts Competing Framework for Early Sepsis
                  Detection},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {19},
  number       = {6},
  pages        = {3595--3603},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCBB.2021.3122405},
  doi          = {10.1109/TCBB.2021.3122405},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/ZhouBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/LiJLCCGWB22,
  author       = {Yuwei Li and
                  Shouling Ji and
                  Chenyang Lyu and
                  Yuan Chen and
                  Jianhai Chen and
                  Qinchen Gu and
                  Chunming Wu and
                  Raheem Beyah},
  title        = {V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for
                  Binary Programs},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {5},
  pages        = {3745--3756},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3013675},
  doi          = {10.1109/TCYB.2020.3013675},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/LiJLCCGWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ShiXJBCB022,
  author       = {Chenghui Shi and
                  Xiaogang Xu and
                  Shouling Ji and
                  Kai Bu and
                  Jianhai Chen and
                  Raheem Beyah and
                  Ting Wang},
  title        = {Adversarial CAPTCHAs},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {7},
  pages        = {6095--6108},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2021.3071395},
  doi          = {10.1109/TCYB.2021.3071395},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/ShiXJBCB022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoJLLWWZFB22,
  author       = {Binbin Zhao and
                  Shouling Ji and
                  Wei{-}Han Lee and
                  Changting Lin and
                  Haiqin Weng and
                  Jingzheng Wu and
                  Pan Zhou and
                  Liming Fang and
                  Raheem Beyah},
  title        = {A Large-Scale Empirical Study on the Vulnerability of Deployed IoT
                  Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1826--1840},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3037908},
  doi          = {10.1109/TDSC.2020.3037908},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoJLLWWZFB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuFJSBB22,
  author       = {Qinchen Gu and
                  David Formby and
                  Shouling Ji and
                  Brendan Saltaformaggio and
                  Anu G. Bourgeois and
                  Raheem Beyah},
  title        = {This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in
                  Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3218--3230},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3089163},
  doi          = {10.1109/TDSC.2021.3089163},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuFJSBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiJWLSBGWW22,
  author       = {Changjiang Li and
                  Shouling Ji and
                  Haiqin Weng and
                  Bo Li and
                  Jie Shi and
                  Raheem Beyah and
                  Shanqing Guo and
                  Zonghui Wang and
                  Ting Wang},
  title        = {Towards Certifying the Asymmetric Robustness for Neural Networks:
                  Quantification and Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3987--4001},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3116105},
  doi          = {10.1109/TDSC.2021.3116105},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiJWLSBGWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/LyuLJ0ZHLWWB22,
  author       = {Chenyang Lyu and
                  Hong Liang and
                  Shouling Ji and
                  Xuhong Zhang and
                  Binbin Zhao and
                  Meng Han and
                  Yun Li and
                  Zhe Wang and
                  Wenhai Wang and
                  Raheem Beyah},
  editor       = {Sukyoung Ryu and
                  Yannis Smaragdakis},
  title        = {{SLIME:} program-sensitive energy allocation for fuzzing},
  booktitle    = {{ISSTA} '22: 31st {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022},
  pages        = {365--377},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3533767.3534385},
  doi          = {10.1145/3533767.3534385},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/LyuLJ0ZHLWWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/ZhaoJX0WWL0LWB22,
  author       = {Binbin Zhao and
                  Shouling Ji and
                  Jiacheng Xu and
                  Yuan Tian and
                  Qiuyang Wei and
                  Qinying Wang and
                  Chenyang Lyu and
                  Xuhong Zhang and
                  Changting Lin and
                  Jingzheng Wu and
                  Raheem Beyah},
  editor       = {Sukyoung Ryu and
                  Yannis Smaragdakis},
  title        = {A large-scale empirical analysis of the vulnerabilities introduced
                  by third-party components in IoT firmware},
  booktitle    = {{ISSTA} '22: 31st {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022},
  pages        = {442--454},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3533767.3534366},
  doi          = {10.1145/3533767.3534366},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/ZhaoJX0WWL0LWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiangZB22,
  author       = {Sizhuang Liang and
                  Saman A. Zonouz and
                  Raheem Beyah},
  title        = {Hiding My Real Self! Protecting Intellectual Property in Additive
                  Manufacturing Systems Against Optical Side-Channel Attacks},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-216/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiangZB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LyuJ0LZLB22,
  author       = {Chenyang Lyu and
                  Shouling Ji and
                  Xuhong Zhang and
                  Hong Liang and
                  Binbin Zhao and
                  Kangjie Lu and
                  Raheem Beyah},
  title        = {{EMS:} History-Driven Mutation for Coverage-based Fuzzing},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-201/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LyuJ0LZLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaoFWJ0LZLB022,
  author       = {Yuhao Mao and
                  Chong Fu and
                  Saizhuo Wang and
                  Shouling Ji and
                  Xuhong Zhang and
                  Zhenguang Liu and
                  Jun Zhou and
                  Alex X. Liu and
                  Raheem Beyah and
                  Ting Wang},
  title        = {Transfer Attacks Revisited: {A} Large-Scale Empirical Study in Real
                  Computer Vision Settings},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1423--1439},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833783},
  doi          = {10.1109/SP46214.2022.9833783},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MaoFWJ0LZLB022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShekariCB22,
  author       = {Tohid Shekari and
                  Alvaro A. C{\'{a}}rdenas and
                  Raheem Beyah},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3539--3556},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/shekari},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ShekariCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-04063,
  author       = {Yuhao Mao and
                  Chong Fu and
                  Saizhuo Wang and
                  Shouling Ji and
                  Xuhong Zhang and
                  Zhenguang Liu and
                  Jun Zhou and
                  Alex X. Liu and
                  Raheem Beyah and
                  Ting Wang},
  title        = {Transfer Attacks Revisited: {A} Large-Scale Empirical Study in Real
                  Computer Vision Settings},
  journal      = {CoRR},
  volume       = {abs/2204.04063},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.04063},
  doi          = {10.48550/ARXIV.2204.04063},
  eprinttype    = {arXiv},
  eprint       = {2204.04063},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-04063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-08751,
  author       = {Qinying Wang and
                  Shouling Ji and
                  Yuan Tian and
                  Xuhong Zhang and
                  Binbin Zhao and
                  Yuhong Kan and
                  Zhaowei Lin and
                  Changting Lin and
                  Shuiguang Deng and
                  Alex X. Liu and
                  Raheem Beyah},
  title        = {MPInspector: {A} Systematic and Automatic Approach for Evaluating
                  the Security of IoT Messaging Protocols},
  journal      = {CoRR},
  volume       = {abs/2208.08751},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.08751},
  doi          = {10.48550/ARXIV.2208.08751},
  eprinttype    = {arXiv},
  eprint       = {2208.08751},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-08751.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-13716,
  author       = {Binbin Zhao and
                  Shouling Ji and
                  Jiacheng Xu and
                  Yuan Tian and
                  Qiuyang Wei and
                  Qinying Wang and
                  Chenyang Lyu and
                  Xuhong Zhang and
                  Changting Lin and
                  Jingzheng Wu and
                  Raheem Beyah},
  title        = {One Bad Apple Spoils the Barrel: Understanding the Security Risks
                  Introduced by Third-Party Components in IoT Firmware},
  journal      = {CoRR},
  volume       = {abs/2212.13716},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.13716},
  doi          = {10.48550/ARXIV.2212.13716},
  eprinttype    = {arXiv},
  eprint       = {2212.13716},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-13716.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0005TYSB21,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng Daphne Yao and
                  Lui Sha and
                  Raheem A. Beyah},
  title        = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {825--842},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2906161},
  doi          = {10.1109/TDSC.2019.2906161},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/0005TYSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WeiGJCWB21,
  author       = {Chengkun Wei and
                  Qinchen Gu and
                  Shouling Ji and
                  Wenzhi Chen and
                  Zonghui Wang and
                  Raheem Beyah},
  title        = {{OB-WSPES:} {A} Uniform Evaluation System for Obfuscation-Based Web
                  Search Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2719--2735},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2962440},
  doi          = {10.1109/TDSC.2019.2962440},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WeiGJCWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeELPQJZB21,
  author       = {Tuan Le and
                  Sriharsha Etigowni and
                  Sizhuang Liang and
                  Xirui Peng and
                  H. Jerry Qi and
                  Mehdi Javanmard and
                  Saman A. Zonouz and
                  Raheem Beyah},
  title        = {Physical Logic Bombs in 3D Printers via Emerging 4D Techniques},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {732--747},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485880},
  doi          = {10.1145/3485832.3485880},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LeELPQJZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuJSZLSFYB021,
  author       = {Tianyu Du and
                  Shouling Ji and
                  Lujia Shen and
                  Yao Zhang and
                  Jinfeng Li and
                  Jie Shi and
                  Chengfang Fang and
                  Jianwei Yin and
                  Raheem Beyah and
                  Ting Wang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {516--534},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484538},
  doi          = {10.1145/3460120.3484538},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuJSZLSFYB021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShekariICB21,
  author       = {Tohid Shekari and
                  Celine Irvene and
                  Alvaro A. C{\'{a}}rdenas and
                  Raheem Beyah},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT
                  Botnets},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1338--1356},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484581},
  doi          = {10.1145/3460120.3484581},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShekariICB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/EtigowniLZB21,
  author       = {Sriharsha Etigowni and
                  Sizhuang Liang and
                  Saman A. Zonouz and
                  Raheem Beyah},
  title        = {Physics-Aware Security Monitoring against Structural Integrity Attacks
                  in 3D Printers},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {507--518},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00060},
  doi          = {10.1109/DSN48987.2021.00060},
  timestamp    = {Mon, 09 Aug 2021 14:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/EtigowniLZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiangPQZB21,
  author       = {Sizhuang Liang and
                  Xirui Peng and
                  H. Jerry Qi and
                  Saman A. Zonouz and
                  Raheem Beyah},
  title        = {A Practical Side-Channel Based Intrusion Detection System for Additive
                  Manufacturing Systems},
  booktitle    = {41st {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2021, Washington DC, USA, July 7-10, 2021},
  pages        = {1075--1087},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDCS51616.2021.00106},
  doi          = {10.1109/ICDCS51616.2021.00106},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiangPQZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiuJ0DLFCCWB21,
  author       = {Peiyu Liu and
                  Shouling Ji and
                  Xuhong Zhang and
                  Qinming Dai and
                  Kangjie Lu and
                  Lirong Fu and
                  Wenzhi Chen and
                  Peng Cheng and
                  Wenhai Wang and
                  Raheem Beyah},
  title        = {{IFIZZ:} Deep-State and Efficient Fault-Scenario Generation to Test
                  IoT Firmware},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {805--816},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678785},
  doi          = {10.1109/ASE51524.2021.9678785},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/LiuJ0DLFCCWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiJCLLCLWBCL021,
  author       = {Yuwei Li and
                  Shouling Ji and
                  Yuan Chen and
                  Sizhuang Liang and
                  Wei{-}Han Lee and
                  Yueyao Chen and
                  Chenyang Lyu and
                  Chunming Wu and
                  Raheem Beyah and
                  Peng Cheng and
                  Kangjie Lu and
                  Ting Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for
                  Evaluating Fuzzers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2777--2794},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yuwei},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiJCLLCLWBCL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangJT0ZKLLDLB21,
  author       = {Qinying Wang and
                  Shouling Ji and
                  Yuan Tian and
                  Xuhong Zhang and
                  Binbin Zhao and
                  Yuhong Kan and
                  Zhaowei Lin and
                  Changting Lin and
                  Shuiguang Deng and
                  Alex X. Liu and
                  Raheem Beyah},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {MPInspector: {A} Systematic and Automatic Approach for Evaluating
                  the Security of IoT Messaging Protocols},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4205--4222},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-qinying},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangJT0ZKLLDLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/SaxenaCBLCC20,
  author       = {Neetesh Saxena and
                  Alvaro A. C{\'{a}}rdenas and
                  Raheem Beyah and
                  Rongxing Lu and
                  Kim{-}Kwang Raymond Choo and
                  Yiran Chen},
  title        = {Introduction to the Special Issue on User-Centric Security and Safety
                  for {CPS}},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {29:1--29:2},
  year         = {2020},
  url          = {https://doi.org/10.1145/3392715},
  doi          = {10.1145/3392715},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/SaxenaCBLCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FormbyB20,
  author       = {David Formby and
                  Raheem Beyah},
  title        = {Temporal Execution Behavior for Host Anomaly Detection in Programmable
                  Logic Controllers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1455--1469},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2940890},
  doi          = {10.1109/TIFS.2019.2940890},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FormbyB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuJLGWB20,
  author       = {Tianyu Du and
                  Shouling Ji and
                  Jinfeng Li and
                  Qinchen Gu and
                  Ting Wang and
                  Raheem Beyah},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {SirenAttack: Generating Adversarial Audio for End-to-End Acoustic
                  Systems},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {357--369},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384733},
  doi          = {10.1145/3320269.3384733},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DuJLGWB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShiJLLCHLBW20,
  author       = {Chenghui Shi and
                  Shouling Ji and
                  Qianjun Liu and
                  Changchang Liu and
                  Yuefeng Chen and
                  Yuan He and
                  Zhe Liu and
                  Raheem Beyah and
                  Ting Wang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Text Captcha Is Dead? {A} Large Scale Deployment and Empirical Study},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1391--1406},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417258},
  doi          = {10.1145/3372297.3417258},
  timestamp    = {Fri, 16 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShiJLLCHLBW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuJFLZLLCB20,
  author       = {Peiyu Liu and
                  Shouling Ji and
                  Lirong Fu and
                  Kangjie Lu and
                  Xuhong Zhang and
                  Wei{-}Han Lee and
                  Tao Lu and
                  Wenzhi Chen and
                  Raheem Beyah},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Understanding the Security Risks of Docker Hub},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {257--276},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_13},
  doi          = {10.1007/978-3-030-58951-6\_13},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuJFLZLLCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/JiGWLZCLBW20,
  author       = {Shouling Ji and
                  Qinchen Gu and
                  Haiqin Weng and
                  Qianjun Liu and
                  Pan Zhou and
                  Jing Chen and
                  Zhao Li and
                  Raheem Beyah and
                  Ting Wang},
  title        = {De-Health: All Your Online Health Information Are Belong to Us},
  booktitle    = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020,
                  Dallas, TX, USA, April 20-24, 2020},
  pages        = {1609--1620},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDE48307.2020.00143},
  doi          = {10.1109/ICDE48307.2020.00143},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/JiGWLZCLBW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-01785,
  author       = {Yuwei Li and
                  Shouling Ji and
                  Yuan Chen and
                  Sizhuang Liang and
                  Wei{-}Han Lee and
                  Yueyao Chen and
                  Chenyang Lyu and
                  Chunming Wu and
                  Raheem Beyah and
                  Peng Cheng and
                  Kangjie Lu and
                  Ting Wang},
  title        = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for
                  Evaluating Fuzzers},
  journal      = {CoRR},
  volume       = {abs/2010.01785},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.01785},
  eprinttype    = {arXiv},
  eprint       = {2010.01785},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-01785.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdatama/WengZJCWHB19,
  author       = {Haiqin Weng and
                  Binbin Zhao and
                  Shouling Ji and
                  Jianhai Chen and
                  Ting Wang and
                  Qinming He and
                  Raheem Beyah},
  title        = {Towards understanding the security of modern image captchas and underground
                  captcha-solving services},
  journal      = {Big Data Min. Anal.},
  volume       = {2},
  number       = {2},
  pages        = {118--144},
  year         = {2019},
  url          = {https://doi.org/10.26599/BDMA.2019.9020001},
  doi          = {10.26599/BDMA.2019.9020001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdatama/WengZJCWHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KulkarniGMPLBD19,
  author       = {Shreyas Kulkarni and
                  Qinchen Gu and
                  Eric Myers and
                  Lalith Polepeddi and
                  Szil{\'{a}}rd Lipt{\'{a}}k and
                  Raheem Beyah and
                  Deepak Divan},
  title        = {Enabling a Decentralized Smart Grid Using Autonomous Edge Control
                  Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {5},
  pages        = {7406--7419},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2898837},
  doi          = {10.1109/JIOT.2019.2898837},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KulkarniGMPLBD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/TangHGZBJ19,
  author       = {Kaiyu Tang and
                  Meng Han and
                  Qinchen Gu and
                  Anni Zhou and
                  Raheem Beyah and
                  Shouling Ji},
  title        = {ShareSafe: An Improved Version of SecGraph},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {11},
  pages        = {5731--5754},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.11.025},
  doi          = {10.3837/TIIS.2019.11.025},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/TangHGZBJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AcarLBAU19,
  author       = {Abbas Acar and
                  Wenyi Liu and
                  Raheem Beyah and
                  Kemal Akkaya and
                  Arif Selcuk Uluagac},
  title        = {A privacy-preserving multifactor authentication system},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.88},
  doi          = {10.1002/SPY2.88},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AcarLBAU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AcarLBAU19a,
  author       = {Abbas Acar and
                  Wenyi Liu and
                  Raheem Beyah and
                  Kemal Akkaya and
                  Arif Selcuk Uluagac},
  title        = {A privacy-preserving multifactor authentication system},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.94},
  doi          = {10.1002/SPY2.94},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AcarLBAU19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiWCLMB19,
  author       = {Shouling Ji and
                  Ting Wang and
                  Jianhai Chen and
                  Weiqing Li and
                  Prateek Mittal and
                  Raheem Beyah},
  title        = {De-SAG: On the De-Anonymization of Structure-Attribute Graph Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {594--607},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2712150},
  doi          = {10.1109/TDSC.2017.2712150},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiWCLMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiaoSFB19,
  author       = {Xiaojing Liao and
                  Preethi Srinivasan and
                  David Formby and
                  Raheem A. Beyah},
  title        = {Di-PriDA: Differentially Private Distributed Load Balancing Control
                  for the Smart Grid},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {1026--1039},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2717826},
  doi          = {10.1109/TDSC.2017.2717826},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiaoSFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongWJB19,
  author       = {Zhen Hong and
                  Rui Wang and
                  Shouling Ji and
                  Raheem Beyah},
  title        = {Attacker Location Evaluation-Based Fake Source Scheduling for Source
                  Location Privacy in Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {5},
  pages        = {1337--1350},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2876839},
  doi          = {10.1109/TIFS.2018.2876839},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HongWJB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/HongSLB19,
  author       = {Zhen Hong and
                  Qian Shao and
                  Xiaojing Liao and
                  Raheem Beyah},
  title        = {A secure routing protocol with regional partitioned clustering and
                  Beta trust management in smart home},
  journal      = {Wirel. Networks},
  volume       = {25},
  number       = {7},
  pages        = {3805--3823},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11276-018-01916-1},
  doi          = {10.1007/S11276-018-01916-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/HongSLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/IrveneSFB19,
  author       = {Celine Irvene and
                  Tohid Shekari and
                  David Formby and
                  Raheem Beyah},
  title        = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security
                  using Power Substation Traffic},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {48--59},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372324},
  doi          = {10.1145/3372318.3372324},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShekariBCGB19,
  author       = {Tohid Shekari and
                  Christian Bayens and
                  Morris Cohen and
                  Lukas Graber and
                  Raheem Beyah},
  title        = {{RFDIDS:} Radio Frequency-based Distributed Intrusion Detection System
                  for the Power Grid},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/rfdids-radio-frequency-based-distributed-intrusion-detection-system-for-the-power-grid/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShekariBCGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LyuJZLLSB19,
  author       = {Chenyang Lyu and
                  Shouling Ji and
                  Chao Zhang and
                  Yuwei Li and
                  Wei{-}Han Lee and
                  Yu Song and
                  Raheem Beyah},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{MOPT:} Optimized Mutation Scheduling for Fuzzers},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1949--1966},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/lyu},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LyuJZLLSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-01107,
  author       = {Chenghui Shi and
                  Xiaogang Xu and
                  Shouling Ji and
                  Kai Bu and
                  Jianhai Chen and
                  Raheem A. Beyah and
                  Ting Wang},
  title        = {Adversarial CAPTCHAs},
  journal      = {CoRR},
  volume       = {abs/1901.01107},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.01107},
  eprinttype    = {arXiv},
  eprint       = {1901.01107},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-01107.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-00714,
  author       = {Shouling Ji and
                  Haiqin Weng and
                  Yiming Wu and
                  Pan Zhou and
                  Qinming He and
                  Raheem Beyah and
                  Ting Wang},
  title        = {{FDI:} Quantifying Feature-based Data Inferability},
  journal      = {CoRR},
  volume       = {abs/1902.00714},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.00714},
  eprinttype    = {arXiv},
  eprint       = {1902.00714},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-00714.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-00717,
  author       = {Shouling Ji and
                  Qinchen Gu and
                  Haiqin Weng and
                  Qianjun Liu and
                  Pan Zhou and
                  Qinming He and
                  Raheem Beyah and
                  Ting Wang},
  title        = {De-Health: All Your Online Health Information Are Belong to Us},
  journal      = {CoRR},
  volume       = {abs/1902.00717},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.00717},
  eprinttype    = {arXiv},
  eprint       = {1902.00717},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-00717.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-12061,
  author       = {Celine Irvene and
                  David Formby and
                  Raheem Beyah},
  title        = {On Evaluating the Effectiveness of the HoneyBot: {A} Case Study},
  journal      = {CoRR},
  volume       = {abs/1905.12061},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.12061},
  eprinttype    = {arXiv},
  eprint       = {1905.12061},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-12061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AhmedBLKBSG18,
  author       = {Syed Hassan Ahmed and
                  Jalel Ben{-}Othman and
                  Jaime Lloret and
                  Ashfaq A. Khokhar and
                  Raheem Beyah and
                  Antonio S{\'{a}}nchez and
                  Wael Guib{\`{e}}ne},
  title        = {Emerging Technologies for Connected and Smart Vehicles},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {10},
  pages        = {20--21},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.8493112},
  doi          = {10.1109/MCOM.2018.8493112},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/AhmedBLKBSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/LiaoAYX0HB18,
  author       = {Xiaojing Liao and
                  Sumayah A. Alrwais and
                  Kan Yuan and
                  Luyi Xing and
                  XiaoFeng Wang and
                  Shuang Hao and
                  Raheem Beyah},
  title        = {Cloud repository as a malicious service: challenge, identification
                  and implication},
  journal      = {Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {14},
  year         = {2018},
  url          = {https://doi.org/10.1186/s42400-018-0015-6},
  doi          = {10.1186/S42400-018-0015-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/LiaoAYX0HB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GuFJCB18,
  author       = {Qinchen Gu and
                  David Formby and
                  Shouling Ji and
                  Hasan Cam and
                  Raheem A. Beyah},
  title        = {Fingerprinting for Cyber-Physical System Security: Device Physics
                  Matters Too},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {49--59},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761722},
  doi          = {10.1109/MSP.2018.3761722},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GuFJCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/RenPGB18,
  author       = {Ju Ren and
                  Yi Pan and
                  Andrzej Goscinski and
                  Raheem A. Beyah},
  title        = {Edge Computing for the Internet of Things},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {1},
  pages        = {6--7},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.8270624},
  doi          = {10.1109/MNET.2018.8270624},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/RenPGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/IrveneFLB18,
  author       = {Celine Irvene and
                  David Formby and
                  Samuel Litchfield and
                  Raheem A. Beyah},
  title        = {HoneyBot: {A} Honeypot for Robotic Systems},
  journal      = {Proc. {IEEE}},
  volume       = {106},
  number       = {1},
  pages        = {61--70},
  year         = {2018},
  url          = {https://doi.org/10.1109/JPROC.2017.2748421},
  doi          = {10.1109/JPROC.2017.2748421},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/IrveneFLB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangJB18,
  author       = {Shukun Yang and
                  Shouling Ji and
                  Raheem A. Beyah},
  title        = {{DPPG:} {A} Dynamic Password Policy Generation System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {545--558},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2737971},
  doi          = {10.1109/TIFS.2017.2737971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoWJCWHB18,
  author       = {Binbin Zhao and
                  Haiqin Weng and
                  Shouling Ji and
                  Jianhai Chen and
                  Ting Wang and
                  Qinming He and
                  Reheem Beyah},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270104},
  doi          = {10.1145/3270101.3270104},
  timestamp    = {Tue, 07 Mar 2023 16:37:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoWJCWHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JiDHWB18,
  author       = {Shouling Ji and
                  Tianyu Du and
                  Zhen Hong and
                  Ting Wang and
                  Raheem A. Beyah},
  title        = {Quantifying Graph Anonymity, Utility, and De-anonymity},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {1736--1744},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486356},
  doi          = {10.1109/INFOCOM.2018.8486356},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JiDHWB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/YesilyurtAUB18,
  author       = {Halim Burak Yesilyurt and
                  Hidayet Aksu and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {{SOTA:} Secure Over-the-Air Programming of IoT Devices},
  booktitle    = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los
                  Angeles, CA, USA, October 29-31, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MILCOM.2018.8599705},
  doi          = {10.1109/MILCOM.2018.8599705},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/YesilyurtAUB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangML0YQB18,
  author       = {Peng Wang and
                  Xianghang Mi and
                  Xiaojing Liao and
                  XiaoFeng Wang and
                  Kan Yuan and
                  Feng Qian and
                  Raheem A. Beyah},
  title        = {Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07A-1\_Wang\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/WangML0YQB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FormbyRB18,
  author       = {David Formby and
                  Milad Rad and
                  Raheem A. Beyah},
  editor       = {Wu{-}chang Feng and
                  Ashley L. Podhradsky},
  title        = {Lowering the Barriers to Industrial Control System Security with {GRFICS}},
  booktitle    = {2018 {USENIX} Workshop on Advances in Security Education, {ASE} 2018,
                  Baltimore, MD, USA, August 13, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/ase18/presentation/formby},
  timestamp    = {Mon, 01 Feb 2021 08:43:07 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FormbyRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2018-1,
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9},
  doi          = {10.1007/978-3-030-01701-9},
  isbn         = {978-3-030-01700-2},
  timestamp    = {Fri, 11 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2018-2,
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0},
  doi          = {10.1007/978-3-030-01704-0},
  isbn         = {978-3-030-01703-3},
  timestamp    = {Fri, 11 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-09096,
  author       = {Monodeep Kar and
                  Arvind Singh and
                  Sanu Mathew and
                  Santosh Ghosh and
                  Anand Rajan and
                  Vivek De and
                  Raheem A. Beyah and
                  Saibal Mukhopadhyay},
  title        = {Blindsight: Blinding {EM} Side-Channel Leakage using Built-In Fully
                  Integrated Inductive Voltage Regulator},
  journal      = {CoRR},
  volume       = {abs/1802.09096},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.09096},
  eprinttype    = {arXiv},
  eprint       = {1802.09096},
  timestamp    = {Fri, 12 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-09096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-00074,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng Yao and
                  Lui Sha and
                  Raheem A. Beyah},
  title        = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1805.00074},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.00074},
  eprinttype    = {arXiv},
  eprint       = {1805.00074},
  timestamp    = {Mon, 06 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-00074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/JiMB17,
  author       = {Shouling Ji and
                  Prateek Mittal and
                  Raheem A. Beyah},
  title        = {Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability
                  Quantification: {A} Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {19},
  number       = {2},
  pages        = {1305--1326},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMST.2016.2633620},
  doi          = {10.1109/COMST.2016.2633620},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/JiMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/FormbyWB17,
  author       = {David Formby and
                  Anwar Walid and
                  Raheem A. Beyah},
  title        = {A Case Study in Power Substation Network Dynamics},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {19:1--19:24},
  year         = {2017},
  url          = {https://doi.org/10.1145/3084456},
  doi          = {10.1145/3084456},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pomacs/FormbyWB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiYHHLB17,
  author       = {Shouling Ji and
                  Shukun Yang and
                  Xin Hu and
                  Weili Han and
                  Zhigong Li and
                  Raheem A. Beyah},
  title        = {Zero-Sum Password Cracking Game: {A} Large-Scale Empirical Study on
                  the Crackability, Correlation, and Security of Passwords},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {550--564},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2481884},
  doi          = {10.1109/TDSC.2015.2481884},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiYHHLB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmscs/ReeceSRB17,
  author       = {Trey Reece and
                  Supreeth Sathyanarayana and
                  William H. Robinson and
                  Raheem A. Beyah},
  title        = {On The Outside Looking In: Towards Detecting Counterfeit Devices Using
                  Network Traffic Analysis},
  journal      = {{IEEE} Trans. Multi Scale Comput. Syst.},
  volume       = {3},
  number       = {1},
  pages        = {50--61},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMSCS.2016.2631534},
  doi          = {10.1109/TMSCS.2016.2631534},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmscs/ReeceSRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JiYDHB17,
  author       = {Shouling Ji and
                  Shukun Yang and
                  Anupam Das and
                  Xin Hu and
                  Raheem A. Beyah},
  title        = {Password correlation: Quantification, evaluation and application},
  booktitle    = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
                  Atlanta, GA, USA, May 1-4, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFOCOM.2017.8057067},
  doi          = {10.1109/INFOCOM.2017.8057067},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JiYDHB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiWJGB17,
  author       = {Xurong Li and
                  Chunming Wu and
                  Shouling Ji and
                  Qinchen Gu and
                  Raheem A. Beyah},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {{HSTS} Measurement and an Enhanced Stripping Attack Against {HTTPS}},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {489--509},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_25},
  doi          = {10.1007/978-3-319-78813-5\_25},
  timestamp    = {Wed, 22 Dec 2021 13:40:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiWJGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/FormbyWB17,
  author       = {David Formby and
                  Anwar I. Walid and
                  Raheem A. Beyah},
  editor       = {Bruce E. Hajek and
                  Sewoong Oh and
                  Augustin Chaintreau and
                  Leana Golubchik and
                  Zhi{-}Li Zhang},
  title        = {A Case Study in Power Substation Network Dynamics},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGMETRICS} / International Conference
                  on Measurement and Modeling of Computer Systems, Urbana-Champaign,
                  IL, USA, June 05 - 09, 2017},
  pages        = {66},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078505.3078525},
  doi          = {10.1145/3078505.3078525},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/FormbyWB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlrwaisLMWWQBM17,
  author       = {Sumayah A. Alrwais and
                  Xiaojing Liao and
                  Xianghang Mi and
                  Peng Wang and
                  Xiaofeng Wang and
                  Feng Qian and
                  Raheem A. Beyah and
                  Damon McCoy},
  title        = {Under the Shadow of Sunshine: Understanding and Detecting Bulletproof
                  Hosting on Legitimate Service Provider Networks},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {805--823},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.32},
  doi          = {10.1109/SP.2017.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AlrwaisLMWWQBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BayensLGBJZ17,
  author       = {Christian Bayens and
                  Tuan Le and
                  Luis Garcia and
                  Raheem A. Beyah and
                  Mehdi Javanmard and
                  Saman A. Zonouz},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious
                  Fill Patterns Detection in Additive Manufacturing},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1181--1198},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/bayens},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BayensLGBJZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/RavichandranCUB16,
  author       = {Shruthi Ravichandran and
                  Ramalingam K. Chandrasekar and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {A simple visualization and programming framework for wireless sensor
                  networks: {PROVIZ}},
  journal      = {Ad Hoc Networks},
  volume       = {53},
  pages        = {1--16},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.adhoc.2016.06.015},
  doi          = {10.1016/J.ADHOC.2016.06.015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/RavichandranCUB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/LitchfieldFRMB16,
  author       = {Samuel Litchfield and
                  David Formby and
                  Jonathan D. Rogers and
                  A. P. Sakis Meliopoulos and
                  Raheem A. Beyah},
  title        = {Rethinking the Honeypot for Cyber-Physical Systems},
  journal      = {{IEEE} Internet Comput.},
  volume       = {20},
  number       = {5},
  pages        = {9--17},
  year         = {2016},
  url          = {https://doi.org/10.1109/MIC.2016.103},
  doi          = {10.1109/MIC.2016.103},
  timestamp    = {Wed, 16 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/LitchfieldFRMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiLGMB16,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Neil Zhenqiang Gong and
                  Prateek Mittal and
                  Raheem A. Beyah},
  title        = {Seed-Based De-Anonymizability Quantification of Social Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1398--1411},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2529591},
  doi          = {10.1109/TIFS.2016.2529591},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiLGMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JiLSHB16,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Mudhakar Srivatsa and
                  Jing (Selena) He and
                  Raheem A. Beyah},
  title        = {General Graph Data De-Anonymization: From Mobility Traces to Social
                  Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {12:1--12:29},
  year         = {2016},
  url          = {https://doi.org/10.1145/2894760},
  doi          = {10.1145/2894760},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JiLSHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/JiYBC16,
  author       = {Shouling Ji and
                  Mingyuan Yan and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  title        = {Semi-Structure Routing and Analytical Frameworks for Cognitive Radio
                  Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {996--1008},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMC.2015.2442250},
  doi          = {10.1109/TMC.2015.2442250},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/JiYBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/JiLSB16,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Mudhakar Srivatsa and
                  Raheem A. Beyah},
  title        = {Structural Data De-Anonymization: Theory and Practice},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {6},
  pages        = {3523--3536},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2016.2536479},
  doi          = {10.1109/TNET.2016.2536479},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/JiLSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiaoYWLXB16,
  author       = {Xiaojing Liao and
                  Kan Yuan and
                  XiaoFeng Wang and
                  Zhou Li and
                  Luyi Xing and
                  Raheem A. Beyah},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Acing the {IOC} Game: Toward Automatic Discovery and Analysis of Open-Source
                  Cyber Threat Intelligence},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {755--766},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978315},
  doi          = {10.1145/2976749.2978315},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiaoYWLXB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiaoAYXWHB16,
  author       = {Xiaojing Liao and
                  Sumayah A. Alrwais and
                  Kan Yuan and
                  Luyi Xing and
                  XiaoFeng Wang and
                  Shuang Hao and
                  Raheem A. Beyah},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository
                  as a Malicious Service},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1541--1552},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978349},
  doi          = {10.1145/2976749.2978349},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiaoAYXWHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JiLYMB16,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Shukun Yang and
                  Prateek Mittal and
                  Raheem A. Beyah},
  title        = {On the relative de-anonymizability of graph data: Quantification and
                  evaluation},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524585},
  doi          = {10.1109/INFOCOM.2016.7524585},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JiLYMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/FormbySLRB16,
  author       = {David Formby and
                  Preethi Srinivasan and
                  Andrew M. Leonard and
                  Jonathan D. Rogers and
                  Raheem A. Beyah},
  title        = {Who's in Control of Your Control System? Device Fingerprinting for
                  Cyber-Physical Systems},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/who-control-your-control-system-device-fingerprinting-cyber-physical-systems.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/FormbySLRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiaoYWPYCDDAAXB16,
  author       = {Xiaojing Liao and
                  Kan Yuan and
                  XiaoFeng Wang and
                  Zhongyu Pei and
                  Hao Yang and
                  Jianjun Chen and
                  Hai{-}Xin Duan and
                  Kun Du and
                  Eihal Alowaisheq and
                  Sumayah A. Alrwais and
                  Luyi Xing and
                  Raheem A. Beyah},
  title        = {Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection
                  Detection through Semantic Inconsistency Search},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {707--723},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.48},
  doi          = {10.1109/SP.2016.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiaoYWPYCDDAAXB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiaoLMSHB16,
  author       = {Xiaojing Liao and
                  Chang Liu and
                  Damon McCoy and
                  Elaine Shi and
                  Shuang Hao and
                  Raheem A. Beyah},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {Characterizing Long-tail {SEO} Spam on Cloud Web Hosting Services},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages        = {321--332},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872427.2883008},
  doi          = {10.1145/2872427.2883008},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/www/LiaoLMSHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HeJBXL15,
  author       = {Jing (Selena) He and
                  Shouling Ji and
                  Raheem A. Beyah and
                  Ying Xie and
                  Yingshu Li},
  title        = {Constructing load-balanced virtual backbones in probabilistic wireless
                  sensor networks via multi-objective genetic algorithm},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {26},
  number       = {2},
  pages        = {147--163},
  year         = {2015},
  url          = {https://doi.org/10.1002/ett.2797},
  doi          = {10.1002/ETT.2797},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/HeJBXL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RadhakrishnanUB15,
  author       = {Sakthi Vignesh Radhakrishnan and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {{GTID:} {A} Technique for Physical Device and Device Type Fingerprinting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {519--532},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2369033},
  doi          = {10.1109/TDSC.2014.2369033},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RadhakrishnanUB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/WatkinsRB15,
  author       = {Lanier A. Watkins and
                  William H. Robinson and
                  Raheem A. Beyah},
  title        = {Using Network Traffic to Infer Hardware State: {A} Kernel-Level Investigation},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {14},
  number       = {3},
  pages        = {55:1--55:22},
  year         = {2015},
  url          = {https://doi.org/10.1145/2700094},
  doi          = {10.1145/2700094},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/WatkinsRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/JiBC15,
  author       = {Shouling Ji and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  title        = {Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive
                  Radio Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {64},
  number       = {7},
  pages        = {3090--3097},
  year         = {2015},
  url          = {https://doi.org/10.1109/TVT.2014.2353856},
  doi          = {10.1109/TVT.2014.2353856},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/JiBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/JungVBB15,
  author       = {Sang Shin Jung and
                  Marco Valero and
                  Anu G. Bourgeois and
                  Raheem A. Beyah},
  title        = {Attacking and securing beacon-enabled 802.15.4 networks},
  journal      = {Wirel. Networks},
  volume       = {21},
  number       = {5},
  pages        = {1517--1535},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11276-014-0855-2},
  doi          = {10.1007/S11276-014-0855-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/JungVBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JiYWLLB15,
  author       = {Shouling Ji and
                  Shukun Yang and
                  Ting Wang and
                  Changchang Liu and
                  Wei{-}Han Lee and
                  Raheem A. Beyah},
  title        = {{PARS:} {A} Uniform and Open-source Password Analysis and Research
                  System},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {321--330},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818018},
  doi          = {10.1145/2818000.2818018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JiYWLLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WamplerUB15,
  author       = {Christopher Wampler and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {Information Leakage in Encrypted {IP} Video Traffic},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417767},
  doi          = {10.1109/GLOCOM.2014.7417767},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WamplerUB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MeliopoulosCBWM15,
  author       = {A. P. Sakis Meliopoulos and
                  George J. Cokkinides and
                  Raheem A. Beyah and
                  Seth Walters and
                  Paul Myrda},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Cyber Security and Operational Reliability},
  booktitle    = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
                  Kauai, Hawaii, USA, January 5-8, 2015},
  pages        = {2655--2663},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HICSS.2015.320},
  doi          = {10.1109/HICSS.2015.320},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MeliopoulosCBWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/NunnallyUB15,
  author       = {Troy J. Nunnally and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {InterSec: An interaction system for network security applications},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {7132--7138},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249464},
  doi          = {10.1109/ICC.2015.7249464},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/NunnallyUB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JiLGMB15,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Neil Zhenqiang Gong and
                  Prateek Mittal and
                  Raheem A. Beyah},
  title        = {On Your Social Network De-anonymizablity: Quantification and Large
                  Scale Evaluation with Seed Knowledge},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/your-social-network-de-anonymizablity-quantification-and-large-scale-evaluation-seed-knowledge},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/JiLGMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/JiCHB15,
  author       = {Shouling Ji and
                  Zhipeng Cai and
                  Jing (Selena) He and
                  Raheem A. Beyah},
  title        = {Primary social behavior aware routing and scheduling for Cognitive
                  Radio Networks},
  booktitle    = {12th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2015, Seattle, WA, USA, June 22-25, 2015},
  pages        = {417--425},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SAHCN.2015.7338342},
  doi          = {10.1109/SAHCN.2015.7338342},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/JiCHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/JiCHB15a,
  author       = {Shouling Ji and
                  Zhipeng Cai and
                  Meng Han and
                  Raheem A. Beyah},
  title        = {Whitespace measurement and virtual backbone construction for Cognitive
                  Radio Networks: From the social perspective},
  booktitle    = {12th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2015, Seattle, WA, USA, June 22-25, 2015},
  pages        = {435--443},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SAHCN.2015.7338344},
  doi          = {10.1109/SAHCN.2015.7338344},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/JiCHB15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiLMHB15,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Prateek Mittal and
                  Xin Hu and
                  Raheem A. Beyah},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {SecGraph: {A} Uniform and Open-source Evaluation System for Graph
                  Data Anonymization and De-anonymization},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {303--318},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ji},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiLMHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/JiBC14,
  author       = {Shouling Ji and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  title        = {Snapshot and Continuous Data Collection in Probabilistic Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {626--637},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2013.30},
  doi          = {10.1109/TMC.2013.30},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/JiBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FormbyJCB14,
  author       = {David Formby and
                  Sang Shin Jung and
                  John A. Copeland and
                  Raheem A. Beyah},
  editor       = {Klaus Kursawe and
                  Benessa Defend},
  title        = {An Empirical Study of {TCP} Vulnerabilities in Critical Power System
                  Devices},
  booktitle    = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS
                  2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {39--44},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2667190.2667196},
  doi          = {10.1145/2667190.2667196},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FormbyJCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiLSB14,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Mudhakar Srivatsa and
                  Raheem A. Beyah},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Structural Data De-anonymization: Quantification, Practice, and Implications},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1040--1053},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660278},
  doi          = {10.1145/2660267.2660278},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiLSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacSB14,
  author       = {A. Selcuk Uluagac and
                  Venkatachalam Subramanian and
                  Raheem A. Beyah},
  title        = {Sensory channel threats to Cyber Physical Systems: {A} wake-up call},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {301--309},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997498},
  doi          = {10.1109/CNS.2014.6997498},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacLB14,
  author       = {A. Selcuk Uluagac and
                  Wenyi Liu and
                  Raheem A. Beyah},
  title        = {A multi-factor re-authentication framework with user privacy},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {504--505},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997526},
  doi          = {10.1109/CNS.2014.6997526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiaoUB14,
  author       = {Xiaojing Liao and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {{S-MATCH:} Verifiable Privacy-Preserving Profile Matching for Mobile
                  Social Services},
  booktitle    = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages        = {287--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSN.2014.37},
  doi          = {10.1109/DSN.2014.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiaoUB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiaoFDB14,
  author       = {Xiaojing Liao and
                  David Formby and
                  Carson Day and
                  Raheem A. Beyah},
  title        = {Towards Secure Metering Data Analysis via Distributed Differential
                  Privacy},
  booktitle    = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages        = {780--785},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSN.2014.82},
  doi          = {10.1109/DSN.2014.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiaoFDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuUB14,
  author       = {Wenyi Liu and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {{MACA:} {A} privacy-preserving multi-factor cloud authentication system
                  utilizing big data},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {518--523},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849285},
  doi          = {10.1109/INFCOMW.2014.6849285},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuUB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/BrzeczkoUBC14,
  author       = {Albert Brzeczko and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Active deception model for securing cloud infrastructure},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {535--540},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849288},
  doi          = {10.1109/INFCOMW.2014.6849288},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/BrzeczkoUBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JiLSHB14,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Mudhakar Srivatsa and
                  Jing (Selena) He and
                  Raheem A. Beyah},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Structure Based Data De-Anonymization of Social Networks and Mobility
                  Traces},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {237--254},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_14},
  doi          = {10.1007/978-3-319-13257-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JiLSHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/HeJBC14,
  author       = {Jing (Selena) He and
                  Shouling Ji and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  editor       = {Jie Wu and
                  Xiuzhen Cheng and
                  Xiang{-}Yang Li and
                  Saswati Sarkar},
  title        = {Minimum-sized influential node set selection for social networks under
                  the independent cascade model},
  booktitle    = {The Fifteenth {ACM} International Symposium on Mobile Ad Hoc Networking
                  and Computing, MobiHoc'14, Philadelphia, PA, USA, August 11-14, 2014},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2632951.2632975},
  doi          = {10.1145/2632951.2632975},
  timestamp    = {Thu, 10 Mar 2022 09:31:34 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/HeJBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/JungFDB14,
  author       = {Sang Shin Jung and
                  David Formby and
                  Carson Day and
                  Raheem A. Beyah},
  title        = {A first look at machine-to-machine power grid network traffic},
  booktitle    = {2014 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2014, Venice, Italy, November 3-6, 2014},
  pages        = {884--889},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SmartGridComm.2014.7007760},
  doi          = {10.1109/SMARTGRIDCOMM.2014.7007760},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/JungFDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/FormbyJWB14,
  author       = {David Formby and
                  Sang Shin Jung and
                  Seth Walters and
                  Raheem A. Beyah},
  title        = {A physical overlay framework for insider threat mitigation of power
                  system devices},
  booktitle    = {2014 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2014, Venice, Italy, November 3-6, 2014},
  pages        = {970--975},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SmartGridComm.2014.7007774},
  doi          = {10.1109/SMARTGRIDCOMM.2014.7007774},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/FormbyJWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/JiUBC13,
  author       = {Shouling Ji and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  title        = {Practical unicast and convergecast scheduling schemes for cognitive
                  radio networks},
  journal      = {J. Comb. Optim.},
  volume       = {26},
  number       = {1},
  pages        = {161--177},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10878-011-9446-7},
  doi          = {10.1007/S10878-011-9446-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jco/JiUBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/JiHUBL13,
  author       = {Shouling Ji and
                  Jing (Selena) He and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  Yingshu Li},
  title        = {Cell-based snapshot and continuous data collection in wireless sensor
                  networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {9},
  number       = {4},
  pages        = {47:1--47:29},
  year         = {2013},
  url          = {https://doi.org/10.1145/2489253.2489264},
  doi          = {10.1145/2489253.2489264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/JiHUBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/UluagacBC13,
  author       = {A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Secure SOurce-BAsed Loose Synchronization {(SOBAS)} for Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {24},
  number       = {4},
  pages        = {803--813},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPDS.2012.170},
  doi          = {10.1109/TPDS.2012.170},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/UluagacBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/KwonBLC13,
  author       = {Bongkyoung Kwon and
                  Raheem A. Beyah and
                  Myounghwan Lee and
                  John A. Copeland},
  title        = {Orthogonal frequency division multiple access resource allocation
                  in mobile multihop relay networks using an adaptive frame structure},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {13},
  number       = {10},
  pages        = {967--984},
  year         = {2013},
  url          = {https://doi.org/10.1002/wcm.1156},
  doi          = {10.1002/WCM.1156},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/KwonBLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacRCBB13,
  author       = {A. Selcuk Uluagac and
                  Sakthi V. Radhakrishnan and
                  Cherita L. Corbett and
                  Antony Baca and
                  Raheem A. Beyah},
  title        = {A passive technique for fingerprinting wireless devices with Wired-side
                  Observations},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {305--313},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682720},
  doi          = {10.1109/CNS.2013.6682720},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacRCBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiaoUB13,
  author       = {Xiaojing Liao and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {S-Match: An efficient privacy-preserving profile matching scheme},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {377--378},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682736},
  doi          = {10.1109/CNS.2013.6682736},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiaoUB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HeJBL13,
  author       = {Jing He and
                  Shouling Ji and
                  Raheem A. Beyah and
                  Yingshu Li},
  title        = {A Multi-Objective Genetic Algorithm for constructing load-balanced
                  virtual backbones in probabilistic Wireless Sensor Networks},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {261--266},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831081},
  doi          = {10.1109/GLOCOM.2013.6831081},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HeJBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RadhakrishnanUB13,
  author       = {Sakthi V. Radhakrishnan and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {Realizing an 802.11-based covert timing channel using off-the-shelf
                  wireless cards},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {722--728},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831158},
  doi          = {10.1109/GLOCOM.2013.6831158},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RadhakrishnanUB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/NunnallyCAUCB13,
  author       = {Troy J. Nunnally and
                  Penyen Chi and
                  Kulsoom Abdullah and
                  A. Selcuk Uluagac and
                  John A. Copeland and
                  Raheem A. Beyah},
  title        = {{P3D:} {A} parallel 3D coordinate visualization for advanced network
                  scans},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {2052--2057},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654828},
  doi          = {10.1109/ICC.2013.6654828},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/NunnallyCAUCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SubramanianUCB13,
  author       = {Venkatachalam Subramanian and
                  A. Selcuk Uluagac and
                  Hasan Cam and
                  Raheem A. Beyah},
  title        = {Examining the characteristics and implications of sensor side channels},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {2205--2210},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654855},
  doi          = {10.1109/ICC.2013.6654855},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/SubramanianUCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HeathOBS13,
  author       = {Laura Heath and
                  Henry Owen and
                  Raheem A. Beyah and
                  Radu State},
  title        = {{CLIP:} Content labeling in IPv6, a layer 3 protocol for information
                  centric networking},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {3732--3737},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6655135},
  doi          = {10.1109/ICC.2013.6655135},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HeathOBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/HeJLHB13,
  author       = {Jing He and
                  Shouling Ji and
                  Xiaojing Liao and
                  Hisham M. Haddad and
                  Raheem A. Beyah},
  title        = {Minimum-sized Positive Influential Node Set selection for social networks:
                  Considering both positive and negative influences},
  booktitle    = {{IEEE} 32nd International Performance Computing and Communications
                  Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PCCC.2013.6742792},
  doi          = {10.1109/PCCC.2013.6742792},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/HeJLHB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ChandrasekarUB13,
  author       = {Ramalingam K. Chandrasekar and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {{PROVIZ:} An integrated visualization and programming framework for
                  WSNs},
  booktitle    = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney,
                  Australia, October 21-24, 2013 - Workshop Proceedings},
  pages        = {146--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/LCNW.2013.6758511},
  doi          = {10.1109/LCNW.2013.6758511},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ChandrasekarUB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/JiYBC13,
  author       = {Shouling Ji and
                  Mingyuan Yan and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  title        = {Semi-Structure Routing and Performance Analysis for Cognitive Radio
                  Networks},
  booktitle    = {{IEEE} 10th International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2013, Hangzhou, China, October 14-16, 2013},
  pages        = {168--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MASS.2013.48},
  doi          = {10.1109/MASS.2013.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/JiYBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/JiBC13,
  author       = {Shouling Ji and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  title        = {Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks},
  booktitle    = {10th Annual {IEEE} International Conference on Sensing, Communications
                  and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013},
  pages        = {389--397},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SAHCN.2013.6645009},
  doi          = {10.1109/SAHCN.2013.6645009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/JiBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NunnallyAUCB13,
  author       = {Troy J. Nunnally and
                  Kulsoom Abdullah and
                  A. Selcuk Uluagac and
                  John A. Copeland and
                  Raheem A. Beyah},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {\emph{NAVSEC}: a recommender system for 3D network security visualizations},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517963},
  doi          = {10.1145/2517957.2517963},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/NunnallyAUCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ValeroJBB12,
  author       = {Marco Valero and
                  Sang Shin Jung and
                  Anu G. Bourgeois and
                  Raheem A. Beyah},
  title        = {An incrementally deployable energy efficient 802.15.4 {MAC} protocol
                  {(DEEP)}},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {7},
  pages        = {1238--1252},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2012.03.008},
  doi          = {10.1016/J.ADHOC.2012.03.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ValeroJBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/LiWAB12,
  author       = {Yingshu Li and
                  Yiwei Wu and
                  Chunyu Ai and
                  Raheem A. Beyah},
  title        = {On the construction of k-connected m-dominating sets in wireless networks},
  journal      = {J. Comb. Optim.},
  volume       = {23},
  number       = {1},
  pages        = {118--139},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10878-010-9346-2},
  doi          = {10.1007/S10878-010-9346-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jco/LiWAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/CalhounCLB12,
  author       = {Telvis E. Calhoun and
                  Xiaojun Cao and
                  Yingshu Li and
                  Raheem A. Beyah},
  title        = {An 802.11 {MAC} layer covert channel},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {393--405},
  year         = {2012},
  url          = {https://doi.org/10.1002/wcm.969},
  doi          = {10.1002/WCM.969},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/CalhounCLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RamalingamSUB12,
  author       = {K. C. Ramalingam and
                  Venkatachalam Subramanian and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {{SIMAGE:} Secure and Link-Quality Cognizant Image Distribution for
                  wireless sensor networks},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {616--621},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503181},
  doi          = {10.1109/GLOCOM.2012.6503181},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RamalingamSUB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ValeroXMSB12,
  author       = {Marco Valero and
                  Mingsen Xu and
                  Nicholas Mancuso and
                  Wen{-}Zhan Song and
                  Raheem A. Beyah},
  title        = {EDR\({}^{\mbox{2}}\): {A} sink failure resilient approach for WSNs},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {616--621},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6363781},
  doi          = {10.1109/ICC.2012.6363781},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ValeroXMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ValeroJULB12,
  author       = {Marco Valero and
                  Sang Shin Jung and
                  A. Selcuk Uluagac and
                  Yingshu Li and
                  Raheem A. Beyah},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Di-Sec: {A} distributed security framework for heterogeneous Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {585--593},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195801},
  doi          = {10.1109/INFCOM.2012.6195801},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ValeroJULB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JiBC12,
  author       = {Shouling Ji and
                  Raheem A. Beyah and
                  Zhipeng Cai},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Snapshot/Continuous Data Collection capacity for large-scale probabilistic
                  Wireless Sensor Networks},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {1035--1043},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195459},
  doi          = {10.1109/INFCOM.2012.6195459},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JiBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/NunnallyUCB12,
  author       = {Troy J. Nunnally and
                  A. Selcuk Uluagac and
                  John A. Copeland and
                  Raheem A. Beyah},
  title        = {3DSVAT: {A} 3D Stereoscopic Vulnerability Assessment Tool for network
                  security},
  booktitle    = {37th Annual {IEEE} Conference on Local Computer Networks, Clearwater
                  Beach, FL, USA, October 22-25, 2012},
  pages        = {111--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCN.2012.6423586},
  doi          = {10.1109/LCN.2012.6423586},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/NunnallyUCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/GoldmanUBC12,
  author       = {Aaron D. Goldman and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Plugging the leaks without unplugging your network in the midst of
                  Disaster},
  booktitle    = {37th Annual {IEEE} Conference on Local Computer Networks, Clearwater
                  Beach, FL, USA, October 22-25, 2012},
  pages        = {248--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCN.2012.6423620},
  doi          = {10.1109/LCN.2012.6423620},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/GoldmanUBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ValeroUVRB12,
  author       = {Marco Valero and
                  A. Selcuk Uluagac and
                  S. Venkatachalam and
                  K. C. Ramalingam and
                  Raheem A. Beyah},
  title        = {The Monitoring Core: {A} framework for sensor security application
                  development},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012},
  pages        = {263--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6502525},
  doi          = {10.1109/MASS.2012.6502525},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/ValeroUVRB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/LiACB11,
  author       = {Yingshu Li and
                  Chunyu Ai and
                  Zhipeng Cai and
                  Raheem A. Beyah},
  title        = {Sensor scheduling for \emph{p}-percent coverage in wireless sensor
                  networks},
  journal      = {Clust. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {27--40},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10586-009-0088-9},
  doi          = {10.1007/S10586-009-0088-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/LiACB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeyahV11,
  author       = {Raheem A. Beyah and
                  Aravind Venkataraman},
  title        = {Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {5},
  pages        = {56--61},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.75},
  doi          = {10.1109/MSP.2011.75},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeyahV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WatkinsRB11,
  author       = {Lanier A. Watkins and
                  William H. Robinson and
                  Raheem A. Beyah},
  title        = {A Passive Solution to the {CPU} Resource Discovery Problem in Cluster
                  Grid Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {22},
  number       = {12},
  pages        = {2000--2007},
  year         = {2011},
  url          = {https://doi.org/10.1109/TPDS.2011.89},
  doi          = {10.1109/TPDS.2011.89},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/WatkinsRB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GuoBL11,
  author       = {Longjiang Guo and
                  Raheem A. Beyah and
                  Yingshu Li},
  title        = {{SMITE:} {A} stochastic compressive data collection protocol for Mobile
                  Wireless Sensor Networks},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {1611--1619},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934953},
  doi          = {10.1109/INFCOM.2011.5934953},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GuoBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/JiBL11,
  author       = {Shouling Ji and
                  Raheem A. Beyah and
                  Yingshu Li},
  title        = {Continuous Data Collection Capacity of Wireless Sensor Networks under
                  Physical Interference Model},
  booktitle    = {{IEEE} 8th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2011, Valencia, Spain, October 17-22, 2011},
  pages        = {222--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MASS.2011.29},
  doi          = {10.1109/MASS.2011.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/JiBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/HollowayB11,
  author       = {Russell Holloway and
                  Raheem A. Beyah},
  title        = {Covert {DCF:} {A} DCF-Based Covert Timing Channel in 802.11 Networks},
  booktitle    = {{IEEE} 8th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2011, Valencia, Spain, October 17-22, 2011},
  pages        = {570--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MASS.2011.60},
  doi          = {10.1109/MASS.2011.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/HollowayB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/HeCJBP11,
  author       = {Jing He and
                  Zhipeng Cai and
                  Shouling Ji and
                  Raheem A. Beyah and
                  Yi Pan},
  editor       = {Yu Cheng and
                  Do Young Eun and
                  Zhiguang Qin and
                  Min Song and
                  Kai Xing},
  title        = {A Genetic Algorithm for Constructing a Reliable {MCDS} in Probabilistic
                  Wireless Networks},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 6th International
                  Conference, {WASA} 2011, Chengdu, China, August 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6843},
  pages        = {96--107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23490-3\_9},
  doi          = {10.1007/978-3-642-23490-3\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/HeCJBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/LeonMSSMBM10,
  author       = {Miguel Ponce de Leon and
                  Shiwen Mao and
                  Frank Steuer and
                  Jens Schumacher and
                  Thomas Magedanz and
                  Raheem A. Beyah and
                  Scott F. Midkiff},
  title        = {Advances In Wireless Test beds and Research Infrastructures},
  journal      = {Mob. Networks Appl.},
  volume       = {15},
  number       = {3},
  pages        = {311--314},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11036-010-0230-1},
  doi          = {10.1007/S11036-010-0230-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/LeonMSSMBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/UluagacBLC10,
  author       = {A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  Yingshu Li and
                  John A. Copeland},
  title        = {{VEBEK:} Virtual Energy-Based Encryption and Keying for Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {9},
  number       = {7},
  pages        = {994--1007},
  year         = {2010},
  url          = {https://doi.org/10.1109/TMC.2010.51},
  doi          = {10.1109/TMC.2010.51},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/UluagacBLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/WatkinsRB10,
  author       = {Lanier A. Watkins and
                  William H. Robinson and
                  Raheem A. Beyah},
  title        = {A Passive Solution to the Memory Resource Discovery Problem in Computational
                  Clusters},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {7},
  number       = {4},
  pages        = {218--230},
  year         = {2010},
  url          = {https://doi.org/10.1109/TNSM.2010.1012.0326},
  doi          = {10.1109/TNSM.2010.1012.0326},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/WatkinsRB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LiAVPB10,
  author       = {Yingshu Li and
                  Chunyu Ai and
                  Chinh T. Vu and
                  Yi Pan and
                  Raheem A. Beyah},
  title        = {Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous
                  Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {21},
  number       = {9},
  pages        = {1373--1385},
  year         = {2010},
  url          = {https://doi.org/10.1109/TPDS.2009.129},
  doi          = {10.1109/TPDS.2009.129},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LiAVPB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/GaoCB10,
  author       = {Ke Gao and
                  Cherita L. Corbett and
                  Raheem A. Beyah},
  title        = {A passive approach to wireless device fingerprinting},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {383--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5544294},
  doi          = {10.1109/DSN.2010.5544294},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/GaoCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/UluagacBC10,
  author       = {A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Time-Based DynamiC Keying and En-Route Filtering {(TICK)} for Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683787},
  doi          = {10.1109/GLOCOM.2010.5683787},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/UluagacBC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/UluagacBKJC10,
  author       = {A. Selcuk Uluagac and
                  Raheem A. Beyah and
                  Roma Kane and
                  Siddharth Joshi and
                  John A. Copeland},
  title        = {Analysis of Varying {AS} Path Lengths from the Edge of the Network},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502709},
  doi          = {10.1109/ICC.2010.5502709},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/UluagacBKJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ValeroBB10,
  author       = {Marco Valero and
                  Anu G. Bourgeois and
                  Raheem A. Beyah},
  title        = {{DEEP:} {A} Deployable Energy Efficient 802.15.4 {MAC} Protocol for
                  Sensor Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5501955},
  doi          = {10.1109/ICC.2010.5501955},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ValeroBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/VenkataramaCB10,
  author       = {A. Venkatarama and
                  Cherita L. Corbett and
                  Raheem A. Beyah},
  title        = {A Wired-Side Approach to {MAC} Misbehavior Detection},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502291},
  doi          = {10.1109/ICC.2010.5502291},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/VenkataramaCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JungVBB10,
  author       = {Sang Shin Jung and
                  Marco Valero and
                  Anu G. Bourgeois and
                  Raheem A. Beyah},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Attacking Beacon-Enabled 802.15.4 Networks},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {253--271},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_15},
  doi          = {10.1007/978-3-642-16161-2\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/JungVBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ws/BeyahMC09,
  author       = {Raheem A. Beyah and
                  Janise McNair and
                  Cherita L. Corbett},
  title        = {Security in Ad Hoc and Sensor Networks},
  series       = {Computer and Network Security},
  volume       = {3},
  publisher    = {World Scientific},
  year         = {2009},
  url          = {https://doi.org/10.1142/7239},
  doi          = {10.1142/7239},
  isbn         = {978-981-4271-08-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ws/BeyahMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AiHLB09,
  author       = {Chunyu Ai and
                  Hailong Hou and
                  Yingshu Li and
                  Raheem A. Beyah},
  title        = {Authentic delay bounded event detection in heterogeneous wireless
                  sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {3},
  pages        = {599--613},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2008.07.004},
  doi          = {10.1016/J.ADHOC.2008.07.004},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AiHLB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WatkinsBC09,
  author       = {Lanier A. Watkins and
                  Raheem A. Beyah and
                  Cherita L. Corbett},
  title        = {Using link {RTT} to passively detect unapproved wireless nodes},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {3},
  pages        = {153--163},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.027341},
  doi          = {10.1504/IJSN.2009.027341},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WatkinsBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KwonBC09,
  author       = {Bongkyoung Kwon and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Key challenges in securing WiMAX mesh networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {5},
  pages        = {413--426},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.125},
  doi          = {10.1002/SEC.125},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KwonBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NewmanB09,
  author       = {Reed Newman and
                  Raheem A. Beyah},
  title        = {On the performance of using Covert Timing Channels for node authentication},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {6},
  pages        = {492--506},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.87},
  doi          = {10.1002/SEC.87},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NewmanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/XuanCB09,
  author       = {Chaoting Xuan and
                  John A. Copeland and
                  Raheem A. Beyah},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {Shepherding Loadable Kernel Modules through On-demand Emulation},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {48--67},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_4},
  doi          = {10.1007/978-3-642-02918-9\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/XuanCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CalhounNB09,
  author       = {Telvis E. Calhoun and
                  Reed Newman and
                  Raheem A. Beyah},
  title        = {Authentication in 802.11 LANs Using a Covert Side Channel},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198769},
  doi          = {10.1109/ICC.2009.5198769},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/CalhounNB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuanCB09,
  author       = {Chaoting Xuan and
                  John A. Copeland and
                  Raheem A. Beyah},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Toward Revealing Kernel Malware Behavior in Virtual Execution Environments},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {304--325},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_16},
  doi          = {10.1007/978-3-642-04342-0\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuanCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/VenkataramanB09,
  author       = {Aravind Venkataraman and
                  Raheem A. Beyah},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Rogue Access Point Detection Using Innate Characteristics of the 802.11
                  {MAC}},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {394--416},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_23},
  doi          = {10.1007/978-3-642-05284-2\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/VenkataramanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/CorbettBC08,
  author       = {Cherita L. Corbett and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Passive Classification of Wireless NICs during Rate Switching},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/495070},
  doi          = {10.1155/2008/495070},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/CorbettBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CorbettBC08,
  author       = {Cherita L. Corbett and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Passive classification of wireless NICs during active scanning},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {5},
  pages        = {335--348},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0053-7},
  doi          = {10.1007/S10207-007-0053-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CorbettBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HouCBZ08,
  author       = {Hailong Hou and
                  Yan Chen and
                  Raheem A. Beyah and
                  Yan{-}Qing Zhang},
  title        = {Filtering Spam by Using Factors Hyperbolic Tree},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {1872--1876},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.362},
  doi          = {10.1109/GLOCOM.2008.ECP.362},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/HouCBZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WatkinsBC08,
  author       = {Lanier A. Watkins and
                  Raheem A. Beyah and
                  Cherita L. Corbett},
  title        = {Passive Identification of Under-Utilized CPUs in High Performance
                  Cluster Grid Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {408--413},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.82},
  doi          = {10.1109/ICC.2008.82},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WatkinsBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AbdullahCB08,
  author       = {Kulsoom Abdullah and
                  Gregory J. Conti and
                  Raheem A. Beyah},
  title        = {A Visualization Framework for Self-Monitoring of Web-Based Information
                  Disclosure},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {1700--1707},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.328},
  doi          = {10.1109/ICC.2008.328},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/AbdullahCB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/NewmanB08,
  author       = {Reed Newman and
                  Raheem A. Beyah},
  editor       = {Amitabha Das and
                  Hung Keng Pung and
                  Francis Bu{-}Sung Lee and
                  Lawrence Wai{-}Choong Wong},
  title        = {A Performance Analysis of Authentication Using Covert Timing Channels},
  booktitle    = {{NETWORKING} 2008, Ad Hoc and Sensor Networks, Wireless Networks,
                  Next Generation Internet , 7th International {IFIP-TC6} Networking
                  Conference, Singapore, May 5-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4982},
  pages        = {149--161},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79549-0\_13},
  doi          = {10.1007/978-3-540-79549-0\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/NewmanB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/UluagacLBC08,
  author       = {A. Selcuk Uluagac and
                  Christopher P. Lee and
                  Raheem A. Beyah and
                  John A. Copeland},
  editor       = {Yingshu Li and
                  Dung T. Huynh and
                  Sajal K. Das and
                  Ding{-}Zhu Du},
  title        = {Designing Secure Protocols for Wireless Sensor Networks},
  booktitle    = {Wireless Algorithms, Systems, and Applications, Third International
                  Conference, {WASA} 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5258},
  pages        = {503--514},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88582-5\_47},
  doi          = {10.1007/978-3-540-88582-5\_47},
  timestamp    = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/UluagacLBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WatkinsBC07,
  author       = {Lanier A. Watkins and
                  Raheem A. Beyah and
                  Cherita L. Corbett},
  title        = {A Passive Approach to Rogue Access Point Detection},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {355--360},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.73},
  doi          = {10.1109/GLOCOM.2007.73},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WatkinsBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gridnets/WatkinsBC07,
  author       = {Lanier A. Watkins and
                  Raheem A. Beyah and
                  Cherita L. Corbett},
  editor       = {Pascale Vicat{-}Blanc Primet and
                  Michael Welzl},
  title        = {Using network traffic to passively detect under utilized resources
                  in high performance cluster grid computing environments},
  booktitle    = {1st International {ICST} Conference on Networks for Grid Applications,
                  GridNets 2007, Lyon, France, October 17-19, 2007},
  pages        = {16},
  publisher    = {{ICST}},
  year         = {2007},
  url          = {https://doi.org/10.4108/gridnets.2007.2070},
  doi          = {10.4108/GRIDNETS.2007.2070},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gridnets/WatkinsBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/VuBL07,
  author       = {Chinh T. Vu and
                  Raheem A. Beyah and
                  Yingshu Li},
  title        = {Composite Event Detection in Wireless Sensor Networks},
  booktitle    = {Proceedings of the 26th {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New
                  Orleans, Louisiana, {USA}},
  pages        = {264--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PCCC.2007.358903},
  doi          = {10.1109/PCCC.2007.358903},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/VuBL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/GuptaBC07,
  author       = {Vaibhav Gupta and
                  Raheem A. Beyah and
                  Cherita L. Corbett},
  title        = {A Characterization of Wireless {NIC} Active Scanning Algorithms},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007,
                  Hong Kong, China, 11-15 March, 2007},
  pages        = {2385--2390},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/WCNC.2007.445},
  doi          = {10.1109/WCNC.2007.445},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/GuptaBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/join/BeyahSC06,
  author       = {Raheem A. Beyah and
                  Raghupathy Sivakumar and
                  John A. Copeland},
  title        = {Galo: a Deployable Framework for Providing Better than Best-Effort
                  Quality of Service},
  journal      = {J. Interconnect. Networks},
  volume       = {7},
  number       = {3},
  pages        = {319--351},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0219265906001727},
  doi          = {10.1142/S0219265906001727},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/join/BeyahSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grc/BeyahCC06,
  author       = {Raheem A. Beyah and
                  Cherita L. Corbett and
                  John A. Copeland},
  title        = {The case for collaborative distributed wireless intrusion detection
                  systems},
  booktitle    = {2006 {IEEE} International Conference on Granular Computing, GrC 2006,
                  Atlanta, Georgia, USA, May 10-12, 2006},
  pages        = {782--787},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GRC.2006.1635917},
  doi          = {10.1109/GRC.2006.1635917},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/grc/BeyahCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CorbettBC06,
  author       = {Cherita L. Corbett and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {A Passive Approach to Wireless {NIC} Identification},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2329--2334},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255117},
  doi          = {10.1109/ICC.2006.255117},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/CorbettBC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LeeTGBC05,
  author       = {Christopher P. Lee and
                  Jason Trost and
                  Nicholas Gibbs and
                  Raheem A. Beyah and
                  John A. Copeland},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visual Firewall: Real-time Network Security Monito},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {16},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.20},
  doi          = {10.1109/VIZSEC.2005.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LeeTGBC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BeyahKYSC04,
  author       = {Raheem A. Beyah and
                  Shantanu Kangude and
                  George Yu and
                  Brian Strickland and
                  John A. Copeland},
  title        = {Rogue access point detection using temporal traffic characteristics},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {2271--2275},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378413},
  doi          = {10.1109/GLOCOM.2004.1378413},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/BeyahKYSC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BeyahSC03,
  author       = {Raheem A. Beyah and
                  Raghupathy Sivakumar and
                  John A. Copeland},
  title        = {Application layer switching: a deployable technique for providing
                  quality of service},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
                  '03, San Francisco, CA, USA, 1-5 December 2003},
  pages        = {3694--3699},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/GLOCOM.2003.1258923},
  doi          = {10.1109/GLOCOM.2003.1258923},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/BeyahSC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuBC03,
  author       = {Jian Liu and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Implementation of an efficient transport for real-time game applications
                  on {HFC} cable networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2003, Anchorage, Alaska, USA, 11-15 May, 2003},
  pages        = {12--16},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICC.2003.1204134},
  doi          = {10.1109/ICC.2003.1204134},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiuBC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics