Inferring statistically significant hidden markov models L Yu, JM Schwier, RM Craven, RR Brooks, C Griffin IEEE Transactions on Knowledge and Data Engineering 25 (7), 1548-1558, 2012 | 49 | 2012 |
A middlebox-cooperative TCP for a non end-to-end Internet R Craven, R Beverly, M Allman ACM SIGCOMM Computer Communication Review 44 (4), 151-162, 2014 | 47 | 2014 |
A normalized statistical metric space for hidden markov models C Lu, JM Schwier, RM Craven, L Yu, RR Brooks, C Griffin IEEE transactions on cybernetics 43 (3), 806-819, 2013 | 33 | 2013 |
A physics‐based strategy for cyber resilience of CPS JS Mertoguno, RM Craven, MS Mickelson, DP Koller Autonomous Systems: Sensors, Processing, and Security for Vehicles and …, 2019 | 32 | 2019 |
Traffic analysis of anonymity systems RM Craven Clemson University, 2010 | 18 | 2010 |
Side-channel analysis for detecting protocol tunneling B Harakrishnan, S Jason, C Ryan, B Richard R, H Kathryn, G Daniele, ... Advances in Internet of Things 2011, 2011 | 13 | 2011 |
Noise tolerant symbolic learning of markov models of tunneled protocols H Bhanu, J Schwier, R Craven, I Ozcelik, C Griffin, RR Brooks 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 4 | 2011 |
Securing the Future of GenAI: Policy and Technology M Christodorescu, R Craven, S Feizi, N Gong, M Hoffmann, S Jha, Z Jiang, ... Cryptology ePrint Archive, 2024 | 2 | 2024 |
Techniques for the detection of faulty packet header modifications R Craven, R Beverly, M Allman Monterey, California. Naval Postgraduate School, 2014 | 2 | 2014 |
Reducing Attack Surface via Executable Transformation S Mertoguno, R Craven, D Koller, M Mickelson 2018 IEEE Cybersecurity Development (SecDev), 138-138, 2018 | 1 | 2018 |
Traffic analysis attacks on sensor networks L Yu, RR Brooks, R Craven, H Bhanu Distributed Sensor Networks: Sensor Networking and Applications, 313, 2012 | 1 | 2012 |
Orwell was an Optimist R Craven, C Abbott, H Bhanu, J Deng, RR Brooks Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 1 | 2010 |
FEAST’24: Sixth Workshop on Forming an Ecosystem Around Software Transformation R Craven, M Mickelson | | 2024 |
Design and evaluation for the end-to-end detection of TCP/IP header manipulation RM Craven Monterey, California: Naval Postgraduate School, 2014 | | 2014 |
Adversarial {TCP}: An Offensive {TCP} Stack to Penalize Abusive Connections R Craven, K Foster, R Beverly | | 2011 |
Adversarial TCP: An Offensive TCP Stack to Penalize Abusive Connections (Poster) R Craven, K Foster, R Beverly Monterey, California. Naval Postgraduate School, 2010 | | 2010 |