A survey of deep learning methods for cyber security DS Berman, AL Buczak, JS Chavis, CL Corbett Information 10 (4), 122, 2019 | 100 | 2019 |
SIDD: A framework for detecting sensitive data exfiltration by an insider attack Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal 2009 42nd Hawaii international conference on system sciences, 1-10, 2009 | 96 | 2009 |
A passive approach to rogue access point detection L Watkins, R Beyah, C Corbett IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007 | 92 | 2007 |
A passive approach to wireless device fingerprinting K Gao, C Corbett, R Beyah 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 84 | 2010 |
A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance Y Liu, K Chiang, C Corbett, R Archibald, B Mukherjee, D Ghosal International Conference on Information Security, 487-501, 2008 | 44 | 2008 |
A passive approach to wireless NIC identification C Corbett, R Beyah, J Copeland 2006 IEEE International Conference on Communications 5, 2329-2334, 2006 | 39 | 2006 |
A passive technique for fingerprinting wireless devices with wired-side observations AS Uluagac, SV Radhakrishnan, C Corbett, A Baca, R Beyah 2013 IEEE conference on communications and network security (CNS), 305-313, 2013 | 37 | 2013 |
Reliable traffic information propagation in vehicular ad-hoc networks S Park, CC Zou 2008 IEEE Sarnoff Symposium, 1-6, 2008 | 34 | 2008 |
Using active scanning to identify wireless NICs CL Corbett, RA Beyah, JA Copeland Proceedings of IEEE Information Assurance Workshop (IAW), 2006 | 34 | 2006 |
Dynamic energy-based encoding and filtering in sensor networks H Hou, C Corbett, Y Li, R Beyah MILCOM 2007-IEEE Military Communications Conference, 1-10, 2007 | 28 | 2007 |
Detecting data anomalies in wireless sensor networks S Rajasegarar, C Leckie, M Palaniswami Security in Ad Hoc And Sensor Networks, 231-259, 2010 | 23 | 2010 |
Passive classification of wireless nics during active scanning CL Corbett, RA Beyah, JA Copeland International Journal of Information Security 7 (5), 335-348, 2008 | 22 | 2008 |
Passive classification of wireless nics during rate switching CL Corbett, RA Beyah, JA Copeland EURASIP Journal on Wireless Communications and Networking 2008 (1), 495070, 2007 | 19 | 2007 |
Systems and methods for fingerprinting physical devices and device types based on network traffic AR Beyah, CLQ Corbett US Patent 9,225,732, 2015 | 18 | 2015 |
Wavelet-based traffic analysis for identifying video streams over broadband networks Y Liu, C Ou, Z Li, C Corbett, B Mukherjee, D Ghosal IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008 | 18 | 2008 |
Countering intelligent jamming with full protocol stack agility C Corbett, J Uher, J Cook, A Dalton IEEE security & privacy 12 (2), 44-50, 2013 | 17 | 2013 |
Detecting sensitive data exfiltration by an insider attack Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 17 | 2008 |
A characterization of wireless NIC active scanning algorithms V Gupta, R Beyah, C Corbett 2007 IEEE Wireless Communications and Networking Conference, 2385-2390, 2007 | 17 | 2007 |
Using network traffic to remotely identify the type of applications executing on mobile devices L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson The Proceedings of IEEE Mobile Security Technologies (MoST), 2013 | 16 | 2013 |
Disambiguating HTTP: classifying web applications R Archibald, Y Liu, C Corbett, D Ghosal 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 15 | 2011 |