A survey of deep learning methods for cyber security DS Berman, AL Buczak, JS Chavis, CL Corbett Information 10 (4), 122, 2019 | 608 | 2019 |
A passive approach to wireless device fingerprinting K Gao, C Corbett, R Beyah 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 130 | 2010 |
SIDD: A framework for detecting sensitive data exfiltration by an insider attack Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal 2009 42nd Hawaii international conference on system sciences, 1-10, 2009 | 115 | 2009 |
A passive approach to rogue access point detection L Watkins, R Beyah, C Corbett IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007 | 102 | 2007 |
A passive technique for fingerprinting wireless devices with wired-side observations AS Uluagac, SV Radhakrishnan, C Corbett, A Baca, R Beyah 2013 IEEE conference on communications and network security (CNS), 305-313, 2013 | 63 | 2013 |
A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance Y Liu, K Chiang, C Corbett, R Archibald, B Mukherjee, D Ghosal Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 51 | 2008 |
Using active scanning to identify wireless NICs Corbett, Beyah, Copeland 2006 IEEE Information Assurance Workshop, 239-246, 2006 | 44 | 2006 |
A passive approach to wireless NIC identification C Corbett, R Beyah, J Copeland 2006 IEEE International Conference on Communications 5, 2329-2334, 2006 | 44 | 2006 |
Systems and methods for fingerprinting physical devices and device types based on network traffic AR Beyah, CLQ Corbett US Patent 9,225,732, 2015 | 39 | 2015 |
Passive classification of wireless NICs during active scanning CL Corbett, RA Beyah, JA Copeland International Journal of Information Security 7, 335-348, 2008 | 31 | 2008 |
Dynamic energy-based encoding and filtering in sensor networks H Hou, C Corbett, Y Li, R Beyah MILCOM 2007-IEEE Military Communications Conference, 1-10, 2007 | 28 | 2007 |
Wavelet-based traffic analysis for identifying video streams over broadband networks Y Liu, C Ou, Z Li, C Corbett, B Mukherjee, D Ghosal IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008 | 23 | 2008 |
Passive classification of wireless nics during rate switching CL Corbett, RA Beyah, JA Copeland EURASIP Journal on Wireless Communications and Networking 2008, 1-12, 2007 | 23 | 2007 |
Detecting sensitive data exfiltration by an insider attack Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 22 | 2008 |
Fighting banking botnets by exploiting inherent command and control vulnerabilities L Watkins, C Kawka, C Corbett, WH Robinson 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 20 | 2014 |
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency M Yue, WH Robinson, L Watkins, C Corbett Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014 | 19 | 2014 |
Countering intelligent jamming with full protocol stack agility C Corbett, J Uher, J Cook, A Dalton IEEE security & privacy 12 (2), 44-50, 2013 | 18 | 2013 |
Using network traffic to remotely identify the type of applications executing on mobile devices L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013 | 17 | 2013 |
Disambiguating HTTP: classifying web applications R Archibald, Y Liu, C Corbett, D Ghosal 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 17 | 2011 |
A characterization of wireless NIC active scanning algorithms V Gupta, R Beyah, C Corbett 2007 IEEE Wireless Communications and Networking Conference, 2385-2390, 2007 | 17 | 2007 |