Follow
Cherita Corbett
Cherita Corbett
Senior Professional Staff, Johns Hopkins Applied Physics Lab
Verified email at jhuapl.edu
Title
Cited by
Cited by
Year
A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett
Information 10 (4), 122, 2019
6082019
A passive approach to wireless device fingerprinting
K Gao, C Corbett, R Beyah
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1302010
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
2009 42nd Hawaii international conference on system sciences, 1-10, 2009
1152009
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
1022007
A passive technique for fingerprinting wireless devices with wired-side observations
AS Uluagac, SV Radhakrishnan, C Corbett, A Baca, R Beyah
2013 IEEE conference on communications and network security (CNS), 305-313, 2013
632013
A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance
Y Liu, K Chiang, C Corbett, R Archibald, B Mukherjee, D Ghosal
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
512008
Using active scanning to identify wireless NICs
Corbett, Beyah, Copeland
2006 IEEE Information Assurance Workshop, 239-246, 2006
442006
A passive approach to wireless NIC identification
C Corbett, R Beyah, J Copeland
2006 IEEE International Conference on Communications 5, 2329-2334, 2006
442006
Systems and methods for fingerprinting physical devices and device types based on network traffic
AR Beyah, CLQ Corbett
US Patent 9,225,732, 2015
392015
Passive classification of wireless NICs during active scanning
CL Corbett, RA Beyah, JA Copeland
International Journal of Information Security 7, 335-348, 2008
312008
Dynamic energy-based encoding and filtering in sensor networks
H Hou, C Corbett, Y Li, R Beyah
MILCOM 2007-IEEE Military Communications Conference, 1-10, 2007
282007
Wavelet-based traffic analysis for identifying video streams over broadband networks
Y Liu, C Ou, Z Li, C Corbett, B Mukherjee, D Ghosal
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
232008
Passive classification of wireless nics during rate switching
CL Corbett, RA Beyah, JA Copeland
EURASIP Journal on Wireless Communications and Networking 2008, 1-12, 2007
232007
Detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
222008
Fighting banking botnets by exploiting inherent command and control vulnerabilities
L Watkins, C Kawka, C Corbett, WH Robinson
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
202014
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency
M Yue, WH Robinson, L Watkins, C Corbett
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
192014
Countering intelligent jamming with full protocol stack agility
C Corbett, J Uher, J Cook, A Dalton
IEEE security & privacy 12 (2), 44-50, 2013
182013
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
172013
Disambiguating HTTP: classifying web applications
R Archibald, Y Liu, C Corbett, D Ghosal
2011 7th International Wireless Communications and Mobile Computing …, 2011
172011
A characterization of wireless NIC active scanning algorithms
V Gupta, R Beyah, C Corbett
2007 IEEE Wireless Communications and Networking Conference, 2385-2390, 2007
172007
The system can't perform the operation now. Try again later.
Articles 1–20