Obserwuj
Cherita Corbett
Cherita Corbett
Senior Professional Staff, Johns Hopkins Applied Physics Lab
Zweryfikowany adres z jhuapl.edu
Tytuł
Cytowane przez
Cytowane przez
Rok
A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett
Information 10 (4), 122, 2019
5222019
A passive approach to wireless device fingerprinting
K Gao, C Corbett, R Beyah
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1242010
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
2009 42nd Hawaii international conference on system sciences, 1-10, 2009
1082009
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
1012007
A passive technique for fingerprinting wireless devices with wired-side observations
AS Uluagac, SV Radhakrishnan, C Corbett, A Baca, R Beyah
2013 IEEE conference on communications and network security (CNS), 305-313, 2013
592013
A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance
Y Liu, K Chiang, C Corbett, R Archibald, B Mukherjee, D Ghosal
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
512008
A passive approach to wireless NIC identification
C Corbett, R Beyah, J Copeland
2006 IEEE International Conference on Communications 5, 2329-2334, 2006
432006
Using active scanning to identify wireless NICs
Corbett, Beyah, Copeland
2006 IEEE Information Assurance Workshop, 239-246, 2006
422006
Systems and methods for fingerprinting physical devices and device types based on network traffic
AR Beyah, CLQ Corbett
US Patent 9,225,732, 2015
342015
Dynamic energy-based encoding and filtering in sensor networks
H Hou, C Corbett, Y Li, R Beyah
MILCOM 2007-IEEE Military Communications Conference, 1-10, 2007
282007
Passive classification of wireless nics during active scanning
CL Corbett, RA Beyah, JA Copeland
International Journal of Information Security 7, 335-348, 2008
272008
Wavelet-based traffic analysis for identifying video streams over broadband networks
Y Liu, C Ou, Z Li, C Corbett, B Mukherjee, D Ghosal
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
222008
Detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
222008
Passive classification of wireless nics during rate switching
CL Corbett, RA Beyah, JA Copeland
EURASIP Journal on Wireless Communications and Networking 2008, 1-12, 2007
222007
Fighting banking botnets by exploiting inherent command and control vulnerabilities
L Watkins, C Kawka, C Corbett, WH Robinson
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
192014
Countering intelligent jamming with full protocol stack agility
C Corbett, J Uher, J Cook, A Dalton
IEEE security & privacy 12 (2), 44-50, 2013
182013
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency
M Yue, WH Robinson, L Watkins, C Corbett
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
172014
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
172013
A characterization of wireless NIC active scanning algorithms
V Gupta, R Beyah, C Corbett
2007 IEEE Wireless Communications and Networking Conference, 2385-2390, 2007
172007
Disambiguating HTTP: classifying web applications
R Archibald, Y Liu, C Corbett, D Ghosal
2011 7th International Wireless Communications and Mobile Computing …, 2011
162011
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20