2009 |
11 | EE | Chunyu Ai,
Hailong Hou,
Yingshu Li,
Raheem A. Beyah:
Authentic delay bounded event detection in heterogeneous wireless sensor networks.
Ad Hoc Networks 7(3): 599-613 (2009) |
2008 |
10 | EE | Hailong Hou,
Yan Chen,
Raheem A. Beyah,
Yan-Qing Zhang:
Filtering Spam by Using Factors Hyperbolic Tree.
GLOBECOM 2008: 1872-1876 |
9 | EE | Kulsoom Abdullah,
Gregory J. Conti,
Raheem A. Beyah:
A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure.
ICC 2008: 1700-1707 |
8 | EE | Lanier Watkins,
Raheem A. Beyah,
Cherita L. Corbett:
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
ICC 2008: 408-413 |
7 | EE | Reed Newman,
Raheem A. Beyah:
A Performance Analysis of Authentication Using Covert Timing Channels.
Networking 2008: 149-161 |
6 | EE | A. Selcuk Uluagac,
Christopher P. Lee,
Raheem A. Beyah,
John A. Copeland:
Designing Secure Protocols for Wireless Sensor Networks.
WASA 2008: 503-514 |
5 | EE | Cherita L. Corbett,
Raheem A. Beyah,
John A. Copeland:
Passive classification of wireless NICs during active scanning.
Int. J. Inf. Sec. 7(5): 335-348 (2008) |
2007 |
4 | EE | Lanier Watkins,
Raheem A. Beyah,
Cherita L. Corbett:
A Passive Approach to Rogue Access Point Detection.
GLOBECOM 2007: 355-360 |
3 | EE | Chinh T. Vu,
Raheem A. Beyah,
Yingshu Li:
Composite Event Detection in Wireless Sensor Networks.
IPCCC 2007: 264-271 |
2006 |
2 | EE | Raheem A. Beyah,
Raghupathy Sivakumar,
John A. Copeland:
Galo: a Deployable Framework for Providing Better than Best-Effort Quality of Service.
Journal of Interconnection Networks 7(3): 319-351 (2006) |
2005 |
1 | EE | Christopher P. Lee,
Jason Trost,
Nicholas Gibbs,
Raheem A. Beyah,
John A. Copeland:
Visual Firewall: Real-time Network Security Monito.
VizSEC 2005: 16 |