2009 |
6 | EE | Yali Liu,
Cherita L. Corbett,
Ken Chiang,
Rennie Archibald,
Biswanath Mukherjee,
Dipak Ghosal:
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack.
HICSS 2009: 1-10 |
2008 |
5 | EE | Yali Liu,
Canhui Ou,
Zhi Li,
Cherita L. Corbett,
Cherita Mukherjee,
Dipak Ghosal:
Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks.
GLOBECOM 2008: 1746-1751 |
4 | EE | Lanier Watkins,
Raheem A. Beyah,
Cherita L. Corbett:
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
ICC 2008: 408-413 |
3 | EE | Yali Liu,
Ken Chiang,
Cherita L. Corbett,
Rennie Archibald,
Biswanath Mukherjee,
Dipak Ghosal:
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.
ISC 2008: 487-501 |
2 | EE | Cherita L. Corbett,
Raheem A. Beyah,
John A. Copeland:
Passive classification of wireless NICs during active scanning.
Int. J. Inf. Sec. 7(5): 335-348 (2008) |
2007 |
1 | EE | Lanier Watkins,
Raheem A. Beyah,
Cherita L. Corbett:
A Passive Approach to Rogue Access Point Detection.
GLOBECOM 2007: 355-360 |