Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
Xiaojing Liao;Kan Yuan;XiaoFeng Wang;Zhou Li.
computer and communications security (2016)
176 Citations
Rogue access point detection using temporal traffic characteristics
R. Beyah;S. Kangude;G. Yu;B. Strickland.
global communications conference (2004)
163 Citations
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.
David Formby;Preethi Srinivasan;Andrew M. Leonard;Jonathan D. Rogers.
network and distributed system security symposium (2016)
154 Citations
GTID: A Technique for Physical Device and Device Type Fingerprinting
Sakthi Vignesh Radhakrishnan;A. Selcuk Uluagac;Raheem Beyah.
IEEE Transactions on Dependable and Secure Computing (2015)
147 Citations
Structural Data De-anonymization: Quantification, Practice, and Implications
Shouling Ji;Weiqing Li;Mudhakar Srivatsa;Raheem Beyah.
computer and communications security (2014)
123 Citations
SecGraph: a uniform and open-source evaluation system for graph data anonymization and de-anonymization
Shouling Ji;Weiqing Li;Prateek Mittal;Xin Hu.
usenix security symposium (2015)
113 Citations
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
Shouling Ji;Prateek Mittal;Raheem A. Beyah.
IEEE Communications Surveys and Tutorials (2017)
105 Citations
P3D: A parallel 3D coordinate visualization for advanced network scans
Troy Nunnally;Penyen Chi;Kulsoom Abdullah;A. Selcuk Uluagac.
international conference on communications (2013)
102 Citations
A Passive Approach to Rogue Access Point Detection
L. Watkins;R. Beyah;C. Corbett.
global communications conference (2007)
101 Citations
A passive approach to wireless device fingerprinting
Ke Gao;Cherita Corbett;Raheem Beyah.
dependable systems and networks (2010)
100 Citations