2016 - ACM Distinguished Member
2011 - ACM Senior Member
His work in the fields of Geometry overlaps with other areas such as Computer security. Raheem Beyah performs integrative study on Geometry and Point (geometry) in his works. His study brings together the fields of Load balancing (electrical power) and Grid. His Load balancing (electrical power) study frequently links to related topics such as Grid. His work in Computer network is not limited to one particular discipline; it also encompasses Resource (disambiguation). Raheem Beyah regularly links together related areas like Computer network in his Resource (disambiguation) studies. Raheem Beyah regularly links together related areas like Node (physics) in his Structural engineering studies. Node (physics) is frequently linked to Structural engineering in his study. By researching both Computer cluster and Distributed computing, he produces research that crosses academic boundaries.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
Xiaojing Liao;Kan Yuan;XiaoFeng Wang;Zhou Li.
computer and communications security (2016)
Rogue access point detection using temporal traffic characteristics
R. Beyah;S. Kangude;G. Yu;B. Strickland.
global communications conference (2004)
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.
David Formby;Preethi Srinivasan;Andrew M. Leonard;Jonathan D. Rogers.
network and distributed system security symposium (2016)
GTID: A Technique for Physical Device and Device Type Fingerprinting
Sakthi Vignesh Radhakrishnan;A. Selcuk Uluagac;Raheem Beyah.
IEEE Transactions on Dependable and Secure Computing (2015)
Structural Data De-anonymization: Quantification, Practice, and Implications
Shouling Ji;Weiqing Li;Mudhakar Srivatsa;Raheem Beyah.
computer and communications security (2014)
SecGraph: a uniform and open-source evaluation system for graph data anonymization and de-anonymization
Shouling Ji;Weiqing Li;Prateek Mittal;Xin Hu.
usenix security symposium (2015)
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
Shouling Ji;Prateek Mittal;Raheem A. Beyah.
IEEE Communications Surveys and Tutorials (2017)
P3D: A parallel 3D coordinate visualization for advanced network scans
Troy Nunnally;Penyen Chi;Kulsoom Abdullah;A. Selcuk Uluagac.
international conference on communications (2013)
A Passive Approach to Rogue Access Point Detection
L. Watkins;R. Beyah;C. Corbett.
global communications conference (2007)
A passive approach to wireless device fingerprinting
Ke Gao;Cherita Corbett;Raheem Beyah.
dependable systems and networks (2010)
If you think any of the details on this page are incorrect, let us know.