Cherita Corbett
Cherita Corbett
Senior Professional Staff, Johns Hopkins Applied Physics Lab
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett
Information 10 (4), 122, 2019
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
2009 42nd Hawaii international conference on system sciences, 1-10, 2009
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
A passive approach to wireless device fingerprinting
K Gao, C Corbett, R Beyah
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance
Y Liu, K Chiang, C Corbett, R Archibald, B Mukherjee, D Ghosal
International Conference on Information Security, 487-501, 2008
A passive technique for fingerprinting wireless devices with wired-side observations
AS Uluagac, SV Radhakrishnan, C Corbett, A Baca, R Beyah
2013 IEEE conference on communications and network security (CNS), 305-313, 2013
A passive approach to wireless NIC identification
C Corbett, R Beyah, J Copeland
2006 IEEE International Conference on Communications 5, 2329-2334, 2006
Reliable traffic information propagation in vehicular ad-hoc networks
S Park, CC Zou
2008 IEEE Sarnoff Symposium, 1-6, 2008
Using active scanning to identify wireless NICs
CL Corbett, RA Beyah, JA Copeland
Proceedings of IEEE Information Assurance Workshop (IAW), 2006
Dynamic energy-based encoding and filtering in sensor networks
H Hou, C Corbett, Y Li, R Beyah
MILCOM 2007-IEEE Military Communications Conference, 1-10, 2007
Detecting data anomalies in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami
Security in Ad Hoc And Sensor Networks, 231-259, 2010
Passive classification of wireless nics during active scanning
CL Corbett, RA Beyah, JA Copeland
International Journal of Information Security 7 (5), 335-348, 2008
Systems and methods for fingerprinting physical devices and device types based on network traffic
AR Beyah, CL Corbett
US Patent 9,225,732, 2015
Passive classification of wireless nics during rate switching
CL Corbett, RA Beyah, JA Copeland
EURASIP Journal on Wireless Communications and Networking 2008, 1-12, 2007
Wavelet-based traffic analysis for identifying video streams over broadband networks
Y Liu, C Ou, Z Li, C Corbett, B Mukherjee, D Ghosal
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
Countering intelligent jamming with full protocol stack agility
C Corbett, J Uher, J Cook, A Dalton
IEEE security & privacy 12 (2), 44-50, 2013
A characterization of wireless NIC active scanning algorithms
V Gupta, R Beyah, C Corbett
2007 IEEE Wireless Communications and Networking Conference, 2385-2390, 2007
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
Detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
Disambiguating HTTP: classifying web applications
R Archibald, Y Liu, C Corbett, D Ghosal
2011 7th International Wireless Communications and Mobile Computing …, 2011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20