Cherita L. Corbett

According to our database1, Cherita L. Corbett authored at least 24 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Survey of Deep Learning Methods for Cyber Security.
Inf., 2019

2018
Who's driving you?
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2014
Countering Intelligent Jamming with Full Protocol Stack Agility.
IEEE Secur. Priv., 2014

Fighting banking botnets by exploiting inherent command and control vulnerabilities.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Constructing timing-based covert channels in mobile networks by adjusting CPU frequency.
Proceedings of the HASP 2014, 2014

2013
A passive technique for fingerprinting wireless devices with Wired-side Observations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2011
Disambiguating HTTP: Classifying web Applications.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
Evaluation of a Massively Parallel Architecture for Network Security Applications.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

A Wired-Side Approach to MAC Misbehavior Detection.
Proceedings of IEEE International Conference on Communications, 2010

A passive approach to wireless device fingerprinting.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Using link RTT to passively detect unapproved wireless nodes.
Int. J. Secur. Networks, 2009

SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Security in Ad Hoc and Sensor Networks
Computer and Network Security 3, World Scientific, ISBN: 978-981-4468-30-5, 2009

2008
Passive classification of wireless NICs during active scanning.
Int. J. Inf. Sec., 2008

Passive Classification of Wireless NICs during Rate Switching.
EURASIP J. Wirel. Commun. Netw., 2008

A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.
Proceedings of the Information Security, 11th International Conference, 2008

Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
Proceedings of IEEE International Conference on Communications, 2008

Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Detecting sensitive data exfiltration by an insider attack.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
A Characterization of Wireless NIC Active Scanning Algorithms.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007

A Passive Approach to Rogue Access Point Detection.
Proceedings of the Global Communications Conference, 2007

2006
A Passive Approach to Wireless NIC Identification.
Proceedings of IEEE International Conference on Communications, 2006

The case for collaborative distributed wireless intrusion detection systems.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006


  Loading...