Cherita L. Corbett
According to our database1,
Cherita L. Corbett
authored at least 24 papers
between 2006 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
2018
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
2014
IEEE Secur. Priv., 2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Constructing timing-based covert channels in mobile networks by adjusting CPU frequency.
Proceedings of the HASP 2014, 2014
2013
A passive technique for fingerprinting wireless devices with Wired-side Observations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Int. J. Secur. Networks, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Computer and Network Security 3, World Scientific, ISBN: 978-981-4468-30-5, 2009
2008
Int. J. Inf. Sec., 2008
EURASIP J. Wirel. Commun. Netw., 2008
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.
Proceedings of the Information Security, 11th International Conference, 2008
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
Proceedings of IEEE International Conference on Communications, 2008
Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007
Proceedings of the Global Communications Conference, 2007
2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006