Lanier A. Watkins

Orcid: 0000-0002-3322-1833

Affiliations:
  • Johns Hopkins University, Whiting School of Engineering, Baltimore, MD, USA
  • Johns Hopkins University, Applied Physics Laboratory, Baltimore, MD, USA
  • Georgia State University, Atlanta, GA, USA (PhD 2010)


According to our database1, Lanier A. Watkins authored at least 44 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Agile services and analysis framework for autonomous and autonomic critical infrastructure.
Innov. Syst. Softw. Eng., June, 2023

The Roles of Autonomy and Assurance in the Future of Uncrewed Aircraft Systems in Low-Altitude Airspace Operations.
Computer, 2023

A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission Coordination.
Proceedings of the IEEE INFOCOM 2023, 2023

Explainable Autonomic Cybersecurity For Industrial Control Systems.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
Assured Autonomy Survey.
Found. Trends Priv. Secur., 2022

Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Measuring and Mitigating Bias in AI-Chatbots.
Proceedings of the IEEE International Conference on Assured Autonomy, 2022

2021
A Containerization-Based Backfit Approach for Industrial Control System Resiliency.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Cost-Effective Mission Assurance Engineering Through Simulation.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2021

An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

2020
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Mission Assurance for Autonomous Undersea Vehicles.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Cyber-Resilient SCADA Systems via Secure State Restoration.
Proceedings of the Critical Infrastructure Protection XIV, 2020

Identification of Botnet Activity in IoT Network Traffic Using Machine Learning.
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020

Bio-Inspired, Host-based Firewall.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Autonomous Navigation Assurance with Explainable AI and Security Monitoring.
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020

2018
Network-based detection of mobile malware exhibiting obfuscated or silent network behavior.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

Who's driving you?
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
A mobile two-way wireless covert timing channel suitable for peer-to-peer malware.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Using sequential pattern mining for common event format (CEF) cyber data.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Using semi-supervised machine learning to address the Big Data problem in DNS networks.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Using network traffic to verify mobile device forensic artifacts.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Using network traffic to infer compromised neighbors in wireless sensor nodes.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity.
Int. J. Cyber Warf. Terror., 2016

Securing commercial WiFi-based UAVs from common security attacks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Detection of Tunnels in PCAP Data by Random Forests.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation.
ACM Trans. Embed. Comput. Syst., 2015

Using inherent command and control vulnerabilities to halt DDoS attacks.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Remotely inferring device manipulation of industrial control systems via network behavior.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

2014
Fighting banking botnets by exploiting inherent command and control vulnerabilities.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Constructing timing-based covert channels in mobile networks by adjusting CPU frequency.
Proceedings of the HASP 2014, 2014

Using network traffic to infer power levels in wireless sensor nodes.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

2011
A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks.
IEEE Trans. Parallel Distributed Syst., 2011

2010
A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters.
IEEE Trans. Netw. Serv. Manag., 2010

2009
Using link RTT to passively detect unapproved wireless nodes.
Int. J. Secur. Networks, 2009

2008
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007

A Passive Approach to Rogue Access Point Detection.
Proceedings of the Global Communications Conference, 2007


  Loading...