The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of Raheem Beyah Raheem A. Beyah Reheem Beyah ( http://dblp.L3S.de/Authors/Raheem_Beyah )

Publication years (Num. hits)
2003-2008 (18) 2009-2010 (19) 2011-2012 (17) 2013 (16) 2014-2015 (26) 2016-2017 (21) 2018 (15) 2019 (9)
Publication types (Num. hits)
article(52) book(1) inproceedings(86) proceedings(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 21 occurrences of 18 keywords

Results
Found 142 publication records. Showing 141 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem A. Beyah, Ting Wang 0006 Adversarial CAPTCHAs. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Shreyas Kulkarni, Qinchen Gu, Eric Myers, Lalith Polepeddi, Szilárd Lipták, Raheem Beyah, Deepak Divan Enabling a Decentralized Smart Grid Using Autonomous Edge Control Devices. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang 0006 De-Health: All Your Online Health Information Are Belong to Us. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Celine Irvene, David Formby, Raheem Beyah On Evaluating the Effectiveness of the HoneyBot: A Case Study. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Shouling Ji, Haiqin Weng, Yiming Wu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang 0006 FDI: Quantifying Feature-based Data Inferability. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Zhen Hong, Rui Wang, Shouling Ji, Raheem Beyah Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Ting Wang 0006, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah MOPT: Optimized Mutation Scheduling for Fuzzers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
1Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Long Cheng 0005, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Monodeep Kar, Arvind Singh, Sanu Mathew, Santosh Ghosh, Anand Rajan, Vivek De, Raheem A. Beyah, Saibal Mukhopadhyay Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, Raheem A. Beyah Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ju Ren, Yi Pan 0001, Andrzej Goscinski, Raheem A. Beyah Edge Computing for the Internet of Things. Search on Bibsonomy IEEE Network The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shukun Yang, Shouling Ji, Raheem A. Beyah DPPG: A Dynamic Password Policy Generation System. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Celine Irvene, David Formby, Samuel Litchfield, Raheem A. Beyah HoneyBot: A Honeypot for Robotic Systems. Search on Bibsonomy Proceedings of the IEEE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Formby, Milad Rad, Raheem A. Beyah Lowering the Barriers to Industrial Control System Security with GRFICS. Search on Bibsonomy ASE @ USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Peng Wang, Xianghang Mi, Xiaojing Liao, XiaoFeng Wang 0001, Kan Yuan, Feng Qian, Raheem A. Beyah Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
1Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang 0006, Raheem A. Beyah Quantifying Graph Anonymity, Utility, and De-anonymity. Search on Bibsonomy INFOCOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah SOTA: Secure Over-the-Air Programming of IoT Devices. Search on Bibsonomy MILCOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Hassan Ahmed, Jalel Ben-Othman, Jaime Lloret, Ashfaq Khokhar, Raheem Beyah, Antonio Sanchez, Wael Guibène Emerging Technologies for Connected and Smart Vehicles. Search on Bibsonomy IEEE Communications Magazine The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang 0001, Shuang Hao, Raheem Beyah Cloud repository as a malicious service: challenge, identification and implication. Search on Bibsonomy Cybersecurity The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.) Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I Search on Bibsonomy SecureComm (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.) Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II Search on Bibsonomy SecureComm (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang 0006, Qinming He, Reheem Beyah Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs. Search on Bibsonomy AISec@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Formby, Anwar Walid, Raheem A. Beyah A Case Study in Power Substation Network Dynamics. Search on Bibsonomy POMACS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Trey Reece, Supreeth Sathyanarayana, William H. Robinson, Raheem A. Beyah On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis. Search on Bibsonomy IEEE Trans. Multi-Scale Computing Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Prateek Mittal, Raheem A. Beyah Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey. Search on Bibsonomy IEEE Communications Surveys and Tutorials The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Shukun Yang, Xin Hu 0001, Weili Han, Zhigong Li, Raheem A. Beyah Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christian Bayens, Tuan Le, Luis Garcia, Raheem A. Beyah, Mehdi Javanmard, Saman A. Zonouz See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2017 DBLP  BibTeX  RDF
1David Formby, Anwar I. Walid, Raheem A. Beyah A Case Study in Power Substation Network Dynamics. Search on Bibsonomy SIGMETRICS (Abstracts) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Shukun Yang, Anupam Das 0001, Xin Hu 0001, Raheem A. Beyah Password correlation: Quantification, evaluation and application. Search on Bibsonomy INFOCOM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang 0006, Feng Qian 0001, Raheem A. Beyah, Damon McCoy Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Samuel Litchfield, David Formby, Jonathan Rogers, A. P. Sakis Meliopoulos, Raheem A. Beyah Rethinking the Honeypot for Cyber-Physical Systems. Search on Bibsonomy IEEE Internet Computing The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah General Graph Data De-Anonymization: From Mobility Traces to Social Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Mingyuan Yan, Raheem A. Beyah, Zhipeng Cai Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shruthi Ravichandran, Ramalingam K. Chandrasekar, A. Selcuk Uluagac, Raheem A. Beyah A simple visualization and programming framework for wireless sensor networks: PROVIZ. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah Structural Data De-Anonymization: Theory and Practice. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah Seed-Based De-Anonymizability Quantification of Social Networks. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang 0001, Shuang Hao, Raheem A. Beyah Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, Kan Yuan, XiaoFeng Wang 0001, Zhou Li 0001, Luyi Xing, Raheem A. Beyah Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, Chang Liu 0021, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. Search on Bibsonomy WWW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Formby, Preethi Srinivasan, Andrew M. Leonard, Jonathan D. Rogers, Raheem A. Beyah Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, Raheem A. Beyah On the relative de-anonymizability of graph data: Quantification and evaluation. Search on Bibsonomy INFOCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, Kan Yuan, XiaoFeng Wang 0001, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Raheem A. Beyah, Zhipeng Cai Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks. Search on Bibsonomy IEEE Trans. Vehicular Technology The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lanier Watkins, William H. Robinson, Raheem A. Beyah Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jing (Selena) He, Shouling Ji, Raheem A. Beyah, Ying Xie, Yingshu Li Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm. Search on Bibsonomy Trans. Emerging Telecommunications Technologies The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah Attacking and securing beacon-enabled 802.15.4 networks. Search on Bibsonomy Wireless Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac, Raheem A. Beyah GTID: A Technique for Physical Device and Device Type Fingerprinting. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Troy Nunnally, A. Selcuk Uluagac, Raheem A. Beyah InterSec: An interaction system for network security applications. Search on Bibsonomy ICC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Zhipeng Cai, Meng Han, Raheem A. Beyah Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective. Search on Bibsonomy SECON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Zhipeng Cai, Jing (Selena) He, Raheem A. Beyah Primary social behavior aware routing and scheduling for Cognitive Radio Networks. Search on Bibsonomy SECON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu 0001, Raheem A. Beyah SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
1Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Christopher Wampler, A. Selcuk Uluagac, Raheem A. Beyah Information Leakage in Encrypted IP Video Traffic. Search on Bibsonomy GLOBECOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1A. P. Sakis Meliopoulos, George J. Cokkinides, Raheem A. Beyah, Seth Walters, Paul Myrda Cyber Security and Operational Reliability. Search on Bibsonomy HICSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Shukun Yang, Ting Wang 0006, Changchang Liu, Wei-Han Lee, Raheem A. Beyah PARS: A Uniform and Open-source Password Analysis and Research System. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Raheem A. Beyah, Zhipeng Cai Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah Towards Secure Metering Data Analysis via Distributed Differential Privacy. Search on Bibsonomy DSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services. Search on Bibsonomy DSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Formby, Sang Shin Jung, John A. Copeland, Raheem A. Beyah An Empirical Study of TCP Vulnerabilities in Critical Power System Devices. Search on Bibsonomy SEGS@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah Structural Data De-anonymization: Quantification, Practice, and Implications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jing (Selena) He, Shouling Ji, Raheem A. Beyah, Zhipeng Cai Minimum-sized influential node set selection for social networks under the independent cascade model. Search on Bibsonomy MobiHoc The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1A. Selcuk Uluagac, Venkatachalam Subramanian, Raheem A. Beyah Sensory channel threats to Cyber Physical Systems: A wake-up call. Search on Bibsonomy CNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1A. Selcuk Uluagac, Wenyi Liu, Raheem A. Beyah A multi-factor re-authentication framework with user privacy. Search on Bibsonomy CNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah Structure Based Data De-Anonymization of Social Networks and Mobility Traces. Search on Bibsonomy ISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenyi Liu, A. Selcuk Uluagac, Raheem A. Beyah MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Albert Brzeczko, A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland Active deception model for securing cloud infrastructure. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Formby, Sang Shin Jung, Seth Walters, Raheem A. Beyah A physical overlay framework for insider threat mitigation of power system devices. Search on Bibsonomy SmartGridComm The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sang Shin Jung, David Formby, Carson Day, Raheem A. Beyah A first look at machine-to-machine power grid network traffic. Search on Bibsonomy SmartGridComm The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bongkyoung Kwon, Raheem A. Beyah, Myounghwan Lee, John A. Copeland Orthogonal frequency division multiple access resource allocation in mobile multihop relay networks using an adaptive frame structure. Search on Bibsonomy Wireless Communications and Mobile Computing The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, Raheem A. Beyah, Yingshu Li Cell-based snapshot and continuous data collection in wireless sensor networks. Search on Bibsonomy TOSN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shouling Ji, A. Selcuk Uluagac, Raheem A. Beyah, Zhipeng Cai Practical unicast and convergecast scheduling schemes for cognitive radio networks. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1A. Selcuk Uluagac, Sakthi V. Radhakrishnan, Cherita L. Corbett, Antony Baca, Raheem A. Beyah A passive technique for fingerprinting wireless devices with Wired-side Observations. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah S-Match: An efficient privacy-preserving profile matching scheme. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem A. Beyah NAVSEC: a recommender system for 3D network security visualizations. Search on Bibsonomy VizSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Laura Heath, Henry Owen, Raheem A. Beyah, Radu State CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Troy Nunnally, Penyen Chi, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem A. Beyah P3D: A parallel 3D coordinate visualization for advanced network scans. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Venkatachalam Subramanian, A. Selcuk Uluagac, Hasan Cam, Raheem A. Beyah Examining the characteristics and implications of sensor side channels. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jing He 0001, Shouling Ji, Xiaojing Liao, Hisham M. Haddad, Raheem A. Beyah Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences. Search on Bibsonomy IPCCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Raheem A. Beyah, Zhipeng Cai Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks. Search on Bibsonomy SECON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Mingyuan Yan, Raheem A. Beyah, Zhipeng Cai Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks. Search on Bibsonomy MASS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jing He 0001, Shouling Ji, Raheem A. Beyah, Yingshu Li A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sakthi V. Radhakrishnan, A. Selcuk Uluagac, Raheem A. Beyah Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards. Search on Bibsonomy GLOBECOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ramalingam K. Chandrasekar, A. Selcuk Uluagac, Raheem A. Beyah PROVIZ: An integrated visualization and programming framework for WSNs. Search on Bibsonomy LCN Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Valero, Sang Shin Jung, Anu G. Bourgeois, Raheem A. Beyah An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP). Search on Bibsonomy Ad Hoc Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Telvis E. Calhoun, Xiaojun Cao, Yingshu Li, Raheem A. Beyah An 802.11 MAC layer covert channel. Search on Bibsonomy Wireless Communications and Mobile Computing The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yingshu Li, Yiwei Wu, Chunyu Ai, Raheem A. Beyah On the construction of k-connected m-dominating sets in wireless networks. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marco Valero, Mingsen Xu, Nicholas Mancuso, Wen-Zhan Song, Raheem A. Beyah EDR2: A sink failure resilient approach for WSNs. Search on Bibsonomy ICC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marco Valero, A. Selcuk Uluagac, S. Venkatachalam, K. C. Ramalingam, Raheem A. Beyah The Monitoring Core: A framework for sensor security application development. Search on Bibsonomy MASS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1K. C. Ramalingam, Venkatachalam Subramanian, A. Selcuk Uluagac, Raheem A. Beyah SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks. Search on Bibsonomy GLOBECOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem A. Beyah Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Raheem A. Beyah, Zhipeng Cai Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Troy Nunnally, A. Selcuk Uluagac, John A. Copeland, Raheem A. Beyah 3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security. Search on Bibsonomy LCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aaron D. Goldman, A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland Plugging the leaks without unplugging your network in the midst of Disaster. Search on Bibsonomy LCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lanier Watkins, William H. Robinson, Raheem A. Beyah A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Raheem A. Beyah, Aravind Venkataraman Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF intrusion detection, computer security, insider attacks, rogue access points
1Yingshu Li, Chunyu Ai, Zhipeng Cai, Raheem A. Beyah Sensor scheduling for p-percent coverage in wireless sensor networks. Search on Bibsonomy Cluster Computing The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 141 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license