Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 343 | 2016 |
{MOPT}: Optimized mutation scheduling for fuzzers C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah 28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019 | 296 | 2019 |
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. D Formby, P Srinivasan, AM Leonard, JD Rogers, RA Beyah NDSS, 2016 | 208 | 2016 |
GTID: A Technique for Physical Device and Device Type Fingerprinting SV Radhakrishnan, AS Uluagac, R Beyah IEEE Transactions on Dependable and Secure Computing 12 (5), 519-532, 2014 | 205 | 2014 |
Rogue access point detection using temporal traffic characteristics R Beyah, S Kangude, G Yu, B Strickland, J Copeland IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 4, 2271-2275, 2004 | 160 | 2004 |
Systems and methods for detection of infected websites X Wang, K Yuan, X Liao, RA Beyah US Patent 10,880,330, 2020 | 151 | 2020 |
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey S Ji, P Mittal, R Beyah IEEE Communications Surveys & Tutorials 19 (2), 1305-1326, 2016 | 145 | 2016 |
P3D: A parallel 3D coordinate visualization for advanced network scans T Nunnally, P Chi, K Abdullah, AS Uluagac, JA Copeland, R Beyah 2013 IEEE International Conference on Communications (ICC), 2052-2057, 2013 | 143 | 2013 |
Sirenattack: Generating adversarial audio for end-to-end acoustic systems T Du, S Ji, J Li, Q Gu, T Wang, R Beyah Proceedings of the 15th ACM Asia conference on computer and communications …, 2020 | 138 | 2020 |
Structural data de-anonymization: Quantification, practice, and implications S Ji, W Li, M Srivatsa, R Beyah Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 138 | 2014 |
{CoVisor}: a compositional hypervisor for {software-defined} networks X Jin, J Gossels, J Rexford, D Walker 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015 | 137* | 2015 |
A passive approach to wireless device fingerprinting K Gao, C Corbett, R Beyah 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 124 | 2010 |
On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge. S Ji, W Li, NZ Gong, P Mittal, RA Beyah NDSS, 2015 | 112 | 2015 |
A passive approach to rogue access point detection L Watkins, R Beyah, C Corbett IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007 | 102 | 2007 |
Composite event detection in wireless sensor networks CT Vu, RA Beyah, Y Li 2007 IEEE International Performance, Computing, and Communications …, 2007 | 101 | 2007 |
Visual firewall: real-time network security monitor CP Lee, J Trost, N Gibbs, R Beyah, JA Copeland IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 129-136, 2005 | 99 | 2005 |
{UNIFUZZ}: A holistic and pragmatic {Metrics-Driven} platform for evaluating fuzzers Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen, C Lyu, C Wu, R Beyah, ... 30th USENIX Security Symposium (USENIX Security 21), 2777-2794, 2021 | 95 | 2021 |
Edge computing for the internet of things J Ren, Y Pan, A Goscinski, RA Beyah IEEE Network 32 (1), 6-7, 2018 | 89 | 2018 |
On the construction of k-connected m-dominating sets in wireless networks Y Li, Y Wu, C Ai, R Beyah Journal of combinatorial optimization 23, 118-139, 2012 | 82 | 2012 |
Structure based data de-anonymization of social networks and mobility traces S Ji, W Li, M Srivatsa, JS He, R Beyah Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 73 | 2014 |