A brief survey of cryptocurrency systems U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks 2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016 | 454 | 2016 |
Stealthy domain generation algorithms Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ... IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017 | 81 | 2017 |
On precision bound of distributed fault-tolerant sensor fusion algorithms B Ao, Y Wang, L Yu, RR Brooks, SS Iyengar ACM Computing Surveys (CSUR) 49 (1), 1-23, 2016 | 52 | 2016 |
Inferring statistically significant hidden markov models L Yu, JM Schwier, RM Craven, RR Brooks, C Griffin IEEE Transactions on Knowledge and Data Engineering 25 (7), 1548-1558, 2012 | 49 | 2012 |
Cyber security in smart DC microgrid operations X Zhong, L Yu, R Brooks, GK Venayagamoorthy 2015 IEEE first international conference on dc microgrids (ICDCM), 86-91, 2015 | 48 | 2015 |
Automobile ECU design to avoid data tampering L Yu, J Deng, RR Brooks, SB Yun Proceedings of the 10th annual cyber and information security research …, 2015 | 34 | 2015 |
A normalized statistical metric space for hidden markov models C Lu, JM Schwier, RM Craven, L Yu, RR Brooks, C Griffin IEEE transactions on cybernetics 43 (3), 806-819, 2013 | 32 | 2013 |
Stealthy malware traffic-not as innocent as it looks X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy 2015 10th International Conference on Malicious and Unwanted Software …, 2015 | 27 | 2015 |
Distributed denial of service (DDoS): a history RR Brooks, L Yu, I Ozcelik, J Oakley, N Tusing IEEE Annals of the History of Computing 44 (2), 44-54, 2021 | 25 | 2021 |
Availability analysis of a permissioned blockchain with a lightweight consensus protocol A Altarawneh, F Sun, RR Brooks, O Hambolu, L Yu, A Skjellum Computers & Security 102, 102098, 2021 | 24 | 2021 |
Security and data privacy of modern automobiles J Deng, L Yu, Y Fu, O Hambolu, RR Brooks Data analytics for intelligent transportation systems, 131-163, 2017 | 24 | 2017 |
Scrybe: a blockchain ledger for clinical trials RR Brooks, KC Wang, L Yu, J Oakley, A Skjellum, JS Obeid, L Lenert, ... IEEE Blockchain in Clinical Trials Forum: Whiteboard challenge winner, 1-2, 2018 | 22 | 2018 |
Side channel analysis of multiple pmu data in electric power systems X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu 2015 Clemson University Power Systems Conference (PSC), 1-6, 2015 | 21 | 2015 |
Scrybe: A second-generation blockchain technology with lightweight mining for secure provenance and related applications C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ... Blockchain Cybersecurity, Trust and Privacy, 51-67, 2020 | 20 | 2020 |
TARN: A SDN-based traffic analysis resistant network architecture L Yu, Q Wang, G Barrineau, J Oakley, RR Brooks, KC Wang 2017 12th international conference on malicious and unwanted software …, 2017 | 15 | 2017 |
Semantic similarity detection for data leak prevention D Du, L Yu, RR Brooks Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 13 | 2015 |
Scraaps: X. 509 certificate revocation using the blockchain-based scrybe secure provenance system S Medury, A Skjellum, RR Brooks, L Yu 2018 13th International Conference on Malicious and Unwanted Software …, 2018 | 11 | 2018 |
Unmasking criminal enterprises: an analysis of Bitcoin transactions J Oakley, C Worley, L Yu, R Brooks, A Skjellum 2018 13th International Conference on Malicious and Unwanted Software …, 2018 | 11 | 2018 |
Protocol proxy: An fte-based covert channel J Oakley, L Yu, X Zhong, GK Venayagamoorthy, R Brooks Computers & Security 92, 101777, 2020 | 10 | 2020 |
Provenance threat modeling O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum 2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016 | 10 | 2016 |