Raheem Beyah
Raheem Beyah
Motorola Foundation Professor, Georgia Tech
Verified email at ece.gatech.edu - Homepage
TitleCited byYear
Rogue access point detection using temporal traffic characteristics
R Beyah, S Kangude, G Yu, B Strickland, J Copeland
IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 4, 2271-2275, 2004
1412004
Composite event detection in wireless sensor networks
CT Vu, RA Beyah, Y Li
2007 IEEE International Performance, Computing, and Communications …, 2007
912007
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
802007
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
762014
Visual firewall: real-time network security monitor
CP Lee, J Trost, N Gibbs, R Beyah, JA Copeland
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 129-136, 2005
742005
P3D: A parallel 3D coordinate visualization for advanced network scans
T Nunnally, P Chi, K Abdullah, AS Uluagac, JA Copeland, R Beyah
2013 IEEE International Conference on Communications (ICC), 2052-2057, 2013
692013
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.
D Formby, P Srinivasan, A Leonard, J Rogers, RA Beyah
NDSS, 2016
642016
A passive approach to wireless device fingerprinting
K Gao, C Corbett, R Beyah
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
642010
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
622015
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
602015
VEBEK: Virtual energy-based encryption and keying for wireless sensor networks
AS Uluagac, RA Beyah, Y Li, JA Copeland
IEEE Transactions on Mobile Computing 9 (7), 994-1007, 2010
592010
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
492016
On the construction of k-connected m-dominating sets in wireless networks
Y Li, Y Wu, C Ai, R Beyah
Journal of combinatorial optimization 23 (1), 118-139, 2012
492012
Sensor scheduling for p-percent coverage in wireless sensor networks
Y Li, C Ai, Z Cai, R Beyah
Cluster Computing 14 (1), 27-40, 2011
482011
GTID: A Technique for Physical DeviceandDevice Type Fingerprinting
SV Radhakrishnan, AS Uluagac, R Beyah
IEEE Transactions on Dependable and Secure Computing 12 (5), 519-532, 2014
462014
SMITE: A stochastic compressive data collection protocol for mobile wireless sensor networks
L Guo, R Beyah, Y Li
2011 Proceedings IEEE INFOCOM, 1611-1619, 2011
442011
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2015
432015
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
International Conference on Information Security, 237-254, 2014
432014
Rogue-access-point detection: Challenges, solutions, and future directions
R Beyah, A Venkataraman
IEEE Security & Privacy 9 (5), 56-61, 2011
432011
Snapshot and continuous data collection in probabilistic wireless sensor networks
S Ji, R Beyah, Z Cai
IEEE Transactions on Mobile Computing 13 (3), 626-637, 2013
392013
The system can't perform the operation now. Try again later.
Articles 1–20