Follow
Raheem Beyah
Raheem Beyah
Dean and Southern Company Chair, Georgia Tech College of Engineering
Verified email at ece.gatech.edu - Homepage
Title
Cited by
Cited by
Year
{CoVisor}: a compositional hypervisor for {software-defined} networks
X Jin, J Gossels, J Rexford, D Walker
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015
346*2015
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3212016
{MOPT}: Optimized mutation scheduling for fuzzers
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019
2592019
GTID: A Technique for Physical Device and Device Type Fingerprinting
SV Radhakrishnan, AS Uluagac, R Beyah
IEEE Transactions on Dependable and Secure Computing 12 (5), 519-532, 2014
2032014
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.
D Formby, P Srinivasan, AM Leonard, JD Rogers, RA Beyah
NDSS, 2016
1952016
Rogue access point detection using temporal traffic characteristics
R Beyah, S Kangude, G Yu, B Strickland, J Copeland
IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 4, 2271-2275, 2004
1612004
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
S Ji, P Mittal, R Beyah
IEEE Communications Surveys & Tutorials 19 (2), 1305-1326, 2016
1412016
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1342014
P3D: A parallel 3D coordinate visualization for advanced network scans
T Nunnally, P Chi, K Abdullah, AS Uluagac, JA Copeland, R Beyah
2013 IEEE International Conference on Communications (ICC), 2052-2057, 2013
1342013
Systems and methods for detection of infected websites
X Wang, K Yuan, X Liao, RA Beyah
US Patent 10,880,330, 2020
1242020
Sirenattack: Generating adversarial audio for end-to-end acoustic systems
T Du, S Ji, J Li, Q Gu, T Wang, R Beyah
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
1242020
A passive approach to wireless device fingerprinting
K Gao, C Corbett, R Beyah
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1222010
On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
1122015
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
1022007
Composite event detection in wireless sensor networks
CT Vu, RA Beyah, Y Li
2007 IEEE International Performance, Computing, and Communications …, 2007
1002007
Visual firewall: real-time network security monitor
CP Lee, J Trost, N Gibbs, R Beyah, JA Copeland
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 129-136, 2005
1002005
{UNIFUZZ}: A Holistic and Pragmatic {Metrics-Driven} Platform for Evaluating Fuzzers
Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen, C Lyu, C Wu, R Beyah, ...
30th USENIX Security Symposium (USENIX Security 21), 2777-2794, 2021
852021
Edge computing for the internet of things
J Ren, Y Pan, A Goscinski, RA Beyah
IEEE Network 32 (1), 6-7, 2018
842018
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
702014
Rethinking the honeypot for cyber-physical systems
S Litchfield, D Formby, J Rogers, S Meliopoulos, R Beyah
IEEE Internet Computing 20 (5), 9-17, 2016
692016
The system can't perform the operation now. Try again later.
Articles 1–20