Cherita Corbett
Cherita Corbett
Senior Professional Staff, Johns Hopkins Applied Physics Lab
Verified email at jhuapl.edu
Title
Cited by
Cited by
Year
A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett
Information 10 (4), 122, 2019
1442019
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
2009 42nd Hawaii international conference on system sciences, 1-10, 2009
982009
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
952007
A passive approach to wireless device fingerprinting
K Gao, C Corbett, R Beyah
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
932010
A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance
Y Liu, K Chiang, C Corbett, R Archibald, B Mukherjee, D Ghosal
International Conference on Information Security, 487-501, 2008
452008
A passive technique for fingerprinting wireless devices with wired-side observations
AS Uluagac, SV Radhakrishnan, C Corbett, A Baca, R Beyah
2013 IEEE conference on communications and network security (CNS), 305-313, 2013
432013
A passive approach to wireless NIC identification
C Corbett, R Beyah, J Copeland
2006 IEEE International Conference on Communications 5, 2329-2334, 2006
402006
Using active scanning to identify wireless NICs
CL Corbett, RA Beyah, JA Copeland
Proceedings of IEEE Information Assurance Workshop (IAW), 2006
362006
Reliable traffic information propagation in vehicular ad-hoc networks
S Park, CC Zou
2008 IEEE Sarnoff Symposium, 1-6, 2008
352008
Dynamic energy-based encoding and filtering in sensor networks
H Hou, C Corbett, Y Li, R Beyah
MILCOM 2007-IEEE Military Communications Conference, 1-10, 2007
282007
Detecting data anomalies in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami
Security in Ad Hoc And Sensor Networks, 231-259, 2010
232010
Passive classification of wireless nics during active scanning
CL Corbett, RA Beyah, JA Copeland
International Journal of Information Security 7 (5), 335-348, 2008
232008
A characterization of wireless NIC active scanning algorithms
V Gupta, R Beyah, C Corbett
2007 IEEE Wireless Communications and Networking Conference, 2385-2390, 2007
212007
Systems and methods for fingerprinting physical devices and device types based on network traffic
AR Beyah, CL Corbett
US Patent 9,225,732, 2015
192015
Wavelet-based traffic analysis for identifying video streams over broadband networks
Y Liu, C Ou, Z Li, C Corbett, B Mukherjee, D Ghosal
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
192008
Passive classification of wireless nics during rate switching
CL Corbett, RA Beyah, JA Copeland
EURASIP Journal on Wireless Communications and Networking 2008, 1-12, 2007
192007
Countering intelligent jamming with full protocol stack agility
C Corbett, J Uher, J Cook, A Dalton
IEEE security & privacy 12 (2), 44-50, 2013
172013
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
162013
Detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
162008
Disambiguating HTTP: classifying web applications
R Archibald, Y Liu, C Corbett, D Ghosal
2011 7th International Wireless Communications and Mobile Computing …, 2011
152011
The system can't perform the operation now. Try again later.
Articles 1–20