Lanier Watkins
Lanier Watkins
Johns Hopkins University Information Security Institute
Verified email at - Homepage
Cited by
Cited by
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
Securing commercial wifi-based uavs from common security attacks
M Hooper, Y Tian, R Zhou, B Cao, AP Lauf, L Watkins, WH Robinson, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1213-1218, 2016
Detection of tunnels in PCAP data by random forests
AL Buczak, PA Hanke, GJ Cancro, MK Toma, LA Watkins, JS Chavis
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
A passive solution to the CPU resource discovery problem in cluster grid networks
L Watkins, WH Robinson, R Beyah
IEEE Transactions on Parallel and Distributed Systems 22 (12), 2000-2007, 2011
Using semi-supervised machine learning to address the big data problem in DNS networks
L Watkins, S Beck, J Zook, A Buczak, J Chavis, WH Robinson, JA Morales, ...
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
Using network traffic to verify mobile device forensic artifacts
N Malik, J Chandramouli, P Suresh, K Fairbanks, L Watkins, ...
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency
M Yue, WH Robinson, L Watkins, C Corbett
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
Fighting banking botnets by exploiting inherent command and control vulnerabilities
L Watkins, C Kawka, C Corbett, WH Robinson
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
Remotely inferring device manipulation of industrial control systems via network behavior
G Lontorfos, KD Fairbanks, L Watkins, WH Robinson
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system
R Nair, C Nayak, L Watkins, KD Fairbanks, K Memon, P Wang, ...
Cybersecurity for Industry 4.0, 195-223, 2017
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments
L Watkins, R Beyah, C Corbett
Proceedings of the first international conference on Networks for grid …, 2007
Cyber maturity as measured by scientific-based risk metrics
LA Watkins, JS Hurley
Journal of Information Warfare 14 (3), 57-65, 2015
A passive solution to the memory resource discovery problem in computational clusters
L Watkins, WH Robinson, R Beyah
IEEE Transactions on Network and Service Management 7 (4), 218-230, 2010
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks
L Watkins, R Beyah, C Corbett
2008 IEEE International Conference on Communications, 408-413, 2008
Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems
L Watkins, J Ramos, G Snow, J Vallejo, WH Robinson, AD Rubin, ...
Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security …, 2018
Using link RTT to passively detect unapproved wireless nodes
L Watkins, R Beyah, C Corbett
International Journal of Security and Networks 4 (3), 153-163, 2009
Using network traffic to infer hardware state: A kernel-level investigation
L Watkins, WH Robinson, R Beyah
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-22, 2015
Using Inherent Command and Control Vulnerabilities To Halt DDoS Attacks
JA Morales, WH Robinson
Wavelet transform image compression prototype
L Watkins, KR Perry, JS Hurley, B Olson, B Pain
The system can't perform the operation now. Try again later.
Articles 1–20