Lanier Watkins
Lanier Watkins
Johns Hopkins University Information Security Institute
Verified email at jhuapl.edu - Homepage
Title
Cited by
Cited by
Year
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
962007
Securing commercial wifi-based uavs from common security attacks
M Hooper, Y Tian, R Zhou, B Cao, AP Lauf, L Watkins, WH Robinson, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1213-1218, 2016
712016
Detection of tunnels in PCAP data by random forests
AL Buczak, PA Hanke, GJ Cancro, MK Toma, LA Watkins, JS Chavis
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
272016
A passive solution to the CPU resource discovery problem in cluster grid networks
L Watkins, WH Robinson, R Beyah
IEEE Transactions on Parallel and Distributed Systems 22 (12), 2000-2007, 2011
192011
Using semi-supervised machine learning to address the big data problem in DNS networks
L Watkins, S Beck, J Zook, A Buczak, J Chavis, WH Robinson, JA Morales, ...
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017
182017
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
162013
Using network traffic to verify mobile device forensic artifacts
N Malik, J Chandramouli, P Suresh, K Fairbanks, L Watkins, ...
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
142017
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency
M Yue, WH Robinson, L Watkins, C Corbett
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
142014
Fighting banking botnets by exploiting inherent command and control vulnerabilities
L Watkins, C Kawka, C Corbett, WH Robinson
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
132014
Remotely inferring device manipulation of industrial control systems via network behavior
G Lontorfos, KD Fairbanks, L Watkins, WH Robinson
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
122015
The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system
R Nair, C Nayak, L Watkins, KD Fairbanks, K Memon, P Wang, ...
Cybersecurity for Industry 4.0, 195-223, 2017
112017
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments
L Watkins, R Beyah, C Corbett
Proceedings of the first international conference on Networks for grid …, 2007
112007
Cyber maturity as measured by scientific-based risk metrics
LA Watkins, JS Hurley
Journal of Information Warfare 14 (3), 57-65, 2015
92015
A passive solution to the memory resource discovery problem in computational clusters
L Watkins, WH Robinson, R Beyah
IEEE Transactions on Network and Service Management 7 (4), 218-230, 2010
92010
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks
L Watkins, R Beyah, C Corbett
2008 IEEE International Conference on Communications, 408-413, 2008
92008
Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems
L Watkins, J Ramos, G Snow, J Vallejo, WH Robinson, AD Rubin, ...
Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security …, 2018
82018
Using link RTT to passively detect unapproved wireless nodes
L Watkins, R Beyah, C Corbett
International Journal of Security and Networks 4 (3), 153-163, 2009
82009
Using network traffic to infer hardware state: A kernel-level investigation
L Watkins, WH Robinson, R Beyah
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-22, 2015
62015
Using Inherent Command and Control Vulnerabilities To Halt DDoS Attacks
JA Morales, WH Robinson
6*2015
Wavelet transform image compression prototype
L Watkins, KR Perry, JS Hurley, B Olson, B Pain
61999
The system can't perform the operation now. Try again later.
Articles 1–20