Cherita Corbett
Cherita Corbett
Senior Professional Staff, Johns Hopkins Applied Physics Lab
Verified email at
Cited by
Cited by
A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett
Information 10 (4), 122, 2019
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
2009 42nd Hawaii international conference on system sciences, 1-10, 2009
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
A passive approach to wireless device fingerprinting
K Gao, C Corbett, R Beyah
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
A novel audio steganalysis based on high-order statistics of a distortion measure with Hausdorff distance
Y Liu, K Chiang, C Corbett, R Archibald, B Mukherjee, D Ghosal
International Conference on Information Security, 487-501, 2008
A passive technique for fingerprinting wireless devices with wired-side observations
AS Uluagac, SV Radhakrishnan, C Corbett, A Baca, R Beyah
2013 IEEE conference on communications and network security (CNS), 305-313, 2013
A passive approach to wireless NIC identification
C Corbett, R Beyah, J Copeland
2006 IEEE International Conference on Communications 5, 2329-2334, 2006
Reliable traffic information propagation in vehicular ad-hoc networks
S Park, CC Zou
2008 IEEE Sarnoff Symposium, 1-6, 2008
Using active scanning to identify wireless NICs
CL Corbett, RA Beyah, JA Copeland
Proceedings of IEEE Information Assurance Workshop (IAW), 2006
Dynamic energy-based encoding and filtering in sensor networks
H Hou, C Corbett, Y Li, R Beyah
MILCOM 2007-IEEE Military Communications Conference, 1-10, 2007
Detecting data anomalies in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami
Security in Ad Hoc And Sensor Networks, 231-259, 2010
Passive classification of wireless nics during active scanning
CL Corbett, RA Beyah, JA Copeland
International Journal of Information Security 7 (5), 335-348, 2008
Systems and methods for fingerprinting physical devices and device types based on network traffic
AR Beyah, CL Corbett
US Patent 9,225,732, 2015
A characterization of wireless NIC active scanning algorithms
V Gupta, R Beyah, C Corbett
2007 IEEE Wireless Communications and Networking Conference, 2385-2390, 2007
Wavelet-based traffic analysis for identifying video streams over broadband networks
Y Liu, C Ou, Z Li, C Corbett, B Mukherjee, D Ghosal
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
Passive classification of wireless nics during rate switching
CL Corbett, RA Beyah, JA Copeland
EURASIP Journal on Wireless Communications and Networking 2008, 1-12, 2007
Countering intelligent jamming with full protocol stack agility
C Corbett, J Uher, J Cook, A Dalton
IEEE security & privacy 12 (2), 44-50, 2013
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
Detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
Disambiguating HTTP: classifying web applications
R Archibald, Y Liu, C Corbett, D Ghosal
2011 7th International Wireless Communications and Mobile Computing …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20