Lanier Watkins, PhD
Lanier Watkins, PhD
Verified email at - Homepage
Cited by
Cited by
Securing commercial WiFi-based UAVs from common security attacks
M Hooper, Y Tian, R Zhou, B Cao, AP Lauf, L Watkins, WH Robinson, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1213-1218, 2016
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
Detection of tunnels in PCAP data by random forests
AL Buczak, PA Hanke, GJ Cancro, MK Toma, LA Watkins, JS Chavis
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
Using semi-supervised machine learning to address the big data problem in DNS networks
L Watkins, S Beck, J Zook, A Buczak, J Chavis, WH Robinson, JA Morales, ...
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017
Identification of botnet activity in IoT network traffic using machine learning
M Hegde, G Kepnang, M Al Mazroei, JS Chavis, L Watkins
2020 International conference on intelligent data science technologies and …, 2020
Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems
L Watkins, J Ramos, G Snow, J Vallejo, WH Robinson, AD Rubin, ...
Proceedings of the 1st ACM MobiHoc workshop on mobile IoT sensing, security …, 2018
A passive solution to the CPU resource discovery problem in cluster grid networks
L Watkins, WH Robinson, R Beyah
IEEE Transactions on Parallel and Distributed Systems 22 (12), 2000-2007, 2011
Fighting banking botnets by exploiting inherent command and control vulnerabilities
L Watkins, C Kawka, C Corbett, WH Robinson
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency
M Yue, WH Robinson, L Watkins, C Corbett
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
Using network traffic to verify mobile device forensic artifacts
N Malik, J Chandramouli, P Suresh, K Fairbanks, L Watkins, ...
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
Remotely inferring device manipulation of industrial control systems via network behavior
G Lontorfos, KD Fairbanks, L Watkins, WH Robinson
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system
R Nair, C Nayak, L Watkins, KD Fairbanks, K Memon, P Wang, ...
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 195-223, 2017
Measuring and mitigating bias in AI-Chatbots
H Beattie, L Watkins, WH Robinson, A Rubin, S Watkins
2022 IEEE International Conference on Assured Autonomy (ICAA), 117-123, 2022
Don’t drink the cyber: Extrapolating the possibilities of Oldsmar’s water treatment cyberattack
J Cervini, A Rubin, L Watkins
International Conference on Cyber Warfare and Security 17 (1), 19-25, 2022
An investigative study into an autonomous UAS traffic management system for congested airspace safety
L Watkins, N Sarfaraz, S Zanlongo, J Silbermann, T Young, R Sleight
2021 IEEE International Conference on Communications Workshops (ICC …, 2021
Using network traffic to infer hardware state: A kernel-level investigation
L Watkins, WH Robinson, R Beyah
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-22, 2015
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments
L Watkins, R Beyah, C Corbett
Proceedings of the first international conference on Networks for grid …, 2007
A passive solution to the memory resource discovery problem in computational clusters
L Watkins, WH Robinson, R Beyah
IEEE Transactions on Network and Service Management 7 (4), 218-230, 2010
Using link RTT to passively detect unapproved wireless nodes
L Watkins, R Beyah, C Corbett
International Journal of Security and Networks 4 (3), 153-163, 2009
The system can't perform the operation now. Try again later.
Articles 1–20