Raheem Beyah
#97,271
Most Influential Person Now
American computer scientist
Raheem Beyah's AcademicInfluence.com Rankings
Raheem Beyahcomputer-science Degrees
Computer Science
#6310
World Rank
#6656
Historical Rank
#1625
USA Rank
Network Security
#14
World Rank
#14
Historical Rank
#5
USA Rank
Database
#8377
World Rank
#8764
Historical Rank
#1107
USA Rank
Download Badge
Computer Science
Raheem Beyah's Degrees
- Bachelors Electrical Engineering Georgia Tech
- Masters Electrical Engineering Georgia Tech
- PhD Electrical Engineering Georgia Tech
Why Is Raheem Beyah Influential?
(Suggest an Edit or Addition)According to Wikipedia, Raheem Beyah is an American computer engineer, researcher, and educator. As of January 15, 2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean, he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic, Inc.
Raheem Beyah's Published Works
Published Works
- Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence (2016) (185)
- GTID: A Technique for Physical Device and Device Type Fingerprinting (2015) (145)
- MOPT: Optimized Mutation Scheduling for Fuzzers (2019) (141)
- Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems (2016) (138)
- Rogue access point detection using temporal traffic characteristics (2004) (117)
- SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization (2015) (112)
- Structural Data De-anonymization: Quantification, Practice, and Implications (2014) (110)
- On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge (2015) (101)
- Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey (2017) (94)
- A passive approach to wireless device fingerprinting (2010) (89)
- Composite Event Detection in Wireless Sensor Networks (2007) (84)
- A Passive Approach to Rogue Access Point Detection (2007) (78)
- SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems (2019) (74)
- VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks (2010) (67)
- Edge Computing for the Internet of Things (2018) (66)
- Visual firewall: real-time network security monitor (2005) (60)
- Sensor scheduling for p-percent coverage in wireless sensor networks (2011) (57)
- Structure Based Data De-Anonymization of Social Networks and Mobility Traces (2014) (57)
- Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks (2014) (57)
- On the construction of k-connected m-dominating sets in wireless networks (2012) (53)
- Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions (2011) (52)
- A passive technique for fingerprinting wireless devices with Wired-side Observations (2013) (46)
- Rethinking the Honeypot for Cyber-Physical Systems (2016) (45)
- Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords (2017) (44)
- MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data (2014) (43)
- Sensory channel threats to Cyber Physical Systems: A wake-up call (2014) (40)
- A Passive Approach to Wireless NIC Identification (2006) (40)
- SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor Networks (2011) (38)
- Out of Control : Ransomware for Industrial Control Systems (2017) (37)
- Designing Secure Protocols for Wireless Sensor Networks (2008) (36)
- Toward Revealing Kernel Malware Behavior in Virtual Execution Environments (2009) (36)
- Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model (2011) (36)
- See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing (2017) (34)
- Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks (2012) (34)
- Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks (2010) (34)
- Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks (2012) (34)
- Minimum-sized influential node set selection for social networks under the independent cascade model (2014) (33)
- An 802.11 MAC layer covert channel (2012) (33)
- UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers (2020) (32)
- Dynamic Energy-based Encoding and Filtering in Sensor Networks (2007) (31)
- Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search (2016) (30)
- Using Active Scanning to Identify Wireless NICs (2006) (30)
- Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks (2013) (30)
- Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks (2013) (30)
- Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks (2011) (30)
- Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks (2017) (29)
- Examining the characteristics and implications of sensor side channels (2013) (28)
- Adversarial CAPTCHAs (2019) (28)
- PARS: A Uniform and Open-source Password Analysis and Research System (2015) (26)
- Enabling a Decentralized Smart Grid Using Autonomous Edge Control Devices (2019) (26)
- A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks (2011) (26)
- Seed-Based De-Anonymizability Quantification of Social Networks (2016) (26)
- Passive classification of wireless NICs during active scanning (2008) (25)
- P3D: A parallel 3D coordinate visualization for advanced network scans (2013) (25)
- Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems (2018) (25)
- Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid (2019) (24)
- Cell-based snapshot and continuous data collection in wireless sensor networks (2013) (24)
- HoneyBot: A Honeypot for Robotic Systems (2018) (23)
- RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid (2019) (22)
- Information Leakage in Encrypted IP Video Traffic (2014) (22)
- Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC (2009) (22)
- Practical unicast and convergecast scheduling schemes for cognitive radio networks (2013) (22)
- Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too (2018) (22)
- Characterizing Long-tail SEO Spam on Cloud Web Hosting Services (2016) (21)
- A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices (2022) (20)
- Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks (2016) (20)
- On the relative de-anonymizability of graph data: Quantification and evaluation (2016) (19)
- Passive Classification of Wireless NICs during Rate Switching (2008) (19)
- Authentication in 802.11 LANs Using a Covert Side Channel (2009) (19)
- Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards (2013) (19)
- Constructing load‐balanced virtual backbones in probabilistic wireless sensor networks via multi‐objective genetic algorithm (2015) (18)
- General Graph Data De-Anonymization (2016) (18)
- Security and Privacy in Communication Networks (2018) (16)
- Towards understanding the security of modern image captchas and underground captcha-solving services (2019) (16)
- A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks (2011) (16)
- An Empirical Study of TCP Vulnerabilities in Critical Power System Devices (2014) (16)
- Attacking Beacon-Enabled 802.15.4 Networks (2010) (16)
- Structural Data De-Anonymization: Theory and Practice (2016) (16)
- MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols (2022) (15)
- Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems (2019) (15)
- DPPG: A Dynamic Password Policy Generation System (2018) (15)
- Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations (2018) (15)
- DEEP: A Deployable Energy Efficient 802.15.4 MAC Protocol for Sensor Networks (2010) (15)
- De-SAG: On the De-Anonymization of Structure-Attribute Graph Data (2019) (15)
- Lowering the Barriers to Industrial Control System Security with GRFICS (2018) (14)
- Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective (2015) (14)
- Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks (2010) (14)
- A Characterization of Wireless NIC Active Scanning Algorithms (2007) (13)
- Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers (2020) (13)
- Security and Privacy in Communication Networks (2018) (13)
- Shepherding Loadable Kernel Modules through On-demand Emulation (2009) (13)
- EDR2: A sink failure resilient approach for WSNs (2012) (12)
- A Case Study in Power Substation Network Dynamics (2017) (12)
- DSF - A Distributed Security Framework for heterogeneous wireless sensor networks (2010) (12)
- A first look at machine-to-machine power grid network traffic (2014) (12)
- SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks (2012) (11)
- The Monitoring Core: A framework for sensor security application development (2012) (11)
- Text Captcha Is Dead? A Large Scale Deployment and Empirical Study (2020) (11)
- Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks (2021) (11)
- A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters (2010) (11)
- Using link RTT to passively detect unapproved wireless nodes (2009) (10)
- Towards Secure Metering Data Analysis via Distributed Differential Privacy (2014) (10)
- Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator (2018) (9)
- Understanding the Security Risks of Docker Hub (2020) (9)
- Security in Ad Hoc and Sensor Networks (2009) (9)
- V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs (2020) (9)
- An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP) (2012) (8)
- Primary social behavior aware routing and scheduling for Cognitive Radio Networks (2015) (8)
- The case for collaborative distributed wireless intrusion detection systems (2006) (8)
- Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service (2016) (8)
- NAVSEC: a recommender system for 3D network security visualizations (2013) (8)
- Active deception model for securing cloud infrastructure (2014) (8)
- IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware (2021) (8)
- A multi-factor re-authentication framework with user privacy (2014) (7)
- MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets (2021) (7)
- 3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security (2012) (7)
- A physical overlay framework for insider threat mitigation of power system devices (2014) (7)
- Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments (2007) (7)
- S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services (2014) (7)
- A Wired-Side Approach to MAC Misbehavior Detection (2010) (7)
- De-Health: All Your Online Health Information Are Belong to Us (2019) (7)
- If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic (2019) (6)
- A network-based approach to counterfeit detection (2013) (6)
- Application layer switching: a deployable technique for providing quality of service (2003) (6)
- Invisible Trojan: an architecture, implementation and detection method (2002) (6)
- Password correlation: Quantification, evaluation and application (2017) (6)
- Attacking and securing beacon-enabled 802.15.4 networks (2015) (6)
- A privacy‐preserving multifactor authentication system (2019) (6)
- Key challenges in securing WiMAX mesh networks (2009) (6)
- A secure routing protocol with regional partitioned clustering and Beta trust management in smart home (2018) (6)
- A simple visualization and programming framework for wireless sensor networks: PROVIZ (2016) (6)
- Authentic delay bounded event detection in heterogeneous wireless sensor networks (2009) (6)
- EMS: History-Driven Mutation for Coverage-based Fuzzing (2022) (6)
- Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks (2013) (5)
- A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure (2008) (5)
- HSTS Measurement and an Enhanced Stripping Attack Against HTTPS (2017) (5)
- PROVIZ: An integrated visualization and programming framework for WSNs (2013) (5)
- Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks (2015) (5)
- Poster : Optimization based Data De-anonymization (2014) (5)
- Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks (2008) (5)
- Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences (2013) (5)
- On the performance of using Covert Timing Channels for node authentication (2009) (5)
- SLIME: program-sensitive energy allocation for fuzzing (2022) (4)
- Using Network Traffic to Infer Hardware State (2015) (4)
- CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking (2013) (4)
- Cloud repository as a malicious service: challenge, identification and implication (2018) (4)
- Quantifying Graph Anonymity, Utility, and De-anonymity (2018) (4)
- OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy (2021) (4)
- SOTA: Secure Over-the-Air Programming of IoT Devices (2018) (4)
- A Case Study in Power Substation Network Dynamics (2017) (4)
- Multi‐Color 3D Printing via Single‐Vat Grayscale Digital Light Processing (2022) (4)
- OnAI-Comp: An Online AI Experts Competing Framework for Early Sepsis Detection (2021) (4)
- Cyber Security and Operational Reliability (2015) (4)
- A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks (2013) (3)
- Plugging the leaks without unplugging your network in the midst of Disaster (2012) (3)
- On the construction of k-connected m-dominating sets in wireless networks (2010) (3)
- A Performance Analysis of Authentication Using Covert Timing Channels (2008) (3)
- Poster : Re-thinking the Honeypot for Cyber-Physical Systems (2016) (3)
- Implementation of an efficient transport for real-time game applications on HFC cable networks (2003) (2)
- Introduction to the Special Issue on User-Centric Security and Safety for CPS (2020) (2)
- Advances In Wireless Test beds and Research Infrastructures (2010) (2)
- Analysis of Varying AS Path Lengths from the Edge of the Network (2010) (2)
- Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study (2023) (2)
- Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings (2022) (2)
- A privacy‐preserving multifactor authentication system (2019) (2)
- Emerging Technologies for Connected and Smart Vehicles (2018) (2)
- A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware (2022) (2)
- InterSec: An interaction system for network security applications (2015) (1)
- A mobility enhancement for switched wireless Ethernet with soft handoff (2002) (1)
- MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses (2022) (1)
- Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications (2022) (1)
- A Passive Approach to Unauthorized Sensor Node Identification (2008) (1)
- Guest editorial: Special issue on wireless computing and networking (2012) (1)
- ShareSafe: An Improved Version of SecGraph (2019) (1)
- Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers (2021) (1)
- This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems (2022) (1)
- Magnetic Signature of Vacuum Interrupters during Load Switching (2022) (1)
- Di-PriDA : A Privacy-preserving Meter Querying System for Smart Grid Load Balancing (2014) (1)
- TIme-Based DynamiCKeying and En-Route Filtering ( TICK ) for Wireless Sensor Networks (2010) (1)
- Filtering Spam by Using Factors Hyperbolic Tree (2008) (1)
- Attacking and securing beacon-enabled 802.15.4 networks (2014) (1)
- Broadcast Scheduling for Cognitive Radio Networks (2013) (1)
- Data De-anonymization : From Mobility Traces to On-line Social Networks (2014) (1)
- A Measurement-based Study of End-to-End Internet Traffic Dynamics (2003) (1)
- Filtering Spam by Using Factors Hyperbolic Trees (2008) (1)
- On Evaluating the Effectiveness of the HoneyBot: A Case Study (2019) (0)
- Galo: a Deployable Framework for Providing Better than Best-Effort Quality of Service (2006) (0)
- MINER: A Hybrid Data-Driven Approach for REST API Fuzzing (2023) (0)
- FDI: Quantifying Feature-based Data Inferability (2019) (0)
- ScholarWorks @ Georgia State University ScholarWorks @ Georgia State University Attacking and securing beacon-enabled 802.15.4 networks Attacking and securing beacon-enabled 802.15.4 networks (2022) (0)
- Cloud repository as a malicious service: challenge, identification and implication (2018) (0)
- A Passive Approach to Using Network Traffic to Characterize Grid Computing Resources. (2006) (0)
- DetectS ec: Evaluating the robustness of object detection models to adversarial attacks (2022) (0)
- Out of Control: the expanded attack surface of control systems (2017) (0)
- MobiCom 2011-Demo Submission Di-Sec : A Distributed Security Framework for Heterogeneous Wireless Sensor Networks (2011) (0)
- Control Center Alarm Substation Measurement and Command Validation Magnetic Field Validation Magnetic Field Lightning Database Network Traffic (2019) (0)
- Orthogonal frequency division multiple access resource allocation in mobile multihop relay networks using an adaptive frame structure (2013) (0)
- A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems (2021) (0)
- A deployable framework for providing better than best-effort quality of service for traffic flows (2003) (0)
- S-Match: An efficient privacy-preserving profile matching scheme (2013) (0)
- D Emerging Technologies for Connected and Smart Vehicles (2022) (0)
- Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks (2022) (0)
- A DESIGN AND ANALYSIS OF GRAPHICAL PASSWORD by Xiaoyuan Suo Under the Direction of Ying Zhu (2006) (0)
- The Monitoring Core ( M-Core ) : Toward Fully Securing Heterogeneous Wireless Sensor Networks (2011) (0)
- Practical unicast and convergecast scheduling schemes for cognitive radio networks (2012) (0)
- Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764 (2003) (0)
- On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis (2017) (0)
- Application Layer Striping: A Deployable Technique for Providing Quality of Service (2003) (0)
- Physical Logic Bombs in 3D Printers via Emerging 4D Techniques (2021) (0)
- Security Educational Panel (2019) (0)
- InterSec : An Inter action System for Network Sec urity Applications (2015) (0)
- SIMAGE : S ecure and Link-Quality Cognizant Image Distribution for Wireless Sensor Networks (2012) (0)
- A secure routing protocol with regional partitioned clustering and Beta trust management in smart home (2018) (0)
- Poster: HoneyBot- A Honeypot for Robotic Systems (2017) (0)
- One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware (2022) (0)
- Securing Wireless Networks Using Device Type Identification (2007) (0)
- Simulation and Measurement of the Magnetic Field Signature of a Vacuum Circuit Breaker and the Identification of Arcing (2022) (0)
- Detect Insider Attacks in Industrial Cyber-Physical Systems Using Multi-Physical Features Based Fingerprinting (2023) (0)
This paper list is powered by the following services:
Other Resources About Raheem Beyah
What Schools Are Affiliated With Raheem Beyah?
Raheem Beyah is affiliated with the following schools: