Stealthy domain generation algorithms Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ... IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017 | 79 | 2017 |
Stealthy malware traffic-not as innocent as it looks X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy 2015 10th International Conference on Malicious and Unwanted Software …, 2015 | 27 | 2015 |
Security and data privacy of modern automobiles J Deng, L Yu, Y Fu, O Hambolu, RR Brooks Data analytics for intelligent transportation systems, 131-163, 2017 | 24 | 2017 |
Side channel analysis of multiple PMU data in electric power systems X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu 2015 Clemson University Power Systems Conference (PSC), 1-6, 2015 | 21 | 2015 |
DoS detection is easier now I Ozcelik, Y Fu, RR Brooks 2013 Second GENI Research and Educational Experiment Workshop, 50-55, 2013 | 18 | 2013 |
Analysis of Botnet Counter-Counter-Measures Y Fu, B Husain, RR Brooks Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 14 | 2015 |
A covert data transport protocol Y Fu, Z Jia, L Yu, X Zhong, R Brooks Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016 | 7 | 2016 |
Using markov models and statistics to learn, extract, fuse, and detect patterns in raw data RR Brooks, L Yu, Y Fu, G Cordone, J Oakley, X Zhong Proceedings of International Symposium on Sensor Networks, Systems and …, 2018 | 4 | 2018 |
Internet freedom in west africa: technical support for journalists and democracy advocates RR Brooks, L Yu, Y Fu, O Hambolu, J Gaynard, J Owono, A Yepmou, ... Communications of the ACM 61 (5), 72-82, 2018 | 3 | 2018 |
Using botnet technologies to counteract network traffic analysis Y Fu Clemson University, 2017 | 2 | 2017 |
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms L Yu, Y Fu, J Oakley, O Hambolu, R Brooks Computers & Security 105, 102206, 2021 | 1 | 2021 |
Privacy preserving count statistics L Yu, O Hambolu, Y Fu, J Oakley, RR Brooks arXiv preprint arXiv:1910.07020, 2019 | 1 | 2019 |
Creating a tailored trustworthy space for democracy advocates using hostile host RR Brooks, O Hambolu, P Marusich, Y Fu, S Balachandran Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013 | 1 | 2013 |
Internet Freedom in West Africa: Technical Support for Journalists and Democracy Advocates The US State Department's Internet Freedom agenda is being adapted to help them … RR Brooks, L Yu, Y Fu, O Hambolu, J Gaynard, J Owono, A Yepmou, ... | | |