default search action
Lanier A. Watkins
Person information
- affiliation: Johns Hopkins University, Whiting School of Engineering, Baltimore, MD, USA
- affiliation: Johns Hopkins University, Applied Physics Laboratory, Baltimore, MD, USA
- affiliation (PhD 2010): Georgia State University, Atlanta, GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Kyle Stein, Alexander Harvey, Aylanna Lopez, Uzma Taj, Shari Watkins, Lanier A. Watkins:
Eliciting and Measuring Toxic Bias in Human-to-Machine Interactions in Large Language Models. UEMCON 2024: 13-19 - 2023
- [j8]Lanier A. Watkins, Denzel Hamilton, Tyler A. Young, Sebastián A. Zanlongo, Louis L. Whitcomb, Andrew R. Spielvogel, Barbara Kobzik-Juul:
The Roles of Autonomy and Assurance in the Future of Uncrewed Aircraft Systems in Low-Altitude Airspace Operations. Computer 56(7): 41-53 (2023) - [j7]Joseph Maurio, Paul Wood, Sebastián A. Zanlongo, Josh Silbermann, Tamim Sookoor, Alberto Lorenzo, Randall Sleight, James Rogers, Daniel Muller, Noah Armiger, Christopher A. Rouff, Lanier A. Watkins:
Agile services and analysis framework for autonomous and autonomic critical infrastructure. Innov. Syst. Softw. Eng. 19(2): 145-156 (2023) - [c37]Valeti Manoj, Shao Wenda, Niu Sihan, Christopher A. Rouff, Lanier A. Watkins, Aviel Rubin:
Explainable Autonomic Cybersecurity For Industrial Control Systems. CCWC 2023: 900-9006 - [c36]Lanier A. Watkins, Denzel Hamilton, Chad Mello, Tyler A. Young, Sebastián A. Zanlongo, Barbara Kobzik-Juul, Randall Sleight:
A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission Coordination. INFOCOM Workshops 2023: 1-6 - 2022
- [j6]Christopher A. Rouff, Lanier A. Watkins:
Assured Autonomy Survey. Found. Trends Priv. Secur. 4(1): 1-116 (2022) - [c35]Hedin Beattie, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin, Shari Watkins:
Measuring and Mitigating Bias in AI-Chatbots. ICAA 2022: 117-123 - [c34]James Cervini, Daniel Muller, Alexander Beall, Joseph Maurio, Aviel Rubin, Lanier A. Watkins:
Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach. Critical Infrastructure Protection 2022: 103-117 - 2021
- [c33]Lanier A. Watkins, Denzel Hamilton, Kevin T. Kornegay, Aviel Rubin:
Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security. CISS 2021: 1-6 - [c32]Christopher A. Rouff, Lanier A. Watkins, Roy Sterritt, Salim Hariri:
SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies. CSR 2021: 66-72 - [c31]Lanier A. Watkins, Nick Sarfaraz, Sebastián A. Zanlongo, Joshua Silbermann, Tyler A. Young, Randall Sleight:
An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety. ICC Workshops 2021: 1-6 - [c30]Karl Siil, Aviel Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier A. Watkins:
Cost-Effective Mission Assurance Engineering Through Simulation. IoTaIS 2021: 67-72 - [c29]James Schaffter, Aviel Rubin, Lanier A. Watkins:
A Containerization-Based Backfit Approach for Industrial Control System Resiliency. SP (Workshops) 2021: 246-252 - 2020
- [c28]Denzel Hamilton, Kevin T. Kornegay, Lanier A. Watkins:
Autonomous Navigation Assurance with Explainable AI and Security Monitoring. AIPR 2020: 1-7 - [c27]Adrian Cartagena, Gerald Rimmer, Thomas van Dalsen, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin:
Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners. CCWC 2020: 494-499 - [c26]Jeffrey S. Chavis, Anna L. Buczak, Aviel D. Rubin, Lanier A. Watkins:
Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning. CCWC 2020: 684-690 - [c25]Lanier A. Watkins, James Ballard, Kevin Hamilton, Jay Chow, Aviel D. Rubin, William H. Robinson, Cleon Davis:
Bio-Inspired, Host-based Firewall. CSE 2020: 86-91 - [c24]Mandira Hegde, Gilles Kepnang, Mashail Al Mazroei, Jeffrey S. Chavis, Lanier A. Watkins:
Identification of Botnet Activity in IoT Network Traffic Using Machine Learning. IDSTA 2020: 21-27 - [c23]Zachary Birnbaum, Matthew Davis, Salman Salman, James Schaffter, Lanier A. Watkins, Saikiran Yamajala, Shruti Paul:
Cyber-Resilient SCADA Systems via Secure State Restoration. Critical Infrastructure Protection 2020: 183-207 - [c22]Karl Siil, Aviel D. Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier A. Watkins:
Mission Assurance for Autonomous Undersea Vehicles. SP (Workshops) 2020: 244-249 - [c21]Jeffrey S. Chavis, Anna L. Buczak, Aaron Kunz, Aviel D. Rubin, Lanier A. Watkins:
A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge. SP (Workshops) 2020: 256-261 - [c20]Lanier A. Watkins, Yue Yu, Sifan Li, William H. Robinson, Aviel D. Rubin:
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks. UEMCON 2020: 292-297 - [c19]Lanier A. Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, Aviel D. Rubin:
A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy. UEMCON 2020: 303-308
2010 – 2019
- 2018
- [c18]Cherita L. Corbett, Jimmy Alexis, Lanier A. Watkins:
Who's driving you? CCNC 2018: 1-4 - [c17]Lanier A. Watkins, Amritha Lal Kalathummarath, William H. Robinson:
Network-based detection of mobile malware exhibiting obfuscated or silent network behavior. CCNC 2018: 1-4 - 2017
- [c16]Nikunj Malik, Jayanarayan Chandramouli, Prahlad Suresh, Kevin D. Fairbanks, Lanier A. Watkins, William H. Robinson:
Using network traffic to verify mobile device forensic artifacts. CCNC 2017: 1-6 - [c15]Nikunj Malik, Jayanarayan Chandramouli, Prahlad Suresh, Kevin D. Fairbanks, Lanier A. Watkins, William H. Robinson:
Using network traffic to verify mobile device forensic artifacts. CCNC 2017: 114-119 - [c14]J. M. Chandramouli, Juan Ramos, Lakshmi Srinivasan, Prahlad Suresh, Prashanth Kannan, Garth V. Crosby, Lanier A. Watkins:
Using network traffic to infer compromised neighbors in wireless sensor nodes. CCNC 2017: 1022-1023 - [c13]Lanier A. Watkins, Sean Beck, Jared Zook, Anna L. Buczak, Jeffrey S. Chavis, William H. Robinson, Jose Andre Morales, Samuel Mishra:
Using semi-supervised machine learning to address the Big Data problem in DNS networks. CCWC 2017: 1-6 - [c12]Anna L. Buczak, Daniel S. Berman, Sean W. Yen, Lanier A. Watkins, Lien T. Duong, Jeffrey S. Chavis:
Using sequential pattern mining for common event format (CEF) cyber data. CISRC 2017: 2:1-2:4 - [c11]Forest C. Mead, Jeffrey M. Zielinski, Lanier A. Watkins, William H. Robinson:
A mobile two-way wireless covert timing channel suitable for peer-to-peer malware. PIMRC 2017: 1-6 - 2016
- [j5]Lanier A. Watkins, John S. Hurley:
The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity. Int. J. Cyber Warf. Terror. 6(3): 43-52 (2016) - [c10]Anna L. Buczak, Paul A. Hanke, George J. Cancro, Michael K. Toma, Lanier A. Watkins, Jeffrey S. Chavis:
Detection of Tunnels in PCAP Data by Random Forests. CISRC 2016: 16:1-16:4 - [c9]Michael Hooper, Yifan Tian, Runxuan Zhou, Bin Cao, Adrian P. Lauf, Lanier A. Watkins, William H. Robinson, Wlajimir Alexis:
Securing commercial WiFi-based UAVs from common security attacks. MILCOM 2016: 1213-1218 - 2015
- [j4]Lanier A. Watkins, William H. Robinson, Raheem A. Beyah:
Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation. ACM Trans. Embed. Comput. Syst. 14(3): 55:1-55:22 (2015) - [c8]Georgios Lontorfos, Kevin D. Fairbanks, Lanier A. Watkins, William H. Robinson:
Remotely inferring device manipulation of industrial control systems via network behavior. LCN Workshops 2015: 603-610 - [c7]Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson:
Using inherent command and control vulnerabilities to halt DDoS attacks. MALWARE 2015: 3-10 - 2014
- [c6]Lanier A. Watkins, Garth V. Crosby, Afsana Sharmin:
Using network traffic to infer power levels in wireless sensor nodes. ICNC 2014: 864-870 - [c5]Mengchao Yue, William H. Robinson, Lanier A. Watkins, Cherita L. Corbett:
Constructing timing-based covert channels in mobile networks by adjusting CPU frequency. HASP@ISCA 2014: 2:1-2:8 - [c4]Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson:
Fighting banking botnets by exploiting inherent command and control vulnerabilities. MALWARE 2014: 93-100 - 2011
- [j3]Lanier A. Watkins, William H. Robinson, Raheem A. Beyah:
A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks. IEEE Trans. Parallel Distributed Syst. 22(12): 2000-2007 (2011) - 2010
- [j2]Lanier A. Watkins, William H. Robinson, Raheem A. Beyah:
A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters. IEEE Trans. Netw. Serv. Manag. 7(4): 218-230 (2010)
2000 – 2009
- 2009
- [j1]Lanier A. Watkins, Raheem A. Beyah, Cherita L. Corbett:
Using link RTT to passively detect unapproved wireless nodes. Int. J. Secur. Networks 4(3): 153-163 (2009) - 2008
- [c3]Lanier A. Watkins, Raheem A. Beyah, Cherita L. Corbett:
Passive Identification of Under-Utilized CPUs in High Performance Cluster Grid Networks. ICC 2008: 408-413 - 2007
- [c2]Lanier A. Watkins, Raheem A. Beyah, Cherita L. Corbett:
A Passive Approach to Rogue Access Point Detection. GLOBECOM 2007: 355-360 - [c1]Lanier A. Watkins, Raheem A. Beyah, Cherita L. Corbett:
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments. GridNets 2007: 16
Coauthor Index
aka: Aviel Rubin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint