A Practical Congestion Attack on Tor Using Long Paths. NS Evans, R Dingledine, C Grothoff USENIX Security Symposium, 33-50, 2009 | 261 | 2009 |
R5n: Randomized recursive routing for restricted-route networks NS Evans, C Grothoff 2011 5th International Conference on Network and System Security, 316-321, 2011 | 54 | 2011 |
Autonomous nat traversal A Muller, N Evans, C Grothoff, S Kamkar 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-4, 2010 | 53* | 2010 |
Routing in the dark: Pitch black NS Evans, C GauthierDickey, C Grothoff Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 38 | 2007 |
Systems and methods for detecting anomalous messages in automobile networks N Evans, A Benameur, Y Shen US Patent 9,843,594, 2017 | 28 | 2017 |
Cloud resiliency and security via diversified replica execution and monitoring A Benameur, NS Evans, MC Elder 2013 6th International Symposium on Resilient Control Systems (ISRCS), 150-155, 2013 | 23 | 2013 |
Systems and methods for detecting discrepancies in automobile-network data Y Shen, N Evans, A Benameur US Patent 9,582,669, 2017 | 22 | 2017 |
Efficient and secure decentralized network size estimation N Evans, B Polot, C Grothoff NETWORKING 2012: 11th International IFIP TC 6 Networking Conference, Prague …, 2012 | 19 | 2012 |
Beyond Simulation:{Large-Scale} Distributed Emulation of {P2P} Protocols NS Evans, C Grothoff 4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011 | 18 | 2011 |
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM A Fessi, N Evans, H Niedermayer, R Holz Principles, Systems and Applications of IP Telecommunications, 134-145, 2010 | 16 | 2010 |
All your root checks are belong to us: The sad state of root detection NS Evans, A Benameur, Y Shen Proceedings of the 13th ACM International Symposium on Mobility Management …, 2015 | 15 | 2015 |
Determining model information of devices based on network device identifiers DM Kienzle, MC Elder, NS Evans US Patent 9,135,293, 2015 | 13 | 2015 |
Lightweight replicas for securing cloud-based services A Benameur, NS Evans US Patent 9,794,275, 2017 | 12 | 2017 |
Insights into rooted and non-rooted android mobile devices with behavior analytics Y Shen, N Evans, A Benameur Proceedings of the 31st Annual ACM Symposium on Applied Computing, 580-587, 2016 | 12 | 2016 |
{Large-Scale} Evaluation of a Vulnerability Analysis Framework NS Evans, A Benameur, M Elder 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014 | 12 | 2014 |
{MINESTRONE}: Testing the {SOUP} A Benameur, NS Evans, MC Elder 6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013 | 10 | 2013 |
Methods for secure decentralized routing in open networks NS Evans Network Architectures and Services, Department of Computer Science, 2011 | 10 | 2011 |
NICE: Network introspection by collaborating endpoints D Kienzle, N Evans, M Elder 2013 IEEE Conference on Communications and Network Security (CNS), 411-412, 2013 | 8 | 2013 |
Systems and methods for enforcing secure software execution A Benameur, N Evans US Patent 9,953,158, 2018 | 7 | 2018 |
A retrospective analysis of user exposure to (illicit) cryptocurrency mining on the web R Holz, D Perino, M Varvello, J Amann, A Continella, N Evans, ... arXiv preprint arXiv:2004.13239, 2020 | 6 | 2020 |