OpenFlow vulnerability assessment K Benton, LJ Camp, C Small Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013 | 421 | 2013 |
Studying the effectiveness of android application permissions requests K Benton, LJ Camp, V Garg 2013 IEEE international conference on pervasive computing and communications …, 2013 | 83 | 2013 |
The privacy paradox: A Facebook case study V Garg, K Benton, LJ Camp 2014 TPRC conference paper, 2014 | 42 | 2014 |
The evolution of 802.11 wireless security K Benton University of Nevada, Las Vegas, Informatics-Spring, 2010 | 38 | 2010 |
Timing analysis of ssl/tls man in the middle attacks K Benton, T Bross arXiv preprint arXiv:1308.3559, 2013 | 16 | 2013 |
Collaborating with the enemy on network management C Hall, D Yu, Z Zhang, J Stout, A Odlyzko, AW Moore, J Camp, K Benton, ... Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014 | 12 | 2014 |
Signaturecheck: a protocol to detect man-in-the-middle attack in ssl K Benton, J Jo, Y Kim Proceedings of the seventh annual workshop on cyber security and information …, 2011 | 11 | 2011 |
Firewalling scenic routes: preventing data exfiltration via political and geographic routing policies K Benton, LJ Camp Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016 | 9 | 2016 |
Filtering ip source spoofing using feasible path reverse path forwarding with sdn K Benton, LJ Camp, T Kelley, M Swany 2015 IEEE Conference on Communications and Network Security (CNS), 733-734, 2015 | 7 | 2015 |
Bongo: A BGP speaker built for defending against bad routes K Benton, LJ Camp, M Swany MILCOM 2016-2016 IEEE Military Communications Conference, 735-739, 2016 | 6 | 2016 |
Examining the Jurisdictions of Internet Routes to Prevent Data Exfiltration K Benton, J Camp TPRC, 2016 | 4 | 2016 |
Securing the Internet Control Plane K Benton Indiana University, 2017 | 1 | 2017 |
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN K Benton, LJ Camp, T Kelley, M Swany International Journal of Computer and Communication Engineering 5 (6), 441, 2016 | | 2016 |
Towards Commodity Network Hardware in Tactical Naval Environments R Templeman, K Benton Electric Machines Technology Symposium (EMTS), 2014 | | 2014 |