Følg
Nathan S. Evans
Nathan S. Evans
Associate Teaching Professor/Faculty Directory Cybersecurity, University of Denver
Verificeret mail på du.edu
Titel
Citeret af
Citeret af
År
A Practical Congestion Attack on Tor Using Long Paths.
NS Evans, R Dingledine, C Grothoff
USENIX Security Symposium, 33-50, 2009
2642009
Autonomous nat traversal
A Muller, N Evans, C Grothoff, S Kamkar
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-4, 2010
54*2010
R5n: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
2011 5th International Conference on Network and System Security, 316-321, 2011
532011
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
382007
Systems and methods for detecting anomalous messages in automobile networks
N Evans, A Benameur, Y Shen
US Patent 9,843,594, 2017
312017
Systems and methods for detecting discrepancies in automobile-network data
Y Shen, N Evans, A Benameur
US Patent 9,582,669, 2017
262017
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
2013 6th International Symposium on Resilient Control Systems (ISRCS), 150-155, 2013
232013
Efficient and secure decentralized network size estimation
N Evans, B Polot, C Grothoff
NETWORKING 2012: 11th International IFIP TC 6 Networking Conference, Prague …, 2012
202012
All your root checks are belong to us: The sad state of root detection
NS Evans, A Benameur, Y Shen
Proceedings of the 13th ACM International Symposium on Mobility Management …, 2015
182015
Beyond Simulation:{Large-Scale} Distributed Emulation of {P2P} Protocols
NS Evans, C Grothoff
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
182011
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
A Fessi, N Evans, H Niedermayer, R Holz
Principles, Systems and Applications of IP Telecommunications, 134-145, 2010
152010
Lightweight replicas for securing cloud-based services
A Benameur, NS Evans
US Patent 9,794,275, 2017
132017
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
132015
{Large-Scale} Evaluation of a Vulnerability Analysis Framework
NS Evans, A Benameur, M Elder
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
132014
Insights into rooted and non-rooted android mobile devices with behavior analytics
Y Shen, N Evans, A Benameur
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 580-587, 2016
112016
{MINESTRONE}: Testing the {SOUP}
A Benameur, NS Evans, MC Elder
6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013
102013
Methods for secure decentralized routing in open networks
NS Evans
Network Architectures and Services, Department of Computer Science, 2011
102011
Systems and methods for performing application container introspection
N Evans, A Benameur
US Patent 10,447,720, 2019
82019
Systems and methods for enforcing secure software execution
A Benameur, N Evans
US Patent 9,953,158, 2018
82018
A retrospective analysis of user exposure to (illicit) cryptocurrency mining on the web
R Holz, D Perino, M Varvello, J Amann, A Continella, N Evans, ...
arXiv preprint arXiv:2004.13239, 2020
72020
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20