Chase Cotton

Orcid: 0000-0001-6218-1327

According to our database1, Chase Cotton authored at least 24 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning.
CoRR, 2023

2022
Shining a light on dark places: A comprehensive analysis of open proxy ecosystem.
Comput. Networks, 2022

Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
A novel LSTM-CNN-grid search-based deep neural network for sentiment analysis.
J. Supercomput., 2021

Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Intelligence in cyberspace: the road to cyber singularity.
J. Exp. Theor. Artif. Intell., 2021

Understanding the Impact of Encrypted DNS on Internet Censorship.
Proceedings of the WWW '21: The Web Conference 2021, 2021

A Comprehensive Measurement-based Investigation of DNS Hijacking.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

DNSonChain: Delegating Privacy-Preserved DNS Resolution to Blockchain.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Detecting Attacks on IoT Devices using Featureless 1D-CNN.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

An Exploration of ARM System-Level Cache and GPU Side Channels.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A network security classifier defense: against adversarial machine learning attacks.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

2019
Towards passive analysis of anycast in global routing: unintended impact of remote peering.
Comput. Commun. Rev., 2019

Detection of Encrypted Malicious Network Traffic using Machine Learning.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

An investigation on information leakage of DNS over TLS.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

2018
Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2015
Next generation resilient redundant router.
Proceedings of the 16th IEEE International Conference on High Performance Switching and Routing, 2015

A routing based resource registry.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2015

2014
A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

2013

2011
Routers for the Cloud: Can the Internet Achieve 5-Nines Availability?
IEEE Internet Comput., 2011

2003
Packet-level traffic measurements from the Sprint IP backbone.
IEEE Netw., 2003


  Loading...