Nathan S. Evans

According to our database1, Nathan S. Evans authored at least 15 papers between 2007 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Insights into rooted and non-rooted Android mobile devices with behavior analytics.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
All your Root Checks are Belong to Us: The Sad State of Root Detection.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015

2014
Large-Scale Evaluation of a Vulnerability Analysis Framework.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

NICE: endpoint-based topology discovery.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
MINESTRONE: Testing the SOUP.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

NICE: Network Introspection by Collaborating Endpoints.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Efficient and Secure Decentralized Network Size Estimation.
Proceedings of the NETWORKING 2012, 2012

2011
Methods for secure decentralized routing in open networks.
PhD thesis, 2011

Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

R<sup>5</sup>N: Randomized recursive routing for restricted-route networks.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Simplifying parallel and distributed simulation with the DUP system.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Autonomous NAT Traversal.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Distributed Stream Processing with DUP.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

2009
A Practical Congestion Attack on Tor Using Long Paths.
Proceedings of the 18th USENIX Security Symposium, 2009

2007
Routing in the Dark: Pitch Black.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007


  Loading...