Cristina Nita-Rotaru

Affiliations: 
Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science
Google:
"Cristina Nita-Rotaru"

Children

Sign in to add trainee
Ben Weintraub grad student 2018- Northeastern University
Bogdan Carbunar grad student 2005 Purdue
Mercan K. Topkara grad student 2007 Purdue
Jing Dong grad student 2009 Purdue
David J. Zage grad student 2010 Purdue
Jeffrey C. Seibert grad student 2012 Purdue
Andrew Newell grad student 2014 Purdue
Rahul Potharaju grad student 2014 Purdue
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Jero S, Pacheco ML, Goldwasser D, et al. (2019) Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols Proceedings of the Aaai Conference On Artificial Intelligence. 33: 9478-9483
Kakhki AM, Jero S, Choffnes D, et al. (2019) Taking a long look at QUIC Communications of the Acm. 62: 86-94
Hoque E, Lee H, Potharaju R, et al. (2016) Automated Adversarial Testing of Unmodified Wireless Routing Implementations Ieee/Acm Transactions On Networking
Obenshain D, Tantillo T, Babay A, et al. (2016) Practical Intrusion-Tolerant Networks Proceedings - International Conference On Distributed Computing Systems. 2016: 45-56
Ghica OC, Nita-Rotaru C, Trajcevski G, et al. (2016) Security of electrostatic field persistent routing: Attacks and defense mechanisms Ad Hoc Networks. 36: 270-295
Lee H, Seibert J, Fistrovic D, et al. (2015) Gatling: Automatic performance attack discovery in large-scale distributed systems Acm Transactions On Information and System Security. 17
Newell A, Obenshain D, Tantillo T, et al. (2015) Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes Ieee Transactions On Dependable and Secure Computing. 12: 602-614
Jero S, Lee H, Nita-Rotaru C. (2015) Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations Proceedings of the International Conference On Dependable Systems and Networks. 2015: 1-12
Hoque E, Potharaju R, Nita-Rotaru C, et al. (2015) Taming epidemic outbreaks in mobile adhoc networks Ad Hoc Networks. 24: 57-72
Potharaju R, Chan J, Hu L, et al. (2015) Confseer: Leveraging customer support knowledge bases for automated misconfiguration detection Proceedings of the Vldb Endowment. 8: 1828-1839
See more...