Cristina Nita-Rotaru
Affiliations: | Computer Sciences | Purdue University, West Lafayette, IN, United States |
Area:
Computer ScienceGoogle:
"Cristina Nita-Rotaru"Children
Sign in to add traineeBen Weintraub | grad student | 2018- | Northeastern University |
Bogdan Carbunar | grad student | 2005 | Purdue |
Mercan K. Topkara | grad student | 2007 | Purdue |
Jing Dong | grad student | 2009 | Purdue |
David J. Zage | grad student | 2010 | Purdue |
Jeffrey C. Seibert | grad student | 2012 | Purdue |
Andrew Newell | grad student | 2014 | Purdue |
Rahul Potharaju | grad student | 2014 | Purdue |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Jero S, Pacheco ML, Goldwasser D, et al. (2019) Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols Proceedings of the Aaai Conference On Artificial Intelligence. 33: 9478-9483 |
Kakhki AM, Jero S, Choffnes D, et al. (2019) Taking a long look at QUIC Communications of the Acm. 62: 86-94 |
Hoque E, Lee H, Potharaju R, et al. (2016) Automated Adversarial Testing of Unmodified Wireless Routing Implementations Ieee/Acm Transactions On Networking |
Obenshain D, Tantillo T, Babay A, et al. (2016) Practical Intrusion-Tolerant Networks Proceedings - International Conference On Distributed Computing Systems. 2016: 45-56 |
Ghica OC, Nita-Rotaru C, Trajcevski G, et al. (2016) Security of electrostatic field persistent routing: Attacks and defense mechanisms Ad Hoc Networks. 36: 270-295 |
Lee H, Seibert J, Fistrovic D, et al. (2015) Gatling: Automatic performance attack discovery in large-scale distributed systems Acm Transactions On Information and System Security. 17 |
Newell A, Obenshain D, Tantillo T, et al. (2015) Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes Ieee Transactions On Dependable and Secure Computing. 12: 602-614 |
Jero S, Lee H, Nita-Rotaru C. (2015) Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations Proceedings of the International Conference On Dependable Systems and Networks. 2015: 1-12 |
Hoque E, Potharaju R, Nita-Rotaru C, et al. (2015) Taming epidemic outbreaks in mobile adhoc networks Ad Hoc Networks. 24: 57-72 |
Potharaju R, Chan J, Hu L, et al. (2015) Confseer: Leveraging customer support knowledge bases for automated misconfiguration detection Proceedings of the Vldb Endowment. 8: 1828-1839 |