Nikita Borisov
Affiliations: | University of Illinois, Urbana-Champaign, Urbana-Champaign, IL |
Area:
Computer ScienceGoogle:
"Nikita Borisov"Children
Sign in to add traineeRobin A. Snader | grad student | 2009 | UIUC |
Nabil A. Schear | grad student | 2011 | UIUC |
Amir Houmansadr | grad student | 2012 | UIUC |
Sonia Jahid | grad student | 2013 | UIUC |
Qiyan Wang | grad student | 2013 | UIUC |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Houmansadr A, Zhou W, Caesar M, et al. (2017) SWEET: Serving the Web by Exploiting Email Tunnels Ieee Acm Transactions On Networking. 25: 1517-1527 |
Das A, Borisov N, Caesar M. (2014) Analyzing an adaptive reputation metric for anonymity systems Acm International Conference Proceeding Series |
Houmansadr A, Kiyavash N, Borisov N. (2014) Non-blind watermarking of network flows Ieee/Acm Transactions On Networking. 22: 1232-1244 |
Houmansadr A, Borisov N. (2013) BotMosaic: Collaborative network watermark for the detection of IRC-based botnets Journal of Systems and Software. 86: 707-715 |
Zonouz S, Houmansadr A, Berthier R, et al. (2013) Secloud: A cloud-based comprehensive and lightweight security solution for smartphones Computers & Security. 37: 215-227 |
Houmansadr A, Borisov N. (2013) The need for flow fingerprints to link correlated network flows Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7981: 205-224 |
Jahid S, Mittal P, Borisov N. (2011) EASiER: Encryption-based access control in social networks with efficient revocation Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 411-415 |
Snader R, Borisov N. (2011) Improving security and performance in the tor network through tunable path selection Ieee Transactions On Dependable and Secure Computing. 8: 728-741 |
Houmansadr A, Borisov N. (2011) Towards improving network flow watermarks using the repeat-accumulate codes Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 1852-1855 |
Houmansadr A, Borisov N. (2011) CoCo: Coding-based covert timing channels for network flows Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6958: 314-328 |