Nikita Borisov

Affiliations: 
University of Illinois, Urbana-Champaign, Urbana-Champaign, IL 
Area:
Computer Science
Google:
"Nikita Borisov"

Children

Sign in to add trainee
Robin A. Snader grad student 2009 UIUC
Nabil A. Schear grad student 2011 UIUC
Amir Houmansadr grad student 2012 UIUC
Sonia Jahid grad student 2013 UIUC
Qiyan Wang grad student 2013 UIUC
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Houmansadr A, Zhou W, Caesar M, et al. (2017) SWEET: Serving the Web by Exploiting Email Tunnels Ieee Acm Transactions On Networking. 25: 1517-1527
Das A, Borisov N, Caesar M. (2014) Analyzing an adaptive reputation metric for anonymity systems Acm International Conference Proceeding Series
Houmansadr A, Kiyavash N, Borisov N. (2014) Non-blind watermarking of network flows Ieee/Acm Transactions On Networking. 22: 1232-1244
Houmansadr A, Borisov N. (2013) BotMosaic: Collaborative network watermark for the detection of IRC-based botnets Journal of Systems and Software. 86: 707-715
Zonouz S, Houmansadr A, Berthier R, et al. (2013) Secloud: A cloud-based comprehensive and lightweight security solution for smartphones Computers & Security. 37: 215-227
Houmansadr A, Borisov N. (2013) The need for flow fingerprints to link correlated network flows Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7981: 205-224
Jahid S, Mittal P, Borisov N. (2011) EASiER: Encryption-based access control in social networks with efficient revocation Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 411-415
Snader R, Borisov N. (2011) Improving security and performance in the tor network through tunable path selection Ieee Transactions On Dependable and Secure Computing. 8: 728-741
Houmansadr A, Borisov N. (2011) Towards improving network flow watermarks using the repeat-accumulate codes Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 1852-1855
Houmansadr A, Borisov N. (2011) CoCo: Coding-based covert timing channels for network flows Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6958: 314-328
See more...