Cristina Nita-Rotaru - Publications

Affiliations: 
Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

70 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Jero S, Pacheco ML, Goldwasser D, Nita-Rotaru C. Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols Proceedings of the Aaai Conference On Artificial Intelligence. 33: 9478-9483. DOI: 10.1609/aaai.v33i01.33019478  0.321
2019 Kakhki AM, Jero S, Choffnes D, Nita-Rotaru C, Mislove A. Taking a long look at QUIC Communications of the Acm. 62: 86-94. DOI: 10.1145/3330336  0.417
2016 Hoque E, Lee H, Potharaju R, Killian C, Nita-Rotaru C. Automated Adversarial Testing of Unmodified Wireless Routing Implementations Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2016.2520474  0.765
2016 Obenshain D, Tantillo T, Babay A, Schultz J, Newell A, Hoque ME, Amir Y, Nita-Rotaru C. Practical Intrusion-Tolerant Networks Proceedings - International Conference On Distributed Computing Systems. 2016: 45-56. DOI: 10.1109/ICDCS.2016.99  0.374
2016 Ghica OC, Nita-Rotaru C, Trajcevski G, Scheuermann P. Security of electrostatic field persistent routing: Attacks and defense mechanisms Ad Hoc Networks. 36: 270-295. DOI: 10.1016/j.adhoc.2015.07.016  0.31
2015 Lee H, Seibert J, Fistrovic D, Killian C, Nita-Rotaru C. Gatling: Automatic performance attack discovery in large-scale distributed systems Acm Transactions On Information and System Security. 17. DOI: 10.1145/2714565  0.474
2015 Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y. Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes Ieee Transactions On Dependable and Secure Computing. 12: 602-614. DOI: 10.1109/Tdsc.2014.2373392  0.733
2015 Jero S, Lee H, Nita-Rotaru C. Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations Proceedings of the International Conference On Dependable Systems and Networks. 2015: 1-12. DOI: 10.1109/DSN.2015.22  0.33
2015 Hoque E, Potharaju R, Nita-Rotaru C, Sarkar S, Venkatesh SS. Taming epidemic outbreaks in mobile adhoc networks Ad Hoc Networks. 24: 57-72. DOI: 10.1016/j.adhoc.2014.07.031  0.719
2015 Potharaju R, Chan J, Hu L, Nita-Rotaru C, Wang M, Zhang L, Jain N. Confseer: Leveraging customer support knowledge bases for automated misconfiguration detection Proceedings of the Vldb Endowment. 8: 1828-1839.  0.69
2014 Newell A, Potharaju R, Xiang L, Nita-Rotaru C. On the practicality of integrity attacks on document-level sentiment analysis Proceedings of the Acm Conference On Computer and Communications Security. 2014: 83-93. DOI: 10.1145/2666652.2666661  0.675
2014 Newell A, Yao H, Ryker A, Ho T, Nita-Rotaru C. Node-capture resilient key establishment in sensor networks: Design space and new protocols Acm Computing Surveys. 47. DOI: 10.1145/2636344  0.645
2014 Seibert J, Becker S, Nita-Rotaru C, State R. Newton: Securing virtual coordinates by enforcing physical laws Ieee/Acm Transactions On Networking. 22: 798-811. DOI: 10.1109/Tnet.2013.2264725  0.403
2014 Gates CS, Li N, Peng H, Sarma B, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Generating summary risk scores for mobile applications Ieee Transactions On Dependable and Secure Computing. 11: 238-251. DOI: 10.1109/Tdsc.2014.2302293  0.709
2014 Lee H, Seibert J, Hoque E, Killian C, Nita-Rotaru C. Turret: A platform for automated attack finding in unmodified distributed system implementations Proceedings - International Conference On Distributed Computing Systems. 660-669. DOI: 10.1109/ICDCS.2014.73  0.345
2013 Newell A, Dong J, Nita-Rotaru C. On the practicality of cryptographic defences against pollution attacks in wireless network coding Acm Computing Surveys. 45. DOI: 10.1145/2480741.2480756  0.666
2013 Hoque ME, Lee H, Potharaju R, Killian CE, Nita-Rotaru C. Adversarial testing of wireless routing implementations Wisec 2013 - Proceedings of the 6th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 143-148. DOI: 10.1145/2462096.2462120  0.772
2013 Paris S, Nita-Rotaru C, Martignon F, Capone A. Cross-layer metrics for reliable routing in wireless mesh networks Ieee/Acm Transactions On Networking. 21: 1003-1016. DOI: 10.1109/Tnet.2012.2230337  0.455
2013 Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y. Increasing network resiliency by optimally assigning diverse variants to routing nodes Proceedings of the International Conference On Dependable Systems and Networks. DOI: 10.1109/DSN.2013.6575305  0.611
2012 Peng H, Gates C, Sarma B, Li N, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Using probabilistic generative models for ranking risks of Android apps Proceedings of the Acm Conference On Computer and Communications Security. 241-252. DOI: 10.1145/2382196.2382224  0.656
2012 Sarma B, Li N, Gates C, Potharaju R, Nita-Rotaru C, Molloy I. Android permissions: A perspective combining risks and benefits Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 13-22. DOI: 10.1145/2295136.2295141  0.698
2012 Seibert J, Torres R, Mellia M, Munafo MM, Nita-Rotaru C, Rao S. The Internet-Wide Impact of P2P Traffic Localization on ISP Profitability Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2012.2190093  0.317
2012 Dong J, Curtmola R, Nita-Rotaru C, Yau DKY. Pollution attacks and defenses in wireless interflow network coding systems Ieee Transactions On Dependable and Secure Computing. 9: 741-755. DOI: 10.1109/TDSC.2012.39  0.391
2012 Potharaju R, Hoque E, Nita-Rotaru C, Sarkar S, Venkatesh SS. Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks Mass 2012 - 9th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 200-208. DOI: 10.1109/MASS.2012.6502518  0.716
2012 Potharaju R, Newell A, Nita-Rotaru C, Zhang X. Plagiarizing smartphone applications: Attack strategies and defense techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7159: 106-120. DOI: 10.1007/978-3-642-28166-2_11  0.696
2011 Dong J, Curtmola R, Nita-Rotaru C. Practical defenses against pollution attacks in wireless network coding Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952989  0.579
2011 Potharaju R, Nita-Rotaru C. Pandora Acm Sigmobile Mobile Computing and Communications Review. 14: 16. DOI: 10.1145/1942268.1942275  0.674
2011 Dong J, Curtmola R, Nita-Rotaru C. Secure high-throughput multicast routing in wireless mesh networks Ieee Transactions On Mobile Computing. 10: 653-668. DOI: 10.1109/Tmc.2010.194  0.601
2011 Paris S, Nita-Rotaru C, Martignon F, Capone A. EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants Proceedings - Ieee Infocom. 576-580. DOI: 10.1109/INFCOM.2011.5935230  0.363
2011 Zage D, Killian C, Nita-Rotaru C. Removing the blinders: Using information to mitigate adversaries in adaptive overlays Proceedings - 2011 5th International Conference On Network and System Security, Nss 2011. 129-136. DOI: 10.1109/ICNSS.2011.6059969  0.384
2011 Yao H, Ho T, Nita-Rotaru C. Key agreement for wireless networks in the presence of active adversaries Conference Record - Asilomar Conference On Signals, Systems and Computers. 792-796. DOI: 10.1109/ACSSC.2011.6190115  0.318
2011 Seibert J, Sun X, Nita-Rotaru C, Rao S. A design for securing data delivery in mesh-based peer-to-peer streaming Computer Networks. 55: 2730-2745. DOI: 10.1016/J.Comnet.2011.05.016  0.408
2011 Becker S, Seibert J, Nita-Rotaru C, State R. Securing application-level topology estimation networks: Facing the frog-boiling attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 201-221. DOI: 10.1007/978-3-642-23644-0_11  0.441
2011 Potharaju R, Seibert J, Fahmy S, Nita-Rotaru C. Omnify: Investigating the visibility and effectiveness of copyright monitors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6579: 122-132. DOI: 10.1007/978-3-642-19260-9_13  0.71
2010 Paris S, Capone A, Nita-Rotaru C, Martignon F. A cross-layer reliability metric for wireless mesh networks with selfish participants Acm Sigmobile Mobile Computing and Communications Review. 14: 1. DOI: 10.1145/1923641.1923643  0.465
2010 Zage D, Nita-Rotaru C. Robust decentralized virtual coordinate systems in adversarial environments Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880032  0.798
2010 Potharaju R, Carbunar B, Nita-Rotaru C. IFriendU: Leveraging 3-cliques to enhance infiltration attacks in online social networks Proceedings of the Acm Conference On Computer and Communications Security. 723-725. DOI: 10.1145/1866307.1866410  0.769
2010 Dong J, Ackermann KE, Bavar B, Nita-Rotaru C. Secure and robust Virtual Coordinate System in wireless sensor networks Acm Transactions On Sensor Networks. 6. DOI: 10.1145/1777406.1777408  0.587
2010 Curtmola R, Dong J, Nita-Rotaru C. Tradeoffs between security and communication performance in wireless mesh networks 2010 Ieee International Symposium On "a World of Wireless, Mobile and Multimedia Networks", Wowmom 2010 - Digital Proceedings. DOI: 10.1109/WOWMOM.2010.5535005  0.379
2010 Dong J, Curtmola R, Nita-Rotaru C, Yau D. Pollution attacks and defenses in wireless inter-flow network coding systems 2010 3rd Ieee International Workshop On Wireless Network Coding, Winc 2010. 1-6. DOI: 10.1109/Tdsc.2012.39  0.517
2010 Amir Y, Danilov C, Dolev D, Kirsch J, Lane J, Nita-Rotaru C, Olsen J, Zage D. Steward: Scaling byzantine fault-Tolerant replication to wide area networks Ieee Transactions On Dependable and Secure Computing. 7: 80-93. DOI: 10.1109/Tdsc.2008.53  0.712
2010 Seibert J, Sun X, Nita-Rotaru C, Rao S. Towards securing data delivery in peer-to-peer streaming 2010 2nd International Conference On Communication Systems and Networks, Comsnets 2010. DOI: 10.1109/COMSNETS.2010.5431991  0.36
2010 Wetzel S, Stajano F, Nita-Rotaru C. WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security: Foreword Wisec'10 - Proceedings of the 3rd Acm Conference On Wireless Network Security 0.366
2009 Hoffman K, Zage D, Nita-Rotaru C. A survey of attack and defense techniques for reputation systems Acm Computing Surveys. 42. DOI: 10.1145/1592451.1592452  0.758
2009 Dong J, Curtmola R, Nita-Rotaru C. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 111-122. DOI: 10.1145/1514274.1514292  0.382
2009 Curtmola R, Nita-Rotaru C. BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks Ieee Transactions On Mobile Computing. 8: 445-459. DOI: 10.1109/TMC.2008.134  0.433
2009 Nita-Rotaru C, Carbunar B, Ioannis I. JANUS: A framework for scalable and secure routing in hybrid Wireless networks Ieee Transactions On Dependable and Secure Computing. 6: 295-308. DOI: 10.1109/Tdsc.2008.14  0.744
2009 Dong J, Curtmola R, Nita-Rotaru C. Secure network coding for wireless mesh networks: Threats, challenges, and directions Computer Communications. 32: 1790-1801. DOI: 10.1016/J.Comcom.2009.07.010  0.561
2008 Dong J, Ackermann KE, Bavar B, Nita-Rotaru C. Mitigating attacks against virtual coordinate based routing in wireless sensor networks Wisec'08: Proceedings of the 1st Acm Conference On Wireless Network Security. 89-99. DOI: 10.1145/1352533.1352548  0.383
2008 Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks Acm Transactions On Information and System Security. 10. DOI: 10.1145/1284680.1341892  0.523
2008 Dong J, Ackermann KE, Nita-Rotaru C. Secure group communication in wireless mesh networks 2008 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom2008. DOI: 10.1109/WOWMOM.2008.4594843  0.374
2008 Jing D, Curtmola R, Nita-Rotaru C. On the pitfalls of high-throughput multicast metrics in adversarial wireless mesh networks 2008 5th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 224-232. DOI: 10.1109/SAHCN.2008.36  0.409
2008 Dong J, Curtmola R, Sethi R, Nita-Rotaru C. Toward secure network coding in wireless networks: Threats and challenges 4th Ieee Workshop On Secure Network Protocols, Npsec'08. 33-38. DOI: 10.1109/NPSEC.2008.4664878  0.358
2008 Seibert J, Zage D, Fahmy S, Nita-Rotaru C. Experimental comparison of peer-to-peer streaming overlays: An application perspective Proceedings - Conference On Local Computer Networks, Lcn. 20-27. DOI: 10.1109/LCN.2008.4664147  0.329
2007 Zage DJ, Nita-Rotaru C. On the accuracy of decentralized virtual coordinate systems in adversarial networks Proceedings of the Acm Conference On Computer and Communications Security. 214-224. DOI: 10.1145/1315245.1315273  0.8
2007 Curtmola R, Nita-Rotaru C. Secure multicast routing in wireless networks Acm Sigmobile Mobile Computing and Communications Review. 11: 55-56. DOI: 10.1145/1282221.1282233  0.497
2007 Curtmola R, Nita-Rotaru C. BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks 2007 4th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 263-272. DOI: 10.1109/Tmc.2008.134  0.508
2007 Torres R, Xin S, Walters A, Nita-Rotaru C, Rao S. Enabling confidentiality of data delivery in an overlay broadcasting system Ieee Journal On Selected Areas in Communications. 25: 1732-1744. DOI: 10.1109/Jsac.2007.071211  0.4
2006 Wu X, Nita-Rotaru C. Po2V: Network layer position verification in multi-hop wireless networks Proceedings - Wowmom 2006: 2006 International Symposium On a World of Wireless, Mobile and Multimedia Networks. 2006: 150-158. DOI: 10.1109/WOWMOM.2006.88  0.33
2006 Walters A, Zage D, Nita-Rotaru C. Mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks Proceedings - International Conference On Network Protocols, Icnp. 65-74. DOI: 10.1109/ICNP.2006.320199  0.391
2006 Amir Y, Danilov C, Dolev D, Kirsch J, Lane J, Nita-Rotaru C, Olsen J, Zage D. Scaling Byzantine fault-tolerant replication to wide area networks Proceedings of the International Conference On Dependable Systems and Networks. 2006: 105-114. DOI: 10.1109/DSN.2006.63  0.79
2005 Walters A, Nita-Rotaru C. Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networks Proceedings of the 20th Acm Symposium On Operating Systems Principles, Sosp 2005. DOI: 10.1145/1095810.1118578  0.36
2005 Ioannidis I, Carbunar B, Nita-Rotaru C. High throughput routing in hybrid cellular and Ad-Hoc networks Proceedings - 6th Ieee International Symposium On a World of Wireless Mobile and Multimedia Networks, Wowmom 2005. 171-176. DOI: 10.1109/WOWMOM.2005.51  0.68
2005 Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Secure spread: An integrated architecture for secure group communication Ieee Transactions On Dependable and Secure Computing. 2: 248-261. DOI: 10.1109/Tdsc.2005.39  0.659
2004 Amir Y, Kim Y, Nita-Rotaru C, Schultz JL, Stanton J, Tsudik G. Secure group communication using robust contributory key agreement Ieee Transactions On Parallel and Distributed Systems. 15: 468-480. DOI: 10.1109/Tpds.2004.1278104  0.652
2004 Carbunar B, Ioannidis I, Nita-Rotaru C. JANUS: Towards robust and malicious resilient routing in hybrid wireless networks Proceedings of the 2004 Acm Workshop On Wireless Security, Wise. 11-20.  0.702
2003 Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Scaling secure group communication systems: Beyond peer-to-peer Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 226-237. DOI: 10.1109/DISCEX.2003.1194887  0.633
2002 Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols Proceedings - International Conference On Distributed Computing Systems. 463-464. DOI: 10.1145/1015040.1015045  0.661
2001 Amir Y, Nita-Rotaru C, Stanton JR. Framework for authentication and access control of client-server group communication systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2233: 128-140. DOI: 10.1007/3-540-45546-9_10  0.788
2001 Amir Y, Kim Y, Nita-Rotaru C, Schultz J, Stanton J, Tsudik G. Exploring robustness in group key agreement Proceedings - International Conference On Distributed Computing Systems. 399-408.  0.627
Show low-probability matches.