Year |
Citation |
Score |
2019 |
Jero S, Pacheco ML, Goldwasser D, Nita-Rotaru C. Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols Proceedings of the Aaai Conference On Artificial Intelligence. 33: 9478-9483. DOI: 10.1609/aaai.v33i01.33019478 |
0.321 |
|
2019 |
Kakhki AM, Jero S, Choffnes D, Nita-Rotaru C, Mislove A. Taking a long look at QUIC Communications of the Acm. 62: 86-94. DOI: 10.1145/3330336 |
0.417 |
|
2016 |
Hoque E, Lee H, Potharaju R, Killian C, Nita-Rotaru C. Automated Adversarial Testing of Unmodified Wireless Routing Implementations Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2016.2520474 |
0.765 |
|
2016 |
Obenshain D, Tantillo T, Babay A, Schultz J, Newell A, Hoque ME, Amir Y, Nita-Rotaru C. Practical Intrusion-Tolerant Networks Proceedings - International Conference On Distributed Computing Systems. 2016: 45-56. DOI: 10.1109/ICDCS.2016.99 |
0.374 |
|
2016 |
Ghica OC, Nita-Rotaru C, Trajcevski G, Scheuermann P. Security of electrostatic field persistent routing: Attacks and defense mechanisms Ad Hoc Networks. 36: 270-295. DOI: 10.1016/j.adhoc.2015.07.016 |
0.31 |
|
2015 |
Lee H, Seibert J, Fistrovic D, Killian C, Nita-Rotaru C. Gatling: Automatic performance attack discovery in large-scale distributed systems Acm Transactions On Information and System Security. 17. DOI: 10.1145/2714565 |
0.474 |
|
2015 |
Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y. Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes Ieee Transactions On Dependable and Secure Computing. 12: 602-614. DOI: 10.1109/Tdsc.2014.2373392 |
0.733 |
|
2015 |
Jero S, Lee H, Nita-Rotaru C. Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations Proceedings of the International Conference On Dependable Systems and Networks. 2015: 1-12. DOI: 10.1109/DSN.2015.22 |
0.33 |
|
2015 |
Hoque E, Potharaju R, Nita-Rotaru C, Sarkar S, Venkatesh SS. Taming epidemic outbreaks in mobile adhoc networks Ad Hoc Networks. 24: 57-72. DOI: 10.1016/j.adhoc.2014.07.031 |
0.719 |
|
2015 |
Potharaju R, Chan J, Hu L, Nita-Rotaru C, Wang M, Zhang L, Jain N. Confseer: Leveraging customer support knowledge bases for automated misconfiguration detection Proceedings of the Vldb Endowment. 8: 1828-1839. |
0.69 |
|
2014 |
Newell A, Potharaju R, Xiang L, Nita-Rotaru C. On the practicality of integrity attacks on document-level sentiment analysis Proceedings of the Acm Conference On Computer and Communications Security. 2014: 83-93. DOI: 10.1145/2666652.2666661 |
0.675 |
|
2014 |
Newell A, Yao H, Ryker A, Ho T, Nita-Rotaru C. Node-capture resilient key establishment in sensor networks: Design space and new protocols Acm Computing Surveys. 47. DOI: 10.1145/2636344 |
0.645 |
|
2014 |
Seibert J, Becker S, Nita-Rotaru C, State R. Newton: Securing virtual coordinates by enforcing physical laws Ieee/Acm Transactions On Networking. 22: 798-811. DOI: 10.1109/Tnet.2013.2264725 |
0.403 |
|
2014 |
Gates CS, Li N, Peng H, Sarma B, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Generating summary risk scores for mobile applications Ieee Transactions On Dependable and Secure Computing. 11: 238-251. DOI: 10.1109/Tdsc.2014.2302293 |
0.709 |
|
2014 |
Lee H, Seibert J, Hoque E, Killian C, Nita-Rotaru C. Turret: A platform for automated attack finding in unmodified distributed system implementations Proceedings - International Conference On Distributed Computing Systems. 660-669. DOI: 10.1109/ICDCS.2014.73 |
0.345 |
|
2013 |
Newell A, Dong J, Nita-Rotaru C. On the practicality of cryptographic defences against pollution attacks in wireless network coding Acm Computing Surveys. 45. DOI: 10.1145/2480741.2480756 |
0.666 |
|
2013 |
Hoque ME, Lee H, Potharaju R, Killian CE, Nita-Rotaru C. Adversarial testing of wireless routing implementations Wisec 2013 - Proceedings of the 6th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 143-148. DOI: 10.1145/2462096.2462120 |
0.772 |
|
2013 |
Paris S, Nita-Rotaru C, Martignon F, Capone A. Cross-layer metrics for reliable routing in wireless mesh networks Ieee/Acm Transactions On Networking. 21: 1003-1016. DOI: 10.1109/Tnet.2012.2230337 |
0.455 |
|
2013 |
Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y. Increasing network resiliency by optimally assigning diverse variants to routing nodes Proceedings of the International Conference On Dependable Systems and Networks. DOI: 10.1109/DSN.2013.6575305 |
0.611 |
|
2012 |
Peng H, Gates C, Sarma B, Li N, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Using probabilistic generative models for ranking risks of Android apps Proceedings of the Acm Conference On Computer and Communications Security. 241-252. DOI: 10.1145/2382196.2382224 |
0.656 |
|
2012 |
Sarma B, Li N, Gates C, Potharaju R, Nita-Rotaru C, Molloy I. Android permissions: A perspective combining risks and benefits Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 13-22. DOI: 10.1145/2295136.2295141 |
0.698 |
|
2012 |
Seibert J, Torres R, Mellia M, Munafo MM, Nita-Rotaru C, Rao S. The Internet-Wide Impact of P2P Traffic Localization on ISP Profitability Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2012.2190093 |
0.317 |
|
2012 |
Dong J, Curtmola R, Nita-Rotaru C, Yau DKY. Pollution attacks and defenses in wireless interflow network coding systems Ieee Transactions On Dependable and Secure Computing. 9: 741-755. DOI: 10.1109/TDSC.2012.39 |
0.391 |
|
2012 |
Potharaju R, Hoque E, Nita-Rotaru C, Sarkar S, Venkatesh SS. Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks Mass 2012 - 9th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 200-208. DOI: 10.1109/MASS.2012.6502518 |
0.716 |
|
2012 |
Potharaju R, Newell A, Nita-Rotaru C, Zhang X. Plagiarizing smartphone applications: Attack strategies and defense techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7159: 106-120. DOI: 10.1007/978-3-642-28166-2_11 |
0.696 |
|
2011 |
Dong J, Curtmola R, Nita-Rotaru C. Practical defenses against pollution attacks in wireless network coding Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952989 |
0.579 |
|
2011 |
Potharaju R, Nita-Rotaru C. Pandora Acm Sigmobile Mobile Computing and Communications Review. 14: 16. DOI: 10.1145/1942268.1942275 |
0.674 |
|
2011 |
Dong J, Curtmola R, Nita-Rotaru C. Secure high-throughput multicast routing in wireless mesh networks Ieee Transactions On Mobile Computing. 10: 653-668. DOI: 10.1109/Tmc.2010.194 |
0.601 |
|
2011 |
Paris S, Nita-Rotaru C, Martignon F, Capone A. EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants Proceedings - Ieee Infocom. 576-580. DOI: 10.1109/INFCOM.2011.5935230 |
0.363 |
|
2011 |
Zage D, Killian C, Nita-Rotaru C. Removing the blinders: Using information to mitigate adversaries in adaptive overlays Proceedings - 2011 5th International Conference On Network and System Security, Nss 2011. 129-136. DOI: 10.1109/ICNSS.2011.6059969 |
0.384 |
|
2011 |
Yao H, Ho T, Nita-Rotaru C. Key agreement for wireless networks in the presence of active adversaries Conference Record - Asilomar Conference On Signals, Systems and Computers. 792-796. DOI: 10.1109/ACSSC.2011.6190115 |
0.318 |
|
2011 |
Seibert J, Sun X, Nita-Rotaru C, Rao S. A design for securing data delivery in mesh-based peer-to-peer streaming Computer Networks. 55: 2730-2745. DOI: 10.1016/J.Comnet.2011.05.016 |
0.408 |
|
2011 |
Becker S, Seibert J, Nita-Rotaru C, State R. Securing application-level topology estimation networks: Facing the frog-boiling attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 201-221. DOI: 10.1007/978-3-642-23644-0_11 |
0.441 |
|
2011 |
Potharaju R, Seibert J, Fahmy S, Nita-Rotaru C. Omnify: Investigating the visibility and effectiveness of copyright monitors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6579: 122-132. DOI: 10.1007/978-3-642-19260-9_13 |
0.71 |
|
2010 |
Paris S, Capone A, Nita-Rotaru C, Martignon F. A cross-layer reliability metric for wireless mesh networks with selfish participants Acm Sigmobile Mobile Computing and Communications Review. 14: 1. DOI: 10.1145/1923641.1923643 |
0.465 |
|
2010 |
Zage D, Nita-Rotaru C. Robust decentralized virtual coordinate systems in adversarial environments Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880032 |
0.798 |
|
2010 |
Potharaju R, Carbunar B, Nita-Rotaru C. IFriendU: Leveraging 3-cliques to enhance infiltration attacks in online social networks Proceedings of the Acm Conference On Computer and Communications Security. 723-725. DOI: 10.1145/1866307.1866410 |
0.769 |
|
2010 |
Dong J, Ackermann KE, Bavar B, Nita-Rotaru C. Secure and robust Virtual Coordinate System in wireless sensor networks Acm Transactions On Sensor Networks. 6. DOI: 10.1145/1777406.1777408 |
0.587 |
|
2010 |
Curtmola R, Dong J, Nita-Rotaru C. Tradeoffs between security and communication performance in wireless mesh networks 2010 Ieee International Symposium On "a World of Wireless, Mobile and Multimedia Networks", Wowmom 2010 - Digital Proceedings. DOI: 10.1109/WOWMOM.2010.5535005 |
0.379 |
|
2010 |
Dong J, Curtmola R, Nita-Rotaru C, Yau D. Pollution attacks and defenses in wireless inter-flow network coding systems 2010 3rd Ieee International Workshop On Wireless Network Coding, Winc 2010. 1-6. DOI: 10.1109/Tdsc.2012.39 |
0.517 |
|
2010 |
Amir Y, Danilov C, Dolev D, Kirsch J, Lane J, Nita-Rotaru C, Olsen J, Zage D. Steward: Scaling byzantine fault-Tolerant replication to wide area networks Ieee Transactions On Dependable and Secure Computing. 7: 80-93. DOI: 10.1109/Tdsc.2008.53 |
0.712 |
|
2010 |
Seibert J, Sun X, Nita-Rotaru C, Rao S. Towards securing data delivery in peer-to-peer streaming 2010 2nd International Conference On Communication Systems and Networks, Comsnets 2010. DOI: 10.1109/COMSNETS.2010.5431991 |
0.36 |
|
2010 |
Wetzel S, Stajano F, Nita-Rotaru C. WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security: Foreword Wisec'10 - Proceedings of the 3rd Acm Conference On Wireless Network Security. |
0.366 |
|
2009 |
Hoffman K, Zage D, Nita-Rotaru C. A survey of attack and defense techniques for reputation systems Acm Computing Surveys. 42. DOI: 10.1145/1592451.1592452 |
0.758 |
|
2009 |
Dong J, Curtmola R, Nita-Rotaru C. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 111-122. DOI: 10.1145/1514274.1514292 |
0.382 |
|
2009 |
Curtmola R, Nita-Rotaru C. BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks Ieee Transactions On Mobile Computing. 8: 445-459. DOI: 10.1109/TMC.2008.134 |
0.433 |
|
2009 |
Nita-Rotaru C, Carbunar B, Ioannis I. JANUS: A framework for scalable and secure routing in hybrid Wireless networks Ieee Transactions On Dependable and Secure Computing. 6: 295-308. DOI: 10.1109/Tdsc.2008.14 |
0.744 |
|
2009 |
Dong J, Curtmola R, Nita-Rotaru C. Secure network coding for wireless mesh networks: Threats, challenges, and directions Computer Communications. 32: 1790-1801. DOI: 10.1016/J.Comcom.2009.07.010 |
0.561 |
|
2008 |
Dong J, Ackermann KE, Bavar B, Nita-Rotaru C. Mitigating attacks against virtual coordinate based routing in wireless sensor networks Wisec'08: Proceedings of the 1st Acm Conference On Wireless Network Security. 89-99. DOI: 10.1145/1352533.1352548 |
0.383 |
|
2008 |
Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks Acm Transactions On Information and System Security. 10. DOI: 10.1145/1284680.1341892 |
0.523 |
|
2008 |
Dong J, Ackermann KE, Nita-Rotaru C. Secure group communication in wireless mesh networks 2008 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom2008. DOI: 10.1109/WOWMOM.2008.4594843 |
0.374 |
|
2008 |
Jing D, Curtmola R, Nita-Rotaru C. On the pitfalls of high-throughput multicast metrics in adversarial wireless mesh networks 2008 5th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 224-232. DOI: 10.1109/SAHCN.2008.36 |
0.409 |
|
2008 |
Dong J, Curtmola R, Sethi R, Nita-Rotaru C. Toward secure network coding in wireless networks: Threats and challenges 4th Ieee Workshop On Secure Network Protocols, Npsec'08. 33-38. DOI: 10.1109/NPSEC.2008.4664878 |
0.358 |
|
2008 |
Seibert J, Zage D, Fahmy S, Nita-Rotaru C. Experimental comparison of peer-to-peer streaming overlays: An application perspective Proceedings - Conference On Local Computer Networks, Lcn. 20-27. DOI: 10.1109/LCN.2008.4664147 |
0.329 |
|
2007 |
Zage DJ, Nita-Rotaru C. On the accuracy of decentralized virtual coordinate systems in adversarial networks Proceedings of the Acm Conference On Computer and Communications Security. 214-224. DOI: 10.1145/1315245.1315273 |
0.8 |
|
2007 |
Curtmola R, Nita-Rotaru C. Secure multicast routing in wireless networks Acm Sigmobile Mobile Computing and Communications Review. 11: 55-56. DOI: 10.1145/1282221.1282233 |
0.497 |
|
2007 |
Curtmola R, Nita-Rotaru C. BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks 2007 4th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 263-272. DOI: 10.1109/Tmc.2008.134 |
0.508 |
|
2007 |
Torres R, Xin S, Walters A, Nita-Rotaru C, Rao S. Enabling confidentiality of data delivery in an overlay broadcasting system Ieee Journal On Selected Areas in Communications. 25: 1732-1744. DOI: 10.1109/Jsac.2007.071211 |
0.4 |
|
2006 |
Wu X, Nita-Rotaru C. Po2V: Network layer position verification in multi-hop wireless networks Proceedings - Wowmom 2006: 2006 International Symposium On a World of Wireless, Mobile and Multimedia Networks. 2006: 150-158. DOI: 10.1109/WOWMOM.2006.88 |
0.33 |
|
2006 |
Walters A, Zage D, Nita-Rotaru C. Mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks Proceedings - International Conference On Network Protocols, Icnp. 65-74. DOI: 10.1109/ICNP.2006.320199 |
0.391 |
|
2006 |
Amir Y, Danilov C, Dolev D, Kirsch J, Lane J, Nita-Rotaru C, Olsen J, Zage D. Scaling Byzantine fault-tolerant replication to wide area networks Proceedings of the International Conference On Dependable Systems and Networks. 2006: 105-114. DOI: 10.1109/DSN.2006.63 |
0.79 |
|
2005 |
Walters A, Nita-Rotaru C. Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networks Proceedings of the 20th Acm Symposium On Operating Systems Principles, Sosp 2005. DOI: 10.1145/1095810.1118578 |
0.36 |
|
2005 |
Ioannidis I, Carbunar B, Nita-Rotaru C. High throughput routing in hybrid cellular and Ad-Hoc networks Proceedings - 6th Ieee International Symposium On a World of Wireless Mobile and Multimedia Networks, Wowmom 2005. 171-176. DOI: 10.1109/WOWMOM.2005.51 |
0.68 |
|
2005 |
Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Secure spread: An integrated architecture for secure group communication Ieee Transactions On Dependable and Secure Computing. 2: 248-261. DOI: 10.1109/Tdsc.2005.39 |
0.659 |
|
2004 |
Amir Y, Kim Y, Nita-Rotaru C, Schultz JL, Stanton J, Tsudik G. Secure group communication using robust contributory key agreement Ieee Transactions On Parallel and Distributed Systems. 15: 468-480. DOI: 10.1109/Tpds.2004.1278104 |
0.652 |
|
2004 |
Carbunar B, Ioannidis I, Nita-Rotaru C. JANUS: Towards robust and malicious resilient routing in hybrid wireless networks Proceedings of the 2004 Acm Workshop On Wireless Security, Wise. 11-20. |
0.702 |
|
2003 |
Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Scaling secure group communication systems: Beyond peer-to-peer Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 226-237. DOI: 10.1109/DISCEX.2003.1194887 |
0.633 |
|
2002 |
Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols Proceedings - International Conference On Distributed Computing Systems. 463-464. DOI: 10.1145/1015040.1015045 |
0.661 |
|
2001 |
Amir Y, Nita-Rotaru C, Stanton JR. Framework for authentication and access control of client-server group communication systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2233: 128-140. DOI: 10.1007/3-540-45546-9_10 |
0.788 |
|
2001 |
Amir Y, Kim Y, Nita-Rotaru C, Schultz J, Stanton J, Tsudik G. Exploring robustness in group key agreement Proceedings - International Conference On Distributed Computing Systems. 399-408. |
0.627 |
|
Show low-probability matches. |