Cristina Nita-Rotaru
Cristina Nita-Rotaru
Professor, Computer Science, Northeastern University
Verifierad e-postadress på neu.edu - Startsida
Titel
Citeras av
Citeras av
År
A survey of attack and defense techniques for reputation systems
K Hoffman, D Zage, C Nita-Rotaru
ACM Computing Surveys (CSUR) 42 (1), 1-31, 2009
7392009
An on-demand secure routing protocol resilient to byzantine failures
B Awerbuch, D Holmer, C Nita-Rotaru, H Rubens
Proceedings of the 1st ACM workshop on Wireless security, 21-30, 2002
7032002
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4142012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
3442012
On the performance of group key agreement protocols
Y Amir, Y Kim, C Nita-Rotaru, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004
2502004
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
ACM Transactions on Information and System Security (TISSEC) 10 (4), 1-35, 2008
2232008
Secure group communication using robust contributory key agreement
Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004
1672004
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE Symposium on Security and Privacy (SP), 19-35, 2018
1632018
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
J Dong, R Curtmola, C Nita-Rotaru
Proceedings of the second ACM conference on Wireless network security, 111-122, 2009
1452009
Mitigating byzantine attacks in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
Department of Computer Science, Johns Hopkins University, Tech. Rep. Version …, 2004
1092004
Plagiarizing smartphone applications: attack strategies and defense techniques
R Potharaju, A Newell, C Nita-Rotaru, X Zhang
International symposium on engineering secure software and systems, 106-120, 2012
1032012
On the survivability of routing protocols in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, H Rubens, C Nita-Rotaru
First International Conference on Security and Privacy for Emerging Areas in …, 2005
942005
Secure network coding for wireless mesh networks: Threats, challenges, and directions
J Dong, R Curtmola, C Nita-Rotaru
Computer Communications 32 (17), 1790-1801, 2009
932009
DICAS: detection, diagnosis and isolation of control attacks in sensor networks
I Khalil, S Bagchi, C Nina-Rotaru
First International Conference on Security and Privacy for Emerging Areas in …, 2005
912005
Secure group communication in asynchronous networks with failures: Integration and experiments
Y Amir, G Ateniese, D Hasse, Y Kim, C Nita-Rotaru, T Schlossnagle, ...
Proceedings 20th IEEE International Conference on Distributed Computing …, 2000
912000
Secure spread: An integrated architecture for secure group communication
Y Amir, C Nita-Rotaru, S Stanton, G Tsudik
IEEE Transactions on dependable and secure computing 2 (3), 248-261, 2005
892005
BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks
R Curtmola, C Nita-Rotaru
IEEE Transactions on Mobile Computing 8 (4), 445-459, 2008
822008
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols
AM Kakhki, S Jero, D Choffnes, C Nita-Rotaru, A Mislove
Proceedings of the 2017 Internet Measurement Conference, 290-303, 2017
812017
Stateless-recipient certified e-mail system based on verifiable encryption
G Ateniese, C Nita-Rotaru
Cryptographers’ Track at the RSA Conference, 182-199, 2002
782002
How secure and quick is QUIC? Provable security and performance analyses
R Lychev, S Jero, A Boldyreva, C Nita-Rotaru
2015 IEEE Symposium on Security and Privacy, 214-231, 2015
772015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20