Nathan S. Evans
Nathan S. Evans
Senior Research Engineer, Symantec Corporation
Verified email at
Cited by
Cited by
A Practical Congestion Attack on Tor Using Long Paths.
NS Evans, R Dingledine, C Grothoff
USENIX Security Symposium, 33-50, 2009
R5n: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
2011 5th International Conference on Network and System Security, 316-321, 2011
Autonomous nat traversal
A Muller, N Evans, C Grothoff, S Kamkar
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-4, 2010
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007á…, 2007
Method of fabricating a DRAM semiconductor device
BJ Park, YS Hwang
US Patent 6,638,805, 2003
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
2013 6th International Symposium on Resilient Control Systems (ISRCS), 150-155, 2013
Efficient and secure decentralized network size estimation
N Evans, B Polot, C Grothoff
International Conference on Research in Networking, 304-317, 2012
Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols.
NS Evans, C Grothoff
CSET 11, 4-4, 2011
Method for multi-threshold voltage CMOS process optimization
MM Chiang, CC Shih, CC Tsai, TY Liu, KC Huang
US Patent 6,708,312, 2004
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
A Fessi, N Evans, H Niedermayer, R Holz
Principles, Systems and Applications of IP Telecommunications, 134-145, 2010
Systems and methods for detecting anomalous messages in automobile networks
N Evans, A Benameur, Y Shen
US Patent 9,843,594, 2017
Systems and methods for detecting discrepancies in automobile-network data
Y Shen, N Evans, A Benameur
US Patent 9,582,669, 2017
Large-scale evaluation of a vulnerability analysis framework
NS Evans, A Benameur, M Elder
7th Workshop on Cyber Security Experimentation and Test ({CSET} 14), 2014
All your root checks are belong to us: The sad state of root detection
NS Evans, A Benameur, Y Shen
Proceedings of the 13th ACM International Symposium on Mobility Managementá…, 2015
{MINESTRONE}: Testing the {SOUP}
A Benameur, NS Evans, MC Elder
6th Workshop on Cyber Security Experimentation and Test ({CSET} 13), 2013
Methods for secure decentralized routing in open networks
NS Evans
Network Architectures and Services, Department of Computer Science, 2011
Insights into rooted and non-rooted android mobile devices with behavior analytics
Y Shen, N Evans, A Benameur
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 580-587, 2016
Orchard: Exploring Multivariate Heterogeneous Networks on Mobile Phones
P Eichmann, D Edge, N Evans, B Lee, M Brehmer, C White
Computer Graphics Forum 39 (3), 115-126, 2020
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
Distributed stream processing with DUP
KC Bader, T Ei▀ler, N Evans, C GauthierDickey, C Grothoff, K Grothoff, ...
IFIP International Conference on Network and Parallel Computing, 232-246, 2010
The system can't perform the operation now. Try again later.
Articles 1–20