Cristina Nita-Rotaru
Cristina Nita-Rotaru
Professor, Computer Science, Northeastern University
Email verificata su neu.edu - Home page
TitoloCitata daAnno
An on-demand secure routing protocol resilient to byzantine failures
B Awerbuch, D Holmer, C Nita-Rotaru, H Rubens
Proceedings of the 1st ACM workshop on Wireless security, 21-30, 2002
6782002
A survey of attack and defense techniques for reputation systems
K Hoffman, D Zage, C Nita-Rotaru
ACM Computing Surveys (CSUR) 42 (1), 1, 2009
6742009
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3742012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
2922012
On the performance of group key agreement protocols
Y Amir, Y Kim, C Nita-Rotaru, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004
2332004
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
ACM Transactions on Information and System Security (TISSEC) 10 (4), 6, 2008
2012008
Secure group communication using robust contributory key agreement
Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004
1532004
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
J Dong, R Curtmola, C Nita-Rotaru
Proceedings of the second ACM conference on Wireless network security, 111-122, 2009
1402009
Mitigating byzantine attacks in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
Department of Computer Science, Johns Hopkins University, Tech. Rep. Version …, 2004
982004
Secure group communication in asynchronous networks with failures: Integration and experiments
Y Amir, G Ateniese, D Hasse, Y Kim, C Nita-Rotaru, T Schlossnagle, ...
Proceedings 20th IEEE International Conference on Distributed Computing …, 2000
922000
Plagiarizing smartphone applications: attack strategies and defense techniques
R Potharaju, A Newell, C Nita-Rotaru, X Zhang
International symposium on engineering secure software and systems, 106-120, 2012
912012
On the survivability of routing protocols in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, H Rubens, C Nita-Rotaru
First International Conference on Security and Privacy for Emerging Areas in …, 2005
892005
Secure network coding for wireless mesh networks: Threats, challenges, and directions
J Dong, R Curtmola, C Nita-Rotaru
Computer Communications 32 (17), 1790-1801, 2009
872009
Secure spread: An integrated architecture for secure group communication
Y Amir, C Nita-Rotaru, S Stanton, G Tsudik
IEEE Transactions on dependable and secure computing 2 (3), 248-261, 2005
872005
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
IM Khalil, S Bagchi, C Nita-Rotaru
SecureComm, 89-100, 2005
872005
BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks
R Curtmola, C Nita-Rotaru
IEEE Transactions on Mobile Computing 8 (4), 445-459, 2008
842008
Stateless-recipient certified e-mail system based on verifiable encryption
G Ateniese, C Nita-Rotaru
Cryptographers’ Track at the RSA Conference, 182-199, 2002
752002
Scaling byzantine fault-tolerant replication towide area networks
Y Amir, C Danilov, J Kirsch, J Lane, D Dolev, C Nita-Rotaru, J Olsen, ...
International Conference on Dependable Systems and Networks (DSN'06), 105-114, 2006
742006
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
I Khalil, S Bagchi, CN Rotaru, NB Shroff
Ad Hoc Networks 8 (2), 148-164, 2010
672010
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE Symposium on Security and Privacy (SP), 19-35, 2018
612018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20