Follow
Nathan S. Evans
Nathan S. Evans
Associate Teaching Professor/Faculty Directory Cybersecurity, University of Denver
Verified email at du.edu
Title
Cited by
Cited by
Year
A Practical Congestion Attack on Tor Using Long Paths.
NS Evans, R Dingledine, C Grothoff
USENIX Security Symposium, 33-50, 2009
2592009
R5n: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
2011 5th International Conference on Network and System Security, 316-321, 2011
552011
Autonomous nat traversal
A Muller, N Evans, C Grothoff, S Kamkar
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-4, 2010
48*2010
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
392007
Systems and methods for detecting anomalous messages in automobile networks
N Evans, A Benameur, Y Shen
US Patent 9,843,594, 2017
242017
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
2013 6th International Symposium on Resilient Control Systems (ISRCS), 150-155, 2013
222013
Systems and methods for detecting discrepancies in automobile-network data
Y Shen, N Evans, A Benameur
US Patent 9,582,669, 2017
192017
Efficient and secure decentralized network size estimation
N Evans, B Polot, C Grothoff
NETWORKING 2012: 11th International IFIP TC 6 Networking Conference, Prague …, 2012
192012
Beyond Simulation:{Large-Scale} Distributed Emulation of {P2P} Protocols
NS Evans, C Grothoff
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
192011
All your root checks are belong to us: The sad state of root detection
NS Evans, A Benameur, Y Shen
Proceedings of the 13th ACM International Symposium on Mobility Management …, 2015
162015
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
A Fessi, N Evans, H Niedermayer, R Holz
Principles, Systems and Applications of IP Telecommunications, 134-145, 2010
162010
{Large-Scale} Evaluation of a Vulnerability Analysis Framework
NS Evans, A Benameur, M Elder
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
132014
Lightweight replicas for securing cloud-based services
A Benameur, NS Evans
US Patent 9,794,275, 2017
122017
Insights into rooted and non-rooted android mobile devices with behavior analytics
Y Shen, N Evans, A Benameur
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 580-587, 2016
122016
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
112015
Methods for secure decentralized routing in open networks
NS Evans
Network Architectures and Services, Department of Computer Science, 2011
102011
NICE: Network introspection by collaborating endpoints
D Kienzle, N Evans, M Elder
2013 IEEE Conference on Communications and Network Security (CNS), 411-412, 2013
82013
{MINESTRONE}: Testing the {SOUP}
A Benameur, NS Evans, MC Elder
6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013
82013
Systems and methods for enforcing secure software execution
A Benameur, N Evans
US Patent 9,953,158, 2018
72018
A retrospective analysis of user exposure to (illicit) cryptocurrency mining on the web
R Holz, D Perino, M Varvello, J Amann, A Continella, N Evans, ...
arXiv preprint arXiv:2004.13239, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20