Nathan S. Evans
Nathan S. Evans
Associate Teaching Professor/Faculty Directory Cybersecurity, University of Denver
Verified email at
Cited by
Cited by
A Practical Congestion Attack on Tor Using Long Paths.
NS Evans, R Dingledine, C Grothoff
USENIX Security Symposium, 33-50, 2009
R5n: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
2011 5th International Conference on Network and System Security, 316-321, 2011
Autonomous nat traversal
A Muller, N Evans, C Grothoff, S Kamkar
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-4, 2010
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
Systems and methods for detecting anomalous messages in automobile networks
N Evans, A Benameur, Y Shen
US Patent 9,843,594, 2017
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
2013 6th International Symposium on Resilient Control Systems (ISRCS), 150-155, 2013
Systems and methods for detecting discrepancies in automobile-network data
Y Shen, N Evans, A Benameur
US Patent 9,582,669, 2017
Efficient and secure decentralized network size estimation
N Evans, B Polot, C Grothoff
NETWORKING 2012: 11th International IFIP TC 6 Networking Conference, Prague …, 2012
Beyond Simulation:{Large-Scale} Distributed Emulation of {P2P} Protocols
NS Evans, C Grothoff
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
A Fessi, N Evans, H Niedermayer, R Holz
Principles, Systems and Applications of IP Telecommunications, 134-145, 2010
All your root checks are belong to us: The sad state of root detection
NS Evans, A Benameur, Y Shen
Proceedings of the 13th ACM International Symposium on Mobility Management …, 2015
Lightweight replicas for securing cloud-based services
A Benameur, NS Evans
US Patent 9,794,275, 2017
Insights into rooted and non-rooted android mobile devices with behavior analytics
Y Shen, N Evans, A Benameur
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 580-587, 2016
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
{Large-Scale} Evaluation of a Vulnerability Analysis Framework
NS Evans, A Benameur, M Elder
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
{MINESTRONE}: Testing the {SOUP}
A Benameur, NS Evans, MC Elder
6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013
Methods for secure decentralized routing in open networks
NS Evans
Network Architectures and Services, Department of Computer Science, 2011
NICE: Network introspection by collaborating endpoints
D Kienzle, N Evans, M Elder
2013 IEEE Conference on Communications and Network Security (CNS), 411-412, 2013
Systems and methods for enforcing secure software execution
A Benameur, N Evans
US Patent 9,953,158, 2018
A retrospective analysis of user exposure to (illicit) cryptocurrency mining on the web
R Holz, D Perino, M Varvello, J Amann, A Continella, N Evans, ...
arXiv preprint arXiv:2004.13239, 2020
The system can't perform the operation now. Try again later.
Articles 1–20