default search action
Nathan S. Evans
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c14]Yun Shen, Nathan S. Evans, Azzedine Benameur:
Insights into rooted and non-rooted Android mobile devices with behavior analytics. SAC 2016: 580-587 - 2015
- [c13]Nathan S. Evans, Azzedine Benameur, Yun Shen:
All your Root Checks are Belong to Us: The Sad State of Root Detection. MobiWac 2015: 81-88 - 2014
- [c12]Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder:
NICE: endpoint-based topology discovery. CISR 2014: 97-100 - [c11]Nathan S. Evans, Azzedine Benameur, Matthew C. Elder:
Large-Scale Evaluation of a Vulnerability Analysis Framework. CSET 2014 - 2013
- [c10]Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder:
NICE: Network Introspection by Collaborating Endpoints. CNS 2013: 411-412 - [c9]Azzedine Benameur, Nathan S. Evans, Matthew C. Elder:
MINESTRONE: Testing the SOUP. CSET 2013 - 2012
- [c8]Nathan S. Evans, Bartlomiej Polot, Christian Grothoff:
Efficient and Secure Decentralized Network Size Estimation. Networking (1) 2012: 304-317 - 2011
- [b1]Nathan S. Evans:
Methods for secure decentralized routing in open networks. Technical University Munich, 2011, pp. 1-215 - [c7]Nathan S. Evans, Christian Grothoff:
R5N: Randomized recursive routing for restricted-route networks. NSS 2011: 316-321 - [c6]Nathan S. Evans, Christian Grothoff:
Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. CSET 2011 - 2010
- [c5]Kai Christian Bader, Tilo Eißler, Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Harald Meier, Craig Ritzdorf, Matthew J. Rutherford:
Distributed Stream Processing with DUP. NPC 2010: 232-246 - [c4]Andreas Müller, Nathan S. Evans, Christian Grothoff, Samy Kamkar:
Autonomous NAT Traversal. Peer-to-Peer Computing 2010: 1-4 - [c3]Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Matthew J. Rutherford:
Simplifying parallel and distributed simulation with the DUP system. SpringSim 2010: 154
2000 – 2009
- 2009
- [c2]Nathan S. Evans, Roger Dingledine, Christian Grothoff:
A Practical Congestion Attack on Tor Using Long Paths. USENIX Security Symposium 2009: 33-50 - 2007
- [c1]Nathan S. Evans, Chris GauthierDickey, Christian Grothoff:
Routing in the Dark: Pitch Black. ACSAC 2007: 305-314
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint