Folgen
Kevin Benton
Kevin Benton
Bestätigte E-Mail-Adresse bei indiana.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
OpenFlow vulnerability assessment
K Benton, LJ Camp, C Small
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
3762013
Studying the effectiveness of android application permissions requests
K Benton, LJ Camp, V Garg
2013 IEEE international conference on pervasive computing and communications …, 2013
752013
The privacy paradox: a Facebook case study
V Garg, K Benton, LJ Camp
2014 TPRC conference paper, 2014
362014
The evolution of 802.11 wireless security
K Benton
University of Nevada, Las Vegas, Informatics-Spring, 2010
362010
Collaborating with the enemy on network management
C Hall, D Yu, Z Zhang, J Stout, A Odlyzko, AW Moore, J Camp, K Benton, ...
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
122014
Timing analysis of ssl/tls man in the middle attacks
K Benton, T Bross
arXiv preprint arXiv:1308.3559, 2013
122013
Signaturecheck: a protocol to detect man-in-the-middle attack in ssl
K Benton, J Jo, Y Kim
Proceedings of the seventh annual workshop on cyber security and information …, 2011
72011
Firewalling scenic routes: preventing data exfiltration via political and geographic routing policies
K Benton, LJ Camp
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
62016
Filtering ip source spoofing using feasible path reverse path forwarding with sdn
K Benton, LJ Camp, T Kelley, M Swany
2015 IEEE Conference on Communications and Network Security (CNS), 733-734, 2015
62015
Bongo: A BGP speaker built for defending against bad routes
K Benton, LJ Camp, M Swany
MILCOM 2016-2016 IEEE Military Communications Conference, 735-739, 2016
52016
Examining the Jurisdictions of Internet Routes to Prevent Data Exfiltration
K Benton, J Camp
TPRC, 2016
32016
Securing the Internet Control Plane
K Benton
Indiana University, 2017
12017
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN
K Benton, LJ Camp, T Kelley, M Swany
International Journal of Computer and Communication Engineering 5 (6), 441, 2016
2016
Towards Commodity Network Hardware in Tactical Naval Environments
R Templeman, K Benton
Electric Machines Technology Symposium (EMTS), 2014
2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–14