Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
When DNS Goes Dark: Understanding Privacy and Shaping Policy of an Evolving Protocol
View More Papers
A Devil of a Time: How Vulnerable is NTP...
Yarin Perry (The Hebrew University of Jerusalem), Neta Rozen-Schiff (The Hebrew University of Jerusalem), Michael Schapira (The Hebrew University of Jerusalem)
Read MoreROV++: Improved Deployable Defense against BGP Hijacking
Reynaldo Morillo (University of Connecticut), Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), James Breslin (University of Connecticut), Amir Herzberg (University of Connecticut), Bing Wang (University of Connecticut)
Read MoreRapid Cybersecurity Assessment System for Small Business’ COVID Move...
Tracy Tam, Asha Rao, and Joanne Hall (RMIT)
Read MoreTrusted Verification of Over-the-Air (OTA) Secure Software Updates on...
Anway Mukherjee, Ryan Gerdes, and Tam Chantem (Virginia Tech)
Read More