If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2017

SWEET: Serving the web by exploiting email tunnels

Houmansadr, A., Zhou, W., Caesar, M. & Borisov, N., Jun 2017, In : IEEE/ACM Transactions on Networking. 25, 3, p. 1517-1527 11 p., 7819465.

Research output: Contribution to journalArticle

2014

Non-blind watermarking of network flows

Houmansadr, A., Kiyavash, N. & Borisov, N., Aug 2014, In : IEEE/ACM Transactions on Networking. 22, 4, p. 1232-1244 13 p., 6572894.

Research output: Contribution to journalArticle

2013

BotMosaic: Collaborative network watermark for the detection of IRC-based botnets

Houmansadr, A. & Borisov, N., Mar 1 2013, In : Journal of Systems and Software. 86, 3, p. 707-715 9 p.

Research output: Contribution to journalArticle

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones

Zonouz, S., Houmansadra, A., Berthiera, R., Borisova, N. & Sanders, W., Jan 1 2013, In : Computers and Security. 37, p. 215-227 13 p.

Research output: Contribution to journalArticle

2012
2011

Improving security and performance in the tor network through tunable path selection

Snader, R. & Borisov, N., Jan 1 2011, In : IEEE Transactions on Dependable and Secure Computing. 8, 5, p. 728-741 14 p., 5560675.

Research output: Contribution to journalArticle

2010

Attacking and repairing the improved modonions protocol-tagging approach

Borisov, N., Klonowski, M., Kutyłowski, M. & Lauks-Dutka, A., Jun 30 2010, In : KSII Transactions on Internet and Information Systems. 4, 3, p. 380-399 20 p.

Research output: Contribution to journalArticle

2001

Ninja architecture for robust Internet-scale systems and services

Gribble, S. D., Welsh, M., Von Behren, R., Brewer, E. A., Culler, D., Borisov, N., Czerwinski, S., Gummadi, R., Hill, J., Joseph, A., Katz, R. H., Mao, Z. M., Ross, S. & Zhao, B., Mar 2001, In : Computer Networks. 35, 4, p. 473-497 25 p.

Research output: Contribution to journalArticle