Kevin Benton

According to our database1, Kevin Benton authored at least 8 papers between 2011 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

Bongo: A BGP speaker built for defending against bad routes.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Filtering IP source spoofing using feasible path reverse path forwarding with SDN.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Collaborating with the Enemy on Network Management.
Proceedings of the Security Protocols XXII, 2014

2013
Timing Analysis of SSL/TLS Man in the Middle Attacks.
CoRR, 2013

OpenFlow vulnerability assessment.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Studying the effectiveness of android application permissions requests.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

2011
SignatureCheck: a protocol to detect man-in-the-middle attack in SSL.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011


  Loading...