Follow
Kevin Benton
Title
Cited by
Cited by
Year
OpenFlow vulnerability assessment
K Benton, LJ Camp, C Small
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
4112013
Studying the effectiveness of android application permissions requests
K Benton, LJ Camp, V Garg
2013 IEEE international conference on pervasive computing and communications …, 2013
822013
The privacy paradox: a Facebook case study
V Garg, K Benton, LJ Camp
2014 TPRC conference paper, 2014
412014
The evolution of 802.11 wireless security
K Benton
University of Nevada, Las Vegas, Informatics-Spring, 2010
372010
Timing analysis of ssl/tls man in the middle attacks
K Benton, T Bross
arXiv preprint arXiv:1308.3559, 2013
152013
Collaborating with the enemy on network management
C Hall, D Yu, Z Zhang, J Stout, A Odlyzko, AW Moore, J Camp, K Benton, ...
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
122014
Signaturecheck: a protocol to detect man-in-the-middle attack in ssl
K Benton, J Jo, Y Kim
Proceedings of the seventh annual workshop on cyber security and information …, 2011
92011
Firewalling scenic routes: preventing data exfiltration via political and geographic routing policies
K Benton, LJ Camp
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
62016
Filtering ip source spoofing using feasible path reverse path forwarding with sdn
K Benton, LJ Camp, T Kelley, M Swany
2015 IEEE Conference on Communications and Network Security (CNS), 733-734, 2015
62015
Bongo: A BGP speaker built for defending against bad routes
K Benton, LJ Camp, M Swany
MILCOM 2016-2016 IEEE Military Communications Conference, 735-739, 2016
52016
Examining the Jurisdictions of Internet Routes to Prevent Data Exfiltration
K Benton, J Camp
TPRC, 2016
32016
Securing the Internet Control Plane
K Benton
Indiana University, 2017
12017
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN
K Benton, LJ Camp, T Kelley, M Swany
International Journal of Computer and Communication Engineering 5 (6), 441, 2016
2016
Towards Commodity Network Hardware in Tactical Naval Environments
R Templeman, K Benton
Electric Machines Technology Symposium (EMTS), 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–14