Her primary areas of investigation include Computer network, Computer security, Distributed computing, Dynamic Source Routing and Optimized Link State Routing Protocol. Cristina Nita-Rotaru combines subjects such as Wireless network, Wireless mesh network and Byzantine fault tolerance, Quantum Byzantine agreement with her study of Computer network. Her Computer security research incorporates elements of Adversarial system, Android and Communications protocol.
Her Distributed computing research includes elements of Scalability and Distributed System Security Architecture. Her Dynamic Source Routing research is multidisciplinary, incorporating elements of Link-state routing protocol, Wireless Routing Protocol and Ad hoc wireless distribution service. As part of the same scientific family, Cristina Nita-Rotaru usually focuses on Zone Routing Protocol, concentrating on Wireless ad hoc network and intersecting with Destination-Sequenced Distance Vector routing.
The scientist’s investigation covers issues in Computer network, Computer security, Distributed computing, Routing protocol and The Internet. Cristina Nita-Rotaru has included themes like Wireless network and Wireless mesh network in her Computer network study. Her Computer security study combines topics in areas such as Scalability and Peer-to-peer.
Her studies examine the connections between Distributed computing and genetics, as well as such issues in Protocol, with regards to Finite-state machine. Her Dynamic Source Routing research is multidisciplinary, incorporating perspectives in Link-state routing protocol and Wireless Routing Protocol. The study incorporates disciplines such as Ad hoc wireless distribution service and Optimized Link State Routing Protocol in addition to Wireless Routing Protocol.
Her scientific interests lie mostly in Computer network, Computer security, Protocol, Fuzz testing and Finite-state machine. Her work carried out in the field of Computer network brings together such families of science as Payment and Communication channel. Her studies deal with areas such as Adversarial system and Software-defined networking as well as Computer security.
Cristina Nita-Rotaru interconnects Network topology and Leverage in the investigation of issues within Protocol. Her studies in Finite-state machine integrate themes in fields like Cellular network, Distributed computing, Network packet, Source code and Implementation. Her study in Distributed computing is interdisciplinary in nature, drawing from both Link-state routing protocol, Static routing and Triangular routing.
Cristina Nita-Rotaru spends much of her time researching Artificial intelligence, Machine learning, Computer network, Training set and Linear regression. Her primary area of study in Artificial intelligence is in the field of Adversarial machine learning. Her research in Adversarial machine learning intersects with topics in Class and Image.
Cristina Nita-Rotaru has researched Computer network in several fields, including Finite-state machine, Distributed computing and Source code. Her Distributed computing study integrates concerns from other disciplines, such as Cellular network, QUIC, Mobile device and Network packet. The various areas that Cristina Nita-Rotaru examines in her Training set study include Range, Data modeling and Robust regression.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A survey of attack and defense techniques for reputation systems
Kevin Hoffman;David Zage;Cristina Nita-Rotaru.
ACM Computing Surveys (2009)
An on-demand secure routing protocol resilient to byzantine failures
Baruch Awerbuch;David Holmer;Cristina Nita-Rotaru;Herbert Rubens.
workshop on wireless security (2002)
Using probabilistic generative models for ranking risks of Android apps
Hao Peng;Chris Gates;Bhaskar Sarma;Ninghui Li.
computer and communications security (2012)
Android permissions: a perspective combining risks and benefits
Bhaskar Pratim Sarma;Ninghui Li;Chris Gates;Rahul Potharaju.
symposium on access control models and technologies (2012)
On the performance of group key agreement protocols
Yair Amir;Yongdae Kim;Cristina Nita-Rotaru;Gene Tsudik.
ACM Transactions on Information and System Security (2004)
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
Matthew Jagielski;Alina Oprea;Battista Biggio;Chang Liu.
ieee symposium on security and privacy (2018)
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch;Reza Curtmola;David Holmer;Cristina Nita-Rotaru.
ACM Transactions on Information and System Security (2008)
Secure group communication using robust contributory key agreement
Y. Amir;Y. Kim;C. Nita-Rotaru;J.L. Schultz.
IEEE Transactions on Parallel and Distributed Systems (2004)
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Jing Dong;Reza Curtmola;Cristina Nita-Rotaru.
wireless network security (2009)
Plagiarizing smartphone applications: attack strategies and defense techniques
Rahul Potharaju;Andrew Newell;Cristina Nita-Rotaru;Xiangyu Zhang.
international conference on engineering secure software and systems (2012)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: