Publications

I Priyadarshini, and C Cotton, "Intelligence in cyberspace: the road to cyber singularity", Journal of Experimental & Theoretical Artificial Intelligence, (2020), pp. 1-35.

R Bian, S Hao, H Wang, A Dhamdere, A Dainotti, and C Cotton. "Towards passive analysis of anycast in global routing: unintended impact of remote peering". In: ACM  SIGCOMM Computer Communication Review 49.3 (2019), pp. 18–25.

R Houser, Z Li, C Cotton, and H Wang. "An investigation on information leakage of DNS over TLS". In: Proceedings of the 15th International Conference on Emerging Networking . . . (2019).

L Jin, S Hao, H Wang, and C Cotton. "Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks". In: 2019 IEEE 27th International Conference on Network Protocols (ICNP) (2019), pp. 1–11.

MJ De Lucia and C Cotton. "Adversarial Machine Learning for Cyber Security". In: Journal of Information Systems Applied Research 12.1 (2019), pp. 26–26.

MJ De Lucia and C Cotton. "Detection of Encrypted Malicious Network Traffic using Machine Learning". In: MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM) (2019), pp. 1–6.

I Priyadarshini and C Cotton. "Internet Memes: A Novel Approach to Distinguish Humans and Bots for Authentication". In: Proceedings of the Future Technologies Conference (2019), pp. 204–222.

I Priyadarshini, H Wang, and C Cotton. "Some Cyberpsychology Techniques to Distinguish Humans and Bots for Authentication". In: Proceedings of the Future Technologies Conference (2019), pp. 306–323.

L Jin, S Hao, H Wang, and C Cotton. "Your remnant tells secret: residual resolution in DDoS protection services". In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems . . . (2018).

De Lucia, Michael J., and Chase Cotton. "Identifying and detecting applications within TLS traffic". In: Proc. SPIE 10630, Cyber Sensing 2018 (2018).

M De Lucia and C Cotton. "Importance of Features in Adversarial Machine Learning for Cyber Security". In: Proceedings of the Conference on Information Systems Applied Research ISSN . . . (2018).

MJ De Lucia and C Cotton. "Identifying and detecting applications within TLS traffic". In: Cyber Sensing 2018 10630, 106300U (2018).

Bannat Wala, Fatema, and Cotton, C. "Unconstrained Endpoint Security System: UEPtSS". In: International Journal of Network Security & Its Applications (IJNSA). 10 (2 . . . (2018).

H Asenov and C Cotton. "Next Generation Resilient Redundant Router". In: Proceedings, High Performance Switching and Routing (HPSR), 2015 IEEE 16th . . . (2015).

H Asenov, S Sigwart, and C Cotton. "A routing based resource registry". In: 2015 IEEE International Black Sea Conference on Communications and . . . (2015).

T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, and ... "A brief overview of the NEBULA future internet architecture". In: ACM SIGCOMM Computer Communication Review 44.3 (2014), pp. 81–86.

T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, and ... "The nebula future internet architecture". In: The Future Internet Assembly (2013), pp. 16–26.

R Broberg, M Caesar, D Comer, C Cotton, MJ Freedman, A Haeberlen, and ... "The NEBULA Future Internet Architecture". In: Lecture Notes in Computer Science (2013), pp. 1–24.

A Agapi, K Birman, RM Broberg, C Cotton, T Kielmann, M Millnert, and ... "Routers for the cloud: Can the internet achieve 5-nines availability?" In: IEEE Internet Computing (2011), pp. 72–77.

R Broberg, A Agapi, K Birman, D Comer, C Cotton, T Kielmann, W Lehr, and ... "Clouds, cable and connectivity: Future internets and router requirements". In: Cable Connection Conf (2011).

T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, and ... Nebula-a future internet that supports trustworthy cloud computing. 2010.

TW Fawcett, CG Boncelet Jr, CJ Cotton, and WD Sincoskie. "Detection of data exfiltration using Entropy and Encryption Characteristics of Network Traffic". In: 27th Army Science Conference (ASC), Orlando, FL (2010).