Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pediatric sedation for procedures titrated to a desired degree of immobility results in unpredictable depth of sedation, , , and . Pediatric emergency care, 17 (6): 414--420 (2001)Global, Passive Detection of Connection Tampering., , , , , , and . SIGCOMM, page 622-636. ACM, (2023)Automated Identification of Patients with Advanced Illness., , , , , , , , , and . AMIA, AMIA, (2022)unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge., , , and . WOOT, USENIX Association, (2017)King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing., , and . ASE @ USENIX Security Symposium, USENIX Association, (2018)A Global Measurement of Routing Loops on the Internet., , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 373-399. Springer, (2023)Automating the censorship arms race., and . XRDS, 27 (2): 30-35 (2020)Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country., , , , , , and . WWW, page 1969-1979. ACM, (2023)Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister., , , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2020)Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion., , , , , , and . SIGCOMM, page 586-598. ACM, (2020)