Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient relaying strategy selection and signal combining using error estimation codes., , , and . WCNC, page 996-1000. IEEE, (2014)An Empirical Analysis of the Commercial VPN Ecosystem., , , , , and . Internet Measurement Conference, page 443-456. ACM, (2018)Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage., , , and . CHI, page 543. ACM, (2018)Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage., , , , , , and . USENIX Security Symposium, page 1145-1162. USENIX Association, (2021)Blind In/On-Path Attacks and Applications to VPNs., , , , and . USENIX Security Symposium, page 3129-3146. USENIX Association, (2021)Sneak-Peek: High speed covert channels in data center networks., , , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)A Classification Based Framework to Predict Viral Threads., , , , , , , and . PACIS, page 134. (2015)Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting., , , and . IEEE Symposium on Security and Privacy, page 135-150. IEEE Computer Society, (2015)High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research., and . NS Ethics@SIGCOMM, page 23-26. ACM, (2015)Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media., , , , , , , , and . CCS, page 991-1008. ACM, (2019)