Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing., , and . ASE @ USENIX Security Symposium, USENIX Association, (2018)unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge., , , and . WOOT, USENIX Association, (2017)A Global Measurement of Routing Loops on the Internet., , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 373-399. Springer, (2023)Pediatric sedation for procedures titrated to a desired degree of immobility results in unpredictable depth of sedation, , , and . Pediatric emergency care, 17 (6): 414--420 (2001)Global, Passive Detection of Connection Tampering., , , , , , and . SIGCOMM, page 622-636. ACM, (2023)Automated Identification of Patients with Advanced Illness., , , , , , , , , and . AMIA, AMIA, (2022)Weaponizing Middleboxes for TCP Reflected Amplification., , , , , and . USENIX Security Symposium, page 3345-3361. USENIX Association, (2021)Inconsistency and Variation in Concordance of Social History Documentation between Nursing and Provider Clinical Notes., , , , , and . AMIA, AMIA, (2016)Clostridium Difficile Repeat Ordering Difficult to Control without CDS., , , , and . AMIA, AMIA, (2015)Geneva: Evolving Censorship Evasion Strategies., , , and . CCS, page 2199-2214. ACM, (2019)