Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global, Passive Detection of Connection Tampering., , , , , , and . SIGCOMM, page 622-636. ACM, (2023)Pediatric sedation for procedures titrated to a desired degree of immobility results in unpredictable depth of sedation, , , and . Pediatric emergency care, 17 (6): 414--420 (2001)Automated Identification of Patients with Advanced Illness., , , , , , , , , and . AMIA, AMIA, (2022)King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing., , and . ASE @ USENIX Security Symposium, USENIX Association, (2018)unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge., , , and . WOOT, USENIX Association, (2017)A Global Measurement of Routing Loops on the Internet., , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 373-399. Springer, (2023)Automating the censorship arms race., and . XRDS, 27 (2): 30-35 (2020)Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister., , , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2020)Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion., , , , , , and . SIGCOMM, page 586-598. ACM, (2020)Unsupervised Learning of an Advanced Illness Cohort to Develop Patient Stratification Models., , , , , , and . AMIA, AMIA, (2018)