Publications
Privacy and Security Threat Models and Mitigation Strategies of Older Adults.
Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
(2019).
(2008).
(2013).
(2012). The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
2020(3), 222-242.
(2020). Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates.
Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
(1995).
(2011). Preserving Privacy at IXPs.
Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
(2018). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).
(2010). Prediction-driven Computational Auditory Scene Analysis for Dense Sound Mixtures.
Proceedings of the ESCA Workshop on the "Auditory Basis of Speech Perception".
(1996). Predicting the U.S. Index of Industrial Production.
Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
(1993).
(2008). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016).
(2010).
(2012). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia.
37-50.
(2008).
(2009). Practical Data-Centric Storage.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
(2006).
(2013). Practical Comprehensive Bounds on Surreptitious Communication Over DNS.
SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
(2013).
(2011).
(2012).
(2010). On the power of randomization in online algorithms.
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. 379-386.
(1990).