Publications
Practical Challenge-Response for DNS.
ACM Computer Communication Review. 48(3),
(2018). Practical Comprehensive Bounds on Surreptitious Communication Over DNS.
SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
(2013).
(2013).
(2010). Practical Data-Centric Storage.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
(2006).
(2009). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia.
37-50.
(2008).
(2004).
(2009).
(2012).
(1993).
(2010).
(1994). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016).
(1999). Predicting Privacy and Security Attitudes.
Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
(2015). Predicting Sales E-Mail Responders using a Natural Language Model.
Communications of the ACM. 38(11), 39-41.
(2015).
(2008). Predicting the U.S. Index of Industrial Production.
Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
(1993). Prediction of Phenotype Information from Genotype Data.
Communications in Information and Systems. 10(2), 99-114.
(2010).
(1994). Prediction-driven Computational Auditory Scene Analysis for Dense Sound Mixtures.
Proceedings of the ESCA Workshop on the "Auditory Basis of Speech Perception".
(1996).
(1989).
(2010). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).