Publications
Social Engineering Attacks on Government Opponents: Target Perspectives.
Proceedings on Privacy Enhancing Technologies. 2, 152-164.
(2017). SoK: Towards Grounding Censorship Circumvention in Empiricism.
IEEE Symposium on Security and Privacy.
(2016).
(2008).
(2010).
(2008). Spamalytics: An Empirical Analysis of Spam Marketing Conversion.
52(9), 99-107.
(2009).
(2009). Strategies for Sound Internet Measurement.
Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
(2004). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2011).
(2014). A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003).
(2015). A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.
267-278.
(2008). The Top Speed of Flash Worms.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).
(2013). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016).
(2013). Using Honeynets for Internet Situational Awareness.
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
(2005).
(2010). VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016). Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018).
(2011).
(2014).