Publications
Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009). The Death of Cryptocurrency: The Case for Regulation.
Yale Law School Information Society Project. Digital Future Whitepaper Series,
(2022). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003). Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004). Risks of Cryptocurrencies.
Communications of the ACM. 61(6), 20-24.
(2018). China’s Great Cannon.
The Citizen Report.
(2015).
(2000).
(2010).
(2003).
(2021).
(2016).
(2014).
(2009).
(2018).
(2011).
(2010).
(2003).
(2010).
(2003).
(2010).
(2020).
(2020).
(2021).