Publications
(1991).
(2012).
How to Own the Internet in Your Spare Time.
Proceedings of the Eleventh USENIX Security Symposium (Security '02).
(2002).
(2021).
(2007).
(1995).
(2009).
(2009).
(1991). How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models.
Proceedings of Interspeech 2016.
(2016).
(2003).
(2009). How Great is the Great Firewall? Measuring China's DNS Censorship.
Proceedings of the 30th USENIX Security Symposium.
(In Press).
(2011).
(1990).
(2020).
(2013).
(1993).
(2009). Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of ACM CCS.
(2016). Host Mobility Using an Internet Indirection Infrastructure.
Wireless Networks. 11(6), 741-756.
(2005).
(2002). Host Mobility Using an Internet Indirection Infrastructure.
Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 129-144.
(2003). Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium. 3093-3110.
(2021).
(2012).