Publications
(2015).
(2014).
(2000).
(1999).
A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003).
(2014).
(2011).
(1990).
The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2000). Strategies for Sound Internet Measurement.
Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
(2004).
(2000).
(2003).
(2009).
(2008). Spamalytics: An Empirical Analysis of Spam Marketing Conversion.
52(9), 99-107.
(2009).
(2010).
(2008). SoK: Towards Grounding Censorship Circumvention in Empiricism.
IEEE Symposium on Security and Privacy.
(2016). Social Engineering Attacks on Government Opponents: Target Perspectives.
Proceedings on Privacy Enhancing Technologies. 2, 152-164.
(2017). Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention.
Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
(2007). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007).
(2011). Semi-Automated Discovery of Application Session Structure.
Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
(2006).
(1998).