Publications
Found 223 results
[ Author] Title Type Year Filters: First Letter Of Last Name is H [Clear All Filters]
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016). Genome-Wide Association Data Reveal a Global Map of Genetic Interaction Among Protein Complexes.
PLoS Genetics. 5(12),
(2009).
(2002).
(2003).
(1998). Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML).
Proceedings of USENIX Security Symposium 2001.
(2001).
(2000).
(1998).
(1999). Network Text Editor (NTE): A scalable shared text editor for the MBone.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997).
(2000). Session Directories and Scalable Internet Multicast Address Allocation.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98).
(1998).
(1997).
(2002).
(2000).
(1997). Designing Extensible IP Router Software.
Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
(2005). Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps.
Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
(2019). The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
2020(3), 222-242.
(2020).
(2008).
(1989).
(1989).
(1997).
(2012).
(2010).