Publications
Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004). The Death of Cryptocurrency: The Case for Regulation.
Yale Law School Information Society Project. Digital Future Whitepaper Series,
(2022).
(2009).
(2020).
(2010). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007).
(2021). A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003).
(2007).
(2020). Here Be Web Proxies.
8362, 183-192.
(2014).
(1990). Using Prosodic and Lexical Information for Speaker Identification.
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
(2002).
(2004).
(2006).
(2013).
(2010).
(1992). Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems.
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
(1988). Scheduling for Reduced CPU Energy.
Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
(1994).
(2008).
(1997).
(1997). Probabilistic inference and learning in a connectionist causal network.
Proceedings of the Second International ICSC Symposium on Neural Computation (NC'2000).
(2000).