Publications

Found 4168 results
Author Title Type [ Year(Desc)]
2018
Al-Dalky, R., Rabinovich M., & Allman M. (2018).  Practical Challenge-Response for DNS. ACM Computer Communication Review. 48(3), 
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Savary, A., Ramisch C., Hwang J., Schneider N., Andresen M., Pradhan S., et al. (2018).  Proceedings of the Joint Workshop on Linguistic Annotation, Multiword Expressions and Constructions. Proceedings of the Joint Workshop on Linguistic Annotation, Multiword Expressions and Constructions.
Mathur, A., Malkin N., Harbach M., Peer E., & Egelman S. (2018).  Quantifying Users’ Beliefs about Software Updates. Proceedings of the NDSS Workshop on Usable Security (USEC ’18).
Petruck, M. R. L., & Ellsworth M. (2018).  Representing Spatial Relations in FrameNet. Proceedings of SpLU 2018, First International Workshop on Spatial Language Understanding.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
Bano, S.., Richter P.., Javed M.., Sundaresan S.., Durumeric Z.., Murdoch S.. J., et al. (2018).   Scanning the Internet for Liveness. Computer Communication Review. 48(2), 
Thiagarajan, V., & Shapiro V. (2018).  Shape Aware Quadratures. Journal of Computational Physics. 374, 1239-1260.
Fountoulakis, K.., Gleich D.. F., & Mahoney M.. W. (2018).  A Short Introduction to Local Graph Clustering Methods and Software. Abstracts of the 7th International Conference on Complex Networks and Their Applications.
Wahlster, W. (2018).  Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Pearce, P.., Ensafi R.., Li F.., Feamster N.., & Paxson V.. (2018).   Toward Continual Measurement of Global Network-Level Censorship. Security and Privacy. 16(1), 
Egelman, S. (2018).  The Usable Security & Privacy Group. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Reyes, I., Wijesekera P., Reardon J., Elazari A., Razaghpanah A., Vallina-Rodriguez N., et al. (2018).  "Won't Somebody Think of the Children" Privacy Analysis at Scale: A Case Study With COPPA. Proceedings on Privacy Enhancing Technologies.

Pages