Found 4080 results
Author Title Type [ Year(Asc)]
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Maresca, M. (2016).  The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. Computer. 49(9), 78-85.
Mahoney, M. W., & Drineas P. (2016).  Structural properties underlying high-quality Randomized Numerical Linear Algebra algorithms. Handbook of Big Data. 137-154.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods II: Local Convergence Rates.
Xu, P., Yang J., Roosta-Khorasani F., Re C., & Mahoney M. W. (2016).  Sub-sampled Newton Methods with Non-uniform Sampling. Proceedings of the 2016 NIPS Conference.
Egelman, S., Bernd J., Friedland G., & Garcia D. D. (2016).  The Teaching Privacy Curriculum. Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
VanderSloot, B., Amann J., Bernhard M., Durumeric Z., Bailey M., & J. Halderman A. (2016).  Towards a Complete View of the Certificate Ecosystem. Proceeings of 16th Internet Measurement Conference (IMC'16).
Schomp, K., Rabinovich M., & Allman M. (2016).  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Murali, A., Garg A., Krishnan S., Pokory F. T., Abbeel P., Darrell T., et al. (2016).  TSC-DL: Unsupervised trajectory segmentation of multi-modal surgical demonstrations with Deep Learning. IEEE International Conference on Robotics and Automation (ICRA). 4150-4157.
Karbasi, M., Abdelaziz A. Hussen, & Kolossa D. (2016).  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
Song, X., Babu N., Rave W., Majhi S., & Fettweis G. (2016).  Two-Level Spatial Multiplexing using Hybrid Beamforming Antenna Arrays for mmWave Communications. CoRR. abs/1607.08737,
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Choi, J., Larson M., Li X., Friedland G., & Hanjalic A. (2016).  Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy.
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.