Publications
Found 541 results
Author [ Title] Type Year Filters: First Letter Of Last Name is W [Clear All Filters]
(1991).
(2014).
(1998).
(2011).
(2008).
Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004). Reinforcement Learning for Trading Systems and Portfolios.
Decision Technologies for Computational Finance, Proceedings of the London Conference.
(1998).
(1994). The Relationship Between Dialogue Acts and Hot Spots in Meetings.
Proceedings of IEEE Speech Recognition and Understanding Workshop.
(2003).
(2000).
(2000).
(1997). Resilience of Deployed TCP to Blind Off-Path Attacks.
Proceedings of ACM Internet Measurement Conference.
(2015). ResQ: Enabling SLOs in Network Function Virtualization.
Proceedings of NSDI 2018.
(2018). Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
(2006). Reviewer Integration and Performance Measurement for Malware Detection.
13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
(2016).
(2001).
(2003). On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies.
Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
(2019).
(2010).
(2010).
(2011). The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem.
Proceedings of 18th Internet Measurement Conference (IMC'18).
(2018). Risks of Cryptocurrencies.
Communications of the ACM. 61(6), 20-24.
(2018). A Robust Speaker Clustering Algorithm.
Proceedings of IEEE Speech Recognition and Understanding Workshop.
(2003).