Publications
Found 223 results
[ Author] Title Type Year Filters: First Letter Of Last Name is H [Clear All Filters]
(1997).
(1989).
(1989).
(2008).
Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps.
Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
(2019). The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
2020(3), 222-242.
(2020).
(1998).
(1999). Network Text Editor (NTE): A scalable shared text editor for the MBone.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997).
(2000). Session Directories and Scalable Internet Multicast Address Allocation.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98).
(1998).
(1997).
(2002).
(2000).
(1997). Designing Extensible IP Router Software.
Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
(2005).
(2002).
(2003). Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML).
Proceedings of USENIX Security Symposium 2001.
(2001).
(1998).
(2000). Genome-Wide Association Data Reveal a Global Map of Genetic Interaction Among Protein Complexes.
PLoS Genetics. 5(12),
(2009). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016). The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
(2016). Keep on Lockin’ in the Free World: A Multi-National Comparison of Smartphone Locking.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
(2016).