Publications
Found 275 results
Author [ Title] Type Year Filters: First Letter Of Last Name is J [Clear All Filters]
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.
267-278.
(2008).
(1996). Towards Capturing Representative AS-Level Internet Topologies.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
(2002). Towards Capturing Representative AS-Level Internet Topologies.
Computer Networks. 44(6), 737-755.
(2004).
(2013). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016). Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
(2020). On Traffic Phase Effects in Packet-Switched Gateways.
Internetworking: Research and Experience. 3(3), 115-156.
(1992). Training Neural Networks with SPERT-II.
345-364.
(1998). Unveiling Parallelization Opportunities in Sequential Programs.
Journal of Systems and Software. 117, 282–295.
(2016).
(2011). Using A Stochastic Context-Free Grammar as a Language Model for Speech Recognition.
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 95).
(1995).
(2009). Using Audio and Video Features to Classify the Most Dominant Person in Meetings.
Proceedings of ACM Multimedia 2007. 835-838.
(2007). Using Contiguous Bi-Clustering for Data Driven Temporal Analysis of fMRI Based Functional Connectivity.
Proceedings of the 4th Annual INCF Neuroinformatics Congress.
(2011). Using Prosodic and Conversational Features for High-Performance Speaker Recognition: Report From JHU WS'02..
Proceedings of ICASSP-2003.
(2003).
(2011).
(2013).
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018).
(2014). “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S..
Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
(2018).
(2009).
(2013).