Search

Your search keyword '"David Choffnes"' showing total 84 results

Search Constraints

Start Over You searched for: Author "David Choffnes" Remove constraint Author: "David Choffnes"
84 results on '"David Choffnes"'

Search Results

1. CDNs Meet CN An Empirical Study of CDN Deployments in China

4. A Comparative Study of Dark Patterns Across Web and Mobile Modalities

5. Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic

7. Internet Scale Reverse Traceroute

8. Not Your Average App: A Large-scale Privacy Analysis of Android Browsers

10. When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers

12. IoTLS

13. SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses

14. AnyOpt: Predicting and optimizing IP Anycast performance

15. Janus: A Multi-TCP Framework for Application-Aware Optimization in Mobile Networks

16. Detecting Consumer {IoT} Devices through the Lens of an {ISP}

17. FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

18. Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications

19. Inside the Walled Garden

20. CDNs Meet CN An Empirical Study of CDN Deployments in China

21. Internet-QoE 2019

22. Information exposure from consumer IoT devices: a multidimensional, network-informed measurement approach

23. A large-scale analysis of deployed traffic differentiation practices

24. RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins

25. Passive and Active Measurement : 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27–29, 2019, Proceedings

26. Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting

27. suMMarY report for the First NSF Workshop on Mobile Community Measurement Infrastructure

28. A Measurement Experimentation Platform at the Internet's Edge

29. Summary of the Works-in-Progress Session at IMC’16

30. Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach

31. Mile High WiFi

32. Is the Web Ready for OCSP Must-Staple?

33. Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions

34. Herd

35. The record route option is an option!

36. Taking a long look at QUIC

37. Understanding the role of registrars in DNSSEC deployment

38. lib•erate, (n)

39. An Empirical Analysis of Facebook's Free Basics

40. A Broad View of the Ecosystem of Socially Engineered Exploit Documents

41. A Longitudinal, End-to-End View of the DNSSEC Ecosystem

42. Impact of heterogeneity and socioeconomic factors on individual behavior in decentralized sharing ecosystems

43. Where the Sidewalk Ends: Extending theInternet AS Graph Using Traceroutesfrom P2P Users

44. Towards efficient traffic-analysis resistant anonymity networks

45. Tunneling for Transparency

46. Measuring and Applying Invalid SSL Certificates

47. On the Free Bridge Across the Digital Divide

48. Classifiers Unclassified

49. A Case for Personal Virtual Networks

50. Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Catalog

Books, media, physical & digital resources