246 results on '"Geoffrey M. Voelker"'
Search Results
2. Unfiltered: Measuring Cloud-based Email Filtering Bypasses.
3. Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy.
4. Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.
5. In the Line of Fire: Risks of DPI-triggered Data Collection.
6. An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.
7. FaaSnap: FaaS made fast using snapshot-based VMs.
8. The Challenges of Blockchain-Based Naming Systems for Malware Defenders.
9. Where .ru?: assessing the impact of conflict on russian domain infrastructure.
10. Retroactive identification of targeted DNS infrastructure hijacking.
11. Measuring UID smuggling in the wild.
12. Hopper: Modeling and Detecting Lateral Movement.
13. Risky BIZness: risks derived from registrar name management.
14. Home is where the hijacking is: understanding DNS interception by residential routers.
15. Who's got your mail?: characterizing mail service provider usage.
16. Clairvoyance: Inferring Blocklist Use on the Internet.
17. Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers.
18. Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations.
19. Particle: ephemeral endpoints for serverless networking.
20. Domain Name Lifetimes: Baseline and Threats.
21. Web feature deprecation: a case study for chrome.
22. Hack for Hire: Exploring the Emerging Market for Account Hijacking.
23. Reading the Tea leaves: A Comparative Analysis of Threat Intelligence.
24. Detecting and Characterizing Lateral Phishing at Scale.
25. Measuring Security Practices and How They Impact Security.
26. Characterization of Anycast Adoption in the DNS Authoritative Infrastructure.
27. Dark packets and the end of network scaling.
28. An Empirical Analysis of the Commercial VPN Ecosystem.
29. Following Their Footsteps: Characterizing Account Automation Abuse and Defenses.
30. Sprocket: A Serverless Video Processing Framework.
31. Tripwire: inferring internet site compromise.
32. Exploring the dynamics of search advertiser fraud.
33. CacheCloud: Towards Speed-of-light Datacenter Communication.
34. Scheduling techniques for hybrid circuit/packet networks.
35. Who is .com?: Learning to Parse WHOIS Records.
36. From .academy to .zone: An Analysis of the New TLD Land Rush.
37. Affiliate Crookies: Characterizing Affiliate Marketing Abuse.
38. CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks.
39. Measuring security practices
40. Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser.
41. XXXtortion?: inferring registration intent in the .XXX TLD.
42. Knock it off: profiling the online storefronts of counterfeit merchandise.
43. Search + Seizure: The Effectiveness of Interventions on SEO Campaigns.
44. Enfold: downclocking OFDM in WiFi.
45. Circuit Switching Under the Radar with REACToR.
46. Characterizing Large-Scale Click Fraud in ZeroAccess.
47. Bullet trains: a study of NIC burst behavior at microsecond timescales.
48. A fistful of bitcoins: characterizing payments among men with no names.
49. SloMo: Downclocking WiFi Communication.
50. eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.