From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

403 Forbidden: A Global View of CDN Geoblocking., , , , , , , и . Internet Measurement Conference, стр. 218-230. ACM, (2018)Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking., , , и . USENIX Security Symposium, стр. 257-272. USENIX Association, (2010)Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels., , , и . PAM, том 8362 из Lecture Notes in Computer Science, стр. 109-118. Springer, (2014)Äll of them claim to be the best": Multi-perspective study of VPN users and VPN providers., , и . CoRR, (2022)Examining How the Great Firewall Discovers Hidden Circumvention Servers., , , , , и . Internet Measurement Conference, стр. 445-458. ACM, (2015)Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape., , , , и . USENIX Security Symposium, USENIX Association, (2024)Challenges in cybersecurity: Lessons from biological defense systems., , , , , , , , , и 12 other автор(ы). CoRR, (2021)Attacking Connection Tracking Frameworks as used by Virtual Private Networks., , , , , , и . Proc. Priv. Enhancing Technol., 2024 (3): 109-126 (2024)A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades., , и . PAM, том 9631 из Lecture Notes in Computer Science, стр. 124-135. Springer, (2016)Censored Planet: An Internet-wide, Longitudinal Censorship Observatory., , , и . ACM Conference on Computer and Communications Security, стр. 49-66. ACM, (2020)