Author of the publication

Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.

, , , , , , , and . FOCI, USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A security assessment of the minos architecture., and . SIGARCH Comput. Archit. News, 33 (1): 48-57 (2005)Analyzing the Great Firewall of China Over Space and Time., , , and . Proc. Priv. Enhancing Technol., 2015 (1): 61-76 (2015)Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking., , , , , , , , and . ACM Comput. Surv., 55 (2): 17:1-17:33 (2023)ExecRecorder: VM-based full-system replay for attack analysis and system recovery., , , , , and . ASID, page 66-71. ACM, (2006)Synchroscalar: A Multiple Clock Domain, Power-Aware, Tile-Based Embedded Processor., , , , , , , , and . ISCA, page 150-161. IEEE Computer Society, (2004)Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks., , , , , , and . NOMS, page 121-128. IEEE, (2008)An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities., , , , , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 227-242. Springer, (2016)Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security., , , , , , , , and . NSPW, page 23-35. ACM, (2016)Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries., and . NSPW, page 141-152. ACM, (2012)A Pointillism Approach for Natural Language Processing of Social Media, , , , and . CoRR, (2012)