Publications
(2009).
(2009).
Securing Web Content.
7-12.
(2009).
(2008).
(2008).
(2008).
A Reactive Measurement Framework.
92-101.
(2008).
(2008).
(2008). Thoughts on Reviewing.
ACM Computer Communication Review. 38(2), 47-50.
(2008).
(2008).
(2008). A Brief History of Scanning.
77-82.
(2007).
(2007). Determining an Appropriate Sending Rate Over an Underutilized Network Path.
51(7), 1815-1832.
(2007).
(2007).
(2007). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007).
(2007).
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Fighting Coordinated Attackers with Cross-Organizational Information on Sharing.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
(2006). Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 37-42.
(2006).
(2006).