Volgen
Roya Ensafi
Roya Ensafi
Associate Professor, Computer Science & Engineering, University of Michigan
Geverifieerd e-mailadres voor umich.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Global measurement of {DNS} manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th USENIX Security Symposium (USENIX Security 17), 307-323, 2017
1942017
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies, 2015
1522015
A look at router geolocation in public and commercial databases
M Gharaibeh, A Shah, B Huffaker, H Zhang, R Ensafi, C Papadopoulos
Proceedings of the 2017 Internet Measurement Conference, 463-469, 2017
1422017
Examining how the great firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Proceedings of the 2015 Internet Measurement Conference, 445-458, 2015
1422015
Augur: Internet-wide detection of connectivity disruptions
P Pearce, R Ensafi, F Li, N Feamster, V Paxson
2017 IEEE Symposium on Security and Privacy (SP), 427-443, 2017
912017
An Analysis of China’s “Great Cannon”
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
902015
Censored planet: An internet-wide, longitudinal censorship observatory
R Sundara Raman, P Shenoy, K Kohls, R Ensafi
proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
892020
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014
76*2014
Idle port scanning and non-interference analysis of network protocol stacks using model checking
R Ensafi, JC Park, D Kapur, JR Crandall
19th USENIX Security Symposium (USENIX Security 10), 2010
732010
Idle port scanning and non-interference analysis of network protocol stacks using model checking
R Ensafi, JC Park, D Kapur, JR Crandall
19th USENIX Security Symposium (USENIX Security 10), 2010
732010
Decentralized Control: A Case Study of Russia
R Ramesh, RS Raman, M Bernhard, V Ongkowijaya, L Evdokimov, ...
Network and Distributed Systems Security (NDSS) Symposium 2020,, 2020
722020
Quack: Scalable Remote Measurement of {Application-Layer} Censorship
B VanderSloot, A McDonald, W Scott, JA Halderman, R Ensafi
27th USENIX Security Symposium (USENIX Security 18), 187-202, 2018
712018
Identifying and characterizing Sybils in the Tor network
P Winter, R Ensafi, K Loesing, N Feamster
25th USENIX Security Symposium (USENIX Security 16), 1169-1185, 2016
692016
The chain of implicit trust: An analysis of the web third-party resources loading
M Ikram, R Masood, G Tyson, MA Kaafar, N Loizon, R Ensafi
The World Wide Web Conference, 2851-2857, 2019
652019
Measuring the deployment of network censorship filters at global scale
RS Raman, A Stoll, J Dalek, R Ramesh, W Scott, R Ensafi
Network and Distributed System Security Symposium (NDSS), 2020
642020
403 forbidden: A global view of cdn geoblocking
A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ...
Proceedings of the Internet Measurement Conference 2018, 218-230, 2018
632018
Characterizing Transnational Internet Performance and the Great Bottleneck of China
P Zhu, K Man, Z Wang, Z Qian, R Ensafi, H Halderman, J. Alex, and Duan
ACM SIGMETRICS/International Conference on Measurement and Modeling of …, 2020
61*2020
Investigating large scale https interception in kazakhstan
RS Raman, L Evdokimov, E Wurstrow, JA Halderman, R Ensafi
Proceedings of the ACM Internet Measurement Conference, 125-132, 2020
492020
Optimizing fuzzy k-means for network anomaly detection using pso
R Ensafi, S Dehghanzadeh, R Mohammad, T Akbarzadeh
Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International …, 2008
442008
Ethical Concerns for Censorship Measurement
B Jones, R Ensafi, N Feamster, V Paxson, N Weaver
SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
332015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20