Roya

Results: 150



#Item
1Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
2Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
3Domain name system / Internet / Computing / Network architecture / Name server / DNS hijacking / Google Public DNS / Denial-of-service attack / DNS root zone / Root name server / OpenDNS / Hosts

Global Measurement of DNS Manipulation Paul Pearce Ben Jones† Frank Li Roya Ensafi† Nick Feamster† Nick Weaver‡ Vern Paxson  University

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2017-06-30 16:05:22
4

Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2017-06-30 16:01:04
    5Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

    Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:26
    6

    Large-scale Spatiotemporal Characterization of Inconsistencies in the World’s Largest Firewall Roya Ensafi∗ , Philipp Winter† , Abdullah Mueen∗ , and Jedidiah R. Crandall∗ ∗ In this paper, we overcome this c

    Add to Reading List

    Source URL: cs.unm.edu

    Language: English - Date: 2014-10-06 16:12:18
      7

      11th International Carnivorous Plant Society Conference 2016 London, England 5-7 August 2016 The 11th ICPS Conference will be held at Royal Botanic Gardens, Kew 5-7 AugustTo coincide with the ICPS Conference, Roya

      Add to Reading List

      Source URL: legacy.carnivorousplants.org

      Language: English - Date: 2016-09-07 19:55:33
        8

        T + () - B ensa.fi Roya Ensafi Research Interests

        Add to Reading List

        Source URL: ensa.fi

        Language: English - Date: 2017-08-17 19:24:15
          9

          A Case Study in Helping Students to Covertly Eat Their Classmates Roya Ensafi, Mike Jacobi, and Jedidiah R. Crandall University of New Mexico, Dept. of Computer Science {royaen, crandall}@cs.unm.edu;

          Add to Reading List

          Source URL: ensa.fi

          Language: English - Date: 2016-09-22 03:35:52
            10

            Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

            Add to Reading List

            Source URL: ensa.fi

            Language: English - Date: 2017-04-10 11:00:44
              UPDATE