Stefan Savage

Results: 69



#Item
11

You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li† Zakir Durumeric∗‡? Jakub Czyz∗ Mohammad Karami Michael Bailey‡ Damon McCoy. Stefan Savage◦ Vern Paxson†? of California

Add to Reading List

Source URL: zakird.com

    12

    SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments Yuvraj Agarwal Stefan Savage

    Add to Reading List

    Source URL: mesl.ucsd.edu

    - Date: 2011-04-30 02:38:25
      13Cyberwarfare / Security / Computer security / Cybercrime / National security / Computer network security / Cryptography / Cyber-security regulation / Cybersecurity CS5L CMM

      Security  is  Not  a  Commodity:   The  Road  Forward  for  Cybersecurity  Research   Stefan  Savage   UC  San  Diego    

      Add to Reading List

      Source URL: cra.org

      Language: English - Date: 2016-03-07 14:51:02
      14Internet Standards / Cyberwarfare / Internet protocols / Internet Protocol / Videotelephony / Denial-of-service attack / WHOIS / IPv6 / Computer emergency response team / United States Computer Emergency Readiness Team / IPv4 / Computer security

      You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li† Zakir Durumeric∗‡? Jakub Czyz∗ Mohammad Karami Michael Bailey‡ Damon McCoy. Stefan Savage◦ Vern Paxson†? of California

      Add to Reading List

      Source URL: www.icir.org

      Language: English - Date: 2016-07-17 01:33:31
      15E-commerce / Cybercrime / Computer security / Spamming / CAPTCHA / Computer vision / Email spam / Freelancer

      No Plan Survives Contact Experience with Cybercrime Measurement Chris Kanich Neha Chachra Damon McCoy Chris Grier David Wang Marti Motoyama Kirill Levchenko Stefan Savage Geoffrey M. Voelker UC San Diego

      Add to Reading List

      Source URL: static.usenix.org

      Language: English - Date: 2011-08-22 17:59:42
      16

      Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage Collaborative Center for

      Add to Reading List

      Source URL: www.eng.utah.edu

      Language: English - Date: 2009-02-18 15:41:43
        17

        Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San D

        Add to Reading List

        Source URL: damonmccoy.com

        Language: English - Date: 2015-11-03 22:03:38
          18

          Re: CAPTCHAs – Understanding CAPTCHA-Solving Services in an Economic Context Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker and Stefan Savage University of California, San Diego {mmoto

          Add to Reading List

          Source URL: damonmccoy.com

          Language: English - Date: 2015-11-03 22:04:47
            19

            A Comparison of Syslog and IS-IS for Network Failure Analysis Daniel Turner, Kirill Levchenko, Stefan Savage, and Alex C. Snoeren {djturner, klevchen, savage, snoeren}@cs.ucsd.edu Department of Computer Science and Engin

            Add to Reading List

            Source URL: conferences.sigcomm.org

            Language: English - Date: 2013-09-12 20:22:32
              20

              A Fistful of Bitcoins: Characterizing Payments Among Men with No Names Sarah Meiklejohn Marjori Pomarole Grant Jordan † Kirill Levchenko Damon McCoy Geoffrey M. Voelker Stefan Savage University of California, San Diego

              Add to Reading List

              Source URL: damonmccoy.com

              Language: English
                UPDATE