Stefan Savage

Results: 69



#Item
31Computing / Software / System software / Remote administration software / Internet protocols / System administration / Telnet / Short Message Service / Remote administration / Firmware / Remote access / On-board diagnostics

Fast and Vulnerable: A Story of Telematic Failures Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage Department of Computer Science and Engineering University of California, San Diego {idfoster,aprudhomme,sup

Add to Reading List

Source URL: www.autosec.org

Language: English - Date: 2015-08-23 21:18:58
32

Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding Benjamin Laxton, Kai Wang and Stefan Savage Department of Computer Science & Engineering University of California, San Diego La Jolla, California,

Add to Reading List

Source URL: vision.ucsd.edu

Language: English - Date: 2008-10-17 15:06:35
    33

    Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2014-06-18 13:09:04
      34

      Be Conservative: Enhancing Failure Diagnosis with Proactive Logging Ding Yuan†∗ , Soyeon Park∗ , Peng Huang∗ , Yang Liu∗ , Michael M. Lee∗ , Xiaoming Tang∗ , Yuanyuan Zhou∗ , Stefan Savage∗ ∗ Universi

      Add to Reading List

      Source URL: opera.ucsd.edu

      Language: English - Date: 2012-09-13 17:33:07
        35

        California Fault Lines: Understanding the Causes and Impact of Network Failures Daniel Turner, Kirill Levchenko, Alex C. Snoeren, and Stefan Savage {djturner, klevchen, snoeren, savage}@cs.ucsd.edu Department of Computer

        Add to Reading List

        Source URL: cseweb.ucsd.edu

        Language: English - Date: 2010-06-21 19:58:37
          36Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Electronic commerce / Cryptography / Computing

          A Fistful of Bitcoins: Characterizing Payments Among Men with No Names Sarah Meiklejohn Marjori Pomarole Grant Jordan † Kirill Levchenko Damon McCoy Geoffrey M. Voelker Stefan Savage University of California, San Diego

          Add to Reading List

          Source URL: cseweb.ucsd.edu

          Language: English - Date: 2013-08-21 12:17:11
          37System administration / Internet protocols / Internet standards / Internet / Ethernet / Syslog / Network switch / Computer network / Router / Computing / Network management / Information technology management

          On Failure in Managed Enterprise Networks Daniel Turner, Kirill Levchenko, Jeffrey C. Mogul, Stefan Savage and Alex C. Snoeren HP Laboratories HPLKeyword(s):

          Add to Reading List

          Source URL: www.hpl.hp.com

          Language: English - Date: 2012-05-09 20:32:42
          38Affiliate marketing / Internet marketing / Spamming / Internet / Malware / Online advertising / Machine learning / Pattern recognition / Spamdexing / Business / Marketing / Electronic commerce

          Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San

          Add to Reading List

          Source URL: cseweb.ucsd.edu

          Language: English - Date: 2014-07-22 00:04:50
          39Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Computer worms / Network telescope / Stefan Savage / Firewall / Internet security / Computer network security / Denial-of-service attacks / Cyberwarfare

          National Science Foundation Trusted Computing (TC) Solicitation NSFQuantitative Network Security Analysis David Moore, Geoffrey M. Voelker and Stefan Savage

          Add to Reading List

          Source URL: www.caida.org

          Language: English - Date: 2015-05-04 18:48:34
          40World Wide Web / Internet search engines / Web analytics / Spamming / Search engine optimization / Cloaking / Doorway page / Spamdexing / Bing / Internet / Computing / Internet marketing

          Search + Seizure: The Effectiveness of Interventions on SEO Campaigns † David Y. Wang Matthew Der Mohammad Karami Lawrence Saul Damon McCoy† Stefan Savage Geoffrey M. Voelker

          Add to Reading List

          Source URL: cseweb.ucsd.edu

          Language: English - Date: 2014-09-17 17:39:46
          UPDATE