Efficient smart phone forensics based on relevance feedback.
, , , and . In Proc. Workshop on Security and Privacy in Smartphones and Mobile Devices, November 2014.
Keywords: forensics; [bibtex] [link]
Measurement and Analysis of Child Pornography Trafficking on P2P Networks (Runner-Up, Best Paper Award).
, , , , , , , , , and . In Proc. Intl. World Wide Web Conference (WWW), May 2013.
Keywords: forensics; peer-to-peer; Award Paper; [bibtex] [slides] [PDF] [techreport] [link]
Detecting Denial of Service Attacks in Tor.
, , and . In Proceedings of Thirteenth International Conference on Financial Cryptography and Data Security, Rockley, Christ Church, Barbados, February 2009.
Keywords: security; anonymity; ; [bibtex] [link]
Enhancing Child Safety & Online Technologies. Appendix D: Technology Advisory Board Report.
, , , , , , , , , , , and . Technical report, Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States, December 2008.
Keywords: peer-to-peer; forensics; [bibtex] [appendix_d] [full_report] [link]
Detecting the Sybil Attack in Ad hoc Networks.
, , and . In Proc. IEEE/ACM International Conference on Security and Privacy in Communication Networks (SecureComm), pages 1--11, August 2006.
Keywords: security; Sybil attack; wireless; [bibtex] [PDF] [link]
Responder Anonymity and Anonymous Peer-to-Peer File Sharing.
, , and . In Proc. IEEE International Conference on Network Protocols (ICNP), pages 272--280, November 2001.
Keywords: peer-to-peer; anonymity; [bibtex] [PDF] [link]