Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Characterizing residential broadband networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Issues and etiquette concerning use of shared measurement data
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Conducting cybersecurity research legally and ethically
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
The cubicle vs. the coffee shop: behavioral modes in enterprise end-users
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
A Socratic method for validation of measurement-based networking research
Computer Communications
A framework for understanding and applying ethical principles in network and security research
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Computer security research with human subjects: risks, benefits and informed consent
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Enforced community standards for research on users of the tor anonymity network
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
11th workshop on privacy in the electronic society
Proceedings of the 2012 ACM conference on Computer and communications security
Spamming for science: active measurement in web 2.0 abuse research
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Findings and implications from data mining the IMC review process
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |