Остановите войну!
for scientists:
default search action
Micah Sherr
- > Home > Persons > Micah Sherr
Publications
- 2018
- [c56]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
DeDoS: Defusing DoS with Dispersion Oriented Software. ACSAC 2018: 712-722 - 2017
- [c52]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers. SIGCOMM Posters and Demos 2017: 71-73 - 2016
- [j10]Dong Lin, Micah Sherr, Boon Thau Loo:
Scalable and Anonymous Group Communication with MTor. Proc. Priv. Enhancing Technol. 2016(2): 22-39 (2016) - [j8]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and Verifiable Interdomain Routing Decisions. IEEE/ACM Trans. Netw. 24(2): 1011-1024 (2016) - [c48]Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
Dispersing Asymmetric DDoS Attacks with SplitStack. HotNets 2016: 197-203 - 2014
- [j6]Micah Sherr, Harjot Gill, Taher Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
The design and implementation of the A3 application-aware anonymity platform. Comput. Networks 58: 206-227 (2014) - 2012
- [j4]Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
Distributed Time-aware Provenance. Proc. VLDB Endow. 6(2): 49-60 (2012) - [c27]Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao, William R. Marczak, Micah Sherr, Anduo Wang, Wenchao Zhou:
Recent Advances in Declarative Networking. PADL 2012: 1-16 - [c26]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and verifiable interdomain routing decisions. SIGCOMM 2012: 383-394 - [c24]Sandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo, Micah Sherr, Clay Shields, Jonathan M. Smith:
Collaborative Red Teaming for Anonymity System Evaluation. CSET 2012 - 2011
- [c22]Alexander J. T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, Boon Thau Loo:
Having your cake and eating it too: routing security with privacy protections. HotNets 2011: 15 - [c21]Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems. SIGMOD Conference 2011: 1323-1326 - [c20]Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, Micah Sherr:
Secure network provenance. SOSP 2011: 295-310 - 2010
- [c18]Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, Insup Lee:
Towards a data-centric view of cloud security. CloudDB@CIKM 2010: 25-32 - [c17]Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
A3: An Extensible Platform for Application-Aware Anonymity. NDSS 2010 - [c16]Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, Yun Mao:
Efficient querying and maintenance of network provenance at internet-scale. SIGMOD Conference 2010: 615-626 - [c15]William R. Marczak, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, Molham Aref:
SecureBlox: customizable secure distributed data processing. SIGMOD Conference 2010: 723-734 - 2009
- [c11]Micah Sherr, Matt Blaze, Boon Thau Loo:
Scalable Link-Based Relay Selection for Anonymous Routing. Privacy Enhancing Technologies 2009: 73-93 - [c10]Micah Sherr, Matt Blaze, Boon Thau Loo:
Veracity: Practical Secure Network Coordinates via Vote-based Agreements. USENIX Annual Technical Conference 2009 - 2008
- [c9]Micah Sherr, Boon Thau Loo, Matt Blaze:
Veracity: a fully decentralized service for securing network coordinate systems. IPTPS 2008: 15 - 2007
- [c5]Micah Sherr, Boon Thau Loo, Matt Blaze:
Towards Application-Aware Anonymous Routing. HotSec 2007
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-18 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint