


Остановите войну!
for scientists:


default search action
Geoffrey M. Voelker
Geoff Voelker
Person information

- affiliation: University of California, San Diego, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j33]Enze Liu
, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proc. Priv. Enhancing Technol. 2023(1): 207-224 (2023) - [i5]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. CoRR abs/2302.07287 (2023) - 2022
- [j32]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring security practices. Commun. ACM 65(9): 93-102 (2022) - [c131]Lixiang Ao, George Porter, Geoffrey M. Voelker:
FaaSnap: FaaS made fast using snapshot-based VMs. EuroSys 2022: 730-746 - [c130]Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc claffy, Geoffrey M. Voelker, Stefan Savage:
Retroactive identification of targeted DNS infrastructure hijacking. IMC 2022: 14-32 - [c129]Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc claffy, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij
, Stefan Savage:
Where .ru?: assessing the impact of conflict on russian domain infrastructure. IMC 2022: 159-165 - [c128]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Measuring UID smuggling in the wild. IMC 2022: 230-243 - [c127]Antonia Affinito, Raffaele Sommese, Gautam Akiwate, Stefan Savage, kc claffy, Geoffrey M. Voelker, Alessio Botta, Mattijs Jonker:
Domain Name Lifetimes: Baseline and Threats. TMA 2022 - [i4]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoff Voelker, Stefan Savage, Aaron Schulman:
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild. CoRR abs/2203.10188 (2022) - 2021
- [c126]Enze Liu
, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker:
Who's got your mail?: characterizing mail service provider usage. Internet Measurement Conference 2021: 122-136 - [c125]Audrey Randall, Enze Liu
, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Home is where the hijacking is: understanding DNS interception by residential routers. Internet Measurement Conference 2021: 390-397 - [c124]Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, Kimberly C. Claffy:
Risky BIZness: risks derived from registrar name management. Internet Measurement Conference 2021: 673-686 - [c123]Vector Guo Li, Gautam Akiwate, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Clairvoyance: Inferring Blocklist Use on the Internet. PAM 2021: 57-75 - [c122]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - [c121]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [i3]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - 2020
- [j31]Geoffrey M. Voelker:
Technical perspective: Fake 'likes' and targeting collusion networks. Commun. ACM 63(5): 102 (2020) - [c120]Shelby Thomas, Lixiang Ao, Geoffrey M. Voelker, George Porter:
Particle: ephemeral endpoints for serverless networking. SoCC 2020: 16-29 - [c119]Audrey Randall, Enze Liu
, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. Internet Measurement Conference 2020: 50-64 - [c118]Gautam Akiwate, Mattijs Jonker, Raffaele Sommese, Ian D. Foster, Geoffrey M. Voelker, Stefan Savage, kc claffy:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. Internet Measurement Conference 2020: 281-294
2010 – 2019
- 2019
- [j30]Andrea C. Arpaci-Dusseau, Geoffrey M. Voelker:
Introduction to the Special Section on OSDI'18. ACM Trans. Storage 15(2): 12:1 (2019) - [c117]Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, Geoffrey M. Voelker:
Web feature deprecation: a case study for chrome. ICSE (SEIP) 2019: 302-311 - [c116]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring Security Practices and How They Impact Security. Internet Measurement Conference 2019: 36-49 - [c115]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c114]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [c113]Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Kurt Thomas:
Hack for Hire: Exploring the Emerging Market for Account Hijacking. WWW 2019: 1279-1289 - [i2]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [c112]Shelby Thomas, Rob McGuinness, Geoffrey M. Voelker, George Porter:
Dark packets and the end of network scaling. ANCS 2018: 1-14 - [c111]Lixiang Ao, Liz Izhikevich, Geoffrey M. Voelker, George Porter:
Sprocket: A Serverless Video Processing Framework. SoCC 2018: 263-274 - [c110]Shelby Thomas, Geoffrey M. Voelker, George Porter:
CacheCloud: Towards Speed-of-light Datacenter Communication. HotCloud 2018 - [c109]Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses. Internet Measurement Conference 2018: 43-55 - [c108]Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez:
An Empirical Analysis of the Commercial VPN Ecosystem. Internet Measurement Conference 2018: 443-456 - [e4]Andrea C. Arpaci-Dusseau, Geoff Voelker:
13th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2018, Carlsbad, CA, USA, October 8-10, 2018. USENIX Association 2018 [contents] - 2017
- [c107]Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, Alex C. Snoeren:
Exploring the dynamics of search advertiser fraud. Internet Measurement Conference 2017: 157-170 - [c106]Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren:
Tripwire: inferring internet site compromise. Internet Measurement Conference 2017: 341-354 - [c105]Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. CSET @ USENIX Security Symposium 2017 - 2016
- [j29]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - 2015
- [j28]Patrick Ling, Feng Lu, Alex C. Snoeren, Geoffrey M. Voelker:
Enfold: Downclocking OFDM in Wi-Fi. GetMobile Mob. Comput. Commun. 19(2): 10-13 (2015) - [j27]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
Managing Contention with Medley. IEEE Trans. Mob. Comput. 14(3): 579-591 (2015) - [c104]He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, Alex C. Snoeren:
Scheduling techniques for hybrid circuit/packet networks. CoNEXT 2015: 41:1-41:13 - [c103]Neha Chachra, Stefan Savage, Geoffrey M. Voelker:
Affiliate Crookies: Characterizing Affiliate Marketing Abuse. Internet Measurement Conference 2015: 41-47 - [c102]Suqi Liu, Ian D. Foster, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul:
Who is .com?: Learning to Parse WHOIS Records. Internet Measurement Conference 2015: 369-380 - [c101]Tristan Halvorson, Matthew F. Der, Ian D. Foster, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker:
From .academy to .zone: An Analysis of the New TLD Land Rush. Internet Measurement Conference 2015: 381-394 - [c100]Feng Lu, Hao Du, Ankur Jain, Geoffrey M. Voelker, Alex C. Snoeren, Andreas Terzis:
CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks. HotMobile 2015: 45-50 - 2014
- [c99]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c98]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c97]Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Knock it off: profiling the online storefronts of counterfeit merchandise. KDD 2014: 1759-1768 - [c96]Feng Lu, Patrick Ling, Geoffrey M. Voelker, Alex C. Snoeren:
Enfold: downclocking OFDM in WiFi. MobiCom 2014: 129-140 - [c95]Qing Zhang, David Y. Wang, Geoffrey M. Voelker:
DSpin: Detecting Automatically Spun Content on the Web. NDSS 2014 - [c94]He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, George Porter:
Circuit Switching Under the Radar with REACToR. NSDI 2014: 1-15 - [c93]Tristan Halvorson, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
XXXtortion?: inferring registration intent in the .XXX TLD. WWW 2014: 901-912 - [i1]Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul:
Topic Modeling of Hierarchical Corpora. CoRR abs/1409.3518 (2014) - 2013
- [j26]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c92]Rishi Kapoor, Alex C. Snoeren, Geoffrey M. Voelker, George Porter:
Bullet trains: a study of NIC burst behavior at microsecond timescales. CoNEXT 2013: 133-138 - [c91]Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul:
A Variational Approximation for Topic Modeling of Hierarchical Corpora. ICML (2) 2013: 55-63 - [c90]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c89]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Juice: A Longitudinal Study of an SEO Botnet. NDSS 2013 - [c88]Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, Geoffrey M. Voelker:
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. NSDI 2013: 57-70 - [c87]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
SloMo: Downclocking WiFi Communication. NSDI 2013: 255-268 - 2012
- [c86]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa
, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c85]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c84]Rishi Kapoor, George Porter, Malveeka Tewari, Geoffrey M. Voelker, Amin Vahdat:
Chronos: predictable low latency for data center applications. SoCC 2012: 9 - [c83]James Mitchell, Eamonn O'Neill
, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Limitations of scanned human copresence encounters for modelling proximity-borne malware. COMSNETS 2012: 1-10 - [c82]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
BlueSky: a cloud-backed file system for the enterprise. FAST 2012: 19 - [c81]Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage:
Taster's choice: a comparative analysis of spam feeds. Internet Measurement Conference 2012: 427-440 - [c80]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
Weighted fair queuing with differential dropping. INFOCOM 2012: 2981-2985 - [c79]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [j25]Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker:
Sora: high-performance software radio using general-purpose multi-core processors. Commun. ACM 54(1): 99-107 (2011) - [j24]Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. Commun. ACM 54(5): 78-87 (2011) - [j23]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3): 30:1-30:24 (2011) - [j22]Diwaker Gupta, Kashi Venkatesh Vishwanath, Marvin McNett, Amin Vahdat, Ken Yocum, Alex C. Snoeren, Geoffrey M. Voelker:
DieCast: Testing Distributed Systems with an Accurate Scale Model. ACM Trans. Comput. Syst. 29(2): 4:1-4:48 (2011) - [c78]Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul:
Topic modeling of freelance job postings to monitor web service abuse. AISec 2011: 11-20 - [c77]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Cloak and dagger: dynamics of web search cloaking. CCS 2011: 477-490 - [c76]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
An analysis of underground forums. Internet Measurement Conference 2011: 71-80 - [c75]Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, Christophe Diot:
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. INFOCOM 2011: 1179-1187 - [c74]He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker:
On the Effects of Registrar-level Intervention. LEET 2011 - [c73]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c72]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c71]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c70]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c69]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. USENIX Security Symposium 2011 - [c68]Qing Zhang, Thomas Ristenpart, Stefan Savage, Geoffrey M. Voelker:
Got traffic?: an evaluation of click traffic providers. WebQuality@WWW 2011: 19-26 - 2010
- [j21]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference engine: harnessing memory redundancy in virtual machines. Commun. ACM 53(10): 85-93 (2010) - [j20]Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren:
Usage Patterns in an Urban WiFi Network. IEEE/ACM Trans. Netw. 18(5): 1359-1372 (2010) - [c67]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c66]Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond heuristics: learning to classify vulnerabilities and predict exploits. KDD 2010: 105-114 - [c65]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [c64]Matteo Varvello, Geoffrey M. Voelker:
Second life: a social network of humans and bots. NOSSDAV 2010: 9-14 - [c63]Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. USENIX Security Symposium 2010: 435-462 - [c62]Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Neon: system support for derived data management. VEE 2010: 63-74 - [c61]Marti Motoyama, Brendan Meeder, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Measuring Online Service Availability Using Twitter. WOSN 2010 - [e3]Shivkumar Kalyanaraman, Venkata N. Padmanabhan, K. K. Ramakrishnan, Rajeev Shorey, Geoffrey M. Voelker:
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010. ACM 2010, ISBN 978-1-4503-0201-2 [contents]
2000 – 2009
- 2009
- [j19]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [j18]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem backup to the cloud. ACM Trans. Storage 5(4): 14:1-14:28 (2009) - [j17]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine. login Usenix Mag. 34(2) (2009) - [j16]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. login Usenix Mag. 34(4) (2009) - [c60]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. FAST 2009: 225-238 - [c59]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Identifying suspicious URLs: an application of large-scale online learning. ICML 2009: 681-688 - [c58]Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Defending Mobile Phones from Proximity Malware. INFOCOM 2009: 1503-1511 - [c57]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond blacklists: learning to detect malicious web sites from suspicious URLs. KDD 2009: 1245-1254 - [c56]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - [c55]Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, Geoffrey M. Voelker:
SAM: enabling practical spatial multiple access in wireless LAN. MobiCom 2009: 49-60 - [c54]Kun Tan, Jiansong Zhang, Ji Fang, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Haitao Wu, Wei Wang, Geoffrey M. Voelker:
Sora: High Performance Software Radio Using General Purpose Multi-core Processors. NSDI 2009: 75-90 - [c53]Bhavish Agarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, Geoffrey M. Voelker:
NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. NSDI 2009: 349-364 - [c52]Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Wenguang Chen, Weimin Zheng, Zheng Zhang, Geoffrey M. Voelker:
MPIWiz: subgroup reproducible replay of mpi applications. PPoPP 2009: 251-260 - [e2]Geoffrey M. Voelker, Alec Wolman:
2009 USENIX Annual Technical Conference, San Diego, CA, USA, June 14-19, 2009. USENIX Association 2009 [contents] - 2008
- [j15]Abhishek B. Sharma, Ranjita Bhagwan, Monojit Choudhury, Leana Golubchik, Ramesh Govindan, Geoffrey M. Voelker:
Automatic request categorization in internet services. SIGMETRICS Perform. Evaluation Rev. 36(2): 16-25 (2008) - [j14]Vijay Chellappa, Pamela C. Cosman
, Geoffrey M. Voelker:
Dual Frame Motion Compensation With Uneven Quality Assignment. IEEE Trans. Circuits Syst. Video Technol. 18(2): 249-256 (2008) - [j13]Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, Kirill Levchenko:
Storm: When Researchers Collide. login Usenix Mag. 33(4) (2008) - [c51]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. CCS 2008: 3-14 - [c50]Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, Geoffrey M. Voelker:
Towards Automatic Inference of Task Hierarchies in Complex Systems. HotDep 2008 - [c49]Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren:
Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan. Internet Measurement Conference 2008: 85-98 - [c48]Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage:
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. LEET 2008 - [c47]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
On the Spam Campaign Trail. LEET 2008 - [c46]Geoffrey M. Voelker:
Banal: Because Format Checking Is So Trite. WOWCS 2008 - [c45]