Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chris Wacek
@article{DBLP:journals/tissec/JansenTGWSS18, author = {Rob Jansen and Matthew Traudt and John Geddes and Chris Wacek and Micah Sherr and Paul Syverson}, title = {{KIST:} Kernel-Informed Socket Transport for Tor}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {3:1--3:37}, year = {2019}, url = {https://doi.org/10.1145/3278121}, doi = {10.1145/3278121}, timestamp = {Fri, 10 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JansenTGWSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stids/SalemW15, author = {Malek Ben Salem and Chris Wacek}, editor = {Kathryn Blackmond Laskey and Ian Emmons and Paulo C. G. Costa and Alessandro Oltramari}, title = {Enabling New Technologies for Cyber Security Defense with the {ICAS} Cyber Security Ontology}, booktitle = {Proceedings of the Tenth Conference on Semantic Technology for Intelligence, Defense, and Security, Fairfax VA, USA, November 18-20, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1523}, pages = {42--49}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1523/STIDS\_2015\_T06\_BenSalem\_Wacek.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:26 +0100}, biburl = {https://dblp.org/rec/conf/stids/SalemW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/TanWNS14, author = {Henry Tan and Chris Wacek and Calvin C. Newport and Micah Sherr}, editor = {Marcos K. Aguilera and Leonardo Querzoni and Marc Shapiro}, title = {A Disruption-Resistant {MAC} Layer for Multichannel Wireless Networks}, booktitle = {Principles of Distributed Systems - 18th International Conference, {OPODIS} 2014, Cortina d'Ampezzo, Italy, December 16-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8878}, pages = {202--216}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14472-6\_14}, doi = {10.1007/978-3-319-14472-6\_14}, timestamp = {Mon, 15 Jun 2020 17:10:01 +0200}, biburl = {https://dblp.org/rec/conf/opodis/TanWNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JansenGWSS14, author = {Rob Jansen and John Geddes and Chris Wacek and Micah Sherr and Paul F. Syverson}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Never Been {KIST:} Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {127--142}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/jansen}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/JansenGWSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JohnsonWJSS13, author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul F. Syverson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Users get routed: traffic correlation on tor by realistic adversaries}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {337--348}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516651}, doi = {10.1145/2508859.2516651}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JohnsonWJSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WacekTBS13, author = {Chris Wacek and Henry Tan and Kevin S. Bauer and Micah Sherr}, title = {An Empirical Evaluation of Relay Selection in Tor}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/empirical-evaluation-relay-selection-tor}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WacekTBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ClarkWBLSSS12, author = {Sandy Clark and Chris Wacek and Matt Blaze and Boon Thau Loo and Micah Sherr and Clay Shields and Jonathan M. Smith}, editor = {Sean Peisert and Stephen Schwab}, title = {Collaborative Red Teaming for Anonymity System Evaluation}, booktitle = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12, Bellevue, WA, USA, August 6, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/cset12/workshop-program/presentation/clark}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ClarkWBLSSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MooreWS11, author = {W. Brad Moore and Chris Wacek and Micah Sherr}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {207--216}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076762}, doi = {10.1145/2076732.2076762}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MooreWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.