
Roya Ensafi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j5]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 13:1-13:23 (2020) - [j4]Muhammad Ikram
, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar
, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. ACM Trans. Priv. Secur. 23(2): 8:1-8:27 (2020) - [c24]Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi:
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. CCS 2020: 49-66 - [c23]Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi:
Investigating Large Scale HTTPS Interception in Kazakhstan. Internet Measurement Conference 2020: 125-132 - [c22]Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi:
Measuring the Deployment of Network Censorship Filters at Global Scale. NDSS 2020 - [c21]Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi:
Decentralized Control: A Case Study of Russia. NDSS 2020 - [c20]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. SIGMETRICS (Abstracts) 2020: 69-70 - [e1]Roya Ensafi, Hans Klein:
10th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2020, August 11, 2020. USENIX Association 2020 [contents]
2010 – 2019
- 2019
- [c19]Muhammad Ikram
, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar
, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. WWW 2019: 2851-2857 - [i5]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. CoRR abs/1901.07699 (2019) - 2018
- [j3]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Toward Continual Measurement of Global Network-Level Censorship. IEEE Secur. Priv. 16(1): 24-33 (2018) - [c18]Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford:
Nation-State Hegemony in Internet Routing. COMPASS 2018: 17:1-17:11 - [c17]Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi:
403 Forbidden: A Global View of CDN Geoblocking. Internet Measurement Conference 2018: 218-230 - [c16]Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi:
Quack: Scalable Remote Measurement of Application-Layer Censorship. USENIX Security Symposium 2018: 187-202 - 2017
- [j2]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global-Scale Measurement of DNS Manipulation. login Usenix Mag. 42(4) (2017) - [c15]Manaf Gharaibeh, Anant Shah, Bradley Huffaker, Han Zhang, Roya Ensafi, Christos Papadopoulos:
A look at router geolocation in public and commercial databases. Internet Measurement Conference 2017: 463-469 - [c14]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Augur: Internet-Wide Detection of Connectivity Disruptions. IEEE Symposium on Security and Privacy 2017: 427-443 - [c13]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global Measurement of DNS Manipulation. USENIX Security Symposium 2017: 307-323 - 2016
- [c12]Sarthak Grover, Roya Ensafi, Nick Feamster:
A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades. PAM 2016: 124-135 - [c11]Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford:
A First Look into Transnational Routing Detours. SIGCOMM 2016: 567-568 - [c10]Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster:
Identifying and Characterizing Sybils in the Tor Network. USENIX Security Symposium 2016: 1169-1185 - [i4]Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster:
Identifying and characterizing Sybils in the Tor network. CoRR abs/1602.07787 (2016) - [i3]Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford:
Characterizing and Avoiding Routing Detours Through Surveillance States. CoRR abs/1605.07685 (2016) - 2015
- [j1]Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Analyzing the Great Firewall of China Over Space and Time. Proc. Priv. Enhancing Technol. 2015(1): 61-76 (2015) - [c9]Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson:
Examining How the Great Firewall Discovers Hidden Circumvention Servers. Internet Measurement Conference 2015: 445-458 - [c8]Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nicholas Weaver:
Ethical Concerns for Censorship Measurement. NS Ethics@SIGCOMM 2015: 17-19 - 2014
- [c7]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels. PAM 2014: 109-118 - [c6]Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
A Case Study in Helping Students to Covertly Eat Their Classmates. 3GSE 2014 - [i2]Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. CoRR abs/1410.0735 (2014) - 2013
- [i1]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version. CoRR abs/1312.5739 (2013) - 2012
- [c5]Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper. CSET 2012 - 2010
- [c4]Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall:
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. USENIX Security Symposium 2010: 257-272
2000 – 2009
- 2008
- [c3]Roya Ensafi, Soheila Dehghanzadeh, Mohammad R. Akbarzadeh-Totonchi:
Optimizing Fuzzy K-means for network anomaly detection using PSO. AICCSA 2008: 686-693 - [c2]Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro:
The ecology of Malware. NSPW 2008: 99-106 - 2007
- [c1]Vahid Salmani, Roya Ensafi, Narges Khatib-Astaneh, Mahmoud Naghibzadeh:
A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems. ICIT 2007: 179-184
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-11 23:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint