default search action
BibTeX records: Cecylia Bocovich
@inproceedings{DBLP:conf/uss/BocovichBFSW24, author = {Cecylia Bocovich and Arlo Breault and David Fifield and Serene and Xiaokang Wang}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Snowflake, a censorship circumvention system using temporary WebRTC proxies}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/bocovich}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/BocovichBFSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KwanJQWB21, author = {Carmen Kwan and Paul Janiszewski and Shela Qiu and Cathy Wang and Cecylia Bocovich}, title = {Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels}, booktitle = {{FOCI} '21: Proceedings of the {ACM} {SIGCOMM} 2021 Workshop on Free and Open Communications on the Internet, Virtual Event, USA, 27 August 2021}, pages = {37--42}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3473604.3474563}, doi = {10.1145/3473604.3474563}, timestamp = {Thu, 26 Aug 2021 16:34:05 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/KwanJQWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LorimerTBG21, author = {Anna Harbluk Lorimer and Lindsey Tulloch and Cecylia Bocovich and Ian Goldberg}, title = {OUStralopithecus: Overt User Simulation for Censorship Circumvention}, booktitle = {{WPES} '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 15 November 2021}, pages = {137--150}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3463676.3485604}, doi = {10.1145/3463676.3485604}, timestamp = {Thu, 03 Nov 2022 11:11:48 +0100}, biburl = {https://dblp.org/rec/conf/wpes/LorimerTBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BocovichG18, author = {Cecylia Bocovich and Ian Goldberg}, title = {Secure asymmetry and deployability for decoy routing systems}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {3}, pages = {43--62}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0020}, doi = {10.1515/POPETS-2018-0020}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/BocovichG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BocovichDG17, author = {Cecylia Bocovich and John A. Doucette and Ian Goldberg}, editor = {Aggelos Kiayias}, title = {Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {601--620}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_34}, doi = {10.1007/978-3-319-70972-7\_34}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BocovichDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AtwaterBHG17, author = {Erinn Atwater and Cecylia Bocovich and Urs Hengartner and Ian Goldberg}, editor = {Mark A. Gondree and Ashley L. Podhradsky}, title = {Live Lesson: Netsim: Network simulation and hacking for high schoolers}, booktitle = {2017 {USENIX} Workshop on Advances in Security Education, {ASE} 2017, Vancouver, BC, Canada, August 15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/ase17/workshop-program/presentation/atwater}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/AtwaterBHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BocovichG16, author = {Cecylia Bocovich and Ian Goldberg}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1702--1714}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978312}, doi = {10.1145/2976749.2978312}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BocovichG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/BocovichA16, author = {Cecylia Bocovich and Joanne M. Atlee}, editor = {Federico Ciccozzi and Ivano Malavolta}, title = {Feature-Oriented Modelling in {BIP:} {A} Case Study}, booktitle = {Proceedings of the 3rd International Workshop on Interplay of Model-Driven and Component-Based Software Engineering co-located with {ACM/IEEE} 19th International Conference on Model Driven Engineering Languages {\&} Systems (MoDELS 2016), Saint-Malo, France, October 2nd, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1723}, pages = {6--11}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1723/1.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:21 +0100}, biburl = {https://dblp.org/rec/conf/models/BocovichA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/AtwaterBHLG15, author = {Erinn Atwater and Cecylia Bocovich and Urs Hengartner and Ed Lank and Ian Goldberg}, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {Leading Johnny to Water: Designing for Usability and Trust}, booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, pages = {69--88}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015/proceedings/presentation/atwater}, timestamp = {Thu, 05 Sep 2024 15:37:23 +0200}, biburl = {https://dblp.org/rec/conf/soups/AtwaterBHLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/BiggersBCEEK14, author = {Lauren R. Biggers and Cecylia Bocovich and Riley Capshaw and Brian P. Eddy and Letha H. Etzkorn and Nicholas A. Kraft}, title = {Configuring latent Dirichlet allocation based feature location}, journal = {Empir. Softw. Eng.}, volume = {19}, number = {3}, pages = {465--500}, year = {2014}, url = {https://doi.org/10.1007/s10664-012-9224-x}, doi = {10.1007/S10664-012-9224-X}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/BiggersBCEEK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/BocovichA14, author = {Cecylia Bocovich and Joanne M. Atlee}, editor = {Shing{-}Chi Cheung and Alessandro Orso and Margaret{-}Anne D. Storey}, title = {Variable-specific resolutions for feature interactions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014}, pages = {553--563}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2635868.2635927}, doi = {10.1145/2635868.2635927}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/BocovichA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.