
Jeffrey Knockel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
[j3]Sorin I. Avram
, Cristian Bologa, Jayme Holmes, Giovanni Bocci, Thomas B. Wilson, Dac-Trung Nguyen
, Ramona Curpan, Liliana Halip, Alina Bora, Jeremy J. Yang, Jeffrey Knockel, Suman Sirimulla, Oleg Ursu, Tudor I. Oprea
:
DrugCentral 2021 supports drug discovery and repositioning. Nucleic Acids Res. 49(Database-Issue): D1160-D1169 (2021)
[i4]Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis:
How Great is the Great Firewall? Measuring China's DNS Censorship. CoRR abs/2106.02167 (2021)
2010 – 2019
- 2019
[c15]Ruohan Xiong, Jeffrey Knockel:
An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message. FOCI @ USENIX Security Symposium 2019- 2018
[c14]Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path. INFOCOM 2018: 2069-2077
[c13]Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata:
An analysis of automatic image filtering on WeChat Moments. FOCI @ USENIX Security Symposium 2018
[i3]Jeffrey Knockel, Thomas Ristenpart, Jedidiah R. Crandall:
When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users. CoRR abs/1802.03367 (2018)- 2017
[j2]Oleg Ursu, Jayme Holmes, Jeffrey Knockel, Cristian Bologa, Jeremy J. Yang, Stephen L. Mathias, Stuart J. Nelson, Tudor I. Oprea
:
DrugCentral: online drug compendium. Nucleic Acids Res. 45(Database-Issue): D932-D939 (2017)
[c12]Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata:
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games. FOCI @ USENIX Security Symposium 2017- 2016
[c11]Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall:
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering. ARES 2016: 266-271
[c10]Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
High Fidelity Off-Path Round-Trip Time Measurement via TCP/IP Side Channels with Duplicate SYNs. GLOBECOM 2016: 1-6
[c9]Jeffrey Knockel, Adam Senft, Ronald J. Deibert:
Privacy and Security Issues in BAT Web Browsers. FOCI 2016- 2015
[c8]Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
Original SYN: Finding machines hidden behind firewalls. INFOCOM 2015: 720-728
[c7]Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel:
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering. NS Ethics@SIGCOMM 2015: 3- 2014
[c6]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels. PAM 2014: 109-118
[c5]Jeffrey Knockel, Jedidiah R. Crandall:
Counting Packets Sent Between Arbitrary Internet Hosts. FOCI 2014- 2013
[j1]Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, Greg Wiseman:
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18(7) (2013)
[c4]Jeffrey Knockel, George Saad, Jared Saia:
Self-Healing of Byzantine Faults. SSS 2013: 98-112
[i2]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version. CoRR abs/1312.5739 (2013)- 2012
[c3]Nicholas Aase, Jedidiah R. Crandall, Alvaro Diaz, Jeffrey Knockel, Jorge Ocana Molinero, Jared Saia, Dan S. Wallach, Tao Zhu:
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations. FOCI 2012
[c2]Jeffrey Knockel, Jedidiah R. Crandall:
Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd. FOCI 2012
[i1]Jeffrey Knockel, George Saad, Jared Saia:
Self-Healing Algorithms for Byzantine Faults. CoRR abs/1205.4681 (2012)- 2011
[c1]Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia:
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. FOCI 2011
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from
on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-06-11 23:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
MS Academic
CiteSeerX
ORCID






