
Publications
peer-reviewed | invited | workshop | techreport | poster | other
Google Scholar profile
ORCID: 0000-0002-7352-6463
Scopus researcher ID: 55731050200
Web of Science ResearcherID: AAE-2506-2019
Peer-reviewed publications
Communications in Computer and Information Science (CCIS) vol. 1562:
PRIP 2021: Pattern Recognition and Information Processing,
Revised Selected Papers
,
18 Mar 2022
.
10.1007/978-3-030-98883-8_3
PRIP 2021: Proceedings of the 15th International Conference on Pattern Recognition and Information Processing
,
Sep 2021
.
SPW2019: Proceedings of the twenty-seventh International Workshop on Security Protocols
,
2020
.
10.1007/978-3-030-57043-9_17
15th International Conference on Network and Service Management (CNSM)
,
Oct 2019
.
10.23919/CNSM46954.2019.9012736
CCS 2015: Proceedings of the 22nd ACM Conference on
Computer and Communications Security
,
October 2015
.
10.1145/2810103.2813611
SP2015:
Proceedings of the 36th IEEE Symposium on Security and Privacy
,
May 2015
.
10.1109/SP.2015.9
ISCA 2014:
the 41st International Symposium on Computer Architecture
,
June 2014
.
10.1145/2678373.2665740
Proceedings of the 9th ACM European Conference on Computer Systems
(EuroSys)
,
April 2014
.
10.1145/2592798.2592801
Anderson et al. 2014. This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. [The definitive version](http://dx.doi.org/10.1145/2592798.2592801) was published in EuroSys 2014.
Proceedings of the
Twenty-first International Workshop on Security Protocols (SPW'13)
,
April 2013
.
10.1007/978-3-642-41717-7_4
Proceedings of the
Twentieth International Workshop on Security Protocols (SPW'12)
,
April 2012
.
10.1007/978-3-642-35694-0_26
Proceedings of the
19th International Workshop on Security Protocols (SPW'11)
,
2011
.
10.1007/978-3-642-25867-1_34
Proceedings of the 19th USENIX Security Symposium
,
August 2010
.
Proceedings of the
Eighteenth International Workshop on Security Protocols (SPW'10)
,
2010
.
10.1007/978-3-662-45921-8_16
Proceedings of the
Second ACM SIGCOMM Workshop on Social Network Systems
,
2009
.
10.1145/1592665.1592667
2009 ACM. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version appears in the [Proceedings of the Second ACM SIGCOMM Workshop on Social Network Systems](http://dl.acm.org/citation.cfm?id=1397705), 2009.
Proceedings of the 2009 International Conference on
Advances in Social Network Analysis and Mining (ASONAM)
,
2009
.
10.1109/ASONAM.2009.45
Invited articles
Workshop papers
Sandboxing: A Solution For Application Security
NECEC: Newfoundland Electrical and Computer Engineering Conference
,
.
An Overview and Comparison of Secure Programming Practices in Java and C++
NECEC: Newfoundland Electrical and Computer Engineering Conference
url: "https://necec2017.sched.com/"
,
.
Exploiting Autocorrect to Attack Privacy
Proceedings of the
Twenty-fourth International Workshop on Security Protocols (SPW 2016)
,
2016
.
Technical reports
OpenDTrace Specification version 1.0
University of Cambridge Computer Laboratory
UCAM-CL-TR-924
,
Aug 2018
.
Posters
Blog posts and press releases
Light Blue Touchpaper
,
April 2009
.
Light Blue Touchpaper
,
March 2009
.