Follow
Ian D. Foster
Title
Cited by
Cited by
Year
Fast and Vulnerable: A Story of Telematic Failures
I Foster, A Prudhomme, K Koscher, S Savage
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
2432015
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
ID Foster, J Larson, M Masich, AC Snoeren, S Savage, K Levchenko
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1162015
Who is. com? Learning to parse WHOIS records
S Liu, I Foster, S Savage, GM Voelker, LK Saul
Proceedings of the 2015 Internet Measurement Conference, 369-380, 2015
702015
From .academy to .zone: An Analysis of the New TLD Land Rush
T Halvorson, MF Der, I Foster, S Savage, LK Saul, GM Voelker
Proceedings of the 2015 ACM Conference on Internet Measurement Conference …, 2015
532015
Exploring Controller Area Networks
I Foster, K Koscher
;login: 40 (6), 5, 2015
382015
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations
G Akiwate, M Jonker, R Sommese, I Foster, GM Voelker, S Savage, ...
Proceedings of the 2020 ACM Conference on Internet Measurement Conference, 2020
202020
In the Line of Fire: Risks of DPI-triggered Data Collection
A Mirian, A Ukani, I Foster, G Akiwate, T Halicioglu, CT Moore, ...
Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 57-63, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–7