Roya Ensafi
TitleCited byYear
Examining how the Great Firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Proceedings of the 2015 Internet Measurement Conference, 445-458, 2015
612015
China’s great cannon
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
Citizen Lab 10, 2015
552015
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
International Conference on Passive and Active Network Measurement, 109-118, 2014
48*2014
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
482010
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
482010
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies 2015 (1), 61-76, 2015
462015
Global Measurement of {DNS} Manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th {USENIX} Security Symposium ({USENIX} Security 17), 307-323, 2017
432017
A look at router geolocation in public and commercial databases
M Gharaibeh, A Shah, B Huffaker, H Zhang, R Ensafi, C Papadopoulos
Proceedings of the 2017 Internet Measurement Conference, 463-469, 2017
362017
An Analysis of China’s “Great Cannon”
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
352015
Optimizing fuzzy k-means for network anomaly detection using pso
R Ensafi, S Dehghanzadeh, R Mohammad, T Akbarzadeh
Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International …, 2008
342008
Augur: Internet-wide detection of connectivity disruptions
P Pearce, R Ensafi, F Li, N Feamster, V Paxson
2017 IEEE Symposium on Security and Privacy (SP), 427-443, 2017
312017
The ecology of malware
JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro
Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2009
222009
Identifying and characterizing Sybils in the Tor network
P Winter, R Ensafi, K Loesing, N Feamster
25th {USENIX} Security Symposium ({USENIX} Security 16), 1169-1185, 2016
212016
A first look into transnational routing detours
A Edmundson, R Ensafi, N Feamster, J Rexford
Proceedings of the 2016 ACM SIGCOMM Conference, 567-568, 2016
18*2016
A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems
V Salmani, R Ensafi, N Khatib-Astaneh, M Naghibzadeh
Information Technology,(ICIT 2007). 10th International Conference on, 179-184, 2007
182007
Ethical Concerns for Censorship Measurement
B Jones, R Ensafi, N Feamster, V Paxson, N Weaver
SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
132015
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
R Ensafi, M Jacobi, JR Crandall
CSET, 2012
92012
403 forbidden: a global view of CDN geoblocking
A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ...
Proceedings of the Internet Measurement Conference 2018, 218-230, 2018
82018
Nation-state hegemony in internet routing
A Edmundson, R Ensafi, N Feamster, J Rexford
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
72018
ICT challenges in education. Reflections from a developing country: Iran, with reference to the statistics from computer science students
R Ensafi, A Zamiri, M Kahani
The 2nd International Conference on Virtual Learning, Ferdowsi University …, 2007
72007
The system can't perform the operation now. Try again later.
Articles 1–20