Roya Ensafi
TitleCited byYear
Examining how the Great Firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Proceedings of the 2015 Internet Measurement Conference, 445-458, 2015
562015
China’s great cannon
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
Citizen Lab 10, 2015
522015
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
472010
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
472010
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
International Conference on Passive and Active Network Measurement, 109-118, 2014
46*2014
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies 2015 (1), 61-76, 2015
422015
Global Measurement of {DNS} Manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th {USENIX} Security Symposium ({USENIX} Security 17), 307-323, 2017
352017
Optimizing fuzzy k-means for network anomaly detection using pso
R Ensafi, S Dehghanzadeh, R Mohammad, T Akbarzadeh
Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International …, 2008
332008
An Analysis of China’s “Great Cannon”
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
312015
A look at router geolocation in public and commercial databases
M Gharaibeh, A Shah, B Huffaker, H Zhang, R Ensafi, C Papadopoulos
Proceedings of the 2017 Internet Measurement Conference, 463-469, 2017
292017
Augur: Internet-wide detection of connectivity disruptions
P Pearce, R Ensafi, F Li, N Feamster, V Paxson
2017 IEEE Symposium on Security and Privacy (SP), 427-443, 2017
272017
The ecology of malware
JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro
Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2009
202009
Identifying and characterizing Sybils in the Tor network
P Winter, R Ensafi, K Loesing, N Feamster
25th {USENIX} Security Symposium ({USENIX} Security 16), 1169-1185, 2016
192016
A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems
V Salmani, R Ensafi, N Khatib-Astaneh, M Naghibzadeh
Information Technology,(ICIT 2007). 10th International Conference on, 179-184, 2007
182007
A first look into transnational routing detours
A Edmundson, R Ensafi, N Feamster, J Rexford
Proceedings of the 2016 ACM SIGCOMM Conference, 567-568, 2016
15*2016
Ethical Concerns for Censorship Measurement
B Jones, R Ensafi, N Feamster, V Paxson, N Weaver
SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
132015
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
R Ensafi, M Jacobi, JR Crandall
CSET, 2012
92012
ICT challenges in education. Reflections from a developing country: Iran, with reference to the statistics from computer science students
R Ensafi, A Zamiri, M Kahani
The 2nd International Conference on Virtual Learning, Ferdowsi University …, 2007
72007
403 forbidden: a global view of CDN geoblocking
A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ...
Proceedings of the Internet Measurement Conference 2018, 218-230, 2018
62018
Quack: scalable remote measurement of application-layer censorship
B VanderSloot, A McDonald, W Scott, JA Halderman, R Ensafi
27th {USENIX} Security Symposium ({USENIX} Security 18), 187-202, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20