USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 14 results:
Filters: Author is Michael Bailey [Clear All Filters]
Designing Toxic Content Classification for a Diversity of Perspectives. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :299--318.
.
2021. What's in a Name? Exploring CA Certificate Control 30th USENIX Security Symposium (USENIX Security 21). :4383--4400.
.
2021. Empirical Measurement of Systemic 2FA Usability. 29th USENIX Security Symposium (USENIX Security 20). :127--143.
.
2020. The Impact of Secure Transport Protocols on Phishing Efficacy. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19).
.
2019. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 27th USENIX Security Symposium (USENIX Security 18). :1371--1385.
.
2018. Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security 18). :33--47.
.
2018. Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.
.
2017. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 25th USENIX Security Symposium (USENIX Security 16). :1033--1050.
.
2016. Bohatei: Flexible and Elastic DDoS Defense. 24th USENIX Security Symposium (USENIX Security 15). :817--832.
.
2015. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. 24th USENIX Security Symposium (USENIX Security 15). :1009--1024.
.
2015. An Internet-Wide View of Internet-Wide Scanning. 23rd USENIX Security Symposium (USENIX Security 14). :65--78.
.
2014. Bobtail: Avoiding Long Tails in the Cloud. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :329--341.
.
2013. The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery . 3rd Symposium on Networked Systems Design & Implementation (NSDI 06).
.
2006. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Internet Measurement Conference 2005 (IMC 05).
.
2005.