Cecylia Bocovich

According to our database1, Cecylia Bocovich authored at least 10 papers between 2014 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
OUStralopithecus: Overt User Simulation for Censorship Circumvention.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels.
Proceedings of the FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet, 2021

2018
Secure asymmetry and deployability for decoy routing systems.
Proc. Priv. Enhancing Technol., 2018

2017
Live Lesson: Netsim: Network simulation and hacking for high schoolers.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Feature-Oriented Modelling in BIP: A Case Study.
Proceedings of the 3rd International Workshop on Interplay of Model-Driven and Component-Based Software Engineering co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2016), 2016

Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Leading Johnny to Water: Designing for Usability and Trust.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

2014
Configuring latent Dirichlet allocation based feature location.
Empir. Softw. Eng., 2014

Variable-specific resolutions for feature interactions.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014


  Loading...