William R. Marczak

According to our database1, William R. Marczak authored at least 17 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
How Great is the Great Firewall? Measuring China's DNS Censorship.
Proceedings of the 30th USENIX Security Symposium, 2021

Cache Me Outside: A New Look at DNS Cache Probing.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

2017
Social Engineering Attacks on Government Opponents: Target Perspectives.
Proc. Priv. Enhancing Technol., 2017

2016
Defending Dissidents from Targeted Digital Surveillance.
PhD thesis, 2016

Putting logic-based distributed systems on stable grounds.
Theory Pract. Log. Program., 2016

2014
The design and implementation of the A<sup>3</sup> application-aware anonymity platform.
Comput. Networks, 2014

When Governments Hack Opponents: A Look at Actors and Technology.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2012
BloomUnit: declarative testing for distributed programs.
Proceedings of the Fifth International Workshop on Testing Database Systems, 2012

Recent Advances in Declarative Networking.
Proceedings of the Practical Aspects of Declarative Languages, 2012

Confluence Analysis for Distributed Programs: A Model-Theoretic Approach.
Proceedings of the Datalog in Academia and Industry - Second International Workshop, 2012

Logic and lattices for distributed programming.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

2011
Consistency Analysis in Bloom: a CALM and Collected Approach.
Proceedings of the Fifth Biennial Conference on Innovative Data Systems Research, 2011

2010
SecureBlox: customizable secure distributed data processing.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

A3: An Extensible Platform for Application-Aware Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010

Dedalus: Datalog in Time and Space.
Proceedings of the Datalog Reloaded - First International Workshop, 2010

Towards a data-centric view of cloud security.
Proceedings of the Second International CIKM Workshop on Cloud Data Management, 2010

2009
Declarative Reconfigurable Trust Management.
Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, 2009


  Loading...