Year: 2015

Journal Article

BlindBox: Deep Packet Inspection over Encrypted Traffic.

2015 • IACR Cryptol. ePrint Arch. • 2015:264-264
Sherry J, Lan C, Popa RA, Ratnasamy S

Conference

High confidence policy improvement

2015 • 32nd International Conference on Machine Learning Icml 2015 • 3:2370-2378
Thomas PS, Theocharous G, Ghavamzadeh M

Conference

Preface

2015 • Electronic Proceedings in Theoretical Computer Science •
Cervesato I, Schuermann C

Conference

Monitoring Stealthy Diffusion

2015 • Proceedings / IEEE International Conference on Data Mining. IEEE International Conference on Data Mining • 151-160
Haghtalab N, Laszka A, Procaccia AD, Vorobeychik Y, Koutsoukos X

Conference

The Case for Offload Shaping

2015 • 16TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE' 15) • 51-56
Hu W, Amos B, Chen Z, Ha K, Richter W, Pillai P, Gilbert B, Harkes J, Satyanarayanan M

Journal Article

BlindBox: Deep Packet Inspection over Encrypted Traffic.

2015 • Comput. Commun. Rev. • 45:213-226
Sherry J, Lan C, Popa RA, Ratnasamy S

Conference

Foreword

2015 • Annual ACM Symposium on Parallelism in Algorithms and Architectures • 2015-June:iii
Agrawal K, Blelloch G

Conference

Preface

2015 • Electronic Proceedings in Theoretical Computer Science • 176:
Alves S, Cervesato I, Chaudhuri K, Fernández M, Florido M, Gay S, Martini S, Paolini L, Della Rocca SR, Schürmann C, Simmons R, Vasconcelos V