Follow
Ian D. Foster
Title
Cited by
Cited by
Year
Fast and Vulnerable: A Story of Telematic Failures
I Foster, A Prudhomme, K Koscher, S Savage
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
1942015
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
ID Foster, J Larson, M Masich, AC Snoeren, S Savage, K Levchenko
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
772015
Who is. com? Learning to parse WHOIS records
S Liu, I Foster, S Savage, GM Voelker, LK Saul
Proceedings of the 2015 Internet Measurement Conference, 369-380, 2015
482015
From .academy to .zone: An Analysis of the New TLD Land Rush
T Halvorson, MF Der, I Foster, S Savage, LK Saul, GM Voelker
Proceedings of the 2015 ACM Conference on Internet Measurement Conference …, 2015
402015
Exploring Controller Area Networks
I Foster, K Koscher
;login: 40 (6), 5, 2015
292015
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations
G Akiwate, M Jonker, R Sommese, I Foster, GM Voelker, S Savage, ...
Proceedings of the 2020 ACM Conference on Internet Measurement Conference, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–6