Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,591,430 papers from all fields of science
Search
Sign In
Create Free Account
Stefan Savage
Stefan Savage (born 1969) is an American computer science researcher, currently a Professor in the Systems and Networking Group at the University of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Computer science
George Varghese
List of Fellows of the Association for Computing Machinery
Malware
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Toward Optical Switching in the Data Center (Invited Paper)
W. M. Mellette
,
A. Snoeren
,
G. Porter
International Conference on High Performance…
2018
Corpus ID: 51680872
Optical switching may be instrumental in meeting the cost, power, and bandwidth requirements of future data center networks…
Expand
2015
2015
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems
Stevens Le Blond
,
D. Choffnes
,
William Caldwell
,
P. Druschel
,
Nicholas Merritt
Conference on Applications, Technologies…
2015
Corpus ID: 16279154
Effectively anonymizing Voice-over-IP (VoIP) calls requires a scalable anonymity network that is resilient to traffic analysis…
Expand
2015
2015
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
Rozaidah Saat
2015
Corpus ID: 14797838
: Cloud computing is a highly- scalable channel that enables the customers to receive IT related services over the internet at a…
Expand
2015
2015
Investigating Large-Scale Internet Abuse Through Web Page Classification
Matthew F. Der
2015
Corpus ID: 1495804
Author(s): Der, Matthew Francis | Advisor(s): Saul, Lawrence K; Voelker, Geoffrey M | Abstract: The Internet is rife with abuse…
Expand
2011
2011
Interview with Stefan Savage: On the Spam Payment Trail
Rik Farrow
Login: The Usenix Magazine
2011
Corpus ID: 56595680
[STEFAN] The truth is that Vern Paxson (UC Berkeley), Geoff Voelker (UC San Diego), and I started down this path back in 2006…
Expand
2011
2011
AOARD 094160 Formal System Verification for Trustworthy Embedded Systems June Andronick and
Gerwin Klein
2011
Corpus ID: 29907458
This paper proposes a generalized framework to build large, complex systems where security guarantees can be given for the…
Expand
2011
2011
Securing the Calea architecture against denial of service attacks
Kong Hua Lim
2011
Corpus ID: 166926333
Review
2009
Review
2009
Double submissions: publishing misconduct or just effective dissemination?
H. Schulzrinne
CCRV
2009
Corpus ID: 134670
As the community develops an ever more diverse set of venues for disseminating and discussing technical work and as the…
Expand
2008
2008
Storm: When Researchers Collide
Brandon Enright
,
Geoff Voelker
,
S. Savage
,
Chris Kanich
,
Kirill Levchenko
Login: The Usenix Magazine
2008
Corpus ID: 57374429
Brandon Enright is a network security analyst at the University of California, San Diego. He is primarily interested in malware…
Expand
2005
2005
Efficient Cooperative Scheduling in 802 . 11 Wireless Networks
I. Ramani
,
R. Kompella
,
Sriram Ramabhadran
,
A. Snoeren
2005
Corpus ID: 14925528
The proliferation of 802.11a/b/g based wireless devices has fueled their adoption in many domains—some of which were unforeseen…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE