Cited By
View all- Das SKim DAbbott JCamp LFarzan RLópez CCardoso Llach DQuercia DMustafa MNiu SWong-Villacrés M(2024)User-Centered Phishing Detection through Personalized Edge ComputingCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681864(283-287)Online publication date: 11-Nov-2024
- Wang DZhang PGember-Jacobson ASekar VYu MSeneviratne AVeitch D(2024)Expresso: Comprehensively Reasoning About External Routes Using Symbolic SimulationProceedings of the ACM SIGCOMM 2024 Conference10.1145/3651890.3672220(197-212)Online publication date: 4-Aug-2024
- Tang ABeckett RBenaloh SJayaraman KPatil TMillstein TVarghese GSchulzrinne HKohler EMaltz DMisra V(2023)Lightyear: Using Modularity to Scale BGP Control Plane VerificationProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604842(94-107)Online publication date: 10-Sep-2023
- Show More Cited By