Configuring latent Dirichlet allocation based feature location LR Biggers, C Bocovich, R Capshaw, BP Eddy, LH Etzkorn, NA Kraft Empirical Software Engineering 19 (3), 465-500, 2014 | 112 | 2014 |
Leading Johnny to water: Designing for usability and trust E Atwater, C Bocovich, U Hengartner, E Lank, I Goldberg Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), USENIX …, 2015 | 54 | 2015 |
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement C Bocovich, I Goldberg Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 37 | 2016 |
Variable-specific resolutions for feature interactions C Bocovich, JM Atlee Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014 | 28 | 2014 |
Secure asymmetry and deployability for decoy routing systems C Bocovich, I Goldberg Proceedings on Privacy Enhancing Technologies 2018 (3), 43-62, 2018 | 16 | 2018 |
Lavinia: An audit-payment protocol for censorship-resistant storage C Bocovich, JA Doucette, I Goldberg International Conference on Financial Cryptography and Data Security, 601-620, 2017 | 10 | 2017 |
Live Lesson: Netsim: Network simulation and hacking for high schoolers E Atwater, C Bocovich, U Hengartner, I Goldberg 2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017 | 5 | 2017 |
Feature-Oriented Modelling in BIP: A Case Study C Bocovich, J Atlee 3nd International Workshop on Interplay of Model-Driven and Component-Based …, 2016 | 2 | 2016 |
A feature interaction resolution scheme based on controlled phenomena C Bocovich University of Waterloo, 2014 | 2 | 2014 |
Recipes for Resistance: A Censorship Circumvention Cookbook C Bocovich University of Waterloo, 2018 | 1 | 2018 |
Elliptic Curves of High Rank C Bocovich | 1 | 2012 |
Poster: Incentivized Censorship Resistance with Payment Contracts C Bocovich, JA Doucette, I Goldberg | | |