default search action
Marc Liberatore
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c13]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet. CCS 2020: 1497-1512
2010 – 2019
- 2019
- [j8]Keen Sung, Joydeep Biswas, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore:
Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet. IEEE Trans. Mob. Comput. 18(6): 1407-1418 (2019) - 2017
- [j7]George Bissias, Brian Neil Levine, Marc Liberatore, Swagatika Prusty:
Forensic Identification of Anonymous Sources in OneSwarm. IEEE Trans. Dependable Secur. Comput. 14(6): 620-632 (2017) - [c12]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
Statistical Detection of Downloaders in Freenet. IWPE@SP 2017: 25-32 - 2015
- [c11]Robert J. Walls, Yuriy Brun, Marc Liberatore, Brian Neil Levine:
Discovering specification violations in networked software systems. ISSRE 2015: 496-506 - 2014
- [j6]Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn:
Efficient Tagging of Remote Peers during Child Pornography Investigations. IEEE Trans. Dependable Secur. Comput. 11(5): 425-439 (2014) - [c10]George Dean Bissias, A. Pinar Ozisik, Brian Neil Levine, Marc Liberatore:
Sybil-Resistant Mixing for Bitcoin. WPES 2014: 149-158 - 2013
- [c9]Hamed Soroush, Keen Sung, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore:
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet. Privacy Enhancing Technologies 2013: 103-122 - [c8]Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls, Jeannie R. Albrecht, Emmanuel Cecchet, Brian Neil Levine, Marc Liberatore, Brian Lynn, Janis Wolak:
Measurement and analysis of child pornography trafficking on P2P networks. WWW 2013: 631-642 - 2012
- [j5]Norman Danner, Sam DeFabbia-Kane, Danny Krizanc, Marc Liberatore:
Effectiveness and detection of denial-of-service attacks in tor. ACM Trans. Inf. Syst. Secur. 15(3): 11:1-11:25 (2012) - 2011
- [j4]Marc Liberatore, Bikas Gurung, Brian Neil Levine, Matthew K. Wright:
Empirical tests of anonymous voice over IP. J. Netw. Comput. Appl. 34(1): 341-350 (2011) - [c7]Swagatika Prusty, Brian Neil Levine, Marc Liberatore:
Forensic investigation of the OneSwarm anonymous filesharing system. CCS 2011: 201-214 - [c6]Robert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields:
Effective Digital Forensics Research Is Investigator-Centric. HotSec 2011 - [i1]Norman Danner, Sam DeFabbia-Kane, Danny Krizanc, Marc Liberatore:
Effectiveness and detection of denial of service attacks in Tor. CoRR abs/1110.5395 (2011) - 2010
- [j3]Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, Clay Shields:
Forensic investigation of peer-to-peer file sharing networks. Digit. Investig. 7(Supplement): S95-S103 (2010) - [c5]Marc Liberatore, Brian Neil Levine, Clay Shields:
Strengthening forensic investigations of child pornography on P2P networks. CoNEXT 2010: 19
2000 – 2009
- 2009
- [j2]Brian Neil Levine, Marc Liberatore:
DEX: Digital evidence provenance supporting reproducibility and comparison. Digit. Investig. 6(Supplement): S48-S56 (2009) - [c4]Norman Danner, Danny Krizanc, Marc Liberatore:
Detecting Denial of Service Attacks in Tor. Financial Cryptography 2009: 273-284 - 2007
- [j1]Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine:
Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15(1): 1-13 (2007) - 2006
- [c3]Marc Liberatore, Brian Neil Levine:
Inferring the source of encrypted HTTP connections. CCS 2006: 255-263 - [c2]Marc Liberatore, Brian Neil Levine, Chadi Barakat:
Maximizing transfer opportunities in bluetooth DTNs. CoNEXT 2006: 3 - 2005
- [c1]George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine:
Privacy Vulnerabilities in Encrypted HTTP Streams. Privacy Enhancing Technologies 2005: 1-11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint