متابعة
William Marczak
William Marczak
بريد إلكتروني تم التحقق منه على cs.berkeley.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Consistency Analysis in Bloom: a CALM and Collected Approach.
P Alvaro, N Conway, JM Hellerstein, WR Marczak
CIDR, 249-260, 2011
2762011
Dedalus: Datalog in Time and Space
P Alvaro, WR Marczak, N Conway, JM Hellerstein, D Maier, R Sears
International Datalog 2.0 Workshop, 262-281, 2010
1962010
Logic and lattices for distributed programming
N Conway, WR Marczak, P Alvaro, JM Hellerstein, D Maier
Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012
1652012
An Analysis of {China’s}{“Great}{Cannon”}
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
1012015
Hide and seek: Tracking NSO group’s Pegasus spyware to operations in 45 countries
B Marczak, J Scott-Railton, S McKune, B Abdul Razzak, R Deibert
1002018
When governments hack opponents: A look at actors and technology
WR Marczak, J Scott-Railton, M Marquis-Boire, V Paxson
23rd USENIX Security Symposium (USENIX Security 14), 511-525, 2014
972014
China’s great cannon
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
Citizen Lab 10, 2015
96*2015
How Great is the Great Firewall? Measuring China's {DNS} Censorship
NP Hoang, AA Niaki, J Dalek, J Knockel, P Lin, B Marczak, ...
30th USENIX Security Symposium (USENIX Security 21), 3381-3398, 2021
862021
Move fast and roll your own crypto: A quick look at the confidentiality of zoom meetings
B Marczak, J Scott-Railton
The Citizen Lab 3, 2020
512020
The million dollar dissident: NSO group’s iPhone zero-days used against a UAE human rights defender
B Marczak, J Scott-Railton
452016
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
432010
A³: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
412010
For their eyes only: The commercialization of digital spying
M Marquis-Boire, B Marczak, C Guarnieri, J Scott-Railton
402013
Secureblox: customizable secure distributed data processing
WR Marczak, SS Huang, M Bravenboer, M Sherr, BT Loo, M Aref
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
312010
The kingdom came to Canada: How Saudi-linked digital espionage reached Canadian soil
B Marczak, J Scott-Railton, A Senft, B Abdul Razzak, R Deibert
282018
Running in circles: Uncovering the clients of cyberespionage firm circles
B Marczak, J Scott-Railton, S Prakash Rao, S Anstis, R Deibert
272020
Social engineering attacks on government opponents: Target perspectives
WR Marczak, V Paxson
Proceedings on privacy enhancing technologies, 2017
262017
You only click twice: FinFisher’s global proliferation
M Marquis-Boire, B Marzcak, C Guarnieri, J Scott-Railton
262013
The great ipwn: Journalists hacked with suspected nso group imessage ‘zero-click’exploit
B Marczak, J Scott-Railton, N Al-Jizawi, S Anstis, R Deibert
252020
Champing at the cyberbit: Ethiopian dissidents targeted with new commercial spyware
B Marczak, G Alexander, S McKune, J Scott-Railton, R Deibert
252017
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20