Stefan Savage
Affiliations: | Computer Science and Engineering | University of California, San Diego, La Jolla, CA |
Area:
Computer ScienceWebsite:
https://cseweb.ucsd.edu/~savage/Google:
"Stefan Savage"Parents
Sign in to add mentorThomas E. Anderson | grad student | 2002 | University of Washington (Computer Science Tree) | |
(Protocol design in an uncooperative Internet.) | ||||
Brian N. Bershad | grad student | 2002 | University of Washington (Computer Science Tree) | |
(Protocol design in an uncooperative Internet.) |
Children
Sign in to add traineeRanjita Bhagwan | grad student | 2004 | UCSD |
John M. Bellardo | grad student | 2006 | UCSD |
Kirill Levchenko | grad student | 2008 | UCSD |
Justin T. Ma | grad student | 2010 | UCSD |
Marti A. Motoyama | grad student | 2011 | UCSD |
Michael D. Vrable | grad student | 2011 | UCSD |
Christopher W. Kanich | grad student | 2012 | UCSD |
Andreas Pitsillidis | grad student | 2013 | UCSD |
Sarah Meiklejohn | grad student | 2014 | UCSD |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Meiklejohn S, Pomarole M, Jordan G, et al. (2016) A fistful of Bitcoins: characterizing payments among men with no names Communications of the Acm. 59: 86-93 |
Yuan D, Zheng J, Park S, et al. (2012) Improving Software Diagnosability via Log Enhancement Acm Transactions On Computer Systems. 30: 4 |
Ma J, Saul LK, Savage S, et al. (2011) Learning to detect malicious URLs Acm Transactions On Intelligent Systems and Technology. 2 |
Gupta D, Lee S, Vrable M, et al. (2010) Difference engine: Harnessing memory redundancy in virtual machines Communications of the Acm. 53: 85-93 |
Kanich C, Kreibich C, Levchenko K, et al. (2009) Spamalytics: An empirical analysis of spam marketing conversion Communications of the Acm. 52: 99-107 |
Mzrak AT, Savage S, Marzullo K. (2009) Detecting Malicious Packet Losses Ieee Transactions On Parallel and Distributed Systems. 20: 191-206 |
Mizrak AT, Savage S, Marzullo K. (2008) Detecting compromised routers via packet forwarding behavior Ieee Network. 22: 34-39 |
Moore D, Shannon C, Brown DJ, et al. (2006) Inferring internet denial-of-service activity Acm Transactions On Computer Systems. 24: 115-139 |
Mizrak AT, Cheng YC, Marzullo K, et al. (2006) Detecting and isolating malicious routers Ieee Transactions On Dependable and Secure Computing. 3: 230-244 |
Chung F, Graham R, Bhagwan R, et al. (2006) Maximizing data locality in distributed systems Journal of Computer and System Sciences. 72: 1309-1316 |