Stefan Savage

Affiliations: 
Computer Science and Engineering University of California, San Diego, La Jolla, CA 
Area:
Computer Science
Website:
https://cseweb.ucsd.edu/~savage/
Google:
"Stefan Savage"

Parents

Sign in to add mentor
Thomas E. Anderson grad student 2002 University of Washington (Computer Science Tree)
 (Protocol design in an uncooperative Internet.)
Brian N. Bershad grad student 2002 University of Washington (Computer Science Tree)
 (Protocol design in an uncooperative Internet.)

Children

Sign in to add trainee
Ranjita Bhagwan grad student 2004 UCSD
John M. Bellardo grad student 2006 UCSD
Kirill Levchenko grad student 2008 UCSD
Justin T. Ma grad student 2010 UCSD
Marti A. Motoyama grad student 2011 UCSD
Michael D. Vrable grad student 2011 UCSD
Christopher W. Kanich grad student 2012 UCSD
Andreas Pitsillidis grad student 2013 UCSD
Sarah Meiklejohn grad student 2014 UCSD
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Meiklejohn S, Pomarole M, Jordan G, et al. (2016) A fistful of Bitcoins: characterizing payments among men with no names Communications of the Acm. 59: 86-93
Yuan D, Zheng J, Park S, et al. (2012) Improving Software Diagnosability via Log Enhancement Acm Transactions On Computer Systems. 30: 4
Ma J, Saul LK, Savage S, et al. (2011) Learning to detect malicious URLs Acm Transactions On Intelligent Systems and Technology. 2
Gupta D, Lee S, Vrable M, et al. (2010) Difference engine: Harnessing memory redundancy in virtual machines Communications of the Acm. 53: 85-93
Kanich C, Kreibich C, Levchenko K, et al. (2009) Spamalytics: An empirical analysis of spam marketing conversion Communications of the Acm. 52: 99-107
Mzrak AT, Savage S, Marzullo K. (2009) Detecting Malicious Packet Losses Ieee Transactions On Parallel and Distributed Systems. 20: 191-206
Mizrak AT, Savage S, Marzullo K. (2008) Detecting compromised routers via packet forwarding behavior Ieee Network. 22: 34-39
Moore D, Shannon C, Brown DJ, et al. (2006) Inferring internet denial-of-service activity Acm Transactions On Computer Systems. 24: 115-139
Mizrak AT, Cheng YC, Marzullo K, et al. (2006) Detecting and isolating malicious routers Ieee Transactions On Dependable and Secure Computing. 3: 230-244
Chung F, Graham R, Bhagwan R, et al. (2006) Maximizing data locality in distributed systems Journal of Computer and System Sciences. 72: 1309-1316
See more...