BibTeX records: Jaeyeon Jung

download as .bib file

@inproceedings{DBLP:conf/ndss/FernandesRJP18,
  author       = {Earlence Fernandes and
                  Amir Rahmati and
                  Jaeyeon Jung and
                  Atul Prakash},
  title        = {Decentralized Action Integrity for Trigger-Action IoT Platforms},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01A-3\_Fernandes\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/FernandesRJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FernandesRJP17,
  author       = {Earlence Fernandes and
                  Amir Rahmati and
                  Jaeyeon Jung and
                  Atul Prakash},
  title        = {Security Implications of Permission Models in Smart-Home Application
                  Frameworks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {2},
  pages        = {24--30},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.43},
  doi          = {10.1109/MSP.2017.43},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FernandesRJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimHCJC17,
  author       = {Taehun Kim and
                  Hyeonmin Ha and
                  Seoyoon Choi and
                  Jaeyeon Jung and
                  Byung{-}Gon Chun},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android
                  Financial Apps},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {179--192},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053018},
  doi          = {10.1145/3052973.3053018},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KimHCJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FernandesRJP17,
  author       = {Earlence Fernandes and
                  Amir Rahmati and
                  Jaeyeon Jung and
                  Atul Prakash},
  title        = {Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms
                  for the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1707.00405},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.00405},
  eprinttype    = {arXiv},
  eprint       = {1707.00405},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FernandesRJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-02788,
  author       = {Amir Rahmati and
                  Earlence Fernandes and
                  Jaeyeon Jung and
                  Atul Prakash},
  title        = {{IFTTT} vs. Zapier: {A} Comparative Study of Trigger-Action Programming
                  Frameworks},
  journal      = {CoRR},
  volume       = {abs/1709.02788},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.02788},
  eprinttype    = {arXiv},
  eprint       = {1709.02788},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-02788.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FernandesJP16,
  author       = {Earlence Fernandes and
                  Jaeyeon Jung and
                  Atul Prakash},
  title        = {Security Analysis of Emerging Smart Home Applications},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {636--654},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.44},
  doi          = {10.1109/SP.2016.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FernandesJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2015,
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/EnckGCCJMS14,
  author       = {William Enck and
                  Peter Gilbert and
                  Byung{-}Gon Chun and
                  Landon P. Cox and
                  Jaeyeon Jung and
                  Patrick D. McDaniel and
                  Anmol Sheth},
  title        = {TaintDroid: an information flow tracking system for real-time privacy
                  monitoring on smartphones},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {3},
  pages        = {99--106},
  year         = {2014},
  url          = {https://doi.org/10.1145/2494522},
  doi          = {10.1145/2494522},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/EnckGCCJMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/EnckGHTCCJMS14,
  author       = {William Enck and
                  Peter Gilbert and
                  Seungyeop Han and
                  Vasant Tendulkar and
                  Byung{-}Gon Chun and
                  Landon P. Cox and
                  Jaeyeon Jung and
                  Patrick D. McDaniel and
                  Anmol N. Sheth},
  title        = {TaintDroid: An Information-Flow Tracking System for Realtime Privacy
                  Monitoring on Smartphones},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {5:1--5:29},
  year         = {2014},
  url          = {https://doi.org/10.1145/2619091},
  doi          = {10.1145/2619091},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/EnckGHTCCJMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/UrJS14,
  author       = {Blase Ur and
                  Jaeyeon Jung and
                  Stuart E. Schechter},
  editor       = {A. J. Brush and
                  Adrian Friday and
                  Julie A. Kientz and
                  James Scott and
                  Junehwa Song},
  title        = {Intruders versus intrusiveness: teens' and parents' perspectives on
                  home-entryway surveillance},
  booktitle    = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp '14, Seattle, WA, USA, September
                  13-17, 2014},
  pages        = {129--139},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2632048.2632107},
  doi          = {10.1145/2632048.2632107},
  timestamp    = {Tue, 26 Mar 2024 11:01:21 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/UrJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/JungK14,
  author       = {Jaeyeon Jung and
                  Tadayoshi Kohno},
  editor       = {A. J. Brush and
                  Adrian Friday and
                  Julie A. Kientz and
                  James Scott and
                  Junehwa Song},
  title        = {Workshop on usable privacy {\&} security for wearable and domestic
                  ubiquitous devices {(UPSIDE)}},
  booktitle    = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle,
                  WA, {USA} - September 13 - 17, 2014},
  pages        = {1279--1282},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2638728.2641712},
  doi          = {10.1145/2638728.2641712},
  timestamp    = {Tue, 26 Mar 2024 11:01:21 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/JungK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/JungP14,
  author       = {Jaeyeon Jung and
                  Matthai Philipose},
  editor       = {A. J. Brush and
                  Adrian Friday and
                  Julie A. Kientz and
                  James Scott and
                  Junehwa Song},
  title        = {Courteous glass},
  booktitle    = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle,
                  WA, {USA} - September 13 - 17, 2014},
  pages        = {1307--1312},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2638728.2641711},
  doi          = {10.1145/2638728.2641711},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/JungP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/ChuJLM14,
  author       = {Chun{-}Te Chu and
                  Jaeyeon Jung and
                  Zhicheng Liu and
                  Ratul Mahajan},
  editor       = {Kien A. Hua and
                  Yong Rui and
                  Ralf Steinmetz and
                  Alan Hanjalic and
                  Apostol Natsev and
                  Wenwu Zhu},
  title        = {sTrack: Secure Tracking in Community Surveillance},
  booktitle    = {Proceedings of the {ACM} International Conference on Multimedia, {MM}
                  '14, Orlando, FL, USA, November 03 - 07, 2014},
  pages        = {837--840},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2647868.2655010},
  doi          = {10.1145/2647868.2655010},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/ChuJLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/GuptaSPJM14,
  author       = {Trinabh Gupta and
                  Rayman Preet Singh and
                  Amar Phanishayee and
                  Jaeyeon Jung and
                  Ratul Mahajan},
  editor       = {Ratul Mahajan and
                  Ion Stoica},
  title        = {Bolt: Data Management for Connected Homes},
  booktitle    = {Proceedings of the 11th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2014, Seattle, WA, USA, April 2-4, 2014},
  pages        = {243--256},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/nsdi14/technical-sessions/presentation/gupta},
  timestamp    = {Tue, 02 Feb 2021 08:05:43 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/GuptaSPJM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BhoraskarHJACJN0W14,
  author       = {Ravi Bhoraskar and
                  Seungyeop Han and
                  Jinseong Jeon and
                  Tanzirul Azim and
                  Shuo Chen and
                  Jaeyeon Jung and
                  Suman Nath and
                  Rui Wang and
                  David Wetherall},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Brahmastra: Driving Apps to Test the Security of Third-Party Components},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {1021--1036},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/bhoraskar},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BhoraskarHJACJN0W14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014,
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscw/BrushJMM13,
  author       = {A. J. Bernheim Brush and
                  Jaeyeon Jung and
                  Ratul Mahajan and
                  Frank Martinez},
  editor       = {Amy S. Bruckman and
                  Scott Counts and
                  Cliff Lampe and
                  Loren G. Terveen},
  title        = {Digital neighborhood watch: investigating the sharing of camera data
                  amongst neighbors},
  booktitle    = {Computer Supported Cooperative Work, {CSCW} 2013, San Antonio, TX,
                  USA, February 23-27, 2013},
  pages        = {693--700},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2441776.2441853},
  doi          = {10.1145/2441776.2441853},
  timestamp    = {Tue, 15 Sep 2020 08:36:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cscw/BrushJMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/BrushFHJMMMPSSS13,
  author       = {A. J. Bernheim Brush and
                  Evgeni Filippov and
                  Danny Huang and
                  Jaeyeon Jung and
                  Ratul Mahajan and
                  Frank Martinez and
                  Khurshed Mazhar and
                  Amar Phanishayee and
                  Arjmand Samuel and
                  James Scott and
                  Rayman Preet Singh},
  editor       = {Friedemann Mattern and
                  Silvia Santini and
                  John F. Canny and
                  Marc Langheinrich and
                  Jun Rekimoto},
  title        = {Lab of things: a platform for conducting studies with connected devices
                  in multiple homes},
  booktitle    = {The 2013 {ACM} International Joint Conference on Pervasive and Ubiquitous
                  Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013
                  - Adjunct Publication},
  pages        = {35--38},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2494091.2502068},
  doi          = {10.1145/2494091.2502068},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/BrushFHJMMMPSSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interact/ChoeJLF13,
  author       = {Eun Kyoung Choe and
                  Jaeyeon Jung and
                  Bongshin Lee and
                  Kristie J. Fisher},
  editor       = {Paula Kotz{\'{e}} and
                  Gary Marsden and
                  Gitte Lindgaard and
                  Janet Wesson and
                  Marco Winckler},
  title        = {Nudging People Away from Privacy-Invasive Mobile Apps through Visual
                  Framing},
  booktitle    = {Human-Computer Interaction - {INTERACT} 2013 - 14th {IFIP} {TC} 13
                  International Conference, Cape Town, South Africa, September 2-6,
                  2013, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8119},
  pages        = {74--91},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40477-1\_5},
  doi          = {10.1007/978-3-642-40477-1\_5},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/interact/ChoeJLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BalebakoJLCN13,
  author       = {Rebecca Balebako and
                  Jaeyeon Jung and
                  Wei Lu and
                  Lorrie Faith Cranor and
                  Carolyn Nguyen},
  editor       = {Lujo Bauer and
                  Konstantin Beznosov and
                  Lorrie Faith Cranor},
  title        = {"Little brothers watching you": raising awareness of data
                  leaks on smartphones},
  booktitle    = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle,
                  United Kingdom, July 24-26, 2013},
  pages        = {12:1--12:11},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2501604.2501616},
  doi          = {10.1145/2501604.2501616},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/BalebakoJLCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LivshitsJ13,
  author       = {Benjamin Livshits and
                  Jaeyeon Jung},
  editor       = {Samuel T. King},
  title        = {Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone
                  Applications},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {113--130},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/livshits},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LivshitsJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnevJBRK12,
  author       = {Miro Enev and
                  Jaeyeon Jung and
                  Liefeng Bo and
                  Xiaofeng Ren and
                  Tadayoshi Kohno},
  editor       = {Robert H'obbes' Zakon},
  title        = {SensorSift: balancing sensor data privacy and utility in automated
                  face understanding},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420975},
  doi          = {10.1145/2420950.2420975},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JungHW12,
  author       = {Jaeyeon Jung and
                  Seungyeop Han and
                  David Wetherall},
  editor       = {Ting Yu and
                  William Enck and
                  Xuxian Jiang},
  title        = {Short paper: enhancing mobile application permissions with runtime
                  feedback and constraints},
  booktitle    = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,
                  Raleigh, NC, {USA}},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381934.2381944},
  doi          = {10.1145/2381934.2381944},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JungHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KelleyCCJSW12,
  author       = {Patrick Gage Kelley and
                  Sunny Consolvo and
                  Lorrie Faith Cranor and
                  Jaeyeon Jung and
                  Norman M. Sadeh and
                  David Wetherall},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {A Conundrum of Permissions: Installing Applications on an Android
                  Smartphone},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_6},
  doi          = {10.1007/978-3-642-34638-5\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KelleyCCJSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/ChoeCJHPK12,
  author       = {Eun Kyoung Choe and
                  Sunny Consolvo and
                  Jaeyeon Jung and
                  Beverly L. Harrison and
                  Shwetak N. Patel and
                  Julie A. Kientz},
  editor       = {Anind K. Dey and
                  Hao{-}Hua Chu and
                  Gillian R. Hayes},
  title        = {Investigating receptiveness to sensing and inference in the home using
                  sensor proxies},
  booktitle    = {The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh,
                  PA, USA, September 5-8, 2012},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2370216.2370226},
  doi          = {10.1145/2370216.2370226},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/ChoeCJHPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/BrushJMS12,
  author       = {A. J. Bernheim Brush and
                  Jaeyeon Jung and
                  Ratul Mahajan and
                  James Scott},
  editor       = {Anind K. Dey and
                  Hao{-}Hua Chu and
                  Gillian R. Hayes},
  title        = {HomeLab: shared infrastructure for home technology field studies},
  booktitle    = {The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh,
                  PA, USA, September 5-8, 2012},
  pages        = {1108--1113},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2370216.2370450},
  doi          = {10.1145/2370216.2370450},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/BrushJMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ZhuJSKW11,
  author       = {David (Yu) Zhu and
                  Jaeyeon Jung and
                  Dawn Song and
                  Tadayoshi Kohno and
                  David Wetherall},
  title        = {TaintEraser: protecting sensitive data leaks using application-level
                  taint tracking},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {45},
  number       = {1},
  pages        = {142--154},
  year         = {2011},
  url          = {https://doi.org/10.1145/1945023.1945039},
  doi          = {10.1145/1945023.1945039},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/ZhuJSKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HornyackHJSW11,
  author       = {Peter Hornyack and
                  Seungyeop Han and
                  Jaeyeon Jung and
                  Stuart E. Schechter and
                  David Wetherall},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {These aren't the droids you're looking for: retrofitting android to
                  protect data from imperious applications},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {639--652},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2046780},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HornyackHJSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/WetherallCGHHJSW11,
  author       = {David Wetherall and
                  David R. Choffnes and
                  Ben Greenstein and
                  Seungyeop Han and
                  Peter Hornyack and
                  Jaeyeon Jung and
                  Stuart E. Schechter and
                  Xiao Sophia Wang},
  editor       = {Matt Welsh},
  title        = {Privacy Revelations for Web and Mobile Apps},
  booktitle    = {13th Workshop on Hot Topics in Operating Systems, HotOS XIII, Napa,
                  California, USA, May 9-11, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/hotosxiii/privacy-revelations-web-and-mobile-apps},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/WetherallCGHHJSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/ChoeCJHK11,
  author       = {Eun Kyoung Choe and
                  Sunny Consolvo and
                  Jaeyeon Jung and
                  Beverly L. Harrison and
                  Julie A. Kientz},
  editor       = {James A. Landay and
                  Yuanchun Shi and
                  Donald J. Patterson and
                  Yvonne Rogers and
                  Xing Xie},
  title        = {Living in a glass house: a survey of private moments in the home},
  booktitle    = {UbiComp 2011: Ubiquitous Computing, 13th International Conference,
                  UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings},
  pages        = {41--44},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2030112.2030118},
  doi          = {10.1145/2030112.2030118},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/ChoeCJHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/GilbertJLQSSC11,
  author       = {Peter Gilbert and
                  Jaeyeon Jung and
                  Kyungmin Lee and
                  Henry Qin and
                  Daniel Sharkey and
                  Anmol Sheth and
                  Landon P. Cox},
  editor       = {Jie Liu and
                  Philip Alexander Levis and
                  Kay R{\"{o}}mer},
  title        = {YouProve: authenticity and fidelity in mobile sensing},
  booktitle    = {Proceedings of the 9th International Conference on Embedded Networked
                  Sensor Systems, SenSys 2011, Seattle, WA, USA, November 1-4, 2011},
  pages        = {176--189},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2070942.2070961},
  doi          = {10.1145/2070942.2070961},
  timestamp    = {Mon, 30 Aug 2021 16:43:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/GilbertJLQSSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/MaganisJKSW11,
  author       = {Gabriel Maganis and
                  Jaeyeon Jung and
                  Tadayoshi Kohno and
                  Anmol Sheth and
                  David Wetherall},
  editor       = {Anthony LaMarca and
                  Landon P. Cox},
  title        = {Sensor tricorder: what does that sensor know about me?},
  booktitle    = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
                  '11, Phoenix, AZ, USA, March 1-3, 2011},
  pages        = {98--103},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2184489.2184510},
  doi          = {10.1145/2184489.2184510},
  timestamp    = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/MaganisJKSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/ConsolvoJGPMA10,
  author       = {Sunny Consolvo and
                  Jaeyeon Jung and
                  Ben Greenstein and
                  Pauline S. Powledge and
                  Gabriel Maganis and
                  Daniel Avrahami},
  editor       = {Jakob E. Bardram and
                  Marc Langheinrich and
                  Khai N. Truong and
                  Paddy Nixon},
  title        = {The Wi-Fi privacy ticker: improving awareness {\&} control of
                  personal information exposure on Wi-Fi},
  booktitle    = {UbiComp 2010: Ubiquitous Computing, 12th International Conference,
                  UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {321--330},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1864349.1864398},
  doi          = {10.1145/1864349.1864398},
  timestamp    = {Fri, 17 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/huc/ConsolvoJGPMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/EnckGCCJMS10,
  author       = {William Enck and
                  Peter Gilbert and
                  Byung{-}Gon Chun and
                  Landon P. Cox and
                  Jaeyeon Jung and
                  Patrick D. McDaniel and
                  Anmol Sheth},
  editor       = {Remzi H. Arpaci{-}Dusseau and
                  Brad Chen},
  title        = {TaintDroid: An Information-Flow Tracking System for Realtime Privacy
                  Monitoring on Smartphones},
  booktitle    = {9th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings},
  pages        = {393--407},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/osdi10/tech/full\_papers/Enck.pdf},
  timestamp    = {Thu, 12 Mar 2020 11:35:55 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/EnckGCCJMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/GilbertCJW10,
  author       = {Peter Gilbert and
                  Landon P. Cox and
                  Jaeyeon Jung and
                  David Wetherall},
  editor       = {Angela Dalton and
                  Roy Want},
  title        = {Toward trustworthy mobile sensing},
  booktitle    = {Eleventh Workshop on Mobile Computing Systems and Applications, HotMobile
                  '10, Annapolis, Maryland, USA, February 22-23, 2010},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1734583.1734592},
  doi          = {10.1145/1734583.1734592},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/GilbertCJW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/KlasnjaCJGLPW09,
  author       = {Predrag V. Klasnja and
                  Sunny Consolvo and
                  Jaeyeon Jung and
                  Benjamin Greenstein and
                  Louis LeGrand and
                  Pauline S. Powledge and
                  David Wetherall},
  editor       = {Dan R. Olsen Jr. and
                  Richard B. Arthur and
                  Ken Hinckley and
                  Meredith Ringel Morris and
                  Scott E. Hudson and
                  Saul Greenberg},
  title        = {"When {I} am on Wi-Fi, {I} am fearless": privacy concerns
                  {\&} practices in eeryday Wi-Fi use},
  booktitle    = {Proceedings of the 27th International Conference on Human Factors
                  in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009},
  pages        = {1993--2002},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1518701.1519004},
  doi          = {10.1145/1518701.1519004},
  timestamp    = {Fri, 17 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/KlasnjaCJGLPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/KonteFJ09,
  author       = {Maria Konte and
                  Nick Feamster and
                  Jaeyeon Jung},
  editor       = {Sue B. Moon and
                  Renata Teixeira and
                  Steve Uhlig},
  title        = {Dynamics of Online Scam Hosting Infrastructure},
  booktitle    = {Passive and Active Network Measurement, 10th International Conference,
                  {PAM} 2009, Seoul, Korea, April 1-3, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5448},
  pages        = {219--228},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00975-4\_22},
  doi          = {10.1007/978-3-642-00975-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/KonteFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JungMP08,
  author       = {Jaeyeon Jung and
                  Rodolfo A. Milito and
                  Vern Paxson},
  title        = {On the adaptive real-time detection of fast-propagating network worms},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {197--210},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0080-y},
  doi          = {10.1007/S11416-007-0080-Y},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JungMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JungSGWMK08,
  author       = {Jaeyeon Jung and
                  Anmol Sheth and
                  Ben Greenstein and
                  David Wetherall and
                  Gabriel Maganis and
                  Tadayoshi Kohno},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Privacy oracle: a system for finding application leaks with black
                  box differential testing},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {279--288},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455806},
  doi          = {10.1145/1455770.1455806},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JungSGWMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JungMP07,
  author       = {Jaeyeon Jung and
                  Rodolfo A. Milito and
                  Vern Paxson},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {On the Adaptive Real-Time Detection of Fast-Propagating Network Worms},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_11},
  doi          = {10.1007/978-3-540-73614-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/JungMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/GeambasuBJB07,
  author       = {Roxana Geambasu and
                  Tanya Bragin and
                  Jaeyeon Jung and
                  Magdalena Balazinska},
  editor       = {Brian Cooper and
                  Nick Feamster},
  title        = {On-Demand View Materialization and Indexing for Network Forensic Analysis},
  booktitle    = {Third International Workshop on Networking Meets Databases, NetDB'07,
                  Cambridge, MA, USA, April 10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/netdb-07/demand-view-materialization-and-indexing-network-forensic-analysis},
  timestamp    = {Tue, 02 Feb 2021 08:05:49 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/GeambasuBJB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Jung06,
  author       = {Jaeyeon Jung},
  title        = {Real-time detection of malicious network activity using stochastic
                  models},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2006},
  url          = {https://hdl.handle.net/1721.1/37892},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Jung06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KannanJPK06,
  author       = {Jayanthkumar Kannan and
                  Jaeyeon Jung and
                  Vern Paxson and
                  Can Emre Koksal},
  editor       = {Jussara M. Almeida and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Paul Barford},
  title        = {Semi-automated discovery of application session structure},
  booktitle    = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages        = {119--132},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1177080.1177096},
  doi          = {10.1145/1177080.1177096},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KannanJPK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ShinJB06,
  author       = {Seungwon Shin and
                  Jaeyeon Jung and
                  Hari Balakrishnan},
  editor       = {Jussara M. Almeida and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Paul Barford},
  title        = {Malware prevalence in the KaZaA file-sharing network},
  booktitle    = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages        = {333--338},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1177080.1177125},
  doi          = {10.1145/1177080.1177125},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/ShinJB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SchechterJSM06,
  author       = {Stuart E. Schechter and
                  Jaeyeon Jung and
                  Will Stockwell and
                  Cynthia D. McLain},
  title        = {Inoculating {SSH} Against Address Harvesting},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/inoculating-ssh-against-address-harvesting/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SchechterJSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/FeamsterJB04,
  author       = {Nick Feamster and
                  Jaeyeon Jung and
                  Hari Balakrishnan},
  title        = {An empirical study of "bogon" route advertisements},
  journal      = {Comput. Commun. Rev.},
  volume       = {35},
  number       = {1},
  pages        = {63--70},
  year         = {2004},
  url          = {https://doi.org/10.1145/1052812.1052826},
  doi          = {10.1145/1052812.1052826},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/FeamsterJB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/JungS04,
  author       = {Jaeyeon Jung and
                  Emil Sit},
  editor       = {Alfio Lombardo and
                  James F. Kurose},
  title        = {An empirical study of spam traffic and the use of {DNS} black lists},
  booktitle    = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages        = {370--375},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1028788.1028838},
  doi          = {10.1145/1028788.1028838},
  timestamp    = {Mon, 08 Jul 2019 07:25:59 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/JungS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchechterJB04,
  author       = {Stuart E. Schechter and
                  Jaeyeon Jung and
                  Arthur W. Berger},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Fast Detection of Scanning Worm Infections},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {59--81},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_4},
  doi          = {10.1007/978-3-540-30143-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchechterJB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JungPBB04,
  author       = {Jaeyeon Jung and
                  Vern Paxson and
                  Arthur W. Berger and
                  Hari Balakrishnan},
  title        = {Fast Portscan Detection Using Sequential Hypothesis Testing},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {211--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301325},
  doi          = {10.1109/SECPRI.2004.1301325},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JungPBB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JungBB03,
  author       = {Jaeyeon Jung and
                  Arthur W. Berger and
                  Hari Balakrishnan},
  title        = {Modelling TTL-based Internet Caches},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2003, The 22nd Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, San Franciso,
                  CA, USA, March 30 - April 3, 2003},
  pages        = {417--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/INFCOM.2003.1208693},
  doi          = {10.1109/INFCOM.2003.1208693},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/JungBB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/JungSBM02,
  author       = {Jaeyeon Jung and
                  Emil Sit and
                  Hari Balakrishnan and
                  Robert Tappan Morris},
  title        = {{DNS} performance and the effectiveness of caching},
  journal      = {Comput. Commun. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {74},
  year         = {2002},
  url          = {https://doi.org/10.1145/510726.510748},
  doi          = {10.1145/510726.510748},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/JungSBM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/JungSBM02,
  author       = {Jaeyeon Jung and
                  Emil Sit and
                  Hari Balakrishnan and
                  Robert Tappan Morris},
  title        = {{DNS} performance and the effectiveness of caching},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {10},
  number       = {5},
  pages        = {589--603},
  year         = {2002},
  url          = {https://doi.org/10.1109/TNET.2002.803905},
  doi          = {10.1109/TNET.2002.803905},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/JungSBM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JungKR02,
  author       = {Jaeyeon Jung and
                  Balachander Krishnamurthy and
                  Michael Rabinovich},
  editor       = {David Lassner and
                  David De Roure and
                  Arun Iyengar},
  title        = {Flash crowds and denial of service attacks: characterization and implications
                  for CDNs and web sites},
  booktitle    = {Proceedings of the Eleventh International World Wide Web Conference,
                  {WWW} 2002, May 7-11, 2002, Honolulu, Hawaii, {USA}},
  pages        = {293--304},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/511446.511485},
  doi          = {10.1145/511446.511485},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/JungKR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imw/JungSBM01,
  author       = {Jaeyeon Jung and
                  Emil Sit and
                  Hari Balakrishnan and
                  Robert Tappan Morris},
  editor       = {Vern Paxson},
  title        = {{DNS} performance and the effectiveness of caching},
  booktitle    = {Proceedings of the 1st {ACM} {SIGCOMM} Internet Measurement Workshop,
                  {IMW} 2001, San Francisco, California, USA, November 1-2, 2001},
  pages        = {153--167},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/505202.505223},
  doi          = {10.1145/505202.505223},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imw/JungSBM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JungLC00,
  author       = {Jaeyeon Jung and
                  Dongman Lee and
                  Kilnam Chon},
  title        = {Proactive Web caching with cumulative prefetching for large multimedia
                  data},
  journal      = {Comput. Networks},
  volume       = {33},
  number       = {1-6},
  pages        = {645--655},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00064-5},
  doi          = {10.1016/S1389-1286(00)00064-5},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/JungLC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HuffakerJNWC98,
  author       = {Bradley Huffaker and
                  Jaeyeon Jung and
                  Evi Nemeth and
                  Duane Wessels and
                  Kimberly C. Claffy},
  title        = {Visualization of the Growth and Topology of the {NLANR} Caching Hierarchy},
  journal      = {Comput. Networks},
  volume       = {30},
  number       = {22-23},
  pages        = {2131--2139},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0169-7552(98)00239-6},
  doi          = {10.1016/S0169-7552(98)00239-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/HuffakerJNWC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics