Cecylia Bocovich
Cecylia Bocovich
Verified email at uwaterloo.ca - Homepage
Cited by
Cited by
Configuring latent Dirichlet allocation based feature location
LR Biggers, C Bocovich, R Capshaw, BP Eddy, LH Etzkorn, NA Kraft
Empirical Software Engineering 19 (3), 465-500, 2014
Leading Johnny to water: Designing for usability and trust
E Atwater, C Bocovich, U Hengartner, E Lank, I Goldberg
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), USENIX …, 2015
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
C Bocovich, I Goldberg
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Variable-specific resolutions for feature interactions
C Bocovich, JM Atlee
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
Secure asymmetry and deployability for decoy routing systems
C Bocovich, I Goldberg
Proceedings on Privacy Enhancing Technologies 2018 (3), 43-62, 2018
Lavinia: An audit-payment protocol for censorship-resistant storage
C Bocovich, JA Doucette, I Goldberg
International Conference on Financial Cryptography and Data Security, 601-620, 2017
Live Lesson: Netsim: Network simulation and hacking for high schoolers
E Atwater, C Bocovich, U Hengartner, I Goldberg
2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017
Feature-Oriented Modelling in BIP: A Case Study
C Bocovich, J Atlee
3nd International Workshop on Interplay of Model-Driven and Component-Based …, 2016
A feature interaction resolution scheme based on controlled phenomena
C Bocovich
University of Waterloo, 2014
Recipes for Resistance: A Censorship Circumvention Cookbook
C Bocovich
University of Waterloo, 2018
Elliptic Curves of High Rank
C Bocovich
Poster: Incentivized Censorship Resistance with Payment Contracts
C Bocovich, JA Doucette, I Goldberg
The system can't perform the operation now. Try again later.
Articles 1–12