How do tor users interact with onion services? P Winter, A Edmundson, LM Roberts, A Dutkowska-Żuk, M Chetty, ... 27th USENIX Security Symposium (USENIX Security 18), 411-428, 2018 | 51 | 2018 |
How and why people use virtual private networks A Dutkowska-Zuk, A Hounsel, A Morrill, A Xiong, M Chetty, N Feamster 31st USENIX Security Symposium (USENIX Security 22), 3451-3465, 2022 | 29 | 2022 |
Understanding how and why university students use virtual private networks A Dutkowska-Zuk, A Hounsel, A Xiong, M Roberts, B Stewart, M Chetty, ... arXiv preprint arXiv:2002.11834, 2020 | 6 | 2020 |
Practicing Safe Browsing: Understanding How and Why University Students Use Virtual Private Networks. arXiv preprint, cs A Dutkowska-Zuk, A Hounsel, A Xiong, M Chetty, N Feamster, M Roberts, ... HC, February, 2020 | 4 | 2020 |