Name
Affiliation
Papers
PHILLIPA GILL
Univ Calgary, Calgary, AB T2N 1N4, Canada
45
Collaborators
Citations 
PageRank 
91
1504
114.56
Referers 
Referees 
References 
3836
1389
625
Search Limit
1001000
Title
Citations
PageRank
Year
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering00.342022
PredictRoute: A Network Path Prediction Toolkit10.352021
How Great is the Great Firewall? Measuring China's DNS Censorship00.342021
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform00.342020
Assessing the Privacy Benefits of Domain Name Encryption20.412020
Triplet Censors - Demystifying Great Firewall's DNS Censorship Behavior.00.342020
BGP hijacking classification20.372019
A large-scale analysis of deployed traffic differentiation practices.20.452019
Information Market for Web Browsing: Design, Usability and Incremental Adoption.00.342018
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation.90.532018
Analyzing China's Blocking of Unpublished Tor Bridges.00.342018
Characterizing the Deployment and Performance of Multi-CDNs.20.362018
Characterizing the Nature and Dynamics of Tor Exit Blocking00.342018
Studying TLS Usage in Android Apps.80.482018
RADWAN: rate adaptive wide area network.90.562018
Run, Walk, Crawl: Towards Dynamic Link Capacities.50.472017
lib•erate, (n): a library for exposing (traffic-classification) rules and avoiding them efficiently.40.412017
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography.00.342017
Measuring Offensive Speech in Online Political Discourse.10.352017
PathCache: A Path Prediction Toolkit.20.372016
Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design.20.382016
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms80.472016
Measuring and mitigating AS-level adversaries against Tor90.502015
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data130.642015
Internet Outages, The Eyewitness Accounts: Analysis Of The Outages Mailing List70.452015
A survey of interdomain routing policies341.082014
A First Look at Performance in Mobile Virtual Network Operators120.782014
Targeted threat index: characterizing and quantifying politically-motivated targeted malware150.802014
Characterizing large-scale routing anomalies: a case study of the china telecom incident160.712013
Best paper -- Follow the money: understanding economics of online aggregation and advertising260.962013
A method for identifying and confirming the use of URL filtering products for censorship80.562013
Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data201.242012
A Socratic method for validation of measurement-based networking research110.662011
Short paper: a look at smartphone permission models242.632011
Characterizing Intelligence Gathering and Control on an Edge Network30.372011
Let the market drive deployment: a strategy for transitioning to BGP security502.332011
Characterizing Organizational Use of Web-Based Services: Methodology, Challenges, Observations, and Insights180.882011
Understanding network failures in data centers: measurement, analysis, and implications2578.422011
Dude, where’s that IP?: circumventing measurement-based IP geolocation220.982010
Understanding latent sector errors and how to protect against them321.202010
A few chirps about twitter33340.852008
Network Information Flow In Network Of Queues20.412008
Scalable on-demand media streaming for heterogeneous clients90.542008
The flattening internet topology: natural evolution, unsightly barnacles or contrived collapse?724.052008
Youtube traffic characterization: a view from the edge45434.872007