Phillipa Gill
Phillipa Gill
Research Scientist @ Google
Verified email at - Homepage
Cited by
Cited by
Youtube traffic characterization: a view from the edge
P Gill, M Arlitt, Z Li, A Mahanti
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 15-28, 2007
A few chirps about twitter
B Krishnamurthy, P Gill, M Arlitt
Proceedings of the first workshop on Online social networks, 19-24, 2008
Understanding network failures in data centers: measurement, analysis, and implications
P Gill, N Jain, N Nagappan
Proc. of SIGCOMM, 2011
The flattening internet topology: Natural evolution, unsightly barnacles or contrived collapse?
P Gill, M Arlitt, Z Li, A Mahanti
International Conference on Passive and Active Network Measurement, 1-10, 2008
Understanding latent sector errors and how to protect against them
B Schroeder, S Damouras, P Gill
ACM Transactions on storage (TOS) 6 (3), 1-23, 2010
Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem
A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ...
The 25th Annual Network and Distributed System Security Symposium (NDSS 2018), 2018
Let the market drive deployment: A strategy for transitioning to BGP security
P Gill, M Schapira, S Goldberg
ACM SIGCOMM computer communication review 41 (4), 14-25, 2011
Best paper--Follow the money: understanding economics of online aggregation and advertising
P Gill, V Erramilli, A Chaintreau, B Krishnamurthy, K Papagiannaki, ...
Proceedings of the 2013 conference on Internet measurement conference, 141-148, 2013
Haystack: In situ mobile traffic analysis in user space
A Razaghpanah, N Vallina-Rodriguez, S Sundaresan, C Kreibich, P Gill, ...
arXiv preprint arXiv:1510.01419, 1-13, 2015
Historicizing new media: A content analysis of Twitter
L Humphreys, P Gill, B Krishnamurthy, E Newbury
Journal of communication 63 (3), 413-431, 2013
Short paper: a look at smartphone permission models
KWY Au, YF Zhou, Z Huang, P Gill, D Lie
Proceedings of the 1st ACM workshop on Security and privacy in smartphones…, 2011
How much is too much? Privacy issues on Twitter
L Humphreys, P Gill, B Krishnamurthy
Conference of International Communication Association, Singapore, 2010
A survey of interdomain routing policies
P Gill, M Schapira, S Goldberg
ACM SIGCOMM Computer Communication Review 44 (1), 28-34, 2013
Dude, where’s that IP? Circumventing measurement-based IP geolocation
P Gill, Y Ganjali, B Wong, D Lie
Proceedings of the 19th USENIX conference on Security, 16-16, 2010
Characterizing user sessions on youtube
P Gill, M Arlitt, Z Li, A Mahanti
Multimedia Computing and Networking 2008 6818, 681806, 2008
Studying TLS usage in Android apps
A Razaghpanah, AA Niaki, N Vallina-Rodriguez, S Sundaresan, J Amann, ...
Proceedings of the 13th International Conference on emerging Networking…, 2017
Investigating interdomain routing policies in the wild
R Anwar, H Niaz, D Choffnes, Cunha, P Gill, E Katz-Bassett
Proceedings of the 2015 Internet Measurement Conference, 71-77, 2015
Scalable streaming for heterogeneous clients
L Shi, P Sessini, A Mahanti, Z Li, DL Eager
Proceedings of the 14th ACM international conference on Multimedia, 337-346, 2006
Identifying traffic differentiation in mobile networks
A Molavi Kakhki, A Razaghpanah, A Li, H Koo, R Golani, D Choffnes, ...
Proceedings of the 2015 Internet Measurement Conference, 239-251, 2015
Targeted threat index: Characterizing and quantifying politically-motivated targeted malware
S Hardy, M Crete-Nishihata, K Kleemola, A Senft, B Sonne, G Wiseman, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 527-541, 2014
The system can't perform the operation now. Try again later.
Articles 1–20