User profiles for S. Murdoch
Steven J. MurdochDepartment of Computer Science, University College London Verified email at ucl.ac.uk Cited by 6070 |
[HTML][HTML] Polybacterial human disease: the ills of social networking
FL Short, SL Murdoch, RP Ryan - Trends in microbiology, 2014 - cell.com
… The enzyme responsible for AI-2 synthesis is LuxS, which is also involved in central
metabolism through a pathway responsible for recycling S-adenosyl methionine. AI-2 acts as an …
metabolism through a pathway responsible for recycling S-adenosyl methionine. AI-2 acts as an …
Early nutrition and later physical work capacity
JD Haas, S Murdoch, J Rivera, R Martorell - Nutrition reviews, 1996 - search.proquest.com
… Murdoch is former Research Associate at the Division of Nutritional Science, Cornell
University, Ithaca NY 14853, USA; Dr. Rivera is Director of Nutrition and Health at the National …
University, Ithaca NY 14853, USA; Dr. Rivera is Director of Nutrition and Health at the National …
Low-cost traffic analysis of Tor
SJ Murdoch, G Danezis - … on Security and Privacy (S&P'05), 2005 - ieeexplore.ieee.org
… When designing such a cover traffic strategy it is also important to keep in mind Wei Dai’s
attack [… measurement of the node’s load. Two strategies could be employed to protect Tor: per- …
attack [… measurement of the node’s load. Two strategies could be employed to protect Tor: per- …
Mutations in NALP7 cause recurrent hydatidiform moles and reproductive wastage in humans
S Murdoch, U Djuric, B Mazhar, M Seoud, R Khan… - Nature …, 2006 - nature.com
Hydatidiform mole (HM) is an abnormal human pregnancy with no embryo and cystic
degeneration of placental villi. We report five mutations in the maternal gene NALP7 in individuals …
degeneration of placental villi. We report five mutations in the maternal gene NALP7 in individuals …
Embedding covert channels into TCP/IP
SJ Murdoch, S Lewis - International Workshop on Information Hiding, 2005 - Springer
… packets originating from a machine within Walter’s network. She wants to leak a message to
… However, the normal state of DF can be predicted from the packet’s context, so the warden …
… However, the normal state of DF can be predicted from the packet’s context, so the warden …
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
…, SJ Murdoch, R Norton, M Roe, S Son… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
… Capsicum’s capability mode or Joe-E’s statically checkable language subset). Finally, some
form of escalation mechanism is required – object-capability invocation – to allow protected …
form of escalation mechanism is required – object-capability invocation – to allow protected …
Intensive care sedation: a review of current British practice
S Murdoch, A Cohen - Intensive care medicine, 2000 - Springer
Objective: Sedation is central to the management of intensive care patients. Many different
techniques have been tried, all have potential side effects, and some have been associated …
techniques have been tried, all have potential side effects, and some have been associated …
[PDF][PDF] Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.
S Drimer, SJ Murdoch - USENIX security symposium, 2007 - usenix.org
… The data to and from Dave’s terminal is relayed to the restaurant’s counterfeit terminal such
that the diamond purchasing transaction is placed on Alice’s card. The PIN entered by Alice …
that the diamond purchasing transaction is placed on Alice’s card. The PIN entered by Alice …
Hot or not: Revealing hidden services by their clock skew
SJ Murdoch - Proceedings of the 13th ACM conference on Computer …, 2006 - dl.acm.org
… the case, and so he has found the hidden server’s IP address. Another attack against Tor,
but not hidden services per se, is described by Murdoch and Danezis [33]. The victim visits an …
but not hidden services per se, is described by Murdoch and Danezis [33]. The victim visits an …
Ignoring the great firewall of china
… If we had been using FreeBSD’s ipfw the command would have been: … Further experiments
showed that the firewall’s blocking was somewhat more complex than we have explained so …
showed that the firewall’s blocking was somewhat more complex than we have explained so …