Keith Winstein (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Keith Winstein" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
415th place
327th place
2,911th place
1,596th place
179th place
183rd place
79th place
65th place
896th place
674th place
low place
6,793rd place
low place
low place
low place
low place
670th place
480th place
low place
7,194th place
7th place
7th place
low place
low place
low place
low place
low place
low place

aclweb.org (Global: low place; English: 6,793rd place)

bergmair.eu (Global: low place; English: low place)

richard.bergmair.eu

cam.ac.uk (Global: 670th place; English: 480th place)

cl.cam.ac.uk

hidden-data1.googlecode.com (Global: low place; English: low place)

josephhall.org (Global: low place; English: low place)

ksj2014.org (Global: low place; English: low place)

linux.com (Global: low place; English: 7,194th place)

mit.edu (Global: 415th place; English: 327th place)

rle.mit.edu

wireless.csail.mit.edu

mosh.mit.edu

tech.mit.edu

nytimes.com (Global: 7th place; English: 7th place)

scientificamerican.com (Global: 896th place; English: 674th place)

stanford.edu (Global: 179th place; English: 183rd place)

www-cs.stanford.edu

  • Widom, Jennifer (Summer 2014). "2014 Department Newsletter". Archived from the original on 3 September 2014. Retrieved 2 September 2014.

cs.stanford.edu

theheart.org (Global: low place; English: low place)

wbur.org (Global: 2,911th place; English: 1,596th place)

commonhealth.wbur.org

wbur.org

web.archive.org (Global: 1st place; English: 1st place)

  • Widom, Jennifer (Summer 2014). "2014 Department Newsletter". Archived from the original on 3 September 2014. Retrieved 2 September 2014.
  • "Keith Winstein at Wireless@MIT". MIT CSAIL. Archived from the original on 2013-04-01. Retrieved 2013-05-01.
  • Taskiran, Cuneyt M., et al. "Attacks on lexical natural language steganography systems" Archived 2016-03-04 at the Wayback Machine, Electronic Imaging 2006. International Society for Optics and Photonics, 2006.
  • Clark, Stephen and Ching-Yun (Frannie) Chang. "Linguistic Steganography: Information Hiding in Text" Archived 2013-01-23 at the Wayback Machine, University of Cambridge Computer Laboratory, May 2012. Retrieved 2 May 2013.
  • Brockmeier, Joe. "Into the Mosh Pit: A Mobile Shell Replacement for SSH" Archived 2014-03-20 at the Wayback Machine, linux.com, 10 April 2012. Retrieved on 28 March 2013.
  • Loux, Brian. SIPB Members’ Hack Draws Legal Controversy Archived 2013-07-27 at the Wayback Machine, The Tech, 13 March 2001.
  • Mandel, Josh; Roach, Austin; Winstein, Keith (April 2004). "MIT Proximity Card Vulnerabilities" (PDF). Archived from the original (PDF) on 6 March 2016. Retrieved 1 March 2023.

wsj.com (Global: 79th place; English: 65th place)

blogs.wsj.com

  • Forelle, Charles. "Fun with Calendars", Wall Street Journal Online, 29 December 2009. Retrieved on 2 May 2013.

wsj.com