Publications
Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of ACM Internet Measurement Conference.
(2015).
(2011). Experiences with NIMI.
Proceedings of the Passive & Active Measurement (PAM 2000).
(2000). Experiences with NIMI.
Proceedings of Passive & Active Measurement.
(2000).
(2004). Exploiting Independent State For Network Intrusion Detection.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
(2005). Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
(2005). Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of ACM Cloud Computing Security Workshop.
(2015).
(2018). Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic.
Computer Communication Review. 27(5), 5-18.
(1997). Fast Portscan Detection Using Sequention Hypothesis Testing.
Proceedings of IEEE Symposium on Security and Privacy. 211-225.
(2004).
(2012). Fighting Coordinated Attackers with Cross-Organizational Information on Sharing.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
(2006). A First Look at Modern Enterprise Traffic.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 15-28.
(2005). Forwarding-Loop Attacks in Content Delivery Networks.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).
(1998). Glish: A Software Bus for High-Level Control.
Proceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems.
(1993). Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems.
Proceedings of the 1993 Winter USENIX Technical Conference.
(1993).
(2011).
(2011). Growth Trends in Wide-Area TCP Connections.
IEEE Network. 8-17.
(1994).
(2015).
Here Be Web Proxies.
8362, 183-192.
(2014). A High-level Programming Environment for Packet Trace Anonymization and Transformation.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
(2003).
(2012).