Found 220 results
Author Title Type [ Year(Asc)]
Filters: Author is V. Paxson  [Clear All Filters]
Jung, J., Milito R. A., & Paxson V. (2007).  On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. 175-192.
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Allman, M., Paxson V., & Terrell J.. (2007).  A Brief History of Scanning. 77-82.
Allman, M., Christensen K.., Nordman B., & Paxson V. (2007).  Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems.
Franklin, J.., Paxson V., Perrig A., & Savage S. (2007).  An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. 375-388.
Allman, M., & Paxson V. (2007).  Issues and Etiquette Concerning Use of Shared Measurement Data. 135-140.
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Weaver, N., Staniford S., & Paxson V. (2007).  Very Fast Containment of Scanning Worms, Revisited. 113-145.
Pang, R., Paxson V., Sommer R., & Peterson L. (2006).  binpac: A yacc for Writing Application Protocol Parsers. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).