| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. | December 14 1999 | Networking | |
| End-to-End Internet Packet Dynamics | V. Paxson | IEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France. | June 1999 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas | January 1998 | Networking | |
| On Calibrating Measurements of Packet Transit Times | V. Paxson | Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98), Madison, Wisconsin, pp. 11-21 | June 1998 | Networking | |
| End-to-End Routing Behavior in the Internet | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, California | October 1997 | Networking | |
| End-to-End Internet Packet Dynamics | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| Automated Packet Trace Analysis of TCP Implementations | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| Measurements and Analysis of End-to-End Internet Dynamics | V. Paxson | Ph.D. dissertation | 1997 | Networking | |
| Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic | V. Paxson | Computer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report. | October 1997 | Networking | |
| Strategies for Sound Internet Measurement | V. Paxson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Towards a Framework for Defining Internet Performance Metrics | V. Paxson | LBNL-38952 | June 20 1996 | Networking | |
| Empirically-Derived Analytic Models of Wide-Area TCP Connections | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 2, No. 4 | August 1994 | Networking | |
| Growth Trends in Wide-Area TCP Connections | V. Paxson | IEEE Network, Vol. 8 No. 4, pp. 8-17 | June 1994 | Networking | |
| Glish: A Software Bus for High-Level Control | V. Paxson | Proceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems, Berlin, Germany | October 1993 | Networking | |
| A Survey of Support for Implementing Debuggers | V. Paxson | CS 262 class project, University of California, Berkeley | October 1990 | Networking | [PDF]
|
| How the Pursuit of Truth Led Me to Selling Viagra | V. Paxson | Invited talk at the USENIX Security Symposium, Montreal, Canada | August 2009 | Networking | [PDF]
|
| Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots | V. Paxson | Keynote talk at the ACM Special Interest Group on Data Communications Conference (SIGCOMM 2011), Toronto, Canada | August 2011 | Networking | |
| Active Mapping: Resisting NIDS Evasion Without Altering Traffic | U. Shankar and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California | May 2003 | Networking | [PDF]
|
| Mobile Agent Interoperability Patterns and Practice | U. Pinsdorf and V. Roth | Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, Lund, Sweden, April 2002. | April 2002 | Networking | |
| Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental Design | T.E. Ideker, V. Thorsson, and R.M. Karp | Pacific Symposium on Biocomputing, 2000. | 2000 | Networking | |
| IMRG Workshop on Application Classification and Identification Report | T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore | ACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90 | July 2008 | Networking | |
| Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise? | T. Ouyang, S. Ray, M. Rabinovich, and M. Allman | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Practical Declarative Network Management | T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker | Proceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683 | August 2009 | Networking | [PDF]
|
| Editorial: Architecting for Innovation | T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov | ACM SIGCOMM Computer Communications Review, Vol. 41, No. 3 | July 2011 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| Onix: A Distributed Control Platform for Large-scale Production Networks | T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364 | October 2010 | Networking | [PDF]
|
| NS-3 Project Goals | T. Henderson, S. Roy, S. Floyd, and G. Riley | Proceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13 | October 2006 | Networking | [PDF]
|
| The BIZ Top-Level Domain: Ten Years Later | T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson | Proceedings of the 13th Passive and Active Measurement Conference, Vienna, Austria | March 2012 | Networking | [PDF]
|
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| A Longitudinal View of HTTP Traffic | T. Callahan, M. Allman, and V. Paxson | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Design Guidelines for Robust Internet Protocols | T. Anderson, S. Shenker, I. Stoica, and D. Wetherall | Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Host Mobility Using and Internet Indirection Infrastructure | S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker | Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144 | May 2003 | Networking | [PDF]
|
| Beyond Pilots: Keeping Rural Wireless Networks Alive | S. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. Brewer | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California | April 2008 | Networking | [PDF]
|
| How to Own the Internet in Your Spare Time | S. Staniford, V. Paxson, and N. Weaver | Proceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, California | August 2002 | Networking | [PDF]
|
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Service Portability: Why http Redirect is the Model for the Future | S. Singh, S. Shenker, and G. Varghese | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54 | November 2006 | Networking | [PDF]
|
| Data-Centric Storage in Sensornets | S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin | In Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002. | October 2002 | Networking | |
| Specification of guaranteed quality of service | S. Shenker, C. Partridge, and R. Guerin | Request for Comments (Proposed Standard) 2212, Internet Engineering Task Force | September 1997 | Networking | |
| General characterization parameters for integrated service network elements. | S. Shenker and J. Wroclawski | Request for Comments (Proposed Standard) 2215, Internet Engineering Task Force | September 1997 | Networking | |
| Network element service specification template | S. Shenker and J. Wroclawski | Request for Comments (Informational) 2216, Internet Engineering Task Force | September 1997 | Networking | |
| Software-Defined Networking: History, Hype, and Hope | S. Shenker | Proceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012. | July 2012 | Networking | |
| Fixing the Embarrassing Slowness of OpenDHT on PlanetLab | S. Rhea, B.-G. Chun, J. Kubiatowicz, and S. Shenker | Proceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05), San Francisco, California, pp. 25-30 | December 2005 | Networking | [PDF]
|
| OpenDHT: A Public DHT Service and Its Uses | S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. Yu | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 73-84 | August 2005 | Networking | [PDF]
|
| Towards an Evolvable Internet Architecture | S. Ratnasamy, S. Shenker, S. McCanne | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324 | August 2005 | Networking | [PDF]
|
| A Scalable Content-Addressable Network | S. Ratnasamy, P. Francis, M. Handley, R.M. Karp, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2001), San Diego. DOI:10.1145/383059.383072 | August 2001 | Networking | [PDF]
|
| Application-Level Multicast Using Content-Addressable Networks | S. Ratnasamy, M. Handley, R.M. Karp, and S. Shenker | Proceedings of Third International Workshop on Networked Group Communication, London, Nov 2001. | November 2001 | Networking | |
| Topologically-Aware Overlay Construction and Server Selection | S. Ratnasamy, M. Handley, R. M. Karp, and S. Shenker | INFOCOM | 2002 | Networking | |
| Range Queries Over DHTs | S. Ratnasamy, J. M. Hellerstein, and S. Shenker | Intel Research Technical Report, IRB-TR-03-011 | June 25 2003 | Networking | |
| Routing Algorithms for DHTs: Some Open Questions | S. Ratnasamy, I. Stoica, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 45-52, 2002. | 2002 | Networking | |