Publication Search Results

TitleAuthorsort descendingBibliographicDateGroupLinks
An Assessment of Overt Malicious Activity Manifest in Residential NetworksG. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. VallentinProceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163July 2011Networking[PDF]

NAT Usage in Residential Broadband NetworksG. Maier, F. Schneider, and A. FeldmannProceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

A First Look at Mobile Hand-held Device TrafficG. Maier, F. Schneider, and A. FeldmannProceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170April 2010Networking[PDF]

Enriching Network Security Analysis with Time TravelG. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. SchneiderProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194August 2008Networking[PDF]

Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling LawG. Phillips, S. Shenker, and H. TangmunarunkitSIGCOMM, September 1999.September 1999Networking
Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in EstoniaG. SchryenProceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50December 2008Networking[PDF]

Security of Open Source and Closed Source Software: An Empirical Comparison of Published VulnerabilitiesG. SchryenProceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387August 2009Networking[PDF]

A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software VendorsG. SchryenProceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168September 2009Networking[PDF]

Open Source vs. Closed Source Software: Towards Measuring SecurityG. Schryen and R. KaduraProceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023March 2009Networking[PDF]

A Layered Naming Architecture for the InternetH. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. WalfishProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, OregonAugust 2004Networking[PDF]

Peering Peer-to-Peer ProvidersH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114February 2005Networking[PDF]

Semantic-Free Referencing in Linked Distributed SystemsH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CaliforniaFebruary 2003Networking[PDF]

Off by DefaultH. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Towards Capturing Representative AS-level Internet TopologiesH. Chang, R. Govindan, S. Jamin, S. Shenker, and W. WillingerSIGMETRICS 2002: 280-281. 2002Networking
Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionH. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. SommerProceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, CanadaAugust 2006Networking[PDF]

Operational Experiences with High-Volume Network Intrusion DetectionH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2October 2004Networking[PDF]

Predicting the Resource Consumption of Network Intrusion Detection SystemsH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154September 2008Networking[PDF]

Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based ContextH. Dreger, C. Kreibich, V. Paxson, and R. SommerProceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221July 2005Networking[PDF]

Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. PaxsonProceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United KingdomMarch 2012Networking[PDF]

Network and User-Perceived Performance of Web Page RetrievalsH. Kruse, M. Allman, and P. MallaschProceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC)November 1998Networking
Experimentation and Modeling of HTTP Over Satellite ChannelsH. Kruse, M. Allman, J. Griner, and D. TranInternational Journal of Satellite Communications, 19(1), January/February 2001.January 2001Networking
HTTP Page Transfer Rates Over Geo-Stationary Satellite LinksH. Kruse, M. Allman, J. Griner, and D. TranProceedings of the 6th International Conference on Telecommunication Systems, Nashville, TennesseeMarch 1998Networking
Satellite Network Performance Measurements Using Simulated Multi-User Internet TrafficH. Kruse, M. Allman, J. Griner, S. Ostermann, and E. HelveyProceedings of the Seventh International Conference on Telecommunication Systems. March 1999.March 1999Networking
On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite LinkH. Kruse, S. Ostermann, and M. AllmanProceedings of the Sixth Ka-Band Utilization Conference, June 2000.June 2000Networking
On the Effects of Registrar-Level InterventionH. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan SavageProceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, MassachusettsMarch 2011Networking[PDF]

Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter NetworksH. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. GuedesProceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, OregonJune 2011Networking[PDF]

Does AS Size Determine Degree in AS Topology?H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. WillingerACM Computer Communication Review, October 2001.October 2001Networking
Internet Pat Inflation Due to Policy RoutingH. Tangmunarunkit, R. Govindan, and S. ShenkerProceedings of SPIE ITCom 2001, Denver, CO. 19-24. August 2001.August 2001Networking
Internet Topology: Discovery and Policy Impact, Parts I and IIH. Tangmunarunkit, R. Govindan, and S. ShenkerIn The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press 2005Networking[PDF]

Network Topology Generators: Degree-Based vs. StructuralH. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. WillingerProceedings ACM SIGCOMM 2002. 2002Networking
The Impact of Routing Policy on Internet PathsH. Tangmunarunkit, R. Govindan, S. Shenker, and D. EstrinINFOCOM 2001: 736-742. 2001Networking
A Virtual Spanner for Efficient Face Routing in Multihop Wireless NetworksH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4217, pp. 459–470September 2006Networking
Energy-Efficient Routing on the Virtual SpannerH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4104, pp. 101–113July 2006Networking
A Scalable Web Cache Consistency ArchitectureH. Yu, L. Breslau, and S. ShenkerProceedings of ACM SIGCOMM'99, Cambridge, September 1999.September 1999Networking
YAMR: Yet Another Multipath Routing ProtocolI. Ganichev, B. Dai, B. Godfrey, and S. ShenkerACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

Implementation and Evaluation of a Location-Aware Wireless Multi-Agent SystemI. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3207, pp. 528-537August 2004Networking[PDF]

Towards Engineering a Location-Aware Wireless Multi-Agent SystemI. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-SkarmetaProceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, SpainAugust 2004Networking
Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Ratnasamy, S. Shenker, S. Surana, and S. ZhuangThe First International Workshop on Peer-to-Peer Systems (IPTPS): 191-202, 2002. 2002Networking
Routing Algorithms in DHTs: Some Open QuestionsI. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. ZhuangProceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002.March 2002Networking
Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. SuranaIEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218April 2004Networking[PDF]

Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. SuranaProceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86August 2002Networking[PDF]

Self-Verifying CSFQI. Stoica, H. Zhang, and S. ShenkerINFOCOM, 2002. 2002Networking
Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed NetworksI. Stoica, S. Shenker, and H. ZhangACM Computer Communication Review, Vol. 28, pp. 118-130September 1998Networking
Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20July 2004Networking[PDF]

Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Measuring Pay-per-Install: The Commoditization of Malware DistributionJ. Cabellero, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Internetworking MultimediaJ. Crowcroft, M. Handley, and I. WakemanMorgan Kaufmann, ISBN 1-55860-584-3, 1999. 1999Networking
Global Synchronization in SensornetsJ. Elson, R. M. Karp, C.H. Papadimitriou and S. ShenkerProceedings of LATIN, pp. 609-624January 05 2004Networking
Incentives and Internet ComputationJ. Feigenbaum and S. ShenkerDistributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 2002Networking

Pages