Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316May 2010Networking[PDF]

Object Oriented Circuit Generators in JavaM. Chu, N. Weaver, K. Sulimma, A. DeHon, and J. WawrzynekProceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM) 1998Networking
A Framework for Incremental Deployment Strategies for Router-Assisted ServicesX. He, C. Papadopoulos, and P. RadoslavovProceedings of the IEEE Infocom 2003. San Francisco, California, USAApril 2003Networking
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable MulticastP. Radoslavov, C. Papadopoulos, R. Govindan, and D. EstrinProceedings of the IEEE Infocom 2001, Anchorage, Alaska, USA, April 22-26, 2001.April 22 2001Networking
Hardness Results for Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerProceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002), Kanpur, India, pp. 133-144December 2002Networking
Opportunistic Measurement: Extracting Insight from Spurious TrafficM. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. SavageProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Using Honeynets for Internet Situational AwarenessV. Yegneswaran, P. Barford, and V. PaxsonProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Off by DefaultH. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

On the Effects of Registrar-Level InterventionH. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan SavageProceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, MassachusettsMarch 2011Networking[PDF]

X-Trace: A Pervasive Network Tracing FrameworkR. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. StoicaProceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284April 2007Networking[PDF]

OverCite: A Cooperative Digital Research LibraryJ. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. ShenkerProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79February 2005Networking[PDF]

Peering Peer-to-Peer ProvidersH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114February 2005Networking[PDF]

Policy-Controlled Event Management for Distributed Intrusion DetectionC. Kreibich and R. SommerProceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391June 2005Networking[PDF]

Proxy Caching Mechanism for Multimedia Playback Streams in the InternetR. Rejaie, M. Handley, H. Yu, and D. EstrinProceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999.March 1999Networking
On the Adaptive Real-Time Detection of Fast-Propagating Network WormsJ. Jung, R. Milito, and V. PaxsonProceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008July 2007Networking[PDF]

Implications of Netalyzr's DNS MeasurementsN. Weaver, C. Kreibich, B. Nechaev, and V. PaxsonProceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United KingdomApril 2011Networking[PDF]

Design Guidelines for Robust Internet ProtocolsT. Anderson, S. Shenker, I. Stoica, and D. WetherallProceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New JerseyOctober 2002Networking[PDF]

From Protocol Stack to Protocol Heap - Role-Based ArchitectureB. Braden, T. Faber, and M. HandleyProceedings of the First Workshop on Hot Topics in Networking (HotNets-I), Princeton, New JerseyOctober 2002Networking[PDF]

On the Spam Campaign TrailC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, CaliforniaApril 2008Networking[PDF]

Rethinking Hardware Support for Network Analysis and Intrusion PreventionV. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. WeaverProceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, CanadaAugust 2006Networking[PDF]

Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

Listen and Whisper: Security Mechanisms for BGPL. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. KatzProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, CaliforniaMarch 2004Networking[PDF]

Routing Algorithms in DHTs: Some Open QuestionsI. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. ZhuangProceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002.March 2002Networking
An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network MulticastP. Radoslavov and T. TokudaProceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, JapanMarch 1997Networking
Network and User-Perceived Performance of Web Page RetrievalsH. Kruse, M. Allman, and P. MallaschProceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC)November 1998Networking
Host Mobility Using and Internet Indirection InfrastructureS. Zhuang, K. Lai, I. Stoica, R. Katz, and S. ShenkerProceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144May 2003Networking[PDF]

Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree MeshesP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, CaliforniaOctober 2004Networking[PDF]

An Architecture for Developing Behavioral HistoryM. Allman, E. Blanton, and V. PaxsonProceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51July 2005Networking[PDF]

Practical Declarative Network ManagementT. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. ShenkerProceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683August 2009Networking[PDF]

Internet Research Needs Better ModelsS. Floyd and E. Kohler.Proceedings of the First ACM Workshop on Hot Topics in Networks (HotNets-I),Princeton, New JerseyOctober 2002Networking[PDF]

Service Portability: Why http Redirect is the Model for the FutureS. Singh, S. Shenker, and G. VargheseProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54November 2006Networking[PDF]

Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing ApplicationsA. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. PaxsonProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42November 2006Networking[PDF]

Fighting Coordinated Attackers with Cross-Organizational Information on SharingM. Allman, E. Blanton, V. Paxson, and S. ShenkerProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, CaliforniaNovember 2006Networking[PDF]

Adapting Social Spam Infrastructure for Political CensorshipK. Thomas, C. Grier, and V. PaxsonProceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, CaliforniaApril 2012Networking[PDF]

Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Congestion Control Without a Startup PhaseD. Liu, M. Allman, S. Jin, and L. WangProceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, CaliforniaFebruary 2007Networking[PDF]

Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Group Therapy for Systems: Using link attestations to manage failuresM. J. Freedman, I. Stoica, D. Mazieres, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

TCP Performance Over Satellite LinksM. Allman, C. Hayes, H. Kruse, and S. OstermannProceedings of the Fifth International Conference on Telecommunications Systems, Nashville, TennesseeeMarch 1997Networking
Modular Components for Network Address TranslationE. Kohler, R. Morris, and M. PolettoProceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.June 2002Networking
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software VendorsG. SchryenProceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168September 2009Networking[PDF]

Learning Heuristic Functions for State-Space PlaningB. Satzger and O. KramerProceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, HawaiiAugust 2010Networking
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection SystemsL. Juan, C. Kreibich, C.-H. Lin, and V. PaxsonProceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278July 2008Networking[PDF]

Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

Computing Security in the Developing World: A Case for Multidisciplinary ResearchY. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. BrewerProceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C.June 2011Networking[PDF]

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficS. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. SommerProceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272October 2005Networking[PDF]

How to Own the Internet in Your Spare TimeS. Staniford, V. Paxson, and N. WeaverProceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, CaliforniaAugust 2002Networking[PDF]

On the Pitfalls of Geographic Face RoutingY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43September 2005Networking[PDF]

Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. PaxsonProceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United KingdomMarch 2012Networking[PDF]

Pages