| Outside the Closed World: On Using Machine Learning for Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316 | May 2010 | Networking | [PDF]
|
| Object Oriented Circuit Generators in Java | M. Chu, N. Weaver, K. Sulimma, A. DeHon, and J. Wawrzynek | Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM) | 1998 | Networking | |
| A Framework for Incremental Deployment Strategies for Router-Assisted Services | X. He, C. Papadopoulos, and P. Radoslavov | Proceedings of the IEEE Infocom 2003. San Francisco, California, USA | April 2003 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | Proceedings of the IEEE Infocom 2001, Anchorage, Alaska, USA, April 22-26, 2001. | April 22 2001 | Networking | |
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002), Kanpur, India, pp. 133-144 | December 2002 | Networking | |
| Opportunistic Measurement: Extracting Insight from Spurious Traffic | M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Using Honeynets for Internet Situational Awareness | V. Yegneswaran, P. Barford, and V. Paxson | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Off by Default | H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| DoS: Fighting Fire with Fire | M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| On the Effects of Registrar-Level Intervention | H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan Savage | Proceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| X-Trace: A Pervasive Network Tracing Framework | R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica | Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284 | April 2007 | Networking | [PDF]
|
| OverCite: A Cooperative Digital Research Library | J. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. Shenker | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79 | February 2005 | Networking | [PDF]
|
| Peering Peer-to-Peer Providers | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114 | February 2005 | Networking | [PDF]
|
| Policy-Controlled Event Management for Distributed Intrusion Detection | C. Kreibich and R. Sommer | Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391 | June 2005 | Networking | [PDF]
|
| Proxy Caching Mechanism for Multimedia Playback Streams in the Internet | R. Rejaie, M. Handley, H. Yu, and D. Estrin | Proceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999. | March 1999 | Networking | |
| On the Adaptive Real-Time Detection of Fast-Propagating Network Worms | J. Jung, R. Milito, and V. Paxson | Proceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008 | July 2007 | Networking | [PDF]
|
| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| Design Guidelines for Robust Internet Protocols | T. Anderson, S. Shenker, I. Stoica, and D. Wetherall | Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| From Protocol Stack to Protocol Heap - Role-Based Architecture | B. Braden, T. Faber, and M. Handley | Proceedings of the First Workshop on Hot Topics in Networking (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver | Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| Listen and Whisper: Security Mechanisms for BGP | L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, California | March 2004 | Networking | [PDF]
|
| Routing Algorithms in DHTs: Some Open Questions | I. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. Zhuang | Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002. | March 2002 | Networking | |
| An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network Multicast | P. Radoslavov and T. Tokuda | Proceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, Japan | March 1997 | Networking | |
| Network and User-Perceived Performance of Web Page Retrievals | H. Kruse, M. Allman, and P. Mallasch | Proceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC) | November 1998 | Networking | |
| Host Mobility Using and Internet Indirection Infrastructure | S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker | Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144 | May 2003 | Networking | [PDF]
|
| Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, California | October 2004 | Networking | [PDF]
|
| An Architecture for Developing Behavioral History | M. Allman, E. Blanton, and V. Paxson | Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51 | July 2005 | Networking | [PDF]
|
| Practical Declarative Network Management | T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker | Proceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683 | August 2009 | Networking | [PDF]
|
| Internet Research Needs Better Models | S. Floyd and E. Kohler. | Proceedings of the First ACM Workshop on Hot Topics in Networks (HotNets-I),Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Service Portability: Why http Redirect is the Model for the Future | S. Singh, S. Shenker, and G. Varghese | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54 | November 2006 | Networking | [PDF]
|
| Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications | A. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. Paxson | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42 | November 2006 | Networking | [PDF]
|
| Fighting Coordinated Attackers with Cross-Organizational Information on Sharing | M. Allman, E. Blanton, V. Paxson, and S. Shenker | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California | November 2006 | Networking | [PDF]
|
| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| Distributed Segment Tree: Support Range Query and Cover Query over DHT | C. Zheng, G. Shen, S. Li, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| Group Therapy for Systems: Using link attestations to manage failures | M. J. Freedman, I. Stoica, D. Mazieres, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| TCP Performance Over Satellite Links | M. Allman, C. Hayes, H. Kruse, and S. Ostermann | Proceedings of the Fifth International Conference on Telecommunications Systems, Nashville, Tennesseee | March 1997 | Networking | |
| Modular Components for Network Address Translation | E. Kohler, R. Morris, and M. Poletto | Proceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50. | June 2002 | Networking | |
| A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors | G. Schryen | Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168 | September 2009 | Networking | [PDF]
|
| Learning Heuristic Functions for State-Space Planing | B. Satzger and O. Kramer | Proceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, Hawaii | August 2010 | Networking | |
| A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson | Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278 | July 2008 | Networking | [PDF]
|
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| Computing Security in the Developing World: A Case for Multidisciplinary Research | Y. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. Brewer | Proceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C. | June 2011 | Networking | [PDF]
|
| Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic | S. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. Sommer | Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272 | October 2005 | Networking | [PDF]
|
| How to Own the Internet in Your Spare Time | S. Staniford, V. Paxson, and N. Weaver | Proceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, California | August 2002 | Networking | [PDF]
|
| On the Pitfalls of Geographic Face Routing | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43 | September 2005 | Networking | [PDF]
|
| Hold-On: Protecting Against On-Path DNS Poisoning | H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson | Proceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United Kingdom | March 2012 | Networking | [PDF]
|