Publication Search Results

TitleAuthorsort ascendingBibliographicDateGroupLinks
J. Ishac and M. AllmanOn the Performance of TCP Spoofing in Satellite NetworksIEEE Milcom. October 2001.October 2001Networking
Exploiting Innocuous Activity for Correlating Users Across SitesO. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. TeixeiraTo appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, BrazilMay 2013Networking
Post Placement C-Slow Retiming for the Xilinx Virtex FPGAN. Weaver, Y. Markovskiy, Y. Patel, and J. WawrzynekEleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) 2003Networking[PDF]

A Taxonomy of Computer WormsN. Weaver, V. Paxson, S. Staniford, and R. CunninghamProceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18October 2003Networking[PDF]

Large Scale Malicious Code: A Research AgendaN. Weaver, V. Paxson, S. Staniford, and R. CunninghamDARPA-sponsored report 2003Networking
The Shunt: An FPGA-Based Accelerator for Network Intrusion PreventionN. Weaver, V. Paxson, and J.M. GonzalezProceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206February 2007Networking[PDF]

Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

Very Fast Containment of Scanning Worms, RevisitedN. Weaver, S. Staniford, and V. PaxsonIn Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer 2007Networking
Detecting Forged TCP Reset PacketsN. Weaver, R. Sommer, and V. PaxsonProceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CaliforniaFebruary 2009Networking[PDF]

The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

Preliminary Results Using ScaleDown to Explore Worm DynamicsN. Weaver, I. Hamadeh, G. Kesidis, and V. PaxsonProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

Worms vs. Perimeters: The Case for Hard-LANsN. Weaver, D. Ellis, S. Staniford, and V. PaxsonProceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76August 2004Networking[PDF]

Implications of Netalyzr's DNS MeasurementsN. Weaver, C. Kreibich, B. Nechaev, and V. PaxsonProceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United KingdomApril 2011Networking[PDF]

Measuring Access Connectivity Characteristics with NetalyzrN. Weaver, C. Kreibich, and V. PaxsonPresented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, CaliforniaJune 2010Networking[PDF]

Redirecting DNS for Ads and ProfitN. Weaver, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Stress Testing Cluster BroN. Weaver and R. SommerProceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, MassachusettsAugust 2007Networking[PDF]

A Comparison of the AES Candidates Amenability to FPGA ImplementationN. Weaver and J. WawrzynekThe Third Advanced Encryption Standard (AES) Candidate Conference, 2000. 2000Networking
Reflections on Witty: Analyzing the AttackerN. Weaver and D. Ellis;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37June 2004Networking[PDF]

Peer to Peer Edge Caches Should Be FreeN. WeaverProceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, VirginiaSeptember 2009Networking[PDF]

Competitive Cyber-Insurance and Internet SecurityN. Shetty, G. Schwartz. M. Felegyhazi, and J. WalrandProceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United KingdomJune 2009Networking[PDF]

OpenFlow: Enabling Innovation in Campus NetworksN. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. BalakrisACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74April 2008Networking[PDF]

NOX: Towards an Operating System for NetworksN. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. ShenkerACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110July 2008Networking[PDF]

Inferring Link Loss Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyProceedings of IEEE INFOCOM, April 2001.April 2001Networking
Network Loss Tomography Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyIEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710August 2006Networking[PDF]

RR-TCP: A Reordering-Robust TCP with DSACKM. Zhang, B. Karp, S. Floyd, and L. PetersonICSI Technical Report TR-02-006July 2002Networking[PDF]

Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large ClustersM. Zaharia, T. Das, H. Li, S. Shenker and I. StoicaIn the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MAJune 2012Networking[PDF]

Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research CommunityM. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. SongEECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, CaliforniaJanuary 2012Networking[PDF]

Fast and Interactive Analytics Over Hadoop Data with SparkM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. StoicaUSENIX ;login:, Vol. 34, No. 4, pp. 45-51August 2012Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CAApril 2012Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, CaliforniaJuly 2011Networking[PDF]

Spark: Cluster Computing with Working SetsM. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. StoicaProceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, MassachusettsJune 2010Networking[PDF]

Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

The Datacenter Needs an Operating SystemM. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, OregonJune 2011Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314September 2006Networking[PDF]

Middleboxes No Longer Considered HarmfulM. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. ShenkerProceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230December 2004Networking[PDF]

Distributed Quota Enforcement for Spam ControlM. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296May 2006Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

Efficient and Robust TCP Stream NormalizationM. Vutukuru, H. Balakrishnan, and V. PaxsonProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110May 2008Networking[PDF]

Elektronische Wahlen: Verifizierung vs. ZertifizierungM. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. BuchmannPresented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, GermanySeptember 2009Networking
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity HardwareM. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. TierneyProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, AustraliaSeptember 2007Networking[PDF]

Wireless Urban Sensing SystemsM. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. EstrinCenter for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, CaliforniaApril 2006Networking[PDF]

Adaptive Power Control for Ad-Hoc NetworksM. SanchezProceedings of Fifth International Conference on Sytemics Cybernetics and Informatics (SCI), 2001 2001Networking
Spam Detection Using Web Page Content: A New BattlegroundM. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. HoepersProceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia.September 2011Networking[PDF]

Revocation Games in Ephemeral NetworksM. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. HubauxProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210October 2008Networking[PDF]

RFC 2018: TCP Selective Acknowledgment OptionsM. Mathis, J. Mahdavi, S. Floyd, and A. RomanowRFC 2018, Proposed StandardApril 1996Networking
A Framework for Defining Empirical Bulk Transfer Capacity MetricsM. Mathis and M. AllmanRFC 3148. July 2001.July 2001Networking
Group Therapy for Systems: Using link attestations to manage failuresM. J. Freedman, I. Stoica, D. Mazieres, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Pages