| J. Ishac and M. Allman | On the Performance of TCP Spoofing in Satellite Networks | IEEE Milcom. October 2001. | October 2001 | Networking | |
| Exploiting Innocuous Activity for Correlating Users Across Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Post Placement C-Slow Retiming for the Xilinx Virtex FPGA | N. Weaver, Y. Markovskiy, Y. Patel, and J. Wawrzynek | Eleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) | 2003 | Networking | [PDF]
|
| A Taxonomy of Computer Worms | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18 | October 2003 | Networking | [PDF]
|
| Large Scale Malicious Code: A Research Agenda | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | DARPA-sponsored report | 2003 | Networking | |
| The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention | N. Weaver, V. Paxson, and J.M. Gonzalez | Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206 | February 2007 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms | N. Weaver, S. Staniford, and V. Paxson | Proceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44 | August 2004 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |
| Detecting Forged TCP Reset Packets | N. Weaver, R. Sommer, and V. Paxson | Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, California | February 2009 | Networking | [PDF]
|
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| Preliminary Results Using ScaleDown to Explore Worm Dynamics | N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Worms vs. Perimeters: The Case for Hard-LANs | N. Weaver, D. Ellis, S. Staniford, and V. Paxson | Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76 | August 2004 | Networking | [PDF]
|
| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| Measuring Access Connectivity Characteristics with Netalyzr | N. Weaver, C. Kreibich, and V. Paxson | Presented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, California | June 2010 | Networking | [PDF]
|
| Redirecting DNS for Ads and Profit | N. Weaver, C. Kreibich, and V. Paxson | Proceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Stress Testing Cluster Bro | N. Weaver and R. Sommer | Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| A Comparison of the AES Candidates Amenability to FPGA Implementation | N. Weaver and J. Wawrzynek | The Third Advanced Encryption Standard (AES) Candidate Conference, 2000. | 2000 | Networking | |
| Reflections on Witty: Analyzing the Attacker | N. Weaver and D. Ellis | ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37 | June 2004 | Networking | [PDF]
|
| Peer to Peer Edge Caches Should Be Free | N. Weaver | Proceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, Virginia | September 2009 | Networking | [PDF]
|
| Competitive Cyber-Insurance and Internet Security | N. Shetty, G. Schwartz. M. Felegyhazi, and J. Walrand | Proceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United Kingdom | June 2009 | Networking | [PDF]
|
| OpenFlow: Enabling Innovation in Campus Networks | N. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. Balakris | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74 | April 2008 | Networking | [PDF]
|
| NOX: Towards an Operating System for Networks | N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker | ACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110 | July 2008 | Networking | [PDF]
|
| Inferring Link Loss Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | Proceedings of IEEE INFOCOM, April 2001. | April 2001 | Networking | |
| Network Loss Tomography Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | IEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710 | August 2006 | Networking | [PDF]
|
| RR-TCP: A Reordering-Robust TCP with DSACK | M. Zhang, B. Karp, S. Floyd, and L. Peterson | ICSI Technical Report TR-02-006 | July 2002 | Networking | [PDF]
|
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| Fast and Interactive Analytics Over Hadoop Data with Spark | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | USENIX ;login:, Vol. 34, No. 4, pp. 45-51 | August 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, California | July 2011 | Networking | [PDF]
|
| Spark: Cluster Computing with Working Sets | M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica | Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts | June 2010 | Networking | [PDF]
|
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314 | September 2006 | Networking | [PDF]
|
| Middleboxes No Longer Considered Harmful | M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker | Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230 | December 2004 | Networking | [PDF]
|
| Distributed Quota Enforcement for Spam Control | M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296 | May 2006 | Networking | [PDF]
|
| DoS: Fighting Fire with Fire | M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| Efficient and Robust TCP Stream Normalization | M. Vutukuru, H. Balakrishnan, and V. Paxson | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110 | May 2008 | Networking | [PDF]
|
| Elektronische Wahlen: Verifizierung vs. Zertifizierung | M. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. Buchmann | Presented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, Germany | September 2009 | Networking | |
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| Wireless Urban Sensing Systems | M. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. Estrin | Center for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, California | April 2006 | Networking | [PDF]
|
| Adaptive Power Control for Ad-Hoc Networks | M. Sanchez | Proceedings of Fifth International Conference on Sytemics Cybernetics and Informatics (SCI), 2001 | 2001 | Networking | |
| Spam Detection Using Web Page Content: A New Battleground | M. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. Hoepers | Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia. | September 2011 | Networking | [PDF]
|
| Revocation Games in Ephemeral Networks | M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210 | October 2008 | Networking | [PDF]
|
| RFC 2018: TCP Selective Acknowledgment Options | M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow | RFC 2018, Proposed Standard | April 1996 | Networking | |
| A Framework for Defining Empirical Bulk Transfer Capacity Metrics | M. Mathis and M. Allman | RFC 3148. July 2001. | July 2001 | Networking | |
| Group Therapy for Systems: Using link attestations to manage failures | M. J. Freedman, I. Stoica, D. Mazieres, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, California | February 2006 | Networking | [PDF]
|