Publication Search Results

TitleAuthorBibliographicsort descendingDateGroupLinks
Automating Analysis of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonProceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22March 2009Networking[PDF]

Software-Defined Internet ArchitectureB. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. ShenkerProceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, WashingtonOctober 2012Networking[PDF]

Can Software Routers Scale?K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. RatnasamyProceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, WashingtonAugust 2008Networking[PDF]

The Top Speed of Flash WormsS. Staniford, D. Moore, V. Paxson, and N. WeaverProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

Preliminary Results Using ScaleDown to Explore Worm DynamicsN. Weaver, I. Hamadeh, G. Kesidis, and V. PaxsonProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. SuranaProceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86August 2002Networking[PDF]

Network Text Editor (NTE): A scalable shared text editor for the MBoneM. Handley and J. CrowcroftProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Canne, FranceSeptember 1997Networking
End-to-End Internet Packet DynamicsV. PaxsonProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, FranceSeptember 1997Networking
Automated Packet Trace Analysis of TCP ImplementationsV. PaxsonProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, FranceSeptember 1997Networking
Session Directories and Scalable Internet Multicast Address AllocationM. HandleyProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98), September 1998, Vancouver, CanadaSeptember 1998Networking
The MASC/BGMP Architecture for Inter-Domain Multicast RoutingS. Kumar, P. Radoslavov, D. Thaler, C. Alaettinoglu, D. Estrin, and M. HandleyProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM '98), Vancouver, British Columbia, CanadaAugust 1998Networking
Comparison of Measurement-based Admission Control Algorithms for Controlled-Load ServiceS. Jamin, S.J. Shenker, and P.B. DanzigProceedings of the Conference on Computer Communications (IEEE Infocom), Kobe, JapanApril 1997Networking
Scalable Timers for Soft State ProtocolsP. Sharma, D. Estrin, S. Floyd, and V. JacobsonProceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution (IEEE INFOCOM 1997), Kobe, Japan, pp. 222-229April 1997Networking
Optimal Information Security Investment with Penetration TestingR. Boehme and M. FelegyhaziProceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37November 2010Networking[PDF]

Software-Defined Networking: History, Hype, and HopeS. ShenkerProceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012.July 2012Networking
Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. PaxsonProceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United KingdomMarch 2012Networking[PDF]

On the Pitfalls of Geographic Face RoutingY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43September 2005Networking[PDF]

How to Own the Internet in Your Spare TimeS. Staniford, V. Paxson, and N. WeaverProceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, CaliforniaAugust 2002Networking[PDF]

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficS. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. SommerProceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272October 2005Networking[PDF]

Computing Security in the Developing World: A Case for Multidisciplinary ResearchY. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. BrewerProceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C.June 2011Networking[PDF]

Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection SystemsL. Juan, C. Kreibich, C.-H. Lin, and V. PaxsonProceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278July 2008Networking[PDF]

Learning Heuristic Functions for State-Space PlaningB. Satzger and O. KramerProceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, HawaiiAugust 2010Networking
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software VendorsG. SchryenProceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168September 2009Networking[PDF]

Modular Components for Network Address TranslationE. Kohler, R. Morris, and M. PolettoProceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.June 2002Networking
TCP Performance Over Satellite LinksM. Allman, C. Hayes, H. Kruse, and S. OstermannProceedings of the Fifth International Conference on Telecommunications Systems, Nashville, TennesseeeMarch 1997Networking
Group Therapy for Systems: Using link attestations to manage failuresM. J. Freedman, I. Stoica, D. Mazieres, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Congestion Control Without a Startup PhaseD. Liu, M. Allman, S. Jin, and L. WangProceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, CaliforniaFebruary 2007Networking[PDF]

Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Adapting Social Spam Infrastructure for Political CensorshipK. Thomas, C. Grier, and V. PaxsonProceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, CaliforniaApril 2012Networking[PDF]

Fighting Coordinated Attackers with Cross-Organizational Information on SharingM. Allman, E. Blanton, V. Paxson, and S. ShenkerProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, CaliforniaNovember 2006Networking[PDF]

Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing ApplicationsA. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. PaxsonProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42November 2006Networking[PDF]

Service Portability: Why http Redirect is the Model for the FutureS. Singh, S. Shenker, and G. VargheseProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54November 2006Networking[PDF]

Internet Research Needs Better ModelsS. Floyd and E. Kohler.Proceedings of the First ACM Workshop on Hot Topics in Networks (HotNets-I),Princeton, New JerseyOctober 2002Networking[PDF]

Practical Declarative Network ManagementT. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. ShenkerProceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683August 2009Networking[PDF]

An Architecture for Developing Behavioral HistoryM. Allman, E. Blanton, and V. PaxsonProceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51July 2005Networking[PDF]

Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree MeshesP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, CaliforniaOctober 2004Networking[PDF]

Host Mobility Using and Internet Indirection InfrastructureS. Zhuang, K. Lai, I. Stoica, R. Katz, and S. ShenkerProceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144May 2003Networking[PDF]

Network and User-Perceived Performance of Web Page RetrievalsH. Kruse, M. Allman, and P. MallaschProceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC)November 1998Networking
An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network MulticastP. Radoslavov and T. TokudaProceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, JapanMarch 1997Networking
Routing Algorithms in DHTs: Some Open QuestionsI. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. ZhuangProceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002.March 2002Networking
Listen and Whisper: Security Mechanisms for BGPL. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. KatzProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, CaliforniaMarch 2004Networking[PDF]

Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

Rethinking Hardware Support for Network Analysis and Intrusion PreventionV. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. WeaverProceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, CanadaAugust 2006Networking[PDF]

On the Spam Campaign TrailC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, CaliforniaApril 2008Networking[PDF]

From Protocol Stack to Protocol Heap - Role-Based ArchitectureB. Braden, T. Faber, and M. HandleyProceedings of the First Workshop on Hot Topics in Networking (HotNets-I), Princeton, New JerseyOctober 2002Networking[PDF]

Design Guidelines for Robust Internet ProtocolsT. Anderson, S. Shenker, I. Stoica, and D. WetherallProceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New JerseyOctober 2002Networking[PDF]

Implications of Netalyzr's DNS MeasurementsN. Weaver, C. Kreibich, B. Nechaev, and V. PaxsonProceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United KingdomApril 2011Networking[PDF]

On the Adaptive Real-Time Detection of Fast-Propagating Network WormsJ. Jung, R. Milito, and V. PaxsonProceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008July 2007Networking[PDF]

Pages