| Automating Analysis of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22 | March 2009 | Networking | [PDF]
|
| Software-Defined Internet Architecture | B. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. Shenker | Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, Washington | October 2012 | Networking | [PDF]
|
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Preliminary Results Using ScaleDown to Explore Worm Dynamics | N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana | Proceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86 | August 2002 | Networking | [PDF]
|
| Network Text Editor (NTE): A scalable shared text editor for the MBone | M. Handley and J. Crowcroft | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Canne, France | September 1997 | Networking | |
| End-to-End Internet Packet Dynamics | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| Automated Packet Trace Analysis of TCP Implementations | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| Session Directories and Scalable Internet Multicast Address Allocation | M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98), September 1998, Vancouver, Canada | September 1998 | Networking | |
| The MASC/BGMP Architecture for Inter-Domain Multicast Routing | S. Kumar, P. Radoslavov, D. Thaler, C. Alaettinoglu, D. Estrin, and M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM '98), Vancouver, British Columbia, Canada | August 1998 | Networking | |
| Comparison of Measurement-based Admission Control Algorithms for Controlled-Load Service | S. Jamin, S.J. Shenker, and P.B. Danzig | Proceedings of the Conference on Computer Communications (IEEE Infocom), Kobe, Japan | April 1997 | Networking | |
| Scalable Timers for Soft State Protocols | P. Sharma, D. Estrin, S. Floyd, and V. Jacobson | Proceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution (IEEE INFOCOM 1997), Kobe, Japan, pp. 222-229 | April 1997 | Networking | |
| Optimal Information Security Investment with Penetration Testing | R. Boehme and M. Felegyhazi | Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37 | November 2010 | Networking | [PDF]
|
| Software-Defined Networking: History, Hype, and Hope | S. Shenker | Proceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012. | July 2012 | Networking | |
| Hold-On: Protecting Against On-Path DNS Poisoning | H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson | Proceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United Kingdom | March 2012 | Networking | [PDF]
|
| On the Pitfalls of Geographic Face Routing | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43 | September 2005 | Networking | [PDF]
|
| How to Own the Internet in Your Spare Time | S. Staniford, V. Paxson, and N. Weaver | Proceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, California | August 2002 | Networking | [PDF]
|
| Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic | S. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. Sommer | Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272 | October 2005 | Networking | [PDF]
|
| Computing Security in the Developing World: A Case for Multidisciplinary Research | Y. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. Brewer | Proceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C. | June 2011 | Networking | [PDF]
|
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson | Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278 | July 2008 | Networking | [PDF]
|
| Learning Heuristic Functions for State-Space Planing | B. Satzger and O. Kramer | Proceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, Hawaii | August 2010 | Networking | |
| A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors | G. Schryen | Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168 | September 2009 | Networking | [PDF]
|
| Modular Components for Network Address Translation | E. Kohler, R. Morris, and M. Poletto | Proceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50. | June 2002 | Networking | |
| TCP Performance Over Satellite Links | M. Allman, C. Hayes, H. Kruse, and S. Ostermann | Proceedings of the Fifth International Conference on Telecommunications Systems, Nashville, Tennesseee | March 1997 | Networking | |
| Group Therapy for Systems: Using link attestations to manage failures | M. J. Freedman, I. Stoica, D. Mazieres, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| Distributed Segment Tree: Support Range Query and Cover Query over DHT | C. Zheng, G. Shen, S. Li, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| Fighting Coordinated Attackers with Cross-Organizational Information on Sharing | M. Allman, E. Blanton, V. Paxson, and S. Shenker | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California | November 2006 | Networking | [PDF]
|
| Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications | A. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. Paxson | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42 | November 2006 | Networking | [PDF]
|
| Service Portability: Why http Redirect is the Model for the Future | S. Singh, S. Shenker, and G. Varghese | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54 | November 2006 | Networking | [PDF]
|
| Internet Research Needs Better Models | S. Floyd and E. Kohler. | Proceedings of the First ACM Workshop on Hot Topics in Networks (HotNets-I),Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Practical Declarative Network Management | T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker | Proceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683 | August 2009 | Networking | [PDF]
|
| An Architecture for Developing Behavioral History | M. Allman, E. Blanton, and V. Paxson | Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51 | July 2005 | Networking | [PDF]
|
| Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, California | October 2004 | Networking | [PDF]
|
| Host Mobility Using and Internet Indirection Infrastructure | S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker | Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144 | May 2003 | Networking | [PDF]
|
| Network and User-Perceived Performance of Web Page Retrievals | H. Kruse, M. Allman, and P. Mallasch | Proceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC) | November 1998 | Networking | |
| An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network Multicast | P. Radoslavov and T. Tokuda | Proceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, Japan | March 1997 | Networking | |
| Routing Algorithms in DHTs: Some Open Questions | I. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. Zhuang | Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002. | March 2002 | Networking | |
| Listen and Whisper: Security Mechanisms for BGP | L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, California | March 2004 | Networking | [PDF]
|
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver | Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| From Protocol Stack to Protocol Heap - Role-Based Architecture | B. Braden, T. Faber, and M. Handley | Proceedings of the First Workshop on Hot Topics in Networking (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Design Guidelines for Robust Internet Protocols | T. Anderson, S. Shenker, I. Stoica, and D. Wetherall | Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| On the Adaptive Real-Time Detection of Fast-Propagating Network Worms | J. Jung, R. Milito, and V. Paxson | Proceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008 | July 2007 | Networking | [PDF]
|