Publications

Found 23 results
Author Title Type [ Year(Desc)]
Filters: First Letter Of Title is E and Author is Vern Paxson  [Clear All Filters]
1994
Paxson, V. (1994).  Empirically-Derived Analytic Models of Wide-Area TCP Connections. IEEE/ACM Transactions on Networking. 2,
1997
Paxson, V. (1997).  End-to-End Internet Packet Dynamics. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
Paxson, V. (1997).  End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking. 5(5), 601-615.
1999
Paxson, V. (1999).  End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking. 7(3), 277-292.
Allman, M., & Paxson V. (1999).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM.
2000
Paxson, V., Adams A. K., & Mathis M. (2000).  Experiences with NIMI. Proceedings of Passive & Active Measurement.
Paxson, V., Adams A. K., & Mathis M. (2000).  Experiences with NIMI. Proceedings of the Passive & Active Measurement (PAM 2000).
2001
Allman, M., & Paxson V. (2001).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
2002
Govindan, R., & Paxson V. (2002).  Estimating Router ICMP Generation Delays. Proceedings of Passive & Active Measurement: PAM-2002.
2005
Dreger, H., Kreibich C., Paxson V., & Sommer R. (2005).  Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
Sommer, R., & Paxson V. (2005).  Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
Kumar, A., Paxson V., & Weaver N. (2005).  Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
2006
Gonzalez, J. Maria, & Paxson V. (2006).  Enhancing Network Intrusion Detection With Integrated Sampling and Filtering. Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
2015
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.