Publications
Found 23 results
Author Title Type [ Year] Filters: First Letter Of Title is E and Author is Vern Paxson [Clear All Filters]
Empirically-Derived Analytic Models of Wide-Area TCP Connections.
IEEE/ACM Transactions on Networking. 2,
(1994). End-to-End Internet Packet Dynamics.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997). End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking. 5(5), 601-615.
(1997). End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking. 7(3), 277-292.
(1999). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). Experiences with NIMI.
Proceedings of Passive & Active Measurement.
(2000). Experiences with NIMI.
Proceedings of the Passive & Active Measurement (PAM 2000).
(2000). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
(2001). Estimating Router ICMP Generation Delays.
Proceedings of Passive & Active Measurement: PAM-2002.
(2002). Enhancing Byte-Level Network Intrusion Detection Signatures with Context.
Proceedings of ACM CCS.
(2003). Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
(2005). Exploiting Independent State For Network Intrusion Detection.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
(2005). Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
(2005). Enhancing Network Intrusion Detection With Integrated Sampling and Filtering.
Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
(2006).
(2008).
(2008).
Ethical Concerns for Censorship Measurement.
Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of ACM Internet Measurement Conference.
(2015). Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of ACM Cloud Computing Security Workshop.
(2015).