Publications

Found 219 results
Author Title [ Type(Desc)] Year
Filters: Author is Vern Paxson  [Clear All Filters]
Technical Report
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2005).  Detecting Hidden Causality in Network Connections.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S. J., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Tschantz, M. Carl, Afroz S., Paxson V., & Tygar J.D.. (2014).  On Modeling the Costs of Censorship. CoRR. abs/1409.3211,
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  The Spread of the Sapphire/Slammer Worm.
Zhang, Y., Paxson V., & Shenker S. J. (2000).  The Stationarity of Internet Path Properties: Routing, Loss, and Throughput.
Rasti, R., Murthy M., & Paxson V. (2014).  Temporal Lensing and its Application in Pulsing Denial of Service Attacks.
Nechaev, B., Paxson V., Allman M., Bennett M., & Gurtov A. (2013).  Towards Methodical Calibration: A Case Study of Enterprise Switch Measurements.
Srivastava, M., Hansen M., Burke J., Parker A., Reddy S., Saurabh G., et al. (2006).  Wireless Urban Sensing Systems.
Web Article
Dokas, P., Jones K., Kasza A., Nadji Y., & Paxson V. (2021).  Corelight Sensors detect the ChaChi RAT. Security Boulevard.

Pages