Publications
Observed Structure of Addresses in IP Traffic.
IEEE/ACM Transactions on Networking. 14(16), 1207-1218.
(2006). The Network Oracle.
Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
(2005). Network Loss Tomography Using Striped Unicast Probes.
IEEE/ACM Transactions on Networking. 697-710.
(2006). A Large-Scale Empirical Study of Security Patches.
USENIX ;login:. 43(1),
(2018). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003). Growth Trends in Wide-Area TCP Connections.
IEEE Network. 8-17.
(1994). Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic.
Computer Communication Review. 27(5), 5-18.
(1997). End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking. 5(5), 601-615.
(1997). End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking. 7(3), 277-292.
(1999). Empirically-Derived Analytic Models of Wide-Area TCP Connections.
IEEE/ACM Transactions on Networking. 2,
(1994). Difficulties in Simulating the Internet.
IEEE/ACM Transactions on Networking. 9(4), 392-403.
(2001). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Controlling High Bandwidth Aggregates in the Network.
ACM SIGCOMM Computer Communication Review. 32(3), 62-73.
(2002). On the Characteristics and Origins of Internet Flow Rates.
ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
(2002). An Architecture for Large-Scale Internet Measurement.
IEEE Communications. 36(8), 48-54.
(1998). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009).
(2001). Aggregate Congestion Control.
ACM SIGCOMM Computer Communication Review. 32(1), 69.
(2002). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.
Journal on Computer Virology. 4(1), 197-210.
(2008). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). Why We Don't Know How To Simulate The Internet.
Proceedings of the 1997 Winter Simulation Conference.
(1997).
(2014).
(2011).