Found 13 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is P and Author is Vern Paxson  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Gonzalez, J. Maria, & Paxson V. (2003).  Pktd: A Packet Capture and Injection Daemon. Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
Sargent, M., Kristoff J., Paxson V., & Allman M. (2017).  On the Potential Abuse of IGMP. ACM Computer Communication Review. 47(1), 
Felegyhazi, M., Kreibich C., & Paxson V. (2010).  On the Potential of Proactive Domain Blacklisting.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Cui, W., Paxson V., Weaver N., & Katz R. H. (2006).  Protocol-Independent Adaptive Replay of Application Dialog. Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.