Publications

Found 32 results
[ Author(Desc)] Title Type Year
Filters: Author is Nick Weaver  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Weaver, N. (2020).  How Easy Is it to Build a Robot Assassin?. Lawfare.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N. (2021).  What's the Deal with the Log4Shell Security Nightmare?. Lawfare.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.

Pages