Publications

Found 219 results
Author [ Title(Desc)] Type Year
Filters: Author is Vern Paxson  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
O
Kohler, E., Li J., Paxson V., & Shenker S. J. (2002).  Observed Structure of Addresses in IP Traffic. Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
Kohler, E., Li J., Paxson V., & Shenker S. J. (2006).  Observed Structure of Addresses in IP Traffic. IEEE/ACM Transactions on Networking. 14(16), 1207-1218.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2004).  Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Sommer, R., & Paxson V. (2010).  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. 305-316.
P
Gonzalez, J. Maria, & Paxson V. (2003).  Pktd: A Packet Capture and Injection Daemon. Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
Sargent, M., Kristoff J., Paxson V., & Allman M. (2017).  On the Potential Abuse of IGMP. ACM Computer Communication Review. 47(1), 
Felegyhazi, M., Kreibich C., & Paxson V. (2010).  On the Potential of Proactive Domain Blacklisting.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication Over DNS. SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.

Pages