Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Weaver, N., Kreibich C., & Paxson V. (2010).  Measuring Access Connectivity Characteristics with Netalyzr.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N. (2022).  The Death of Cryptocurrency: The Case for Regulation. Yale Law School Information Society Project. Digital Future Whitepaper Series,
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Weaver, N. (2020).  Blocking International Students Is an Attack on America’s Future. Lawfare.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Weaver, N. (2021).  How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission. Lawfare.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Weaver, N., & Wawrzynek J. (2000).  A Comparison of the AES Candidates Amenability to FPGA Implementation.
Weaver, N., Staniford S., & Paxson V. (2007).  Very Fast Containment of Scanning Worms, Revisited. 113-145.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Weaver, N. (2020).  How Easy Is it to Build a Robot Assassin?. Lawfare.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
Weaver, N. (2021).  What's the Deal with the Log4Shell Security Nightmare?. Lawfare.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Weaver, N. (2020).  The SolarWinds Breach: Why Your Work Computers Are Down Today.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N. (2021).  Disrupting Cryptocurrencies 2: Lessons From the Poly 'Hack'. Lawfare.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1996).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. IEEE Computer. 29(3), 79-86.

Pages