2009 |
25 | EE | Jelena Mirkovic,
Alefiya Hussain,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009) |
2008 |
24 | EE | Jelena Mirkovic,
Karen R. Sollins,
John Wroclawski:
Managing the Health of Security Experiments.
CSET 2008 |
23 | EE | Mohit Mehta,
Kanika Thapar,
George C. Oikonomou,
Jelena Mirkovic:
Combining Speak-Up with DefCOM for Improved DDoS Defense.
ICC 2008: 1708-1714 |
22 | EE | Songjie Wei,
Jelena Mirkovic:
Correcting congestion-based error in network telescope's observations of worm dynamics.
Internet Measurement Comference 2008: 125-130 |
21 | EE | Jelena Mirkovic:
Privacy-safe network trace sharing via secure queries.
NDA 2008: 3-10 |
20 | EE | Jelena Mirkovic,
Bernhard Walke:
Theoretical Analysis of Saturation Throughput in MU-DCF.
VTC Spring 2008: 2277-2281 |
19 | EE | Jelena Mirkovic,
Bernhard Walke:
On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty.
WiMob 2008: 84-89 |
18 | EE | Jun Li,
Jelena Mirkovic,
Toby Ehrenkranz,
Mengqiu Wang,
Peter L. Reiher,
Lixia Zhang:
Learning the valid incoming direction of IP packets.
Computer Networks 52(2): 399-417 (2008) |
17 | EE | Jelena Mirkovic,
Peter L. Reiher,
Christos Papadopoulos,
Alefiya Hussain,
Marla Shepard,
Michael Berg,
Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise.
IEEE Trans. Computers 57(8): 1098-1112 (2008) |
2007 |
16 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas,
Wei-Min Yao,
Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement.
Experimental Computer Science 2007: 8 |
15 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Wei-Min Yao,
Peter L. Reiher,
Stephen Schwab,
Roshan K. Thomas:
When is service really denied?: a user-centric dos metric.
SIGMETRICS 2007: 357-358 |
14 | EE | Songjie Wei,
Jelena Mirkovic:
Building Reputations for Internet Clients.
Electr. Notes Theor. Comput. Sci. 179: 17-30 (2007) |
2006 |
13 | EE | George C. Oikonomou,
Jelena Mirkovic,
Peter L. Reiher,
Max Robinson:
A Framework for a Collaborative DDoS Defense.
ACSAC 2006: 33-42 |
12 | | Songjie Wei,
Jelena Mirkovic,
Ezra Kissel:
Profiling and Clustering Internet Hosts.
DMIN 2006: 269-275 |
11 | EE | Jelena Mirkovic,
Peter L. Reiher,
Sonia Fahmy,
Roshan K. Thomas,
Alefiya Hussain,
Stephen Schwab,
Calvin Ko:
Measuring denial Of service.
QoP 2006: 53-58 |
10 | EE | Songjie Wei,
Jelena Mirkovic:
A realistic simulation of internet-scale events.
VALUETOOLS 2006: 28 |
2005 |
9 | EE | Songjie Wei,
Jelena Mirkovic,
D. Martin Swany:
Distributed Worm Simulation with a Realistic Internet Model.
PADS 2005: 71-79 |
8 | EE | Jelena Mirkovic,
Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks.
IEEE Trans. Dependable Sec. Comput. 2(3): 216-232 (2005) |
2004 |
7 | EE | Jelena Mirkovic,
Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms.
Computer Communication Review 34(2): 39-53 (2004) |
2003 |
6 | EE | Max Robinson,
Jelena Mirkovic,
B. Scott Michel,
Matthew Schnaider,
Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh.
DISCEX (2) 2003: 101-102 |
5 | EE | Jelena Mirkovic,
Gregory Prier,
Peter L. Reiher:
Source-End DDoS Defense.
NCA 2003: 171-178 |
4 | EE | Jelena Mirkovic,
Max Robinson,
Peter L. Reiher:
Alliance formation for DDoS defense.
NSPW 2003: 11-18 |
2002 |
3 | EE | Jelena Mirkovic,
Gregory Prier,
Peter L. Reiher:
Attacking DDoS at the Source.
ICNP 2002: 312-321 |
2 | EE | Jun Li,
Jelena Mirkovic,
Mengqiu Wang,
Peter L. Reiher,
Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol.
INFOCOM 2002 |
2000 |
1 | | Veljko M. Milutinovic,
Dragana Cvetkovic,
Jelena Mirkovic:
Genetic Search Based on Multiple Mutations.
IEEE Computer 33(11): 118-119 (2000) |