| 2009 |
| 25 | EE | Jelena Mirkovic,
Alefiya Hussain,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009) |
| 2008 |
| 24 | EE | Jelena Mirkovic,
Karen R. Sollins,
John Wroclawski:
Managing the Health of Security Experiments.
CSET 2008 |
| 23 | EE | Mohit Mehta,
Kanika Thapar,
George C. Oikonomou,
Jelena Mirkovic:
Combining Speak-Up with DefCOM for Improved DDoS Defense.
ICC 2008: 1708-1714 |
| 22 | EE | Songjie Wei,
Jelena Mirkovic:
Correcting congestion-based error in network telescope's observations of worm dynamics.
Internet Measurement Comference 2008: 125-130 |
| 21 | EE | Jelena Mirkovic:
Privacy-safe network trace sharing via secure queries.
NDA 2008: 3-10 |
| 20 | EE | Jelena Mirkovic,
Bernhard Walke:
Theoretical Analysis of Saturation Throughput in MU-DCF.
VTC Spring 2008: 2277-2281 |
| 19 | EE | Jelena Mirkovic,
Bernhard Walke:
On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty.
WiMob 2008: 84-89 |
| 18 | EE | Jun Li,
Jelena Mirkovic,
Toby Ehrenkranz,
Mengqiu Wang,
Peter L. Reiher,
Lixia Zhang:
Learning the valid incoming direction of IP packets.
Computer Networks 52(2): 399-417 (2008) |
| 17 | EE | Jelena Mirkovic,
Peter L. Reiher,
Christos Papadopoulos,
Alefiya Hussain,
Marla Shepard,
Michael Berg,
Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise.
IEEE Trans. Computers 57(8): 1098-1112 (2008) |
| 2007 |
| 16 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas,
Wei-Min Yao,
Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement.
Experimental Computer Science 2007: 8 |
| 15 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Wei-Min Yao,
Peter L. Reiher,
Stephen Schwab,
Roshan K. Thomas:
When is service really denied?: a user-centric dos metric.
SIGMETRICS 2007: 357-358 |
| 14 | EE | Songjie Wei,
Jelena Mirkovic:
Building Reputations for Internet Clients.
Electr. Notes Theor. Comput. Sci. 179: 17-30 (2007) |
| 2006 |
| 13 | EE | George C. Oikonomou,
Jelena Mirkovic,
Peter L. Reiher,
Max Robinson:
A Framework for a Collaborative DDoS Defense.
ACSAC 2006: 33-42 |
| 12 | | Songjie Wei,
Jelena Mirkovic,
Ezra Kissel:
Profiling and Clustering Internet Hosts.
DMIN 2006: 269-275 |
| 11 | EE | Jelena Mirkovic,
Peter L. Reiher,
Sonia Fahmy,
Roshan K. Thomas,
Alefiya Hussain,
Stephen Schwab,
Calvin Ko:
Measuring denial Of service.
QoP 2006: 53-58 |
| 10 | EE | Songjie Wei,
Jelena Mirkovic:
A realistic simulation of internet-scale events.
VALUETOOLS 2006: 28 |
| 2005 |
| 9 | EE | Songjie Wei,
Jelena Mirkovic,
D. Martin Swany:
Distributed Worm Simulation with a Realistic Internet Model.
PADS 2005: 71-79 |
| 8 | EE | Jelena Mirkovic,
Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks.
IEEE Trans. Dependable Sec. Comput. 2(3): 216-232 (2005) |
| 2004 |
| 7 | EE | Jelena Mirkovic,
Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms.
Computer Communication Review 34(2): 39-53 (2004) |
| 2003 |
| 6 | EE | Max Robinson,
Jelena Mirkovic,
B. Scott Michel,
Matthew Schnaider,
Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh.
DISCEX (2) 2003: 101-102 |
| 5 | EE | Jelena Mirkovic,
Gregory Prier,
Peter L. Reiher:
Source-End DDoS Defense.
NCA 2003: 171-178 |
| 4 | EE | Jelena Mirkovic,
Max Robinson,
Peter L. Reiher:
Alliance formation for DDoS defense.
NSPW 2003: 11-18 |
| 2002 |
| 3 | EE | Jelena Mirkovic,
Gregory Prier,
Peter L. Reiher:
Attacking DDoS at the Source.
ICNP 2002: 312-321 |
| 2 | EE | Jun Li,
Jelena Mirkovic,
Mengqiu Wang,
Peter L. Reiher,
Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol.
INFOCOM 2002 |
| 2000 |
| 1 | | Veljko M. Milutinovic,
Dragana Cvetkovic,
Jelena Mirkovic:
Genetic Search Based on Multiple Mutations.
IEEE Computer 33(11): 118-119 (2000) |