dblp.uni-trier.dewww.uni-trier.de

Vern Paxson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
75EEZhichun Li, Anup Goyal, Yan Chen, Vern Paxson: Automating analysis of large-scale botnet probing events. ASIACCS 2009: 11-22
2008
74EEChris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: Spamalytics: an empirical analysis of spam marketing conversion. ACM Conference on Computer and Communications Security 2008: 3-14
73EELeo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson: A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. DIMVA 2008: 267-278
72EEMark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver: Principles for Developing Comprehensive Network Visibility. HotSec 2008
71EEMythili Vutukuru, Hari Balakrishnan, Vern Paxson: Efficient and Robust TCP Stream Normalization. IEEE Symposium on Security and Privacy 2008: 96-110
70EEChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: On the Spam Campaign Trail. LEET 2008
69EEMark Allman, Vern Paxson: A Reactive Measurement Framework. PAM 2008: 92-101
68EEHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Predicting the Resource Consumption of Network Intrusion Detection Systems. RAID 2008: 135-154
67EEGregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider: Enriching network security analysis with time travel. SIGCOMM 2008: 183-194
66EEHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Predicting the resource consumption of network intrusion detection systems. SIGMETRICS 2008: 437-438
65EEJaeyeon Jung, Rodolfo A. Milito, Vern Paxson: On the adaptive real-time detection of fast-propagating network worms. Journal in Computer Virology 4(3): 197-210 (2008)
2007
64EEJosé M. González, Vern Paxson, Nicholas Weaver: Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. ACM Conference on Computer and Communications Security 2007: 139-149
63EEJason Franklin, Vern Paxson: An inquiry into the nature and causes of the wealth of internet miscreants. ACM Conference on Computer and Communications Security 2007: 375-388
62EEJaeyeon Jung, Rodolfo A. Milito, Vern Paxson: On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. DIMVA 2007: 175-192
61EENicholas Weaver, Vern Paxson, José M. González: The shunt: an FPGA-based accelerator for network intrusion prevention. FPGA 2007: 199-206
60EEMark Allman, Vern Paxson: Issues and etiquette concerning use of shared measurement data. Internet Measurement Comference 2007: 135-140
59EEMark Allman, Vern Paxson, Jeff Terrell: A brief history of scanning. Internet Measurement Comference 2007: 77-82
58EEMatthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney: The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. RAID 2007: 107-126
2006
57EEJayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal: Semi-automated discovery of application session structure. Internet Measurement Conference 2006: 119-132
56EERuoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson: binpac: a yacc for writing application protocol parsers. Internet Measurement Conference 2006: 289-300
55EEWeidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz: Protocol-Independent Adaptive Replay of Application Dialog. NDSS 2006
54EEJosé M. González, Vern Paxson: Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. RAID 2006: 272-289
53EERuoming Pang, Mark Allman, Vern Paxson, Jason Lee: The devil and packet trace anonymization. Computer Communication Review 36(1): 29-38 (2006)
52EEVern Paxson: End-to-end routing behavior in the internet. Computer Communication Review 36(5): 41-56 (2006)
51EENick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley: Network loss tomography using striped unicast probes. IEEE/ACM Trans. Netw. 14(4): 697-710 (2006)
50EEEddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker: Observed structure of addresses in IP traffic. IEEE/ACM Trans. Netw. 16(6): 1207-1218 (2006)
2005
49EERobin Sommer, Vern Paxson: Exploiting Independent State For Network Intrusion Detection. ACSAC 2005: 59-71
48EEHolger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer: Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. DIMVA 2005: 206-221
47EERuoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney: A First Look at Modern Enterprise Traffic. Internet Measurment Conference 2005: 15-28
46EEStefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer: Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Internet Measurment Conference 2005: 267-272
45EEAbhishek Kumar, Vern Paxson, Nicholas Weaver: Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. Internet Measurment Conference 2005: 351-364
44EEVern Paxson: An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. WORM 2005: 51
43EEJoseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall: The Network Oracle. IEEE Data Eng. Bull. 28(1): 3-10 (2005)
42EEVern Paxson, Michael Waidner: Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Sec. Comput. 2(2): 81 (2005)
2004
41 Vern Paxson: Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004 ACM Press 2004
40EEHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Operational experiences with high-volume network intrusion detection. ACM Conference on Computer and Communications Security 2004: 2-11
39EEJaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan: Fast Portscan Detection Using Sequential Hypothesis Testing. IEEE Symposium on Security and Privacy 2004: 211-225
38EEVern Paxson: Strategies for sound internet measurement. Internet Measurement Conference 2004: 263-271
37EERuoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson: Characteristics of internet background radiation. Internet Measurement Conference 2004: 27-40
36EEVern Paxson: Measuring adversaries. SIGMETRICS 2004: 142
35EENicholas Weaver, Stuart Staniford, Vern Paxson: Very Fast Containment of Scanning Worms. USENIX Security Symposium 2004: 29-44
34EEStuart Staniford, David Moore, Vern Paxson, Nicholas Weaver: The top speed of flash worms. WORM 2004: 33-42
33EENicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson: Preliminary results using scale-down to explore worm dynamics. WORM 2004: 65-72
32EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
2003
31EERobin Sommer, Vern Paxson: Enhancing byte-level network intrusion detection signatures with context. ACM Conference on Computer and Communications Security 2003: 262-271
30EEUmesh Shankar, Vern Paxson: Active Mapping: Resisting NIDS Evasion without Altering Traffic. IEEE Symposium on Security and Privacy 2003: 44-61
29EERuoming Pang, Vern Paxson: A high-level programming environment for packet trace anonymization and transformation. SIGCOMM 2003: 339-351
28EENicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham: A taxonomy of computer worms. WORM 2003: 11-18
27EEDavid Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver: Inside the Slammer Worm. IEEE Security & Privacy 1(4): 33-39 (2003)
2002
26EEEddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker: Observed structure of addresses in IP traffic. Internet Measurement Workshop 2002: 253-266
25EEDavid L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford: Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. RAID 2002: 17-35
24EEYin Zhang, Lee Breslau, Vern Paxson, Scott Shenker: On the characteristics and origins of internet flow rates. SIGCOMM 2002: 309-322
23EEStuart Staniford, Vern Paxson, Nicholas Weaver: How to Own the Internet in Your Spare Time. USENIX Security Symposium 2002: 149-167
22EERatul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Aggregate congestion control. Computer Communication Review 32(1): 69 (2002)
21EERatul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Controlling high bandwidth aggregates in the network. Computer Communication Review 32(3): 62-73 (2002)
2001
20 Vern Paxson: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement 2001, San Francisco, California, USA, November 1-2, 2001 ACM 2001
19EENick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley: Inferring Link Loss Using Striped Unicast Probes. INFOCOM 2001: 915-923
18EESally Floyd, Vern Paxson: Difficulties in simulating the internet. IEEE/ACM Trans. Netw. 9(4): 392-403 (2001)
1999
17 Paul Francis, Sugih Jamin, Vern Paxson, Lixia Zhang, Daniel F. Gryniewicz, Yixin Jin: An Architecture for a Global Internet Host Distance Estimation Service. INFOCOM 1999: 210-217
16EEVern Paxson: Defending against network IDS evasion. Recent Advances in Intrusion Detection 1999
15EEMark Allman, Vern Paxson: On Estimating End-to-End Network Path Properties. SIGCOMM 1999: 263-274
14EEVern Paxson: Bro: a system for detecting network intruders in real-time. Computer Networks 31(23-24): 2435-2463 (1999)
13EEVern Paxson: End-to-end internet packet dynamics. IEEE/ACM Trans. Netw. 7(3): 277-292 (1999)
1998
12EEVern Paxson: On Calibrating Measurements of Packet Transit Times. SIGMETRICS 1998: 11-21
11EEVern Paxson: Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic CoRR cs.NI/9809030: (1998)
1997
10EEVern Paxson: End-to-end Internet Packet Dynamics. SIGCOMM 1997: 139-152
9EEVern Paxson: Automated Packet Trace Analysis of TCP Implementations. SIGCOMM 1997: 167-179
8EEVern Paxson, Sally Floyd: Why We Don't Know How To Simulate the Internet. Winter Simulation Conference 1997: 1037-1044
7EEVern Paxson: End-to-end routing behavior in the Internet. IEEE/ACM Trans. Netw. 5(5): 601-615 (1997)
1996
6EEVern Paxson: End-to-end Routing Behavior in the Internet. SIGCOMM 1996: 25-38
1995
5 Carey L. Williamson, Walter Willinger, Vern Paxson, Benjamin Melamed: Network Traffic Measurement and Modelling (Panel). SIGMETRICS 1995: 56-57
4EEVern Paxson, Sally Floyd: Wide area traffic: the failure of Poisson modeling. IEEE/ACM Trans. Netw. 3(3): 226-244 (1995)
1994
3EEVern Paxson, Sally Floyd: Wide-Area Traffic: The Failure of Poisson Modeling. SIGCOMM 1994: 257-268
2EEVern Paxson: Empirically derived analytic models of wide-area TCP connections. IEEE/ACM Trans. Netw. 2(4): 316-336 (1994)
1993
1 Vern Paxson, Chris Saltmarsh: Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. USENIX Winter 1993: 141-156

Coauthor Index

1Mark Allman [15] [47] [53] [59] [60] [69] [72]
2Ruzena Bajcsy [32]
3Hari Balakrishnan [39] [71]
4Paul Barford [37]
5Steven M. Bellovin [21] [22]
6Mike Bennett [47]
7Terry Benzel [32]
8Arthur W. Berger [39]
9Matt Bishop [32]
10Robert Braden [32]
11Lee Breslau [24]
12Carla E. Brodley [32]
13Yan Chen [75]
14Jason Coit [25]
15Weidong Cui [55]
16Robert Cunningham [28]
17David L. Donoho [25]
18Holger Dreger [40] [46] [48] [66] [67] [68]
19Nick G. Duffield [19] [51]
20Brandon Enright [70] [74]
21Sonia Fahmy [32]
22Anja Feldmann [40] [46] [66] [67] [68]
23Ana Georgina Flesia [25]
24Sally Floyd [3] [4] [8] [18] [21] [22] [32]
25Paul Francis [17]
26Jason Franklin [63]
27José M. González [54] [61] [64]
28Anup Goyal [75]
29Daniel F. Gryniewicz [17]
30Ihab Hamadeh [33]
31W. Hardaker [32]
32Joseph M. Hellerstein [43]
33John Ioannidis [21] [22]
34Sugih Jamin [17]
35Yixin Jin [17]
36Anthony D. Joseph [32]
37Leo Juan [73]
38Jaeyeon Jung [39] [57] [62] [65]
39Chris Kanich [70] [74]
40Jayanthkumar Kannan [57]
41Randy H. Katz [55]
42George Kesidis [32] [33]
43Eddie Kohler [26] [50]
44Can Emre Koksal [57]
45Stefan Kornexl [46]
46Christian Kreibich [48] [70] [72] [73] [74]
47Abhishek Kumar [45]
48Jason Lee [47] [53] [58]
49Craig Leres [58]
50Kirill Levchenko [70] [74]
51Karl N. Levitt [32]
52Jinyang Li [26] [50]
53Zhichun Li [75]
54Chih-Hung Lin [73]
55Robert Lindell [32]
56Peng Liu [32]
57Ratul Mahajan [21] [22]
58Gregor Maier [67]
59Benjamin Melamed [5]
60Rodolfo A. Milito [62] [65]
61David Miller [32]
62David Moore [27] [34]
63Russ Mundy [32]
64Cliford Neuman [32]
65Ron Ostrenga [32]
66Ruoming Pang [29] [37] [47] [53] [56]
67Larry L. Peterson [37] [43] [56]
68Phillip A. Porras [32]
69Francesco Lo Presti [19] [51]
70Timothy Roscoe [43]
71Catherine Rosenberg [32]
72Chris Saltmarsh [1]
73Shankar Sastry (Shankar S. Sastry) [32]
74Stefan Savage [27] [70] [74]
75Fabian Schneider [67]
76Umesh Shankar [25] [30]
77Colleen Shannon [27]
78Scott Shenker [21] [22] [24] [26] [43] [50]
79Robin Sommer [31] [40] [46] [48] [49] [56] [58] [66] [67] [68] [72]
80Stuart Staniford-Chen (Stuart Staniford) [23] [25] [27] [28] [34] [35]
81Daniel F. Sterne [32]
82Jeff Terrell [59]
83Brian Tierney [47] [58]
84Donald F. Towsley [19] [51]
85J. Doug Tygar (J. D. Tygar) [32]
86Matthias Vallentin [58]
87Geoffrey M. Voelker [70] [74]
88Mythili Vutukuru [71]
89Michael Waidner [42]
90Nicholas Weaver [23] [27] [28] [33] [34] [35] [45] [55] [61] [64] [72]
91David Wetherall [43]
92Carey L. Williamson [5]
93Walter Willinger [5]
94Shyhtsun Felix Wu [32]
95Vinod Yegneswaran [37]
96Lixia Zhang [17]
97Yin Zhang [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)