2009 | ||
---|---|---|
75 | EE | Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson: Automating analysis of large-scale botnet probing events. ASIACCS 2009: 11-22 |
2008 | ||
74 | EE | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: Spamalytics: an empirical analysis of spam marketing conversion. ACM Conference on Computer and Communications Security 2008: 3-14 |
73 | EE | Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson: A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. DIMVA 2008: 267-278 |
72 | EE | Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver: Principles for Developing Comprehensive Network Visibility. HotSec 2008 |
71 | EE | Mythili Vutukuru, Hari Balakrishnan, Vern Paxson: Efficient and Robust TCP Stream Normalization. IEEE Symposium on Security and Privacy 2008: 96-110 |
70 | EE | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: On the Spam Campaign Trail. LEET 2008 |
69 | EE | Mark Allman, Vern Paxson: A Reactive Measurement Framework. PAM 2008: 92-101 |
68 | EE | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Predicting the Resource Consumption of Network Intrusion Detection Systems. RAID 2008: 135-154 |
67 | EE | Gregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider: Enriching network security analysis with time travel. SIGCOMM 2008: 183-194 |
66 | EE | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Predicting the resource consumption of network intrusion detection systems. SIGMETRICS 2008: 437-438 |
65 | EE | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson: On the adaptive real-time detection of fast-propagating network worms. Journal in Computer Virology 4(3): 197-210 (2008) |
2007 | ||
64 | EE | José M. González, Vern Paxson, Nicholas Weaver: Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. ACM Conference on Computer and Communications Security 2007: 139-149 |
63 | EE | Jason Franklin, Vern Paxson: An inquiry into the nature and causes of the wealth of internet miscreants. ACM Conference on Computer and Communications Security 2007: 375-388 |
62 | EE | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson: On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. DIMVA 2007: 175-192 |
61 | EE | Nicholas Weaver, Vern Paxson, José M. González: The shunt: an FPGA-based accelerator for network intrusion prevention. FPGA 2007: 199-206 |
60 | EE | Mark Allman, Vern Paxson: Issues and etiquette concerning use of shared measurement data. Internet Measurement Comference 2007: 135-140 |
59 | EE | Mark Allman, Vern Paxson, Jeff Terrell: A brief history of scanning. Internet Measurement Comference 2007: 77-82 |
58 | EE | Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney: The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. RAID 2007: 107-126 |
2006 | ||
57 | EE | Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal: Semi-automated discovery of application session structure. Internet Measurement Conference 2006: 119-132 |
56 | EE | Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson: binpac: a yacc for writing application protocol parsers. Internet Measurement Conference 2006: 289-300 |
55 | EE | Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz: Protocol-Independent Adaptive Replay of Application Dialog. NDSS 2006 |
54 | EE | José M. González, Vern Paxson: Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. RAID 2006: 272-289 |
53 | EE | Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee: The devil and packet trace anonymization. Computer Communication Review 36(1): 29-38 (2006) |
52 | EE | Vern Paxson: End-to-end routing behavior in the internet. Computer Communication Review 36(5): 41-56 (2006) |
51 | EE | Nick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley: Network loss tomography using striped unicast probes. IEEE/ACM Trans. Netw. 14(4): 697-710 (2006) |
50 | EE | Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker: Observed structure of addresses in IP traffic. IEEE/ACM Trans. Netw. 16(6): 1207-1218 (2006) |
2005 | ||
49 | EE | Robin Sommer, Vern Paxson: Exploiting Independent State For Network Intrusion Detection. ACSAC 2005: 59-71 |
48 | EE | Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer: Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. DIMVA 2005: 206-221 |
47 | EE | Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney: A First Look at Modern Enterprise Traffic. Internet Measurment Conference 2005: 15-28 |
46 | EE | Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer: Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Internet Measurment Conference 2005: 267-272 |
45 | EE | Abhishek Kumar, Vern Paxson, Nicholas Weaver: Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. Internet Measurment Conference 2005: 351-364 |
44 | EE | Vern Paxson: An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. WORM 2005: 51 |
43 | EE | Joseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall: The Network Oracle. IEEE Data Eng. Bull. 28(1): 3-10 (2005) |
42 | EE | Vern Paxson, Michael Waidner: Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Sec. Comput. 2(2): 81 (2005) |
2004 | ||
41 | Vern Paxson: Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004 ACM Press 2004 | |
40 | EE | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer: Operational experiences with high-volume network intrusion detection. ACM Conference on Computer and Communications Security 2004: 2-11 |
39 | EE | Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan: Fast Portscan Detection Using Sequential Hypothesis Testing. IEEE Symposium on Security and Privacy 2004: 211-225 |
38 | EE | Vern Paxson: Strategies for sound internet measurement. Internet Measurement Conference 2004: 263-271 |
37 | EE | Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson: Characteristics of internet background radiation. Internet Measurement Conference 2004: 27-40 |
36 | EE | Vern Paxson: Measuring adversaries. SIGMETRICS 2004: 142 |
35 | EE | Nicholas Weaver, Stuart Staniford, Vern Paxson: Very Fast Containment of Scanning Worms. USENIX Security Symposium 2004: 29-44 |
34 | EE | Stuart Staniford, David Moore, Vern Paxson, Nicholas Weaver: The top speed of flash worms. WORM 2004: 33-42 |
33 | EE | Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson: Preliminary results using scale-down to explore worm dynamics. WORM 2004: 65-72 |
32 | EE | Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) |
2003 | ||
31 | EE | Robin Sommer, Vern Paxson: Enhancing byte-level network intrusion detection signatures with context. ACM Conference on Computer and Communications Security 2003: 262-271 |
30 | EE | Umesh Shankar, Vern Paxson: Active Mapping: Resisting NIDS Evasion without Altering Traffic. IEEE Symposium on Security and Privacy 2003: 44-61 |
29 | EE | Ruoming Pang, Vern Paxson: A high-level programming environment for packet trace anonymization and transformation. SIGCOMM 2003: 339-351 |
28 | EE | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham: A taxonomy of computer worms. WORM 2003: 11-18 |
27 | EE | David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver: Inside the Slammer Worm. IEEE Security & Privacy 1(4): 33-39 (2003) |
2002 | ||
26 | EE | Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker: Observed structure of addresses in IP traffic. Internet Measurement Workshop 2002: 253-266 |
25 | EE | David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford: Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. RAID 2002: 17-35 |
24 | EE | Yin Zhang, Lee Breslau, Vern Paxson, Scott Shenker: On the characteristics and origins of internet flow rates. SIGCOMM 2002: 309-322 |
23 | EE | Stuart Staniford, Vern Paxson, Nicholas Weaver: How to Own the Internet in Your Spare Time. USENIX Security Symposium 2002: 149-167 |
22 | EE | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Aggregate congestion control. Computer Communication Review 32(1): 69 (2002) |
21 | EE | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Controlling high bandwidth aggregates in the network. Computer Communication Review 32(3): 62-73 (2002) |
2001 | ||
20 | Vern Paxson: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement 2001, San Francisco, California, USA, November 1-2, 2001 ACM 2001 | |
19 | EE | Nick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley: Inferring Link Loss Using Striped Unicast Probes. INFOCOM 2001: 915-923 |
18 | EE | Sally Floyd, Vern Paxson: Difficulties in simulating the internet. IEEE/ACM Trans. Netw. 9(4): 392-403 (2001) |
1999 | ||
17 | Paul Francis, Sugih Jamin, Vern Paxson, Lixia Zhang, Daniel F. Gryniewicz, Yixin Jin: An Architecture for a Global Internet Host Distance Estimation Service. INFOCOM 1999: 210-217 | |
16 | EE | Vern Paxson: Defending against network IDS evasion. Recent Advances in Intrusion Detection 1999 |
15 | EE | Mark Allman, Vern Paxson: On Estimating End-to-End Network Path Properties. SIGCOMM 1999: 263-274 |
14 | EE | Vern Paxson: Bro: a system for detecting network intruders in real-time. Computer Networks 31(23-24): 2435-2463 (1999) |
13 | EE | Vern Paxson: End-to-end internet packet dynamics. IEEE/ACM Trans. Netw. 7(3): 277-292 (1999) |
1998 | ||
12 | EE | Vern Paxson: On Calibrating Measurements of Packet Transit Times. SIGMETRICS 1998: 11-21 |
11 | EE | Vern Paxson: Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic CoRR cs.NI/9809030: (1998) |
1997 | ||
10 | EE | Vern Paxson: End-to-end Internet Packet Dynamics. SIGCOMM 1997: 139-152 |
9 | EE | Vern Paxson: Automated Packet Trace Analysis of TCP Implementations. SIGCOMM 1997: 167-179 |
8 | EE | Vern Paxson, Sally Floyd: Why We Don't Know How To Simulate the Internet. Winter Simulation Conference 1997: 1037-1044 |
7 | EE | Vern Paxson: End-to-end routing behavior in the Internet. IEEE/ACM Trans. Netw. 5(5): 601-615 (1997) |
1996 | ||
6 | EE | Vern Paxson: End-to-end Routing Behavior in the Internet. SIGCOMM 1996: 25-38 |
1995 | ||
5 | Carey L. Williamson, Walter Willinger, Vern Paxson, Benjamin Melamed: Network Traffic Measurement and Modelling (Panel). SIGMETRICS 1995: 56-57 | |
4 | EE | Vern Paxson, Sally Floyd: Wide area traffic: the failure of Poisson modeling. IEEE/ACM Trans. Netw. 3(3): 226-244 (1995) |
1994 | ||
3 | EE | Vern Paxson, Sally Floyd: Wide-Area Traffic: The Failure of Poisson Modeling. SIGCOMM 1994: 257-268 |
2 | EE | Vern Paxson: Empirically derived analytic models of wide-area TCP connections. IEEE/ACM Trans. Netw. 2(4): 316-336 (1994) |
1993 | ||
1 | Vern Paxson, Chris Saltmarsh: Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. USENIX Winter 1993: 141-156 |