BibTeX records: Vern Paxson

download as .bib file

@article{DBLP:journals/ccr/BanoRJSDMMP18,
  author    = {Shehar Bano and
               Philipp Richter and
               Mobin Javed and
               Srikanth Sundaresan and
               Zakir Durumeric and
               Steven J. Murdoch and
               Richard Mortier and
               Vern Paxson},
  title     = {Scanning the Internet for Liveness},
  journal   = {Computer Communication Review},
  volume    = {48},
  number    = {2},
  pages     = {2--9},
  year      = {2018},
  url       = {https://doi.org/10.1145/3213232.3213234},
  doi       = {10.1145/3213232.3213234},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/BanoRJSDMMP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PearceELFP18,
  author    = {Paul Pearce and
               Roya Ensafi and
               Frank Li and
               Nick Feamster and
               Vern Paxson},
  title     = {Toward Continual Measurement of Global Network-Level Censorship},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {16},
  number    = {1},
  pages     = {24--33},
  year      = {2018},
  url       = {https://doi.org/10.1109/MSP.2018.1331018},
  doi       = {10.1109/MSP.2018.1331018},
  timestamp = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/PearceELFP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/LiP18,
  author    = {Frank Li and
               Vern Paxson},
  title     = {A Large-Scale Empirical Study of Security Patches},
  journal   = {;login:},
  volume    = {43},
  number    = {1},
  year      = {2018},
  url       = {https://www.usenix.org/publications/login/spring2018/li},
  timestamp = {Tue, 18 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/usenix-login/LiP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anrw/SinghNAPTGP18,
  author    = {Rachee Singh and
               Rishab Nithyanand and
               Sadia Afroz and
               Paul Pearce and
               Michael Carl Tschantz and
               Phillipa Gill and
               Vern Paxson},
  title     = {Characterizing the Nature and Dynamics of Tor Exit Blocking},
  booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018,
               Montreal, QC, Canada, July 16-16, 2018},
  pages     = {23},
  year      = {2018},
  crossref  = {DBLP:conf/anrw/2018},
  url       = {https://doi.org/10.1145/3232755.3232786},
  doi       = {10.1145/3232755.3232786},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/anrw/SinghNAPTGP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenJDWCP018,
  author    = {Jianjun Chen and
               Jian Jiang and
               Hai{-}Xin Duan and
               Tao Wan and
               Shuo Chen and
               Vern Paxson and
               Min Yang},
  title     = {We Still Don't Have Secure Cross-Domain Requests: an Empirical Study
               of {CORS}},
  booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018.},
  pages     = {1079--1093},
  year      = {2018},
  crossref  = {DBLP:conf/uss/2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18/presentation/chen-jianjun},
  timestamp = {Mon, 20 Aug 2018 15:16:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/ChenJDWCP018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TschantzASQJP18,
  author    = {Michael Carl Tschantz and
               Sadia Afroz and
               Shaarif Sajid and
               Shoaib Asif Qazi and
               Mobin Javed and
               Vern Paxson},
  title     = {A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability},
  booktitle = {8th {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} 2018, Baltimore, MD, USA, August 14, 2018.},
  year      = {2018},
  crossref  = {DBLP:conf/uss/2018foci},
  url       = {https://www.usenix.org/conference/foci18/presentation/tschantz},
  timestamp = {Mon, 20 Aug 2018 14:04:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/TschantzASQJP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-11606,
  author    = {Sadia Afroz and
               Michael Carl Tschantz and
               Shaarif Sajid and
               Shoaib Asif Qazi and
               Mobin Javed and
               Vern Paxson},
  title     = {Exploring Server-side Blocking of Regions},
  journal   = {CoRR},
  volume    = {abs/1805.11606},
  year      = {2018},
  url       = {http://arxiv.org/abs/1805.11606},
  archivePrefix = {arXiv},
  eprint    = {1805.11606},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1805-11606},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-00459,
  author    = {Sadia Afroz and
               Mobin Javed and
               Vern Paxson and
               Shoaib Asif Qazi and
               Shaarif Sajid and
               Michael Carl Tschantz},
  title     = {A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability},
  journal   = {CoRR},
  volume    = {abs/1806.00459},
  year      = {2018},
  url       = {http://arxiv.org/abs/1806.00459},
  archivePrefix = {arXiv},
  eprint    = {1806.00459},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1806-00459},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/SargentKPA17,
  author    = {Matthew Sargent and
               John Kristoff and
               Vern Paxson and
               Mark Allman},
  title     = {On the Potential Abuse of {IGMP}},
  journal   = {Computer Communication Review},
  volume    = {47},
  number    = {1},
  pages     = {27--35},
  year      = {2017},
  url       = {https://doi.org/10.1145/3041027.3041031},
  doi       = {10.1145/3041027.3041031},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/SargentKPA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MarczakP17,
  author    = {William R. Marczak and
               Vern Paxson},
  title     = {Social Engineering Attacks on Government Opponents: Target Perspectives},
  journal   = {PoPETs},
  volume    = {2017},
  number    = {2},
  pages     = {172--185},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0022},
  doi       = {10.1515/popets-2017-0022},
  timestamp = {Wed, 20 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/MarczakP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/PearceJLEFWP17,
  author    = {Paul Pearce and
               Ben Jones and
               Frank Li and
               Roya Ensafi and
               Nick Feamster and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Global-Scale Measurement of {DNS} Manipulation},
  journal   = {;login:},
  volume    = {42},
  number    = {4},
  year      = {2017},
  url       = {https://www.usenix.org/publications/login/winter2017/pearce},
  timestamp = {Tue, 18 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/usenix-login/PearceJLEFWP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17,
  author    = {Kurt Thomas and
               Frank Li and
               Ali Zand and
               Jacob Barrett and
               Juri Ranieri and
               Luca Invernizzi and
               Yarik Markov and
               Oxana Comanescu and
               Vijay Eranti and
               Angelika Moscicki and
               Daniel Margolis and
               Vern Paxson and
               Elie Bursztein},
  title     = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen
               Credentials},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {1421--1434},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3134067},
  doi       = {10.1145/3133956.3134067},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ThomasLZBRIMCEM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiP17,
  author    = {Frank Li and
               Vern Paxson},
  title     = {A Large-Scale Empirical Study of Security Patches},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {2201--2215},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3134072},
  doi       = {10.1145/3133956.3134072},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LiP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/DurrettKBPAMLP17,
  author    = {Greg Durrett and
               Jonathan K. Kummerfeld and
               Taylor Berg{-}Kirkpatrick and
               Rebecca S. Portnoff and
               Sadia Afroz and
               Damon McCoy and
               Kirill Levchenko and
               Vern Paxson},
  title     = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset
               for Fine-grained Domain Adaptation},
  booktitle = {Proceedings of the 2017 Conference on Empirical Methods in Natural
               Language Processing, {EMNLP} 2017, Copenhagen, Denmark, September
               9-11, 2017},
  pages     = {2598--2607},
  year      = {2017},
  crossref  = {DBLP:conf/emnlp/2017},
  url       = {https://aclanthology.info/papers/D17-1275/d17-1275},
  timestamp = {Tue, 30 Jan 2018 13:42:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/emnlp/DurrettKBPAMLP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MurdockLBDP17,
  author    = {Austin Murdock and
               Frank Li and
               Paul Bramsen and
               Zakir Durumeric and
               Vern Paxson},
  title     = {Target generation for internet-wide IPv6 scanning},
  booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
               London, United Kingdom, November 1-3, 2017},
  pages     = {242--253},
  year      = {2017},
  crossref  = {DBLP:conf/imc/2017},
  url       = {https://doi.org/10.1145/3131365.3131405},
  doi       = {10.1145/3131365.3131405},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/MurdockLBDP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LevchenkoDHCAP17,
  author    = {Kirill Levchenko and
               Amogh Dhamdhere and
               Bradley Huffaker and
               kc claffy and
               Mark Allman and
               Vern Paxson},
  title     = {Packetlab: a universal measurement endpoint interface},
  booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
               London, United Kingdom, November 1-3, 2017},
  pages     = {254--260},
  year      = {2017},
  crossref  = {DBLP:conf/imc/2017},
  url       = {https://doi.org/10.1145/3131365.3131396},
  doi       = {10.1145/3131365.3131396},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/LevchenkoDHCAP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DurumericMSBSBB17,
  author    = {Zakir Durumeric and
               Zane Ma and
               Drew Springall and
               Richard Barnes and
               Nick Sullivan and
               Elie Bursztein and
               Michael Bailey and
               J. Alex Halderman and
               Vern Paxson},
  title     = {The Security Impact of {HTTPS} Interception},
  booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS}
               2017, San Diego, California, USA, February 26 - March 1, 2017},
  year      = {2017},
  crossref  = {DBLP:conf/ndss/2017},
  url       = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/security-impact-https-interception/},
  timestamp = {Tue, 16 Jan 2018 15:43:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/DurumericMSBSBB17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PearceELFP17,
  author    = {Paul Pearce and
               Roya Ensafi and
               Frank Li and
               Nick Feamster and
               Vern Paxson},
  title     = {Augur: Internet-Wide Detection of Connectivity Disruptions},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {427--443},
  year      = {2017},
  crossref  = {DBLP:conf/sp/2017},
  url       = {https://doi.org/10.1109/SP.2017.55},
  doi       = {10.1109/SP.2017.55},
  timestamp = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/PearceELFP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PearceJLEFWP17,
  author    = {Paul Pearce and
               Ben Jones and
               Frank Li and
               Roya Ensafi and
               Nick Feamster and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Global Measurement of {DNS} Manipulation},
  booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017.},
  pages     = {307--323},
  year      = {2017},
  crossref  = {DBLP:conf/uss/2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/pearce},
  timestamp = {Thu, 20 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/uss/PearceJLEFWP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SinghNAPTGP17,
  author    = {Rachee Singh and
               Rishab Nithyanand and
               Sadia Afroz and
               Paul Pearce and
               Michael Carl Tschantz and
               Phillipa Gill and
               Vern Paxson},
  title     = {Characterizing the Nature and Dynamics of Tor Exit Blocking},
  booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017.},
  pages     = {325--341},
  year      = {2017},
  crossref  = {DBLP:conf/uss/2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/singh},
  timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/SinghNAPTGP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoSJP017,
  author    = {Grant Ho and
               Aashish Sharma and
               Mobin Javed and
               Vern Paxson and
               David A. Wagner},
  title     = {Detecting Credential Spearphishing in Enterprise Settings},
  booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017.},
  pages     = {469--485},
  year      = {2017},
  crossref  = {DBLP:conf/uss/2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho},
  timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/HoSJP017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PortnoffADKBMLP17,
  author    = {Rebecca S. Portnoff and
               Sadia Afroz and
               Greg Durrett and
               Jonathan K. Kummerfeld and
               Taylor Berg{-}Kirkpatrick and
               Damon McCoy and
               Kirill Levchenko and
               Vern Paxson},
  title     = {Tools for Automated Analysis of Cybercriminal Markets},
  booktitle = {Proceedings of the 26th International Conference on World Wide Web,
               {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages     = {657--666},
  year      = {2017},
  crossref  = {DBLP:conf/www/2017},
  url       = {https://doi.org/10.1145/3038912.3052600},
  doi       = {10.1145/3038912.3052600},
  timestamp = {Tue, 06 Nov 2018 16:57:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/www/PortnoffADKBMLP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09609,
  author    = {Greg Durrett and
               Jonathan K. Kummerfeld and
               Taylor Berg{-}Kirkpatrick and
               Rebecca S. Portnoff and
               Sadia Afroz and
               Damon McCoy and
               Kirill Levchenko and
               Vern Paxson},
  title     = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset
               for Fine-grained Domain Adaptation},
  journal   = {CoRR},
  volume    = {abs/1708.09609},
  year      = {2017},
  url       = {http://arxiv.org/abs/1708.09609},
  archivePrefix = {arXiv},
  eprint    = {1708.09609},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1708-09609},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JainJP16,
  author    = {Sakshi Jain and
               Mobin Javed and
               Vern Paxson},
  title     = {Towards Mining Latent Client Identifiers from Network Traffic},
  journal   = {PoPETs},
  volume    = {2016},
  number    = {2},
  pages     = {100--114},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/popets.2015.2016.issue-2/popets-2016-0007/popets-2016-0007.xml},
  timestamp = {Wed, 17 Feb 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/JainJP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenJDWWP16,
  author    = {Jianjun Chen and
               Jian Jiang and
               Hai{-}Xin Duan and
               Nicholas Weaver and
               Tao Wan and
               Vern Paxson},
  title     = {Host of Troubles: Multiple Host Ambiguities in {HTTP} Implementations},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1516--1527},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2978394},
  doi       = {10.1145/2976749.2978394},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChenJDWWP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaoKMPF16,
  author    = {Shuang Hao and
               Alex Kantchelian and
               Brad Miller and
               Vern Paxson and
               Nick Feamster},
  title     = {{PREDATOR:} Proactive Recognition and Elimination of Domain Abuse
               at Time-Of-Registration},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1568--1579},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2978317},
  doi       = {10.1145/2976749.2978317},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/HaoKMPF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16,
  author    = {Srikanth Sundaresan and
               Damon McCoy and
               Sadia Afroz and
               Vern Paxson},
  title     = {Profiling underground merchants based on network behavior},
  booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
               ON, Canada, June 1-3, 2016},
  pages     = {62--70},
  year      = {2016},
  crossref  = {DBLP:conf/ecrime/2016},
  url       = {https://doi.org/10.1109/ECRIME.2016.7487943},
  doi       = {10.1109/ECRIME.2016.7487943},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecrime/SundaresanMAP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/RichterWVABFKWP16,
  author    = {Philipp Richter and
               Florian Wohlfart and
               Narseo Vallina{-}Rodriguez and
               Mark Allman and
               Randy Bush and
               Anja Feldmann and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment},
  booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
               {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages     = {215--229},
  year      = {2016},
  crossref  = {DBLP:conf/imc/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2987474},
  timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/RichterWVABFKWP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/IkramVSKP16,
  author    = {Muhammad Ikram and
               Narseo Vallina{-}Rodriguez and
               Suranga Seneviratne and
               Mohamed Ali K{\^{a}}afar and
               Vern Paxson},
  title     = {An Analysis of the Privacy and Security Risks of Android {VPN} Permission-enabled
               Apps},
  booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
               {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages     = {349--364},
  year      = {2016},
  crossref  = {DBLP:conf/imc/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2987471},
  timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/IkramVSKP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenZDLJLWP16,
  author    = {Jianjun Chen and
               Xiaofeng Zheng and
               Hai{-}Xin Duan and
               Jinjin Liang and
               Jian Jiang and
               Kang Li and
               Tao Wan and
               Vern Paxson},
  title     = {Forwarding-Loop Attacks in Content Delivery Networks},
  booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
               2016, San Diego, California, USA, February 21-24, 2016},
  year      = {2016},
  crossref  = {DBLP:conf/ndss/2016},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/forwarding-loop-attacks-content-delivery-networks.pdf},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/ChenZDLJLWP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KhattakFAJSMPM16,
  author    = {Sheharbano Khattak and
               David Fifield and
               Sadia Afroz and
               Mobin Javed and
               Srikanth Sundaresan and
               Damon McCoy and
               Vern Paxson and
               Steven J. Murdoch},
  title     = {Do You See What {I} See? Differential Treatment of Anonymous Users},
  booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
               2016, San Diego, California, USA, February 21-24, 2016},
  year      = {2016},
  crossref  = {DBLP:conf/ndss/2016},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/KhattakFAJSMPM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/VallentinPS16,
  author    = {Matthias Vallentin and
               Vern Paxson and
               Robin Sommer},
  title     = {{VAST:} {A} Unified Platform for Interactive Network Forensics},
  booktitle = {13th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016},
  pages     = {345--362},
  year      = {2016},
  crossref  = {DBLP:conf/nsdi/2016},
  url       = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/vallentin},
  timestamp = {Tue, 28 Mar 2017 14:03:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/VallentinPS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/JonesFPWA16,
  author    = {Ben Jones and
               Nick Feamster and
               Vern Paxson and
               Nicholas Weaver and
               Mark Allman},
  title     = {Detecting {DNS} Root Manipulation},
  booktitle = {Passive and Active Measurement - 17th International Conference, {PAM}
               2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings},
  pages     = {276--288},
  year      = {2016},
  crossref  = {DBLP:conf/pam/2016},
  url       = {https://doi.org/10.1007/978-3-319-30505-9\_21},
  doi       = {10.1007/978-3-319-30505-9\_21},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/JonesFPWA16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TschantzAAP16,
  author    = {Michael Carl Tschantz and
               Sadia Afroz and
               anonymous and
               Vern Paxson},
  title     = {SoK: Towards Grounding Censorship Circumvention in Empiricism},
  booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
               USA, May 22-26, 2016},
  pages     = {914--933},
  year      = {2016},
  crossref  = {DBLP:conf/sp/2016},
  url       = {https://doi.org/10.1109/SP.2016.59},
  doi       = {10.1109/SP.2016.59},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/TschantzAAP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiDCKBMSP16,
  author    = {Frank Li and
               Zakir Durumeric and
               Jakub Czyz and
               Mohammad Karami and
               Michael Bailey and
               Damon McCoy and
               Stefan Savage and
               Vern Paxson},
  title     = {You've Got Vulnerability: Exploring Effective Vulnerability Notifications},
  booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016.},
  pages     = {1033--1050},
  year      = {2016},
  crossref  = {DBLP:conf/uss/2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/li},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/LiDCKBMSP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiHKNBTBP16,
  author    = {Frank Li and
               Grant Ho and
               Eric Kuan and
               Yuan Niu and
               Lucas Ballard and
               Kurt Thomas and
               Elie Bursztein and
               Vern Paxson},
  title     = {Remedying Web Hijacking: Notification Effectiveness and Webmaster
               Comprehension},
  booktitle = {Proceedings of the 25th International Conference on World Wide Web,
               {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages     = {1009--1019},
  year      = {2016},
  crossref  = {DBLP:conf/www/2016},
  url       = {https://doi.org/10.1145/2872427.2883039},
  doi       = {10.1145/2872427.2883039},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/www/LiHKNBTBP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RichterWVABFKWP16,
  author    = {Philipp Richter and
               Florian Wohlfart and
               Narseo Vallina{-}Rodriguez and
               Mark Allman and
               Randy Bush and
               Anja Feldmann and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment},
  journal   = {CoRR},
  volume    = {abs/1605.05606},
  year      = {2016},
  url       = {http://arxiv.org/abs/1605.05606},
  archivePrefix = {arXiv},
  eprint    = {1605.05606},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RichterWVABFKWP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/RichterABP15,
  author    = {Philipp Richter and
               Mark Allman and
               Randy Bush and
               Vern Paxson},
  title     = {A Primer on IPv4 Scarcity},
  journal   = {Computer Communication Review},
  volume    = {45},
  number    = {2},
  pages     = {21--31},
  year      = {2015},
  url       = {https://doi.org/10.1145/2766330.2766335},
  doi       = {10.1145/2766330.2766335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/RichterABP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FifieldLHWP15,
  author    = {David Fifield and
               Chang Lan and
               Rod Hynes and
               Percy Wegmann and
               Vern Paxson},
  title     = {Blocking-resistant communication through domain fronting},
  journal   = {PoPETs},
  volume    = {2015},
  number    = {2},
  pages     = {46--64},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/popets.2015.2015.issue-2/popets-2015-0009/popets-2015-0009.xml},
  timestamp = {Fri, 30 Oct 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/FifieldLHWP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiSP15,
  author    = {Frank Li and
               Richard Shin and
               Vern Paxson},
  title     = {Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with
               Multiple Data Owners},
  booktitle = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
               Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {53--64},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015ccsw},
  url       = {https://doi.org/10.1145/2808425.2808430},
  doi       = {10.1145/2808425.2808430},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LiSP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Al-DuwairiAAP15,
  author    = {Basheer Al{-}Duwairi and
               Ahmad T. Al{-}Hammouri and
               Monther Aldwairi and
               Vern Paxson},
  title     = {GFlux: {A} google-based system for Fast Flux detection},
  booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  pages     = {755--756},
  year      = {2015},
  crossref  = {DBLP:conf/cns/2015},
  url       = {https://doi.org/10.1109/CNS.2015.7346920},
  doi       = {10.1109/CNS.2015.7346920},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/Al-DuwairiAAP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/JavedHPP15,
  author    = {Mobin Javed and
               Cormac Herley and
               Marcus Peinado and
               Vern Paxson},
  title     = {Measurement and Analysis of Traffic Exchange Services},
  booktitle = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
               2015, Tokyo, Japan, October 28-30, 2015},
  pages     = {1--12},
  year      = {2015},
  crossref  = {DBLP:conf/imc/2015},
  url       = {https://doi.org/10.1145/2815675.2815708},
  doi       = {10.1145/2815675.2815708},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/JavedHPP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/EnsafiFWFWP15,
  author    = {Roya Ensafi and
               David Fifield and
               Philipp Winter and
               Nick Feamster and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Examining How the Great Firewall Discovers Hidden Circumvention Servers},
  booktitle = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
               2015, Tokyo, Japan, October 28-30, 2015},
  pages     = {445--458},
  year      = {2015},
  crossref  = {DBLP:conf/imc/2015},
  url       = {https://doi.org/10.1145/2815675.2815690},
  doi       = {10.1145/2815675.2815690},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/EnsafiFWFWP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Paxson15,
  author    = {Vern Paxson},
  title     = {Keynote Speaker},
  booktitle = {10th International Conference on Malicious and Unwanted Software,
               {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages     = {1},
  year      = {2015},
  crossref  = {DBLP:conf/malware/2015},
  url       = {https://doi.org/10.1109/MALWARE.2015.7413676},
  doi       = {10.1109/MALWARE.2015.7413676},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/malware/Paxson15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/Vallina-Rodriguez15,
  author    = {Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Beyond the Radio: Illuminating the Higher Layers of Mobile Networks},
  booktitle = {Proceedings of the 13th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys 2015, Florence, Italy,
               May 19-22, 2015},
  pages     = {375--387},
  year      = {2015},
  crossref  = {DBLP:conf/mobisys/2015},
  url       = {https://doi.org/10.1145/2742647.2742675},
  doi       = {10.1145/2742647.2742675},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/Vallina-Rodriguez15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/JonesEFPW15,
  author    = {Ben Jones and
               Roya Ensafi and
               Nick Feamster and
               Vern Paxson and
               Nicholas Weaver},
  title     = {Ethical Concerns for Censorship Measurement},
  booktitle = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Ethics in Networked
               Systems Research, {NS} Ethics@SIGCOMM 2015, London, United Kingdom,
               August 21, 2015},
  pages     = {17--19},
  year      = {2015},
  crossref  = {DBLP:conf/sigcomm/2015nsethics},
  url       = {https://doi.org/10.1145/2793013.2793015},
  doi       = {10.1145/2793013.2793015},
  timestamp = {Thu, 20 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/JonesEFPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Vallina-Rodriguez15,
  author    = {Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Christian Kreibich and
               Vern Paxson},
  title     = {Header Enrichment or {ISP} Enrichment?: Emerging Privacy Threats in
               Mobile Networks},
  booktitle = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Hot Topics in
               Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM
               2015, London, United Kingdom, August 21, 2015},
  pages     = {25--30},
  year      = {2015},
  crossref  = {DBLP:conf/sigcomm/2015hotmiddlebox},
  url       = {https://doi.org/10.1145/2785989.2786002},
  doi       = {10.1145/2785989.2786002},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/Vallina-Rodriguez15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15,
  author    = {Kurt Thomas and
               Elie Bursztein and
               Chris Grier and
               Grant Ho and
               Nav Jagpal and
               Alexandros Kapravelos and
               Damon McCoy and
               Antonio Nappa and
               Vern Paxson and
               Paul Pearce and
               Niels Provos and
               Moheeb Abu Rajab},
  title     = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {151--167},
  year      = {2015},
  crossref  = {DBLP:conf/sp/2015},
  url       = {https://doi.org/10.1109/SP.2015.17},
  doi       = {10.1109/SP.2015.17},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ThomasBGHJKMNPP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RastiMWP15,
  author    = {Ryan Rasti and
               Mukul Murthy and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Temporal Lensing and Its Application in Pulsing Denial-of-Service
               Attacks},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {187--198},
  year      = {2015},
  crossref  = {DBLP:conf/sp/2015},
  url       = {https://doi.org/10.1109/SP.2015.19},
  doi       = {10.1109/SP.2015.19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/RastiMWP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiSP15,
  author    = {Frank Li and
               Richard Shin and
               Vern Paxson},
  title     = {Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with
               Multiple Data Owners},
  journal   = {CoRR},
  volume    = {abs/1507.08309},
  year      = {2015},
  url       = {http://arxiv.org/abs/1507.08309},
  archivePrefix = {arXiv},
  eprint    = {1507.08309},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/LiSP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RazaghpanahVSKG15,
  author    = {Abbas Razaghpanah and
               Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Christian Kreibich and
               Phillipa Gill and
               Mark Allman and
               Vern Paxson},
  title     = {Haystack: In Situ Mobile Traffic Analysis in User Space},
  journal   = {CoRR},
  volume    = {abs/1510.01419},
  year      = {2015},
  url       = {http://arxiv.org/abs/1510.01419},
  archivePrefix = {arXiv},
  eprint    = {1510.01419},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RazaghpanahVSKG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PearceDGLGMPSV14,
  author    = {Paul Pearce and
               Vacha Dave and
               Chris Grier and
               Kirill Levchenko and
               Saikat Guha and
               Damon McCoy and
               Vern Paxson and
               Stefan Savage and
               Geoffrey M. Voelker},
  title     = {Characterizing Large-Scale Click Fraud in ZeroAccess},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {141--152},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660369},
  doi       = {10.1145/2660267.2660369},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/PearceDGLGMPSV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasLGP14,
  author    = {Kurt Thomas and
               Frank Li and
               Chris Grier and
               Vern Paxson},
  title     = {Consequences of Connectivity: Characterizing Account Hijacking on
               Twitter},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {489--500},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660282},
  doi       = {10.1145/2660267.2660282},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ThomasLGP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/Vallina-RodriguezAKWP14,
  author    = {Narseo Vallina{-}Rodriguez and
               Johanna Amann and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {A Tangled Mass: The Android Root Certificate Stores},
  booktitle = {Proceedings of the 10th {ACM} International on Conference on emerging
               Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia,
               December 2-5, 2014},
  pages     = {141--148},
  year      = {2014},
  crossref  = {DBLP:conf/conext/2014},
  url       = {https://doi.org/10.1145/2674005.2675015},
  doi       = {10.1145/2674005.2675015},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/Vallina-RodriguezAKWP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KhattakJKUP14,
  author    = {Sheharbano Khattak and
               Mobin Javed and
               Syed Ali Khayam and
               Zartash Afzal Uzmi and
               Vern Paxson},
  title     = {A Look at the Consequences of Internet Censorship Through an {ISP}
               Lens},
  booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
               Vancouver, BC, Canada, November 5-7, 2014},
  pages     = {271--284},
  year      = {2014},
  crossref  = {DBLP:conf/imc/2014},
  url       = {https://doi.org/10.1145/2663716.2663750},
  doi       = {10.1145/2663716.2663750},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KhattakJKUP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SommerVCP14,
  author    = {Robin Sommer and
               Matthias Vallentin and
               Lorenzo De Carli and
               Vern Paxson},
  title     = {{HILTI:} an Abstract Execution Environment for Deep, Stateful Network
               Traffic Analysis},
  booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
               Vancouver, BC, Canada, November 5-7, 2014},
  pages     = {461--474},
  year      = {2014},
  crossref  = {DBLP:conf/imc/2014},
  url       = {https://doi.org/10.1145/2663716.2663735},
  doi       = {10.1145/2663716.2663735},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/SommerVCP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DurumericKAHBLWABPP14,
  author    = {Zakir Durumeric and
               James Kasten and
               David Adrian and
               J. Alex Halderman and
               Michael Bailey and
               Frank Li and
               Nicholas Weaver and
               Johanna Amann and
               Jethro Beekman and
               Mathias Payer and
               Vern Paxson},
  title     = {The Matter of Heartbleed},
  booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
               Vancouver, BC, Canada, November 5-7, 2014},
  pages     = {475--488},
  year      = {2014},
  crossref  = {DBLP:conf/imc/2014},
  url       = {https://doi.org/10.1145/2663716.2663755},
  doi       = {10.1145/2663716.2663755},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/DurumericKAHBLWABPP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/WeaverKDP14,
  author    = {Nicholas Weaver and
               Christian Kreibich and
               Martin Dam and
               Vern Paxson},
  title     = {Here Be Web Proxies},
  booktitle = {Passive and Active Measurement - 15th International Conference, {PAM}
               2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings},
  pages     = {183--192},
  year      = {2014},
  crossref  = {DBLP:conf/pam/2014},
  url       = {https://doi.org/10.1007/978-3-319-04918-2\_18},
  doi       = {10.1007/978-3-319-04918-2\_18},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/WeaverKDP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/VallentinCSPW14,
  author    = {Matthias Vallentin and
               Dominik Charousset and
               Thomas C. Schmidt and
               Vern Paxson and
               Matthias W{\"{a}}hlisch},
  title     = {Native actors: how to scale network forensics},
  booktitle = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
               17-22, 2014},
  pages     = {141--142},
  year      = {2014},
  crossref  = {DBLP:conf/sigcomm/2014},
  url       = {https://doi.org/10.1145/2619239.2631471},
  doi       = {10.1145/2619239.2631471},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/VallentinCSPW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MarczakSMP14,
  author    = {William R. Marczak and
               John Scott{-}Railton and
               Morgan Marquis{-}Boire and
               Vern Paxson},
  title     = {When Governments Hack Opponents: {A} Look at Actors and Technology},
  booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014.},
  pages     = {511--525},
  year      = {2014},
  crossref  = {DBLP:conf/uss/2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/marczak},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/MarczakSMP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KapravelosGCKVP14,
  author    = {Alexandros Kapravelos and
               Chris Grier and
               Neha Chachra and
               Christopher Kruegel and
               Giovanni Vigna and
               Vern Paxson},
  title     = {Hulk: Eliciting Malicious Behavior in Browser Extensions},
  booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014.},
  pages     = {641--654},
  year      = {2014},
  crossref  = {DBLP:conf/uss/2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/KapravelosGCKVP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014foci,
  editor    = {Jedidiah R. Crandall and
               Vern Paxson},
  title     = {4th {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '14, San Diego, CA, USA, August 18, 2014},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {https://www.usenix.org/conference/foci14},
  timestamp = {Wed, 10 Sep 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2014foci},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TschantzAPT14,
  author    = {Michael Carl Tschantz and
               Sadia Afroz and
               Vern Paxson and
               J. Doug Tygar},
  title     = {On Modeling the Costs of Censorship},
  journal   = {CoRR},
  volume    = {abs/1409.3211},
  year      = {2014},
  url       = {http://arxiv.org/abs/1409.3211},
  archivePrefix = {arXiv},
  eprint    = {1409.3211},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/TschantzAPT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RichterABP14,
  author    = {Philipp Richter and
               Mark Allman and
               Randy Bush and
               Vern Paxson},
  title     = {A Primer on IPv4 Scarcity},
  journal   = {CoRR},
  volume    = {abs/1411.2649},
  year      = {2014},
  url       = {http://arxiv.org/abs/1411.2649},
  archivePrefix = {arXiv},
  eprint    = {1411.2649},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RichterABP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JavedP13,
  author    = {Mobin Javed and
               Vern Paxson},
  title     = {Detecting stealthy, distributed {SSH} brute-forcing},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {85--96},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {https://doi.org/10.1145/2508859.2516719},
  doi       = {10.1145/2508859.2516719},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JavedP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/HaoTPFKGH13,
  author    = {Shuang Hao and
               Matthew Thomas and
               Vern Paxson and
               Nick Feamster and
               Christian Kreibich and
               Chris Grier and
               Scott Hollenbeck},
  title     = {Understanding the domain registration behavior of spammers},
  booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
               Barcelona, Spain, October 23-25, 2013},
  pages     = {63--76},
  year      = {2013},
  crossref  = {DBLP:conf/imc/2013},
  url       = {https://doi.org/10.1145/2504730.2504753},
  doi       = {10.1145/2504730.2504753},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/HaoTPFKGH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KhattakJAP13,
  author    = {Sheharbano Khattak and
               Mobin Javed and
               Philip D. Anderson and
               Vern Paxson},
  title     = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion},
  booktitle = {3rd {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '13, Washington, D.C., USA, August 13, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/uss/2013foci},
  url       = {https://www.usenix.org/conference/foci13/workshop-program/presentation/khattak},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/KhattakJAP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaxsonCJRSSSTVW13,
  author    = {Vern Paxson and
               Mihai Christodorescu and
               Mobin Javed and
               Josyula R. Rao and
               Reiner Sailer and
               Douglas Lee Schales and
               Marc Ph. Stoecklin and
               Kurt Thomas and
               Wietse Z. Venema and
               Nicholas Weaver},
  title     = {Practical Comprehensive Bounds on Surreptitious Communication over
               {DNS}},
  booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
               USA, August 14-16, 2013},
  pages     = {17--32},
  year      = {2013},
  crossref  = {DBLP:conf/uss/2013},
  url       = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/paxson},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/PaxsonCJRSSSTVW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasMGKP13,
  author    = {Kurt Thomas and
               Damon McCoy and
               Chris Grier and
               Alek Kolcz and
               Vern Paxson},
  title     = {Trafficking Fraudulent Accounts: The Role of the Underground Market
               in Twitter Spam and Abuse},
  booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
               USA, August 14-16, 2013},
  pages     = {195--210},
  year      = {2013},
  crossref  = {DBLP:conf/uss/2013},
  url       = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/ThomasMGKP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2013,
  editor    = {Vern Paxson},
  title     = {6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '13, Washington, D.C., USA, August 12, 2013},
  publisher = {{USENIX} Association},
  year      = {2013},
  url       = {https://www.usenix.org/conference/leet13},
  timestamp = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12,
  author    = {Chris Grier and
               Lucas Ballard and
               Juan Caballero and
               Neha Chachra and
               Christian J. Dietrich and
               Kirill Levchenko and
               Panayiotis Mavrommatis and
               Damon McCoy and
               Antonio Nappa and
               Andreas Pitsillidis and
               Niels Provos and
               M. Zubair Rafique and
               Moheeb Abu Rajab and
               Christian Rossow and
               Kurt Thomas and
               Vern Paxson and
               Stefan Savage and
               Geoffrey M. Voelker},
  title     = {Manufacturing compromise: the emergence of exploit-as-a-service},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {821--832},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382283},
  doi       = {10.1145/2382196.2382283},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GrierBCCDLMMNPPRRRTPSV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DhawanSTKAWP12,
  author    = {Mohan Dhawan and
               Justin Samuel and
               Renata Teixeira and
               Christian Kreibich and
               Mark Allman and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Fathom: a browser-based network measurement platform},
  booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  pages     = {73--86},
  year      = {2012},
  crossref  = {DBLP:conf/imc/2012},
  url       = {https://doi.org/10.1145/2398776.2398786},
  doi       = {10.1145/2398776.2398786},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/DhawanSTKAWP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ThomasGP12,
  author    = {Kurt Thomas and
               Chris Grier and
               Vern Paxson},
  title     = {Adapting Social Spam Infrastructure for Political Censorship},
  booktitle = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '12, San Jose, CA, USA, April 24, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/leet/2012},
  url       = {https://www.usenix.org/conference/leet12/workshop-program/presentation/thomas},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/ThomasGP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/HalvorsonSMFKWLP12,
  author    = {Tristan Halvorson and
               Janos Szurdi and
               Gregor Maier and
               M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
               Christian Kreibich and
               Nicholas Weaver and
               Kirill Levchenko and
               Vern Paxson},
  title     = {The {BIZ} Top-Level Domain: Ten Years Later},
  booktitle = {Passive and Active Measurement - 13th International Conference, {PAM}
               2012, Vienna, Austria, March 12-14th, 2012. Proceedings},
  pages     = {221--230},
  year      = {2012},
  crossref  = {DBLP:conf/pam/2012},
  url       = {https://doi.org/10.1007/978-3-642-28537-0\_22},
  doi       = {10.1007/978-3-642-28537-0\_22},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/HalvorsonSMFKWLP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RossowDGKPPBS12,
  author    = {Christian Rossow and
               Christian J. Dietrich and
               Chris Grier and
               Christian Kreibich and
               Vern Paxson and
               Norbert Pohlmann and
               Herbert Bos and
               Maarten van Steen},
  title     = {Prudent Practices for Designing Malware Experiments: Status Quo and
               Outlook},
  booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
               San Francisco, California, {USA}},
  pages     = {65--79},
  year      = {2012},
  crossref  = {DBLP:conf/sp/2012},
  url       = {https://doi.org/10.1109/SP.2012.14},
  doi       = {10.1109/SP.2012.14},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/RossowDGKPPBS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/MartignoniPZHMSPPSS12,
  author    = {Lorenzo Martignoni and
               Pongsin Poosankam and
               Matei Zaharia and
               Jun Han and
               Stephen McCamant and
               Dawn Song and
               Vern Paxson and
               Adrian Perrig and
               Scott Shenker and
               Ion Stoica},
  title     = {Cloud Terminal: Secure Access to Sensitive Applications from Untrusted
               Systems},
  booktitle = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15,
               2012},
  pages     = {165--182},
  year      = {2012},
  crossref  = {DBLP:conf/usenix/2012},
  url       = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/martignoni},
  timestamp = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/MartignoniPZHMSPPSS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiGCP11,
  author    = {Zhichun Li and
               Anup Goyal and
               Yan Chen and
               Vern Paxson},
  title     = {Towards Situational Awareness of Large-Scale Botnet Probing Events},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {6},
  number    = {1},
  pages     = {175--188},
  year      = {2011},
  url       = {https://doi.org/10.1109/TIFS.2010.2086445},
  doi       = {10.1109/TIFS.2010.2086445},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/LiGCP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaierFPSV11,
  author    = {Gregor Maier and
               Anja Feldmann and
               Vern Paxson and
               Robin Sommer and
               Matthias Vallentin},
  title     = {An Assessment of Overt Malicious Activity Manifest in Residential
               Networks},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
               July 7-8, 2011. Proceedings},
  pages     = {144--163},
  year      = {2011},
  crossref  = {DBLP:conf/dimva/2011},
  url       = {https://doi.org/10.1007/978-3-642-22424-9\_9},
  doi       = {10.1007/978-3-642-22424-9\_9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/MaierFPSV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MillerPGKP11,
  author    = {Brad Miller and
               Paul Pearce and
               Chris Grier and
               Christian Kreibich and
               Vern Paxson},
  title     = {What's Clicking What? Techniques and Innovations of Today's Clickbots},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
               July 7-8, 2011. Proceedings},
  pages     = {164--183},
  year      = {2011},
  crossref  = {DBLP:conf/dimva/2011},
  url       = {https://doi.org/10.1007/978-3-642-22424-9\_10},
  doi       = {10.1007/978-3-642-22424-9\_10},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/MillerPGKP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ThomasGSP11,
  author    = {Kurt Thomas and
               Chris Grier and
               Dawn Song and
               Vern Paxson},
  title     = {Suspended accounts in retrospect: an analysis of twitter spam},
  booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages     = {243--258},
  year      = {2011},
  crossref  = {DBLP:conf/imc/2011},
  url       = {https://doi.org/10.1145/2068816.2068840},
  doi       = {10.1145/2068816.2068840},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/ThomasGSP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichWKCP11,
  author    = {Christian Kreibich and
               Nicholas Weaver and
               Chris Kanich and
               Weidong Cui and
               Vern Paxson},
  title     = {{GQ:} practical containment for measuring modern malware systems},
  booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages     = {397--412},
  year      = {2011},
  crossref  = {DBLP:conf/imc/2011},
  url       = {https://doi.org/10.1145/2068816.2068854},
  doi       = {10.1145/2068816.2068854},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KreibichWKCP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/ZhangP11,
  author    = {Chao Michael Zhang and
               Vern Paxson},
  title     = {Detecting and Analyzing Automated Activity on Twitter},
  booktitle = {Passive and Active Measurement - 12th International Conference, {PAM}
               2011, Atlanta, GA, USA, March 20-22, 2011. Proceedings},
  pages     = {102--111},
  year      = {2011},
  crossref  = {DBLP:conf/pam/2011},
  url       = {https://doi.org/10.1007/978-3-642-19260-9\_11},
  doi       = {10.1007/978-3-642-19260-9\_11},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/ZhangP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KreibichWMNP11,
  author    = {Christian Kreibich and
               Nicholas Weaver and
               Gregor Maier and
               Boris Nechaev and
               Vern Paxson},
  title     = {Experiences from Netalyzr with engaging users in end-system measurement},
  booktitle = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements
               up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August
               19, 2011},
  pages     = {25--30},
  year      = {2011},
  crossref  = {DBLP:conf/sigcomm/2011wmust},
  url       = {https://doi.org/10.1145/2018602.2018609},
  doi       = {10.1145/2018602.2018609},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/KreibichWMNP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11,
  author    = {Kirill Levchenko and
               Andreas Pitsillidis and
               Neha Chachra and
               Brandon Enright and
               M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
               Chris Grier and
               Tristan Halvorson and
               Chris Kanich and
               Christian Kreibich and
               He Liu and
               Damon McCoy and
               Nicholas Weaver and
               Vern Paxson and
               Geoffrey M. Voelker and
               Stefan Savage},
  title     = {Click Trajectories: End-to-End Analysis of the Spam Value Chain},
  booktitle = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  pages     = {431--446},
  year      = {2011},
  crossref  = {DBLP:conf/sp/2011},
  url       = {https://doi.org/10.1109/SP.2011.24},
  doi       = {10.1109/SP.2011.24},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/LevchenkoPCEFGHKKLMWPVS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasGMPS11,
  author    = {Kurt Thomas and
               Chris Grier and
               Justin Ma and
               Vern Paxson and
               Dawn Song},
  title     = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service},
  booktitle = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  pages     = {447--462},
  year      = {2011},
  crossref  = {DBLP:conf/sp/2011},
  url       = {https://doi.org/10.1109/SP.2011.25},
  doi       = {10.1109/SP.2011.25},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ThomasGMPS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaballeroGKP11,
  author    = {Juan Caballero and
               Chris Grier and
               Christian Kreibich and
               Vern Paxson},
  title     = {Measuring Pay-per-Install: The Commoditization of Malware Distribution},
  booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  year      = {2011},
  crossref  = {DBLP:conf/uss/2011},
  url       = {http://static.usenix.org/events/sec11/tech/full\_papers/Caballero.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/CaballeroGKP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11,
  author    = {Chris Kanich and
               Nicholas Weaver and
               Damon McCoy and
               Tristan Halvorson and
               Christian Kreibich and
               Kirill Levchenko and
               Vern Paxson and
               Geoffrey M. Voelker and
               Stefan Savage},
  title     = {Show Me the Money: Characterizing Spam-advertised Revenue},
  booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  year      = {2011},
  crossref  = {DBLP:conf/uss/2011},
  url       = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/KanichWMHKLPVS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeaverKP11,
  author    = {Nicholas Weaver and
               Christian Kreibich and
               Vern Paxson},
  title     = {Redirecting {DNS} for Ads and Profit},
  booktitle = {{USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '11, San Francisco, CA, USA, August 8, 2011},
  year      = {2011},
  crossref  = {DBLP:conf/uss/2011foci},
  url       = {https://www.usenix.org/conference/foci11/redirecting-dns-ads-and-profit},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/WeaverKP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6298,
  author    = {Vern Paxson and
               Mark Allman and
               Jerry Chu and
               Matt Sargent},
  title     = {Computing TCP's Retransmission Timer},
  journal   = {{RFC}},
  volume    = {6298},
  pages     = {1--11},
  year      = {2011},
  url       = {https://doi.org/10.17487/RFC6298},
  doi       = {10.17487/RFC6298},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc6298},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierTPZ10,
  author    = {Chris Grier and
               Kurt Thomas and
               Vern Paxson and
               Chao Michael Zhang},
  title     = {@spam: the underground on 140 characters or less},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {27--37},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010},
  url       = {https://doi.org/10.1145/1866307.1866311},
  doi       = {10.1145/1866307.1866311},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GrierTPZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/MuthukrishnanPAA10,
  author    = {Chitra Muthukrishnan and
               Vern Paxson and
               Mark Allman and
               Aditya Akella},
  title     = {Using strongly typed networking to architect for tussle},
  booktitle = {Proceedings of the 9th {ACM} Workshop on Hot Topics in Networks. HotNets
               2010, Monterey, CA, {USA} - October 20 - 21, 2010},
  pages     = {9},
  year      = {2010},
  crossref  = {DBLP:conf/hotnets/2010},
  url       = {https://doi.org/10.1145/1868447.1868456},
  doi       = {10.1145/1868447.1868456},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/MuthukrishnanPAA10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichWNP10,
  author    = {Christian Kreibich and
               Nicholas Weaver and
               Boris Nechaev and
               Vern Paxson},
  title     = {Netalyzr: illuminating the edge network},
  booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  pages     = {246--259},
  year      = {2010},
  crossref  = {DBLP:conf/imc/2010},
  url       = {https://doi.org/10.1145/1879141.1879173},
  doi       = {10.1145/1879141.1879173},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KreibichWNP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ChoCGPS10,
  author    = {Chia Yuan Cho and
               Juan Caballero and
               Chris Grier and
               Vern Paxson and
               Dawn Song},
  title     = {Insights from the Inside: {A} View of Botnet Management from Infiltration},
  booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '10, San Jose, CA, USA, April 27, 2010},
  year      = {2010},
  crossref  = {DBLP:conf/leet/2010},
  url       = {https://www.usenix.org/conference/leet-10/insights-inside-view-botnet-management-infiltration},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/ChoCGPS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/FelegyhaziKP10,
  author    = {M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
               Christian Kreibich and
               Vern Paxson},
  title     = {On the Potential of Proactive Domain Blacklisting},
  booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '10, San Jose, CA, USA, April 27, 2010},
  year      = {2010},
  crossref  = {DBLP:conf/leet/2010},
  url       = {https://www.usenix.org/conference/leet-10/potential-proactive-domain-blacklisting},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/FelegyhaziKP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PitsillidisLKKVPWS10,
  author    = {Andreas Pitsillidis and
               Kirill Levchenko and
               Christian Kreibich and
               Chris Kanich and
               Geoffrey M. Voelker and
               Vern Paxson and
               Nicholas Weaver and
               Stefan Savage},
  title     = {Botnet Judo: Fighting Spam with Itself},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  year      = {2010},
  crossref  = {DBLP:conf/ndss/2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/pdf/12.pdf},
  timestamp = {Wed, 31 Aug 2011 13:59:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/PitsillidisLKKVPWS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/NechaevAPG08,
  author    = {Boris Nechaev and
               Mark Allman and
               Vern Paxson and
               Andrei V. Gurtov},
  title     = {A Preliminary Analysis of {TCP} Performance in an Enterprise Network},
  booktitle = {2010 Internet Network Management Workshop / Workshop on Research on
               Enterprise Networking, San Jose, CA, USA, April, 2010},
  year      = {2010},
  crossref  = {DBLP:conf/nsdi/2010inm-wren},
  url       = {https://www.usenix.org/conference/inmwren-10/preliminary-analysis-tcp-performance-enterprise-network},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/NechaevAPG08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/CallahanAP10,
  author    = {Tom Callahan and
               Mark Allman and
               Vern Paxson},
  title     = {A Longitudinal View of {HTTP} Traffic},
  booktitle = {Passive and Active Measurement, 11th International Conference, {PAM}
               2010, Zurich, Switzerland, April 7-9, 2010. Proceedings},
  pages     = {222--231},
  year      = {2010},
  crossref  = {DBLP:conf/pam/2010},
  url       = {https://doi.org/10.1007/978-3-642-12334-4\_23},
  doi       = {10.1007/978-3-642-12334-4\_23},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/CallahanAP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SommerP10,
  author    = {Robin Sommer and
               Vern Paxson},
  title     = {Outside the Closed World: On Using Machine Learning for Network Intrusion
               Detection},
  booktitle = {31st {IEEE} Symposium on Security and Privacy, S{\&}P 2010, 16-19
               May 2010, Berleley/Oakland, California, {USA}},
  pages     = {305--316},
  year      = {2010},
  crossref  = {DBLP:conf/sp/2010},
  url       = {https://doi.org/10.1109/SP.2010.25},
  doi       = {10.1109/SP.2010.25},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/SommerP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordCGLPY10,
  author    = {Paul Barford and
               Yan Chen and
               Anup Goyal and
               Zhichun Li and
               Vern Paxson and
               Vinod Yegneswaran},
  title     = {Employing Honeynets For Network Situational Awareness},
  booktitle = {Cyber Situational Awareness - Issues and Research},
  pages     = {71--102},
  year      = {2010},
  crossref  = {DBLP:series/ais/46},
  url       = {https://doi.org/10.1007/978-1-4419-0140-8\_5},
  doi       = {10.1007/978-1-4419-0140-8\_5},
  timestamp = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/ais/BarfordCGLPY10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KanichKLEVPS09,
  author    = {Chris Kanich and
               Christian Kreibich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {Spamalytics: an empirical analysis of spam marketing conversion},
  journal   = {Commun. {ACM}},
  volume    = {52},
  number    = {9},
  pages     = {99--107},
  year      = {2009},
  url       = {https://doi.org/10.1145/1562164.1562190},
  doi       = {10.1145/1562164.1562190},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/KanichKLEVPS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/PaxsonMR09,
  author    = {Vern Paxson and
               Nick McKeown and
               Jennifer Rexford},
  title     = {Selecting the 2008 sigcomm test-of-time awardwinner(s)},
  journal   = {Computer Communication Review},
  volume    = {39},
  number    = {2},
  pages     = {40--41},
  year      = {2009},
  url       = {https://doi.org/10.1145/1517480.1517488},
  doi       = {10.1145/1517480.1517488},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/PaxsonMR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SommerPW09,
  author    = {Robin Sommer and
               Vern Paxson and
               Nicholas Weaver},
  title     = {An architecture for exploiting multi-core processors to parallelize
               network intrusion prevention},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {21},
  number    = {10},
  pages     = {1255--1279},
  year      = {2009},
  url       = {https://doi.org/10.1002/cpe.1422},
  doi       = {10.1002/cpe.1422},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/SommerPW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiGCP09,
  author    = {Zhichun Li and
               Anup Goyal and
               Yan Chen and
               Vern Paxson},
  title     = {Automating analysis of large-scale botnet probing events},
  booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2009, Sydney, Australia, March
               10-12, 2009},
  pages     = {11--22},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009asia},
  url       = {https://doi.org/10.1145/1533057.1533063},
  doi       = {10.1145/1533057.1533063},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LiGCP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/MittalPSW09,
  author    = {Prateek Mittal and
               Vern Paxson and
               Robin Sommer and
               Mark Winterrowd},
  title     = {Securing Mediated Trace Access Using Black-box Permutation Analysis},
  booktitle = {Eight {ACM} Workshop on Hot Topics in Networks (HotNets-VIII), {HOTNETS}
               '09, New York City, NY, USA, October 22-23, 2009},
  year      = {2009},
  crossref  = {DBLP:conf/hotnets/2009},
  url       = {http://conferences.sigcomm.org/hotnets/2009/papers/hotnets2009-final151.pdf},
  timestamp = {Fri, 16 Nov 2012 10:09:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/MittalPSW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MaierFPA09,
  author    = {Gregor Maier and
               Anja Feldmann and
               Vern Paxson and
               Mark Allman},
  title     = {On dominant characteristics of residential broadband internet traffic},
  booktitle = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009},
  pages     = {90--102},
  year      = {2009},
  crossref  = {DBLP:conf/imc/2009},
  url       = {https://doi.org/10.1145/1644893.1644904},
  doi       = {10.1145/1644893.1644904},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/MaierFPA09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/NechaevPAG09,
  author    = {Boris Nechaev and
               Vern Paxson and
               Mark Allman and
               Andrei V. Gurtov},
  title     = {On calibrating enterprise switch measurements},
  booktitle = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009},
  pages     = {143--155},
  year      = {2009},
  crossref  = {DBLP:conf/imc/2009},
  url       = {https://doi.org/10.1145/1644893.1644910},
  doi       = {10.1145/1644893.1644910},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/NechaevPAG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/KreibichKLEVPS09,
  author    = {Christian Kreibich and
               Chris Kanich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {Spamcraft: An Inside Look At Spam Campaign Orchestration},
  booktitle = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '09, Boston, MA, USA, April 21, 2009},
  year      = {2009},
  crossref  = {DBLP:conf/leet/2009},
  url       = {https://www.usenix.org/conference/leet-09/spamcraft-inside-look-spam-campaign-orchestration},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/KreibichKLEVPS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WeaverSP09,
  author    = {Nicholas Weaver and
               Robin Sommer and
               Vern Paxson},
  title     = {Detecting Forged {TCP} Reset Packets},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
               2009},
  year      = {2009},
  crossref  = {DBLP:conf/ndss/2009},
  url       = {https://www.ndss-symposium.org/ndss2009/detecting-forged-tcp-reset-packets/},
  timestamp = {Tue, 19 Mar 2019 14:56:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/WeaverSP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5681,
  author    = {Mark Allman and
               Vern Paxson and
               Ethan Blanton},
  title     = {{TCP} Congestion Control},
  journal   = {{RFC}},
  volume    = {5681},
  pages     = {1--18},
  year      = {2009},
  url       = {https://doi.org/10.17487/RFC5681},
  doi       = {10.17487/RFC5681},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc5681},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JungMP08,
  author    = {Jaeyeon Jung and
               Rodolfo A. Milito and
               Vern Paxson},
  title     = {On the adaptive real-time detection of fast-propagating network worms},
  journal   = {Journal in Computer Virology},
  volume    = {4},
  number    = {3},
  pages     = {197--210},
  year      = {2008},
  url       = {https://doi.org/10.1007/s11416-007-0080-y},
  doi       = {10.1007/s11416-007-0080-y},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/virology/JungMP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KanichKLEVPS08,
  author    = {Chris Kanich and
               Christian Kreibich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {Spamalytics: an empirical analysis of spam marketing conversion},
  booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {3--14},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008},
  url       = {https://doi.org/10.1145/1455770.1455774},
  doi       = {10.1145/1455770.1455774},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KanichKLEVPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JuanKLP08,
  author    = {Leo Juan and
               Christian Kreibich and
               Chih{-}Hung Lin and
               Vern Paxson},
  title     = {A Tool for Offline and Live Testing of Evasion Resilience in Network
               Intrusion Detection Systems},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
               2008. Proceedings},
  pages     = {267--278},
  year      = {2008},
  crossref  = {DBLP:conf/dimva/2008},
  url       = {https://doi.org/10.1007/978-3-540-70542-0\_14},
  doi       = {10.1007/978-3-540-70542-0\_14},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/JuanKLP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KreibichKLEVPS08,
  author    = {Christian Kreibich and
               Chris Kanich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {On the Spam Campaign Trail},
  booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  year      = {2008},
  crossref  = {DBLP:conf/nsdi/2008leet},
  url       = {http://www.usenix.org/events/leet08/tech/full\_papers/kreibich/kreibich.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/KreibichKLEVPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/AllmanP08,
  author    = {Mark Allman and
               Vern Paxson},
  title     = {A Reactive Measurement Framework},
  booktitle = {Passive and Active Network Measurement, 9th International Conference,
               {PAM} 2008, Cleveland, OH, USA, April 29-30, 2008. Proceedings},
  pages     = {92--101},
  year      = {2008},
  crossref  = {DBLP:conf/pam/2008},
  url       = {https://doi.org/10.1007/978-3-540-79232-1\_10},
  doi       = {10.1007/978-3-540-79232-1\_10},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/AllmanP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DregerFPS08,
  author    = {Holger Dreger and
               Anja Feldmann and
               Vern Paxson and
               Robin Sommer},
  title     = {Predicting the Resource Consumption of Network Intrusion Detection
               Systems},
  booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium,
               {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  pages     = {135--154},
  year      = {2008},
  crossref  = {DBLP:conf/raid/2008},
  url       = {https://doi.org/10.1007/978-3-540-87403-4\_8},
  doi       = {10.1007/978-3-540-87403-4\_8},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/DregerFPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/MaierSDFPS08,
  author    = {Gregor Maier and
               Robin Sommer and
               Holger Dreger and
               Anja Feldmann and
               Vern Paxson and
               Fabian Schneider},
  title     = {Enriching network security analysis with time travel},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communications,
               Seattle, WA, USA, August 17-22, 2008},
  pages     = {183--194},
  year      = {2008},
  crossref  = {DBLP:conf/sigcomm/2008},
  url       = {https://doi.org/10.1145/1402958.1402980},
  doi       = {10.1145/1402958.1402980},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/MaierSDFPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/DregerFPS08,
  author    = {Holger Dreger and
               Anja Feldmann and
               Vern Paxson and
               Robin Sommer},
  title     = {Predicting the resource consumption of network intrusion detection
               systems},
  booktitle = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference
               on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008,
               Annapolis, MD, USA, June 2-6, 2008},
  pages     = {437--438},
  year      = {2008},
  crossref  = {DBLP:conf/sigmetrics/2008},
  url       = {https://doi.org/10.1145/1375457.1375509},
  doi       = {10.1145/1375457.1375509},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/DregerFPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VutukuruBP08,
  author    = {Mythili Vutukuru and
               Hari Balakrishnan and
               Vern Paxson},
  title     = {Efficient and Robust {TCP} Stream Normalization},
  booktitle = {2008 {IEEE} Symposium on Security and Privacy (S{\&}P 2008), 18-21
               May 2008, Oakland, California, {USA}},
  pages     = {96--110},
  year      = {2008},
  crossref  = {DBLP:conf/sp/2008},
  url       = {https://doi.org/10.1109/SP.2008.27},
  doi       = {10.1109/SP.2008.27},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/VutukuruBP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AllmanKPSW08,
  author    = {Mark Allman and
               Christian Kreibich and
               Vern Paxson and
               Robin Sommer and
               Nicholas Weaver},
  title     = {Principles for Developing Comprehensive Network Visibility},
  booktitle = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
               CA, USA, July 29, 2008, Proceedings},
  year      = {2008},
  crossref  = {DBLP:conf/uss/2008hotsec},
  url       = {http://www.usenix.org/events/hotsec08/tech/full\_papers/allman/allman.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/AllmanKPSW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GonzalezPW07,
  author    = {Jos{\'{e}} M. Gonz{\'{a}}lez and
               Vern Paxson and
               Nicholas Weaver},
  title     = {Shunting: a hardware/software architecture for flexible, high-performance
               network intrusion prevention},
  booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages     = {139--149},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007},
  url       = {https://doi.org/10.1145/1315245.1315264},
  doi       = {10.1145/1315245.1315264},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GonzalezPW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FranklinP07,
  author    = {Jason Franklin and
               Adrian Perrig and
               Vern Paxson and
               Stefan Savage},
  title     = {An inquiry into the nature and causes of the wealth of internet miscreants},
  booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages     = {375--388},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007},
  url       = {https://doi.org/10.1145/1315245.1315292},
  doi       = {10.1145/1315245.1315292},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/FranklinP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JungMP07,
  author    = {Jaeyeon Jung and
               Rodolfo A. Milito and
               Vern Paxson},
  title     = {On the Adaptive Real-Time Detection of Fast-Propagating Network Worms},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
               July 12-13, 2007, Proceedings},
  pages     = {175--192},
  year      = {2007},
  crossref  = {DBLP:conf/dimva/2007},
  url       = {https://doi.org/10.1007/978-3-540-73614-1\_11},
  doi       = {10.1007/978-3-540-73614-1\_11},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/JungMP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/WeaverPG07,
  author    = {Nicholas Weaver and
               Vern Paxson and
               Jos{\'{e}} M. Gonz{\'{a}}lez},
  title     = {The shunt: an FPGA-based accelerator for network intrusion prevention},
  booktitle = {Proceedings of the {ACM/SIGDA} 15th International Symposium on Field
               Programmable Gate Arrays, {FPGA} 2007, Monterey, California, USA,
               February 18-20, 2007},
  pages     = {199--206},
  year      = {2007},
  crossref  = {DBLP:conf/fpga/2007},
  url       = {https://doi.org/10.1145/1216919.1216952},
  doi       = {10.1145/1216919.1216952},
  timestamp = {Tue, 06 Nov 2018 16:58:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fpga/WeaverPG07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/AllmanCNP07,
  author    = {Mark Allman and
               Ken Christensen and
               Bruce Nordman and
               Vern Paxson},
  title     = {Enabling an Energy-Efficient Future Internet Through Selectively Connected
               End Systems},
  booktitle = {6th {ACM} Workshop on Hot Topics in Networks - HotNets-VI, Atlanta,
               Georgia, USA, November 14-15, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/hotnets/2007},
  url       = {http://conferences.sigcomm.org/hotnets/2007/papers/hotnets6-final86.pdf},
  timestamp = {Mon, 05 May 2014 08:06:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/AllmanCNP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AllmanPT07,
  author    = {Mark Allman and
               Vern Paxson and
               Jeff Terrell},
  title     = {A brief history of scanning},
  booktitle = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2007, San Diego, California, USA, October 24-26, 2007},
  pages     = {77--82},
  year      = {2007},
  crossref  = {DBLP:conf/imc/2007},
  url       = {https://doi.org/10.1145/1298306.1298316},
  doi       = {10.1145/1298306.1298316},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/AllmanPT07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AllmanP07,
  author    = {Mark Allman and
               Vern Paxson},
  title     = {Issues and etiquette concerning use of shared measurement data},
  booktitle = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2007, San Diego, California, USA, October 24-26, 2007},
  pages     = {135--140},
  year      = {2007},
  crossref  = {DBLP:conf/imc/2007},
  url       = {https://doi.org/10.1145/1298306.1298327},
  doi       = {10.1145/1298306.1298327},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/AllmanP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VallentinSLLPT07,
  author    = {Matthias Vallentin and
               Robin Sommer and
               Jason Lee and
               Craig Leres and
               Vern Paxson and
               Brian Tierney},
  title     = {The {NIDS} Cluster: Scalable, Stateful Network Intrusion Detection
               on Commodity Hardware},
  booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium,
               {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  pages     = {107--126},
  year      = {2007},
  crossref  = {DBLP:conf/raid/2007},
  url       = {https://doi.org/10.1007/978-3-540-74320-0\_6},
  doi       = {10.1007/978-3-540-74320-0\_6},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/VallentinSLLPT07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AllmanKPSW07,
  author    = {Mark Allman and
               Christian Kreibich and
               Vern Paxson and
               Robin Sommer and
               Nicholas Weaver},
  title     = {The Strengths of Weaker Identities: Opportunistic Personas},
  booktitle = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
               MA, USA, August 7, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/uss/2007hotsec},
  url       = {https://www.usenix.org/conference/hotsec-07/strengths-weaker-identities-opportunistic-personas},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/AllmanKPSW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WeaverSP07,
  author    = {Nicholas Weaver and
               Stuart Staniford and
               Vern Paxson},
  title     = {Very Fast Containment of Scanning Worms, Revisited},
  booktitle = {Malware Detection},
  pages     = {113--145},
  year      = {2007},
  crossref  = {DBLP:series/ais/27},
  url       = {https://doi.org/10.1007/978-0-387-44599-1\_6},
  doi       = {10.1007/978-0-387-44599-1\_6},
  timestamp = {Tue, 16 May 2017 14:24:25 +0200},
  biburl    = {https://dblp.org/rec/bib/series/ais/WeaverSP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2007,
  editor    = {Constantine Dovrolis and
               Vern Paxson and
               Stefan Savage},
  title     = {6th {ACM} Workshop on Hot Topics in Networks - HotNets-VI, Atlanta,
               Georgia, USA, November 14-15, 2007},
  publisher = {{ACM} {SIGCOMM}},
  year      = {2007},
  timestamp = {Mon, 05 May 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/PangAPL06,
  author    = {Ruoming Pang and
               Mark Allman and
               Vern Paxson and
               Jason Lee},
  title     = {The devil and packet trace anonymization},
  journal   = {Computer Communication Review},
  volume    = {36},
  number    = {1},
  pages     = {29--38},
  year      = {2006},
  url       = {https://doi.org/10.1145/1111322.1111330},
  doi       = {10.1145/1111322.1111330},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/PangAPL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Paxson06,
  author    = {Vern Paxson},
  title     = {End-to-end routing behavior in the internet},
  journal   = {Computer Communication Review},
  volume    = {36},
  number    = {5},
  pages     = {41--56},
  year      = {2006},
  url       = {https://doi.org/10.1145/1163593.1163602},
  doi       = {10.1145/1163593.1163602},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/Paxson06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/DuffieldPPT06,
  author    = {Nick G. Duffield and
               Francesco Lo Presti and
               Vern Paxson and
               Donald F. Towsley},
  title     = {Network loss tomography using striped unicast probes},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {14},
  number    = {4},
  pages     = {697--710},
  year      = {2006},
  url       = {http://doi.acm.org/10.1145/1217649},
  doi       = {10.1145/1217649},
  timestamp = {Fri, 23 Feb 2007 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ton/DuffieldPPT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/KohlerLPS06,
  author    = {Eddie Kohler and
               Jinyang Li and
               Vern Paxson and
               Scott Shenker},
  title     = {Observed structure of addresses in {IP} traffic},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {14},
  number    = {6},
  pages     = {1207--1218},
  year      = {2006},
  url       = {http://doi.acm.org/10.1145/1217692},
  doi       = {10.1145/1217692},
  timestamp = {Wed, 16 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ton/KohlerLPS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/AllmanBPS06,
  author    = {Mark Allman and
               Ethan Blanton and
               Vern Paxson and
               Scott Shenker},
  title     = {Fighting Coordinated Attackers with Cross-Organizational Information
               Sharing},
  booktitle = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
               California, USA, November 29-30, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/hotnets/2006},
  url       = {http://conferences.sigcomm.org/hotnets/2006/allman06fighting.pdf},
  timestamp = {Mon, 21 Aug 2017 14:31:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/AllmanBPS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/ParkerRSCGSHBEA06,
  author    = {Andrew Parker and
               Sasank Reddy and
               Thomas Schmid and
               Kevin K. Chang and
               Saurabh Ganeriwal and
               Mani B. Srivastava and
               Mark H. Hansen and
               Jeff Burke and
               Deborah Estrin and
               Mark Allman and
               Vern Paxson},
  title     = {Network System Challenges in Selective Sharing and Verification for
               Personal, Social, and Urban-Scale Sensing Applications},
  booktitle = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
               California, USA, November 29-30, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/hotnets/2006},
  url       = {http://conferences.sigcomm.org/hotnets/2006/parker06network.pdf},
  timestamp = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/ParkerRSCGSHBEA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KannanJPK06,
  author    = {Jayanthkumar Kannan and
               Jaeyeon Jung and
               Vern Paxson and
               Can Emre Koksal},
  title     = {Semi-automated discovery of application session structure},
  booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages     = {119--132},
  year      = {2006},
  crossref  = {DBLP:conf/imc/2006},
  url       = {https://doi.org/10.1145/1177080.1177096},
  doi       = {10.1145/1177080.1177096},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KannanJPK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PangPSP06,
  author    = {Ruoming Pang and
               Vern Paxson and
               Robin Sommer and
               Larry L. Peterson},
  title     = {binpac: a yacc for writing application protocol parsers},
  booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages     = {289--300},
  year      = {2006},
  crossref  = {DBLP:conf/imc/2006},
  url       = {https://doi.org/10.1145/1177080.1177119},
  doi       = {10.1145/1177080.1177119},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/PangPSP06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CuiPWK06,
  author    = {Weidong Cui and
               Vern Paxson and
               Nicholas Weaver and
               Randy H. Katz},
  title     = {Protocol-Independent Adaptive Replay of Application Dialog},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2006, San Diego, California, {USA}},
  year      = {2006},
  crossref  = {DBLP:conf/ndss/2006},
  url       = {http://www.isoc.org/isoc/conferences/ndss/06/proceedings/papers/protocol\_independent\_replay.pdf},
  timestamp = {Thu, 16 Apr 2009 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/CuiPWK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GonzalezP06,
  author    = {Jos{\'{e}} M. Gonz{\'{a}}lez and
               Vern Paxson},
  title     = {Enhancing Network Intrusion Detection with Integrated Sampling and
               Filtering},
  booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium,
               {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  pages     = {272--289},
  year      = {2006},
  crossref  = {DBLP:conf/raid/2006},
  url       = {https://doi.org/10.1007/11856214\_14},
  doi       = {10.1007/11856214\_14},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/GonzalezP06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WeaverPS06,
  author    = {Nicholas Weaver and
               Vern Paxson and
               Robin Sommer},
  title     = {Work in Progress: Bro-LAN Pervasive Network Inspection and Control
               for {LAN} Traffic},
  booktitle = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  pages     = {1--2},
  year      = {2006},
  crossref  = {DBLP:conf/securecomm/2006},
  url       = {https://doi.org/10.1109/SECCOMW.2006.359568},
  doi       = {10.1109/SECCOMW.2006.359568},
  timestamp = {Thu, 21 Jun 2018 08:02:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/WeaverPS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaxsonADLPSW06,
  author    = {Vern Paxson and
               Krste Asanovic and
               Sarang Dharmapurikar and
               John W. Lockwood and
               Ruoming Pang and
               Robin Sommer and
               Nicholas Weaver},
  title     = {Rethinking Hardware Support for Network Analysis and Intrusion Prevention},
  booktitle = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver,
               BC, Canada, July 31, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/uss/2006hotsec},
  url       = {https://www.usenix.org/conference/hotsec-06/rethinking-hardware-support-network-analysis-and-intrusion-prevention},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/PaxsonADLPSW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4440,
  author    = {Sally Floyd and
               Vern Paxson and
               Aaron Falk and
               Internet Architecture Board},
  title     = {{IAB} Thoughts on the Role of the Internet Research Task Force {(IRTF)}},
  journal   = {{RFC}},
  volume    = {4440},
  pages     = {1--13},
  year      = {2006},
  url       = {https://doi.org/10.17487/RFC4440},
  doi       = {10.17487/RFC4440},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc4440},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/HellersteinPPRSW05,
  author    = {Joseph M. Hellerstein and
               Vern Paxson and
               Larry L. Peterson and
               Timothy Roscoe and
               Scott Shenker and
               David Wetherall},
  title     = {The Network Oracle},
  journal   = {{IEEE} Data Eng. Bull.},
  volume    = {28},
  number    = {1},
  pages     = {3--10},
  year      = {2005},
  url       = {ftp://ftp.research.microsoft.com/pub/debull/A05mar/hellerstein.ps},
  timestamp = {Thu, 25 Aug 2005 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/debu/HellersteinPPRSW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PaxsonW05,
  author    = {Vern Paxson and
               Michael Waidner},
  title     = {Guest Editor's Introduction: 2005 {IEEE} Symposium on Security and
               Privacy},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {81},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.23},
  doi       = {10.1109/TDSC.2005.23},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/PaxsonW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SommerP05,
  author    = {Robin Sommer and
               Vern Paxson},
  title     = {Exploiting Independent State For Network Intrusion Detection},
  booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
               5-9 December 2005, Tucson, AZ, {USA}},
  pages     = {59--71},
  year      = {2005},
  crossref  = {DBLP:conf/acsac/2005},
  url       = {https://doi.org/10.1109/CSAC.2005.24},
  doi       = {10.1109/CSAC.2005.24},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/SommerP05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DregerKPS05,
  author    = {Holger Dreger and
               Christian Kreibich and
               Vern Paxson and
               Robin Sommer},
  title     = {Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based
               Context},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               Second International Conference, {DIMVA} 2005, Vienna, Austria, July
               7-8, 2005, Proceedings},
  pages     = {206--221},
  year      = {2005},
  crossref  = {DBLP:conf/dimva/2005},
  url       = {https://doi.org/10.1007/11506881\_13},
  doi       = {10.1007/11506881\_13},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/DregerKPS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PangABLPT05,
  author    = {Ruoming Pang and
               Mark Allman and
               Mike Bennett and
               Jason Lee and
               Vern Paxson and
               Brian Tierney},
  title     = {A First Look at Modern Enterprise Traffic},
  booktitle = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
               Berkeley, California, USA, October 19-21, 2005},
  pages     = {15--28},
  year      = {2005},
  crossref  = {DBLP:conf/imc/2005},
  url       = {http://www.usenix.org/events/imc05/tech/pang.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/PangABLPT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KornexlPDFS05,
  author    = {Stefan Kornexl and
               Vern Paxson and
               Holger Dreger and
               Anja Feldmann and
               Robin Sommer},
  title     = {Building a Time Machine for Efficient Recording and Retrieval of High-Volume
               Network Traffic},
  booktitle = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
               Berkeley, California, USA, October 19-21, 2005},
  pages     = {267--272},
  year      = {2005},
  crossref  = {DBLP:conf/imc/2005},
  url       = {http://www.usenix.org/events/imc05/tech/kornexl.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KornexlPDFS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KumarPW05,
  author    = {Abhishek Kumar and
               Vern Paxson and
               Nicholas Weaver},
  title     = {Exploiting Underlying Structure for Detailed Reconstruction of an
               Internet-scale Event},
  booktitle = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
               Berkeley, California, USA, October 19-21, 2005},
  pages     = {351--364},
  year      = {2005},
  crossref  = {DBLP:conf/imc/2005},
  url       = {http://www.usenix.org/events/imc05/tech/kumar.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KumarPW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DharmapurikarP05,
  author    = {Sarang Dharmapurikar and
               Vern Paxson},
  title     = {Robust {TCP} Stream Reassembly in the Presence of Adversaries},
  booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
               USA, July 31 - August 5, 2005},
  year      = {2005},
  crossref  = {DBLP:conf/uss/2005},
  url       = {https://www.usenix.org/conference/14th-usenix-security-symposium/robust-tcp-stream-reassembly-presence-adversaries},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/DharmapurikarP05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/Paxson05,
  author    = {Vern Paxson},
  title     = {An analysis of the witty outbreak: exploiting underlying structure
               for detailed reconstruction of an internet-scale event},
  booktitle = {Proceedings of the 2005 {ACM} Workshop on Rapid Malcode, {WORM} 2005,
               Fairfax, VA, USA, November 11, 2005},
  pages     = {51},
  year      = {2005},
  crossref  = {DBLP:conf/worm/2005},
  url       = {https://doi.org/10.1145/1103626.1103636},
  doi       = {10.1145/1103626.1103636},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/worm/Paxson05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04,
  author    = {Ruzena Bajcsy and
               Terry Benzel and
               Matt Bishop and
               Robert Braden and
               Carla E. Brodley and
               Sonia Fahmy and
               Sally Floyd and
               W. Hardaker and
               Anthony D. Joseph and
               George Kesidis and
               Karl N. Levitt and
               Robert Lindell and
               Peng Liu and
               David J. Miller and
               Russ Mundy and
               Cliford Neuman and
               Ron Ostrenga and
               Vern Paxson and
               Phillip A. Porras and
               Catherine Rosenberg and
               J. Doug Tygar and
               Shankar Sastry and
               Daniel F. Sterne and
               Shyhtsun Felix Wu},
  title     = {Cyber defense technology networking and evaluation},
  journal   = {Commun. {ACM}},
  volume    = {47},
  number    = {3},
  pages     = {58--61},
  year      = {2004},
  url       = {https://doi.org/10.1145/971617.971646},
  doi       = {10.1145/971617.971646},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DregerFPS04,
  author    = {Holger Dreger and
               Anja Feldmann and
               Vern Paxson and
               Robin Sommer},
  title     = {Operational experiences with high-volume network intrusion detection},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {2--11},
  year      = {2004},
  crossref  = {DBLP:conf/ccs/2004ccs},
  url       = {https://doi.org/10.1145/1030083.1030086},
  doi       = {10.1145/1030083.1030086},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/DregerFPS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hoti/WeaverESP04,
  author    = {Nicholas Weaver and
               Dan Ellis and
               Stuart Staniford and
               Vern Paxson},
  title     = {Worms vs. perimeters: the case for hard-LANs},
  booktitle = {Proceedings of the 12th Annual {IEEE} Symposium on High Performance
               Interconnects, {HOTIC} 2004, August 22-24, 2004, Stanford, CA, {USA}},
  pages     = {70--76},
  year      = {2004},
  crossref  = {DBLP:conf/hoti/2004},
  url       = {https://doi.org/10.1109/CONECT.2004.1375206},
  doi       = {10.1109/CONECT.2004.1375206},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hoti/WeaverESP04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PangYBPP04,
  author    = {Ruoming Pang and
               Vinod Yegneswaran and
               Paul Barford and
               Vern Paxson and
               Larry L. Peterson},
  title     = {Characteristics of internet background radiation},
  booktitle = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages     = {27--40},
  year      = {2004},
  crossref  = {DBLP:conf/imc/2004},
  url       = {https://doi.org/10.1145/1028788.1028794},
  doi       = {10.1145/1028788.1028794},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/PangYBPP04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/Paxson04,
  author    = {Vern Paxson},
  title     = {Strategies for sound internet measurement},
  booktitle = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages     = {263--271},
  year      = {2004},
  crossref  = {DBLP:conf/imc/2004},
  url       = {https://doi.org/10.1145/1028788.1028824},
  doi       = {10.1145/1028788.1028824},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/Paxson04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/Paxson04,
  author    = {Vern Paxson},
  title     = {Measuring adversaries},
  booktitle = {Proceedings of the International Conference on Measurements and Modeling
               of Computer Systems, {SIGMETRICS} 2004, June 10-14, 2004, New York,
               NY, {USA}},
  pages     = {142},
  year      = {2004},
  crossref  = {DBLP:conf/sigmetrics/2004},
  url       = {https://doi.org/10.1145/1005686.1005688},
  doi       = {10.1145/1005686.1005688},
  timestamp = {Tue, 06 Nov 2018 11:07:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/Paxson04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JungPBB04,
  author    = {Jaeyeon Jung and
               Vern Paxson and
               Arthur W. Berger and
               Hari Balakrishnan},
  title     = {Fast Portscan Detection Using Sequential Hypothesis Testing},
  booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
               May 2004, Berkeley, CA, {USA}},
  pages     = {211--225},
  year      = {2004},
  crossref  = {DBLP:conf/sp/2004},
  url       = {https://doi.org/10.1109/SECPRI.2004.1301325},
  doi       = {10.1109/SECPRI.2004.1301325},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/JungPBB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeaverSP04,
  author    = {Nicholas Weaver and
               Stuart Staniford and
               Vern Paxson},
  title     = {Very Fast Containment of Scanning Worms},
  booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
               2004, San Diego, CA, {USA}},
  pages     = {29--44},
  year      = {2004},
  crossref  = {DBLP:conf/uss/2004},
  url       = {http://www.usenix.org/publications/library/proceedings/sec04/tech/weaver.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/WeaverSP04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/StanifordMPW04,
  author    = {Stuart Staniford and
               David Moore and
               Vern Paxson and
               Nicholas Weaver},
  title     = {The top speed of flash worms},
  booktitle = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
               Washington, DC, USA, October 29, 2004},
  pages     = {33--42},
  year      = {2004},
  crossref  = {DBLP:conf/worm/2004},
  url       = {https://doi.org/10.1145/1029618.1029624},
  doi       = {10.1145/1029618.1029624},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/worm/StanifordMPW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/WeaverHKP04,
  author    = {Nicholas Weaver and
               Ihab Hamadeh and
               George Kesidis and
               Vern Paxson},
  title     = {Preliminary results using scale-down to explore worm dynamics},
  booktitle = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
               Washington, DC, USA, October 29, 2004},
  pages     = {65--72},
  year      = {2004},
  crossref  = {DBLP:conf/worm/2004},
  url       = {https://doi.org/10.1145/1029618.1029628},
  doi       = {10.1145/1029618.1029628},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/worm/WeaverHKP04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/worm/2004,
  editor    = {Vern Paxson},
  title     = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
               Washington, DC, USA, October 29, 2004},
  publisher = {{ACM} Press},
  year      = {2004},
  isbn      = {1-58113-970-5},
  timestamp = {Fri, 23 Feb 2007 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/worm/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MoorePSSSW03,
  author    = {David Moore and
               Vern Paxson and
               Stefan Savage and
               Colleen Shannon and
               Stuart Staniford{-}Chen and
               Nicholas Weaver},
  title     = {Inside the Slammer Worm},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {1},
  number    = {4},
  pages     = {33--39},
  year      = {2003},
  url       = {https://doi.org/10.1109/MSECP.2003.1219056},
  doi       = {10.1109/MSECP.2003.1219056},
  timestamp = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/MoorePSSSW03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SommerP03,
  author    = {Robin Sommer and
               Vern Paxson},
  title     = {Enhancing byte-level network intrusion detection signatures with context},
  booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications
               Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages     = {262--271},
  year      = {2003},
  crossref  = {DBLP:conf/ccs/2003},
  url       = {https://doi.org/10.1145/948109.948145},
  doi       = {10.1145/948109.948145},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SommerP03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/PangP03,
  author    = {Ruoming Pang and
               Vern Paxson},
  title     = {A high-level programming environment for packet trace anonymization
               and transformation},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 2003 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               August 25-29, 2003, Karlsruhe, Germany},
  pages     = {339--351},
  year      = {2003},
  crossref  = {DBLP:conf/sigcomm/2003},
  url       = {https://doi.org/10.1145/863955.863994},
  doi       = {10.1145/863955.863994},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/PangP03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShankarP03,
  author    = {Umesh Shankar and
               Vern Paxson},
  title     = {Active Mapping: Resisting {NIDS} Evasion without Altering Traffic},
  booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
               May 2003, Berkeley, CA, {USA}},
  pages     = {44--61},
  year      = {2003},
  crossref  = {DBLP:conf/sp/2003},
  url       = {https://doi.org/10.1109/SECPRI.2003.1199327},
  doi       = {10.1109/SECPRI.2003.1199327},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ShankarP03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/WeaverPSC03,
  author    = {Nicholas Weaver and
               Vern Paxson and
               Stuart Staniford and
               Robert K. Cunningham},
  title     = {A taxonomy of computer worms},
  booktitle = {Proceedings of the 2003 {ACM} Workshop on Rapid Malcode, {WORM} 2003,
               Washington, DC, USA, October 27, 2003},
  pages     = {11--18},
  year      = {2003},
  crossref  = {DBLP:conf/worm/2003},
  url       = {https://doi.org/10.1145/948187.948190},
  doi       = {10.1145/948187.948190},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/worm/WeaverPSC03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MahajanBFIPS02,
  author    = {Ratul Mahajan and
               Steven M. Bellovin and
               Sally Floyd and
               John Ioannidis and
               Vern Paxson and
               Scott Shenker},
  title     = {Aggregate congestion control},
  journal   = {Computer Communication Review},
  volume    = {32},
  number    = {1},
  pages     = {69},
  year      = {2002},
  url       = {https://doi.org/10.1145/510726.510743},
  doi       = {10.1145/510726.510743},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/MahajanBFIPS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MahajanBFIPS02a,
  author    = {Ratul Mahajan and
               Steven M. Bellovin and
               Sally Floyd and
               John Ioannidis and
               Vern Paxson and
               Scott Shenker},
  title     = {Controlling high bandwidth aggregates in the network},
  journal   = {Computer Communication Review},
  volume    = {32},
  number    = {3},
  pages     = {62--73},
  year      = {2002},
  url       = {https://doi.org/10.1145/571697.571724},
  doi       = {10.1145/571697.571724},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/MahajanBFIPS02a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KohlerLPS02,
  author    = {Eddie Kohler and
               Jinyang Li and
               Vern Paxson and
               Scott Shenker},
  title     = {Observed structure of addresses in {IP} traffic},
  booktitle = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop,
               {IMW} 2002, Marseille, France, November 6-8, 2002},
  pages     = {253--266},
  year      = {2002},
  crossref  = {DBLP:conf/imc/2002},
  url       = {https://doi.org/10.1145/637201.637242},
  doi       = {10.1145/637201.637242},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KohlerLPS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DonohoFSPCS02,
  author    = {David L. Donoho and
               Ana Georgina Flesia and
               Umesh Shankar and
               Vern Paxson and
               Jason Coit and
               Stuart Staniford},
  title     = {Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive
               Streams by Exploiting Maximum Tolerable Delay},
  booktitle = {{RAID}},
  pages     = {17--35},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36084-0\_2},
  doi       = {10.1007/3-540-36084-0\_2},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/DonohoFSPCS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ZhangBPS02,
  author    = {Yin Zhang and
               Lee Breslau and
               Vern Paxson and
               Scott Shenker},
  title     = {On the characteristics and origins of internet flow rates},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               August 19-23, 2002, Pittsburgh, PA, {USA}},
  pages     = {309--322},
  year      = {2002},
  crossref  = {DBLP:conf/sigcomm/2002},
  url       = {https://doi.org/10.1145/633025.633055},
  doi       = {10.1145/633025.633055},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/ZhangBPS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StanifordPW02,
  author    = {Stuart Staniford and
               Vern Paxson and
               Nicholas Weaver},
  title     = {How to Own the Internet in Your Spare Time},
  booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
               CA, USA, August 5-9, 2002},
  pages     = {149--167},
  year      = {2002},
  crossref  = {DBLP:conf/uss/2002},
  url       = {http://www.usenix.org/publications/library/proceedings/sec02/staniford.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/StanifordPW02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2002,
  editor    = {Matthew Mathis and
               Peter Steenkiste and
               Hari Balakrishnan and
               Vern Paxson},
  title     = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               August 19-23, 2002, Pittsburgh, PA, {USA}},
  publisher = {{ACM}},
  year      = {2002},
  url       = {https://doi.org/10.1145/633025},
  doi       = {10.1145/633025},
  isbn      = {1-58113-570-X},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/AllmanP01,
  author    = {Mark Allman and
               Vern Paxson},
  title     = {On estimating end-to-end network path properties},
  journal   = {Computer Communication Review},
  volume    = {31},
  number    = {2-Supplement},
  pages     = {124--151},
  year      = {2001},
  url       = {http://doi.acm.org/10.1145/844203},
  doi       = {10.1145/844203},
  timestamp = {Mon, 21 Dec 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/AllmanP01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Paxson01,
  author    = {Vern Paxson},
  title     = {An analysis of using reflectors for distributed denial-of-service
               attacks},
  journal   = {Computer Communication Review},
  volume    = {31},
  number    = {3},
  pages     = {38--47},
  year      = {2001},
  url       = {https://doi.org/10.1145/505659.505664},
  doi       = {10.1145/505659.505664},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/Paxson01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/X01c,
  author    = {Sally Floyd and
               Vern Paxson},
  title     = {Difficulties in simulating the internet},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {9},
  number    = {4},
  pages     = {392--403},
  year      = {2001},
  url       = {https://doi.org/10.1109/90.944338},
  doi       = {10.1109/90.944338},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/X01c},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DuffieldPPT01,
  author    = {Nick G. Duffield and
               Francesco Lo Presti and
               Vern Paxson and
               Donald F. Towsley},
  title     = {Inferring Link Loss Using Striped Unicast Probes},
  booktitle = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications,
               Twentieth Annual Joint Conference of the {IEEE} Computer and Communications
               Societies, Twenty years into the communications odyssey, Anchorage,
               Alaska, USA, April 22-26, 2001},
  pages     = {915--923},
  year      = {2001},
  crossref  = {DBLP:conf/infocom/2001},
  url       = {https://doi.org/10.1109/INFCOM.2001.916283},
  doi       = {10.1109/INFCOM.2001.916283},
  timestamp = {Sun, 24 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/DuffieldPPT01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HandleyPK01,
  author    = {Mark Handley and
               Vern Paxson and
               Christian Kreibich},
  title     = {Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End
               Protocol Semantics},
  booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
               D.C., {USA}},
  year      = {2001},
  crossref  = {DBLP:conf/uss/2001},
  url       = {http://www.usenix.org/publications/library/proceedings/sec01/handley.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/HandleyPK01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imw/2001,
  editor    = {Vern Paxson},
  title     = {Proceedings of the 1st {ACM} {SIGCOMM} Internet Measurement Workshop,
               {IMW} 2001, San Francisco, California, USA, November 1-2, 2001},
  publisher = {{ACM}},
  year      = {2001},
  isbn      = {1-58113-435-5},
  timestamp = {Wed, 13 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imw/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangP00,
  author    = {Yin Zhang and
               Vern Paxson},
  title     = {Detecting Backdoors},
  booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
               2000},
  year      = {2000},
  crossref  = {DBLP:conf/uss/2000},
  url       = {https://www.usenix.org/conference/9th-usenix-security-symposium/detecting-backdoors},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/ZhangP00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangP00a,
  author    = {Yin Zhang and
               Vern Paxson},
  title     = {Detecting Stepping Stones},
  booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
               2000},
  year      = {2000},
  crossref  = {DBLP:conf/uss/2000},
  url       = {https://www.usenix.org/conference/9th-usenix-security-symposium/detecting-stepping-stones},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/ZhangP00a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2780,
  author    = {Scott O. Bradner and
               Vern Paxson},
  title     = {{IANA} Allocation Guidelines For Values In the Internet Protocol and
               Related Headers},
  journal   = {{RFC}},
  volume    = {2780},
  pages     = {1--10},
  year      = {2000},
  url       = {https://doi.org/10.17487/RFC2780},
  doi       = {10.17487/RFC2780},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2780},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2873,
  author    = {Xipeng Xiao and
               Alan Hannan and
               Vern Paxson and
               Edward Crabbe},
  title     = {{TCP} Processing of the IPv4 Precedence Field},
  journal   = {{RFC}},
  volume    = {2873},
  pages     = {1--8},
  year      = {2000},
  url       = {https://doi.org/10.17487/RFC2873},
  doi       = {10.17487/RFC2873},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2873},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2960,
  author    = {Randall R. Stewart and
               Qiaobing Xie and
               Ken Morneault and
               Chip Sharp and
               Hanns Juergen Schwarzbauer and
               Tom Taylor and
               Ian Rytina and
               Malleswar Kalla and
               Lixia Zhang and
               Vern Paxson},
  title     = {Stream Control Transmission Protocol},
  journal   = {{RFC}},
  volume    = {2960},
  pages     = {1--134},
  year      = {2000},
  url       = {https://doi.org/10.17487/RFC2960},
  doi       = {10.17487/RFC2960},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2960},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2988,
  author    = {Vern Paxson and
               Mark Allman},
  title     = {Computing TCP's Retransmission Timer},
  journal   = {{RFC}},
  volume    = {2988},
  pages     = {1--8},
  year      = {2000},
  url       = {https://doi.org/10.17487/RFC2988},
  doi       = {10.17487/RFC2988},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2988},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Paxson99,
  author    = {Vern Paxson},
  title     = {Bro: a system for detecting network intruders in real-time},
  journal   = {Computer Networks},
  volume    = {31},
  number    = {23-24},
  pages     = {2435--2463},
  year      = {1999},
  url       = {https://doi.org/10.1016/S1389-1286(99)00112-7},
  doi       = {10.1016/S1389-1286(99)00112-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/Paxson99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/Paxson99,
  author    = {Vern Paxson},
  title     = {End-to-end internet packet dynamics},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {7},
  number    = {3},
  pages     = {277--292},
  year      = {1999},
  url       = {https://doi.org/10.1109/90.779192},
  doi       = {10.1109/90.779192},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/Paxson99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/FrancisJPZGJ99,
  author    = {Paul Francis and
               Sugih Jamin and
               Vern Paxson and
               Lixia Zhang and
               Daniel F. Gryniewicz and
               Yixin Jin},
  title     = {An Architecture for a Global Internet Host Distance Estimation Service},
  booktitle = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications,
               Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications
               Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999},
  pages     = {210--217},
  year      = {1999},
  crossref  = {DBLP:conf/infocom/1999},
  url       = {https://doi.org/10.1109/INFCOM.1999.749285},
  doi       = {10.1109/INFCOM.1999.749285},
  timestamp = {Sun, 24 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/FrancisJPZGJ99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Paxson99,
  author    = {Vern Paxson},
  title     = {Defending against network {IDS} evasion},
  booktitle = {Recent Advances in Intrusion Detection},
  year      = {1999},
  url       = {http://www.raid-symposium.org/raid99/PAPERS/Paxson.pdf},
  timestamp = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/raid/Paxson99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/AllmanP99,
  author    = {Mark Allman and
               Vern Paxson},
  title     = {On Estimating End-to-End Network Path Properties},
  booktitle = {{SIGCOMM}},
  pages     = {263--274},
  year      = {1999},
  url       = {https://doi.org/10.1145/316188.316230},
  doi       = {10.1145/316188.316230},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/AllmanP99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2498,
  author    = {Jamshid Mahdavi and
               Vern Paxson},
  title     = {{IPPM} Metrics for Measuring Connectivity},
  journal   = {{RFC}},
  volume    = {2498},
  pages     = {1--10},
  year      = {1999},
  url       = {https://doi.org/10.17487/RFC2498},
  doi       = {10.17487/RFC2498},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2498},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2525,
  author    = {Vern Paxson and
               Mark Allman and
               Scott Dawson and
               William C. Fenner and
               Jim Griner and
               Ian Heavens and
               Kevin Lahey and
               Jeffrey Semke and
               Bernie Volz},
  title     = {Known {TCP} Implementation Problems},
  journal   = {{RFC}},
  volume    = {2525},
  pages     = {1--61},
  year      = {1999},
  url       = {https://doi.org/10.17487/RFC2525},
  doi       = {10.17487/RFC2525},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2525},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2581,
  author    = {Mark Allman and
               Vern Paxson and
               W. Richard Stevens},
  title     = {{TCP} Congestion Control},
  journal   = {{RFC}},
  volume    = {2581},
  pages     = {1--14},
  year      = {1999},
  url       = {https://doi.org/10.17487/RFC2581},
  doi       = {10.17487/RFC2581},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2581},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2678,
  author    = {Jamshid Mahdavi and
               Vern Paxson},
  title     = {{IPPM} Metrics for Measuring Connectivity},
  journal   = {{RFC}},
  volume    = {2678},
  pages     = {1--10},
  year      = {1999},
  url       = {https://doi.org/10.17487/RFC2678},
  doi       = {10.17487/RFC2678},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2678},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/Paxson98,
  author    = {Vern Paxson},
  title     = {On Calibrating Measurements of Packet Transit Times},
  booktitle = {Proceedings of the 1998 {ACM} {SIGMETRICS} joint international conference
               on Measurement and modeling of computer systems, {SIGMETRICS} '98
               / {PERFORMANCE} '98, Madison, Wisconsin, USA, June 22-26, 1998},
  pages     = {11--21},
  year      = {1998},
  crossref  = {DBLP:conf/sigmetrics/1998},
  url       = {https://doi.org/10.1145/277851.277865},
  doi       = {10.1145/277851.277865},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/Paxson98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Paxson98,
  author    = {Vern Paxson},
  title     = {Bro: {A} System for Detecting Network Intruders in Real-Time},
  booktitle = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX,
               USA, January 26-29, 1998},
  year      = {1998},
  crossref  = {DBLP:conf/uss/1998},
  url       = {https://www.usenix.org/conference/7th-usenix-security-symposium/bro-system-detecting-network-intruders-real-time},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/Paxson98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-NI-9809030,
  author    = {Vern Paxson},
  title     = {Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating
               Self-Similar Network Traffic},
  journal   = {CoRR},
  volume    = {cs.NI/9809030},
  year      = {1998},
  url       = {http://arxiv.org/abs/cs.NI/9809030},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/cs-NI-9809030},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2330,
  author    = {Vern Paxson and
               Guy Almes and
               Jamshid Mahdavi and
               Matt Mathis},
  title     = {Framework for {IP} Performance Metrics},
  journal   = {{RFC}},
  volume    = {2330},
  pages     = {1--40},
  year      = {1998},
  url       = {https://doi.org/10.17487/RFC2330},
  doi       = {10.17487/RFC2330},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2330},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2357,
  author    = {Allison Mankin and
               Allyn Romanow and
               Scott O. Bradner and
               Vern Paxson},
  title     = {{IETF} Criteria for Evaluating Reliable Multicast Transport and Application
               Protocols},
  journal   = {{RFC}},
  volume    = {2357},
  pages     = {1--11},
  year      = {1998},
  url       = {https://doi.org/10.17487/RFC2357},
  doi       = {10.17487/RFC2357},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc2357},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Paxson97,
  author    = {Vern Paxson},
  title     = {Fast, approximate synthesis of fractional Gaussian noise for generating
               self-similar network traffic},
  journal   = {Computer Communication Review},
  volume    = {27},
  number    = {5},
  pages     = {5--18},
  year      = {1997},
  url       = {https://doi.org/10.1145/269790.269792},
  doi       = {10.1145/269790.269792},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/Paxson97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/Paxson97,
  author    = {Vern Paxson},
  title     = {End-to-end routing behavior in the Internet},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {5},
  number    = {5},
  pages     = {601--615},
  year      = {1997},
  url       = {https://doi.org/10.1109/90.649563},
  doi       = {10.1109/90.649563},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/Paxson97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Paxson97,
  author    = {Vern Paxson},
  title     = {End-to-end Internet Packet Dynamics},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 1997 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               September 14-18, 1997, Cannes, France.},
  pages     = {139--152},
  year      = {1997},
  crossref  = {DBLP:conf/sigcomm/1997},
  url       = {https://doi.org/10.1145/263105.263155},
  doi       = {10.1145/263105.263155},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/Paxson97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Paxson97a,
  author    = {Vern Paxson},
  title     = {Automated Packet Trace Analysis of {TCP} Implementations},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 1997 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               September 14-18, 1997, Cannes, France.},
  pages     = {167--179},
  year      = {1997},
  crossref  = {DBLP:conf/sigcomm/1997},
  url       = {https://doi.org/10.1145/263105.263160},
  doi       = {10.1145/263105.263160},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/Paxson97a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/PaxsonF97,
  author    = {Vern Paxson and
               Sally Floyd},
  title     = {Why We Don't Know How To Simulate the Internet},
  booktitle = {Proceedings of the 29th conference on Winter simulation, {WSC} 1997,
               Atlanta, GA, USA, December 7-10, 1997},
  pages     = {1037--1044},
  year      = {1997},
  crossref  = {DBLP:conf/wsc/1997},
  url       = {http://doi.ieeecomputersociety.org/10.1109/WSC.1997.640988},
  doi       = {10.1109/WSC.1997.640988},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wsc/PaxsonF97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Paxson96,
  author    = {Vern Paxson},
  title     = {End-to-end Routing Behavior in the Internet},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 1996 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               Stanford, CA, USA, August 26-30, 1996},
  pages     = {25--38},
  year      = {1996},
  crossref  = {DBLP:conf/sigcomm/1996},
  url       = {https://doi.org/10.1145/248156.248160},
  doi       = {10.1145/248156.248160},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/Paxson96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/PaxsonF95,
  author    = {Vern Paxson and
               Sally Floyd},
  title     = {Wide area traffic: the failure of Poisson modeling},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {3},
  number    = {3},
  pages     = {226--244},
  year      = {1995},
  url       = {https://doi.org/10.1109/90.392383},
  doi       = {10.1109/90.392383},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/PaxsonF95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/WilliamsonWPM95,
  author    = {Carey L. Williamson and
               Walter Willinger and
               Vern Paxson and
               Benjamin Melamed},
  title     = {Network Traffic Measurement and Modelling (Panel)},
  booktitle = {Proceedings of the 1995 {ACM} {SIGMETRICS} joint international conference
               on Measurement and modeling of computer systems, Ottawa, Canada, May
               15-19, 1995},
  pages     = {56--57},
  year      = {1995},
  crossref  = {DBLP:conf/sigmetrics/1995},
  url       = {https://doi.org/10.1145/223587.223593},
  doi       = {10.1145/223587.223593},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/WilliamsonWPM95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/Paxson94,
  author    = {Vern Paxson},
  title     = {Empirically derived analytic models of wide-area {TCP} connections},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {2},
  number    = {4},
  pages     = {316--336},
  year      = {1994},
  url       = {https://doi.org/10.1109/90.330413},
  doi       = {10.1109/90.330413},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/Paxson94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/PaxsonF94,
  author    = {Vern Paxson and
               Sally Floyd},
  title     = {Wide-Area Traffic: The Failure of Poisson Modeling},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} '94 Conference on Communications
               Architectures, Protocols and Applications, London, UK, August 31 -
               September 2, 1994},
  pages     = {257--268},
  year      = {1994},
  crossref  = {DBLP:conf/sigcomm/1994},
  url       = {https://doi.org/10.1145/190314.190338},
  doi       = {10.1145/190314.190338},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/PaxsonF94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/PaxsonS93,
  author    = {Vern Paxson and
               Chris Saltmarsh},
  title     = {Glish: {A} User-Level Software Bus for Loosely-Coupled Distributed
               Systems},
  booktitle = {Proceedings of the Usenix Winter 1993 Technical Conference, San Diego,
               California, USA, January 1993},
  pages     = {141--156},
  year      = {1993},
  crossref  = {DBLP:conf/usenix/1993wi},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/PaxsonS93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/anrw/2018,
  title     = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018,
               Montreal, QC, Canada, July 16-16, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3232755},
  timestamp = {Thu, 09 Aug 2018 09:11:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/anrw/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2018,
  editor    = {William Enck and
               Adrienne Porter Felt},
  title     = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018},
  publisher = {{USENIX} Association},
  year      = {2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18},
  timestamp = {Mon, 20 Aug 2018 15:16:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2018foci,
  editor    = {Lex Gill and
               Rob Jansen},
  title     = {8th {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} 2018, Baltimore, MD, USA, August 14, 2018},
  publisher = {{USENIX} Association},
  year      = {2018},
  url       = {https://www.usenix.org/conference/foci18},
  timestamp = {Mon, 20 Aug 2018 14:04:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2018foci},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/emnlp/2017,
  editor    = {Martha Palmer and
               Rebecca Hwa and
               Sebastian Riedel},
  title     = {Proceedings of the 2017 Conference on Empirical Methods in Natural
               Language Processing, {EMNLP} 2017, Copenhagen, Denmark, September
               9-11, 2017},
  publisher = {Association for Computational Linguistics},
  year      = {2017},
  url       = {https://aclanthology.info/volumes/proceedings-of-the-2017-conference-on-empirical-methods-in-natural-language-processing},
  isbn      = {978-1-945626-83-8},
  timestamp = {Tue, 30 Jan 2018 13:42:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/emnlp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2017,
  editor    = {Steve Uhlig and
               Olaf Maennel},
  title     = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
               London, United Kingdom, November 1-3, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3131365},
  isbn      = {978-1-4503-5118-8},
  timestamp = {Tue, 14 Nov 2017 10:24:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2017,
  title     = {24th Annual Network and Distributed System Security Symposium, {NDSS}
               2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher = {The Internet Society},
  year      = {2017},
  url       = {https://www.ndss-symposium.org/ndss2017/},
  timestamp = {Tue, 16 Jan 2018 15:43:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017,
  title     = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7957740},
  isbn      = {978-1-5090-5533-3},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2017,
  editor    = {Engin Kirda and
               Thomas Ristenpart},
  title     = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17},
  timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2017,
  editor    = {Rick Barrett and
               Rick Cummings and
               Eugene Agichtein and
               Evgeniy Gabrilovich},
  title     = {Proceedings of the 26th International Conference on World Wide Web,
               {WWW} 2017, Perth, Australia, April 3-7, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3038912},
  doi       = {10.1145/3038912},
  isbn      = {978-1-4503-4913-0},
  timestamp = {Tue, 06 Nov 2018 16:57:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/www/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2016,
  title     = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
               ON, Canada, June 1-3, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7486625},
  isbn      = {978-1-5090-2922-8},
  timestamp = {Tue, 14 Jun 2016 15:34:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecrime/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2016,
  editor    = {Phillipa Gill and
               John S. Heidemann and
               John W. Byers and
               Ramesh Govindan},
  title     = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
               {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2987443},
  doi       = {10.1145/2987443},
  isbn      = {978-1-4503-4526-2},
  timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2016,
  title     = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
               2016, San Diego, California, USA, February 21-24, 2016},
  publisher = {The Internet Society},
  year      = {2016},
  url       = {https://www.ndss-symposium.org/ndss2016/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2016,
  editor    = {Katerina J. Argyraki and
               Rebecca Isaacs},
  title     = {13th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/nsdi16},
  isbn      = {978-1-931971-29-4},
  timestamp = {Tue, 28 Mar 2017 14:03:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2016,
  editor    = {Thomas Karagiannis and
               Xenofontas A. Dimitropoulos},
  title     = {Passive and Active Measurement - 17th International Conference, {PAM}
               2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9631},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30505-9},
  doi       = {10.1007/978-3-319-30505-9},
  isbn      = {978-3-319-30504-2},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2016,
  title     = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
               USA, May 22-26, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7528194},
  isbn      = {978-1-5090-0824-7},
  timestamp = {Tue, 20 Sep 2016 12:04:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor    = {Thorsten Holz and
               Stefan Savage},
  title     = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2016,
  editor    = {Jacqueline Bourdeau and
               Jim Hendler and
               Roger Nkambou and
               Ian Horrocks and
               Ben Y. Zhao},
  title     = {Proceedings of the 25th International Conference on World Wide Web,
               {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2872427},
  isbn      = {978-1-4503-4143-1},
  timestamp = {Sun, 10 Apr 2016 10:51:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015ccsw,
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren and
               Florian Kerschbaum and
               Cristina Nita{-}Rotaru},
  title     = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
               Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808425},
  doi       = {10.1145/2808425},
  isbn      = {978-1-4503-3825-7},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2015,
  title     = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7336674},
  isbn      = {978-1-4673-7876-5},
  timestamp = {Fri, 11 Dec 2015 15:42:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2015,
  editor    = {Kenjiro Cho and
               Kensuke Fukuda and
               Vivek S. Pai and
               Neil Spring},
  title     = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
               2015, Tokyo, Japan, October 28-30, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2815675},
  isbn      = {978-1-4503-3848-6},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2015,
  title     = {10th International Conference on Malicious and Unwanted Software,
               {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7405773},
  isbn      = {978-1-5090-0317-4},
  timestamp = {Fri, 23 Dec 2016 12:48:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/malware/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2015,
  editor    = {Gaetano Borriello and
               Giovanni Pau and
               Marco Gruteser and
               Jason I. Hong},
  title     = {Proceedings of the 13th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys 2015, Florence, Italy,
               May 19-22, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2742647},
  isbn      = {978-1-4503-3494-5},
  timestamp = {Thu, 22 Jun 2017 16:10:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2015nsethics,
  editor    = {Ben Zevenbergen},
  title     = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Ethics in Networked
               Systems Research, {NS} Ethics@SIGCOMM 2015, London, United Kingdom,
               August 21, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2793013},
  doi       = {10.1145/2793013},
  isbn      = {978-1-4503-3541-6},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2015nsethics},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2015hotmiddlebox,
  editor    = {Theophilus Benson and
               Costin Raiciu},
  title     = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Hot Topics in
               Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM
               2015, London, United Kingdom, August 21, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2785989},
  doi       = {10.1145/2785989},
  isbn      = {978-1-4503-3540-9},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2015hotmiddlebox},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2015,
  title     = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7160813},
  isbn      = {978-1-4673-6949-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor    = {Gail{-}Joon Ahn and
               Moti Yung and
               Ninghui Li},
  title     = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn      = {978-1-4503-2957-6},
  timestamp = {Mon, 10 Nov 2014 10:57:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/conext/2014,
  editor    = {Aruna Seneviratne and
               Christophe Diot and
               Jim Kurose and
               Augustin Chaintreau and
               Luigi Rizzo},
  title     = {Proceedings of the 10th {ACM} International on Conference on emerging
               Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia,
               December 2-5, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2674005},
  isbn      = {978-1-4503-3279-8},
  timestamp = {Sat, 03 Jan 2015 15:23:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2014,
  editor    = {Carey Williamson and
               Aditya Akella and
               Nina Taft},
  title     = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
               Vancouver, BC, Canada, November 5-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2663716},
  isbn      = {978-1-4503-3213-2},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2014,
  editor    = {Michalis Faloutsos and
               Aleksandar Kuzmanovic},
  title     = {Passive and Active Measurement - 15th International Conference, {PAM}
               2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8362},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-04918-2},
  doi       = {10.1007/978-3-319-04918-2},
  isbn      = {978-3-319-04917-5},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2014,
  editor    = {Fabi{\'{a}}n E. Bustamante and
               Y. Charlie Hu and
               Arvind Krishnamurthy and
               Sylvia Ratnasamy},
  title     = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
               17-22, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2619239},
  isbn      = {978-1-4503-2836-4},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014,
  editor    = {Kevin Fu and
               Jaeyeon Jung},
  title     = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2013,
  editor    = {Konstantina Papagiannaki and
               P. Krishna Gummadi and
               Craig Partridge},
  title     = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
               Barcelona, Spain, October 23-25, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2504730},
  isbn      = {978-1-4503-1953-9},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2013foci,
  editor    = {Jedidiah R. Crandall and
               Joss Wright},
  title     = {3rd {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '13, Washington, D.C., USA, August 13, 2013},
  publisher = {{USENIX} Association},
  year      = {2013},
  url       = {https://www.usenix.org/conference/foci13},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2013foci},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2013,
  editor    = {Samuel T. King},
  title     = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
               USA, August 14-16, 2013},
  publisher = {{USENIX} Association},
  year      = {2013},
  url       = {https://www.usenix.org/conference/usenixsecurity13},
  isbn      = {978-1-931971-03-4},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2012,
  editor    = {John W. Byers and
               Jim Kurose and
               Ratul Mahajan and
               Alex C. Snoeren},
  title     = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2398776},
  isbn      = {978-1-4503-1705-4},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2012,
  editor    = {Engin Kirda},
  title     = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  url       = {https://www.usenix.org/conference/leet12},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2012,
  editor    = {Nina Taft and
               Fabio Ricciato},
  title     = {Passive and Active Measurement - 13th International Conference, {PAM}
               2012, Vienna, Austria, March 12-14th, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7192},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28537-0},
  doi       = {10.1007/978-3-642-28537-0},
  isbn      = {978-3-642-28536-3},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2012,
  title     = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
               San Francisco, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6233637},
  isbn      = {978-0-7695-4681-0},
  timestamp = {Thu, 08 Jan 2015 16:59:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/usenix/2012,
  editor    = {Gernot Heiser and
               Wilson C. Hsieh},
  title     = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15,
               2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  url       = {https://www.usenix.org/conference/atc12},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2011,
  editor    = {Thorsten Holz and
               Herbert Bos},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
               July 7-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6739},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22424-9},
  doi       = {10.1007/978-3-642-22424-9},
  isbn      = {978-3-642-22423-2},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2011,
  editor    = {Patrick Thiran and
               Walter Willinger},
  title     = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '11, Berlin, Germany, November 2-, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2068816},
  isbn      = {978-1-4503-1013-0},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2011,
  editor    = {Neil Spring and
               George F. Riley},
  title     = {Passive and Active Measurement - 12th International Conference, {PAM}
               2011, Atlanta, GA, USA, March 20-22, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6579},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19260-9},
  doi       = {10.1007/978-3-642-19260-9},
  isbn      = {978-3-642-19259-3},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2011wmust,
  editor    = {Nina Taft and
               David Wetherall},
  title     = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements
               up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August
               19, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2018602},
  doi       = {10.1145/2018602},
  isbn      = {978-1-4503-0800-7},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2011wmust},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2011,
  title     = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5955408},
  isbn      = {978-1-4577-0147-4},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011,
  title     = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2011},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011foci,
  editor    = {Nick Feamster and
               Wenke Lee},
  title     = {{USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '11, San Francisco, CA, USA, August 8, 2011},
  publisher = {{USENIX} Association},
  year      = {2011},
  url       = {https://www.usenix.org/conference/foci11},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2011foci},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2010,
  editor    = {Geoffrey G. Xie and
               Robert Beverly and
               Robert Tappan Morris and
               Bruce Davie},
  title     = {Proceedings of the 9th {ACM} Workshop on Hot Topics in Networks. HotNets
               2010, Monterey, CA, {USA} - October 20 - 21, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0409-2},
  timestamp = {Tue, 24 Oct 2017 18:34:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2010,
  editor    = {Mark Allman},
  title     = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0483-2},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2010,
  editor    = {Michael Bailey},
  title     = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/conference/leet10},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2010,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  publisher = {The Internet Society},
  year      = {2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/},
  timestamp = {Wed, 31 Aug 2011 13:59:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2010inm-wren,
  editor    = {Aditya Akella and
               Nick Feamster and
               Sanjay G. Rao},
  title     = {2010 Internet Network Management Workshop / Workshop on Research on
               Enterprise Networking, San Jose, CA, USA, April, 2010},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/conference/inmwren10},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2010inm-wren},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2010,
  editor    = {Arvind Krishnamurthy and
               Bernhard Plattner},
  title     = {Passive and Active Measurement, 11th International Conference, {PAM}
               2010, Zurich, Switzerland, April 7-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6032},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12334-4},
  doi       = {10.1007/978-3-642-12334-4},
  isbn      = {978-3-642-12333-7},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2010,
  title     = {31st {IEEE} Symposium on Security and Privacy, S{\&}P 2010, 16-19
               May 2010, Berleley/Oakland, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5504620},
  isbn      = {978-0-7695-4035-1},
  timestamp = {Thu, 08 Jan 2015 16:59:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/46,
  editor    = {Sushil Jajodia and
               Peng Liu and
               Vipin Swarup and
               Cliff Wang},
  title     = {Cyber Situational Awareness - Issues and Research},
  series    = {Advances in Information Security},
  volume    = {46},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-1-4419-0140-8},
  doi       = {10.1007/978-1-4419-0140-8},
  isbn      = {978-1-4419-0139-2},
  timestamp = {Tue, 16 May 2017 14:24:25 +0200},
  biburl    = {https://dblp.org/rec/bib/series/ais/46},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009asia,
  editor    = {Wanqing Li and
               Willy Susilo and
               Udaya Kiran Tupakula and
               Reihaneh Safavi{-}Naini and
               Vijay Varadharajan},
  title     = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2009, Sydney, Australia, March
               10-12, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-394-5},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2009,
  editor    = {Lakshminarayanan Subramanian and
               Will E. Leland and
               Ratul Mahajan},
  title     = {Eight {ACM} Workshop on Hot Topics in Networks (HotNets-VIII), {HOTNETS}
               '09, New York City, NY, USA, October 22-23, 2009},
  publisher = {{ACM} {SIGCOMM}},
  year      = {2009},
  timestamp = {Fri, 16 Nov 2012 10:09:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2009,
  editor    = {Anja Feldmann and
               Laurent Mathy},
  title     = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-771-4},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2009,
  editor    = {Wenke Lee},
  title     = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '09, Boston, MA, USA, April 21, 2009},
  publisher = {{USENIX} Association},
  year      = {2009},
  url       = {https://www.usenix.org/conference/leet09},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2009,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
               2009},
  publisher = {The Internet Society},
  year      = {2009},
  url       = {https://www.ndss-symposium.org/ndss2009/},
  timestamp = {Tue, 19 Mar 2019 14:56:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-810-7},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2008,
  editor    = {Diego Zamboni},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5137},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70542-0},
  doi       = {10.1007/978-3-540-70542-0},
  isbn      = {978-3-540-70541-3},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2008leet,
  editor    = {Fabian Monrose},
  title     = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2008},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2008leet},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2008,
  editor    = {Mark Claypool and
               Steve Uhlig},
  title     = {Passive and Active Network Measurement, 9th International Conference,
               {PAM} 2008, Cleveland, OH, USA, April 29-30, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4979},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79232-1},
  doi       = {10.1007/978-3-540-79232-1},
  isbn      = {978-3-540-79231-4},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2008,
  editor    = {Richard Lippmann and
               Engin Kirda and
               Ari Trachtenberg},
  title     = {Recent Advances in Intrusion Detection, 11th International Symposium,
               {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5230},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-87403-4},
  doi       = {10.1007/978-3-540-87403-4},
  isbn      = {978-3-540-87402-7},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2008,
  editor    = {Victor Bahl and
               David Wetherall and
               Stefan Savage and
               Ion Stoica},
  title     = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communications,
               Seattle, WA, USA, August 17-22, 2008},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1402958},
  doi       = {10.1145/1402958},
  isbn      = {978-1-60558-175-0},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmetrics/2008,
  editor    = {Zhen Liu and
               Vishal Misra and
               Prashant J. Shenoy},
  title     = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference
               on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008,
               Annapolis, MD, USA, June 2-6, 2008},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1375457},
  doi       = {10.1145/1375457},
  isbn      = {978-1-60558-005-0},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2008,
  title     = {2008 {IEEE} Symposium on Security and Privacy (S{\&}P 2008), 18-21
               May 2008, Oakland, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4531131},
  isbn      = {978-0-7695-3168-7},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2008hotsec,
  editor    = {Niels Provos},
  title     = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
               CA, USA, July 29, 2008, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2008},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2008hotsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007,
  editor    = {Peng Ning and
               Sabrina De Capitani di Vimercati and
               Paul F. Syverson},
  title     = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-703-2},
  timestamp = {Fri, 22 Feb 2008 08:21:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2007,
  editor    = {Bernhard M. H{\"{a}}mmerli and
               Robin Sommer},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
               July 12-13, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4579},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73614-1},
  doi       = {10.1007/978-3-540-73614-1},
  isbn      = {978-3-540-73613-4},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fpga/2007,
  editor    = {Andr{\'{e}} DeHon and
               Mike Hutton},
  title     = {Proceedings of the {ACM/SIGDA} 15th International Symposium on Field
               Programmable Gate Arrays, {FPGA} 2007, Monterey, California, USA,
               February 18-20, 2007},
  publisher = {{ACM}},
  year      = {2007},
  url       = {https://doi.org/10.1145/1216919},
  doi       = {10.1145/1216919},
  isbn      = {978-1-59593-600-4},
  timestamp = {Tue, 06 Nov 2018 16:58:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fpga/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2007,
  editor    = {Constantine Dovrolis and
               Vern Paxson and
               Stefan Savage},
  title     = {6th {ACM} Workshop on Hot Topics in Networks - HotNets-VI, Atlanta,
               Georgia, USA, November 14-15, 2007},
  publisher = {{ACM} {SIGCOMM}},
  year      = {2007},
  timestamp = {Mon, 05 May 2014 08:06:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2007,
  editor    = {Constantine Dovrolis and
               Matthew Roughan},
  title     = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2007, San Diego, California, USA, October 24-26, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-908-1},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2007,
  editor    = {Christopher Kr{\"{u}}gel and
               Richard Lippmann and
               Andrew J. Clark},
  title     = {Recent Advances in Intrusion Detection, 10th International Symposium,
               {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4637},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74320-0},
  doi       = {10.1007/978-3-540-74320-0},
  isbn      = {978-3-540-74319-4},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2007hotsec,
  title     = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
               MA, USA, August 7, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/conference/hotsec07},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2007hotsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/27,
  editor    = {Mihai Christodorescu and
               Somesh Jha and
               Douglas Maughan and
               Dawn Song and
               Cliff Wang},
  title     = {Malware Detection},
  series    = {Advances in Information Security},
  volume    = {27},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-0-387-44599-1},
  doi       = {10.1007/978-0-387-44599-1},
  isbn      = {978-0-387-32720-4},
  timestamp = {Tue, 16 May 2017 14:24:25 +0200},
  biburl    = {https://dblp.org/rec/bib/series/ais/27},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2006,
  editor    = {Eddie Kohler and
               Greg Minshall},
  title     = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
               California, USA, November 29-30, 2006},
  publisher = {{ACM} {SIGCOMM}},
  year      = {2006},
  timestamp = {Mon, 21 Aug 2017 14:31:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2006,
  editor    = {Jussara M. Almeida and
               Virg{\'{\i}}lio A. F. Almeida and
               Paul Barford},
  title     = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-561-4},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2006,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2006, San Diego, California, {USA}},
  publisher = {The Internet Society},
  year      = {2006},
  isbn      = {1-891562-22-3},
  timestamp = {Fri, 17 Mar 2006 08:31:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2006,
  editor    = {Diego Zamboni and
               Christopher Kr{\"{u}}gel},
  title     = {Recent Advances in Intrusion Detection, 9th International Symposium,
               {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4219},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11856214},
  doi       = {10.1007/11856214},
  isbn      = {3-540-39723-X},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2006,
  title     = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4198788},
  isbn      = {1-4244-0423-1},
  timestamp = {Thu, 21 Jun 2018 08:02:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2006hotsec,
  title     = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver,
               BC, Canada, July 31, 2006},
  publisher = {{USENIX} Association},
  year      = {2006},
  url       = {https://www.usenix.org/conference/hotsec06},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2006hotsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2005,
  title     = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
               5-9 December 2005, Tucson, AZ, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10467},
  isbn      = {0-7695-2461-3},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2005,
  editor    = {Klaus Julisch and
               Christopher Kr{\"{u}}gel},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               Second International Conference, {DIMVA} 2005, Vienna, Austria, July
               7-8, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3548},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137798},
  doi       = {10.1007/b137798},
  isbn      = {3-540-26613-5},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2005,
  title     = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
               Berkeley, California, USA, October 19-21, 2005},
  publisher = {{USENIX} Association},
  year      = {2005},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2005,
  editor    = {Patrick D. McDaniel},
  title     = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
               USA, July 31 - August 5, 2005},
  publisher = {{USENIX} Association},
  year      = {2005},
  url       = {https://www.usenix.org/legacy/publications/library/proceedings/sec05/},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/worm/2005,
  editor    = {Vijay Atluri and
               Angelos D. Keromytis},
  title     = {Proceedings of the 2005 {ACM} Workshop on Rapid Malcode, {WORM} 2005,
               Fairfax, VA, USA, November 11, 2005},
  publisher = {{ACM} Press},
  year      = {2005},
  isbn      = {1-59593-229-1},
  timestamp = {Fri, 23 Feb 2007 12:22:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/worm/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004ccs,
  editor    = {Vijayalakshmi Atluri and
               Birgit Pfitzmann and
               Patrick D. McDaniel},
  title     = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-961-6},
  timestamp = {Thu, 17 Nov 2016 19:38:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2004ccs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hoti/2004,
  title     = {Proceedings of the 12th Annual {IEEE} Symposium on High Performance
               Interconnects, {HOTIC} 2004, August 22-24, 2004, Stanford, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9463},
  isbn      = {0-7803-8686-8},
  timestamp = {Tue, 02 Dec 2014 17:13:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hoti/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2004,
  editor    = {Alfio Lombardo and
               James F. Kurose},
  title     = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-821-0},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmetrics/2004,
  editor    = {Edward G. Coffman Jr. and
               Zhen Liu and
               Arif Merchant},
  title     = {Proceedings of the International Conference on Measurements and Modeling
               of Computer Systems, {SIGMETRICS} 2004, June 10-14, 2004, New York,
               NY, {USA}},
  publisher = {{ACM}},
  year      = {2004},
  url       = {https://doi.org/10.1145/1005686},
  doi       = {10.1145/1005686},
  isbn      = {1-58113-873-3},
  timestamp = {Tue, 06 Nov 2018 11:07:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2004,
  title     = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
               May 2004, Berkeley, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9120},
  isbn      = {0-7695-2136-3},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2004,
  editor    = {Matt Blaze},
  title     = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
               2004, San Diego, CA, {USA}},
  publisher = {{USENIX}},
  year      = {2004},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/worm/2004,
  editor    = {Vern Paxson},
  title     = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
               Washington, DC, USA, October 29, 2004},
  publisher = {{ACM} Press},
  year      = {2004},
  isbn      = {1-58113-970-5},
  timestamp = {Fri, 23 Feb 2007 12:25:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/worm/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003,
  editor    = {Sushil Jajodia and
               Vijayalakshmi Atluri and
               Trent Jaeger},
  title     = {Proceedings of the 10th {ACM} Conference on Computer and Communications
               Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  publisher = {{ACM}},
  year      = {2003},
  url       = {http://dl.acm.org/citation.cfm?id=948109},
  isbn      = {1-58113-738-9},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2003,
  editor    = {Anja Feldmann and
               Martina Zitterbart and
               Jon Crowcroft and
               David Wetherall},
  title     = {Proceedings of the {ACM} {SIGCOMM} 2003 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               August 25-29, 2003, Karlsruhe, Germany},
  publisher = {{ACM}},
  year      = {2003},
  url       = {https://doi.org/10.1145/863955},
  doi       = {10.1145/863955},
  isbn      = {1-58113-735-4},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2003,
  title     = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
               May 2003, Berkeley, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8543},
  isbn      = {0-7695-1940-7},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/worm/2003,
  editor    = {Stuart Staniford and
               Stefan Savage},
  title     = {Proceedings of the 2003 {ACM} Workshop on Rapid Malcode, {WORM} 2003,
               Washington, DC, USA, October 27, 2003},
  publisher = {{ACM} Press},
  year      = {2003},
  isbn      = {1-58113-785-0},
  timestamp = {Mon, 07 Apr 2008 09:16:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/worm/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2002,
  title     = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop,
               {IMW} 2002, Marseille, France, November 6-8, 2002},
  publisher = {{ACM}},
  year      = {2002},
  isbn      = {1-58113-603-X},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2002,
  editor    = {Matthew Mathis and
               Peter Steenkiste and
               Hari Balakrishnan and
               Vern Paxson},
  title     = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               August 19-23, 2002, Pittsburgh, PA, {USA}},
  publisher = {{ACM}},
  year      = {2002},
  url       = {https://doi.org/10.1145/633025},
  doi       = {10.1145/633025},
  isbn      = {1-58113-570-X},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2002,
  editor    = {Dan Boneh},
  title     = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
               CA, USA, August 5-9, 2002},
  publisher = {{USENIX}},
  year      = {2002},
  isbn      = {1-931971-00-5},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2001,
  title     = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications,
               Twentieth Annual Joint Conference of the {IEEE} Computer and Communications
               Societies, Twenty years into the communications odyssey, Anchorage,
               Alaska, USA, April 22-26, 2001},
  publisher = {{IEEE} Comptuer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7321},
  isbn      = {0-7803-7016-3},
  timestamp = {Thu, 21 Feb 2019 15:56:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2001,
  editor    = {Dan S. Wallach},
  title     = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
               D.C., {USA}},
  publisher = {{USENIX}},
  year      = {2001},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2000,
  editor    = {Steven M. Bellovin and
               Greg Rose},
  title     = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
               2000},
  publisher = {{USENIX} Association},
  year      = {2000},
  url       = {https://www.usenix.org/conference/9thusenixsecuritysymposium},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/1999,
  title     = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications,
               Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications
               Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6063},
  isbn      = {0-7803-5417-6},
  timestamp = {Thu, 21 Feb 2019 15:56:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmetrics/1998,
  editor    = {Mary K. Vernon and
               Garth Gibson and
               Guy Latouche and
               Scott T. Leutenegger},
  title     = {Proceedings of the 1998 {ACM} {SIGMETRICS} joint international conference
               on Measurement and modeling of computer systems, {SIGMETRICS} '98
               / {PERFORMANCE} '98, Madison, Wisconsin, USA, June 22-26, 1998},
  publisher = {{ACM}},
  year      = {1998},
  url       = {https://doi.org/10.1145/277851},
  doi       = {10.1145/277851},
  isbn      = {0-89791-982-3},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/1998,
  editor    = {Aviel D. Rubin},
  title     = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX,
               USA, January 26-29, 1998},
  publisher = {{USENIX} Association},
  year      = {1998},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/1997,
  editor    = {Christophe Diot and
               Christian Huitema and
               Scott Shenker and
               Martha Steenstrup},
  title     = {Proceedings of the {ACM} {SIGCOMM} 1997 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               September 14-18, 1997, Cannes, France},
  publisher = {{ACM}},
  year      = {1997},
  url       = {https://doi.org/10.1145/263105},
  doi       = {10.1145/263105},
  isbn      = {0-89791-905-X},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wsc/1997,
  editor    = {Sigr{\'{u}}n Andrad{\'{o}}ttir and
               Kevin J. Healy and
               David H. Withers and
               Barry L. Nelson},
  title     = {Proceedings of the 29th conference on Winter simulation, {WSC} 1997,
               Atlanta, GA, USA, December 7-10, 1997},
  publisher = {{ACM}},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5065},
  isbn      = {0-7803-4278-X},
  timestamp = {Wed, 03 Jun 2015 17:42:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wsc/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/1996,
  editor    = {Deborah Estrin and
               Sally Floyd and
               Craig Partridge and
               Martha Steenstrup},
  title     = {Proceedings of the {ACM} {SIGCOMM} 1996 Conference on Applications,
               Technologies, Architectures, and Protocols for Computer Communication,
               Stanford, CA, USA, August 26-30, 1996},
  publisher = {{ACM}},
  year      = {1996},
  url       = {https://doi.org/10.1145/248156},
  doi       = {10.1145/248156},
  isbn      = {0-89791-790-1},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmetrics/1995,
  editor    = {Blaine D. Gaither},
  title     = {Proceedings of the 1995 {ACM} {SIGMETRICS} joint international conference
               on Measurement and modeling of computer systems, Ottawa, Canada, May
               15-19, 1995},
  publisher = {{ACM}},
  year      = {1995},
  url       = {https://doi.org/10.1145/223587},
  doi       = {10.1145/223587},
  isbn      = {0-89791-695-6},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/1995},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/1994,
  editor    = {Jon Crowcroft},
  title     = {Proceedings of the {ACM} {SIGCOMM} '94 Conference on Communications
               Architectures, Protocols and Applications, London, UK, August 31 -
               September 2, 1994},
  publisher = {{ACM}},
  year      = {1994},
  url       = {https://doi.org/10.1145/190314},
  doi       = {10.1145/190314},
  isbn      = {0-89791-682-4},
  timestamp = {Tue, 06 Nov 2018 11:07:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/usenix/1993wi,
  title     = {Proceedings of the Usenix Winter 1993 Technical Conference, San Diego,
               California, USA, January 1993},
  publisher = {{USENIX} Association},
  year      = {1993},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/1993wi},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier