Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vern Paxson
@inproceedings{DBLP:conf/sigcomm/PietNP23, author = {Julien Piet and Dubem Nwoji and Vern Paxson}, editor = {Henning Schulzrinne and Vishal Misra and Eddie Kohler and David A. Maltz}, title = {{GGFAST:} Automating Generation of Flexible Network Traffic Classifiers}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2023 Conference, {ACM} {SIGCOMM} 2023, New York, NY, USA, 10-14 September 2023}, pages = {850--866}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603269.3604840}, doi = {10.1145/3603269.3604840}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/PietNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PietSP023, author = {Julien Piet and Aashish Sharma and Vern Paxson and David A. Wagner}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Network Detection of Interactive {SSH} Impostors Using Deep Learning}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4283--4300}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/piet}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PietSP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoDAPSV021, author = {Grant Ho and Mayank Dhiman and Devdatta Akhawe and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Hopper: Modeling and Detecting Lateral Movement}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3093--3110}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ho}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/HoDAPSV021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13442, author = {Grant Ho and Mayank Dhiman and Devdatta Akhawe and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, title = {Hopper: Modeling and Detecting Lateral Movement (Extended Report)}, journal = {CoRR}, volume = {abs/2105.13442}, year = {2021}, url = {https://arxiv.org/abs/2105.13442}, eprinttype = {arXiv}, eprint = {2105.13442}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13442.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenPJ20, author = {Jianjun Chen and Vern Paxson and Jian Jiang}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Composition Kills: {A} Case Study of Email Sender Authentication}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2183--2199}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/chen-jianjun}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoCGSPSV019, author = {Grant Ho and Asaf Cidon and Lior Gavish and Marco Schweighauser and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, editor = {Nadia Heninger and Patrick Traynor}, title = {Detecting and Characterizing Lateral Phishing at Scale}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1273--1290}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/ho}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/HoCGSPSV019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00790, author = {Grant Ho and Asaf Cidon and Lior Gavish and Marco Schweighauser and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, title = {Detecting and Characterizing Lateral Phishing at Scale}, journal = {CoRR}, volume = {abs/1910.00790}, year = {2019}, url = {http://arxiv.org/abs/1910.00790}, eprinttype = {arXiv}, eprint = {1910.00790}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00790.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/BanoRJSDMMP18, author = {Shehar Bano and Philipp Richter and Mobin Javed and Srikanth Sundaresan and Zakir Durumeric and Steven J. Murdoch and Richard Mortier and Vern Paxson}, title = {Scanning the Internet for Liveness}, journal = {Comput. Commun. Rev.}, volume = {48}, number = {2}, pages = {2--9}, year = {2018}, url = {https://doi.org/10.1145/3213232.3213234}, doi = {10.1145/3213232.3213234}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/BanoRJSDMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PearceELFP18, author = {Paul Pearce and Roya Ensafi and Frank Li and Nick Feamster and Vern Paxson}, title = {Toward Continual Measurement of Global Network-Level Censorship}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {24--33}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331018}, doi = {10.1109/MSP.2018.1331018}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PearceELFP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/LiP18, author = {Frank Li and Vern Paxson}, title = {A Large-Scale Empirical Study of Security Patches}, journal = {login Usenix Mag.}, volume = {43}, number = {1}, year = {2018}, url = {https://www.usenix.org/publications/login/spring2018/li}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/LiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anrw/SinghNAPTGP18, author = {Rachee Singh and Rishab Nithyanand and Sadia Afroz and Paul Pearce and Michael Carl Tschantz and Phillipa Gill and Vern Paxson}, title = {Characterizing the Nature and Dynamics of Tor Exit Blocking}, booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018, Montreal, QC, Canada, July 16-16, 2018}, pages = {23}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3232755.3232786}, doi = {10.1145/3232755.3232786}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/anrw/SinghNAPTGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenJDWCP018, author = {Jianjun Chen and Jian Jiang and Hai{-}Xin Duan and Tao Wan and Shuo Chen and Vern Paxson and Min Yang}, editor = {William Enck and Adrienne Porter Felt}, title = {We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of {CORS}}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1079--1093}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/chen-jianjun}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenJDWCP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TschantzASQJP18, author = {Michael Carl Tschantz and Sadia Afroz and Shaarif Sajid and Shoaib Asif Qazi and Mobin Javed and Vern Paxson}, editor = {Lex Gill and Rob Jansen}, title = {A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability}, booktitle = {8th {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} 2018, Baltimore, MD, USA, August 14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/foci18/presentation/tschantz}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/TschantzASQJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-11606, author = {Sadia Afroz and Michael Carl Tschantz and Shaarif Sajid and Shoaib Asif Qazi and Mobin Javed and Vern Paxson}, title = {Exploring Server-side Blocking of Regions}, journal = {CoRR}, volume = {abs/1805.11606}, year = {2018}, url = {http://arxiv.org/abs/1805.11606}, eprinttype = {arXiv}, eprint = {1805.11606}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-11606.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-00459, author = {Sadia Afroz and Mobin Javed and Vern Paxson and Shoaib Asif Qazi and Shaarif Sajid and Michael Carl Tschantz}, title = {A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability}, journal = {CoRR}, volume = {abs/1806.00459}, year = {2018}, url = {http://arxiv.org/abs/1806.00459}, eprinttype = {arXiv}, eprint = {1806.00459}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-00459.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/SargentKPA17, author = {Matthew Sargent and John Kristoff and Vern Paxson and Mark Allman}, title = {On the Potential Abuse of {IGMP}}, journal = {Comput. Commun. Rev.}, volume = {47}, number = {1}, pages = {27--35}, year = {2017}, url = {https://doi.org/10.1145/3041027.3041031}, doi = {10.1145/3041027.3041031}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/SargentKPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MarczakP17, author = {William R. Marczak and Vern Paxson}, title = {Social Engineering Attacks on Government Opponents: Target Perspectives}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {2}, pages = {172--185}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0022}, doi = {10.1515/POPETS-2017-0022}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MarczakP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/PearceJLEFWP17, author = {Paul Pearce and Ben Jones and Frank Li and Roya Ensafi and Nick Feamster and Nicholas Weaver and Vern Paxson}, title = {Global-Scale Measurement of {DNS} Manipulation}, journal = {login Usenix Mag.}, volume = {42}, number = {4}, year = {2017}, url = {https://www.usenix.org/publications/login/winter2017/pearce}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/PearceJLEFWP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17, author = {Kurt Thomas and Frank Li and Ali Zand and Jacob Barrett and Juri Ranieri and Luca Invernizzi and Yarik Markov and Oxana Comanescu and Vijay Eranti and Angelika Moscicki and Daniel Margolis and Vern Paxson and Elie Bursztein}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1421--1434}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134067}, doi = {10.1145/3133956.3134067}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThomasLZBRIMCEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiP17, author = {Frank Li and Vern Paxson}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Large-Scale Empirical Study of Security Patches}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2201--2215}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134072}, doi = {10.1145/3133956.3134072}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/DurrettKBPAMLP17, author = {Greg Durrett and Jonathan K. Kummerfeld and Taylor Berg{-}Kirkpatrick and Rebecca S. Portnoff and Sadia Afroz and Damon McCoy and Kirill Levchenko and Vern Paxson}, editor = {Martha Palmer and Rebecca Hwa and Sebastian Riedel}, title = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset for Fine-grained Domain Adaptation}, booktitle = {Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2017, Copenhagen, Denmark, September 9-11, 2017}, pages = {2598--2607}, publisher = {Association for Computational Linguistics}, year = {2017}, url = {https://doi.org/10.18653/v1/d17-1275}, doi = {10.18653/V1/D17-1275}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/DurrettKBPAMLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/MurdockLBDP17, author = {Austin Murdock and Frank Li and Paul Bramsen and Zakir Durumeric and Vern Paxson}, editor = {Steve Uhlig and Olaf Maennel}, title = {Target generation for internet-wide IPv6 scanning}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {242--253}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131405}, doi = {10.1145/3131365.3131405}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/MurdockLBDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LevchenkoDHCAP17, author = {Kirill Levchenko and Amogh Dhamdhere and Bradley Huffaker and kc claffy and Mark Allman and Vern Paxson}, editor = {Steve Uhlig and Olaf Maennel}, title = {Packetlab: a universal measurement endpoint interface}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {254--260}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131396}, doi = {10.1145/3131365.3131396}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/LevchenkoDHCAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DurumericMSBSBB17, author = {Zakir Durumeric and Zane Ma and Drew Springall and Richard Barnes and Nick Sullivan and Elie Bursztein and Michael D. Bailey and J. Alex Halderman and Vern Paxson}, title = {The Security Impact of {HTTPS} Interception}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/security-impact-https-interception/}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/DurumericMSBSBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PearceELFP17, author = {Paul Pearce and Roya Ensafi and Frank Li and Nick Feamster and Vern Paxson}, title = {Augur: Internet-Wide Detection of Connectivity Disruptions}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {427--443}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.55}, doi = {10.1109/SP.2017.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PearceELFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PearceJLEFWP17, author = {Paul Pearce and Ben Jones and Frank Li and Roya Ensafi and Nick Feamster and Nicholas Weaver and Vern Paxson}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Global Measurement of {DNS} Manipulation}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {307--323}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/pearce}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/PearceJLEFWP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SinghNAPTGP17, author = {Rachee Singh and Rishab Nithyanand and Sadia Afroz and Paul Pearce and Michael Carl Tschantz and Phillipa Gill and Vern Paxson}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Characterizing the Nature and Dynamics of Tor Exit Blocking}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {325--341}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/singh}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SinghNAPTGP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoSJP017, author = {Grant Ho and Aashish Sharma and Mobin Javed and Vern Paxson and David A. Wagner}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Detecting Credential Spearphishing in Enterprise Settings}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {469--485}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HoSJP017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/PortnoffADKBMLP17, author = {Rebecca S. Portnoff and Sadia Afroz and Greg Durrett and Jonathan K. Kummerfeld and Taylor Berg{-}Kirkpatrick and Damon McCoy and Kirill Levchenko and Vern Paxson}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Tools for Automated Analysis of Cybercriminal Markets}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {657--666}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052600}, doi = {10.1145/3038912.3052600}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/PortnoffADKBMLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-09609, author = {Greg Durrett and Jonathan K. Kummerfeld and Taylor Berg{-}Kirkpatrick and Rebecca S. Portnoff and Sadia Afroz and Damon McCoy and Kirill Levchenko and Vern Paxson}, title = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset for Fine-grained Domain Adaptation}, journal = {CoRR}, volume = {abs/1708.09609}, year = {2017}, url = {http://arxiv.org/abs/1708.09609}, eprinttype = {arXiv}, eprint = {1708.09609}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-09609.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JainJP16, author = {Sakshi Jain and Mobin Javed and Vern Paxson}, title = {Towards Mining Latent Client Identifiers from Network Traffic}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {2}, pages = {100--114}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0007}, doi = {10.1515/POPETS-2016-0007}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JainJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenJDWWP16, author = {Jianjun Chen and Jian Jiang and Hai{-}Xin Duan and Nicholas Weaver and Tao Wan and Vern Paxson}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Host of Troubles: Multiple Host Ambiguities in {HTTP} Implementations}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1516--1527}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978394}, doi = {10.1145/2976749.2978394}, timestamp = {Tue, 13 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenJDWWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaoKMPF16, author = {Shuang Hao and Alex Kantchelian and Brad Miller and Vern Paxson and Nick Feamster}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{PREDATOR:} Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1568--1579}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978317}, doi = {10.1145/2976749.2978317}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaoKMPF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16, author = {Srikanth Sundaresan and Damon McCoy and Sadia Afroz and Vern Paxson}, title = {Profiling underground merchants based on network behavior}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {62--70}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487943}, doi = {10.1109/ECRIME.2016.7487943}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/SundaresanMAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/RichterWVABFKWP16, author = {Philipp Richter and Florian Wohlfart and Narseo Vallina{-}Rodriguez and Mark Allman and Randy Bush and Anja Feldmann and Christian Kreibich and Nicholas Weaver and Vern Paxson}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {215--229}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987474}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/RichterWVABFKWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/IkramVSKP16, author = {Muhammad Ikram and Narseo Vallina{-}Rodriguez and Suranga Seneviratne and Mohamed Ali K{\^{a}}afar and Vern Paxson}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {An Analysis of the Privacy and Security Risks of Android {VPN} Permission-enabled Apps}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {349--364}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987471}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/IkramVSKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenZDLJLWP16, author = {Jianjun Chen and Xiaofeng Zheng and Hai{-}Xin Duan and Jinjin Liang and Jian Jiang and Kang Li and Tao Wan and Vern Paxson}, title = {Forwarding-Loop Attacks in Content Delivery Networks}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/forwarding-loop-attacks-content-delivery-networks.pdf}, timestamp = {Tue, 13 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ChenZDLJLWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KhattakFAJSMPM16, author = {Sheharbano Khattak and David Fifield and Sadia Afroz and Mobin Javed and Srikanth Sundaresan and Damon McCoy and Vern Paxson and Steven J. Murdoch}, title = {Do You See What {I} See? Differential Treatment of Anonymous Users}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KhattakFAJSMPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/VallentinPS16, author = {Matthias Vallentin and Vern Paxson and Robin Sommer}, editor = {Katerina J. Argyraki and Rebecca Isaacs}, title = {{VAST:} {A} Unified Platform for Interactive Network Forensics}, booktitle = {13th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016}, pages = {345--362}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/vallentin}, timestamp = {Tue, 02 Feb 2021 08:05:49 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/VallentinPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/JonesFPWA16, author = {Ben Jones and Nick Feamster and Vern Paxson and Nicholas Weaver and Mark Allman}, editor = {Thomas Karagiannis and Xenofontas A. Dimitropoulos}, title = {Detecting {DNS} Root Manipulation}, booktitle = {Passive and Active Measurement - 17th International Conference, {PAM} 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9631}, pages = {276--288}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30505-9\_21}, doi = {10.1007/978-3-319-30505-9\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/JonesFPWA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TschantzAAP16, author = {Michael Carl Tschantz and Sadia Afroz and anonymous and Vern Paxson}, title = {SoK: Towards Grounding Censorship Circumvention in Empiricism}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {914--933}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.59}, doi = {10.1109/SP.2016.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TschantzAAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiDCKBMSP16, author = {Frank Li and Zakir Durumeric and Jakub Czyz and Mohammad Karami and Michael D. Bailey and Damon McCoy and Stefan Savage and Vern Paxson}, editor = {Thorsten Holz and Stefan Savage}, title = {You've Got Vulnerability: Exploring Effective Vulnerability Notifications}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1033--1050}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/li}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiDCKBMSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiHKNBTBP16, author = {Frank Li and Grant Ho and Eric Kuan and Yuan Niu and Lucas Ballard and Kurt Thomas and Elie Bursztein and Vern Paxson}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, pages = {1009--1019}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872427.2883039}, doi = {10.1145/2872427.2883039}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/www/LiHKNBTBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RichterWVABFKWP16, author = {Philipp Richter and Florian Wohlfart and Narseo Vallina{-}Rodriguez and Mark Allman and Randy Bush and Anja Feldmann and Christian Kreibich and Nicholas Weaver and Vern Paxson}, title = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment}, journal = {CoRR}, volume = {abs/1605.05606}, year = {2016}, url = {http://arxiv.org/abs/1605.05606}, eprinttype = {arXiv}, eprint = {1605.05606}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RichterWVABFKWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/RichterABP15, author = {Philipp Richter and Mark Allman and Randy Bush and Vern Paxson}, title = {A Primer on IPv4 Scarcity}, journal = {Comput. Commun. Rev.}, volume = {45}, number = {2}, pages = {21--31}, year = {2015}, url = {https://doi.org/10.1145/2766330.2766335}, doi = {10.1145/2766330.2766335}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/RichterABP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/FifieldLHWP15, author = {David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson}, title = {Blocking-resistant communication through domain fronting}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {2}, pages = {46--64}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0009}, doi = {10.1515/POPETS-2015-0009}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/FifieldLHWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiSP15, author = {Frank Li and Richard Shin and Vern Paxson}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Florian Kerschbaum and Cristina Nita{-}Rotaru}, title = {Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners}, booktitle = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {53--64}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808425.2808430}, doi = {10.1145/2808425.2808430}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Al-DuwairiAAP15, author = {Basheer Al{-}Duwairi and Ahmad T. Al{-}Hammouri and Monther Aldwairi and Vern Paxson}, title = {GFlux: {A} google-based system for Fast Flux detection}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {755--756}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346920}, doi = {10.1109/CNS.2015.7346920}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Al-DuwairiAAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/JavedHPP15, author = {Mobin Javed and Cormac Herley and Marcus Peinado and Vern Paxson}, editor = {Kenjiro Cho and Kensuke Fukuda and Vivek S. Pai and Neil Spring}, title = {Measurement and Analysis of Traffic Exchange Services}, booktitle = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC} 2015, Tokyo, Japan, October 28-30, 2015}, pages = {1--12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2815675.2815708}, doi = {10.1145/2815675.2815708}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/JavedHPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/EnsafiFWFWP15, author = {Roya Ensafi and David Fifield and Philipp Winter and Nick Feamster and Nicholas Weaver and Vern Paxson}, editor = {Kenjiro Cho and Kensuke Fukuda and Vivek S. Pai and Neil Spring}, title = {Examining How the Great Firewall Discovers Hidden Circumvention Servers}, booktitle = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC} 2015, Tokyo, Japan, October 28-30, 2015}, pages = {445--458}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2815675.2815690}, doi = {10.1145/2815675.2815690}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/EnsafiFWFWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/Paxson15, author = {Vern Paxson}, title = {Keynote Speaker}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413676}, doi = {10.1109/MALWARE.2015.7413676}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/Paxson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/Vallina-Rodriguez15, author = {Narseo Vallina{-}Rodriguez and Srikanth Sundaresan and Christian Kreibich and Nicholas Weaver and Vern Paxson}, editor = {Gaetano Borriello and Giovanni Pau and Marco Gruteser and Jason I. Hong}, title = {Beyond the Radio: Illuminating the Higher Layers of Mobile Networks}, booktitle = {Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2015, Florence, Italy, May 19-22, 2015}, pages = {375--387}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2742647.2742675}, doi = {10.1145/2742647.2742675}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/Vallina-Rodriguez15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/JonesEFPW15, author = {Ben Jones and Roya Ensafi and Nick Feamster and Vern Paxson and Nicholas Weaver}, editor = {Ben Zevenbergen}, title = {Ethical Concerns for Censorship Measurement}, booktitle = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Ethics in Networked Systems Research, {NS} Ethics@SIGCOMM 2015, London, United Kingdom, August 21, 2015}, pages = {17--19}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2793013.2793015}, doi = {10.1145/2793013.2793015}, timestamp = {Thu, 20 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/JonesEFPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Vallina-Rodriguez15, author = {Narseo Vallina{-}Rodriguez and Srikanth Sundaresan and Christian Kreibich and Vern Paxson}, editor = {Theophilus Benson and Costin Raiciu}, title = {Header Enrichment or {ISP} Enrichment?: Emerging Privacy Threats in Mobile Networks}, booktitle = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Hot Topics in Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM 2015, London, United Kingdom, August 21, 2015}, pages = {25--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785989.2786002}, doi = {10.1145/2785989.2786002}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/Vallina-Rodriguez15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15, author = {Kurt Thomas and Elie Bursztein and Chris Grier and Grant Ho and Nav Jagpal and Alexandros Kapravelos and Damon McCoy and Antonio Nappa and Vern Paxson and Paul Pearce and Niels Provos and Moheeb Abu Rajab}, title = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {151--167}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.17}, doi = {10.1109/SP.2015.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ThomasBGHJKMNPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RastiMWP15, author = {Ryan Rasti and Mukul Murthy and Nicholas Weaver and Vern Paxson}, title = {Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {187--198}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.19}, doi = {10.1109/SP.2015.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RastiMWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiSP15, author = {Frank Li and Richard Shin and Vern Paxson}, title = {Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners}, journal = {CoRR}, volume = {abs/1507.08309}, year = {2015}, url = {http://arxiv.org/abs/1507.08309}, eprinttype = {arXiv}, eprint = {1507.08309}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RazaghpanahVSKG15, author = {Abbas Razaghpanah and Narseo Vallina{-}Rodriguez and Srikanth Sundaresan and Christian Kreibich and Phillipa Gill and Mark Allman and Vern Paxson}, title = {Haystack: In Situ Mobile Traffic Analysis in User Space}, journal = {CoRR}, volume = {abs/1510.01419}, year = {2015}, url = {http://arxiv.org/abs/1510.01419}, eprinttype = {arXiv}, eprint = {1510.01419}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RazaghpanahVSKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearceDGLGMPSV14, author = {Paul Pearce and Vacha Dave and Chris Grier and Kirill Levchenko and Saikat Guha and Damon McCoy and Vern Paxson and Stefan Savage and Geoffrey M. Voelker}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Characterizing Large-Scale Click Fraud in ZeroAccess}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660369}, doi = {10.1145/2660267.2660369}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PearceDGLGMPSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasLGP14, author = {Kurt Thomas and Frank Li and Chris Grier and Vern Paxson}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Consequences of Connectivity: Characterizing Account Hijacking on Twitter}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {489--500}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660282}, doi = {10.1145/2660267.2660282}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThomasLGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/Vallina-RodriguezAKWP14, author = {Narseo Vallina{-}Rodriguez and Johanna Amann and Christian Kreibich and Nicholas Weaver and Vern Paxson}, editor = {Aruna Seneviratne and Christophe Diot and Jim Kurose and Augustin Chaintreau and Luigi Rizzo}, title = {A Tangled Mass: The Android Root Certificate Stores}, booktitle = {Proceedings of the 10th {ACM} International on Conference on emerging Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia, December 2-5, 2014}, pages = {141--148}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2674005.2675015}, doi = {10.1145/2674005.2675015}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/Vallina-RodriguezAKWP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KhattakJKUP14, author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {A Look at the Consequences of Internet Censorship Through an {ISP} Lens}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {271--284}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663750}, doi = {10.1145/2663716.2663750}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KhattakJKUP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SommerVCP14, author = {Robin Sommer and Matthias Vallentin and Lorenzo De Carli and Vern Paxson}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {{HILTI:} an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {461--474}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663735}, doi = {10.1145/2663716.2663735}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/SommerVCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/DurumericKAHBLWABPP14, author = {Zakir Durumeric and James Kasten and David Adrian and J. Alex Halderman and Michael D. Bailey and Frank Li and Nicholas Weaver and Johanna Amann and Jethro Beekman and Mathias Payer and Vern Paxson}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {The Matter of Heartbleed}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {475--488}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663755}, doi = {10.1145/2663716.2663755}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/DurumericKAHBLWABPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/WeaverKDP14, author = {Nicholas Weaver and Christian Kreibich and Martin Dam and Vern Paxson}, editor = {Michalis Faloutsos and Aleksandar Kuzmanovic}, title = {Here Be Web Proxies}, booktitle = {Passive and Active Measurement - 15th International Conference, {PAM} 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8362}, pages = {183--192}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04918-2\_18}, doi = {10.1007/978-3-319-04918-2\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/WeaverKDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/VallentinCSPW14, author = {Matthias Vallentin and Dominik Charousset and Thomas C. Schmidt and Vern Paxson and Matthias W{\"{a}}hlisch}, editor = {Fabi{\'{a}}n E. Bustamante and Y. Charlie Hu and Arvind Krishnamurthy and Sylvia Ratnasamy}, title = {Native actors: how to scale network forensics}, booktitle = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014}, pages = {141--142}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2619239.2631471}, doi = {10.1145/2619239.2631471}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/VallentinCSPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MarczakSMP14, author = {William R. Marczak and John Scott{-}Railton and Morgan Marquis{-}Boire and Vern Paxson}, editor = {Kevin Fu and Jaeyeon Jung}, title = {When Governments Hack Opponents: {A} Look at Actors and Technology}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {511--525}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/marczak}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/MarczakSMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KapravelosGCKVP14, author = {Alexandros Kapravelos and Chris Grier and Neha Chachra and Christopher Kruegel and Giovanni Vigna and Vern Paxson}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Hulk: Eliciting Malicious Behavior in Browser Extensions}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {641--654}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KapravelosGCKVP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2014foci, editor = {Jedidiah R. Crandall and Vern Paxson}, title = {4th {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/foci14}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2014foci.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TschantzAPT14, author = {Michael Carl Tschantz and Sadia Afroz and Vern Paxson and J. Doug Tygar}, title = {On Modeling the Costs of Censorship}, journal = {CoRR}, volume = {abs/1409.3211}, year = {2014}, url = {http://arxiv.org/abs/1409.3211}, eprinttype = {arXiv}, eprint = {1409.3211}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/TschantzAPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RichterABP14, author = {Philipp Richter and Mark Allman and Randy Bush and Vern Paxson}, title = {A Primer on IPv4 Scarcity}, journal = {CoRR}, volume = {abs/1411.2649}, year = {2014}, url = {http://arxiv.org/abs/1411.2649}, eprinttype = {arXiv}, eprint = {1411.2649}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RichterABP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JavedP13, author = {Mobin Javed and Vern Paxson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Detecting stealthy, distributed {SSH} brute-forcing}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {85--96}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516719}, doi = {10.1145/2508859.2516719}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JavedP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/HaoTPFKGH13, author = {Shuang Hao and Matthew Thomas and Vern Paxson and Nick Feamster and Christian Kreibich and Chris Grier and Scott Hollenbeck}, editor = {Konstantina Papagiannaki and P. Krishna Gummadi and Craig Partridge}, title = {Understanding the domain registration behavior of spammers}, booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013, Barcelona, Spain, October 23-25, 2013}, pages = {63--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2504730.2504753}, doi = {10.1145/2504730.2504753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/HaoTPFKGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KhattakJAP13, author = {Sheharbano Khattak and Mobin Javed and Philip D. Anderson and Vern Paxson}, editor = {Jedidiah R. Crandall and Joss Wright}, title = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion}, booktitle = {3rd {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} '13, Washington, D.C., USA, August 13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/foci13/workshop-program/presentation/khattak}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/KhattakJAP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaxsonCJRSSSTVW13, author = {Vern Paxson and Mihai Christodorescu and Mobin Javed and Josyula R. Rao and Reiner Sailer and Douglas Lee Schales and Marc Ph. Stoecklin and Kurt Thomas and Wietse Z. Venema and Nicholas Weaver}, editor = {Samuel T. King}, title = {Practical Comprehensive Bounds on Surreptitious Communication over {DNS}}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {17--32}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/paxson}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/PaxsonCJRSSSTVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasMGKP13, author = {Kurt Thomas and Damon McCoy and Chris Grier and Alek Kolcz and Vern Paxson}, editor = {Samuel T. King}, title = {Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {195--210}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasMGKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/leet/2013, editor = {Vern Paxson}, title = {6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '13, Washington, D.C., USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/leet13}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/leet/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12, author = {Chris Grier and Lucas Ballard and Juan Caballero and Neha Chachra and Christian J. Dietrich and Kirill Levchenko and Panayiotis Mavrommatis and Damon McCoy and Antonio Nappa and Andreas Pitsillidis and Niels Provos and M. Zubair Rafique and Moheeb Abu Rajab and Christian Rossow and Kurt Thomas and Vern Paxson and Stefan Savage and Geoffrey M. Voelker}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Manufacturing compromise: the emergence of exploit-as-a-service}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {821--832}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382283}, doi = {10.1145/2382196.2382283}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/DhawanSTKAWP12, author = {Mohan Dhawan and Justin Samuel and Renata Teixeira and Christian Kreibich and Mark Allman and Nicholas Weaver and Vern Paxson}, editor = {John W. Byers and Jim Kurose and Ratul Mahajan and Alex C. Snoeren}, title = {Fathom: a browser-based network measurement platform}, booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '12, Boston, MA, USA, November 14-16, 2012}, pages = {73--86}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2398776.2398786}, doi = {10.1145/2398776.2398786}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/DhawanSTKAWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/ThomasGP12, author = {Kurt Thomas and Chris Grier and Vern Paxson}, editor = {Engin Kirda}, title = {Adapting Social Spam Infrastructure for Political Censorship}, booktitle = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '12, San Jose, CA, USA, April 24, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/thomas}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/ThomasGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/HalvorsonSMFKWLP12, author = {Tristan Halvorson and Janos Szurdi and Gregor Maier and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Christian Kreibich and Nicholas Weaver and Kirill Levchenko and Vern Paxson}, editor = {Nina Taft and Fabio Ricciato}, title = {The {BIZ} Top-Level Domain: Ten Years Later}, booktitle = {Passive and Active Measurement - 13th International Conference, {PAM} 2012, Vienna, Austria, March 12-14th, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7192}, pages = {221--230}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28537-0\_22}, doi = {10.1007/978-3-642-28537-0\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/HalvorsonSMFKWLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RossowDGKPPBS12, author = {Christian Rossow and Christian J. Dietrich and Chris Grier and Christian Kreibich and Vern Paxson and Norbert Pohlmann and Herbert Bos and Maarten van Steen}, title = {Prudent Practices for Designing Malware Experiments: Status Quo and Outlook}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {65--79}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.14}, doi = {10.1109/SP.2012.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RossowDGKPPBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/MartignoniPZHMSPPSS12, author = {Lorenzo Martignoni and Pongsin Poosankam and Matei Zaharia and Jun Han and Stephen McCamant and Dawn Song and Vern Paxson and Adrian Perrig and Scott Shenker and Ion Stoica}, editor = {Gernot Heiser and Wilson C. Hsieh}, title = {Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems}, booktitle = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15, 2012}, pages = {165--182}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/martignoni}, timestamp = {Mon, 01 Feb 2021 08:43:32 +0100}, biburl = {https://dblp.org/rec/conf/usenix/MartignoniPZHMSPPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiGCP11, author = {Zhichun Li and Anup Goyal and Yan Chen and Vern Paxson}, title = {Towards Situational Awareness of Large-Scale Botnet Probing Events}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {1}, pages = {175--188}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2010.2086445}, doi = {10.1109/TIFS.2010.2086445}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiGCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaierFPSV11, author = {Gregor Maier and Anja Feldmann and Vern Paxson and Robin Sommer and Matthias Vallentin}, editor = {Thorsten Holz and Herbert Bos}, title = {An Assessment of Overt Malicious Activity Manifest in Residential Networks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {144--163}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_9}, doi = {10.1007/978-3-642-22424-9\_9}, timestamp = {Wed, 25 Sep 2019 18:15:55 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MaierFPSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MillerPGKP11, author = {Brad Miller and Paul Pearce and Chris Grier and Christian Kreibich and Vern Paxson}, editor = {Thorsten Holz and Herbert Bos}, title = {What's Clicking What? Techniques and Innovations of Today's Clickbots}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {164--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_10}, doi = {10.1007/978-3-642-22424-9\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MillerPGKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ThomasGSP11, author = {Kurt Thomas and Chris Grier and Dawn Song and Vern Paxson}, editor = {Patrick Thiran and Walter Willinger}, title = {Suspended accounts in retrospect: an analysis of twitter spam}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {243--258}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068840}, doi = {10.1145/2068816.2068840}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/ThomasGSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KreibichWKCP11, author = {Christian Kreibich and Nicholas Weaver and Chris Kanich and Weidong Cui and Vern Paxson}, editor = {Patrick Thiran and Walter Willinger}, title = {{GQ:} practical containment for measuring modern malware systems}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {397--412}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068854}, doi = {10.1145/2068816.2068854}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KreibichWKCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/ZhangP11, author = {Chao Michael Zhang and Vern Paxson}, editor = {Neil Spring and George F. Riley}, title = {Detecting and Analyzing Automated Activity on Twitter}, booktitle = {Passive and Active Measurement - 12th International Conference, {PAM} 2011, Atlanta, GA, USA, March 20-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6579}, pages = {102--111}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19260-9\_11}, doi = {10.1007/978-3-642-19260-9\_11}, timestamp = {Sun, 02 Jun 2019 21:20:49 +0200}, biburl = {https://dblp.org/rec/conf/pam/ZhangP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KreibichWMNP11, author = {Christian Kreibich and Nicholas Weaver and Gregor Maier and Boris Nechaev and Vern Paxson}, editor = {Nina Taft and David Wetherall}, title = {Experiences from Netalyzr with engaging users in end-system measurement}, booktitle = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August 19, 2011}, pages = {25--30}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2018602.2018609}, doi = {10.1145/2018602.2018609}, timestamp = {Tue, 06 Nov 2018 11:07:11 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/KreibichWMNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11, author = {Kirill Levchenko and Andreas Pitsillidis and Neha Chachra and Brandon Enright and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Chris Grier and Tristan Halvorson and Chris Kanich and Christian Kreibich and He Liu and Damon McCoy and Nicholas Weaver and Vern Paxson and Geoffrey M. Voelker and Stefan Savage}, title = {Click Trajectories: End-to-End Analysis of the Spam Value Chain}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {431--446}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.24}, doi = {10.1109/SP.2011.24}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasGMPS11, author = {Kurt Thomas and Chris Grier and Justin Ma and Vern Paxson and Dawn Song}, title = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {447--462}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.25}, doi = {10.1109/SP.2011.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ThomasGMPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CaballeroGKP11, author = {Juan Caballero and Chris Grier and Christian Kreibich and Vern Paxson}, title = {Measuring Pay-per-Install: The Commoditization of Malware Distribution}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Caballero.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CaballeroGKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11, author = {Chris Kanich and Nicholas Weaver and Damon McCoy and Tristan Halvorson and Christian Kreibich and Kirill Levchenko and Vern Paxson and Geoffrey M. Voelker and Stefan Savage}, title = {Show Me the Money: Characterizing Spam-advertised Revenue}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KanichWMHKLPVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WeaverKP11, author = {Nicholas Weaver and Christian Kreibich and Vern Paxson}, editor = {Nick Feamster and Wenke Lee}, title = {Redirecting {DNS} for Ads and Profit}, booktitle = {{USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/foci11/redirecting-dns-ads-and-profit}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/WeaverKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6298, author = {Vern Paxson and Mark Allman and Jerry Chu and Matt Sargent}, title = {Computing TCP's Retransmission Timer}, journal = {{RFC}}, volume = {6298}, pages = {1--11}, year = {2011}, url = {https://doi.org/10.17487/RFC6298}, doi = {10.17487/RFC6298}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6298.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrierTPZ10, author = {Chris Grier and Kurt Thomas and Vern Paxson and Chao Michael Zhang}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {@spam: the underground on 140 characters or less}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {27--37}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866311}, doi = {10.1145/1866307.1866311}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrierTPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/MuthukrishnanPAA10, author = {Chitra Muthukrishnan and Vern Paxson and Mark Allman and Aditya Akella}, editor = {Geoffrey G. Xie and Robert Beverly and Robert Tappan Morris and Bruce Davie}, title = {Using strongly typed networking to architect for tussle}, booktitle = {Proceedings of the 9th {ACM} Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, {USA} - October 20 - 21, 2010}, pages = {9}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1868447.1868456}, doi = {10.1145/1868447.1868456}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/MuthukrishnanPAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KreibichWNP10, author = {Christian Kreibich and Nicholas Weaver and Boris Nechaev and Vern Paxson}, editor = {Mark Allman}, title = {Netalyzr: illuminating the edge network}, booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2010, Melbourne, Australia - November 1-3, 2010}, pages = {246--259}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879141.1879173}, doi = {10.1145/1879141.1879173}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KreibichWNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/ChoCGPS10, author = {Chia Yuan Cho and Juan Caballero and Chris Grier and Vern Paxson and Dawn Song}, editor = {Michael D. Bailey}, title = {Insights from the Inside: {A} View of Botnet Management from Infiltration}, booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '10, San Jose, CA, USA, April 27, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/leet-10/insights-inside-view-botnet-management-infiltration}, timestamp = {Mon, 20 Nov 2023 09:09:49 +0100}, biburl = {https://dblp.org/rec/conf/leet/ChoCGPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/FelegyhaziKP10, author = {M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Christian Kreibich and Vern Paxson}, editor = {Michael D. Bailey}, title = {On the Potential of Proactive Domain Blacklisting}, booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '10, San Jose, CA, USA, April 27, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/leet-10/potential-proactive-domain-blacklisting}, timestamp = {Thu, 22 May 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/leet/FelegyhaziKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PitsillidisLKKVPWS10, author = {Andreas Pitsillidis and Kirill Levchenko and Christian Kreibich and Chris Kanich and Geoffrey M. Voelker and Vern Paxson and Nicholas Weaver and Stefan Savage}, title = {Botnet Judo: Fighting Spam with Itself}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/botnet-judo-fighting-spam-itself}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PitsillidisLKKVPWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/NechaevAPG08, author = {Boris Nechaev and Mark Allman and Vern Paxson and Andrei V. Gurtov}, editor = {Aditya Akella and Nick Feamster and Sanjay G. Rao}, title = {A Preliminary Analysis of {TCP} Performance in an Enterprise Network}, booktitle = {2010 Internet Network Management Workshop / Workshop on Research on Enterprise Networking, San Jose, CA, USA, April, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/inmwren-10/preliminary-analysis-tcp-performance-enterprise-network}, timestamp = {Tue, 02 Feb 2021 08:05:44 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/NechaevAPG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/CallahanAP10, author = {Tom Callahan and Mark Allman and Vern Paxson}, editor = {Arvind Krishnamurthy and Bernhard Plattner}, title = {A Longitudinal View of {HTTP} Traffic}, booktitle = {Passive and Active Measurement, 11th International Conference, {PAM} 2010, Zurich, Switzerland, April 7-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6032}, pages = {222--231}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12334-4\_23}, doi = {10.1007/978-3-642-12334-4\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/CallahanAP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SommerP10, author = {Robin Sommer and Vern Paxson}, title = {Outside the Closed World: On Using Machine Learning for Network Intrusion Detection}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {305--316}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.25}, doi = {10.1109/SP.2010.25}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/SommerP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordCGLPY10, author = {Paul Barford and Yan Chen and Anup Goyal and Zhichun Li and Vern Paxson and Vinod Yegneswaran}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Employing Honeynets For Network Situational Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {71--102}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_5}, doi = {10.1007/978-1-4419-0140-8\_5}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KanichKLEVPS09, author = {Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, title = {Spamalytics: an empirical analysis of spam marketing conversion}, journal = {Commun. {ACM}}, volume = {52}, number = {9}, pages = {99--107}, year = {2009}, url = {https://doi.org/10.1145/1562164.1562190}, doi = {10.1145/1562164.1562190}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/KanichKLEVPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/PaxsonMR09, author = {Vern Paxson and Nick McKeown and Jennifer Rexford}, title = {Selecting the 2008 sigcomm test-of-time awardwinner(s)}, journal = {Comput. Commun. Rev.}, volume = {39}, number = {2}, pages = {40--41}, year = {2009}, url = {https://doi.org/10.1145/1517480.1517488}, doi = {10.1145/1517480.1517488}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/PaxsonMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SommerPW09, author = {Robin Sommer and Vern Paxson and Nicholas Weaver}, title = {An architecture for exploiting multi-core processors to parallelize network intrusion prevention}, journal = {Concurr. Comput. Pract. Exp.}, volume = {21}, number = {10}, pages = {1255--1279}, year = {2009}, url = {https://doi.org/10.1002/cpe.1422}, doi = {10.1002/CPE.1422}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/SommerPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiGCP09, author = {Zhichun Li and Anup Goyal and Yan Chen and Vern Paxson}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Automating analysis of large-scale botnet probing events}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {11--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533063}, doi = {10.1145/1533057.1533063}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiGCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/MittalPSW09, author = {Prateek Mittal and Vern Paxson and Robin Sommer and Mark Winterrowd}, editor = {Lakshminarayanan Subramanian and Will E. Leland and Ratul Mahajan}, title = {Securing Mediated Trace Access Using Black-box Permutation Analysis}, booktitle = {Eight {ACM} Workshop on Hot Topics in Networks (HotNets-VIII), {HOTNETS} '09, New York City, NY, USA, October 22-23, 2009}, publisher = {{ACM} {SIGCOMM}}, year = {2009}, url = {http://conferences.sigcomm.org/hotnets/2009/papers/hotnets2009-final151.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/MittalPSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/MaierFPA09, author = {Gregor Maier and Anja Feldmann and Vern Paxson and Mark Allman}, editor = {Anja Feldmann and Laurent Mathy}, title = {On dominant characteristics of residential broadband internet traffic}, booktitle = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009}, pages = {90--102}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1644893.1644904}, doi = {10.1145/1644893.1644904}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/MaierFPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/NechaevPAG09, author = {Boris Nechaev and Vern Paxson and Mark Allman and Andrei V. Gurtov}, editor = {Anja Feldmann and Laurent Mathy}, title = {On calibrating enterprise switch measurements}, booktitle = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009}, pages = {143--155}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1644893.1644910}, doi = {10.1145/1644893.1644910}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/NechaevPAG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/KreibichKLEVPS09, author = {Christian Kreibich and Chris Kanich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, editor = {Wenke Lee}, title = {Spamcraft: An Inside Look At Spam Campaign Orchestration}, booktitle = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '09, Boston, MA, USA, April 21, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/leet-09/spamcraft-inside-look-spam-campaign-orchestration}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/KreibichKLEVPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WeaverSP09, author = {Nicholas Weaver and Robin Sommer and Vern Paxson}, title = {Detecting Forged {TCP} Reset Packets}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/detecting-forged-tcp-reset-packets/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WeaverSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5681, author = {Mark Allman and Vern Paxson and Ethan Blanton}, title = {{TCP} Congestion Control}, journal = {{RFC}}, volume = {5681}, pages = {1--18}, year = {2009}, url = {https://doi.org/10.17487/RFC5681}, doi = {10.17487/RFC5681}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JungMP08, author = {Jaeyeon Jung and Rodolfo A. Milito and Vern Paxson}, title = {On the adaptive real-time detection of fast-propagating network worms}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {197--210}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0080-y}, doi = {10.1007/S11416-007-0080-Y}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JungMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KanichKLEVPS08, author = {Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Spamalytics: an empirical analysis of spam marketing conversion}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {3--14}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455774}, doi = {10.1145/1455770.1455774}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KanichKLEVPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/JuanKLP08, author = {Leo Juan and Christian Kreibich and Chih{-}Hung Lin and Vern Paxson}, editor = {Diego Zamboni}, title = {A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, {DIMVA} 2008, Paris, France, July 10-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5137}, pages = {267--278}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70542-0\_14}, doi = {10.1007/978-3-540-70542-0\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/JuanKLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/KreibichKLEVPS08, author = {Christian Kreibich and Chris Kanich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, editor = {Fabian Monrose}, title = {On the Spam Campaign Trail}, booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/leet08/tech/full\_papers/kreibich/kreibich.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/KreibichKLEVPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/AllmanP08, author = {Mark Allman and Vern Paxson}, editor = {Mark Claypool and Steve Uhlig}, title = {A Reactive Measurement Framework}, booktitle = {Passive and Active Network Measurement, 9th International Conference, {PAM} 2008, Cleveland, OH, USA, April 29-30, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4979}, pages = {92--101}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79232-1\_10}, doi = {10.1007/978-3-540-79232-1\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/AllmanP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DregerFPS08, author = {Holger Dreger and Anja Feldmann and Vern Paxson and Robin Sommer}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Predicting the Resource Consumption of Network Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {135--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_8}, doi = {10.1007/978-3-540-87403-4\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/DregerFPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/MaierSDFPS08, author = {Gregor Maier and Robin Sommer and Holger Dreger and Anja Feldmann and Vern Paxson and Fabian Schneider}, editor = {Victor Bahl and David Wetherall and Stefan Savage and Ion Stoica}, title = {Enriching network security analysis with time travel}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008}, pages = {183--194}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1402958.1402980}, doi = {10.1145/1402958.1402980}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/MaierSDFPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/DregerFPS08, author = {Holger Dreger and Anja Feldmann and Vern Paxson and Robin Sommer}, editor = {Zhen Liu and Vishal Misra and Prashant J. Shenoy}, title = {Predicting the resource consumption of network intrusion detection systems}, booktitle = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008, Annapolis, MD, USA, June 2-6, 2008}, pages = {437--438}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375457.1375509}, doi = {10.1145/1375457.1375509}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/DregerFPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VutukuruBP08, author = {Mythili Vutukuru and Hari Balakrishnan and Vern Paxson}, title = {Efficient and Robust {TCP} Stream Normalization}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {96--110}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.27}, doi = {10.1109/SP.2008.27}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/VutukuruBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AllmanKPSW08, author = {Mark Allman and Christian Kreibich and Vern Paxson and Robin Sommer and Nicholas Weaver}, editor = {Niels Provos}, title = {Principles for Developing Comprehensive Network Visibility}, booktitle = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose, CA, USA, July 29, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/hotsec08/tech/full\_papers/allman/allman.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AllmanKPSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GonzalezPW07, author = {Jos{\'{e}} M. Gonz{\'{a}}lez and Vern Paxson and Nicholas Weaver}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {139--149}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315264}, doi = {10.1145/1315245.1315264}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GonzalezPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FranklinP07, author = {Jason Franklin and Adrian Perrig and Vern Paxson and Stefan Savage}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {An inquiry into the nature and causes of the wealth of internet miscreants}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {375--388}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315292}, doi = {10.1145/1315245.1315292}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FranklinP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/JungMP07, author = {Jaeyeon Jung and Rodolfo A. Milito and Vern Paxson}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {On the Adaptive Real-Time Detection of Fast-Propagating Network Worms}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {175--192}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_11}, doi = {10.1007/978-3-540-73614-1\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/JungMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/WeaverPG07, author = {Nicholas Weaver and Vern Paxson and Jos{\'{e}} M. Gonz{\'{a}}lez}, editor = {Andr{\'{e}} DeHon and Mike Hutton}, title = {The shunt: an FPGA-based accelerator for network intrusion prevention}, booktitle = {Proceedings of the {ACM/SIGDA} 15th International Symposium on Field Programmable Gate Arrays, {FPGA} 2007, Monterey, California, USA, February 18-20, 2007}, pages = {199--206}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1216919.1216952}, doi = {10.1145/1216919.1216952}, timestamp = {Tue, 06 Nov 2018 16:58:22 +0100}, biburl = {https://dblp.org/rec/conf/fpga/WeaverPG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/AllmanCNP07, author = {Mark Allman and Ken Christensen and Bruce Nordman and Vern Paxson}, editor = {Constantine Dovrolis and Vern Paxson and Stefan Savage}, title = {Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems}, booktitle = {6th {ACM} Workshop on Hot Topics in Networks - HotNets-VI, Atlanta, Georgia, USA, November 14-15, 2007}, publisher = {{ACM} {SIGCOMM}}, year = {2007}, url = {http://conferences.sigcomm.org/hotnets/2007/papers/hotnets6-final86.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/AllmanCNP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AllmanPT07, author = {Mark Allman and Vern Paxson and Jeff Terrell}, editor = {Constantine Dovrolis and Matthew Roughan}, title = {A brief history of scanning}, booktitle = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2007, San Diego, California, USA, October 24-26, 2007}, pages = {77--82}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1298306.1298316}, doi = {10.1145/1298306.1298316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/AllmanPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AllmanP07, author = {Mark Allman and Vern Paxson}, editor = {Constantine Dovrolis and Matthew Roughan}, title = {Issues and etiquette concerning use of shared measurement data}, booktitle = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2007, San Diego, California, USA, October 24-26, 2007}, pages = {135--140}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1298306.1298327}, doi = {10.1145/1298306.1298327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/AllmanP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VallentinSLLPT07, author = {Matthias Vallentin and Robin Sommer and Jason Lee and Craig Leres and Vern Paxson and Brian Tierney}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {The {NIDS} Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {107--126}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_6}, doi = {10.1007/978-3-540-74320-0\_6}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VallentinSLLPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AllmanKPSW07, author = {Mark Allman and Christian Kreibich and Vern Paxson and Robin Sommer and Nicholas Weaver}, title = {The Strengths of Weaker Identities: Opportunistic Personas}, booktitle = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston, MA, USA, August 7, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/hotsec-07/strengths-weaker-identities-opportunistic-personas}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/AllmanKPSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WeaverSP07, author = {Nicholas Weaver and Stuart Staniford and Vern Paxson}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Very Fast Containment of Scanning Worms, Revisited}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {113--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_6}, doi = {10.1007/978-0-387-44599-1\_6}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/WeaverSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hotnets/2007, editor = {Constantine Dovrolis and Vern Paxson and Stefan Savage}, title = {6th {ACM} Workshop on Hot Topics in Networks - HotNets-VI, Atlanta, Georgia, USA, November 14-15, 2007}, publisher = {{ACM} {SIGCOMM}}, year = {2007}, timestamp = {Mon, 05 May 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotnets/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/PangAPL06, author = {Ruoming Pang and Mark Allman and Vern Paxson and Jason Lee}, title = {The devil and packet trace anonymization}, journal = {Comput. Commun. Rev.}, volume = {36}, number = {1}, pages = {29--38}, year = {2006}, url = {https://doi.org/10.1145/1111322.1111330}, doi = {10.1145/1111322.1111330}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/PangAPL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Paxson06, author = {Vern Paxson}, title = {End-to-end routing behavior in the internet}, journal = {Comput. Commun. Rev.}, volume = {36}, number = {5}, pages = {41--56}, year = {2006}, url = {https://doi.org/10.1145/1163593.1163602}, doi = {10.1145/1163593.1163602}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Paxson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/DuffieldPPT06, author = {Nick G. Duffield and Francesco Lo Presti and Vern Paxson and Donald F. Towsley}, title = {Network loss tomography using striped unicast probes}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {14}, number = {4}, pages = {697--710}, year = {2006}, url = {http://doi.acm.org/10.1145/1217649}, doi = {10.1145/1217649}, timestamp = {Fri, 23 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/DuffieldPPT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/KohlerLPS06, author = {Eddie Kohler and Jinyang Li and Vern Paxson and Scott Shenker}, title = {Observed structure of addresses in {IP} traffic}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {14}, number = {6}, pages = {1207--1218}, year = {2006}, url = {http://doi.acm.org/10.1145/1217692}, doi = {10.1145/1217692}, timestamp = {Wed, 16 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/KohlerLPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/AllmanBPS06, author = {Mark Allman and Ethan Blanton and Vern Paxson and Scott Shenker}, editor = {Eddie Kohler and Greg Minshall}, title = {Fighting Coordinated Attackers with Cross-Organizational Information Sharing}, booktitle = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine, California, USA, November 29-30, 2006}, publisher = {{ACM} {SIGCOMM}}, year = {2006}, url = {http://conferences.sigcomm.org/hotnets/2006/allman06fighting.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/AllmanBPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/ParkerRSCGSHBEA06, author = {Andrew Parker and Sasank Reddy and Thomas Schmid and Kevin K. Chang and Saurabh Ganeriwal and Mani B. Srivastava and Mark H. Hansen and Jeff Burke and Deborah Estrin and Mark Allman and Vern Paxson}, editor = {Eddie Kohler and Greg Minshall}, title = {Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications}, booktitle = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine, California, USA, November 29-30, 2006}, publisher = {{ACM} {SIGCOMM}}, year = {2006}, url = {http://conferences.sigcomm.org/hotnets/2006/parker06network.pdf}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/ParkerRSCGSHBEA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KannanJPK06, author = {Jayanthkumar Kannan and Jaeyeon Jung and Vern Paxson and Can Emre Koksal}, editor = {Jussara M. Almeida and Virg{\'{\i}}lio A. F. Almeida and Paul Barford}, title = {Semi-automated discovery of application session structure}, booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006}, pages = {119--132}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1177080.1177096}, doi = {10.1145/1177080.1177096}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KannanJPK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/PangPSP06, author = {Ruoming Pang and Vern Paxson and Robin Sommer and Larry L. Peterson}, editor = {Jussara M. Almeida and Virg{\'{\i}}lio A. F. Almeida and Paul Barford}, title = {binpac: a yacc for writing application protocol parsers}, booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006}, pages = {289--300}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1177080.1177119}, doi = {10.1145/1177080.1177119}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/PangPSP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CuiPWK06, author = {Weidong Cui and Vern Paxson and Nicholas Weaver and Randy H. Katz}, title = {Protocol-Independent Adaptive Replay of Application Dialog}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/protocol-independent-adaptive-replay-application-dialog/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CuiPWK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GonzalezP06, author = {Jos{\'{e}} M. Gonz{\'{a}}lez and Vern Paxson}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Enhancing Network Intrusion Detection with Integrated Sampling and Filtering}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {272--289}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_14}, doi = {10.1007/11856214\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GonzalezP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WeaverPS06, author = {Nicholas Weaver and Vern Paxson and Robin Sommer}, title = {Work in Progress: Bro-LAN Pervasive Network Inspection and Control for {LAN} Traffic}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--2}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359568}, doi = {10.1109/SECCOMW.2006.359568}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/WeaverPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaxsonADLPSW06, author = {Vern Paxson and Krste Asanovic and Sarang Dharmapurikar and John W. Lockwood and Ruoming Pang and Robin Sommer and Nicholas Weaver}, title = {Rethinking Hardware Support for Network Analysis and Intrusion Prevention}, booktitle = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver, BC, Canada, July 31, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/hotsec-06/rethinking-hardware-support-network-analysis-and-intrusion-prevention}, timestamp = {Mon, 01 Feb 2021 08:43:09 +0100}, biburl = {https://dblp.org/rec/conf/uss/PaxsonADLPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4440, author = {Sally Floyd and Vern Paxson and Aaron Falk and Internet Architecture Board}, title = {{IAB} Thoughts on the Role of the Internet Research Task Force {(IRTF)}}, journal = {{RFC}}, volume = {4440}, pages = {1--13}, year = {2006}, url = {https://doi.org/10.17487/RFC4440}, doi = {10.17487/RFC4440}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4440.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/HellersteinPPRSW05, author = {Joseph M. Hellerstein and Vern Paxson and Larry L. Peterson and Timothy Roscoe and Scott Shenker and David Wetherall}, title = {The Network Oracle}, journal = {{IEEE} Data Eng. Bull.}, volume = {28}, number = {1}, pages = {3--10}, year = {2005}, url = {http://sites.computer.org/debull/A05mar/hellerstein.ps}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/HellersteinPPRSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PaxsonW05, author = {Vern Paxson and Michael Waidner}, title = {Guest Editor's Introduction: 2005 {IEEE} Symposium on Security and Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {81}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.23}, doi = {10.1109/TDSC.2005.23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PaxsonW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SommerP05, author = {Robin Sommer and Vern Paxson}, title = {Exploiting Independent State For Network Intrusion Detection}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {59--71}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.24}, doi = {10.1109/CSAC.2005.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SommerP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DregerKPS05, author = {Holger Dreger and Christian Kreibich and Vern Paxson and Robin Sommer}, editor = {Klaus Julisch and Christopher Kr{\"{u}}gel}, title = {Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, {DIMVA} 2005, Vienna, Austria, July 7-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3548}, pages = {206--221}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506881\_13}, doi = {10.1007/11506881\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DregerKPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/PangABLPT05, author = {Ruoming Pang and Mark Allman and Mike Bennett and Jason Lee and Vern Paxson and Brian Tierney}, title = {A First Look at Modern Enterprise Traffic}, booktitle = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005, Berkeley, California, USA, October 19-21, 2005}, pages = {15--28}, publisher = {{USENIX} Association}, year = {2005}, url = {http://www.usenix.org/events/imc05/tech/pang.html}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/PangABLPT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KornexlPDFS05, author = {Stefan Kornexl and Vern Paxson and Holger Dreger and Anja Feldmann and Robin Sommer}, title = {Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic}, booktitle = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005, Berkeley, California, USA, October 19-21, 2005}, pages = {267--272}, publisher = {{USENIX} Association}, year = {2005}, url = {http://www.usenix.org/events/imc05/tech/kornexl.html}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/KornexlPDFS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KumarPW05, author = {Abhishek Kumar and Vern Paxson and Nicholas Weaver}, title = {Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event}, booktitle = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005, Berkeley, California, USA, October 19-21, 2005}, pages = {351--364}, publisher = {{USENIX} Association}, year = {2005}, url = {http://www.usenix.org/events/imc05/tech/kumar.html}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/KumarPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DharmapurikarP05, author = {Sarang Dharmapurikar and Vern Paxson}, editor = {Patrick D. McDaniel}, title = {Robust {TCP} Stream Reassembly in the Presence of Adversaries}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/robust-tcp-stream-reassembly-presence-adversaries}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/DharmapurikarP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worm/Paxson05, author = {Vern Paxson}, editor = {Vijay Atluri and Angelos D. Keromytis}, title = {An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Rapid Malcode, {WORM} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {51}, publisher = {{ACM} Press}, year = {2005}, url = {https://doi.org/10.1145/1103626.1103636}, doi = {10.1145/1103626.1103636}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/Paxson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04, author = {Ruzena Bajcsy and Terry Benzel and Matt Bishop and Robert Braden and Carla E. Brodley and Sonia Fahmy and Sally Floyd and Wes Hardaker and Anthony D. Joseph and George Kesidis and Karl N. Levitt and Robert Lindell and Peng Liu and David J. Miller and Russ Mundy and Clifford Neuman and Ron Ostrenga and Vern Paxson and Phillip A. Porras and Catherine Rosenberg and J. Doug Tygar and Shankar Sastry and Daniel F. Sterne and Shyhtsun Felix Wu}, title = {Cyber defense technology networking and evaluation}, journal = {Commun. {ACM}}, volume = {47}, number = {3}, pages = {58--61}, year = {2004}, url = {https://doi.org/10.1145/971617.971646}, doi = {10.1145/971617.971646}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DregerFPS04, author = {Holger Dreger and Anja Feldmann and Vern Paxson and Robin Sommer}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Operational experiences with high-volume network intrusion detection}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {2--11}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030086}, doi = {10.1145/1030083.1030086}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DregerFPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hoti/WeaverESP04, author = {Nicholas Weaver and Dan Ellis and Stuart Staniford and Vern Paxson}, title = {Worms vs. perimeters: the case for hard-LANs}, booktitle = {Proceedings of the 12th Annual {IEEE} Symposium on High Performance Interconnects, {HOTIC} 2004, August 22-24, 2004, Stanford, CA, {USA}}, pages = {70--76}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CONECT.2004.1375206}, doi = {10.1109/CONECT.2004.1375206}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hoti/WeaverESP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/PangYBPP04, author = {Ruoming Pang and Vinod Yegneswaran and Paul Barford and Vern Paxson and Larry L. Peterson}, editor = {Alfio Lombardo and James F. Kurose}, title = {Characteristics of internet background radiation}, booktitle = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004}, pages = {27--40}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1028788.1028794}, doi = {10.1145/1028788.1028794}, timestamp = {Mon, 08 Jul 2019 07:25:59 +0200}, biburl = {https://dblp.org/rec/conf/imc/PangYBPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/Paxson04, author = {Vern Paxson}, editor = {Alfio Lombardo and James F. Kurose}, title = {Strategies for sound internet measurement}, booktitle = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004}, pages = {263--271}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1028788.1028824}, doi = {10.1145/1028788.1028824}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/Paxson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/Paxson04, author = {Vern Paxson}, editor = {Edward G. Coffman Jr. and Zhen Liu and Arif Merchant}, title = {Measuring adversaries}, booktitle = {Proceedings of the International Conference on Measurements and Modeling of Computer Systems, {SIGMETRICS} 2004, June 10-14, 2004, New York, NY, {USA}}, pages = {142}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1005686.1005688}, doi = {10.1145/1005686.1005688}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/Paxson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JungPBB04, author = {Jaeyeon Jung and Vern Paxson and Arthur W. Berger and Hari Balakrishnan}, title = {Fast Portscan Detection Using Sequential Hypothesis Testing}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {211--225}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301325}, doi = {10.1109/SECPRI.2004.1301325}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/JungPBB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WeaverSP04, author = {Nicholas Weaver and Stuart Staniford and Vern Paxson}, editor = {Matt Blaze}, title = {Very Fast Containment of Scanning Worms}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {29--44}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/weaver.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WeaverSP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worm/StanifordMPW04, author = {Stuart Staniford and David Moore and Vern Paxson and Nicholas Weaver}, editor = {Vern Paxson}, title = {The top speed of flash worms}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004, Washington, DC, USA, October 29, 2004}, pages = {33--42}, publisher = {{ACM} Press}, year = {2004}, url = {https://doi.org/10.1145/1029618.1029624}, doi = {10.1145/1029618.1029624}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/StanifordMPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worm/WeaverHKP04, author = {Nicholas Weaver and Ihab Hamadeh and George Kesidis and Vern Paxson}, editor = {Vern Paxson}, title = {Preliminary results using scale-down to explore worm dynamics}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004, Washington, DC, USA, October 29, 2004}, pages = {65--72}, publisher = {{ACM} Press}, year = {2004}, url = {https://doi.org/10.1145/1029618.1029628}, doi = {10.1145/1029618.1029628}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/WeaverHKP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/worm/2004, editor = {Vern Paxson}, title = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004, Washington, DC, USA, October 29, 2004}, publisher = {{ACM} Press}, year = {2004}, isbn = {1-58113-970-5}, timestamp = {Fri, 23 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MoorePSSSW03, author = {David Moore and Vern Paxson and Stefan Savage and Colleen Shannon and Stuart Staniford{-}Chen and Nicholas Weaver}, title = {Inside the Slammer Worm}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {33--39}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219056}, doi = {10.1109/MSECP.2003.1219056}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MoorePSSSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SommerP03, author = {Robin Sommer and Vern Paxson}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Enhancing byte-level network intrusion detection signatures with context}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {262--271}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948145}, doi = {10.1145/948109.948145}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SommerP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/PangP03, author = {Ruoming Pang and Vern Paxson}, editor = {Anja Feldmann and Martina Zitterbart and Jon Crowcroft and David Wetherall}, title = {A high-level programming environment for packet trace anonymization and transformation}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany}, pages = {339--351}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/863955.863994}, doi = {10.1145/863955.863994}, timestamp = {Sat, 30 Sep 2023 09:56:14 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/PangP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShankarP03, author = {Umesh Shankar and Vern Paxson}, title = {Active Mapping: Resisting {NIDS} Evasion without Altering Traffic}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {44--61}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199327}, doi = {10.1109/SECPRI.2003.1199327}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShankarP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worm/WeaverPSC03, author = {Nicholas Weaver and Vern Paxson and Stuart Staniford and Robert K. Cunningham}, editor = {Stuart Staniford and Stefan Savage}, title = {A taxonomy of computer worms}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Rapid Malcode, {WORM} 2003, Washington, DC, USA, October 27, 2003}, pages = {11--18}, publisher = {{ACM} Press}, year = {2003}, url = {https://doi.org/10.1145/948187.948190}, doi = {10.1145/948187.948190}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/WeaverPSC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/MahajanBFIPS02, author = {Ratul Mahajan and Steven M. Bellovin and Sally Floyd and John Ioannidis and Vern Paxson and Scott Shenker}, title = {Aggregate congestion control}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {1}, pages = {69}, year = {2002}, url = {https://doi.org/10.1145/510726.510743}, doi = {10.1145/510726.510743}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/MahajanBFIPS02a, author = {Ratul Mahajan and Steven M. Bellovin and Sally Floyd and John Ioannidis and Vern Paxson and Scott Shenker}, title = {Controlling high bandwidth aggregates in the network}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {3}, pages = {62--73}, year = {2002}, url = {https://doi.org/10.1145/571697.571724}, doi = {10.1145/571697.571724}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KohlerLPS02, author = {Eddie Kohler and Jinyang Li and Vern Paxson and Scott Shenker}, title = {Observed structure of addresses in {IP} traffic}, booktitle = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop, {IMW} 2002, Marseille, France, November 6-8, 2002}, pages = {253--266}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/637201.637242}, doi = {10.1145/637201.637242}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/KohlerLPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DonohoFSPCS02, author = {David L. Donoho and Ana Georgina Flesia and Umesh Shankar and Vern Paxson and Jason Coit and Stuart Staniford}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {17--35}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_2}, doi = {10.1007/3-540-36084-0\_2}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/raid/DonohoFSPCS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ZhangBPS02, author = {Yin Zhang and Lee Breslau and Vern Paxson and Scott Shenker}, editor = {Matthew Mathis and Peter Steenkiste and Hari Balakrishnan and Vern Paxson}, title = {On the characteristics and origins of internet flow rates}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 19-23, 2002, Pittsburgh, PA, {USA}}, pages = {309--322}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/633025.633055}, doi = {10.1145/633025.633055}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ZhangBPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StanifordPW02, author = {Stuart Staniford and Vern Paxson and Nicholas Weaver}, editor = {Dan Boneh}, title = {How to Own the Internet in Your Spare Time}, booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco, CA, USA, August 5-9, 2002}, pages = {149--167}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/sec02/staniford.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StanifordPW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigcomm/2002, editor = {Matthew Mathis and Peter Steenkiste and Hari Balakrishnan and Vern Paxson}, title = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 19-23, 2002, Pittsburgh, PA, {USA}}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/633025}, doi = {10.1145/633025}, isbn = {1-58113-570-X}, timestamp = {Wed, 21 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/AllmanP01, author = {Mark Allman and Vern Paxson}, title = {On estimating end-to-end network path properties}, journal = {Comput. Commun. Rev.}, volume = {31}, number = {2-Supplement}, pages = {124--151}, year = {2001}, url = {https://doi.org/10.1145/844193.844203}, doi = {10.1145/844193.844203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/AllmanP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Paxson01, author = {Vern Paxson}, title = {An analysis of using reflectors for distributed denial-of-service attacks}, journal = {Comput. Commun. Rev.}, volume = {31}, number = {3}, pages = {38--47}, year = {2001}, url = {https://doi.org/10.1145/505659.505664}, doi = {10.1145/505659.505664}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Paxson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/X01c, author = {Sally Floyd and Vern Paxson}, title = {Difficulties in simulating the internet}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {9}, number = {4}, pages = {392--403}, year = {2001}, url = {https://doi.org/10.1109/90.944338}, doi = {10.1109/90.944338}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/X01c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DuffieldPPT01, author = {Nick G. Duffield and Francesco Lo Presti and Vern Paxson and Donald F. Towsley}, title = {Inferring Link Loss Using Striped Unicast Probes}, booktitle = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications, Twentieth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Twenty years into the communications odyssey, Anchorage, Alaska, USA, April 22-26, 2001}, pages = {915--923}, publisher = {{IEEE} Comptuer Society}, year = {2001}, url = {https://doi.org/10.1109/INFCOM.2001.916283}, doi = {10.1109/INFCOM.2001.916283}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/DuffieldPPT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcommla/AllmanP01, author = {Mark Allman and Vern Paxson}, editor = {Julio Escobar}, title = {On estimating end-to-end network path properties}, booktitle = {Workshop on Data Communication in Latin America and the Caribbean, {SIGCOMM-LA} 2001, San Jose, Costa Rica, 2001}, pages = {124--151}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/371626.371774}, doi = {10.1145/371626.371774}, timestamp = {Fri, 03 Jun 2022 10:57:55 +0200}, biburl = {https://dblp.org/rec/conf/sigcommla/AllmanP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HandleyPK01, author = {Mark Handley and Vern Paxson and Christian Kreibich}, editor = {Dan S. Wallach}, title = {Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/handley.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HandleyPK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/imw/2001, editor = {Vern Paxson}, title = {Proceedings of the 1st {ACM} {SIGCOMM} Internet Measurement Workshop, {IMW} 2001, San Francisco, California, USA, November 1-2, 2001}, publisher = {{ACM}}, year = {2001}, isbn = {1-58113-435-5}, timestamp = {Wed, 13 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imw/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AdamsBFHTCDPMP00, author = {Andrew K. Adams and Tian Bu and Timur Friedman and Joseph Horowitz and Don Towsley and Ram{\'{o}}n C{\'{a}}ceres and Nick Duffield and Francesco Lo Presti and Sue B. Moon and Vern Paxson}, title = {The use of end-to-end multicast measurements for characterizing internal network behavior}, journal = {{IEEE} Commun. Mag.}, volume = {38}, number = {5}, pages = {152--159}, year = {2000}, url = {https://doi.org/10.1109/35.841840}, doi = {10.1109/35.841840}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AdamsBFHTCDPMP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangP00, author = {Yin Zhang and Vern Paxson}, editor = {Steven M. Bellovin and Greg Rose}, title = {Detecting Backdoors}, booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17, 2000}, publisher = {{USENIX} Association}, year = {2000}, url = {https://www.usenix.org/conference/9th-usenix-security-symposium/detecting-backdoors}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangP00a, author = {Yin Zhang and Vern Paxson}, editor = {Steven M. Bellovin and Greg Rose}, title = {Detecting Stepping Stones}, booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17, 2000}, publisher = {{USENIX} Association}, year = {2000}, url = {https://www.usenix.org/conference/9th-usenix-security-symposium/detecting-stepping-stones}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangP00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2780, author = {Scott O. Bradner and Vern Paxson}, title = {{IANA} Allocation Guidelines For Values In the Internet Protocol and Related Headers}, journal = {{RFC}}, volume = {2780}, pages = {1--10}, year = {2000}, url = {https://doi.org/10.17487/RFC2780}, doi = {10.17487/RFC2780}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2873, author = {Xipeng Xiao and Alan Hannan and Vern Paxson and Edward Crabbe}, title = {{TCP} Processing of the IPv4 Precedence Field}, journal = {{RFC}}, volume = {2873}, pages = {1--8}, year = {2000}, url = {https://doi.org/10.17487/RFC2873}, doi = {10.17487/RFC2873}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2873.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2960, author = {Randall R. Stewart and Qiaobing Xie and Ken Morneault and Chip Sharp and Hanns Juergen Schwarzbauer and Tom Taylor and Ian Rytina and Malleswar Kalla and Lixia Zhang and Vern Paxson}, title = {Stream Control Transmission Protocol}, journal = {{RFC}}, volume = {2960}, pages = {1--134}, year = {2000}, url = {https://doi.org/10.17487/RFC2960}, doi = {10.17487/RFC2960}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2988, author = {Vern Paxson and Mark Allman}, title = {Computing TCP's Retransmission Timer}, journal = {{RFC}}, volume = {2988}, pages = {1--8}, year = {2000}, url = {https://doi.org/10.17487/RFC2988}, doi = {10.17487/RFC2988}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Paxson99, author = {Vern Paxson}, title = {Bro: a system for detecting network intruders in real-time}, journal = {Comput. Networks}, volume = {31}, number = {23-24}, pages = {2435--2463}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(99)00112-7}, doi = {10.1016/S1389-1286(99)00112-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Paxson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Paxson99, author = {Vern Paxson}, title = {End-to-end internet packet dynamics}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {7}, number = {3}, pages = {277--292}, year = {1999}, url = {https://doi.org/10.1109/90.779192}, doi = {10.1109/90.779192}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/Paxson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/FrancisJPZGJ99, author = {Paul Francis and Sugih Jamin and Vern Paxson and Lixia Zhang and Daniel F. Gryniewicz and Yixin Jin}, title = {An Architecture for a Global Internet Host Distance Estimation Service}, booktitle = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999}, pages = {210--217}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/INFCOM.1999.749285}, doi = {10.1109/INFCOM.1999.749285}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/FrancisJPZGJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Paxson99, author = {Vern Paxson}, title = {Defending against network {IDS} evasion}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Paxson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Paxson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/AllmanP99, author = {Mark Allman and Vern Paxson}, editor = {Lyman Chapin and James P. G. Sterbenz and Guru M. Parulkar and Jonathan S. Turner}, title = {On Estimating End-to-End Network Path Properties}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 1999, Cambridge, Massachusetts, {USA}}, pages = {263--274}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/316188.316230}, doi = {10.1145/316188.316230}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/AllmanP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2498, author = {Jamshid Mahdavi and Vern Paxson}, title = {{IPPM} Metrics for Measuring Connectivity}, journal = {{RFC}}, volume = {2498}, pages = {1--10}, year = {1999}, url = {https://doi.org/10.17487/RFC2498}, doi = {10.17487/RFC2498}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2525, author = {Vern Paxson and Mark Allman and Scott Dawson and William C. Fenner and Jim Griner and Ian Heavens and Kevin Lahey and Jeffrey Semke and Bernie Volz}, title = {Known {TCP} Implementation Problems}, journal = {{RFC}}, volume = {2525}, pages = {1--61}, year = {1999}, url = {https://doi.org/10.17487/RFC2525}, doi = {10.17487/RFC2525}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2525.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2581, author = {Mark Allman and Vern Paxson and W. Richard Stevens}, title = {{TCP} Congestion Control}, journal = {{RFC}}, volume = {2581}, pages = {1--14}, year = {1999}, url = {https://doi.org/10.17487/RFC2581}, doi = {10.17487/RFC2581}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2581.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2678, author = {Jamshid Mahdavi and Vern Paxson}, title = {{IPPM} Metrics for Measuring Connectivity}, journal = {{RFC}}, volume = {2678}, pages = {1--10}, year = {1999}, url = {https://doi.org/10.17487/RFC2678}, doi = {10.17487/RFC2678}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2678.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/PaxsonMAM98, author = {Vern Paxson and Jamshid Mahdavi and Andrew K. Adams and Matt Mathis}, title = {An architecture for large-scale Internet measurement}, journal = {{IEEE} Commun. Mag.}, volume = {36}, number = {8}, pages = {48--54}, year = {1998}, url = {https://doi.org/10.1109/35.707817}, doi = {10.1109/35.707817}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/PaxsonMAM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/Paxson98, author = {Vern Paxson}, editor = {Mary K. Vernon and Garth Gibson and Guy Latouche and Scott T. Leutenegger}, title = {On Calibrating Measurements of Packet Transit Times}, booktitle = {Proceedings of the 1998 {ACM} {SIGMETRICS} joint international conference on Measurement and modeling of computer systems, {SIGMETRICS} '98 / {PERFORMANCE} '98, Madison, Wisconsin, USA, June 22-26, 1998}, pages = {11--21}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/277851.277865}, doi = {10.1145/277851.277865}, timestamp = {Fri, 30 Jul 2021 16:13:33 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/Paxson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Paxson98, author = {Vern Paxson}, editor = {Aviel D. Rubin}, title = {Bro: {A} System for Detecting Network Intruders in Real-Time}, booktitle = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX, USA, January 26-29, 1998}, publisher = {{USENIX} Association}, year = {1998}, url = {https://www.usenix.org/conference/7th-usenix-security-symposium/bro-system-detecting-network-intruders-real-time}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Paxson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-NI-9809030, author = {Vern Paxson}, title = {Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic}, journal = {CoRR}, volume = {cs.NI/9809030}, year = {1998}, url = {https://arxiv.org/abs/cs/9809030}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-NI-9809030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2330, author = {Vern Paxson and Guy Almes and Jamshid Mahdavi and Matt Mathis}, title = {Framework for {IP} Performance Metrics}, journal = {{RFC}}, volume = {2330}, pages = {1--40}, year = {1998}, url = {https://doi.org/10.17487/RFC2330}, doi = {10.17487/RFC2330}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2330.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2357, author = {Allison Mankin and Allyn Romanow and Scott O. Bradner and Vern Paxson}, title = {{IETF} Criteria for Evaluating Reliable Multicast Transport and Application Protocols}, journal = {{RFC}}, volume = {2357}, pages = {1--11}, year = {1998}, url = {https://doi.org/10.17487/RFC2357}, doi = {10.17487/RFC2357}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2357.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Paxson97, author = {Vern Paxson}, title = {Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic}, journal = {Comput. Commun. Rev.}, volume = {27}, number = {5}, pages = {5--18}, year = {1997}, url = {https://doi.org/10.1145/269790.269792}, doi = {10.1145/269790.269792}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Paxson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Paxson97, author = {Vern Paxson}, title = {End-to-end routing behavior in the Internet}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {5}, number = {5}, pages = {601--615}, year = {1997}, url = {https://doi.org/10.1109/90.649563}, doi = {10.1109/90.649563}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/Paxson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Paxson97, author = {Vern Paxson}, editor = {Christophe Diot and Christian Huitema and Scott Shenker and Martha Steenstrup}, title = {End-to-end Internet Packet Dynamics}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, September 14-18, 1997, Cannes, France}, pages = {139--152}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/263105.263155}, doi = {10.1145/263105.263155}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/Paxson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Paxson97a, author = {Vern Paxson}, editor = {Christophe Diot and Christian Huitema and Scott Shenker and Martha Steenstrup}, title = {Automated Packet Trace Analysis of {TCP} Implementations}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, September 14-18, 1997, Cannes, France}, pages = {167--179}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/263105.263160}, doi = {10.1145/263105.263160}, timestamp = {Wed, 21 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/Paxson97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/PaxsonF97, author = {Vern Paxson and Sally Floyd}, editor = {Sigr{\'{u}}n Andrad{\'{o}}ttir and Kevin J. Healy and David H. Withers and Barry L. Nelson}, title = {Why We Don't Know How To Simulate the Internet}, booktitle = {Proceedings of the 29th conference on Winter simulation, {WSC} 1997, Atlanta, GA, USA, December 7-10, 1997}, pages = {1037--1044}, publisher = {{ACM}}, year = {1997}, url = {https://doi.ieeecomputersociety.org/10.1109/WSC.1997.640988}, doi = {10.1109/WSC.1997.640988}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsc/PaxsonF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/Paxson96, author = {Vern Paxson}, editor = {Deborah Estrin and Sally Floyd and Craig Partridge and Martha Steenstrup}, title = {End-to-end Routing Behavior in the Internet}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 1996 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Stanford, CA, USA, August 26-30, 1996}, pages = {25--38}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/248156.248160}, doi = {10.1145/248156.248160}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/Paxson96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/PaxsonF95, author = {Vern Paxson and Sally Floyd}, title = {Wide area traffic: the failure of Poisson modeling}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {3}, number = {3}, pages = {226--244}, year = {1995}, url = {https://doi.org/10.1109/90.392383}, doi = {10.1109/90.392383}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/PaxsonF95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/WilliamsonWPM95, author = {Carey L. Williamson and Walter Willinger and Vern Paxson and Benjamin Melamed}, editor = {Blaine D. Gaither}, title = {Network Traffic Measurement and Modelling (Panel)}, booktitle = {Proceedings of the 1995 {ACM} {SIGMETRICS} joint international conference on Measurement and modeling of computer systems, Ottawa, Canada, May 15-19, 1995}, pages = {56--57}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/223587.223593}, doi = {10.1145/223587.223593}, timestamp = {Fri, 30 Jul 2021 16:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/WilliamsonWPM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/Paxson94, author = {Vern Paxson}, title = {Growth trends in wide-area {TCP} connections}, journal = {{IEEE} Netw.}, volume = {8}, number = {4}, pages = {8--17}, year = {1994}, url = {https://doi.org/10.1109/65.298159}, doi = {10.1109/65.298159}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/Paxson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/Paxson94, author = {Vern Paxson}, title = {Empirically derived analytic models of wide-area {TCP} connections}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {2}, number = {4}, pages = {316--336}, year = {1994}, url = {https://doi.org/10.1109/90.330413}, doi = {10.1109/90.330413}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/Paxson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/PaxsonF94, author = {Vern Paxson and Sally Floyd}, editor = {Jon Crowcroft}, title = {Wide-Area Traffic: The Failure of Poisson Modeling}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 1994 Conference on Communications Architectures, Protocols and Applications, London, UK, August 31 - September 2, 1994}, pages = {257--268}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/190314.190338}, doi = {10.1145/190314.190338}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/PaxsonF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/PaxsonS93, author = {Vern Paxson and Chris Saltmarsh}, title = {Glish: {A} User-Level Software Bus for Loosely-Coupled Distributed Systems}, booktitle = {Proceedings of the Usenix Winter 1993 Technical Conference, San Diego, California, USA, January 1993}, pages = {141--156}, publisher = {{USENIX} Association}, year = {1993}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/usenix/PaxsonS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.