Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    dataset    location   |
|   Citation Format:    abbreviated    complete   |
Year Author(s) Title Publication Dataset
2017
Phan, T.
Bao, N.
Park, M.
Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks Journal of Network and Computer Applications Anonymized Internet Traces
Denial of Service Attacks
2017
Huang, Q.
Lee, P.
Li, R.
Tang, L.
Chen, Y.
Zhang, G.
SketchVisor: Robust Network Measurement for Software Packet Processing ACM SIGCOMM Anonymized Internet Traces
2017
Meng, J.
Ren, F.
Lin, C.
Modeling and understanding burst transmission for energy efficient ethernet Computer Networks Anonymized Internet Traces
2017
Kim, T.
Lim, J.
Kim, J.
Cho, W.
Chung, E.
Lee, H.
Scalable Bandwidth Shaping Scheme via Adaptively Managed Parallel Heaps in Manycore-Based Network Processors ACM Transactions on Design Automation of Electronic Systems Anonymized Internet Traces
2017
Wu, N.
Bi, Y.
Michael, N.
Tang, A.
Doyle, J.
Matni, N.
HFTraC: High-frequency traffic control Intl Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2017
Vidal, J.
Orozco, A.
Villalba, L.
Adaptive artificial immune networks for mitigating DoS flooding attacks Swarm and Evolutionary Computation Anonymized Internet Traces
Denial of Service Attacks
2017
Muhammad, A.
Alameka, F.
Integrasi Metode Normalized Reelative Network Entropy dan Neural Network Backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS Jurnal Rekayasa Teknologi Informasi Anonymized Internet Traces
Denial of Service Attacks
2017
Mirkovic, J.
Bartlett, G.
Heidemann, J.
Shi, H.
Deng, X.
Do you see me now? Sparsity in passive observations of address liveness Network Traffic Measurement and Analysis Conference Anonymized Internet Traces
2017
Maltinsky, A.
Giladi, R.
Shavitt, Y.
On network neutrality measurements ACM Trans. on Intelligent Systems and Technology (TIST) Anonymized Internet Traces
2017
Lu, J.
Wan, Y.
Li, Y.
Zhang, C.
Dai, H.
Wang, Y.
Zhang, G.
Liu, B.
Ultra-Fast Bloom Filters using SIMD techniques International Symposium on Quality of Service (IWQoS) Anonymized Internet Traces
2017
Duan, H.
Yuan, X.
Wang, C.
LightBox: SGX-assisted Secure Network Functions at Near-native Speed arxiv.org Anonymized Internet Traces
2017
Deng, J.
Li, H.
Wang, K.
Ahn, G.
Zhao, Z.
Han, W.
On the Safety and Efficiency of Virtual Firewall Elasticity Control ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2017
Chainourov, B. Log analysis using Splunk Hadoop Connect Naval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2017
Albdair, M.
Addie, R.
Fatseas, D.
Social network behaviour inferred from O-D pair traffic Australian Journal of Telecommunications and the Digital Economy Anonymized Internet Traces
2017
Taghouti, M.
Lucani, D.
Fitzek, F.
Bouallegue, A.
Back to Results Random Linear Network Coding Schemes for Reduced Zero-Padding Overhead: Complexity and Overhead Analysis European Wireless Conference Anonymized Internet Traces
2017
Lopez, E.
Navarro, L.
Tight bounds for sketches in traffic validation International Conference on Networking, Sensing and Control Anonymized Internet Traces
2017
Anderson, D.
Bevan, P.
Lang, K.
Liberty, E.
Rhodes, L.
Thaler, J.
A High-Performance Algorithm for Identifying Frequent Items in Data Streams arxiv.org Anonymized Internet Traces
2017
Alonso, S.
Perez, M.
Veiga, M.
Garcia, C.
Optimizing Dual-Mode EEE Interfaces: Deep-Sleep is Healthy IEEE Transactions on Communications Anonymized Internet Traces
2017
Sivaraman, V.
Narayana, S.
Rottenstreich, O.
Muthukrishnan, S.
Rexford, J.
Heavy-Hitter Detection Entirely in the Data Plane Proceedings of the Symposium on SDN Research Anonymized Internet Traces
2017
Oeldemann, A.
Wild, T.
Herkersdorf, H.
Reducing data center resource over-provisioning through dynamic load management for virtualized network functions Architecture of Computing Systems (ARCS) Anonymized Internet Traces
2017
Mitzenmacher, M.
Pontarelli, S.
Reviriego, P.
Adaptive cuckoo filters arxiv.org Anonymized Internet Traces
2017
Lee, T.
Pappas, C.
Perrig, A.
Gligor, V.
Hu, Y.
The Case for In-Network Replay Suppression Asia Conference on Computer and Communications Security Anonymized Internet Traces
2017
Duffield, N.
Xu, Y.
Xia, L.
Ahmed, N.
Yu, M.
Stream Aggregation Through Order Sampling arxiv.org Anonymized Internet Traces
2017
Cascone, C.
Bifulco, R.
Pontarelli, S.
Capone, A.
Relaxing state-access constraints in stateful programmable data planes arxiv.org Anonymized Internet Traces
2017
Boro, D.
Bhattacharyya, D.K
DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks Microsystem Technologies Anonymized Internet Traces
Denial of Service Attacks
2017
Bhaya, W.
EbadyManaa, M.
DDoS attack detection approach using an efficient cluster analysis in large data scale New Trends in Information and Communications Technology Applications Anonymized Internet Traces
Denial of Service Attacks
2017
Bhaya, W.
Manaa, M.E.
DDoS attack detection approach using an efficient cluster analysis in large data scale Conference on New Trends in Information and Communications Technology Applications (NTICT) Anonymized Internet Traces
Denial of Service Attacks
2017
Varela, J.
Ros, P.
Reinventing NetFlow for OpenFlow Software-Defined Networks arxiv.org Anonymized Internet Traces
2017
Engel, D.
Malone, W.
Integrated Information as a Metric for Group Interaction: Analyzing Human and Computer Groups Using a Technique Developed to Measure Consciousness arxiv.org Anonymized Internet Traces
2017
Afek, Y.
Barr, A.
Feibish, S.
Schiff, L.
Detecting Heavy Flows in the SDN Match and Action Model arxiv.org Anonymized Internet Traces
2017
Sharafaldin, I.
Gharib, A.
Lashkari, A.
Ghorbani, A.
Towards a Reliable Intrusion Detection Benchmark Dataset Software Networking Anonymized Internet Traces
Denial of Service Attacks
2017
Remedios, R. On Improving DREAM Framework with Estimations and ProgME University of Ottawa Anonymized Internet Traces
2017
Luo, H.
Chen, Z.
Li, J.
Vasilakos, A.V.
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers IEEE Transactions on Information Forensics and Security Anonymized Internet Traces
Topology with Archipelago
2017
Lee, K. Towards precise network measurements Cornell University Anonymized Internet Traces
2017
Iordache, M.
Jouet, S.
Marnerides, A.
Pezaros, D.
Distributed, Multi-Level Network Anomaly Detection for Datacentre Networks IEEE ICC Next Generation Networking and Internet Symposium Anonymized Internet Traces
2017
Huong, T.
Thanh, N.
Software defined networking-based one-packet DDoS mitigation architecture Proceedings of the International Conference on Ubiquitous Information Management and Communication Anonymized Internet Traces
2017
Cenedese, A.
Tramarin, F.
Vitturi, S.
An Energy Efficient Ethernet Strategy Based on Traffic Prediction and Shaping IEEE Transactions on Communications Anonymized Internet Traces
UCSD Network Telescope
2017
Birkner, R.
Gupta, A.
Feamster, N.
Vanbever, L.
SDX-Based Flexibility or Internet Correctness?: Pick Two! Proceedings of the Symposium on SDN Research Anonymized Internet Traces
Topology with BGP
2016
Xia, Q.
Chen, T.
Xu, W.
CIDS: Adapting Legacy Intrusion Detection Systems to the Cloud with Hybrid Sampling International Conference on Computer and Information Technology Anonymized Internet Traces
2016
Saldana, J. Specification of Smart AP solutions What to do With the Wi-Fi Wild West Anonymized Internet Traces
2016
Lazarou, G.
Alam, M.
Picone, J.
Measuring the variability of CAIDA internet traffic traces International Conference on Computer and Information Technology Anonymized Internet Traces
2016
Hendawi, A.
Alali, F.
Wang, X.
Guan, Y.
Zhou, T.
Liu, X.
Basit, N.
Stankovic, J.
Hobbits: Hadoop and Hive based Internet traffic analysis IEEE International Conference on Big Data Anonymized Internet Traces
2016
Gharib, A.
Sharafaldin, I.
Lashkari, A.
Ghorbani, A.
An Evaluation Framework for Intrusion Detection Dataset International Conference on Information Science and Security Anonymized Internet Traces
Denial of Service Attacks
2016
Bayati, A.
Asghari, V.
Nguyen, K.
Cheriet, M.
Gaussian Process Regression Based Traffic Modeling and Prediction in High-Speed Networks Global Communications Conference Anonymized Internet Traces
2016
Basat, R.
Einziger, G.
Friedman, R.
Kassner, Y.
Randomized Admission Policy for Efficient Top-k and Frequency Estimation arxiv.org Anonymized Internet Traces
2016
Albdair, M.
Addie, R.
Fatseas, D.
Inference of social network behavior from Internet traffic traces International Telecommunication Networks and Applications Conference Anonymized Internet Traces
2016
Narayana, S.
Sivaraman, A.
Nathan, V.
Alizadeh, M.
Walker, D.
Rexford, J.
Jeyakumar, V.
Kim, C.
Hardware-Software Co-Design for Network Performance Measurement ACM Workshop on Hot Topics in Networks Pages Anonymized Internet Traces
2016
Moraney, J.
Raz, D.
Efficient detection of flow anomalies with limited monitoring resources Conference on Network and Service Management (CNSM) Anonymized Internet Traces
2016
Li, C.
Chen, Z.
Zheng, W.
Wu, Y.
Cao, J.
BAH: A Bitmap Index Compression Algorithm for Fast Data Retrieval Conference on Local Computer Networks Anonymized Internet Traces
2016
Lee, T.
Pappas, C.
Szalachowski, P.
Perrig, A.
Communication based on per-packet One-Time Addresses Intl Conf. on Network Protocols Anonymized Internet Traces
2016
Katta, N. Building efficient and reliable software-defined networks Princeton University Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
A probabilistic sampling method for efficient flow-based analysis Journal of Communications and Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Huang, Q.
Lee, P.
Toward high-performance distributed stream processing via approximate fault tolerance Proceedings of the Very Large Data Bases Endowment Anonymized Internet Traces
2016
Dey, P.
Yuksel, M.
CAR: Cloud-Assisted Routing Conference on Network Function Virtualization and Software Defined Networks Anonymized Internet Traces
2016
Aral, A. Resource Mapping Optimization for Distributed Cloud Services Istanbul Technical University Anonymized Internet Traces
2016
Nguyen, H.
Begin, T.
Busson, A.
Lassous, I.
Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networks Intl Conf. on Network and Service Management Anonymized Internet Traces
2016
Namayanja, J.
Janeja, V.
Characterization of Evolving Networks for Cybersecurity Information Fusion for Cyber-Security Analytics Anonymized Internet Traces
2016
Abt, S.
Baier, H.
Correlating network events and transferring labels in the presence of IP address anonymisation International Conference on Network and Service Management Anonymized Internet Traces
2016
Retnaswamy, B.
Ponniah, K.
A new ontology?based multi agent framework for intrusion detection International Journal of Communication Systems Anonymized Internet Traces
2016
Hintze, D
Rice, A.
Picky: efficient and reproducible sharing of large datasets using Merkle-trees Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2016
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
A Concise Forwarding Information Base for Scalable and Fast Flat Name Switching arxiv.org Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Sketch-guided filtering support for detecting superspreaders in high-speed networks Electronics Letters Anonymized Internet Traces
2016
Song, T.
Jiang, Z.
Wei, Y.
Shi, X.
Ma, X.
Ormond, O.
Traffic Aware Energy Efficient Router: Architecture, Prototype and Algorithms IEEE J. on Selected Areas in Communications Anonymized Internet Traces
2016
Mokgolodi, K. Traffic prediction in cloud computing using time series models University of Botswana Anonymized Internet Traces
2016
Liu, Z.
Manousis, A.
Vorsanger, X.
Sekar, V.
Braverman, V.
One sketch to rule them all: Rethinking network flow monitoring with UnivMon Proc. ACM SIGCOMM Anonymized Internet Traces
2016
Liu, P.
Li, Y.
Sang, Y.
Zhang, J.
Anonymity-Based Privacy Preserving Network Data Publication IEEE Trustcom/BigDataSE/I?SPA Anonymized Internet Traces
2016
Dao, N.-N.
Kim, J.
Park, M.
Cho, S.
Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks PLoS One Anonymized Internet Traces
2016
Phan, T.
Bao, N.
Park, M.
A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Anonymized Internet Traces
Denial of Service Attacks
2016
Phan, T.
Toan, T.
Tuyen, D.
Huong, T.
Nguyen, T.
OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks International Conference on Communications and Electronics Anonymized Internet Traces
Denial of Service Attacks
2016
Foroushani, V.A. A security framework based on flow marking IP-traceback techniques Dalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
Topology with Skitter
2016
Cermak, M.
Tovarnak, D.
Lastovicka, M.
Caleda, P.
A performance benchmark for NetFlow data analysis on distributed stream processing systems Network Operations and Management Symposium Anonymized Internet Traces
2016
Xu, X.
Zhang, J.
Li, Q.
Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone Traceback International Conference on Data Science in Cyberspace Anonymized Internet Traces
2016
Xing, C
Ding, K.
Hu, C.
Chen, M.
Sample and Fetch-Based Large Flow Detection Mechanism in Software Defined Networks IEEE Communications Letters Anonymized Internet Traces
2016
Sahri, N.
Okamura, K.
Adaptive Query Rate for Anomaly Detection with SDN International Journal of Computer Science and Network Security Anonymized Internet Traces
2016
Papapetrou, O.
Garofalakis, M.
Deligiannakis, A.
Sketching distributed sliding-window data streams VLDB J. Anonymized Internet Traces
2016
Huang, T.
Sethu, H.
Kandasamy, N.
A new approach to dimensionality reduction for anomaly detection in data traffic arxiv.org Anonymized Internet Traces
2016
Hofstede, R. Flow-based compromise detection Univ. of Twente Anonymized Internet Traces
2016
Einziger, G.
Fellman, B.
Friedman, R.
Kassner, Y.
ICE buckets: improved counter estimation for network measurement arxiv.org Anonymized Internet Traces
2016
Cermak, M.
Celeda, P.
Detecting advanced network threats using a similarity search Intl Conference on Autonomous Infrastructure, Management, and Security Anonymized Internet Traces
2016
Abada, A. Resource optimization of TCAM-based SDN measurements via diminishing-points autodetection European Conference on Networks and Communications Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Huang, C.-Y.
Chung, Y.-W.
Toward hardware support for a flexible sketch-based network traffic monitoring system IEEE Region 10 Symposium (TENSYMP) Anonymized Internet Traces
2016
Fairbanks, J. Graph analysis combining numerical, statistical, and streaming techniques Georgia Inst. of Technology Anonymized Internet Traces
2016
Asoni, D.E.
Chen, C.
Barrera, D.
Perrig, A.
On building onion routing into future Internet architectures Intl Workshop on Open Problems in Network Security (iNetSec) Anonymized Internet Traces
2016
Wu, Y.
Chen, Z.
Cao, J.
Li, H.
Li, C.
Wang, Y.
Zheng, W.
Chang, J.
Zhou, J.
Hu, Z.
Guo, J.
CAMP: A New Bitmap Index for Data Retrieval in Traffic Archival IEEE Communications Letters Anonymized Internet Traces
2016
Sahri, N. Research on Performance and Security Improvements by Software Defined Network Kyushu University Anonymized Internet Traces
2016
Pan, T.
Huang, T.
Liu, J.
Zhang, J.
Yang, F.
Li, S.
Liu, Y.
Fast Content Store Lookup Using Locality-Aware Skip List in Content-Centric Networks Conference on Computer Communications Workshops Anonymized Internet Traces
2016
Krishnan, D.
Quoc, D.
Bhatotia, P.
Fetzer, C.
Rodrigues, R.
IncApprox: A Data Analytics System for Incremental Approximate Computing Proceedings of the International Conference on World Wide Web Anonymized Internet Traces
2016
Bozakov, Z.
Rizk, A.
Bhat, D.
Zink, M.
Measurement-based flow characterization in centrally controlled networks Intl Conf. on Computer Communications Anonymized Internet Traces
2016
Ben-Basat, R.
Einziger, G.
Friedman, R.
Heavy hitters in streams and sliding windows IEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2016
Zhao, T.
Li, T.
Han, B.
Sun, Z.
Huang, J.
Design and implementation of Software Defined Hardware Counters for SDN Computer Networks Anonymized Internet Traces
2016
Qian, S.
Wu, G.
Huang, J.
Das, T.
Benchmarking modern distributed streaming platforms Intl Conference on Industrial Technology (ICIT) Anonymized Internet Traces
2016
Lim, H.
Sekar, V.
Abe, Y.
Anderson, D.G.
NetMemex: Providing full-fidelity traffic archival arxiv.org Anonymized Internet Traces
2016
Lei, C.
Zhang, H.
Liu, Y.
Du, X.
Net-flow fingerprint model based on optimization theory Arabian J. for Science and Engineering Anonymized Internet Traces
2016
Katta, N.
Alipourfard, O.
Rexfor, J.
Walker, D.
CacheFlow: Dependency-Aware Rule-Caching for Software-Defined Networks Proceedings of the Symposium on SDN Research Anonymized Internet Traces
2016
Boro, D.
Basumatary, H.
Goswami, T.
Bhattacharyya, D.K.
UDP flooding attack detection using information metric measure Proc. Intl Conference on ICT for Sustainable Development Anonymized Internet Traces
2016
Boro, D.
Basumatary, H.
Goswami, T.
Bhattacharyya, D.K.
UDP Flooding attack detection using information metric measure Proc. Intl Conference on ICT for Sustainable Development Anonymized Internet Traces
2016
Zhou, Z. Per-flow cardinality estimation based on virtual LogLog sketching University of Illinois at Urbana-Champaign Anonymized Internet Traces
2016
Xie, Y.
Wang, Y.
He, H.
Xiang, Y.
Yu, S.
Liu, X.
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior IEEE/ACM Transactions on Networking Anonymized Internet Traces
2016
Silva, J.M.C. A modular traffic sampling architecture for flexible network measurements Univ. do Minho, Braga, PT Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Intelligent Sampling Using an Optimized Neural Network Journal of Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Garroppo, R.G.
Nencioni, G.
Procissi, G.
Tavanti, L.
The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs J. Computer Networks Anonymized Internet Traces
2016
Chen, Y.
Wang, S.
A Novel Network Flow Watermark Embedding Model for Efficient Detection of Stepping-stone Intrusion Based on Entropy Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government Anonymized Internet Traces
2016
Chen, C.
Perrig, A.
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer Proceedings on Privacy Enhancing Technologies Anonymized Internet Traces
Topology with BGP
2016
Abaci, H.
Parr, G.
McClean, S.
Moore, A.
Krug, L.
Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirements Sustainable Computing: Informatics and Systems Anonymized Internet Traces
2015
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
SCREAM: Sketch Resource Allocation for Software-defined Measurement ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2015
Li, C.
Yang, J.
Wang, Z.
Li, F.
Yang, Y.
A lightweight DDoS flooding attack detection algorithm based on synchronous long flows Global Communications Conference (GLOBECOM) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Flow-based anomaly detection using semisupervised learning Intl Conference on Signal Processing and Communication Systems (ICSPCS) Anonymized Internet Traces
Denial of Service Attacks
2015
Chen, Z.
Luo, H.
Zhang, M.
Li, J.
Improving network security by dynamically changing path identifiers in future Internet Global Communications Conference (GLOBECOM) Anonymized Internet Traces
2015
Chen, X.-F.
Yu, S.-Z.
CIPA: A collaborative intrusion prevention architecture for programmable network and SDN Computers and Security Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Zhang, Z.
Guo, Z.
Yang, Y.
Bounded-reorder packet scheduling in optical cut-through switch IEEE Trans. on Parallel and Distributed Systems Anonymized Internet Traces
2015
Venkatesh, B.
Choudhury, S.H.
Nagajara, S.
Balakrishnan, N.
BotSpot: fast graph based identification of structured P2P bots J. Computer Virology and Hacking Techniques Anonymized Internet Traces
2015
Righi, M.
Nunes, R.
Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas Simposio Brasileiro em Seguranca da Informacao e Sistemas Anonymized Internet Traces
Denial of Service Attacks
2015
Liu, Z.
Vorsanger, G.
Braverman, V.
Sekar, V.
Enabling a 'RISC' approach for Software-Defined Monitoring using universal streaming Proc. ACM Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Lei, C.
Zhang, H.
Li, M.
Liu, Y.
Network watermarking model based on optimization theory Intl Conference on Cloud Computing and Big Data (CCBD) Anonymized Internet Traces
2015
Huang, T.
Sethu, H.
Kandasamy, N.
A fast algorithm for detecting anomalous changes in network traffic Intl Conference on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Alipourfard, O.
Moshref, M.
Yu, M.
Re-evaluating measurement algorithms in software ACM SIGCOMM HotNets Workshop Anonymized Internet Traces
2015
Alipourfard, O.
Moshref, M.
Yu, M.
Re-evaluating measurement algorithms in software Proc. Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Deterministic flow marking for IPv6 traceback (DFM6) Intl Conference on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Wu, H. Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity region Univ. Illinois, Urbana-Champaign Anonymized Internet Traces
2015
Saldana, J.
Forcen, I.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Improving network efficiency with Simplemux Intl Conference on Computer and Information Technology (CIT) Anonymized Internet Traces
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A method to protect Bloom filters from soft errors Intl Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) Anonymized Internet Traces
2015
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, M.
Frame coalescing in dual-mode EEE arxiv.org Anonymized Internet Traces
2015
Erazo, M.A.
Rong, R.
Liu, J.
Symbiotic network simulation and emulation ACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2015
Chen, C.
Asoni, D.E.
Barrera, D.
Danezis, G.
Perrig, A.
HORNET: High-speed onion routing at the network layer Conference on Computer and Communications Security (CCS) Anonymized Internet Traces
Topology with BGP
2015
Basescu, C.
Reischuk, R.M.
Szalachowski, P.
Perrig, A.
Zhang, Y.
Hsiao, H.-C.
Kubota, A.
Urakawa, J.
SIBRA: Scalable Internet Bandwidth Reservation Architecture arxiv.org Anonymized Internet Traces
Topology with BGP
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Probabilistic flow marking for IP traceback (PFM) Intl Workshop on Reliable Networks Design and Modeling (RNDM) Anonymized Internet Traces
Denial of Service Attacks
2015
Rivetti, N.
Busnel, Y.
Mostefaoui, A.
Efficiently Summarizing Data Streams over Sliding Windows International Symposium on Network Computing and Applications Anonymized Internet Traces
Denial of Service Attacks
2015
Rivetti, N.
Busnel, Y.
Mostefaoui, A.
Efficiently summarizing data streams over sliding windows Intl Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Performance of Flow-based Anomaly Detection in Sampled Traffic Journal of Networks Anonymized Internet Traces
Denial of Service Attacks
2015
de Oliviera Schmidt, R.
Sadre, R.
Sperotto, A.
van den Berg, H.
Pras, A.
Impact of packet sampling on link dimensioning IEEE Trans. on Network and Service Management Anonymized Internet Traces
2015
Anceaume, E.
Busnel, Y.
Rivetti, N.
Sericola, B.
Identifying global icebergs in distributed streams Symp. on Reliable Distributed Systems (SRDS) Anonymized Internet Traces
Denial of Service Attacks
2015
Moreno, V.
Leira, R.
Gonzalez, I.
Gomez-Arribas, F.J.
Towards high-performance network processing in virtualized environments Intl Symp. on High Performance Computing and Communications (HPCC) Anonymized Internet Traces
2015
Moreno, V.
Ramos, J.
Santiado del Rio, P.M.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Commodity packet capture engines: tutorial, cookbook and applicability IEEE Communications Surveys and Tutorials Anonymized Internet Traces
2015
Liu, Q.
Lui, J.C.S.
He, C.
Pan, L.
Fan, W.
Shi, Y.
SAND: A fault-tolerant streaming architecture for network traffic analytics J. Systems and Software Anonymized Internet Traces
2015
Li, X.
Qian, C.
Low-complexity multi-resource packet scheduling for network function virtualization Conf. on Computer Communications Anonymized Internet Traces
2015
Li, X.
Qian, C.
The virtual network function placement problem International Conference on Computer Communications Student Workshops Anonymized Internet Traces
2015
Popescu, I.
Miyazaki, T.
Chino, M.
Wang, X.
Okamoto, S.
Gravey, A.
Gravey, P.
Veeraraghavan, M.
Brandt-Pearce, M.
Yamanaka, N.
Application-centric energy-efficient Ethernet with quality of service support Electronics Letters Anonymized Internet Traces
2015
Ding, H.
Rabinovich, M.
TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurement ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2015
Osuna, R. Estudio De Captura y Almacenamiento De Trafico En Redes Fisicas y Virtuales Multi-Gigabit Universidad Autonoma de Madrid Anonymized Internet Traces
2015
Addanki, R.
Maji, S.
Veeraraghavan, M.
Tracy, C.
A measurement-based study of big-data movement Conference on Networks and Communications (EuCNC) Anonymized Internet Traces
2015
Zhang, Z.
Wang, B.
Lan, J.
Identifying elephant flows in internet backbone traffic with bloom filters and LRU Computer Communications Anonymized Internet Traces
2015
Wellem, T.
Lai, Y.-K.
Chung, W.-Y.
A software defined sketch system for traffic monitoring Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2015
Sharma, S. Shuffling based mechanism for DDoS prevention on cloud environment National Institute of Technology, Rourkela Anonymized Internet Traces
Denial of Service Attacks
2015
Namayanja, J.M.
Janeja, V.P.
Change detection in evolving computer networks: Changes in densification and diameter over time Intl Conference on Intelligence and Security Informatics (ISI) Anonymized Internet Traces
2015
Mijumbi, R.
Serrat, J.
Gorricho, J.-L.
Self-managed resources in network virtualisation environments Intl Symp. on Integrated Network Management (IM) Anonymized Internet Traces
2015
Ayesta, U.
Bertaux, L.
Carvin, D.
Non-intrusive scheduling of TCP flows IFIP Networking Conference (IFIP Networking) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Investigating unique flow marking for tracing back DDoS attacks Intl Symp. on Integrated Network Management (IM) Anonymized Internet Traces
Denial of Service Attacks
2015
Steinert, R.
Hess, A.
Observing software-defined networks using a decentralized link monitoring approach Conference on Network Softwarization (NetSoft) Anonymized Internet Traces
2015
Saldana, J.
de Hoz, D.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Pascual, F.
Lopez, D.R.
Florez, D.
Castell, J.A.
Nunez, M.
Small-packet flows in Software Defined Networks: Traffic profile optimization J. of Networks Anonymized Internet Traces
2015
Balkanli, E. A comprehensive study on one-way backscatter traffic analysis Dalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A synergetic use of Bloom filters for error detection and correction IEEE Trans. on Very Large Scale Integration (VLSI) Systems Anonymized Internet Traces
2015
Papapetrou, O.
Garofalakis, M.
Deligiannakis, A.
Sketching distributed sliding-window data streams The Very Large Data Bases Journal Anonymized Internet Traces
2015
Fairbanks, J.
Kannan, R.
Park, H.
Bader, D.
Behavioral clusters in dynamic graphs Parallel Computing Anonymized Internet Traces
2015
Chen, J.
Addie, R.G.
Zukerman, M.
Neame, T.D.
Performance evaluation of a queue fed by a Poisson Lomax burst process IEEE Communications Letters Anonymized Internet Traces
2015
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Shen, M.
Xu, K.
Yang, K.
A neuro-fuzzy approach to self-management of virtual network resources J. Expert Systems with Applications Anonymized Internet Traces
2015
Singh, S.A. Techniques for online analysis of large distributed data Iowa State Univ., Ames, IO, US Anonymized Internet Traces
2015
Sahri, N.M.
Okamura, K.
Adaptive anomaly detection for SDN Proc. Asia-Pacific Advanced Network Anonymized Internet Traces
2015
Radan, M.
Keslassy, I.
Tapping into the Router's Unutilized Processing Power IEEE Conference on Computer Communications Anonymized Internet Traces
2015
Martin, J. Sistema de Deteccion de Ataques DDoS en Tor Universidad Complutense de Madrid Anonymized Internet Traces
Denial of Service Attacks
2015
Kulbis, A. Paskirstyto prievadu skenavimo ataku aptikimas tinklo srautuose Kauno Technologijos Universitetas Anonymized Internet Traces
2015
Danelutto, M.
De Sensi, D.
Torquati, M.
Energy driven adaptivity in stream parallel computations Euromicro International Conference on Parallel, Distributed, and Network-Based Processing Anonymized Internet Traces
2014
Lu, R.
Wu, G.
Xie, B.
Hu, J.
StreamBench: Towards benchmarking modern distributed stream computing frameworks Intl Conf on Utility and Cloud Computing (UCC) Anonymized Internet Traces
2014
Barik, R.
Divakaran, D.M.
Development and experimentation of TCP initial window function Intl Conference on Network of the Future (NOF) Anonymized Internet Traces
2014
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
The CB tree: a practical concurrent self-adjusting search tree Distributed Computing Anonymized Internet Traces
2014
Wang, H.
Lee, K.S.
Li, E.
Lum, C.L.
Tang, A.
Weatherspoon, K.
Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networks Internet Measurement Conference (IMC) Anonymized Internet Traces
2014
Lai, Y.
Wellem, T.
You, H.-P.
Hardware-assisted estimation of entropy norm for high-speed network traffic IET Electronics Lett. Anonymized Internet Traces
2014
Xiao, Q.
Qiao, Y.
Zhen, M.
Chen, S.
Estimating the persistent spreads in high-speed networks IEEE Intl Conference on Network Protocols (ICNP) Anonymized Internet Traces
2014
Tuyen, D.V.
Truong, T.H.
Hung, N.T.
Puype, B.
Colle, D.
Steenhaut, K.
Thanh, N.H.
An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacks Intl Conference on Advanced Technologies for Communications (ATC) Anonymized Internet Traces
2014
Song, T.
Shi, X.
Ma, X.
Fine-grained power scaling algorithms for energy efficient routers Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2014
Pontarelli, S.
Reviriego, P.
Maestro, J.A.
Efficient flow sampling with back-annotated cuckoo hashing IEEE Communications Letters Anonymized Internet Traces
2014
Namayanja, J.M.
Janeja, V.P.
Change detection in temporally evolving computer networks: A big data framework Conference on Big Data Anonymized Internet Traces
2014
Korosi, A.
Tapolcai, J.
Mihalka, B.
Meszaros, G.
Retvari, G.
Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneously Intl Conference on Network Protocols (ICNP) Anonymized Internet Traces
2014
Gardiner, J.
Nagaraja, S.
On the reliability of network measurement techniques Used for malware traffic analysis Cambridge Intl Workshop on Security Protocols Anonymized Internet Traces
2014
Yu, Y.
Qian, C.
Li, X.
Distributed and collaborative traffic monitoring in software defined networks Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2014
Tunc, C.
Akar, N.
Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networks Photonic Network Communications Anonymized Internet Traces
2014
Privalov, A.Y.
Tsarev, A.
Analysis and simulation of WAN traffic by self-similar traffic model with OMNET Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Pecori, R
Veltri, L.
A statistical blind technique for recognition of internet traffic with dependence enforcement Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
DREAM: Dynamic Resource Allocation for Software-defined Measurement ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2014
McHale, L.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for SDN data plane matching ICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN) Anonymized Internet Traces
2014
Luao, H.
Cui, J.
Chen, G.
Chen, Z.
Zhang, H.
On the applicability of software defined networking to large scale networks Intl Conference on Computer Communication and Networks (ICCCN) Anonymized Internet Traces
2014
Barati, M.
Abdullah, A.
Udzir, N.I.
Mahmod, R.
Mustapha, N.
Distributed Denial of Service detection using hybrid machine learning technique Intl Symp. on Biometrics and Security Technologies (ISBAST) Anonymized Internet Traces
Denial of Service Attacks
2014
Schmidt, R.
Sadre, R.
A. Sperotto, A.
van den Berg, H.
Pras, A.
A hybrid procedure for efficient link dimensioning Computer Networks Anonymized Internet Traces
2014
Moreno, V.
Santiado del Rio, P.M.
Ramos, J.
Muelas, B.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems Intl J. Network Management Anonymized Internet Traces
2014
Frangoudis, P.A.
Hadjadj-Aoul, Y.
Ksentini, A.
Rubino, G.
Etame, T.
Brun, C.
PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top services Intl Conference on Information, Intelligence, Systems and Applications (IISA) Anonymized Internet Traces
2014
Shahzad, M.
Liu, A.X.
Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping ACM Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2014
Schmidt, R.
Sadre, R.
Melnikov, N.
Schonwalder, J.
Pras, A.
Linking network usage patterns to traffic Gaussianity Proc. IFIP Networking Conf. Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Contributions to efficient resource management in virtual networks IFIP Intl Conference on Autonomous Infrastructure, Management and Security (AIMS) Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
Famaey, J.
De Turck, F.
Neural network-based autonomous allocation of resources in virtual networks European Conference on Networks and Communications (EuCNC) Anonymized Internet Traces
2014
Hsiao, H.-C. Toward a highly available future Internet Carnegie Mellon Univ. Anonymized Internet Traces
Topology with BGP
Topology with Skitter
2014
Zhou, X.
Petrovic, M.
Eskridge, T.
Carvalho, M.
Tao, X.
Exploring Netflow data using Hadoop ASE BigData/SocialCom/Cybersecurity Conf. Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Energy efficient exact matching for flow identification with cuckoo affinity hashing IEEE Communications Letters Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
De Turck, F.
Latre, S.
Design and evaluation of learning algorithms for dynamic resource management in virtual networks IEEE/IFIP Network Operations and Management Symp. (NOMS) Anonymized Internet Traces
2014
Liu, B.
Lu, J.
Kai, Y.
Wang, Y.
Pan, T.
Power-proportional router: Architectural design and experimental evaluation Quality of Service (IWQoS) Symp. Anonymized Internet Traces
2014
Ekiz, N.
Amer, P.D.
Transport layer reneging Computer Communications Anonymized Internet Traces
2014
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
TDFA: Traceback-based defense against DDoS flooding attacks IEEE Int Conference on Advanced Information Networking and Applications (AINA) Anonymized Internet Traces
Denial of Service Attacks
2014
Wang, H.
Lee, K.S.
Weatherspoon, H.
PHY convert channels: Can you see the idles? Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Handigol, N.
Heller, B.
Jeyakumar, V.
Mazieres, D.
McKeown, N.
I know what your packet did last hop: Using packet histories to troubleshoot networks Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Masud, M.M.
Mustafa, U.
Trabelsi, Z.
A data driven firewall for faster packet filtering Intl Conference on Communications and Networking (ComNet) Anonymized Internet Traces
2014
Kim, J.-S.
Ko, M.-C.
Nam, J.
Kim, J.
Bitmap-based prefix caching for fast IP lookup KSII Trans on Internet and Information Systems Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Efficient implementation of error correction codes in hash tables Microelectronics Reliability Anonymized Internet Traces
2014
Kudo, T.
Takin, T.
On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling Intl J. of Network Management Anonymized Internet Traces
UCSD Network Telescope
2013
Zhang, Y.
Sun, Y.
Zhang, J.
Xu, J.
Wu, Y.
An efficient framework for parallel and continuous frequent item monitoring Concurrency Computation: Practice and Experience Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Socket overloading for fun and cache-poisoning Annual Computer Security Applications Conference (ACSAC) Anonymized Internet Traces
2013
Larsen, R. Slow port scanning with Bro Gjovik Univ. College, Gjovik, Norway Anonymized Internet Traces
2013
Chen, J.
Addie, R.G.
Zukerman, M.
Performance evaluation and service rate provisioning for a queue with fractional Brownian input Performance Evaluation Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation EURASIP Journal on Information Security Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Sperotto, A.
Pras, A.
Lightweight link dimensioning using sFlow sampling Intl Conference on Network and Services Management (CNSM) Anonymized Internet Traces
2013
Retvari, G.
Tapolcai, J.
Korosi, A.
Majdan, A.
Heszberger, Z.
Compressing IP forwarding tables: towards entropy bounds and beyond ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2013
Lee, M.
Duffield, N.
Kompella, R.R.
High-fidelity per-flow delay measurements with reference latency interpolation IEEE/ACM Trans. on Networking Anonymized Internet Traces
2013
Iqbal, M.F.
Holt, J.
Ryoo, J.H.
John, L.K.
de Veciana, G.
Flow migration on multicore network processors: Load balancing while minimizing packet reordering Intl Conference on Parallel Processing (ICPP) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Shulman, H.
Off-path hacking: the illusion of challenge-response authentication IEEE Security and Privacy Anonymized Internet Traces
2013
Casey, C.J.
Sutton, A.
Dos Reis, G.
Sprintson, A.
Eliminating network protocol vulnerabilities through abstraction and systems language design Conference on Network Protocols (ICNP) Anonymized Internet Traces
2013
Karpowicz, M. On the design of energy-efficient service rate control mechanisms: CPU frequency control for Linux Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC) Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Vulnerable delegation of DNS resolution European Symp. on Research in Computer Security (ESORICS) Anonymized Internet Traces
2013
Garfinkel, S.L.
Shick, M.
Passive TCP reconstruction and forensic analysis with tcpflow Naval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2013
Frangoudis, P.A.
Ksentini, A.
Hadjadj-Aoul, Y.
Boime, G.
PTPv2-based metwork load estimation Intl IEEE Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS) Anonymized Internet Traces
2013
Moshref, M.
Yu, M.
Govindan, R.
Resource/accuracy tradeoffs in software-defined measurement ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2013
Megyesi, P.
Molnar, S.
Analysis of elephant users in broadband network traffic EUNICE/IFIP WG 6.6 Intl Workshop: Advances in Communication Networking Anonymized Internet Traces
2013
Iqbal, M.F. Workload-aware network processors: improving performance while minimizing power consumption Univ. Texas, Austin, TX, US Anonymized Internet Traces
2013
Hu, Y.-H. A fluid-based approach for modeling network activities J Electr Electron Syst Anonymized Internet Traces
2013
Coelho, N.
Salvador, P.
Nogueira, A.
Inter-operator traffic differentiation based on multiscale analysis ThinkMind, Intl Conference on Advances in Future Internet (AFIN) Anonymized Internet Traces
2013
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Reducing the cost of implementing error correction codes in content addressable memories IEEE Trans. on Circuits and Systems II: Express Briefs Anonymized Internet Traces
2013
Guo, Z.
Yang, Y.
High-speed multicast scheduling for all-optical packet switches Conference on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2013
Ghoshal, P.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for Software Defined Firewalls IEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2013
Santiago, S.S. Latency estimation of IP flows using NetFlow Univ. Politecnica de Catalunya, Barcelona, Spain Anonymized Internet Traces
2013
Namayanja, J.M.
Janeja, V.P.
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks IEEE Conference on Intelligence and Security Informatics Anonymized Internet Traces
2013
Leira, R.
Gomez, P.
Gonzalez, I.
Lopez de Vergara, J.E.
Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardware Conference on Smart Communications in Network Technologies (SaCoNeT) Anonymized Internet Traces
2013
Joslyn, C.
Choudhury, S.
Haglin, D.
Howe, B.
Nickless, B.
Olsen, B.
Massive scale cyber traffic analysis: A driver for graph database research Intl Workshop on Graph Data Management Experiences and Systems (GRADES) Anonymized Internet Traces
Denial of Service Attacks
2013
Iacovazzi, A.
Baiocchi, A.
Investigating the trade-off between overhead and delay for full packet traffic privacy Intl Conf on Communications (ICC) Anonymized Internet Traces
2013
Handigol, N.A. Using packet histories to troubleshoot networks Stanford Univ., Stanford, CA, US Anonymized Internet Traces
2013
Fokkema, J. A study of impacts of flow timeouts on link provisioning Twente Student Conference on IT Anonymized Internet Traces
2013
Clegg, R.G.
Araujo, J.T.
Landa, R.
Mykoniati, E.
Griffin, D.
Rio, M.
On the relationship between fundamental measurements in TCP flows IEEE Conference on Communications (ICC) Anonymized Internet Traces
2013
Zadnik, M. Optimization of network flow monitoring Information Sciences and Technologies Bulletin of the ACM Slovakia Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Pras, A.
Gaussian traffic revisited IFIP Networking Conf. Anonymized Internet Traces
2013
Santiago del Rio, P.M. Internet traffic classification for high-performance and off-the-shelf systems Univ. Autonoma de Madrid Anonymized Internet Traces
2013
Petkov, V.
Rajagopal, R.
Obraczka, K.
Characterizing per-application network traffic using entropy ACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2013
Liu, H. A collaborative defense framework against DDoS attacks in networks Washington State Univ., Pullman, WA, US Anonymized Internet Traces
Denial of Service Attacks
2013
Erazo, M.A.
Liu, J.
Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS) Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
On evaluating IP traceback schemes: a practical perspective IEEE Security and Privacy Workshops Anonymized Internet Traces
2013
Yu, M.
Jose, L.
Miao, R.
Software defined traffic measurement with OpenSketch Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Fragmentation considered vulnerable ACM Trans. on Information and System Security (TISSEC) Anonymized Internet Traces
2013
Ahmadzadeh, S.A.
Agnew, G.
Turbo covert channel: An iterative framework for covert communication over data networks Proc. IEEE INFOCOM Anonymized Internet Traces
2013
Hofstede, R.
Drago, I.
Sperotto, A.
Sadre, R.
Pras, A.
Measurement artifacts in NetFlow data Passive and Active Measurement (PAM) Anonymized Internet Traces
2013
He, G.-F.
Yang, M.
Luo, J.-Z.
Zhang, L.
Online identification of Tor anonymous communication traffic J. of Software Anonymized Internet Traces
2013
Gangam, S.
Chandrashekar, J.
Cunha, I.
Kurose, J.
Estimating TCP latency approximately with passive measurements Passive and Active Measurement (PAM) Anonymized Internet Traces
2013
Dautrich Jr, J.L.
Ravishankar, C.V.
Inferential time-decaying Bloom filters Intl Conference on Extending Database Technology (EDBT) Anonymized Internet Traces
2013
De Sensi, D. DPI over commodity hardware: implementation of a scalable framework using FastFlow Univ. Pisa, Pisa, IT Anonymized Internet Traces
2013
Kim, S.
Nam, S.Y.
A long range dependent Internet traffic model using unbounded Johnson distribution IEICE Trans. on Communications Anonymized Internet Traces
2012
Liu, W.
Yan, Y.
Dong, T.
Run-hua, T.
Self-similarity and heavy-tail of ICMP traffic J. Computers Anonymized Internet Traces
2012
Detal, G.
Paasch, C.
van der Linden, S.
Merindol, P.
Avoine, G.
Bonaventure, O.
Revisiting flow-based load balancing: Stateless path selection in data center networks Computer Networks Anonymized Internet Traces
2012
Coelho, N.M.M. Profiling de trafego inter-operador baseado em analise multi-escalar Univ. de Aveiro Anonymized Internet Traces
2012
Basaran, C.
Kang, K.-D.
Zhou, Y.
Suzer, M.H.
Adaptive load shedding via fuzzy control in data stream management systems Intl Conference on Service-Oriented Computing and Applications (SOCA) Anonymized Internet Traces
2012
Santiago del Rio, P.M.
Rossi, D.
Gringoli, F.
Nava, L.
Salgarelli, L.
Aracil, J.
Wire-speed statistical classification of network traffic on commodity hardware Internet Measurement Conference (IMC) Anonymized Internet Traces
2012
Moriyama, E.
Takahashi, T.
Miyamoto, D.
DNS-based defense against IP spoofing attacks Conference on Neural Information Processing Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
A GI/G/1 model for 10 Gb/s energy efficient ethernet links IEEE Trans. on Communications Anonymized Internet Traces
2012
Ekiz, N. Transport layer reneging Univ. Delaware Anonymized Internet Traces
2012
Zhang, X.
Ding, W.
Comparative research on internet flows characteristics Conference on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics Anonymized Internet Traces
2012
Weinberg, Z.
Wang, J.
Yegneswaran, V.
Briesemeister, L.
Cheung, S.
Wang, F.
Boneh, D.
StegoTorus: a camouflage proxy for the Tor anonymity system ACM Conference on Computer and Communications Security (CCS) Anonymized Internet Traces
2012
Moreno, V.
Santiago del Rio, P.M.
Ramos, J.
Garnica, J.
Garcia-Dorado, J.L.
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines IEEE Communications Lett. Anonymized Internet Traces
2012
Kim, J.
Park, M.
Han, S.
Kim, J.
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup IEICE Trans. on Communications Anonymized Internet Traces
2012
Kato, M.
Cho, K.
Honda, M.
Tokuda, H.
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation Workshop on Managing Systems Automatically and Dynamically Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Efficient traffic aware power management in multicore communications processors ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Cao, Z.
Panwar, S.S.
Efficient buffering and scheduling for a single-chip crosspoint-queued switch ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
CBTree: A practical concurrent self-adjusting search tree Distributed Computing (DISC) Anonymized Internet Traces
2012
Xiaojuan, S.
Bin, L.
Stream data analysis for backbone network intrusion detection system Conference on Oxide Materials for Electronic Engineering (OMEE) Anonymized Internet Traces
2012
Mogul, J.C.
Congdon, P.
Hey, you darned counters!: get off my ASIC! ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2012
Lin, Z
Hopper, N.
New attacks on timing-based network flow watermarks Usenix Security Conference (SEC) Anonymized Internet Traces
2012
He, P.
Guan, H.
Xie, G.
Salamatian, K.
Evaluating and optimizing IP lookup on many core processors IEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Gringoli, F.
Nava, L.
Este, A.
Salgarelli, L.
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2012
Detti, A.
Pomposini, M.
Blefari-Melazzi, N.
Salsano, S.
Supporting the Web with an information centric network that routes by name Computer Networks Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Multiadaptive sampling for lightweight network measurements IEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Lin, Z. Toward building practical privacy enhancing technologies Univ. Minnesota Anonymized Internet Traces
2012
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architectures Computer Communications Anonymized Internet Traces
2012
Zhao, Y.
Yuan, R.
Wang, W.
Meng, D.
Zhang, S.
Li, J.
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic Conference on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2012
Yang, T.
Duan, R.
Lu, J.
Zhang, S.
Dai, H.
Liu, B.
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy Conference on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Optimizing network measurements through self-adaptive sampling Conference on High Performance Computing and Communication (HPCC) Anonymized Internet Traces
2012
Qardaji, W.
Li, N.
Anonymizing network traces with temporal pseudonym consistency Conference on Distributed Computing Systems Workshops (ICDCSW) Anonymized Internet Traces
2012
Markman, M.A.J.
Tokheim, S.
Reliable broadcast contribution over the public Internet Norwegian Univ. of Science and Technology Anonymized Internet Traces
2012
Kuang, J.
Bhuyan, L.
Klefstad, R.
Traffic-aware power optimization for network applications on multicore servers Annual Design Automation Conf. Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Bounded energy consumption with dynamic packet coalescing Networks and Optical Communications (NOC) Anonymized Internet Traces
2012
Hanay, Y.S.
Li, W.
Tessier, R.
Wolf, T.
Saving energy and improving TCP throughput with rate adaptation in Ethernet IEEE Conference on Communications (ICC) Anonymized Internet Traces
2012
Guo, Z.
Yang, Y.
High speed multicast scheduling in hybrid optical packet switches with guaranteed latency IEEE Trans. on Computers Anonymized Internet Traces
2012
Fragni, C.
Costa, L.H.M.K.
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers Computer Networks Anonymized Internet Traces
2012
Davy, A.
Jennings, B.
Botvich, D.
QoSPlan: A measurement based quality of service aware network planning framework J. Network and Systems Management Anonymized Internet Traces
2012
Melazzi, N.B.
A. Detti, A.
Pomposini, M.
Scalability measurements in an information-centric network Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project Anonymized Internet Traces
2012
Korenfeld, B. CBTree: A practical concurrent self-adjusting search tree Tel-Aviv Univ., Israel Anonymized Internet Traces
2012
Fan, J.
Hu, C.
He, K.
Jiang, J.
Liuy, B.
Reducing power of traffic manager in routers via dynamic on/off-chip scheduling IEEE INFOCOM Anonymized Internet Traces
2012
Zhang, H.
Lu, G.
Qassrawi, M.T.
Zhang, Y.
Yu, X.
Feature selection for optimizing traffic classification Computer Communications Anonymized Internet Traces
2012
Verma, H.
Yadav, B.
Bansal, P.
Raj, S.
IPv4 to IPv6 shift: major challenges J. Engineering and Innovative Technology (IJEIT) Anonymized Internet Traces
2012
Tawakol, A. Performance analysis of TCAMs in switches Univ. Waterloo, Ontario, CA Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Power and performance analysis of network traffic prediction techniques IEEE Intl Symp. on Performance Analysis of Systems and Software (ISPASS) Anonymized Internet Traces
2012
Zhang, W.
Bi, J.
Wu, J.
Zhang, B.
Catching popular prefixes at AS border routers with a prediction based method Computer Networks Anonymized Internet Traces
2012
Tsidon, E.
Hanniel, I.
Keslassy, I.
Estimators also need shared values to grow together IEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter? IEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Kanizo, Y.
Keslassy, I.
The variable-increment counting Bloom filter IEEE INFOCOM Anonymized Internet Traces
2012
Pan, T.
Guo, X.
Zhang, C.
Jiang, J.
Wu, H.
Liu, B.
Tracking millions of flows in high speed networks for application identification IEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2012
Lee, C.
Lee, D.K.
Moon, S.
Unmasking the growing UDP traffic in a campus network Passive and Active Measurement (PAM) Anonymized Internet Traces
2012
Houmansadr, A.
Kiyavash, N.
Borisov, N.
Non-blind watermarking of network flows arxiv.org Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Optimal configuration of energy-efficient ethernet Computer Networks Anonymized Internet Traces
2012
Gilbert, J. Scalable wavelet-based active network stepping stone detection Air Force Inst. of Technology, Air Univ, Anonymized Internet Traces
2012
Lee, M.
Duffield, N.
Kompella, R.R.
Opportunistic flow-level latency estimation using consistent NetFlow IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2012
Kanizo, Y.
Hay, D.
Keslassy, I.
Maximizing the throughput of cuckoo hashing in network devices ComNet, Technion, Israel Anonymized Internet Traces
2012
Shpiner, A.
Keslassy, I.
Cohen, R.
Reducing the reordering delay in multi-core network processors ComNet, Technion, Israel Anonymized Internet Traces
2012
Martinez, V.M. Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks Univ. Autonoma de Madrid Anonymized Internet Traces
2012
Kim, M.
Jung, S.
Park, M.
A Distributed Self-Organizing Map for DoS Attack Detection International Conference on Ubiquitous and Future Networks Anonymized Internet Traces
Denial of Service Attacks
2012
Houmansadr, A. Design, analysis, and implementation of effective network flow watermarking schemes Univ. Illinois, Urbana-Champaign Anonymized Internet Traces
2012
Blefari-Melazzi, N.
Cancellieri, M.
Detti, A.
Pomposini, M.
Salsano, S.
The CONET solution for information centric networking Univ. Rome Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Behavioral graph analysis of Internet applications IEEE Global Telecommunications Conference (GLOBECOM) Anonymized Internet Traces
2011
Vishwanath, A.
Sivaraman, V.
Zhao, Z.
Russell, C.
Thottan, M.
Adapting router buffers for energy efficiency ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2011
Moreno, S.D.B. Evaluacion de desempeno de diversas arquitecturas de commutadores opticos Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia Anonymized Internet Traces
2011
Matias, R.
Carvalho, A.M.M.
Teodoro, V.A.
Tes, D.
Araujo, L.B.
Performance comparison of forecasting models applied to LAN/MAN traffic prediction IEEE Workshop on Local and Metropolitan Area Networks (LANMAN) Anonymized Internet Traces
2011
Hua, N.
Norige, E.
Kumar, S
Lynch, B.
Non-crypto hardware hash functions for high performance networking ASICs Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2011
Houmansadr, A.
Nguyen, G.T.K.
Caesar, M.
Borisov, N.
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability ACM Conference on Computer and Communications Security (CCS) Anonymized Internet Traces
2011
Guo, Z.
Yang, Y.
Pipelining multicast scheduling in all-optical packet switches with delay guarantee Intl Teletraffic Congress (ITC) Anonymized Internet Traces
2011
Clegg, R.
Landa, R.
Rio, M.
Criticisms of modelling packet traffic using long-range dependence (extended version) J. Computer and System Sciences Anonymized Internet Traces
2011
Spinelli, L.P. Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias Univ. Federal Do Rio de Janeiro, Brazil Anonymized Internet Traces
2011
Detti, A.
Melazzi, N.B.
Salsano, S.
Pomposini, M.
CONET: a content centric inter-networking architecture ACM SIGCOMM Workshop on Information-Centric Networking (ICN) Anonymized Internet Traces
2011
Venkataramanan, R.
Jeong, M.-W.
Prabhakar, B.
A flow- and packet-level model of the Internet Univ. Michigan Anonymized Internet Traces
2011
Marsan, M.A.
Fernandez Anta, A.
Mancuso, V.
Rengarajan, B.
Vasallo, P.
Rizzo, G.
A simple analytical model for energy efficient ethernet IEEE Communications Lett. Anonymized Internet Traces
2011
Leiva, A.
Finochietto, J.M.
Huiszoon, B.
Lopez, V.
Tarifeno, M.
Aracil, J.
Beghelli, A.
Comparison in power consumption of static and dynamic WDM networks Optical Switching and Networking Anonymized Internet Traces
2011
Larrabeiti, D.
Reviriego, P.
Hernandez, J.A.
Maestro, J.A.
Uruena, M..
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability Optical Switching and Networking Anonymized Internet Traces
2011
Valgenti, V.C.
Paul, R.R.
Kim, M.S.
Netshuffle: Improving traffic trace anonymization through graph distortion IEEE Conference on Communications (ICC) Anonymized Internet Traces
2011
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter ComNet, Technion, Israel Anonymized Internet Traces
2011
Grieco, L.A.
Barakat, C.
Marzulli, M.
Spectral models for bitrate measurement from packet sampled traffic IEEE Trans. on Network and Service Management Anonymized Internet Traces
2011
Mothersole, I.
Reed, M.J.
Optimising rule order for a packet filtering firewall Conference on Network and Information Systems Security (SAR-SSI) Anonymized Internet Traces
2011
He, F.
Xiang, F.
Yibo Xue, Y.
Jun Li, J.
Towards high-performance network application identification with aggregate-flow cache arxiv.org Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Gu, L.
Network-aware behavior clustering of Internet end hosts IEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
UCSD Network Telescope
2011
Ekiz, N.
Rahman, A.H.
Amer, P.D.
Misbehaviors in TCP SACK generation ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2011
Dusi, M.
Gringoli, F.
Salgarelli, L.
Quantifying the accuracy of the ground truth associated with Internet traffic traces Computer Networks Anonymized Internet Traces
2011
Reviriego, P.
Huiszoon, B.
Lopez, V.
Coenen, R.B.
Hernandez, J.A.
Maestro, J.A.
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links IEEE J. Selected Topics in Quantum Electronics Anonymized Internet Traces
2011
Jose, L.
Yu, M.
Rexford, J.
Online measurement of large traffic aggregates on commodity switches Usenix Conference Hot-ICE Anonymized Internet Traces
2011
Houmansadr, A.
Borisov, N.
SWIRL: A scalable watermark to detect correlated network flows Symp. on Network and Distributed System Security (NDSS) Anonymized Internet Traces
2011
Schear, N. Preventing encrypted traffic analysis Univ. Illinois, Urbana-Champaign Anonymized Internet Traces
2011
Pouzols, F.M.
Lopez, D.R.
Barros, A.B.
Predictive models of network traffic load Studies in Computational Intelligence Anonymized Internet Traces
2011
Liu, H.
Sun, Y.
Valgenti, V.C.
Kim, M.S.
TrustGuard: A flow-level reputation-based DDoS defense system Conference on Consumer Communications and Networking (CCNC) Anonymized Internet Traces
Denial of Service Attacks
2010
He, K.
Hu, C.
Jiang, J.
Zhou, Y.
Liu, B.
A2C: Anti-attack counters for traffic measurement IEEE Global Telecommunications Conference (GLOBECOM) Anonymized Internet Traces
2010
Haider, A.
Acharya, K.
Raja, M.Y.A.
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks High-Capacity Optical Networks and Enabling Technologies (HONET) Anonymized Internet Traces
2010
Mouchos, C.
Tsokanos, A.
Kouvatsos, D.D.
Dynamic OBS offset allocation in WDM networks Computer Communications Anonymized Internet Traces
2010
Zadnik, M.
Canini, M.
Evolution of cache replacement policies to track heavy-hitter flows Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2010
Saxena, M.
Kompella, R.
CLAMP: Efficient class-based sampling for flexible flow monitoring Computer Networks Anonymized Internet Traces
2010
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architectures Boston Univ., CS Dept. Anonymized Internet Traces
2010
Kanizo, Y.
Hay, D.
Keslassy, I.
Hash tables with finite buckets are less resistant to deletions Allerton Conference on Communication, Control and Computing Anonymized Internet Traces
2010
Scappini, R. Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas Facultad de Informatica, Univ. Nacional de la Plata Anonymized Internet Traces
2010
Santiago del Rio, P.M.
Ramos, J.
Salvador, A.
de Vergara, J.E.L.
Aracil, J.
Cuadra, A.
Cutanda, M.
Application of Internet traffic characterization to all-optical networks Conference on. Transparent Optical Networks (ICTON) Anonymized Internet Traces
2010
Yuan, R.
Weibing, Y.
Mingyu, C.
Xiaofang, Z.
Jianping, F.
Robust TCP reassembly with a hardware-based solution for backbone traffic Conference on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2010
Woldeselassie, M.
Clegg, R.
Rio, M.
Forecasting full-path network congestion using one bit signalling IEEE Conference on Communications (ICC) Anonymized Internet Traces
2010
Reviriego, P.
Larrabeiti, D.
Maestro, J.A.
Would energy efficient ethernet be effective on 10Gbps optical links? OSA Photonics in Switching (PS) Anonymized Internet Traces
2010
Fenacci, D.
Franke, B.
Empirical evaluation of data transformations for network infrastructure applications Conference on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X) Anonymized Internet Traces
Topology with Archipelago
2010
Zhang, N.
Wang, F.
Gong, B.
Li, L.
Identifying heavy-hitter flows fast and accurately Conference on Future Computer and Communication (ICFCC) Anonymized Internet Traces
2010
Reviriego, P.
Sanchez-Macian, A.
Maestro, J.A.
Bleakley, C.J.
Increasing the MTU size for energy efficiency in ethernet IET Signals and Systems Conference (ISSC) Anonymized Internet Traces
2010
Lee, D.
Carpenter, B.E.
Brownlee, N.
Observations of UDP to TCP ratio and port numbers Conference on Internet Monitoring and Protection (ICIMP) Anonymized Internet Traces
2010
Hansen, H.V.
Goebel, V.
Plagemann, T.
Siekkinen, M.
Resource adaptive distributed information sharing Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE ) Anonymized Internet Traces
2010
Gremillet, O.
Goncalves, P.
Vicat-Blanc Primet, P.
Dupas, A.
Traffic classification techniques supporting semantic networks Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2010
Moon, D. Achieving flexibility and performance for packet forwarding and data center management UC Berkeley Anonymized Internet Traces
2010
Lee, M.
Duffield, N.
Kompella, R.
Two samples are enough: Opportunistic flow-level latency estimation using NetFlow IEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Parallelizing weighted frequency counting in high-speed network monitoring Computer Communications Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Identifying heavy hitters in high-speed network monitoring Science China Information Sciences Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17 Anonymized Internet Traces
2010
Albrecht, C.
Foag, J.
Koch, R.
Maehle, E.
Pionteck, T.
DynaCORE - dynamically reconfigurable coprocessor for network processors Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16 Anonymized Internet Traces
2010
John, W. Characterization and classification of internet backbone traffic Chalmers Univ. of Technology, Gothenborg, Sweden Anonymized Internet Traces
2010
Rottenstreich, O.
Keslassy, I.
The variable-increment counting Bloom filter ComNet, Technion, Israel Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
An application-aware load balancing strategy for network processors Conference on High performance embedded architectures and compilers (HIPEAC) Anonymized Internet Traces
2010
Moon, D.
Naous, J.
Liu, J.
Zarifis, K.
Casado, M.
Koponen, T.
Shenker, S.
Breslau, L.
Bridging the software/hardware forwarding divide anon. Anonymized Internet Traces
2009
Sellke, H.
Wang, C.-C.
Bagchi, S.
Shroff, N.B.
Camouflaging timing channels in web traffic Purdue Univ. Anonymized Internet Traces
2009
Beheshti-Zavareh, N. Tiny buffers for electronic and optical routers Stanford Univ., Stanford, CA, US Anonymized Internet Traces
2009
Schear, N.
Borisov, N.
Preventing SSL traffic analysis with realistic cover traffic ACM Conference on Computer and Communications Security (CCS) Anonymized Internet Traces
2009
Jiang, W.
Prasanna, V.K.
Reducing dynamic power dissipation in pipelined forwarding engines IEEE Conference on Computer Design (ICCD) Anonymized Internet Traces
2009
Zhang, M.
Dusi, M.
John, W.
Chen, C.
Analysis of UDP traffic usage on internet backbone links Symp. on Applications and the Internet (SAINT) Anonymized Internet Traces
2009
Este, A.
Gringoli, F.
Salgarelli, L.
Support Vector Machines for TCP traffic classification Computer Networks Anonymized Internet Traces
2009
Andreou, M.S. Message traceback systems. Dancing with the devil Univ. Newcastle upon Tyne Anonymized Internet Traces
Topology with Skitter
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
Joint entropy analysis model for DDoS attack detection Conference on Information Assurance and Security (IAS) Anonymized Internet Traces
UCSD Network Telescope
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
A traffic coherence analysis model for DDoS attack detection Conference on Security and Cryptography (SECRYPT) Anonymized Internet Traces
UCSD Network Telescope
2009
Vishwanath, K.V.
Vahdat, A.
Swing: Realistic and responsive network traffic generation IEEE/ACM Trans. on Networking Anonymized Internet Traces
2009
Ishakian, V.
Akinwumi, J.
Matta, I.
On the cost of supporting multihoming and mobility Boston Univ., CS Dept. Anonymized Internet Traces
2009
Clegg, R.G.
Withall, M.S.
Moore, A.W.
Phillips, I.W.
Parish, D.J.
Rio, M.
Landa, R.
Haddadi, H.
Kyriakopoulos, K.
Auge, J.
Clayton, R.
Salmon, D.
Challenges in the capture and dissemination of measurements from high-speed networks IET Communications Anonymized Internet Traces
2009
Brugger, S.T. The quantitative comparison of computer networks UC Davis Anonymized Internet Traces
2009
Saxena, M.
Kompella, R.
A framework for efficient class-based sampling IEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Does the internet still demonstrate fractal nature? IEEE Conference on Networking (ICN) Anonymized Internet Traces
2009
Idzikowski, F. Search and analysis of backbone traffic measurements in the internet Technische Univ. Berlin (TKN-09-004) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Levy flights and fractal modeling of internet traffic IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Maiolini, G.
Molina, G.
Baiocchi, A.
Rizzi, A.
On the fly application flows identification by exploiting K-means based classifiers J. Information Assurance and Security Anonymized Internet Traces
2009
Kanizo, Y.
Hay, D.
Keslassy, I.
Optimal dynamic hash tables ComNet, Technion, Israel Anonymized Internet Traces
2009
Andreou, M.S.
van Moorsel, A.
COTraSE Connection Oriented Traceback in Switched Ethernet J. Information Assurance and Security Anonymized Internet Traces
2008
Casado, M.
Koponen, T.
Moon, D.
Shenker, S.
Rethinking packet forwarding hardware ACM SIGCOMM HotNets Workshop Anonymized Internet Traces
2008
Baiocchi, A.
Maiolini, G.
Molina, G.
Rizzi, A.
On-the-fly statistical classification of internet traffic at application layer based on cluster analysis Workshop on Computational Intelligence in Security for Information Systems (CISIS) Anonymized Internet Traces
2008
Dusi, M.
Gringoli, F.
Salgarelli, L.
IP traffic classification for QoS guarantees: the independence of packets IEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2008
Pouzols, F.M.
Barriga, A.
Lopez, D.R.
Sanchez-Solano, S.
Linguistic summarization of network traffic flows IEEE Conference on Fuzzy Systems (FUZZ-IEEE) Anonymized Internet Traces
2008
Shevtekar, A.
Ansari, N.
A router-based technique to mitigate reduction of quality (RoQ) attacks Computer Networks Anonymized Internet Traces
2008
Clegg, R.
Landa, R.
Haddadi, H.
Rio, M.
Moore, A.W.
Techniques for flow inversion on sampled data IEEE INFOCOM Workshop Global Internet Symp. Anonymized Internet Traces
2008
Meitinger, M.
Ohlendorf, R.
Wild, T.
Herkersdorf, A.
A hardware packet re-sequencer unit for network processors Architecture of Computing Systems (ARCS) Anonymized Internet Traces
2008
Raspall, F.
Sallent, S.
Adaptive shared-state sampling Internet Measurement Conference (IMC) Anonymized Internet Traces
2008
Proebstel, E. Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic UC Davis Anonymized Internet Traces
2008
Este, A.
Gringoli, F.
Salgarelli, L.
An SMV-based approach to traffic classification Univ. Brescia Anonymized Internet Traces
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
Network performance analysis based on histogram workload models IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2007
Shevtekar, A.
Ansari, N.
A proactive test based differentiation to mitigate low rate DoS attacks IEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2007
Whitehead, B.
Lung, C.-H.
Rabinovitch, P.
A TCP connection establishment filter: symmetric connection detection IEEE Conference on Communications (ICC) Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation UC Riverside Anonymized Internet Traces
Topology with Skitter
2007
Clegg, R.
Haddadi, H.
Landa, R.
Rio, M.
Towards informative statistical flow inversion arxiv.org Anonymized Internet Traces
2007
Haddadi, H.
Landa, R.
Rio, M.
Bhatti, S.
Revisiting the issues on netflow sample and export performance arxiv.org Anonymized Internet Traces
2007
Yuan, L.
Chuah, C.
Mohapatra, P.
ProgME: towards programmable network measurement ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Salgarelli, L.
Gringoli, F.
Karagiannis, T.
Comparing traffic classifiers ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network monitoring using traffic dispersion graphs (TDGs) Internet Measurement Conference (IMC) Anonymized Internet Traces
Topology with Skitter
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
A histogram-based stochastic process for finite buffer occupancy analysis Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS) Anonymized Internet Traces
2007
Clegg, R. Simulating internet traffic with Markov-modulated processes UK Performance Engineering Workshop Anonymized Internet Traces
2006
Park, J.
Tyan, H.-R.
Jay Kuo, C.-C.
GA-based internet traffic classification technique for QoS provisioning Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Anonymized Internet Traces
2006
Okuno, M.
Nishimura, S.
Ishida, S.
Nishi, H.
Cache-based network processor architecture: evaluation with real network traffic IEICE Trans. on Electronics Anonymized Internet Traces
2006
Vishwanath, K.
Vahdat, A.
Realistic and responsive network traffic generation ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Varghese, G.
Fingerhut, J.
F. Bonomi, F.
Detecting evasion attacks at high speeds without reassembly ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2006
Clegg, R. Markov-modulated on/off processes for long-range dependent internet traffic arxiv.org Anonymized Internet Traces
2006
Constantinou, F.
Mavrommatis, P.
Identifying known and unknown peer-to-peer traffic IEEE Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
2006
Wang, H.
Lin, Y.
Jin, Y.
Cheng, S.
Easily-implemented adaptive packet sampling for high speed networks flow measurement Conference on Computational Science (ICCS) Anonymized Internet Traces
2006
Kumar, S.
Maschmeyer, J.
Crowley, P.
Exploiting locality to ameliorate packet queue contention and serialization ACM Conference on Computing Frontiers Anonymized Internet Traces
2006
Chen, Y.
Hwang, K.
Collaborative change detection of DDoS attacks on community and ISP networks IEEE Symp. on Collaborative Technologies and Systems (CTS) Anonymized Internet Traces
2006
Shriram, A.
Kaur, J.
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth Passive and Active Measurement (PAM) Anonymized Internet Traces
2006
Hu, Y.
Chiu, D.-M.
Lui, J.
Entropy based flow aggregation IFIP-TC6 Networking Conference (NETWORKING) Anonymized Internet Traces
2006
Clegg, R. Modelling internet traffic using Markov chains Imperial College, London, UK Anonymized Internet Traces
2005
Kompella, R.
Estan, C.
The power of slicing in internet flow measurement Internet Measurement Conference (IMC) Anonymized Internet Traces
2005
Veitch, D.
Hohna, N.
Abry, P.
Multifractality in TCP/IP traffic: the case against Computer Networks Anonymized Internet Traces
2005
Jiang, H.
Dovrolis, C.
Why is the internet traffic bursty in short (sub-RTT) timescales? ACM SIGMETRICS Performance Evaluation Review Anonymized Internet Traces
2005
Okuno, M.
Ishida, S.
Nishi, H.
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera IEICE Trans. on Electronics Anonymized Internet Traces
2004
Karagiannis, T.
Molle, M.
Faloutsos, M.
Long-range dependence: ten years of Internet traffic modeling IEEE Internet Computing Anonymized Internet Traces
2004
Okuno, M.
Nishi, H.
Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler IEICE technical report: Circuits and system Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links Internet Measurement Conference (IMC) Anonymized Internet Traces
2003
Estan, C.
Savage, S.
Varghese, G.
Automatically inferring patterns of resource consumption in network traffic ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice ACM Trans. on Computer Systems (TOCS) Anonymized Internet Traces
2002
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
1999
Fang, W.
Peterson, L.
Inter-AS traffic patterns and there implications IEEE Global Telecommunications Conference (GLOBECOM) Anonymized Internet Traces
2016
Zhang, H.
Su, W.
Quan, W.
Security technologies of SINET Smart Collaborative Identifier Network Denial of Service Attacks
2016
Giotis, K.
Apostolaki, M.
Maglaris, V.
A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains IEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
Topology with BGP
2016
Zheng, L.
Li, J.
Wang, H.
Zeng, X.
Improving accuracy and automation of anomaly detectors based on self-correlation J. Internet Technology (JIT) Denial of Service Attacks
UCSD Network Telescope
2016
Giotis, K. Virtual Network Services for the Monitoring and Security of Software-Defined Networks National Technical University of Athens Denial of Service Attacks
Topology with BGP
2015
Robinson, R.R.R.
Thomas, C.
Ranking of machine learning algorithms based on the performance in classifying DDoS attacks IEEE Recent Advances in Intelligent Computational Systems (RAICS) Denial of Service Attacks
UCSD Network Telescope
2015
Rastegari, S. Intelligent network intrusion detection using an evolutionary computation approach Edith Cowan Univ. Denial of Service Attacks
2015
Balkanli, E.
Zincir-Heywood, A.N.
Heywood, M.I.
Feature selection for robust backscatter DDoS detection Local Computer Networks Conference Workshops (LCNW) Denial of Service Attacks
UCSD Network Telescope
2015
Juturu, L.S. Applying big data analytics on integrated cybersecurity datasets Texas Tech Univ., Lubbock, TX, US Denial of Service Attacks
2015
Shamshirband, S.
Daghighi, B.
Anuar, N.B.
Kiah, L.M.
Patel, A.
Abraham, A.
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network J. Intelligent and Fuzzy Systems Denial of Service Attacks
2015
Lai, Y.
Chen, Y.
Liu, Z.
Yang, Z.
Li, X.
On monitoring and predicting mobile network traffic abnormality Simulation Modelling Practice and Theory Denial of Service Attacks
UCSD Network Telescope
2014
Shrestha, A.
Zhu, Y.
Manandhar, K.
NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysis Advances in Visual Computing Denial of Service Attacks
2014
Bhaya, W.
Manaa, M.E.
A proactive DDoS detection approach using data mining cluster analysis Journal of Next Generation Information Technology Denial of Service Attacks
2014
Srihari, V.
Anitha, R.
DDoS detection system using wavelet features and semi-supervised learning Proc. Intl Symp. on Security in Computing and Communications Denial of Service Attacks
2014
Takahashi, R. Distributed denial of service (DDoS) attack detection system using burst detection Future Univ. Hakodate Denial of Service Attacks
2013
Luo, H.
Lin, Y.
Zhang, H.
Zukerman, M.
Preventing DDoS attacks by identifier/locator separation IEEE Network Denial of Service Attacks
2013
Bhuyan, M.H. Applying data mining techniques in anomaly based network intrusion detection Tezpur Univ. Denial of Service Attacks
2013
Bhatia, S. Detecting Distributed Denial-of-Service attacks and flash events Queensland Univ. of Technology, Brisbane, Australia Denial of Service Attacks
2013
Dassouki, K.
Debar, H.
Safa, H.
Hijazi, A.
A TCP delay-based mechanism for detecting congestion in the Internet Intl Conference on Communications and Information Technology (ICCIT) Denial of Service Attacks
2013
Chen, W.
Liu, Y.
Guan, Y.
Cardinality change-based early detection of large-scale cyber-attacks Proc. IEEE INFOCOM Denial of Service Attacks
UCSD Network Telescope
2013
Callau-Zori, M.
Jimenez-Peris, R.
Gulisano, V.
Papatriantafilou, M.
Fu, Z.
Patino-Martinez, M.
STONE: A stream-based DDoS defense framework ACM Symp. on Applied Computing (SAC) Denial of Service Attacks
2013
Kumar, P.A.R.
Selvakumar, S.
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Computer Communications Denial of Service Attacks
UCSD Network Telescope
2012
Bhatia, S.
Schmidt, D.
Mohay, G.
Ensemble-based DDoS detection and mitigation model Conference on Security of Information and Networks (SIN) Denial of Service Attacks
2012
Fu, Z. Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation Chalmers Univ. of Technology, Gothenborg, Sweden Denial of Service Attacks
2012
Singh, J.
Kumar, K.
Sachdeva, M.
Sidhu, N.
DDoS attack's simulation using legitimate and attack real data sets J. Scientific and Engineering Research Denial of Service Attacks
2012
Feitosa, E.
Souto, E.
Sadok, D.H.
An orchestration approach for unwanted Internet traffic identification Computer Networks Denial of Service Attacks
2012
Anitha, R.
Karthik, R.
Pravin, V.
Thirugnanam, K.
A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference system Proc. Second Intl Conference on Computer Science, Engineering and Applications (ICCSEA) Denial of Service Attacks
2012
Rahmani, H.
Sahli, N.
Kamoun, F.
DDoS flooding attack detection scheme based on F-divergence Computer Communications Denial of Service Attacks
2012
Zheng, L.
Zou, P.
Jia, Y
Han, W.
An online learning and unsupervised traffic anomaly detection system Advanced Science Lett. Denial of Service Attacks
2012
Karthick, R.R.
Hattiwale, V.P.
Ravindran, B.
Adaptive network intrusion detection system using a hybrid approach Conference on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2011
Takahashi, E.K.
Chen, Y.
Lall, A.
Divergence in network traffic Midstates Conference on Undergraduate Research in Computer Science and Mathematics Denial of Service Attacks
2011
Le, D.Q.
Jeong, T.
Roman, H.E.
Hong, J.W.
Traffic dispersion graph based anomaly detection Symp. on Information and Communication Technology (SolCT) Denial of Service Attacks
2011
Bhatia, S.
Mohay, G.
Tickle, A.
Ahmed, E.
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event Conference on Availability, Reliability and Security (ARES) Denial of Service Attacks
2011
Khan, F.M. Assuring network service with bandwidth and integrity based fairness Univ. Illinois, Urbana-Champaign Denial of Service Attacks
2016
Krenc, T.
Feldmann, A.
BGP prefix delegations: A deep dive Internet Measurement Conference (IMC) Paper Data Supplements
Topology with Archipelago
Topology with BGP
2015
Nithyanand, R.
Starov, O.
Zair, A.
Gill, P.
Schapira, M.
Measuring and mitigating AS-level adversaries against Tor arxiv.org Paper Data Supplements
2017
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Labeling and Encoding Hierarchical Addressing for Scalable Internet Routing Advances in Computer and Computational Sciences Topology with Archipelago
2017
Sermpezis, P.
Nomikos, G.
Dimitropoulos, X.
Re-mapping the Internet: Bring the IXPs into Play arxiv.org Topology with Archipelago
Topology with BGP
2017
Nguyen, H.
Phung, C.
Secci, S.
Felix, B.
Nogueira, M.
Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks? arxiv.org Topology with Archipelago
2017
Mukherjee, S.
Sriram, S.
Vu, T.
Raychaudhuri, D.
EIR: Edge-aware inter-domain routing protocol for the future mobile internet Computer Networks Topology with Archipelago
2017
Kleineberg, K. Metric clusters in evolutionary games on scale-free networks arxiv.org Topology with Archipelago
2017
Jiang, Q.
Hu, H.
Hu, G.
Two-Type Information Fusion Based IP-to-AS Mapping Table Refining Journal of Computer Science and Technology Topology with Archipelago
Topology with BGP
2017
Imani, M.
Barton, A.
Wright, M.
Forming Guard Sets using AS Relationships Proceedings on Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2017
Gaston, E.W. High-frequency mapping of the IPv6 Internet using Yarrp Naval Postgraduate School Topology with Archipelago
2017
Dong, W.
Gao, Y.
Wu, W.
Bu, J.
Chen, C.
Li, X.
Optimal Monitor Assignment for Preferential Link Tomography in Communication Networks IEEE/ACM Transactions on Networking (TON) Topology with Archipelago
Topology with BGP
2017
Cho, S.
Nithyanand, R.
Razaghpanah, A.
Gill, P.
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography arxiv.org Topology with Archipelago
Topology with BGP
2016
Richter, P.
Smaragdakis, G.
Plonka, D.
Berger, A.
Beyond counting: New perspectives on the active IPv4 address space Internet Measurement Conference (IMC) Topology with Archipelago
2016
Marder, A.
Smith, J.M.
MAP-IT: Multipass accurate passive inferences from traceroute Internet Measurement Conference (IMC) Topology with Archipelago
Topology with BGP
2016
Liaskos, C.
Dimitropoulos, X.
Tassiulas, L.
Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach IEEE Trans. on Network and Service Management Topology with Archipelago
Topology with BGP
2016
Beverly, R. Yarrp'ing the Internet: Randomized high-speed active topology discovery Internet Measurement Conference (IMC) Topology with Archipelago
2016
Lin, C.
Bi, Y.
Zhao, H.
Cai, W.
Research on bottleneck-delay in internet based on IP united mapping Peer-to-Peer Networking and Applications Topology with Archipelago
2016
Kleineberg, K.-K.
Boguna, M.
Serrano, A.
Papadopoulos, F.
Hidden geometric correlations in real multiplex networks Nature Physics Topology with Archipelago
2016
Wang, Y.
Zhang, K.
Quantifying the flattening of Internet topology Proc. Intl Conference on Future Internet Technologies Topology with Archipelago
Topology with BGP
Topology with Skitter
2016
Shah, A.
Fontunge, R.
Papadopoulos, C.
Towards characterizing international routing detours arxiv.org Topology with Archipelago
Topology with BGP
2016
Czyz, J.J. A brave new world: Studies on the deployment and security of the emerging IPv6 Internet Univ. of Michigan, Ann Arbor, MI, US Topology with Archipelago
2016
Nithyanand, R.
Singh, R.
Cho, S.
Gill, P.
Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client design arxiv.org Topology with Archipelago
2016
Rye, E.C.
Rohrer, J.P.
Beverly, R.
Revisiting AS-level graph reduction Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing resilience of inter-domain routing system under regional failures KSII Trans. on Internet and Information Systems Topology with Archipelago
Topology with BGP
2016
Li, Q. Reducing short flows' latency in the internet Univ. Illinois, Urbana-Champaign Topology with Archipelago
Topology with BGP
2016
Veitch, D.
Vijayalayan, K.
Network timing and the 2015 leap second Passive and Active Measurement (PAM) Topology with Archipelago
2016
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
A brief history of MPLS usage in IPv6 Passive and Active Measurement (PAM) Topology with Archipelago
Topology with BGP
2016
Nomikos, G.
Dimitropoulos, X.
traIXroute: Detecting IXPs in traceroute paths Lecture Notes in Computer Science (LNCS) Topology with Archipelago
Topology with BGP
2016
Marcisak, S. Correlating inferred data plane IPv6 reboot events with control plane BGP activity Naval Postgraduate School, Monterey, CA, US Topology with Archipelago
2016
Jiao, B.
Shi, J.-M.
Graph perturbations and corresponding spectral changes in Internet topologies Computer Communications Topology with Archipelago
2016
Wang, Z.
Li, Q.
Jin, F.
Xiong, W.
Wu, Y.
Hyperbolic mapping of complex networks based on community information Physica A: Statistical Mechanics and its Applications Topology with Archipelago
2016
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Towards variable length addressing for scalable Internet routing IEEE Intl Performance Computing and Communications Conference (IPCCC) Topology with Archipelago
2016
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type inference in Internet AS graphs IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
Topology with BGP
2016
Tan, Z.D.H. Network Level Attacks and Defenses Against Anonymity Networks Georgetown University Topology with Archipelago
Topology with BGP
2016
Singh, J. Using Looking Glasses to Understand the Internet's Structure Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM) Topology with Archipelago
2016
Schuchard, M.
Geddes, J.
Schliep, M.
Hopper, N.
The Cost of the Path Not Taken IEEE Global Communications Conference (GLOBECOM) Topology with Archipelago
2016
Rye, E.C.
Rohrer, J.P.
Beverly, R.
Revisiting AS-level graph reduction IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Jacquemart, Q. Towards Uncovering BGP Hijacking Attacks ParisTech Topology with Archipelago
2016
Gosain, D.
Agarwal, A.
Acharya, H.B.
Chakravarty, S.
Qi points : placing decoy routers in the internet Indraprastha Institute of Information Technology Delhi (IIITD) Topology with Archipelago
Topology with BGP
2016
Gao, Q.
Wang, F.
Gao, L.
Quantifying AS Path Inflation by Routing Policies International Journal of Future Generation Communication and Networking Topology with Archipelago
2016
Chandrasekaran, B. Head into the Cloud: An Analysis of the Emerging Cloud Infrastructure Duke University Topology with Archipelago
Topology with BGP
2016
Canbaz, M.A. Data-driven large scale network-layer Internet simulation IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2015
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
MPLS under the microscope: Revealing actual transit path diversity Internet Measurement Conference (IMC) Topology with Archipelago
2015
Medeiros, J.P.S.
Motta Pires, P.S.
Borges Neto, J.B.
Loureiro, A.A.F.
Minimization and placement of sensors in structurally observable networks Proc. Intl Conference on Computer and Information Technology (CIT) Topology with Archipelago
2015
Gray, M.D. Discovery of IPv6 router interface addresses via heuristic methods Naval Postgraduate School Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet Autonomous Systems EPJ Data Science Topology with Archipelago
2015
Simoens, P.
Herzeele, L.V.
Vandeputte, F.
Vermoesen, L.
Challenges for orchestration and instance selection of composite services in distributed edge clouds Intl. Symp. on Integrated Network Management (IM) Topology with Archipelago
2015
Edeline, K.
Donnet, B.
Towards a middlebox policy taxonomy: path impairments Intl Workshop on Network Science for Communication Networks (NetSciCom) Topology with Archipelago
2015
West, A. Toward a robust method of presenting a rich, interconnected deceptive network topology Naval Postgraduate School Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet autonomous systems arxiv.org Topology with Archipelago
2015
Mell, P.
Harang, R.
Gueye, A.
The resilience of the Internet to colluding country induced connectivity disruptions Network and Distributed System Security Symp. (NDSS) Topology with Archipelago
2015
Jacquement, Q. Towards uncovering BGP hijacking attacks ParisTech Topology with Archipelago
Topology with BGP
2015
Gao, Q.
Wang, F.
Gao, L.
Routing-policy aware peering for large content providers Computer Communications Topology with Archipelago
2015
Chandrasekaran, B.
Bai, M.
Schoenfield, M.
Berger, A.
Caruso, N.
Economou, G.
Gilliss, S.
Maggs, B.
Moses, K.
Duff, D.
Ng, K.C.
Sirer, E.G.
Weber, R.
Wong, B.
Alidade: IP Geolocation without Active Probing Duke University Topology with Archipelago
Topology with BGP
2014
Hric, D.
Darst, R.K.
Fortunato, S.
Community detection in networks: Structural communities versus ground truth Phys. Rev. E Topology with Archipelago
Topology with BGP
2014
Hric, D.
Darst, R.K.
Fortunato, S.
Community detection in networks: Structural communities versus ground truth Phys. Rev. E Topology with Archipelago
Topology with BGP
2014
Fowler, J
Johnson, T
Simonetto, P
Lazos, P
Kobourov, S.
Schneider, M.
Aceda, C.
IMap: Visualizing network activity over Internet maps Visualization for Cyber Security (VizSec) Topology with Archipelago
UCSD Network Telescope
2014
Durairajan, R.
Sommers, J.
Barford, P.
Layer 1-informed Internet topology measurement Internet Measurement Conference (IMC) Topology with Archipelago
2014
Kiremire, A.R.
Brust, M.R.
Phoha, V.V.
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes Computer Networks Topology with Archipelago
2014
Juen, J.
Das, A.
Johnson, A.
Borisov, N.
Caesar, M.
Defending Tor from network adversaries: A case study of network path prediction arxiv.org Topology with Archipelago
2014
Craven, R.
Beverly, R.
Allman, M.
A middlebox-cooperative TCP for a non end-to-end internet ACM SIGCOMM Computer Communication Review Topology with Archipelago
2014
Reed, D.
Warbritton, D.
Sicker, D.
Current trends and controversies in Internet peering and transit: Implications for the future evolution of the Internet Conference on Communication, Information and Internet Policy (TPRC) Topology with Archipelago
2014
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
Comparative assessment of centrality indices and implications on the vulnerability of ISP networks Intl Teletraffic Congress (ITC) Topology with Archipelago
2014
Mosley, L.D. IPv6 network infrastructure and stability inference Naval Postgraduate School Topology with Archipelago
2014
Maggs, B. Mapping the whole Internet Duke Univ. Topology with Archipelago
Topology with BGP
2014
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoption Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) Topology with Archipelago
2014
Burnett, S.R. Empowering bystanders to facilitate Internet censorship measurement and circumvention Georgia Tech Topology with Archipelago
UCSD Network Telescope
2014
Wright, J.E. Temporal comparisons of Internet topology Naval Postgraduate School Topology with Archipelago
2014
Landry, B. Comparing internet probing methodologies through an analysis of large dynamic graphs Naval Postgraduate School Topology with Archipelago
2014
Jaggard, A.D.
Johnson, A.
Syverson, P.
Feigenbaum, J.
Representing network trust and using it to improve anonymous communication arxiv.org Topology with Archipelago
Topology with BGP
2014
Kang, M.S.
Gligor, V.D.
Routing bottlenecks in the Internet - causes, exploits, and countermeasures Carnegie Mellon Univ. Topology with Archipelago
Topology with BGP
2014
Tran, T.V.H. IPv6 geolocation using latency constraints Naval Postgraduate School Topology with Archipelago
2014
Baltra, G.
Beverly, R.
Xie, G.G.
Ingress point spreading: A new primitive for adaptive active network mapping Passive and Active Measurement (PAM) Topology with Archipelago
2014
Xu, Y.
Ma, W.
Robustness analyses of Internet topology with power-law features Intl J. of Future Generation Communication and Networking Topology with Archipelago
2014
Orzen, S.-N. Domain relations in trees arborescence for interaction search on persistent routing availability Intl Symp. on Applied Machine Intelligence and Informatics (SAMI) Topology with Archipelago
2014
Motamedi, R.
Chandrasekaran, B.
Maggs, B.
Rejaie, R.
Willinger, W.
https://onrg.cs.uoregon.edu/pub/CIS-TR-2014-02.pdf University of Oregon Topology with Archipelago
Topology with Skitter
2014
Gansner, E.R.
Krishnamurthy, B.
Willinger, W.
Bustamante, F.E.
Sanchez, M.A.
Demo abstract: towards extracting semantics by visualizing large traceroute datasets Computing Topology with Archipelago
2013
Verigin, A.L. Evaluating the effectiveness of Sybil attacks against peer-to-peer botnets Univ. of Victoria, Victoria, CA Topology with Archipelago
2013
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
The multiple instances of node centrality and their implications on the vulnerability of ISP networks arxiv.org Topology with Archipelago
2013
Johnson, A.
Wacek, C.
Jansen, R.
Sherr, M.
Syverson, P.
Users get routed: Traffic correlation on Tor by realistic adversaries ACM SIGSAC Conference on Computer and Communications Security (CCS) Topology with Archipelago
Topology with BGP
2013
Vanaubel, Y.
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Network fingerprinting: TTL-based router signatures Internet Measurement Conference (IMC) Topology with Archipelago
2013
Ma, L.
He, T.
Leung, K.K.
Swami, A.
Towsley, D.
Identifiability of link metrics based on end-to-end path measurements Internet Measurement Conference (IMC) Topology with Archipelago
2013
Khan, A.
Kwon, T.
Kim, H.
Choi, Y.
AS-level topology collection through looking glass servers Internet Measurement Conference (IMC) Topology with Archipelago
2013
Sapegin, A.
Uhlig, S.
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events Computer Communications Topology with Archipelago
2013
Daryl, L.H.A. Toward large-graph comparison measures to understand Internet topology dynamics Naval Postgraduate School, Monterey, CA, US Topology with Archipelago
2013
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoption Intl Computer Science Inst. (ICSI) Topology with Archipelago
2013
Chabarek, J.
Barford, P.
What's in a name?: decoding router interface names Proc. ACM workshop on HotPlanet Topology with Archipelago
2013
Lu, N.
Wang, Y.
Su, S.
Yang, F.
Han, R.
Filtering location optimization for the reactive packet filtering Security and Communication Networks Topology with Archipelago
2013
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
On the local approximations of node centrality in Internet router-level topologies Intl Workshop on Self-Organizing Systems (IWSOS) Topology with Archipelago
2013
Chen, A.
Chan, E.W.W.
Luo, X.
Fok, W.W.T.
Chang, R.K.C.
An efficient approach to multi-level route analytics IFIP/IEEE Symp. on Integrated Network Management Topology with Archipelago
2013
Yang, B.
Zhao, H.
Zhang, J.
Ai, J.
Jia, S.
Ge, x.
Liu, W.
Analysis of interlayer connection catastrophe characteristics in Internet AS level topology Telkomnika Topology with Archipelago
2013
Wacek, C.
Tan, H.
Bauer, K.
Sherr, M.
An empirical evaluation of relay selection in Tor Network and Distributed System Security Symp. (NDSS) Topology with Archipelago
Topology with BGP
2013
Wang, Y.
Bi, J.
Wu, J.
Revisiting the rich club of the Internet AS-level topology IEICE Trans. Commun. Topology with Archipelago
Topology with Skitter
2012
Yu, M.
Jiang, W.
Li, H.
Stoica, I.
Tradeoffs in CDN designs for throughput oriented traffic ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Archipelago
2012
Sherry, J. Future architectures for middlebox processing services on the Internet and in the Cloud UC Berkeley Topology with Archipelago
Topology with BGP
2012
Ren, D.
Wong, W.
Gary Chan, S.-H.
Toward continuous push-based P2P live streaming IEEE Global Telecommunications Conference (GLOBECOM) Topology with Archipelago
2012
Ahmad, M.Z.
Guha, R.
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation J. Supercomputing Topology with Archipelago
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Romano, D.
Enhancing the computation of distributed shortest paths on real dynamic networks Mediterranean Conference on Algorithms Topology with Archipelago
2012
Wachs, M.
Grothoff, C.
Thurimella, R.
Partitioning the Internet Conference on Risks and Security of Internet and Systems (CRiSIS) Topology with Archipelago
Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks IEEE Conference on Local Computer Networks (LCN) Topology with Archipelago
2012
Tyson, G.
Kaune, S.
Miles, S.
El-khatib, Y.
Mauthe, A.
Taweel, A.
A trace-driven analysis of caching in content-centric networks IEEE Conference on Computer Communications and Networks (ICCCN) Topology with Archipelago
2012
Kambhampati, V.
Papadopolous, C.
Massey, D.
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks IEEE/IFIP Conference on Dependable Systems and Networks (DSN) Topology with Archipelago
2012
Fiorese, A.
Simoes, P.
Boavida, F.
Peer selection in P2P service overlays using geographical location criteria Computational Science and Its Applications (ICCSA) Topology with Archipelago
2012
Xu, Y.
Zhang, X.
Analysis of Internet robustness in attacks Conference on Systems and Informatics (ICSAI) Topology with Archipelago
2012
Schlegel, R.
Wong, D.S.
Anonymous overlay network supporting authenticated routing Information Sciences Topology with Archipelago
2012
Ren, D.
Chan, S.G.
Achieving high-bitrate overlay live streaming with proxy helpers Packet Video Workshop (PV) Topology with Archipelago
2012
Papadakis, H.
Fragopoulou, P.
Markatos, E.
Roussopoulos, M.
ITA: Innocuous topology awareness for unstructured P2P networks IEEE Trans. on Parallel and Distributed Systems Topology with Archipelago
Topology with BGP
2012
Faggiani, A.
Gregori, E.
Lenzini, L.
Mainardi, S.
Vecchio, A.
On the feasibility of measuring the internet through smartphone-based crowdsourcing Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) Topology with Archipelago
2012
Xu, Y.
Wang, Z.
Collapse by cascading failures in hybrid attacked regional Internet J. Security and Its Applications Topology with Archipelago
2012
Jacquin, L.
Roca, V.
Kaafar, M.A.
Schuler, F.
Roch, J.-L.
IBTrack: an ICMP black holes tracker hal.archives-ouvertes.fr Topology with Archipelago
2012
Huang, H.
Zhang, B.
Chan, S.-H.G.
Cheung, G.
Frossard, P.
Coding and replication co-design for interactive multiview video streaming IEEE INFOCOM Topology with Archipelago
2012
Cicerone, S.
D'Angelo, G.
Di Stefano, G.
Frigioni, D.
Maurizio, V.
Engineering a new algorithm for distributed shortest paths on dynamic networks Algorithmica Topology with Archipelago
2012
Wang, Y.
Su, S.
Yang, Y.
Ren, J.
A more efficient hybrid approach for single-packet IP traceback EUROMICRO Conference on Parallel, Distributed and Network-Based Processing (PDP) Topology with Archipelago
Topology with Skitter
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Maurizio, V.
Engineering a new loop-free shortest paths routing algorithm Symp. on Experimental Algorithms (SEA) Topology with Archipelago
2011
Sommers, J.
Erikson, B.
Barford, P.
On the prevalence and characteristics of MPLS deployments in the open Internet Internet Measurement Conference (IMC) Topology with Archipelago
Topology with BGP
2011
Zhang, Y.
Oliveira, R.
Wang, Y.
Su, S.
Zhang, B.
Bi, J.
Zhang, H.
Zhang, L.
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement IEEE J. Selected Areas in Communications Topology with Archipelago
2011
Marchetta, P.
Merindol, P.
Donnet, B.
Pescape, A.
Pansiot, J.-J.
Topology discovery at the router level: a new hybrid tool targeting ISP networks IEEE J. Selected Areas in Communications Topology with Archipelago
Topology with Skitter
2011
Jesus, V.
Aguiar, R.L.
Steenkiste, P.
Topological implications of cascading interdomain bilateral traffic agreements IEEE J. Selected Areas in Communications Topology with Archipelago
2011
Ahmad, M.Z.
Guha, R.
Internet exchange points and Internet routing Conference on Network Protocols (ICNP) Topology with Archipelago
2011
Moreira, M.D.D.
Laufer, R.
Fernandes, N.C.
Duarte, O.C.M.B.
A stateless traceback technique for identifying the origin of attacks from a single packet IEEE Conference on Communications (ICC) Topology with Archipelago
2011
Gregori, E.
Lenzini, L.
Orsini, C.
k-clique communities in the Internet AS-level topology graph Distributed Computing Systems Workshops (ICDCSW) Topology with Archipelago
2011
Tomasik, J.
Weisser, M.-A.
Internet topology on as-level: Model, generation methods and tool IEEE Performance Computing and Communications Conference (IPCC) Topology with Archipelago
Topology with BGP
2011
Gregori, E.
Lenzini, L
Orsini, C.
k-dense communities in the internet AS-level topology Conference on Communication Systems and Networks (COMSNETS) Topology with Archipelago
2011
Gregori, E.
Improta, A.
Lenzini, L.
Orsini, C.
The impact of IXPs on the AS-level topology structure of the Internet Computer Communications Topology with Archipelago
2010
Fan, X.
Heidemann, J.
Selecting representative IP addresses for internet topology studies Internet Measurement Conference (IMC) Topology with Archipelago
2010
Beverly, R.
Berger, A.
Xie, G.G.
Primitives for active internet topology mapping: toward high-frequency characterization Internet Measurement Conference (IMC) Topology with Archipelago
2010
Ahmad, M.Z.
Guha, R.
Impact of Internet exchange points on Internet topology evolution Conference on Local Computer Networks (LCN) Topology with Archipelago
Topology with Skitter
2010
Tomasik, J.
Weisser, M.-A.
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with Archipelago
2010
Knauf, A.
Hege, G.
Schmidt, T.C.
Wahlisch, M.
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP Principles, Systems and Applications of IP Telecommunications (IPTComm) Topology with Archipelago
2010
Zhang, Y.
Oliveira, R.
Zhang, H.
Zhang, L.
Quantifying the pitfalls of traceroute in AS connectivity inference Passive and Active Measurement (PAM) Topology with Archipelago
2010
Laki, S.
Matray, P.
Haga, P.
Sebok, T.
Csabai, I.
Vattay, G.
Spotter: a model based active geolocation service IEEE Conference on Computer Communications (INFOCOM) Topology with Archipelago
2010
King, A. Efficient internet topology discovery techniques Univ. Waikato, New Zealand Topology with Archipelago
2010
Ciceronea, S.
D'Angelo, G.
Di Stefanoa, G.
Frigioni, D.
Partially dynamic efficient algorithms for distributed shortest paths Theoretical Computer Science Topology with Archipelago
2009
Zhang, G.-Q.
Zhang, G.-Q.
Cheng, S.-Q.
Zhou, T.
Symbiotic effect: A guideline for network modeling EPL (Europhysics Letters) Topology with Archipelago
2009
Germoglio, G.
Dias, B.
Sousa, P.
Automated and distributed network service monitoring Asia-Pacific Network Operations and Management Symp. (APNOMS) Topology with Archipelago
2009
Saucez, D.
Donnet, B.
Bonaventure, O.
On the impact of clustering on measurement reduction IFIP-TC6 Networking Conference (NETWORKING) Topology with Archipelago
2009
Dai, L
Cao, Y.
Cui, Y.
Xue, Y.
On scalability of proximity-aware peer-to-peer streaming Computer Communications Topology with Archipelago
Topology with BGP
2008
Wu, M.-F.
Jiang, T.M.
Wu, A.
A virtual service framework for service composition QoS based on active measurement Symp. on Service-Oriented System Engineering (SOSE) Topology with Archipelago
2008
Dramburg, M. Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien Hochschule fuer Angewandte Wissenschaften Hamburg, Germany Topology with Archipelago
Topology with Skitter
2008
Wahlisch, M.
Schmidt, T.C.
Spalt, W.
What is happening from behind?: Making the impact of internet topology visible Campus-Wide Information Systems Topology with Archipelago
Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Ge, X.
Research on the distribution of network nodes based on multiple measurement points Computer Science Topology with Archipelago
2007
Li, C.
Zhao, H.
Zhang, X.
Yuan, S.
Analysis on traveling time of internet China Institute of Communications Topology with Archipelago
2006
Chan, H.
Dash, D.
Perrig, A.
Zhang, H.
Modeling adoptability of secure BGP protocols Joint Conference on Measurement and Modeling of Computer Systems Topology with Archipelago
2005
Su, W.-J.
Zhao, H.
Xu, Y.
Zhang, W.-B.
Internet complex network separation degree analysis based on hops J. China Inst. of Communications Topology with Archipelago
2017
Haghtalab, N.
Laszka, A.
Procaccia, A.
Vorobeychik, Y.
Koutsoukos, X.
Monitoring stealthy diffusion Knowledge and Information Systems Topology with BGP
2017
Gregori, E.
Lenzini, L.
Luconi, V.
AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systems Computer Communications Topology with BGP
2017
Burger, V. Wurzburger Beitrage zur Leistungsbewertung Verteilter Systeme Univ. Wurzburg Topology with BGP
2017
Yang, H.
Lam, S.S.
Scalable Verification of Networks With Packet Transformers Using Atomic Predicates IEEE/ACM Transactions on Networking Topology with BGP
2017
Wang, Y.
Bi, J.
Zhang, K.
A SDN-Based Framework for Fine-Grained Inter-domain Routing Diversity Mobile Networks and Applications Topology with BGP
2017
Tozal, M.E. Autonomous system ranking by topological characteristics: A comparative study Annual IEEE International Systems Conference (SysCon) Topology with BGP
2017
Suen, J.Y.
Navlakha, S.
Using Inspiration from Synaptic Plasticity Rules to Optimize Traffic Flow in Distributed Engineered Networks Neural Computation Topology with BGP
2017
Shin, K.
Rad, T.
Faloutsos, C.
Patterns and anomalies in k-cores of real-world graphs with applications Knowledge and Information Systems Topology with BGP
2017
Sermpezis, P.
Dimitropoulos, X.
Can SDN Accelerate BGP Convergence? A Performance Analysis of Inter-domain Routing Centralization arxiv.org Topology with BGP
2017
Pacifici, V.
Dan, G.
Distributed Caching Algorithms for Interconnected Operator CDNs IEEE Journal on Selected Areas in Communications Topology with BGP
2017
Nozaki, Y.
Golen, E.
Shenoy, N.
A modular architecture for scalable inter-domain routing IEEE Annual Computing and Communication Workshop and Conference (CCWC) Topology with BGP
2017
Muscoloni, A.
Cannistraci, C.V.
Local-ring network automata and the impact of hyperbolic geometry in complex network link-prediction arxiv.org Topology with BGP
2017
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.
Perrig, A.
Authentication Challenges in a Global Environment ACM Transactions on Privacy and Security (TOPS) Topology with BGP
2017
London, P. Distributed Optimization and Data Market Design California Institute of Technology Topology with BGP
2017
Kuenzer, S.
Ivanov, A.
Manco, F.
Mendes, J.
Volchkov, Y.
Schmidt, F.
Yasukata, K.
Honda, M.
Huici, F.
Unikernels Everywhere: The Case for Elastic CDNs The ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments Topology with BGP
2017
Huth, M.
Fabian, B.
Inferring business relationships in the internet backbone International Journal of Networking and Virtual Organisations Topology with BGP
2017
Hui, K.
Kim, S.H.
Wang, Q.
Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks Management Information Systems Quarterly Topology with BGP
UCSD Network Telescope
2017
Hiran, R.
Carlsson, N.
Shahmehri, N.
Collaborative framework for protection against attacks targeting BGP and edge networks Computer Networks Topology with BGP
2017
Grailet, J.F.
Donnet, B.
Towards a Renewed Alias Resolution with Space Search Reduction and IP Fingerprinting Network Traffic Measurement and Analysis Conference (TMA) Topology with BGP
2017
Fanou, R.
Francois, P.
Aben, E.
Mwangi, M.
Goburdhan, N.
Valera, F.
Four years tracking unrevealed topological changes in the african interdomain Computer Communications Topology with BGP
2017
Bublitz, S. Towards a BitTorrent Weather Forecast University of Zurich Topology with BGP
2017
Bangera, P.
Gorinsky, S.
Ads versus Regular Contents: Dissecting the Web Hosting Ecosystem The IFIP Networking Conference (NETWORKING 2017) Topology with BGP
2017
Asharov, G.
Demmler, D.
Schapira, M.
Schneider, T.
Segev, G.
Shenker, S.
Zohner, M.
Privacy-Preserving Interdomain Routing at Internet Scale Proceedings on Privacy Enhancing Technologies Topology with BGP
2017
Almeida, R.
Fonseca, O.
Fazzion, E.
Guedes, D.
Meira, W.
Cunha, I.
A Characterization of Load Balancing on the IPv6 Internet International Conference on Passive and Active Network Measurement Topology with BGP
2017
Al-Baghdadi, A. COMPUTING TOP-K CLOSENESS CENTRALITY IN UNWEIGHTED UNDIRECTED GRAPHS REVISITED Kent State University Topology with BGP
2016
Klick, J.
Lau, S.
Wahlisch, M.
Roth, V.
Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selection Internet Measurement Conference (IMC) Topology with BGP
2016
Jonker, M.
Sperotto, A.
van Rijswijk-Deij, R.
Sadre, R.
Pras, A.
Measuring the adoption of DDoS protection services Internet Measurement Conference (IMC) Topology with BGP
2016
Comarela, G.
Terzi, E.
Crovella, M.
Detecting unusually-routed ASes: Methods and applications Internet Measurement Conference (IMC) Topology with BGP
2016
Chung, T.
Choffnes, D.
Mislove, A.
Tunneling for transparency: A large-scale analysis of end-to-end violations in the Internet Internet Measurement Conference (IMC) Topology with BGP
2016
Chung, T.
Liu, Y.
Choffnes, D.
Levin, D.
Maggs, B.M.
Mislove, A.
Wilson, C.
Measuring and applying invalid SSL certificates: The silent majority Internet Measurement Conference (IMC) Topology with BGP
2016
Liquori, L.
Sereno, M.
LogNet: Extending Internet with a network aware discovery service Inria-French Inst. for Research in Computer Science Topology with BGP
2016
Bergamini, E.
Wegner, M.
Lukarski, D.
Meyerhenke, H.
Estimating current-flow closeness centrality with a multigrid Laplacian solver arxiv.org Topology with BGP
2016
Singh, R.
Koo, H.
Miramirkhani, N.
Miraj F., Akoglu
L., Gill P.
The politics of routing: Investigating the relationship between AS connectivity and Internet freedom arxiv.org Topology with BGP
2016
Schuchard, M.
Hopper, N.
E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentives arxiv.org Topology with BGP
2016
Hasan, S.A.U. The role of topology and contracts in Internet content delivery Univ. of Carlos III de Madrid Topology with BGP
2016
Cardona, J.C. Inter-domain traffic management in an evolving Internet peering ecosystem Univ. Carlos III de Madrid Topology with BGP
2016
Li, S.
Duan, H.
Wang, Z.
Liang, J.
Li, X.
An accurate distributed scheme for detection of prefix interception Science China Information Sciences Topology with BGP
2016
Eppstein, D.
Goodrich, M.T.
Lam, J.
Mamano, N.
Mitzenmacher, M.
Torres, M.
Models and algorithms for graph watermarking arxiv.org Topology with BGP
Topology with Skitter
2016
Guo, C.
Karsten, M.
On the feasibility of core-rooted path addressing IEEE/IFIP Network Operations and Management Symp. (NOMS) Topology with BGP
2016
Sukrit, G.
Rami, P.
Konstantin, K.
Comparative network analysis using KronFit Complex Networks Topology with BGP
2016
Niemela, M. Estimating Internet-scale Quality of Service parameters for VoIP Linkoping Univ. Topology with BGP
2016
Cardona, J.C.
Vissicchio, S.
Lucente, P.
Francois, P.
'I can't get no satisfaction': Helping autonomous systems identify their unsatisfied interdomain interests IEEE Trans. on Network and Service Management Topology with BGP
2016
Agache, A.
Antichi, G.
Eberhardt, F.
Eggert, L.
Hasselmeyer, P.
Hohlfeld, O.
Honda, M.
Ivanov, A.
Kimmerlin, M.
Klauck, S.
Kommeri, J.
Lettieri, G.
Oechsner, S.
Plauth, M.
Raiciu, C.
Ripke, A.
Sarolahti, P.
Schulte, L.
Tsolakou, E.
Wojcik, M.
Initial design of cloud infrastructure and federation mechanisms SSICLOPS Topology with BGP
2016
Zhao, M. Accountability in distributed systems with incomplete information University of Pennsylvania Topology with BGP
2016
Zhang, X.
Moore, C.
Newman, M.E.J.
Random graph models for dynamic networks Cornell University Topology with BGP
2016
Yuce, E.
Selcuk, A.A.
Server Notaries: A Complementary Approach to the Web PKI Trust Model IACR Cryptology Topology with BGP
2016
Yang, Y.
Shi, X.
Yin, X.
Wang, Z.
The Power of Prefix Hijackings in the Internet Hierarchy IEEE Trustcom/BigDataSE/ISPA Topology with BGP
2016
Wubbeling, M.
Meier, M.
Improved Calculation of aS Resilience against IP Prefix Hijacking IEEE Conference on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wassermann, S.
Casas, P.
Donnet, B.
Leduc, G.
Mellia, M.
On the Analysis of Internet Paths with DisNETPerf, a Distributed Paths Performance Analyzer IEEE Conference on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wassermann, S.
Casas, P.
Reverse Traceroute with DisNETPerf, a Distributed Internet Paths Performance Analyzer Annual IEEE Conference on Local Computer Networks Topology with BGP
2016
Wang, Y.
Bi, J.
Zhang, K.
Wu, Y.
A framework for fine-grained inter-domain routing diversity via SDN Eighth International Conference on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2016
Wang, C.
Li, Z.
Huang, X.
Zhang, P.
Inferring the average as path length of the Internet IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC) Topology with BGP
2016
Varghese, J.S.
Ruan, L.
Computing Customer Cones of Peering Networks Applied Networking Research Workshop Topology with BGP
2016
Tozal, M.E. Enumerating single destination, policy-preferred paths in AS-level Internet topology maps IEEE Sarnoff Symposium Topology with BGP
2016
Tozal, M.E. The Internet: A system of interconnected autonomous systems Annual IEEE Systems Conference (SysCon) Topology with BGP
2016
Teneva, N.
Mudrakarta, P.K.
Kondor, R.
Multiresolution Matrix Compression International Conference on Artificial Intelligence and Statistics Topology with BGP
2016
Syamkumar, M.
Durairajan, R.
Barford, P.
Bigfoot: A geo-based visualization methodology for detecting BGP threats IEEE Symposium on Visualization for Cyber Security (VizSec) Topology with BGP
2016
Sobrinho, J.L.
Vanbever, L.
Le, F.
Sousa, A.
Rexford, J.
Scaling the Internet Routing System Through Distributed Route Aggregation IEEE/ACM Transactions on Networking Topology with BGP
2016
Shao, X.
Wang, F.
Gao, L.
Fujikawa, K.
Harai, H.
Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the Internet IEEE Intl Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2016
Semertzidis, K.
Pitoura, E.
Terzi, E.
Tsaparas, P.
Best Friends Forever (BFF): Finding Lasting Dense Subgraphs arxiv.org Topology with BGP
2016
Schuchard, M.J. Adversarial Degradation of the Availability of Routing Infrastructures and Other Internet-Scale Distributed Systems University of Minnesota Topology with BGP
2016
Satake, K.
Arakawa, S.
Murata, M.
Analyses of core-periphery structure in Internet's AS-level topologies Graduate School of Information Science and Technology, Osaka University Topology with BGP
2016
Revelo, D.
Ricci, M.A.
Donnet, B.
Alvarez-Hamlin, J.I.
Unveiling the MPLS Structure on Internet Topology International Workshop on Traffic Monitoring and Analysis (TMA) Topology with BGP
2016
Pacifici, V.
Dan, G.
Coordinated Selfish Distributed Caching for Peering Content-Centric Networks IEEE/ACM Transactions on Networking Topology with BGP
2016
Nasr, M.
Houmansadr, A.
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory ACM SIGSAC Conference on Computer and Communications Security Topology with BGP
2016
Motamedi, R. Measurement-Based Characterization of Large-Scale Networked Systems University of Oregon Topology with BGP
2016
Meghanathan, N. Advanced Methods for Complex Network Analysis Advances in Wireless Technologies and Telecommunication (AWTT) Topology with BGP
2016
Machado, F.F. ANALYSIS OF THE DEGREE RANKING STABILITY IN SCALE-FREE NETWORKS Federal University of Rio de Janeiro Topology with BGP
2016
Liu, Z.
Jin, H.
Hu, Y.C.
Bailey, M.
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet ACM SIGSAC Conference on Computer and Communications Security Topology with BGP
2016
Kriegel, P. DETERMINING THE LOCATION OF AUTONOMOUS SYSTEM RELATIONS AMONG TOP TIER INTERNET SERVICE PROVIDERS IN THE UNITED STATES University of Oregon Topology with BGP
2016
Kotronis, V.
Kloti, R.
Rost, M.
Georgopoulos, P.
Ager, B.
Schmid, S.
Dimitropoulos, X.
Stitching Inter-Domain Paths over IXPs Proceedings of the Symposium on SDN Research Topology with BGP
2016
Hoang, N.P. Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network Graduate School of Informatics, Kyoto University Topology with BGP
2016
Greunke, B. Distributed Emulation in Support of Large Networks Naval Postgraduate School Topology with BGP
2016
Garcia-Robledo, A.
Diaz-Perez, A.
Morales-Luna, G.
Characterization and Coarsening of Autonomous System Networks: Measuring and Simplifying the Internet Advanced Methods for Complex Network Analysis Topology with BGP
2016
Feng, Z.
Xu, M.
Yang, Y.
Revolutionizing the inter-domain business model by information-centric thinking IEEE International Conference on Communications (ICC) Topology with BGP
2016
Eberle, W.
Holder, L.
Identifying Anomalies in Graph Streams Using Change Detection International Workshop on Mining and Learning with Graphs Topology with BGP
2016
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
Jumpstarting BGP Security with Path-End Validation ACM SIGCOMM Conference Topology with BGP
2016
Chen, M.
Xu, M.
Li, Q.
Yang, Y.
Measurement of large-scale BGP events: Definition, detection, and analysis Computer Networks Topology with BGP
2016
Barton, A.
Wright, M.
DeNASA: Destination-Naive AS-Awareness in Anonymous Communications Proceedings on Privacy Enhancing Technologies Topology with BGP
2015
Wassermann, S.
Casas, P.
Donnet, B.
Towards DisNETPerf: a distributed Internet paths performance analyzer ACM CoNEXT Student Workshop Topology with BGP
2015
Meiling, S.
Schmidt, T.C.
Steinbach, T.
On performance and robustness of Internet-based smart grid communication: A case study for Germany Intl Conference on Smart Grid Communications (SmartGridComm) Topology with BGP
2015
Johnson, A.
Jansen, R.
Jaggard, A.D.
Feigenbaum, J.
Syverson, P.
Avoiding the Man on the Wire: Improving Tor's security with trust-aware path selection arxiv.org Topology with BGP
2015
Hirayama, T.
Toyoda, K.
Sasase, I.
Fast target link flooding attack detection scheme by analyzing traceroute packets flow Intl Workshop on Information Forensics and Security (WIFS) Topology with BGP
2015
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
One hop for RPKI, one giant leap for BGP security Proc. Workshop on Hot Topics in Networks Topology with BGP
2015
Chen, Z.
Bi, J.
Fu, Y.
Wang, Y.
Xu, A.
MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDN Intl Conference on Network Protocols (ICNP) Topology with BGP
2015
Szabo, D.
Korosi, A.
Biro, J.
Gulyas, A.
Deductive way of reasoning about the Internet AS level topology Chin. Phys. B Topology with BGP
2015
Meslmawy, M.A.S. Efficient resources management in a ditributed computer system, modeled as a dynamic complex system Univ. du Havre Topology with BGP
2015
Li, S.
Duan, H.
Wang, Z.
Li, X.
Route leaks identification by detecting routing loops Intl Conference on Security and Privacy in Communication Systems (SecureComm) Topology with BGP
2015
Konte, M.
Perdisci, R.
Feamster, N.
ASwatch: An AS reputation system to expose bulletproof hosting ASes ACM SIGCOMM Computer Communication Review Topology with BGP
2015
Chiu, Y.-C.
Schlinker, B.
Radhakrishnan, A.B.
Katz-Bassett, E.
Govindan, R.
Are we one hop away from a better Internet? Internet Measurement Conference (IMC) Topology with BGP
2015
Anwar, R.
Niaz, H.
Choffnes, D.
Cunha, I.
Gill, P.
Katz-Bassett, E.
Investigating interdomain routing policies in the wild Internet Measurement Conference (IMC) Topology with BGP
2015
Ahmed, N.
Sarac, K.
An experimental study on inter-domain routing dynamics using IP-level path traces Conference on Local Computer Networks (LCN) Topology with BGP
2015
Yang, H.
Lam, S.S.
Scalable verification of networks with packet transformers using atomic predicates Univ. Texas, Austin Topology with BGP
2015
Lee, T.
Szalachowski, P.
Barrera, D.
Perrig, A.
Lee, H.
Watrin, D.
Bootstrapping real-world deployment of future Internet architectures arxiv.org Topology with BGP
2015
Kurar, B.
Tahboub, R.
Internet scale DoS attacks Intl J. of Applied Mathematics, Electronics and Computers Topology with BGP
2015
Abu-Ata, M.
Dragan, F.F.
Metric tree-like structures in real-world networks: an empirical study Networks Topology with BGP
Topology with Skitter
2015
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type prediction in Internet AS graphs Iowa State Univ. Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Brief announcement: Routing the Internet with very few entries Proc. Symp. on Principles of Distributed Computing (PODC) Topology with BGP
2015
Rye, E.C. Evaluating the limits of network topology inference via virtualized network emulation Naval Postgraduate School Topology with BGP
2015
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.-J.
Perrig, A.
Designing a global authentication infrastructure arxiv.org Topology with BGP
2015
Chen, C.
Matsumoto, S.
Perrig, A.
ECO-DNS: Expected consistency optimization for DNS Intl. Conference on Distributed Computing Systems (ICDCS) Topology with BGP
2015
Tao, N.
Chen, X.
Fu, X.
AS path inference: From complex network perspective Networking Conference (IFIP) Topology with BGP
2015
Lee, J.Y.
Oh, J.C.
A node-centric reputation computation algorithm on online social networks Applications of Social Media and Social Network Analysis Topology with BGP
2015
Fanou, R.
Francois, P.
Aben, E.
On the diversity of interdomain routing in Africa Lecture Notes in Computer Science (LNCS) Topology with BGP
2015
Erunika, O.
Kaneko, K.
Taraoka, F.
Performance evaluation of host-based mobility management schemes in the Internet Intl. Conference on Mobile Computing and Ubiquitous Networking (ICMU) Topology with BGP
2015
Wang, M.
Zhou, H.
Chen, J.
OpenISMA: An Approach of Achieving a Scalable OpenFlow Network by Identifiers Separating and Mapping Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) Topology with BGP
2015
Shah, A.
Papadopoulos, C.
Characterizing International BGP Detours Colorado State University Technical Report Topology with BGP
2015
Nakata, Y.
Arakawa, S.
Murata, M.
A provider and peer selection policy for the future sustainable internet Intl J. of Management and Network Economics Topology with BGP
2015
Masatoshi, E.
Hayama, H.
Tsuyoshi, O.
Yamaguchi, Y.
A Proposal of Estimation Method of Consumed Memory Amount by Regression Analysis for Constructing AS Emulation Environment by Virtual Computer Nara Institute of Science and Technology Topology with BGP
2015
Leskovec, J.
Lang, K.J.
Dasgupta, A.
Mahoney, M.W.
Large-scale community structure in social and information networks Topology with BGP
2015
Kloti, R.
Kotronis, V.
Ager, B.
Dimitropoulos, X.
Policy-compliant path diversity and bisection bandwidth IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2015
Hu, X.Y.
Gong, J.
Multipath inter-domain routing for named data networking Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Router in Internet with fifteen entries Francophone Meeting on Algorithmic Aspects of Telecommunications Topology with BGP
2015
Eikema, B. BGP Routing Security and Deployment Strategies University of Amsterdam Topology with BGP
2015
Eberle, W.
Holder, L.
Scalable anomaly detection in graphs Intelligent Data Analysis Topology with BGP
2015
Acedo, J.C. Evolution of the Internet topology from a regional perspective Univ. of Arizona Topology with BGP
2014
Palacin, M.
Bikfalvi, A.
Oliver, M.
Mercury: Revealing hidden interconnections between access ISPs and content providers EUNICE Topology with BGP
2014
Johnson, T.
Lazos, L.
Network anomaly detection using autonomous system flow aggregates IEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2014
Ahmed, N.
Kamil, Sarac
Measuring path divergence in the Internet Intl Conference on Performance Computing and Communications (IPCCC) Topology with BGP
2014
Lodhi, A.H. The economics of internet peering interconnections Georgia Inst. of Technology Topology with BGP
2014
Yang, H.
Lam, S.S.
Collaborative verification of forward and reverse reachability in the Internet data plane IEEE Intl Conference on Network Protocol (ICNP) Topology with BGP
2014
Sousa, A.C.M. Scaling the Internet routing system through route aggregation Tecnico Lisboa Topology with BGP
2014
Sha, Z.
Panchal, J.
Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice mode Intl Conference on Systems, Man, and Cybernetics (SMC) Topology with BGP
2014
Retvari, G.
Szabo, D.
Gulyas, A.
Korosi, A.
Tapolcai, J.
An information-theoretic approach to routing scalability Proc. Workshop on Hot Topics in Networks (HotNets) Topology with BGP
2014
Gamperli, A.
Kotronis, V.
Dimitropoulos, X.
Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework SIGCOMM Computer Communication Review Topology with BGP
2014
Eberle, W.
Holder, L.
A partitioning approach to scaling anomaly detection in graph streams Intl. Conference on Big Data Topology with BGP
2014
Wu, X.
Griffioen, J.
Supporting application-based route selection Intl Conference on Computer Communication and Networks (ICCCN) Topology with BGP
2014
Sankey, J.
Wright, M.
Dovetail: stronger anonymity in next-generation Internet routing Intl Symp. on Privacy Enhancing Technologies (PETS) Topology with BGP
2014
Bangera, P.
Gorinsky, G.
Economics of traffic attraction by transit providers IFIP Networking Conf. Topology with BGP
2014
Ascigil, O.
Calvert, K.L.
Griffioen, J.N.
On the scalability of interdomain path computations Networking Conference (IFIP) Topology with BGP
2014
Zhu, M.
Li, J.
Liu, Y.
Li, D.
Wu, J.
TED: Inter-domain traffic engineering via deflection Intl Symp. of Quality of Service (IWQoS) Topology with BGP
2014
Zhu, M.
Liu, Y.
Li, J.
Wu, J.
CCOF: Congestion control on the fly for inter-domain routing Intl Workshop on Local and Metropolitan Area Networks (LANMAN) Topology with BGP
2014
Qazi, S.
Moors, T.
Disjoint-path selection in Internet: What traceroutes tell us? arxiv.org Topology with BGP
2014
Li, M.
Wang, H.
Yang, J.
Li, C.
A value based framework for provider selection of regional ISPs Symp. on Network Operations and Management (NOMS) Topology with BGP
Topology with Skitter
2014
Borici, A.
Thomo, A.
Semantic graph compression with hypergraphs Intl Conference on Advanced Information Networking and Applications Topology with BGP
2014
Visala, K.
Keating, A.
Khan, R.H.
Models and tools for the high-level simulation of a name-based interdomain routing architecture Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2014
Sha, Z.
Panchal, J.H.
Estimating local decision-making behavior in complex evolutionary systems J. of Mechanical Design Topology with BGP
2014
Sahhaf, S.
Tavernier, W.
Colle, D.
Pickavet, M.
Demeester, P.
Availability analysis of resilient geometric routing on Internet topology Intl Conference on Design of Reliable Communication Networks (DRCN) Topology with BGP
2014
Hasan, S.
Gorinsky, S.
Dovrolis, C.
Sitaraman, R.K.
Trade-offs in optimizing the cache deployments of CDNs IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2014
Chen, K.
Fhoffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users IEEE Trans. on Computers Topology with BGP
2014
Mazloum, R.
Buob, M.-O.
Auge, J.
Baynat, B.
Ross, D.
Friedman, T.
Violation of interdomain routing assumptions Passive and Active Measurement (PAM) Topology with BGP
2014
Laszka, A.
Johnson, B.
Grossklags, J.
Felegyhazi, M.
Estimating systematic risk in real-world networks Proc. Conference on Financial Cryptography and Data Security Topology with BGP
2014
Houmansadr, A.
Wong, E.L.
Shmatikov, V.
No direction home: The true cost of routing around decoys Network and Distributed System Security Symp. (NDSS) Topology with BGP
2014
Tan, F
Wu, J.
Xia, Y.
Tse, C.K.
Traffic congestion in interconnected complex networks arxiv.org Topology with BGP
2014
Geva, M.
Herzberg, A.
Gev, Y.
Bandwidth Distributed Denial of Service: Attacks and defenses IEEE Security and Privacy Topology with BGP
2013
Lee, S.B.
Kang, M.S.
Gligor, V.D.
CoDef: Collaborative defense against large-scale link-flooding attacks ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eriksson, B
Durairajan, R.
Barford, P.
RiskRoute: A framework for mitigating network outage threats ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eberle, W.
Holder, L.
Incremental anomaly detection in graphs Intl Conference on Data Mining Workshops Topology with BGP
2013
Gersch, J.
Massey, D.
Characterizing vulnerability to IP hijack attempts IEEE Intl Conference on Technologies for Homeland Security (HST) Topology with BGP
2013
Zhao, M.
Aditya, P.
Chen, A.
Lin, Y.
Haeberlen, A.
Druschel, P.
Maggs, B.
Wishon, B.
Ponec, M.
Peer-assisted content distribution in Akamai NetSession Internet Measurement Conference (IMC) Topology with BGP
2013
Papadopoulos, S.
Theodoridis, G.
Tzovaras, D.
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies Visualization for Cyber Security (VizSec) Topology with BGP
2013
Karaarslan, E.
Perez, A.G.
Siaterlis, C.
Recreating a large-scale BGP incident in a realistic environment Information Sciences and Systems , Proc Intl Symp. on Computer and Information Sciences Topology with BGP
2013
Bangera, P.
Gorinsky, S.
An economic perspective on traffic attraction by Internet transit providers IEEE Intl Conference on Network Protocols (ICNP) Topology with BGP
2013
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack Hong Kong Univ. of Science and Technology Topology with BGP
UCSD Network Telescope
2013
Meirom, E.A.
Mannor, S.
Orda, A.
Network formation games and the Internet structure arxiv.org Topology with BGP
2013
Lian, W.
Rescorla, E.
Shacham, H.
Savage, S.
Measuring the practical impact of DNSSEC deploymen Usenix Security Conference (SEC) Topology with BGP
2013
Lee, J.Y.
Oh, J.C.
A model for recursive propagations of reputations in social networks IEEE/ACM Intl Conference on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2013
Wang, Y.
Wang, Z.
Zhang, L.
An epidemic-dynamics-based model for CXPST spreading in inter-domain routing system Proc. Intl Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA) Topology with BGP
2013
Nappa, A.
Rafique, M.Z.
Caballero1, J.
Driving in the cloud: An analysis of drive-by download operations and abuse reporting Proc. Intl Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing survivability of inter-domain routing system under cascading failures Frontiers in Internet Technologies, Second CCF Internet Conference of China (ICoC) Topology with BGP
2013
Kaur, B.
Kahlon, K.S.
Sharma, S.
Inter-domain routing with shielded infrastructure and buzzer technique Intl J. of Computer Applications Topology with BGP
2013
Pacifici, V.
Dan, G.
Stable content-peering of autonomous systems in a content-centric network Swedish National Computer Networking Workshop (SNCNW) Topology with BGP
2013
Misseri, X.
Gojmerac, I.
Rougier, J.-L.
IDRD: Enabling inter-domain route diversity IEEE Intl Conference on Communications (ICC) Topology with BGP
2013
Lehrieder, F. Performance evaluation and optimization of content distribution using overlay networks Julius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE Topology with BGP
2013
Sankey, J.M Dovetail: stronger anonymity in next-generation Internet routing Univ. Texas, Arlington, TX, US Topology with BGP
2013
Jiang, J.
Luo, J.
Li, W.
Lu, Y.
Constraint conditions to eliminate AS incentive of lying in interdomain routing Symp. on Integrated Network Management (IM) Topology with BGP
2013
Hsiao, H.-C.
Kim, T.H.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.
Perrig, A.
STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapment Proc. ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS) Topology with BGP
2013
Pacifici, V.
Dan, G.
Content-peering dynamics of autonomous caches in a content-centric network Proc. IEEE INFOCOM Topology with BGP
2013
Neudorfer, L.
Shavitt, Y.
Zilberman, N.
Improving AS relationship inference using PoPs Proc. IEEE INFOCOM Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
Taenaka, Y.
Hazeyama, H.
PhishCage: reproduction of fraudulent websites in the emulated Internet Proc. Intl ICST Conference on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
COSMO - Emulation of Internet traffic (poster abstract) Proc. Intl ICST Conference on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyachi, T.
Miwa, S.
Design and implementation of XBurner Proc. Intl ICST Conference on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Marchetta, P.
de Donato, W.
Pescape, A.
Detecting third-party addresses in traceroute traces with IP timestamp option Passive and Active Measurement (PAM) Topology with BGP
2013
Camacho, J.M.
Garcia-Martinez, A.
Bagnulo, M.
Valera, F.
BGP-XM: BGP eXtended multipath for transit Autonomous Systems Computer Networks Topology with BGP
2013
Matsuda, K.
Hasegawa, G.
Kamei, S.
Murata, M.
A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurement IEICE Trans. on Information and Systems Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
A study of IP prefix hijacking in cloud computing networks Security Comm. Networks Topology with BGP
2013
Qin, D.
Yang, J.
Wang, H.
Experimental study on diversity and novelty of interdomain paths Chinese Journal of Electronics Topology with BGP
2013
Palacin, M.
Oliver, M.
Infante, J.
Oechsner, S.
Bikfalvi, A.
The impact of content delivery networks on the Internet ecosystem J. of Information Policy Topology with BGP
2013
Moses, K.V. Improving IP-based geo-location through Internet topology and geospatial datasets Duke Univ., Durham, NC, US Topology with BGP
2013
Mislove, A.
Koppula, H.S.
Gummadi, K.P.
Druschel, P.
Bhattacharjee, B.
An empirical validation of growth models for complex networks Dynamics On and Of Complex Networks Topology with BGP
2013
Erola, P.
Gomez, S.
Arenas, A.
On the routability of the Internet Dynamics On and Of Complex Networks Topology with BGP
2013
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-Betweenness vertices from heterogeneous networks The Influence of Technology on Social Network Analysis and Mining, Ch. 11 Topology with BGP
2012
Vasilakos, X.
Katsaros, K.
Xylomenos, G.
Cloud computing for global name-resolution in information-centric networks IEEE Symp. on Network Cloud Computing and Applications (NCCA) Topology with BGP
2012
Meyer, S.
Wahlisch, M.
Schmidt, T.C.
Exploring reachability via settlement-free peering ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2012
Ekbatani, H.R. Investigating the mutual impact of the P2P overlay and the AS-level underlay Univ. Oregon, Eugene, OR, US Topology with BGP
2012
Schuchard, M.
Geddes, J.
Thompson, C.
Hopper, N.
Routing around decoys ACM Conference on Computer and Communications Security (CCS) Topology with BGP
2012
Dinh, T.N.
Shen, Y.
Thai, M.T.
An efficient spectral bound for link vulnerability assessment in large-scale networks IEEE Military Communications Conference (MILCOM) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
A tale of nine Internet exchange points: studying path latencies through major regional IXPs IEEE Conference on Local Computer Networks (LCN) Topology with BGP
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the internet evolution Network Operations and Management Symp. (APNOMS) Topology with BGP
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the Internet evolution Network Operations and Management Symp. (APNOMS) Topology with BGP
2012
Juen, J. Protecting anonymity in the presence of autonomous system and internet exchange level adversaries Univ. Illinois, Urbana-Champaign Topology with BGP
2012
Cohen, N.
Couderty, D.
Lancin, A.
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs Project-Team MASCOTTE, INRIA Topology with BGP
2012
Burger, V.
Lehrieder, F.
Hossfeld, T.
Seedorf, J.
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms Teletraffic Congress (ITC) Topology with BGP
2012
Rajahalma, J. Inter-domain incentives and Internet architecture Aalto Univ., FI Topology with BGP
2012
Orman, G.K.
Labatut, V.
Cherifi, H.
Comparative evaluation of community detection algorithms: a topological approach J. Stat. Mechanics: Theory and Experiment Topology with BGP
2012
Gjoka, M.
Kurant, M.
Markopoulou, A.
2.5K-graphs: from sampling to generation arxiv.org Topology with BGP
2012
Beben, A.
Batalla, J.M.
Chai, W.K.
Sliwinski, J.
Multi-criteria decision algorithms for efficient content delivery in content networks Ann. Telecommunications Topology with BGP
2012
Ager, B.
Chatzis, N.
Feldmann, A.
Sarrar, N.
Uhlig, S.
Willinger, W.
Anatomy of a large European IXP ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2012
Sherry, J.
Kim, D.
Mahalingam, S.
Tang, A.
Wang, S.
Ratnasamy, S.
Netcalls: End host function calls to network traffic processing services UC Berkeley Topology with BGP
2012
Fujikawa, K.
Tazaki, H.
Harai, H.
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network Symp. on Applications and the Internet (SAINT) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Evaluating end-user network benefits of peering with path latencies IEEE Conference on Computer Communications and Networks (ICCCN) Topology with BGP
2012
Tomasik, J.
Weisser, M.-A.
The inter-domain hierarchy in measured and randomly generated AS-level topologies IEEE Conference on Communications (ICC) Topology with BGP
2012
Sobrinho, J.L.
Tiago Quelhas, T.
A theory for the connectivity discovered by routing protocols IEEE/ACM Trans. on Networking (TON) Topology with BGP
2012
Keating, A. Models for the simulation of a name-based interdomain routing architecture Aalto Univ., FI Topology with BGP
2012
Hsiao, H.-C.
Kim, T.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.D.
Perrig, A.
Sanctuary trail: refuge from Internet DDoS entrapment Carnegie Mellon Univ. Topology with BGP
2012
Deng, W.
Muhlbauer, W.
Yang, Y.
Zhu, P.
Lu, X.
Plattner, B.
Shedding light on the use of AS relationships for path inference J. Communications and Networks Topology with BGP
2012
Cesareo, J.
Karlin, J.
Schapira, M.
Rexford, J.
Optimizing the placement of implicit proxies Princeton Univ. Topology with BGP
2012
Cesareo, J. Optimizing implicit proxy placement to evade traffic filters Princeton Univ. Topology with BGP
2012
Tozal, M.E.
Sarac, K.
Estimating network layer subnet characteristics via statistical sampling Intl IFIP TC 6 Networking Conf., Part I Topology with BGP
2012
Seibert, J. Security and economic implications of localizing traffic in overlay networks Purdue Univ. Topology with BGP
2012
Saucez, D.
Donnet, B.
On the dynamics of locators in LISP Networking Topology with BGP
2012
Nozaki, Y.
Tuncer, H.
Shenoy, N.
ISP tiered model based architecture for routing scalability IEEE Conference on Communications (ICC) Topology with BGP
2012
Liu, Y.
Su, J.
Chang, R.K.C.
LDC: Detecting BGP prefix hijacking by load distribution change Parallel and Distributed Processing Symp. Workshops (IPDPSW) Topology with BGP
2012
Hasan, S.
Gorinsky, S.
Obscure giants: detecting the provider-free ASes Networking Topology with BGP
2012
Chaudhury, A.
Basuchowdhuri, P.
Majumder, S.
Spread of information in a social network using influential nodes Advances in Knowledge Discovery and Data Mining Topology with BGP
2012
Chai, W.K.
He, D.
Psaras, I.
Pavlou, G.
Cache 'less for more' in information-centric networks Networking Topology with BGP
2012
Pasquini, R.
Verdi, F.L.
Magalhaes, M.F.
Towards local routing state in the future internet WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2012
Liu, H.
Hu, X.
Zhao, D.
Lu, X.
Failure isolation based defense against Internet CXPST-like attack J. Hybrid Information Technology Topology with BGP
2012
Strowes, S.D.
Perkins, C.
Harnessing Internet topological stability in Thorup-Zwick compact routing IEEE INFOCOM Topology with BGP
2012
Sobrinho, J.L.
Le, F.
A fresh look at inter-domain route aggregation IEEE INFOCOM Topology with BGP
2012
Ribeiro, B.
Basu, P.
Towsley, D.
Multiple random walks to uncover short paths in power law networks IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Qin, D.
Yang, J.
Liu, Z.
Wang, H.
Zhang, B.
Zhang, W.
AMIR: Another multipath interdomain routing IEEE Conference on Advanced Information Networking and Applications (AINA) Topology with BGP
2012
Lutu, A.
Bagnulo, M.
Stanojevic, R.
An economic side-effect for prefix deaggregation IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Grey, M.
Rossberg, M.
Schaefer, G.
Automatic creation of VPN backup paths for improved resilience against BGP-attackers ACM Symp. on Applied Computing (SAC) Topology with BGP
2012
Qin, D.
Yang, J.
Wang, H.
Zhang, B.
Gao, L.
Liu, Z.
Multipath interdomain routing via deviation from primary path Conference on Information Networking (ICOIN) Topology with BGP
2012
Edwards, B.
Hofmeyr, S.
Stelle, G.
Forrest, S.
Internet topology over time arxiv.org Topology with BGP
2012
Wei, W.
Yingjie, X.
Yabo, D.
ASTVA: DDoS-limiting architecture for Next Generation Internet Adv. Materials Research Topology with BGP
2012
Chen, Y.
Le Merrer, E.
Li, Z.
Yaning Liu, Y.
Simon, G.
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV Computer Networks Topology with BGP
2011
Drivere, A.A. Can we study the topology of the Internet from the vantage points of large and small content providers? Youngstown State Univ. Topology with BGP
2011
Liu, Y.
Peng, W.
Su, J.
Study on IP prefix hijacking in cloud computing networks based on attack planning Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) Topology with BGP
2011
Chen, M.
Yu, L.
Bai, H.
Two propositions about geographical distributions of BitTorrent file resources Conference on Informatics, Cybernetics, and Computer Engineering (ICCE) Topology with BGP
2011
Takahashi, Y.
Ishibashi, K.
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic Conference on Network Games, Control and Optimization (NetGCooP) Topology with BGP
2011
Kurant, M.
Markopoulou, A.
Towards unbiased BFS sampling IEEE J. Selected Areas in Communications Topology with BGP
2011
Gjoka, M.
Kurant, M.
Butts, C.T.
Markopoulou, A.
Practical recommendations on crawling online social networks IEEE J. Selected Areas in Communications Topology with BGP
2011
Zhang, B.-F.
Li, Y.
Liu, Y.-J.
Su, J.-S.
Analysis of prefix hijacking based on AS hierarchical model Conference on Network and System Security (NSS) Topology with BGP
2011
Szekeres, A. Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failures Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam Topology with BGP
2011
Alvarez-Hamelin, J.I.
Anunziata, D.
Beiro, M.G.
Barrat, A.
Dall'Asta, L.
Vespignani, A.
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool) Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires Topology with BGP
2011
Wong, E.L.
Shmatikov, V.
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing Conference on Dependable Systems and Networks (DSN) Topology with BGP
2011
Strowes, S.D.
Mooney, G.
Perkins, C.
Compact routing on the Internet AS-graph IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2011
Liu, Y.
Dai, B.
Zhu, P.
Su, J.
Whom to convince? It really matters in BGP prefix hijacking attack and defense Future Information Technology Topology with BGP
2011
Karaoglu, H.T.
Yuksel, M.
Gunes, M.H.
On the scalability of path exploration using opportunistic path-vector routing IEEE Conference on Communications (ICC) Topology with BGP
2011
Helminger, M. Interactive visualization of global routing dynamics Technische Univ. Muenchen, Faculty of Informatics Topology with BGP
2011
Amaral, P.
Silva, E.
Bernardo, L.
Pinto, P.
Inter-domain traffic engineering using an AS-level multipath routing architecture IEEE Conference on Communications (ICC) Topology with BGP
2011
Siritana, H.
Kitisin, S.
Gertphol, S.
A study of autonomous system relationships within Thailand Conference on Computer Science and Software Engineering (JCSSE) Topology with BGP
2011
Akashi, O. Analysis of cooperative management strategies against route-hijacking IFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
Topology with Skitter
2011
Scholz, J.
Greiner, M.
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics EPL (Europhysics Letters) Topology with BGP
Topology with Skitter
2011
Deng, W.
Zhu, P.
Xiong, N.
Xiao, Y.
Xiaofeng, H.
How resilient are individual ASes against AS-level link failures? IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2011
Deng, W.
Karaliopoulos, M.
Muehlbauer, W.
Zhu, P.
Lu, X.
Plattner, B.
k-Fault tolerance of the Internet AS graph Computer Networks Topology with BGP
2011
Wu, H.
Kvizhinadze, G.
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies Statistics and Probability Letters Topology with BGP
2011
Melnik, S.
Hackett, A.
Porter, M.A.
Mucha, P.J.
Gleeson, J.P.
The unreasonable effectiveness of tree-based theory for networks with clustering Phys. Rev. E Topology with BGP
Topology with Skitter
2011
Bangera, P.
Gorinsky, S.
Impact of prefix hijacking on payments of providers Conference on Communication Systems and Networks (COMSNETS) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system J. of Next Generation Information Technology Topology with BGP
2010
Rasti, A.H.
Magharei, N.
Rejaie, R.
Willinger, W.
Eyeball ASes: from geography to connectivity Internet Measurement Conference (IMC) Topology with BGP
2010
Huang, D.
Zhao, J.
Wang, X.
Trading bandwidth for playback lag: Can active peers help? Multi-media Conf. Topology with BGP
2010
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols? ACM SIGCOMM Computer Communication Review Topology with BGP
2010
Asai, H.
Esaki, H.
Estimating AS relationships for application-layer traffic optimization Workshop on Incentives, Overlays, and Economic Traffic Control (ETM) Topology with BGP
2010
Asai, H.
Esaki, H.
Towards interdomain transit traffic reduction in peer-assisted content delivery networks Symp. on Telecommunications Network Strategy and Planning (NETWORKS) Topology with BGP
2010
Hanif, S. Impact of topology on BGP convergence Dept. Computer Science, VU Univ. Amsterdam Topology with BGP
2010
Guo, T.
Wang, N.
Tafazolli, R.
Moessner, K.
Policy-aware virtual relay placement for inter-domain path diversity IEEE Symp. on Computers and Communications (ISCC) Topology with BGP
2010
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-betweenness vertices Conference on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2010
Elena, E.
Rougier, J.
Secci, S.
Characterisation of AS-level path deviations and multipath in Internet routing EURO-NF Conference on Next Generation Internet (NGI) Topology with BGP
2010
Vilhar, A.
Novak, R.
Kandus, G.
The impact of network topology on the performance of MAP selection algorithms Computer Networks Topology with BGP
2010
Tarkoma, S.
Antikainen, M.
Canopy: publish/subscribe with upgraph combination IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2010
Rajahalme, J. Incentive-informed inter-domain multicast IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2010
Hu, C.
Chen, K.
Chen, Y.
Liu, B.
Evaluating potential routing diversity for internet failure recovery IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2010
Dou, B-L
Wang, X-G
Zhang, S-Y
Robustness of networks against cascading failures Physica A: Statistical Mechanics and its Applications Topology with BGP
2010
Xuan, Q.
Du, F.
Wu, T-J
Partially ordered sets in complex networks J. Phys. A: Math. Theor. Topology with BGP
2010
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Bonaventura, O.
Extracting intra-domain topology from mrinfo probing Passive and Active Measurement (PAM) Topology with BGP
2010
DiBenedetto, S.
Stone, A.
Strout, M.
Massey, D.
Simulating internet scale topologies with metarouting Colorado State Univ. Topology with BGP
2010
Chen, K.
Hu, C.
Zhang, W.
Chen, Y.
Liu, B.
On the eyeshots of BGP vantage points IEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2010
Amaral, P.
Ganhao, F.
Assuncao, C.
Bernardo, L.
Pinto, P.
Scalable multi-region routing at inter-domain level IEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
A study of hinge-transmit property of BGP routing system Forum on Computer Science-Technology and Applications (IFCSTA) Topology with BGP
2009
Strowes, S.D.
Perkins, C.
Deterministic, reduced-visibility inter-domain forwarding ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Rajahalme, J.
Sarela, M.
Visala, K.
Riihijarvi, J.
Inter-domain rendezvous service architecture PSIRP (TR09-003) Topology with BGP
2009
Miller, K.
Eliassi-Rad, T.
Continuous time group discovery in dynamic graphs Workshop on Analyzing Networks and Learning with Graphs (NIPS) Topology with BGP
2009
Chen, K.
Choffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Merindol, P.
Van den Schrieck, V.
Donnet, B.
Bonaventure, O.
Pansiot, J.-J.
Quantifying ASes multiconnectivity using multicast information Internet Measurement Conference (IMC) Topology with BGP
2009
Studer, A.
Perrig, A.
The coremelt attack Symp. on Research in Computer Security (ESORICS) Topology with BGP
2009
Shu, W.
Changjia, C.
Backup routing for BGP: Virtual ring routing scheme IEEE Conference on Computer Science and Information Technology (ICCSIT) Topology with BGP
2009
Avramopoulos, I.
Suchara, M.
Protecting DNS from routing attacks: a comparison of two alternative anycast implementations IEEE Security and Privacy Topology with BGP
2009
Yang, G.
Dou, W.
An efficient algorithm for AS path inferring Conference on Hybrid Information Technology Topology with BGP
2009
Miwa, S.
Suzuki, M.
Hazeyama, H.
Uda, S.
Miyachi, T.
Kadobayashi, Y.
Shinoda, Y.
Experiences in emulating 10K AS topology with massive VM multiplexing ACM workshop on Virtualized infrastructure systems and architectures Topology with BGP
2009
Cittadini, L.
Rimondini, M.
Corea, M.
Di Battista, G.
On the feasibility of static analysis for BGP convergence IFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
2009
Asai, H.
Esaki, H.
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs Asia Future Internet summer school, Jeju, Korea Topology with BGP
2009
Amaral, P.
Bernardo, L.
Pinto, P.
DTIA: An Architecture for Inter-Domain Routing IEEE Conference on Communications (ICC) Topology with BGP
2009
Bui, Q.D.
Jennings, A.
Relay node selection in large-scale VoIP overlay networks Conference on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2009
Xu, Y.
Zhang, W.
A power-law approach on router-level internet macroscopic topology modeling Fuzzy Information and Engineering, Volume 2 Topology with BGP
2009
Shavitt, Y.
Shir, E.
Weinsberg, U.
Near-deterministic inference of AS relationships Conference on Telecommunications (ConTEL) Topology with BGP
2009
Asai, H.
Esaki, H.
A methodology for magnitude-based inter-AS distance estimation WIT, Hokkaido, Japan Topology with BGP
2009
Di Menna, A.
Refice, T.
Cittadini, L.
Di Battista, G.
Measuring route diversity in the internet from remote vantage points IEEE Conference on Networking (ICN) Topology with BGP
2009
D'Ignazio, A.
Giovannetti, E.
Asymmetry and discrimination in Internet peering: evidence from the LINX J. Industrial Organization Topology with BGP
2009
Weinsberg, U.
Shavitt, Y.
Shir, E.
Near-deterministic inference of AS relationships IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2009
Liu, B.
Cui, Y.
Lu, Y.
Xue, Y.
Locality-awareness in BitTorrent-like P2P applications IEEE Trans. on Multimedia Topology with BGP
2009
Hasegawa, G.
Hiraoka, Y.
Murata, M.
Evaluation of free-riding traffic problem in overlay routing and its mitigation method Conference on Networking and Services (ICNS) Topology with BGP
2009
Haeberlen, A.
Avramopoulos, I.
Rexford, J.
Druschel, P.
NetReview: detecting when interdomain routing goes wrong Usenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2009
Eberle, W.
Holder, L.
Cook, D.
Identifying threats using graph-based anomaly detection Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4 Topology with BGP
2009
Zhang, G. Measuring the impacts of sampling bias on internet AS-level topology inference WRI Conference on Communications and Mobile Computing (CMC) Topology with BGP
2009
Lumezanu, C.
Baden, R.
Spring, N.
Bhattacharjee, B.
Triangle inequality and routing policy violations in the internet Passive and Active Measurement (PAM) Topology with BGP
2009
Puzis, R.
Yagil, D.
Elovici, Y.
Braha, D.
Collaborative attack on internet users' anonymity Internet Research Topology with BGP
2008
Kang, U.
Tsourakakis, C.
Appel, A.P.
Faloutsos, C.
Leskovec, J.
HADI: Fast diameter estimation and mining in massive graphs with Hadoop Carnegie Mellon Univ. Topology with BGP
2008
Hei, Y.
Nakao, A.
Hasegawa, T.
Ogishi, T.
Yamamoto, S.
AS alliance: cooperatively improving resilience of intra-alliance communication ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2008
Serrano, M.A.
De Los Rios, P.
Structural efficiency of percolated landscapes in flow networks Plos One Topology with BGP
2008
MacArthur, B.D.
Sanchez-Garcia, R.J.
Anderson, J.W.
Symmetry in complex networks Discrete Applied Mathematics Topology with BGP
2008
Vilhar, A.
Novak, R.
Policy relationship annotations of predefined AS-level topologies Computer Networks Topology with BGP
2008
Wojciechowski, M. Border Gateway modeling and simulation Dep. Computer Science, VU Univ. Amsterdam Topology with BGP
2008
Raghavan, V.
Riley, G.
Jaafar, T.
Realistic topology modeling for the internet BGP infrastructure IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with BGP
2008
Katz, G.J.
Kider, J.T.
All-pairs shortest-paths for large graphs on the GPU ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware Topology with BGP
2008
Li, L.
Chen, C.
Exploring possible strategies for competitions between Autonomous Systems IEEE Conference on Communications (ICC) Topology with BGP
2008
Xiao, Y.
MacArthur, B.D.
Wang, H.
Xiong, M.
Wang, W.
Network quotients: structural skeletons of complex systems Phys. Rev. E Topology with BGP
2008
John, J.P.
Katz-Bassett, E.
Krishnamurthy, A.
Anderson, T.
Venkataramani, A.
Consensus routing: the internet as a distributed system Usenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2008
Hazeyama, H.
Suzuki, M.
Miwa, S.
Miyamoto, D.
Kadobayashi, Y.
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures Conference on Cyber Security Experimentation and Test Topology with BGP
2007
Qazi, S.
Moors, T.
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks IEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2007
Muehlbauer, W.
Uhlig, S.
Fu, B.
Meulle, M.
Maennel, O.
In search for an appropriate granularity to model routing policies ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Ballani, H.
Francis, P.
Zhang, X.
A study of prefix hijacking and interception in the internet ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Wu, J.
Zhang, Y.
Mao, Z.M.
Shin, K.G.
Internet routing resilience to failures: analysis and implications ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2007
Huang, C.
Li, J.
Ross, K.W.
Can internet video-on-demand be profitable? ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2006
Restrepo, J.G.
Ott, E.
Hunt, B.R.
Characterizing the dynamical importance of network nodes and links Phys. Rev. Lett. Topology with BGP
2006
D'Ignazio, A.
Giovannetti, E.
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach J. Competition Law and Economics Topology with BGP
2003
Fayed, M.
Krapivsky, P.
Byers, J.W.
Crovella, M.
Finkel, D.
Redner, S.
On the emergence of highly variable distributions in the autonomous system topology ACM SIGCOMM Computer Communication Review Topology with BGP
2016
Bhardwaj, O.
Anschelevich, E.
Kar, K.
Coalitionally stable pricing schemes for inter-domain forwarding Computer Networks Topology with Skitter
2015
Kloster, K.
Gleich, D.F.
Seeded PageRank solution paths arxiv.org Topology with Skitter
2015
Francois, G.
Festor, O.
Anomaly traceback using software defined networking Intl. Workshop on Information Forensics and Security (WIFS) Topology with Skitter
2015
Staudt, C.L.
Sazonovs, A.
Meyerhenke, H.
NetworKit: A tool suite for large-scale complex network analysis arxiv.org Topology with Skitter
2015
Saha, S. Efficient methods on reducing data redundancy in the Internet Aalto Univ., FI Topology with Skitter
2015
Huang, T.T.
Sun, B.Q.
The impact of the Internet on global industry: New evidence of Internet measurement Research in Intl Business and Finance Topology with Skitter
2015
Li, D.
Sha, W.
Dynamic ring for seamless mobility in identity centric networks Computers and Communication (ISCC) Topology with Skitter
2014
Medrano-Chavez, A.G.
Perez-Cortes, E.
Lopez-Guerrero, M.
A performance comparison of Chord and Kademlia DHTs in high churn scenarios Peer-to-Peer Networking and Applications Topology with Skitter
2014
Zhang, J. Statistical inference on network data Univ. Illinois, Urbana-Champaign Topology with Skitter
2014
Arora, D.
Verigin, A.
Godkin, T.
Neville, S.W.
Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnets Intl Conference on Advanced Information Networking and Applications (AINA)) Topology with Skitter
2014
Fallah, M.S.
Kahani, N.
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks Security and Communication Networks Topology with Skitter
2014
Dundjerski, D.
Tomasevic, M.
Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols Concurrency Computation: Practice and Experience Topology with Skitter
2013
Freno, A.
Keller, M.
Tommasi, M.
Probability estimation over large-scale random networks via the Fiedler delta statistic Journal of Machine Learning Research Topology with Skitter
2013
Seo, D.
Lee, H.
Perrig, A.
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks Computers and Security Topology with Skitter
2013
Preciado, V.M.
Jadbabaie, A.
Moment-based spectral analysis of large-scale networks using local structural information IEEE/ACM Trans. on Networking (TON) Topology with Skitter
2013
Godkin, T. Statistical assessment of peer-to-peer botnet features Univ. of Victoria, Victoria, CA Topology with Skitter
2013
Fu, A.W.
Wu, H.
Cheng, J.
Wong, R.C.
IS-Label: an independent-set based labeling scheme for point-to-point distance querying Proc. of the VLDB Endowment Topology with Skitter
2013
Nikolaevskiy, I.
Lukyanenko, A.
Polishchuk, T.
Polishchuk, V.
Gurtov, A.
isBF: scalable in-packet Bloom filter based multicast Proc. ACM Symp. on Applied Computing (SAC) Topology with Skitter
2013
Chen, Y.
Kawadia, V.
Urgaonkar, R.
Detecting overlapping temporal community structure in time-evolving networks arxiv.org Topology with Skitter
2013
Tang, M.
Zhang, G.
Lin, T.
Liu, J.
HDLBR: A name-independent compact routing scheme for power-law networks Computer Communications Topology with Skitter
2013
Ni, C.
Jin, G.
CTFPi: A new method for packet filtering of firewall Proc. Intl Conference on Information Technology and Software Engineering, Ch. 48 Topology with Skitter
2012
Karasawa, T.
Soshi, M.
Miyaji, A.
A novel hybrid IP traceback scheme with packet counters Conference on Internet and Distributed Computing Systems (IDCS) Topology with Skitter
2012
Parno, B.
Zhou, Z.
Perrig, A.
Using trustworthy host-based information in the network Workshop on Scalable trusted computing (STC) Topology with Skitter
2012
Preciado, V.M.
Draief, M.
Jadbabaie, A.
Structural analysis of viral spreading processes in social and communication networks using egonets arxiv.org Topology with Skitter
2012
Goltsev, A.V.
Dorogovtsev, S.N.
Oliveira, J.G.
Mendes, J.F.F.
Localization and spreading of diseases in complex networks Phys. Rev. Lett. Topology with Skitter
2012
Yang, M.-H.
Yang, M.-C.
RIHT: A novel hybrid IP traceback scheme IEEE Transactions on Information Forensics and Security Topology with Skitter
2012
Wehmuth, K.
Ziviani, A.
Distributed assessment of the closeness centrality ranking in complex networks Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX) Topology with Skitter
2011
Mukaddam, A.
ELHajj, I.
Hop count variability Conference for Internet Technology and Secured Transactions (ICITST) Topology with Skitter
2011
Wehmuth, K.
Ziviani, A.
Distributed location of the critical nodes to network robustness based on spectral analysis Latin American Network Operations and Management Symp. (LANOMS) Topology with Skitter
2011
Bell, C. Examining change in Internet topology in terms of external events, April 2001 - April 2002 Univ. Nebraska at Omaha Topology with Skitter
2011
Youssef, M.
Kooij, R.
Scoglio, C.
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics J. Computational Science Topology with Skitter
2011
Alvarez-Hamelin, J.I.
Beiro, M.G.
Busch, J.R.
Understanding edge connectivity in the Internet through core decomposition Internet Mathematics Topology with Skitter
2010
Song, J.
Zhao, H.
Yang, B.
Sun, H.
AS-level Internet macroscopic topology centralization evolvement analysis J. Software Engineering and Applications Topology with Skitter
2010
de Montgolfier, F.
Soto, M.
Viennot, L.
Autour du caractere arborescent d'Internet MajecSTIC Topology with Skitter
2010
Xu, Y.
Wang, Z.
On an IBA topology model for internet topology structure Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Topology with Skitter
2010
Yan, G.
Eidenbenz, S.
Thulasidasan, S.
Datta, P.
Ramaswamy, V.
Criticality analysis of Internet infrastructure Computer Networks Topology with Skitter
2009
Augustin, B.
Krishnamurthy, B.
Willinger, W.
IXP's: mapped? Internet Measurement Conference (IMC) Topology with Skitter
2009
Erlebach, T.
Moonen, L.S.
Spieksma, F.C.R.
Vukadinovic, D.
Connectivity measures for internet topologies on the level of autonomous systems Operations Research Topology with Skitter
2009
Korn, A.
Schubert, A.
Telcs, A.
Lobby index in networks Physica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Xu, Y.
Zhao, H.
An improved BA model for router-level internet macroscopic topology IAENG J. Computer Science Topology with Skitter
2009
Madhyastha, H.V.
Katz-Bassett, E.
Anderson, T.
Krishnamurthy, A.
Venkataramani, A.
iPlane Nano: path prediction for peer-to-peer applications Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI) Topology with Skitter
2009
Gunes, M.H.
Sarac, K.
Analyzing router responsiveness to active measurement probes Passive and Active Measurement (PAM) Topology with Skitter
2009
Durresi, A.
Paruchuri, V.
Barolli, L.
Fast autonomous system traceback J. Network and Computer Applications Topology with Skitter
2009
Xiao, B.
Liu, L.
Guo, X.
Xu, K.
Modeling the IPv6 internet AS-level topology Physica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Kaune, S.
Pussep, K.
Leng, C.
Kovacevic, A.
Tyson, G.
Steinmetz, R.
Modelling the internet delay space based on geographical locations Conference on Parallel, Distributed and Network-based Processing Topology with Skitter
2008
Beiro, M.G.
Alvarez-Hamelin, J.I.
Busch, J.R.
A low complexity visualization tool that helps to perform complex systems analysis New J. Physics Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Wang, L.
Correctness of sampling bias on Internet router-level topology Intl Conference on Wireless Communications, Networking and Mobile Computing Topology with Skitter
2008
Bi, X.
Tan, W.
Xiao, R.
A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems Symp. on Computer and Computational Sciences (IMSCSS) Topology with Skitter
2008
Wei, W.
Dong, Y.
Lu, D.
Jin, G.
Optimal control of DDoS defense with multi-resource max-min fairness Conference on Cybernetics and Intelligent Systems Topology with Skitter
2008
Zhang, J.
Zhao, H.
Zhou, Y.
The study on characteristics of the coreness of router-level internet nodes Chinese Control and Decision Conference (CCDC) Topology with Skitter
2008
Latapy, M.
Magnien, C.
Complex network measurements: estimating the relevance of observed properties IEEE Conference on Computer Communications (INFOCOM) Topology with Skitter
2008
Fraigniaud, P.
Febhar, E.
Viennot, F.
The inframetric model for the internet IEEE Conference on Computer Communications (INFOCOM) Topology with Skitter
2007
Leguay, J.
Latapy, M.
Friedman, T.
Salamatiana, K.
Describing and simulating internet routes Computer Networks Topology with Skitter
2007
Zhou, S.
Zhang, G.-Q.
Chinese Internet AS-level topology IET Communications Topology with Skitter
2007
Schmidt, T.C.
Wahlisch, M.
Zhang, Y.
On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing IEEE Conference on Networking (ICN) Topology with Skitter
2007
Kunzmann, G.
Nagel, R.
Hossfeld, T.
Binzenhofer, A.
Eger, K.
Efficient simulation of large-scale P2P networks: modeling network transmission times EUROMICRO Conference on Parallel, Distributed and Network-Based Processing (PDP) Topology with Skitter
2006
Donnet, B.
Bayant, B.
Friedman, T.
Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Deployment of an algorithm for large-scale topology discovery IEEE J. Selected Areas in Communications Topology with Skitter
2006
Guillaume, J.-L.
Latapy, M.
Magoni, D.
Relevance of massively distributed explorations of the internet topology: qualitative results Computer Networks Topology with Skitter
2006
Yaar, A.
Perrig, A.
Song, D.
StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense IEEE J. Selected Areas in Communications Topology with Skitter
2006
Latapy, M.
Magnien, C.
Measuring fundamental properties of real-world complex networks arxiv.org Topology with Skitter
2006
Farhat, H. Protecting TCP services from denial of service attacks SIGCOMM workshop on Large-Scale Attack Defense (LSAD) Topology with Skitter
2006
Zhang, L.
Guan, Y.
TOPO: a topology-aware single packet attack traceback scheme Securecomm and Workshops Topology with Skitter
2006
Donnet, B.
Friedman, T.
Topology discovery using an address prefix based stopping rule UNICE : Networks and Applications Towards a Ubiquitously Connected World Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Efficient route tracing from a single source arxiv.org Topology with Skitter
2006
Jin, S.
Bestavros, A.
Small-world characteristics of internet topologies and implications on multicast scaling Computer Networks Topology with Skitter
2005
Erlebach, T.
Moonen, L.S.
Spieksma, F.
Vukadinovic, D.
Connectivity measures for internet topologies K.U. Leuven Topology with Skitter
2005
Xiang, Y.
Zhou, W.
Mark-aided distributed filtering by using neural network for DDoS defense IEEE Global Telecommunications Conference (GLOBECOM) Topology with Skitter
2005
Janic, M.
Van Mieghem, P.
On properties of multicast routing trees J. Communication Systems Topology with Skitter
2005
Chen, R.
Park, J.-M.
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources IEEE Conference on Computer Communications and Networks (ICCCN) Topology with Skitter
2005
Martins, O.A. Affecting IP traceback with recent Internet topology maps Iowa State Univ. Topology with Skitter
2005
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Efficient algorithms for large-scale topology discovery ACM Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2005
Donnet, B.
Friedman, T.
A CIDR stopping rule for topology discovery Algotel Topology with Skitter
2005
Yaar, A.
Perrig, A.
Song, D.
FIT: Fast Internet Traceback IEEE Conference on Computer Communications (INFOCOM) Topology with Skitter
2005
Donnet, B.
Friedman, T.
Crovella, M.
Improved algorithms for network topology discovery Passive and Active Measurement (PAM) Topology with Skitter
2004
Prince, C.
Wyatt, D.
Confidence-weighted marginal utility analyses for improved internet mapping Univ. Washington, CSE Dept. Topology with Skitter
2004
Yaar, A.
Perrig, A.
Song, D.
SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacks IEEE Symp. on Security and Privacy Topology with Skitter
2004
Tang, L.
Crovella, M.
Geometric exploration of the landmark selection problem Passive and Active Measurement (PAM) Topology with Skitter
2004
Xu, K.
Duan, Z.
Zhang, Z.-L.
Chandrashekar, J.
On properties of Internet Exchange Points and their impact on AS topology and relationship IFIP-TC6 Networking Conference (NETWORKING) Topology with Skitter
2004
Zhou, S.
Mondragon, R.J.
Redundancy and robustness of AS-level Internet topology and its models Electronics Letters Topology with Skitter
2003
Tang, L.
Crovella, M.
Virtual landmarks for the internet Internet Measurement Conference (IMC) Topology with Skitter
2003
Lakhina, A.
Byers, J.W.
Crovella, M.
Matta, I.
On the geographic location of internet resources J. on Selected Areas in Communications Topology with Skitter
2003
Teixeira, T.
Marzullo, K.
Savage, S.
Voelker, G.M.
Characterizing and measuring path diversity of internet topologies ACM Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2003
Yaar, A.
Perrig, A.
Song, D.
Pi: a path identification mechanism to defend against DDoS attacks IEEE Symp. on Security and Privacy Topology with Skitter
2017
Iglesias, F.
Zseby, T.
Pattern discovery in Internet background radiation IEEE Transactions on Big Data UCSD Network Telescope
2017
Haddadi, F.
Heywood, A.
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform? Intl J. of Network Management UCSD Network Telescope
2017
Ochieng, N.
Ismail, A.
Waweru, M.
Orero, J.
Detecting scanning computer worms using machine learning and darkspace network traffic Pan African Conf. on Science, Computing and Telecommunications UCSD Network Telescope
2017
Polat, H.
Mehr, H.
Cetin, A.
Diagnosis of Chronic Kidney Disease Based on Support Vector Machine by Feature Selection Methods J. of Medical Systems UCSD Network Telescope
2016
Xu, M.
Hua, L.
Xu, S.
A vine copula model for predicting the effectiveness of cyber defense early-warning Technometrics UCSD Network Telescope
2016
Chen, P.
Xu, M.
Xu, S.
Hu, T.
Modeling and predicting extreme cyber attack rates via marked point processes J. Applied Statistics UCSD Network Telescope
2016
Lin, C.
Wu, C.
Huang, M.
Wen, Z.
Cheng, Q.
Adaptive IP mutation: A proactive approach for defending against worm propagation IEEE Symposium onReliable Distributed Systems Workshops (SRDSW) UCSD Network Telescope
2016
Haddadi, F. Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithms Dalhousie Univ. UCSD Network Telescope
2016
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attack Management Information Systems Quarterly UCSD Network Telescope
2016
Fachkha, C.
Debbabi, M.
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization IEEE Communications Surveys and Tutorials UCSD Network Telescope
2016
Marnerides, A.
Mauthe, A.
Analysis and characterisation of botnet scan traffic Intl Conference on Computing, Networking and Communications (ICNC) UCSD Network Telescope
2016
Kolesnichenko, A.
Haverkort, B.
Remke, A.
de Boer, P.
Fitting a code-red virus spread model: An account of putting theory into practice Intl Conference on the Design of Reliable Communication Networks (DRCN) UCSD Network Telescope
2016
Kirubavathi, G.
Anitha, R.
Botnet detection via mining of traffic flow characteristics Computers and Electrical Engineering UCSD Network Telescope
2016
Chen, Z.
Chen, C.
Characterising heterogeneity in vulnerable hosts on worm propagation Intl J. Security and Networks UCSD Network Telescope
2015
Haga, Y.
Saso, A.
Mori, T.
Goto, S.
Increasing the darkness of darknet traffic Global Communications Conference (GLOBECOM) UCSD Network Telescope
2015
Fachkha, C. Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacks Concordia Univ. UCSD Network Telescope
2015
Donoghue, N.
Hahn, B.
Xu, H.
Kroeger, T.
Zage, D.
Johnson, R.
Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Database arxiv.org UCSD Network Telescope
2015
Gupta, S.
Gupta, B.B.
Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art Intl J. System Assurance Engineering and Management UCSD Network Telescope
2015
Zhan, Z.
Xu, M.
Xu, S.
Predicting cyber attack rates with extreme values IEEE Trans. on Information Forensics and Security UCSD Network Telescope
2015
Vaidya, T. 2001-2013: Survey and analysis of major cyberattacks arxiv.org UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Chain, B.
Hybrid epidemics - A case study on computer worm Conficker Plos One UCSD Network Telescope
2015
Haddadi, F.
Le Cong, D.
Porter, L.
Zincir-Heywood, A.
On the effectiveness of different botnet detection approaches Information Security Practice and Experience (ISPE) UCSD Network Telescope
2015
Balkanli, E.
Zincir-Heywood, A.N.
Highlights on analyzing one-way traffic using different tools IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA) UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Miller, J.
Cox, I.
Chain, B.
Optimizing hybrid spreading in metapopulations Nature Scientific Reports UCSD Network Telescope
2015
Yao, G.
Bi, J.
Vasilakos, A.V.
Passive IP Traceback: disclosing the locations of IP spoofers from path backscatter IEEE Transactions on Information Forensics and Security UCSD Network Telescope
2014
Zhan, Z.
Xu, M.
Xu, S.
A characterization of cybersecurity posture from Network Telescope data Proc. Intl Conference on Trustworthy Systems (InTrust) UCSD Network Telescope
2014
Kolesnichenko, A. Model-checking mean-field models: algorithms and applications Univ. of Twente UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Entropy-based characterization of Internet background radiation Entropy UCSD Network Telescope
2014
Balkanli, E.
Alves, J.
Zincir-Heywood, A.N.
Supervised learning to detect DDoS attacks IEEE Computational Intelligence in Cyber Security (CICS) UCSD Network Telescope
2014
Yang, S.
Du, H.
Holsopple, J.
Sudit, M.
Attack Projection Advances in Information Security UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Modelling IP darkspace traffic by means of clustering techniques Communications and Network Security (CNS) UCSD Network Telescope
2014
Garcia, S.
Grill, M.
Stiborek, J.
Zunino, A.
An empirical comparison of botnet detection methods Computers and Security UCSD Network Telescope
2014
Balkanli, E.
Zincir-Heywood, A.N.
On the analysis of backscatter traffic IEEE Local Computer Networks Workshops (LCN Workshops) UCSD Network Telescope
2014
Du, H. Probabilistic modeling and inference for obfuscated network attack sequences Rochester Inst. of Technology UCSD Network Telescope
2014
Kale, M.
Choudhari, D.M.
DDOS attack detection based on an ensemble of neural classifier Intl J. Computer Science and Network Security (IJCSNS) UCSD Network Telescope
2014
Gonzalez, C. Information theoretic measures for the detection of anomalies in IP darkspace traffic Barcelona Tech UCSD Network Telescope
2014
Du, H.
Yang, S.J.
Probabilistic Inference for Obfuscated Network Attack Sequences Intl Conference on Dependable Systems and Networks UCSD Network Telescope
2014
Zhan, Z. A statistical framework for analyzing cyber attacks Univ. Texas, San Antonio, TX, US UCSD Network Telescope
2014
Wang, P.
Guan, X.
Zhao, J.
Tao, J.
Qin, T.
A new sketch method for measuring host connection degree distribution IEEE Trans. on Information Forensics and Security UCSD Network Telescope
2014
Strapp, S.
Yang, S.
Segmenting large-scale cyber attacks for online behavior model generation Social Computing, Behavioral-Cultural Modeling and Prediction (SBP) UCSD Network Telescope
2014
Khan, F.
Hosein, N.
Ghiasi, S.
Chuah, C.
Sharma, P.
Streaming solutions for fine-grained network traffic measurements and analysis IEEE/ACM Trans. on Networking (ToN) UCSD Network Telescope
2014
Singh, K.
Guntuku, S.C.
Thakur, A.
Hota, C.
Big data analytics framework for peer-to-peer botnet detection using random forests Information Sciences UCSD Network Telescope
2014
Ko, S.
Kim, K.
Lee, Y.
Song, J.
A classification method of darknet traffic for advanced security monitoring and response Lecture Notes in Computer Science UCSD Network Telescope
2014
Chatziadam, P.
Askoxylakis, I.G.
Fragkiadakis, A.
A Network Telescope for Early Warning Intrusion Detection Lecture Notes in Computer Science UCSD Network Telescope
2013
Huang S.Y., Huang Y. Network forensic analysis using growing hierarchical SOM IEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov) UCSD Network Telescope
2013
Tidy, L.J.
Woodhead, S.
Wetherall, J.
Simulation of zero-day worm epidemiology in the dynamic, heterogeneous Internet J. Defense Modeling and Simulation: Applications, Methodology, Technology UCSD Network Telescope
2013
Strapp, S. Segmentation and model generation for large-scale cyber attacks Rochester Inst. of Technology UCSD Network Telescope
2013
Guntuku, S.
Narang, P.
Hota, C.
Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural network arxiv.org UCSD Network Telescope
2013
Irwin, B. A source analysis of the Conficker outbreak from a Network Telescope SAIEE Africa Research Journal UCSD Network Telescope
2013
Ma, C.
Yang, Y.
Guo, X.
Improved SEIR viruses propagation model and the patch's impact on the propagation of the virus J. of Computational Information Systems UCSD Network Telescope
2013
Tidy, L.
Woodhead, S.
Wetherall, J.
A large-scale zero-day worm simulator for cyber-epidemiological analysis Intl Conference on Advances in Computer Science and Electronics Engineering (CSEE) UCSD Network Telescope
2013
Wang, F.
Zhang, Y.
Guo, H.
Wang, C.
Combating good point set scanning-based self-learning worms by using predators J. Network Security UCSD Network Telescope
2013
Du, H.
Yang, S.J.
Temporal and spatial analyses for large-scale cyber attacks Handbook of Computational Approaches to Counterterrorism UCSD Network Telescope
2013
Andrysiak, T.
Saganowski, L.
Choras, M.
DDoS attacks detection by means of greedy algorithms Image Processing and Communications Challenges 4 UCSD Network Telescope
2012
Xu, E.
Hsu, W.
Lee, M.L.
Patel, D.
Top-k maximal influential paths in network data Database and Expert Systems Applications UCSD Network Telescope
2012
Martin, S.
Chiarello, L.
Leduc, G.
DISco: A distributed information store for network challenges and their outcome IEEE Conference on Network Operations and Management Symposium (NOMS) UCSD Network Telescope
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection improvement based on spatial-temporal characteristics Advanced Science Lett. UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Characterizing transition behaviors in Internet attack sequences IEEE Conference on Computer Communications and Networks (ICCCN) UCSD Network Telescope
2011
Suresh, M.
Anitha, R.
Evaluating machine learning algorithms for detecting DDoS attacks Advances in Network Security and Applications (CNSA) UCSD Network Telescope
2011
Abouzakhar, N.S.
Chen, H.
Christianson, B.
An enhanced fuzzy ARM approach for intrusion detection J. Digital Crime and Forensics UCSD Network Telescope
2011
Narita, M.
Katoh, T.
Bista, B.B.
Takata, T.
Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace Advanced Information Networking and Applications (WAINA) UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Discovering collaborative cyber attack patterns using social network analysis Conference on Social computing, behavioral-cultural modeling and prediction (SBP) UCSD Network Telescope
2011
Saganowski, L.
Andrysiak, T.
Choras, M.
Renk, R.
Expansion of matching pursuit methodology for anomaly detection in computer networks Advances in Intelligent and Soft Computing UCSD Network Telescope
2011
Choras, M.
Saganowski, L.
Renk, R.
Holubowicz, W.
Statistical and signal-based network traffic recognition for anomaly detection Expert Systems UCSD Network Telescope
2010
Yao, G.
Bi, J.
Zhou, Z.
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes ACM SIGCOMM Computer Communication Review UCSD Network Telescope
2010
Abouzakhar, N.S.
Bakar, A.
A chi-square testing-based intrusion detection model Conference on Cybercrime Forensics Education and Training (CFET ) UCSD Network Telescope
2010
Fadlullah, Z.M.
Taleb, T.
Vasilakos, A.V.
Guizani, M.
Kato, N.
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis IEEE/ACM Trans. on Networking (TON) UCSD Network Telescope
2010
Bi, J.
Hu, P.
Li, P.
Study on classification and characteristics of source address spoofing attacks in the Internet IEEE Conference on Networking (ICN) UCSD Network Telescope
2010
Gupta, R.
Ramamritham, K.
Mohania, M.
Ratio threshold queries over distributed data sources Intl Conference on Data Engineering (ICDE) UCSD Network Telescope
2009
Kyriakopoulos, K.G.
Parish, D.J.
Using wavelets for compression and detecting events in anomalous network traffic Conference on Systems and Networks Communication UCSD Network Telescope
2009
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Measuring complexity and predictability in networks with multiscale entropy analysis IEEE Conference on Computer Communications (INFOCOM) UCSD Network Telescope
2008
He, X.
Parameswaran, S.
MCAD: Multiple connection based anomaly detection IEEE Conference on Communication Systems (ICCS) UCSD Network Telescope
2008
Choi, H.
Lee, H.
Kim, H.
Fast detection and visualization of network attacks on parallel coordinates Computers and Security UCSD Network Telescope
2008
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Metrics for characterizing complexity of network traffic Conference on Telecommunications (ICT) UCSD Network Telescope
2008
Irwin, B.
Pilkington, N.
High level internet scale traffic visualization using Hilbert curve mapping Visualization for Computer Security (VizSec) UCSD Network Telescope
2008
Wei, S.
Mirkovic, J.
Correcting congestion-based error in network telescope's observations of worm dynamics Internet Measurement Conference (IMC) UCSD Network Telescope
2008
Li, P.
Bi, J.
Zhou, Z.
A backscatter technology based study on source address spoofing Periodical of Ocean Univ. of China UCSD Network Telescope
2008
Francois, J.
State, R.
Festor, O.
Activity monitoring for large honeynets and network telescopes J. Advances in Systems and Measurements UCSD Network Telescope
2007
Dainotti, A.
Pescape, A.
Ventre, G.
Worm traffic analysis and characterization IEEE Conference on Communications (ICC) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Measuring network-aware worm spreading ability IEEE Conference on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Vojnovic, M.
Gupta, V.
Karagiannis, T.
Gkantsidis, C.
Sampling strategies for epidemic-style information dissemination IEEE Conference on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Optimal worm-scanning method using vulnerable-host distributions J. Security and Networks UCSD Network Telescope
2006
Rajab, M.
Monrose, F.
Terzis, A.
Fast and evasive attacks: highlighting the challenges ahead Symp. on Recent Advances in Intrusion Detection (RAID) UCSD Network Telescope
2006
Francois, J.
State, R.
Festor, O.
Tracking global wide configuration errors IEEE Workshop on Monitoring, Attack Detection and Mitigation UCSD Network Telescope
2006
Hamadeh, I.
Kesidis, G.
Toward a framework for forensic analysis of scanning worms Emerging Trends in Information and Communication Security (ETRICS) UCSD Network Telescope
2006
Peng, Y.
Gong, J.
Yang, W.
Liu, W.
Disclosing the element distribution of Bloom filter Conference on Computational Science (ICCS) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
Worm evolution tracking via timing analysis ACM workshop on Rapid Malcode (WORM) UCSD Network Telescope
2005
Chen, Z.
Ji, C.
Importance-scanning worm using vulnerable-host distribution IEEE Global Telecommunications Conference (GLOBECOM) UCSD Network Telescope
2005
Chen, Z.
Lin, C.
Ni, J.
Ruan, D.-H.
Zheng, B.
Jiang, Y.-X.
Peng, X.
Wang, Y.
Luo, A.
Zhu, B.
Yue, Y.
Ren, F.-Y.
Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN IEEE Conference on Local Computer Networks (LCN) UCSD Network Telescope
2005
Kumar, A.
Paxson, V.
Weaver, N.
Exploiting underlying structure for detailed reconstruction of an internet-scale event Internet Measurement Conference (IMC) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
On the effectiveness of distributed worm monitoring Usenix Security Conference (SEC) UCSD Network Telescope
2005
Chhabra, P.
John, A.
Saran, H.
PISA: Automatic extraction of traffic signatures IFIP-TC6 Networking Conference (NETWORKING) UCSD Network Telescope

  Last Modified: Fri Oct-13-2017 16:26:33 PDT
  Page URL: http://www.caida.org/data/publications/index.xml