Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications : bydataset : bydataset_full.xml
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    date    dataset    publication   |
|   Citation Format:    abbreviated    complete   |

Anonymized Internet Traces

R. Basat, G. Einziger, R. Friedman, and Y. Kassner, ``Optimal Elephant Flow Detection'', Tech. rep., arxiv.org, March 2018.

T. Xu, D. Gao, P. Dong, C. Foh, and H. Zhang, ``Mitigating the Table-Overflow Attack in Software-Defined Networking'', IEEE Trans. on Network and Service Management, , no. 99, pp. (12 pages), October 2017.

J. Varela and P. Ros, ``Towards a NetFlow Implementation for OpenFlow Software-Defined Networks'', in Intl Teletraffic Congress, September 2017, vol. 29, pp. 187--195.

T. Phan, N. Bao, and M. Park, ``Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks'', J. of Network and Computer Applications, vol. 91, pp. 14--25, August 2017.

Y. Kim, D. Choi, T. Van, M. Long, and M. Park, ``Multiple Machine Learning for Software Defined Networking Combination-based DDoS detection system'', The J. of Korean Institute of Communications and Information Sciences, vol. 42, no. 8, pp. 1581--1590, August 2017.

Q. Huang, P. Lee, R. Li, L. Tang, Y. Chen, and G. Zhang, ``SketchVisor: Robust Network Measurement for Software Packet Processing'', in ACM SIGCOMM, August 2017, p. (14 pages).

J. Meng, F. Ren, and C. Lin, ``Modeling and understanding burst transmission for energy efficient ethernet'', Computer Networks, vol. 122, pp. 217--230, July 2017.

T. Kim, J. Lim, J. Kim, W. Cho, E. Chung, and H. Lee, ``Scalable Bandwidth Shaping Scheme via Adaptively Managed Parallel Heaps in Manycore-Based Network Processors'', ACM Trans. on Design Automation of Electronic Systems, vol. 22, no. 4, pp. (26 pages), July 2017.

N. Wu, Y. Bi, N. Michael, A. Tang, J. Doyle, and N. Matni, ``HFTraC: High-frequency traffic control'', in Intl Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2017, pp. 43--44.

J. Vidal, A. Orozco, and L. Villalba, ``Adaptive artificial immune networks for mitigating DoS flooding attacks'', Swarm and Evolutionary Computation, p. (15 pages), June 2017.

A. Muhammad and F. Alameka, ``Integrasi Metode Normalized Reelative Network Entropy dan Neural Network Backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS'', Jurnal Rekayasa Teknologi Informasi, vol. 1, no. 1, pp. 1--7, June 2017.

J. Mirkovic, G. Bartlett, J. Heidemann, H. Shi, and X. Deng, ``Do you see me now? Sparsity in passive observations of address liveness'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).

A. Maltinsky, R. Giladi, and Y. Shavitt, ``On network neutrality measurements'', ACM Trans. on Intelligent Systems and Technology (TIST), vol. 8, no. 4, June 2017.

J. Lu, Y. Wan, Y. Li, C. Zhang, H. Dai, Y. Wang, G. Zhang, and B. Liu, ``Ultra-Fast Bloom Filters using SIMD techniques'', in Intl Symp. on Quality of Service (IWQoS), June 2017, vol. 25, p. (6 pages).

H. Duan, X. Yuan, and C. Wang, ``LightBox: SGX-assisted Secure Network Functions at Near-native Speed'', Tech. rep., arxiv.org, June 2017.

J. Deng, H. Li, K. Wang, G. Ahn, Z. Zhao, and W. Han, ``On the Safety and Efficiency of Virtual Firewall Elasticity Control'', in ACM SIGCOMM Computer Communication Review, June 2017, vol. 22, p. (15 pages).

B. Chainourov, Log analysis using Splunk Hadoop Connect, Ph.D. thesis, Naval Postgraduate School, Monterey, CA, US, June 2017.

M. Albdair, R. Addie, and D. Fatseas, ``Social network behaviour inferred from O-D pair traffic'', Australian J. of Telecommunications and the Digital Economy, vol. 5, no. 2, pp. 131--150, June 2017.

M. Taghouti, D. Lucani, F. Fitzek, and A. Bouallegue, ``Back to Results Random Linear Network Coding Schemes for Reduced Zero-Padding Overhead: Complexity and Overhead Analysis'', in European Wireless Conf., May 2017, vol. 23, pp. 321--327.

E. Lopez and L. Navarro, ``Tight bounds for sketches in traffic validation'', in Intl Conf. on Networking, Sensing and Control, May 2017, vol. 14, p. (6 pages).

D. Anderson, P. Bevan, K. Lang, E. Liberty, L. Rhodes, and J. Thaler, ``A High-Performance Algorithm for Identifying Frequent Items in Data Streams'', Tech. rep., arxiv.org, May 2017.

S. Alonso, M. Perez, M. Veiga, and C. Garcia, ``Optimizing Dual-Mode EEE Interfaces: Deep-Sleep is Healthy'', IEEE Trans. on Communications, vol. 65, no. 8, pp. 3374--3385, May 2017.

V. Sivaraman, S. Narayana, O. Rottenstreich, S. Muthukrishnan, and J. Rexford, ``Heavy-Hitter Detection Entirely in the Data Plane'', in Symp. on SDN Research, April 2017, pp. 164--176.

M. Rao and M. Naidu, ``A Model for Generating Synthetic Network Flows and Accuracy Index for Evaluation of Anomaly Network Intrusion Detection Systems'', Indian J. Science and Technology, vol. 10, no. 14, pp. (16 pages), April 2017.

A. Oeldemann, T. Wild, and H. Herkersdorf, ``Reducing data center resource over-provisioning through dynamic load management for virtualized network functions'', in Architecture of Computing Systems (ARCS), April 2017, vol. 10172 of Lecture Notes in Computer Science (LNCS), pp. 234--247.

M. Mitzenmacher, S. Pontarelli, and P. Reviriego, ``Adaptive cuckoo filters'', Tech. rep., arxiv.org, April 2017.

T. Lee, C. Pappas, A. Perrig, V. Gligor, and Y. Hu, ``The Case for In-Network Replay Suppression'', in Asia Conf. on Computer and Communications Security, April 2017, pp. 862--873.

M. Ghasemi, T. Benson, and J. Rexford, ``Dapper: Data Plane Performance Diagnosis of TCP'', in Symp. on SDN Research, April 2017, pp. 61--74.

N. Duffield, Y. Xu, L. Xia, N. Ahmed, and M. Yu, ``Stream Aggregation Through Order Sampling'', Tech. rep., arxiv.org, March 2017.

C. Cascone, R. Bifulco, S. Pontarelli, and A. Capone, ``Relaxing state-access constraints in stateful programmable data planes'', Tech. rep., arxiv.org, March 2017.

D. Boro and D.K Bhattacharyya, ``DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks'', Microsystem Technologies, vol. 23, no. 3, pp. 593--611, March 2017.

W. Bhaya and M.E. Manaa, ``DDoS attack detection approach using an efficient cluster analysis in large data scale'', in Conf. on New Trends in Information and Communications Technology Applications (NTICT), March 2017, pp. 168--173.

G. Vasiliadis, L. Koromilas, M. Polychronakis, and S. Ioannidis, ``Design and implementation of a stateful network packet processing framework for GPUs'', IEEE/ACM Trans. on Networking (TON), vol. 25, no. 1, pp. 610--623, February 2017.

J. Varela and P. Ros, ``Reinventing NetFlow for OpenFlow Software-Defined Networks'', Tech. rep., arxiv.org, February 2017.

D. Engel and W. Malone, ``Integrated Information as a Metric for Group Interaction: Analyzing Human and Computer Groups Using a Technique Developed to Measure Consciousness'', Tech. rep., arxiv.org, February 2017.

Y. Afek, A. Barr, S. Feibish, and L. Schiff, ``Detecting Heavy Flows in the SDN Match and Action Model'', Tech. rep., arxiv.org, February 2017.

I. Sharafaldin, A. Gharib, A. Lashkari, and A. Ghorbani, ``Towards a Reliable Intrusion Detection Benchmark Dataset'', Software Networking, vol. 2017, no. 1, pp. 177--200, January 2017.

R. Remedios, On Improving DREAM Framework with Estimations and ProgME, Ph.D. thesis, Univ. of Ottawa, January 2017.

E. Norige, Hardware Algorithms for High-Speed Packet Processing, Ph.D. thesis, Michigan State Univ., January 2017.

H. Luo, Z. Chen, J. Li, and A.V. Vasilakos, ``Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers'', IEEE Trans. on Information Forensics and Security, vol. 12, pp. 1801--1815, January 2017.

K. Lee, Towards precise network measurements, Ph.D. thesis, Cornell University, January 2017.

M. Iordache, S. Jouet, A. Marnerides, and D. Pezaros, ``Distributed, Multi-Level Network Anomaly Detection for Datacentre Networks'', in IEEE ICC Next Generation Networking and Internet Symp., January 2017, p. (6 pages).

T. Huong and N. Thanh, ``Software defined networking-based one-packet DDoS mitigation architecture'', in Intl Conf. on Ubiquitous Information Management and Communication, January 2017, vol. 11 (110), p. (7 pages).

F. Halas, ``Performance Measurement of Stream Data Processing in Apache Spark'', M.S. thesis, Masaryk Univ., January 2017.

S. Chen, M. Chen, and Q. Xiao, ``Per-Flow Cardinality Measurement'', in Traffic Measurement for Big Network Data, January 2017, Wireless Networks, pp. 47--76.

A. Cenedese, F. Tramarin, and S. Vitturi, ``An Energy Efficient Ethernet Strategy Based on Traffic Prediction and Shaping'', IEEE Trans. on Communications, vol. 65, no. 1, pp. 270--282, January 2017.

R. Birkner, A. Gupta, N. Feamster, and L. Vanbever, ``SDX-Based Flexibility or Internet Correctness?: Pick Two!'', Symp. on SDN Research, pp. 1--7, January 2017.

Q. Xia, T. Chen, and W. Xu, ``CIDS: Adapting Legacy Intrusion Detection Systems to the Cloud with Hybrid Sampling'', in Intl Conf. on Computer and Information Technology, December 2016, pp. 508--515.

J. Saldana, ``What to do With the Wi-Fi Wild West'', Tech. rep., Horizon 2020, December 2016.

G. Lazarou, M. Alam, and J. Picone, ``Measuring the variability of CAIDA internet traffic traces'', in Intl Conf. on Computer and Information Technology, December 2016, vol. 19, p. (6 pages).

A. Hendawi, F. Alali, X. Wang, Y. Guan, T. Zhou, X. Liu, N. Basit, and J. Stankovic, ``Hobbits: Hadoop and Hive based Internet traffic analysis'', in IEEE Intl Conf. on Big Data, December 2016, pp. 2590--2599.

A. Gharib, I. Sharafaldin, A. Lashkari, and A. Ghorbani, ``An Evaluation Framework for Intrusion Detection Dataset'', in Intl Conf. on Information Science and Security, December 2016, p. (5 pages).

A. Bayati, V. Asghari, K. Nguyen, and M. Cheriet, ``Gaussian Process Regression Based Traffic Modeling and Prediction in High-Speed Networks'', in Global Communications Conf., December 2016, p. (7 pages).

R. Basat, G. Einziger, R. Friedman, and Y. Kassner, ``Randomized Admission Policy for Efficient Top-k and Frequency Estimation'', Tech. rep., arxiv.org, December 2016.

M. Albdair, R. Addie, and D. Fatseas, ``Inference of social network behavior from Internet traffic traces'', in Intl Conf. on Telecommunication Networks and Applications, December 2016, vol. 26, p. (6 pages).

S. Narayana, A. Sivaraman, V. Nathan, M. Alizadeh, D. Walker, J. Rexford, V. Jeyakumar, and C. Kim, ``Hardware-Software Co-Design for Network Performance Measurement'', in ACM Workshop on Hot Topics in Networks Pages, November 2016, vol. 15, pp. 190--196.

J. Moraney and D. Raz, ``Efficient detection of flow anomalies with limited monitoring resources'', in Conf. on Network and Service Management (CNSM), November 2016, pp. 55--63.

C. Li, Z. Chen, W. Zheng, Y. Wu, and J. Cao, ``BAH: A Bitmap Index Compression Algorithm for Fast Data Retrieval'', in Conf. on Local Computer Networks, November 2016, vol. 41, pp. 697--705.

T. Lee, C. Pappas, P. Szalachowski, and A. Perrig, ``Communication based on per-packet One-Time Addresses'', in Intl Conf. on Network Protocols, November 2016, vol. 24, p. (10 pages).

N. Katta, Building efficient and reliable software-defined networks, Ph.D. thesis, Princeton University, November 2016.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``A probabilistic sampling method for efficient flow-based analysis'', J. of Communications and Networks, vol. 18, no. 5, pp. 818--825, November 2016.

Q. Huang and P. Lee, ``Toward high-performance distributed stream processing via approximate fault tolerance'', in Proceedings of the Very Large Data Bases Endowment, November 2016, vol. 10 (3), pp. 73--84.

P. Dey and M. Yuksel, ``CAR: Cloud-Assisted Routing'', in Conf. on Network Function Virtualization and Software Defined Networks, November 2016, p. (7 pages).

A. Aral, Resource Mapping Optimization for Distributed Cloud Services, Ph.D. thesis, Istanbul Technical University, November 2016.

H. Nguyen, T. Begin, A. Busson, and I. Lassous, ``Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networks'', in Intl Conf. on Network and Service Management, October 2016, vol. 12, pp. 336--341.

J. Namayanja and V. Janeja, ``Characterization of Evolving Networks for Cybersecurity'', in Information Fusion for Cyber-Security Analytics, October 2016, vol. 691 of Studies in Computational Intelligence, pp. 111--127.

S. Abt and H. Baier, ``Correlating network events and transferring labels in the presence of IP address anonymisation'', in Intl Conf. on Network and Service Management, October 2016, vol. 12, pp. 64--72.

B. Retnaswamy and K. Ponniah, ``A new ontology?based multi agent framework for intrusion detection'', Intl J. of Communication Systems, vol. 29, no. 17, pp. 2490--2502, September 2016.

D Hintze and A. Rice, ``Picky: efficient and reproducible sharing of large datasets using Merkle-trees'', in Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2016, p. (9 pages).

Y. Yu, D. Belazzougui, C. Qian, and Q. Zhang, ``A Concise Forwarding Information Base for Scalable and Fast Flat Name Switching'', Tech. rep., arxiv.org, August 2016.

T. Wellem and Y.-K. Lai, ``Sketch-guided filtering support for detecting superspreaders in high-speed networks'', Electronics Letters, vol. 52, no. 17, pp. 1459--1461, August 2016.

T. Song, Z. Jiang, Y. Wei, X. Shi, X. Ma, and O. Ormond, ``Traffic Aware Energy Efficient Router: Architecture, Prototype and Algorithms'', IEEE J. on Selected Areas in Communications, vol. 34, no. 12, pp. 3814--3827, August 2016.

K. Mokgolodi, ``Traffic prediction in cloud computing using time series models'', M.S. thesis, Univ. of Botswana, August 2016.

I. Meitei, K. Singh, and T. De, ``Detection of DDoS DNS Amplification Attack Using Classification Algorithm'', in Intl Conf. on Informatics and Analytics, August 2016, p. (6 pages).

Z. Liu, A. Manousis, X. Vorsanger, V. Sekar, and V. Braverman, ``One sketch to rule them all: Rethinking network flow monitoring with UnivMon'', in ACM SIGCOMM, August 2016, pp. 101--114.

P. Liu, Y. Li, Y. Sang, and J. Zhang, ``Anonymity-Based Privacy Preserving Network Data Publication'', in IEEE Trustcom/BigDataSE/I?SPA, August 2016, pp. 823--828.

N.-N. Dao, J. Kim, M. Park, and S. Cho, ``Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks'', PLoS One, vol. 11, no. 8, pp. (24 pages), August 2016.

T. Phan, N. Bao, and M. Park, ``A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking'', in Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress, July 2016, pp. 350--357.

T. Phan, T. Toan, D. Tuyen, T. Huong, and T. Nguyen, ``OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks'', in Intl Conf. on Communications and Electronics, July 2016, vol. 6, pp. 13--18.

V.A. Foroushani, A security framework based on flow marking IP-traceback techniques, Ph.D. thesis, Dalhousie Univ., Halifax, CA, July 2016.

M. Cermak, D. Tovarnak, M. Lastovicka, and P. Caleda, ``A performance benchmark for NetFlow data analysis on distributed stream processing systems'', in Network Operations and Management Symp., July 2016, pp. 919--924.

X. Xu, J. Zhang, and Q. Li, ``Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone Traceback'', in Intl Conf. on Data Science in Cyberspace, June 2016, pp. 109--117.

C Xing, K. Ding, C. Hu, and M. Chen, ``Sample and Fetch-Based Large Flow Detection Mechanism in Software Defined Networks'', IEEE Communications Letters, vol. 20, no. 9, pp. 1764--1767, June 2016.

N. Sahri and K. Okamura, ``Adaptive Query Rate for Anomaly Detection with SDN'', Intl J. of Computer Science and Network Security, vol. 16, no. 6, pp. 43--51, June 2016.

T. Huang, H. Sethu, and N. Kandasamy, ``A new approach to dimensionality reduction for anomaly detection in data traffic'', Tech. rep., arxiv.org, June 2016.

R. Hofstede, Flow-based compromise detection, Ph.D. thesis, Univ. of Twente, June 2016.

G. Einziger, B. Fellman, R. Friedman, and Y. Kassner, ``ICE buckets: improved counter estimation for network measurement'', Tech. rep., arxiv.org, June 2016.

M. Cermak and P. Celeda, ``Detecting advanced network threats using a similarity search'', in Intl Conf. on Autonomous Infrastructure, Management, and Security, June 2016, vol. 9701 of Lecture Notes in Computer Science, pp. 137--141.

A. Abada, ``Resource optimization of TCAM-based SDN measurements via diminishing-points autodetection'', in European Conf. on Networks and Communications, June 2016, p. (6 pages).

T. Wellem, Y.-K. Lai, C.-Y. Huang, and Y.-W. Chung, ``Toward hardware support for a flexible sketch-based network traffic monitoring system'', in IEEE Region 10 Symp. (TENSYMP), May 2016, pp. 7--12.

J. Fairbanks, Graph analysis combining numerical, statistical, and streaming techniques, Ph.D. thesis, Georgia Inst. of Technology, May 2016.

D.E. Asoni, C. Chen, D. Barrera, and A. Perrig, ``On building onion routing into future Internet architectures'', in Intl Workshop on Open Problems in Network Security (iNetSec), May 2016, vol. 9591 of Lecture Notes in Computer Science, pp. 71--81.

Y. Wu, Z. Chen, J. Cao, H. Li, C. Li, Y. Wang, W. Zheng, J. Chang, J. Zhou, Z. Hu, and J. Guo, ``CAMP: A New Bitmap Index for Data Retrieval in Traffic Archival'', IEEE Communications Letters, vol. 20, no. 6, pp. 1128--1131, April 2016.

N. Sahri, Research on Performance and Security Improvements by Software Defined Network, Ph.D. thesis, Kyushu University, April 2016.

T. Pan, T. Huang, J. Liu, J. Zhang, F. Yang, S. Li, and Y. Liu, ``Fast Content Store Lookup Using Locality-Aware Skip List in Content-Centric Networks'', in Conf. on Computer Communications Workshops, April 2016, p. (6 pages).

D. Krishnan, D. Quoc, P. Bhatotia, C. Fetzer, and R. Rodrigues, ``IncApprox: A Data Analytics System for Incremental Approximate Computing'', in Intl Conf. on World Wide Web, April 2016, vol. 25, pp. 1133--1144.

Z. Bozakov, A. Rizk, D. Bhat, and M. Zink, ``Measurement-based flow characterization in centrally controlled networks'', in Intl Conf. on Computer Communications, April 2016, vol. 35, p. (9 pages).

R. Ben-Basat, G. Einziger, and R. Friedman, ``Heavy hitters in streams and sliding windows'', in IEEE Conf. on Computer Communications (INFOCOM), April 2016, p. (9 pages).

T. Zhao, T. Li, B. Han, Z. Sun, and J. Huang, ``Design and implementation of Software Defined Hardware Counters for SDN'', Computer Networks, vol. 102, pp. 129--144, March 2016.

S. Qian, G. Wu, J. Huang, and T. Das, ``Benchmarking modern distributed streaming platforms'', in Intl Conf. on Industrial Technology (ICIT), March 2016, pp. 592--598.

H. Lim, V. Sekar, Y. Abe, and D.G. Anderson, ``NetMemex: Providing full-fidelity traffic archival'', Tech. rep., arxiv.org, March 2016.

C. Lei, H. Zhang, Y. Liu, and X. Du, ``Net-flow fingerprint model based on optimization theory'', Arabian J. for Science and Engineering, vol. 41, pp. 3081--3088, March 2016.

N. Katta, O. Alipourfard, J. Rexfor, and D. Walker, ``CacheFlow: Dependency-Aware Rule-Caching for Software-Defined Networks'', in Symp. on SDN Research, March 2016, p. (12 pages).

D. Boro, H. Basumatary, T. Goswami, and D.K. Bhattacharyya, ``UDP Flooding attack detection using information metric measure'', in Intl Conf. on ICT for Sustainable Development, February 2016, vol. 408 of Advances in Intelligent Systems and Computing, pp. 143--153.

Z. Zhou, Per-flow cardinality estimation based on virtual LogLog sketching, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2016.

Y. Xie, Y. Wang, H. He, Y. Xiang, S. Yu, and X. Liu, ``A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 5, pp. 3162--3176, January 2016.

J.M.C. Silva, A modular traffic sampling architecture for flexible network measurements, Ph.D. thesis, Univ. do Minho, Braga, PT, January 2016.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Intelligent Sampling Using an Optimized Neural Network'', J. of Networks, vol. 11, no. 1, pp. 16--27, January 2016.

R.G. Garroppo, G. Nencioni, G. Procissi, and L. Tavanti, ``The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs'', J. Computer Networks, vol. 94, no. C, pp. 99--111, January 2016.

Y. Chen and S. Wang, ``A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropy'', in Intl Conf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government, January 2016, pp. 150--155.

C. Chen and A. Perrig, ``PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer'', Privacy Enhancing Technologies, vol. 2017, pp. 100--117, January 2016.

H. Abaci, G. Parr, S. McClean, A. Moore, and L. Krug, ``Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirements'', Sustainable Computing: Informatics and Systems, vol. 10, pp. 1--19, January 2016.

M. Moshref, M. Yu, R. Govindan, and A. Vahdat, ``SCREAM: Sketch Resource Allocation for Software-defined Measurement'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2015.

C. Li, J. Yang, Z. Wang, F. Li, and Y. Yang, ``A lightweight DDoS flooding attack detection algorithm based on synchronous long flows'', in Global Communications Conf. (GLOBECOM), December 2015, p. (6 pages).

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Flow-based anomaly detection using semisupervised learning'', in Intl Conf. on Signal Processing and Communication Systems (ICSPCS), December 2015, p. (5 pages).

Z. Chen, H. Luo, M. Zhang, and J. Li, ``Improving network security by dynamically changing path identifiers in future Internet'', in Global Communications Conf. (GLOBECOM), December 2015, p. (7 pages).

X.-F. Chen and S.-Z. Yu, ``CIPA: A collaborative intrusion prevention architecture for programmable network and SDN'', Computers and Security, vol. 58, pp. 1--19, December 2015.

Z. Zhang, Z. Guo, and Y. Yang, ``Bounded-reorder packet scheduling in optical cut-through switch'', IEEE Trans. on Parallel and Distributed Systems, vol. 26, no. 11, pp. 2927--2941, November 2015.

B. Venkatesh, S.H. Choudhury, S. Nagajara, and N. Balakrishnan, ``BotSpot: fast graph based identification of structured P2P bots'', J. Computer Virology and Hacking Techniques, vol. 11, pp. 247--261, November 2015.

M. Righi and R. Nunes, ``Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas'', in Simposio Brasileiro em Seguranca da Informacao e Sistemas, November 2015, p. (4 pages).

Z. Liu, G. Vorsanger, V. Braverman, and V. Sekar, ``Enabling a 'RISC' approach for Software-Defined Monitoring using universal streaming'', in ACM Workshop on Hot Topics in Networks (HotNets), November 2015, p. (7 pages).

C. Lei, H. Zhang, M. Li, and Y. Liu, ``Network watermarking model based on optimization theory'', in Intl Conf. on Cloud Computing and Big Data (CCBD), November 2015, pp. 101--104.

T. Huang, H. Sethu, and N. Kandasamy, ``A fast algorithm for detecting anomalous changes in network traffic'', in Intl Conf. on Network and Service Management (CNSM), November 2015, pp. 251--255.

O. Alipourfard, M. Moshref, and M. Yu, ``Re-evaluating measurement algorithms in software'', in Workshop on Hot Topics in Networks (HotNets), November 2015.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Deterministic flow marking for IPv6 traceback (DFM6)'', in Intl Conf. on Network and Service Management (CNSM), November 2015, pp. 270--273.

H. Wu, ``Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity region'', M.S. thesis, Univ. Illinois, Urbana-Champaign, October 2015.

J. Saldana, I. Forcen, J. Fernandez-Navajas, and J. Ruiz-Mas, ``Improving network efficiency with Simplemux'', in Intl Conf. on Computer and Information Technology (CIT), October 2015, pp. 446--453.

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``A method to protect Bloom filters from soft errors'', in Intl Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), October 2015, pp. 80--84.

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and M. Lopez-Garcia, ``Frame coalescing in dual-mode EEE'', Tech. rep., arxiv.org, October 2015.

M.A. Erazo, R. Rong, and J. Liu, ``Symbiotic network simulation and emulation'', ACM Trans. on Modeling and Computer Simulation (TOMACS), vol. 26, no. 1, pp. (25 pages), October 2015.

C. Chen, D.E. Asoni, D. Barrera, G. Danezis, and A. Perrig, ``HORNET: High-speed onion routing at the network layer'', in Conf. on Computer and Communications Security (CCS), October 2015, pp. 1441--1454.

C. Basescu, R.M. Reischuk, P. Szalachowski, A. Perrig, Y. Zhang, H.-C. Hsiao, A. Kubota, and J. Urakawa, ``SIBRA: Scalable Internet Bandwidth Reservation Architecture'', Tech. rep., arxiv.org, October 2015.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Probabilistic flow marking for IP traceback (PFM)'', in Intl Workshop on Reliable Networks Design and Modeling (RNDM), October 2015, pp. 229--236.

N. Rivetti, Y. Busnel, and A. Mostefaoui, ``Efficiently summarizing data streams over sliding windows'', in Intl Symp. on Network Computing and Applications (NCA), September 2015, pp. 151--158.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Performance of Flow-based Anomaly Detection in Sampled Traffic'', J. of Networks, vol. 10, no. 9, pp. 512--520, September 2015.

R. de Oliviera~Schmidt, R. Sadre, A. Sperotto, H. van~den Berg, and A. Pras, ``Impact of packet sampling on link dimensioning'', IEEE Trans. on Network and Service Management, vol. 12, no. 3, pp. 392--405, September 2015.

E. Anceaume, Y. Busnel, N. Rivetti, and B. Sericola, ``Identifying global icebergs in distributed streams'', in Symp. on Reliable Distributed Systems (SRDS), September 2015, pp. 266--275.

V. Moreno, J. Ramos, P.M. Santiado~del Rio, J.L. Garcia-Dorado, F.J. Gomez-Arribas, and J. Aracil, ``Commodity packet capture engines: tutorial, cookbook and applicability'', IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1364--1390, August 2015.

V. Moreno, R. Leira, I. Gonzalez, and F.J. Gomez-Arribas, ``Towards high-performance network processing in virtualized environments'', in Intl Symp. on High Performance Computing and Communications (HPCC), August 2015, pp. 535--540.

Q. Liu, J.C.S. Lui, C. He, L. Pan, W. Fan, and Y. Shi, ``SAND: A fault-tolerant streaming architecture for network traffic analytics'', J. Systems and Software, vol. 122, pp. 553--563, August 2015.

X. Li and C. Qian, ``Low-complexity multi-resource packet scheduling for network function virtualization'', in Conf. on Computer Communications, August 2015, pp. 1400--1408.

X. Li and C. Qian, ``The virtual network function placement problem'', in Intl Conf. on Computer Communications Student Workshops, August 2015, pp. 69--70.

I. Popescu, T. Miyazaki, M. Chino, X. Wang, S. Okamoto, A. Gravey, P. Gravey, M. Veeraraghavan, M. Brandt-Pearce, and N. Yamanaka, ``Application-centric energy-efficient Ethernet with quality of service support'', Electronics Letters, vol. 51, no. 15, pp. 1165--1167, July 2015.

H. Ding and M. Rabinovich, ``TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurement'', ACM SIGCOMM Computer Communication Review, vol. 45, no. 3, pp. 20--27, July 2015.

R. Osuna, ``Estudio De Captura y Almacenamiento De Trafico En Redes Fisicas y Virtuales Multi-Gigabit'', M.S. thesis, Univ. Autonoma de Madrid, June 2015.

R. Addanki, S. Maji, M. Veeraraghavan, and C. Tracy, ``A measurement-based study of big-data movement'', in Conf. on Networks and Communications (EuCNC), June 2015, pp. 445--449.

Z. Zhang, B. Wang, and J. Lan, ``Identifying elephant flows in internet backbone traffic with bloom filters and LRU'', Computer Communications, vol. 61, pp. 70--78, May 2015.

T. Wellem, Y.-K. Lai, and W.-Y. Chung, ``A software defined sketch system for traffic monitoring'', in Symp. on Architectures for Networking and Communications Systems (ANCS), May 2015, pp. 197--198.

S. Sharma, ``Shuffling based mechanism for DDoS prevention on cloud environment'', M.S. thesis, National Institute of Technology, Rourkela, May 2015.

J.M. Namayanja and V.P. Janeja, ``Change detection in evolving computer networks: Changes in densification and diameter over time'', in Intl Conf. on Intelligence and Security Informatics (ISI), May 2015, pp. 185--187.

R. Mijumbi, J. Serrat, and J.-L. Gorricho, ``Self-managed resources in network virtualisation environments'', in Intl Symp. on Integrated Network Management (IM), May 2015, pp. 1099--1106.

U. Ayesta, L. Bertaux, and D. Carvin, ``Non-intrusive scheduling of TCP flows'', in IFIP Networking Conf. (IFIP Networking), May 2015, p. (9 pages).

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Investigating unique flow marking for tracing back DDoS attacks'', in Intl Symp. on Integrated Network Management (IM), May 2015, pp. 762--765.

R. Steinert and A. Hess, ``Observing software-defined networks using a decentralized link monitoring approach'', in Conf. on Network Softwarization (NetSoft), April 2015, p. (5 pages).

J. Saldana, D. de Hoz, J. Fernandez-Navajas, J. Ruiz-Mas, F. Pascual, D.R. Lopez, D. Florez, J.A. Castell, and M. Nunez, ``Small-packet flows in Software Defined Networks: Traffic profile optimization'', J. of Networks, vol. 10, no. 4, pp. 176--187, April 2015.

E. Balkanli, ``A comprehensive study on one-way backscatter traffic analysis'', M.S. thesis, Dalhousie Univ., Halifax, CA, April 2015.

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``A synergetic use of Bloom filters for error detection and correction'', IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 23, no. 3, pp. 584--587, March 2015.

O. Papapetrou, M. Garofalakis, and A. Deligiannakis, ``Sketching distributed sliding-window data streams'', VLDB J., vol. 24, no. 3, pp. 345--368, March 2015.

J. Fairbanks, R. Kannan, H. Park, and D. Bader, ``Behavioral clusters in dynamic graphs'', Parallel Computing, vol. 47, pp. 38--50, March 2015.

J. Chen, R.G. Addie, M. Zukerman, and T.D. Neame, ``Performance evaluation of a queue fed by a Poisson Lomax burst process'', IEEE Communications Letters, vol. 19, no. 3, pp. 367--370, March 2015.

R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Shen, K. Xu, and K. Yang, ``A neuro-fuzzy approach to self-management of virtual network resources'', J. Expert Systems with Applications, vol. 42, no. 3, pp. 1376--1390, February 2015.

S.A. Singh, Techniques for online analysis of large distributed data, Ph.D. thesis, Iowa State Univ., Ames, IO, US, January 2015.

N.M. Sahri and K. Okamura, ``Adaptive anomaly detection for SDN'', Asia-Pacific Advanced Network, vol. 40, pp. 57--63, January 2015.

M. Radan and I. Keslassy, ``Tapping into the Router's Unutilized Processing Power'', in IEEE Conf. on Computer Communications, January 2015, pp. 2569--2577.

J. Martin, ``Sistema de Deteccion de Ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, January 2015.

A. Kulbis, ``Paskirstyto prievadu skenavimo ataku aptikimas tinklo srautuose'', M.S. thesis, Kauno Technologijos Universitetas, January 2015.

M. Danelutto, D. De~Sensi, and M. Torquati, ``Energy driven adaptivity in stream parallel computations'', in Euromicro Intl Conf. on Parallel, Distributed, and Network-Based Processing, January 2015, vol. 23, pp. 103--110.

R. Lu, G. Wu, B. Xie, and J. Hu, ``StreamBench: Towards benchmarking modern distributed stream computing frameworks'', in Intl Conf on Utility and Cloud Computing (UCC), December 2014, pp. 69--78.

R. Barik and D.M. Divakaran, ``Development and experimentation of TCP initial window function'', in Intl Conf. on Network of the Future (NOF), December 2014, p. (8 pages.

Y. Afek, H. Kaplan, B. Korenfeld, A. Morrison, and R.E. Tarjan, ``The CB tree: a practical concurrent self-adjusting search tree'', Distributed Computing, vol. 27, no. 6, pp. 393--417, December 2014.

H. Wang, K.S. Lee, E. Li, C.L. Lum, A. Tang, and K. Weatherspoon, ``Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networks'', in Internet Measurement Conf. (IMC), November 2014, p. (14 pages).

Y. Lai, T. Wellem, and H.-P. You, ``Hardware-assisted estimation of entropy norm for high-speed network traffic'', IET Electronics Lett., vol. 50, no. 24, pp. 1845--1847, November 2014.

Q. Xiao, Y. Qiao, M. Zhen, and S. Chen, ``Estimating the persistent spreads in high-speed networks'', in IEEE Intl Conf. on Network Protocols (ICNP), October 2014, pp. 131--142.

D.V. Tuyen, T.H. Truong, N.T. Hung, B. Puype, D. Colle, K. Steenhaut, and N.H. Thanh, ``An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacks'', in Intl Conf. on Advanced Technologies for Communications (ATC), October 2014, pp. 446--451.

T. Song, X. Shi, and X. Ma, ``Fine-grained power scaling algorithms for energy efficient routers'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2014, pp. 197--206.

S. Pontarelli, P. Reviriego, and J.A. Maestro, ``Efficient flow sampling with back-annotated cuckoo hashing'', IEEE Communications Letters, vol. 18, no. 10, pp. 1695,1698, October 2014.

J.M. Namayanja and V.P. Janeja, ``Change detection in temporally evolving computer networks: A big data framework'', in Conf. on Big Data, October 2014, pp. 54--61.

A. Korosi, J. Tapolcai, B. Mihalka, G. Meszaros, and G. Retvari, ``Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneously'', in Intl Conf. on Network Protocols (ICNP), October 2014, pp. 332--343.

J. Gardiner and S. Nagaraja, ``On the reliability of network measurement techniques Used for malware traffic analysis'', in Cambridge Intl Workshop on Security Protocols, October 2014, vol. 8809 of Lecture Notes in Computer Science, pp. 321--333.

N. Ekiz and P.D. Amer, ``Transport layer reneging'', Computer Communications, vol. 52, no. 1, pp. 82--88, October 2014.

Y. Yu, C. Qian, and X. Li, ``Distributed and collaborative traffic monitoring in software defined networks'', in Hot Topics in Software Defined Networking (HotSDN), August 2014, pp. 85--90.

C. Tunc and N. Akar, ``Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networks'', Photonic Network Communications, p. (11 pages), August 2014.

A.Y. Privalov and A. Tsarev, ``Analysis and simulation of WAN traffic by self-similar traffic model with OMNET'', in Wireless Communications and Mobile Computing (IWCMC), August 2014, pp. 629--634.

R Pecori and L. Veltri, ``A statistical blind technique for recognition of internet traffic with dependence enforcement'', in Wireless Communications and Mobile Computing (IWCMC), August 2014, pp. 328--333.

M. Moshref, M. Yu, R. Govindan, and A. Vahdat, ``DREAM: Dynamic Resource Allocation for Software-defined Measurement'', ACM SIGCOMM Computer Communication Review, vol. 44, pp. 419--430, August 2014.

L. McHale, C.J. Casey, P.V. Gratz, and A. Sprintson, ``Stochastic pre-classification for SDN data plane matching'', in ICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN), August 2014.

H. Luao, J. Cui, G. Chen, Z. Chen, and H. Zhang, ``On the applicability of software defined networking to large scale networks'', in Intl Conf. on Computer Communication and Networks (ICCCN), August 2014, p. (6 pages).

M. Barati, A. Abdullah, N.I. Udzir, R. Mahmod, and N. Mustapha, ``Distributed Denial of Service detection using hybrid machine learning technique'', in Intl Symp. on Biometrics and Security Technologies (ISBAST), August 2014, pp. 268--273.

R. Schmidt, R. Sadre, A. A.~Sperotto, H. van~den Berg, and A. Pras, ``A hybrid procedure for efficient link dimensioning'', Computer Networks, vol. 67, pp. 252--269, July 2014.

V. Moreno, P.M. Santiado~del Rio, J. Ramos, B. Muelas, J.L. Garcia-Dorado, F.J. Gomez-Arribas, and J. Aracil, ``Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems'', Intl J. Network Management, vol. 24, no. 4, pp. 221--234, July 2014.

P.A. Frangoudis, Y. Hadjadj-Aoul, A. Ksentini, G. Rubino, T. Etame, and C. Brun, ``PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top services'', in Intl Conf. on Information, Intelligence, Systems and Applications (IISA), July 2014, pp. 176--181.

M. Shahzad and A.X. Liu, ``Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2014, pp. 207--219.

R. Schmidt, R. Sadre, N. Melnikov, J. Schonwalder, and A. Pras, ``Linking network usage patterns to traffic Gaussianity'', in IFIP Networking Conf., June 2014, p. (9 pages).

R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, J. Famaey, and F. De~Turck, ``Neural network-based autonomous allocation of resources in virtual networks'', in European Conf. on Networks and Communications (EuCNC), June 2014, p. (6 pages).

R. Mijumbi, J.-L. Gorricho, and J. Serrat, ``Contributions to efficient resource management in virtual networks'', in IFIP Intl Conf. on Autonomous Infrastructure, Management and Security (AIMS), June 2014, p. (5 pages).

H.-C. Hsiao, Toward a highly available future Internet, Ph.D. thesis, Carnegie Mellon Univ., June 2014.

X. Zhou, M. Petrovic, T. Eskridge, M. Carvalho, and X. Tao, ``Exploring Netflow data using Hadoop'', in ASE BigData/SocialCom/Cybersecurity Conf., May 2014, p. (10 pages).

P. Reviriego, S. Pontarelli, and J.A. Maestro, ``Energy efficient exact matching for flow identification with cuckoo affinity hashing'', IEEE Communications Letters, vol. 18, no. 5, pp. 885--888, May 2014.

R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, F. De~Turck, and S. Latre, ``Design and evaluation of learning algorithms for dynamic resource management in virtual networks'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), May 2014, p. (9 pages).

B. Liu, J. Lu, Y. Kai, Y. Wang, and T. Pan, ``Power-proportional router: Architectural design and experimental evaluation'', in Quality of Service (IWQoS) Symp., May 2014, pp. 344--349.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``TDFA: Traceback-based defense against DDoS flooding attacks'', in IEEE Int Conf. on Advanced Information Networking and Applications (AINA), May 2014, pp. 597--604.

H. Wang, K.S. Lee, and H. Weatherspoon, ``PHY convert channels: Can you see the idles?'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2014.

N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown, ``I know what your packet did last hop: Using packet histories to troubleshoot networks'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2014, pp. 71--85.

M.M. Masud, U. Mustafa, and Z. Trabelsi, ``A data driven firewall for faster packet filtering'', in Intl Conf. on Communications and Networking (ComNet), March 2014, p. (5 pages).

J.-S. Kim, M.-C. Ko, J. Nam, and J. Kim, ``Bitmap-based prefix caching for fast IP lookup'', KSII Trans on Internet and Information Systems, vol. 8, no. 3, pp. 873--889, March 2014.

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``Efficient implementation of error correction codes in hash tables'', Microelectronics Reliability, vol. 54, no. 1, pp. 338--340, January 2014.

T. Kudo and T. Takin, ``On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling'', Intl J. of Network Management, vol. 24, no. 1, pp. 28--47, January 2014.

Y. Zhang, Y. Sun, J. Zhang, J. Xu, and Y. Wu, ``An efficient framework for parallel and continuous frequent item monitoring'', Concurrency Computation: Practice and Experience, vol. 0, pp. (24 pages), December 2013.

A. Herzberg and H. Shulman, ``Socket overloading for fun and cache-poisoning'', in Annual Computer Security Applications Conf. (ACSAC), December 2013, pp. 189--198.

R. Larsen, ``Slow port scanning with Bro'', M.S. thesis, Gjovik Univ. College, Gjovik, Norway, November 2013.

J. Chen, R.G. Addie, and M. Zukerman, ``Performance evaluation and service rate provisioning for a queue with fractional Brownian input'', Performance Evaluation, vol. 70, no. 11, pp. 1028--1045, November 2013.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``IP traceback through (authenticated) deterministic flow marking: an empirical evaluation'', EURASIP J. on Information Security, November 2013.

R. Schmidt, R. Sadre, A. Sperotto, and A. Pras, ``Lightweight link dimensioning using sFlow sampling'', in Intl Conf. on Network and Services Management (CNSM), October 2013, pp. 152--155.

G. Retvari, J. Tapolcai, A. Korosi, A. Majdan, and Z. Heszberger, ``Compressing IP forwarding tables: towards entropy bounds and beyond'', ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 111--122, October 2013.

M. Lee, N. Duffield, and R.R. Kompella, ``High-fidelity per-flow delay measurements with reference latency interpolation'', IEEE/ACM Trans. on Networking (TON), vol. 21, no. 5, pp. 1567--1580, October 2013.

M.F. Iqbal, J. Holt, J.H. Ryoo, L.K. John, and G. de Veciana, ``Flow migration on multicore network processors: Load balancing while minimizing packet reordering'', in Intl Conf. on Parallel Processing (ICPP), October 2013, pp. 150--159.

Y. Gilad, A. Herzberg, and H. Shulman, ``Off-path hacking: the illusion of challenge-response authentication'', IEEE Security and Privacy, vol. PP, no. 99, pp. (8 pages), October 2013.

C.J. Casey, A. Sutton, G. Dos~Reis, and A. Sprintson, ``Eliminating network protocol vulnerabilities through abstraction and systems language design'', in Conf. on Network Protocols (ICNP), October 2013, p. (6 pages).

M. Karpowicz, ``On the design of energy-efficient service rate control mechanisms: CPU frequency control for Linux'', in Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC), September 2013, p. (6 pages).

A. Herzberg and H. Shulman, ``Vulnerable delegation of DNS resolution'', in European Symp. on Research in Computer Security (ESORICS), September 2013, vol. 8134 of Lecture Notes in Computer Science, pp. 219--236.

S.L. Garfinkel and M. Shick, ``Passive TCP reconstruction and forensic analysis with tcpflow'', Tech. rep., Naval Postgraduate School, Monterey, CA, US, September 2013.

P.A. Frangoudis, A. Ksentini, Y. Hadjadj-Aoul, and G. Boime, ``PTPv2-based metwork load estimation'', in Intl IEEE Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS), September 2013, pp. 101--106.

M. Moshref, M. Yu, and R. Govindan, ``Resource/accuracy tradeoffs in software-defined measurement'', in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), August 2013.

P. Megyesi and S. Molnar, ``Analysis of elephant users in broadband network traffic'', in EUNICE/IFIP WG 6.6 Intl Workshop: Advances in Communication Networking, August 2013, vol. 8115 of Lecture Notes in Computer Science, pp. 37--45.

M.F. Iqbal, Workload-aware network processors: improving performance while minimizing power consumption, Ph.D. thesis, Univ. Texas, Austin, August 2013.

Y.-H. Hu, ``A fluid-based approach for modeling network activities'', J Electr Electron Syst, vol. 2, no. 2, pp. (8 pages), August 2013.

N. Coelho, P. Salvador, and A. Nogueira, ``Inter-operator traffic differentiation based on multiscale analysis'', in ThinkMind, Intl Conf. on Advances in Future Internet (AFIN), August 2013, p. (8 pages).

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``Reducing the cost of implementing error correction codes in content addressable memories'', IEEE Trans. on Circuits and Systems II: Express Briefs, vol. 60, no. 7, pp. 432--436, July 2013.

Z. Guo and Y. Yang, ``High-speed multicast scheduling for all-optical packet switches'', in Conf. on Networking, Architecture and Storage (NAS), July 2013, pp. 156--165.

P. Ghoshal, C.J. Casey, P.V. Gratz, and A. Sprintson, ``Stochastic pre-classification for Software Defined Firewalls'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2013.

S.S. Santiago, ``Latency estimation of IP flows using NetFlow'', M.S. thesis, Univ. Politecnica de Catalunya, Barcelona, Spain, June 2013.

J.M. Namayanja and V.P. Janeja, ``Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks'', in IEEE Conf. on Intelligence and Security Informatics, June 2013, pp. 191--196.

R. Leira, P. Gomez, I. Gonzalez, and J.E. Lopez~de Vergara, ``Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardware'', in Conf. on Smart Communications in Network Technologies (SaCoNeT), June 2013, p. (5 pages).

C. Joslyn, S. Choudhury, D. Haglin, B. Howe, B. Nickless, and B. Olsen, ``Massive scale cyber traffic analysis: A driver for graph database research'', in Intl Workshop on Graph Data Management Experiences and Systems (GRADES), June 2013, p. (6 pages).

A. Iacovazzi and A. Baiocchi, ``Investigating the trade-off between overhead and delay for full packet traffic privacy'', in Intl Conf on Communications (ICC), June 2013, pp. 1345--1350.

N.A. Handigol, Using packet histories to troubleshoot networks, Ph.D. thesis, Stanford Univ., Stanford, CA, US, June 2013.

J. Fokkema, ``A study of impacts of flow timeouts on link provisioning'', in Twente Student Conf. on IT, June 2013, p. (6 pages).

R.G. Clegg, J.T. Araujo, R. Landa, E. Mykoniati, D. Griffin, and M. Rio, ``On the relationship between fundamental measurements in TCP flows'', in IEEE Conf. on Communications (ICC), June 2013, pp. 2502--2506.

M. Zadnik, ``Optimization of network flow monitoring'', Information Sciences and Technologies Bulletin of the ACM Slovakia, vol. 5, no. 1, pp. (6 pages), May 2013.

R. Schmidt, R. Sadre, and A. Pras, ``Gaussian traffic revisited'', in IFIP Networking Conf., May 2013.

P.M. Santiago~del Rio, Internet traffic classification for high-performance and off-the-shelf systems, Ph.D. thesis, Univ. Autonoma de Madrid, May 2013.

V. Petkov, R. Rajagopal, and K. Obraczka, ``Characterizing per-application network traffic using entropy'', ACM Trans. on Modeling and Computer Simulation (TOMACS), vol. 23, no. 2, pp. (25 pages), May 2013.

H. Liu, A collaborative defense framework against DDoS attacks in networks, Ph.D. thesis, Washington State Univ., Pullman, WA, US, May 2013.

M.A. Erazo and J. Liu, ``Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation'', in Conf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS), May 2013, pp. 79--90.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``On evaluating IP traceback schemes: a practical perspective'', in IEEE Security and Privacy Workshops, May 2013, pp. 127--134.

M. Yu, L. Jose, and R. Miao, ``Software defined traffic measurement with OpenSketch'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2013, p. (14 pages).

Y. Gilad and A. Herzberg, ``Fragmentation considered vulnerable'', ACM Trans. on Information and System Security (TISSEC), vol. 15, no. 4, pp. (31 pages), April 2013.

S.A. Ahmadzadeh and G. Agnew, ``Turbo covert channel: An iterative framework for covert communication over data networks'', in IEEE INFOCOM, April 2013, pp. 2031--2039.

R. Hofstede, I. Drago, A. Sperotto, R. Sadre, and A. Pras, ``Measurement artifacts in NetFlow data'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science, pp. 1--10.

G.-F. He, M. Yang, J.-Z. Luo, and L. Zhang, ``Online identification of Tor anonymous communication traffic'', J. of Software, vol. 24, no. 3, pp. 540--556, March 2013.

S. Gangam, J. Chandrashekar, I. Cunha, and J. Kurose, ``Estimating TCP latency approximately with passive measurements'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science (LNCS), pp. 83--93.

J.L. Dautrich~Jr and C.V. Ravishankar, ``Inferential time-decaying Bloom filters'', in Intl Conf. on Extending Database Technology (EDBT), March 2013, pp. 239--250.

D. De~Sensi, ``DPI over commodity hardware: implementation of a scalable framework using FastFlow'', M.S. thesis, Univ. Pisa, Pisa, IT, February 2013.

S. Kim and S.Y. Nam, ``A long range dependent Internet traffic model using unbounded Johnson distribution'', IEICE Trans. on Communications, vol. E96-B, no. 1, pp. 301--304, January 2013.

W. Liu, Y. Yan, T. Dong, and T. Run-hua, ``Self-similarity and heavy-tail of ICMP traffic'', J. Computers, vol. 7, no. 12, pp. 2948--2954, December 2012.

G. Detal, C. Paasch, S. van~der Linden, P. Merindol, G. Avoine, and O. Bonaventure, ``Revisiting flow-based load balancing: Stateless path selection in data center networks'', Computer Networks, vol. 57, pp. 1204--1216, December 2012.

N.M.M. Coelho, ``Profiling de trafego inter-operador baseado em analise multi-escalar'', M.S. thesis, Univ. de Aveiro, December 2012.

C. Basaran, K.-D. Kang, Y. Zhou, and M.H. Suzer, ``Adaptive load shedding via fuzzy control in data stream management systems'', in Intl Conf. on Service-Oriented Computing and Applications (SOCA), December 2012, p. (8 pages).

P.M. Santiago~del Rio, D. Rossi, F. Gringoli, L. Nava, L. Salgarelli, and J. Aracil, ``Wire-speed statistical classification of network traffic on commodity hardware'', in Internet Measurement Conf. (IMC), November 2012, pp. 65--72.

E. Moriyama, T. Takahashi, and D. Miyamoto, ``DNS-based defense against IP spoofing attacks'', in Conf. on Neural Information Processing, November 2012, vol. 7667 of Lecture Notes in Computer Science, pp. 599--609.

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``A GI/G/1 model for 10 Gb/s energy efficient ethernet links'', IEEE Trans. on Communications, vol. 60, no. 11, pp. 3386--3395, November 2012.

N. Ekiz, Transport layer reneging, Ph.D. thesis, Univ. Delaware, November 2012.

X. Zhang and W. Ding, ``Comparative research on internet flows characteristics'', in Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics, October 2012, pp. 114--118.

Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh, ``StegoTorus: a camouflage proxy for the Tor anonymity system'', in ACM Conf. on Computer and Communications Security (CCS), October 2012, pp. 109--120.

V. Moreno, P.M. Santiago~del Rio, J. Ramos, J. Garnica, and J.L. Garcia-Dorado, ``Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines'', IEEE Communications Lett., vol. 99, pp. 1--4, October 2012.

J. Kim, M. Park, S. Han, and J. Kim, ``An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup'', IEICE Trans. on Communications, vol. E95-B, no. 10, pp. 3298--3301, October 2012.

M. Kato, K. Cho, M. Honda, and H. Tokuda, ``Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation'', in Workshop on Managing Systems Automatically and Dynamically, October 2012, p. (7 pages).

M.F. Iqbal and L.K. John, ``Efficient traffic aware power management in multicore communications processors'', in ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS), October 2012, pp. 123--134.

Z. Cao and S.S. Panwar, ``Efficient buffering and scheduling for a single-chip crosspoint-queued switch'', in ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS), October 2012, pp. 111--122.

Y. Afek, H. Kaplan, B. Korenfeld, A. Morrison, and R.E. Tarjan, ``CBTree: A practical concurrent self-adjusting search tree'', in Distributed Computing (DISC), October 2012, vol. 7611 of Lecture Notes in Computer Science, pp. 1--15.

S. Xiaojuan and L. Bin, ``Stream data analysis for backbone network intrusion detection system'', in Conf. on Oxide Materials for Electronic Engineering (OMEE), September 2012, pp. 321--323.

J.C. Mogul and P. Congdon, ``Hey, you darned counters!: get off my ASIC!'', in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), August 2012, pp. 25--30.

Z Lin and N. Hopper, ``New attacks on timing-based network flow watermarks'', in Usenix Security Conf. (SEC), August 2012, p. (16 pages).

P. He, H. Guan, G. Xie, and K. Salamatian, ``Evaluating and optimizing IP lookup on many core processors'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2012, pp. 1--7.

F. Gringoli, L. Nava, A. Este, and L. Salgarelli, ``MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware'', in Wireless Communications and Mobile Computing (IWCMC), August 2012, pp. 450--455.

A. Detti, M. Pomposini, N. Blefari-Melazzi, and S. Salsano, ``Supporting the Web with an information centric network that routes by name'', Computer Networks, vol. 56, pp. 3705--3722, August 2012.

J.M.C. Silva and S.R. Lima, ``Multiadaptive sampling for lightweight network measurements'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2012, pp. 1--7.

Z. Lin, Toward building practical privacy enhancing technologies, Ph.D. thesis, Univ. Minnesota, July 2012.

V. Ishakian, J. Akinwumi, F. Esposito, and I. Matta, ``On supporting mobility and multihoming in recursive internet architectures'', Computer Communications, vol. 35, no. 13, pp. 1561--1573, July 2012.

Y. Zhao, R. Yuan, W. Wang, D. Meng, S. Zhang, and J. Li, ``A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic'', in Conf. on Networking, Architecture and Storage (NAS), June 2012, pp. 154--163.

T. Yang, R. Duan, J. Lu, S. Zhang, H. Dai, and B. Liu, ``CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy'', in Conf. on Distributed Computing Systems (ICDCS), June 2012, pp. 678--687.

J.M.C. Silva and S.R. Lima, ``Optimizing network measurements through self-adaptive sampling'', in Conf. on High Performance Computing and Communication (HPCC), June 2012, pp. 794--801.

W. Qardaji and N. Li, ``Anonymizing network traces with temporal pseudonym consistency'', in Conf. on Distributed Computing Systems Workshops (ICDCSW), June 2012, pp. 622--633.

M.A.J. Markman and S. Tokheim, ``Reliable broadcast contribution over the public Internet'', M.S. thesis, Norwegian Univ. of Science and Technology, June 2012.

J. Kuang, L. Bhuyan, and R. Klefstad, ``Traffic-aware power optimization for network applications on multicore servers'', in Annual Design Automation Conf., June 2012, pp. 1006--1011.

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Bounded energy consumption with dynamic packet coalescing'', in Networks and Optical Communications (NOC), June 2012, p. (5 pages).

Y.S. Hanay, W. Li, R. Tessier, and T. Wolf, ``Saving energy and improving TCP throughput with rate adaptation in Ethernet'', in IEEE Conf. on Communications (ICC), June 2012, pp. 1249--1254.

Z. Guo and Y. Yang, ``High speed multicast scheduling in hybrid optical packet switches with guaranteed latency'', IEEE Trans. on Computers, vol. 62, no. 10, pp. 1972--1987, June 2012.

C. Fragni and L.H.M.K. Costa, ``ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers'', Computer Networks, vol. 56, no. 9, pp. 2249--2261, June 2012.

A. Davy, B. Jennings, and D. Botvich, ``QoSPlan: A measurement based quality of service aware network planning framework'', J. Network and Systems Management, p. (36 pages), June 2012.

N.B. Melazzi, A. A.~Detti, and M. Pomposini, ``Scalability measurements in an information-centric network'', in Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project, May 2012, vol. 7586 of Lecture Notes in Computer Science, pp. 81--106.

B. Korenfeld, ``CBTree: A practical concurrent self-adjusting search tree'', M.S. thesis, Tel-Aviv Univ., Israel, May 2012.

J. Fan, C. Hu, K. He, J. Jiang, and B. Liuy, ``Reducing power of traffic manager in routers via dynamic on/off-chip scheduling'', in IEEE INFOCOM, May 2012, pp. 1925--1933.

H. Zhang, G. Lu, M.T. Qassrawi, Y. Zhang, and X. Yu, ``Feature selection for optimizing traffic classification'', Computer Communications, vol. 35, no. 12, pp. 1457--1471, April 2012.

H. Verma, B. Yadav, P. Bansal, and S. Raj, ``IPv4 to IPv6 shift: major challenges'', J. Engineering and Innovative Technology (IJEIT), vol. 1, no. 4, pp. 38--44, April 2012.

A. Tawakol, ``Performance analysis of TCAMs in switches'', M.S. thesis, Univ. Waterloo, Ontario, CA, April 2012.

M.F. Iqbal and L.K. John, ``Power and performance analysis of network traffic prediction techniques'', in IEEE Intl Symp. on Performance Analysis of Systems and Software (ISPASS), April 2012, pp. 112--113.

W. Zhang, J. Bi, J. Wu, and B. Zhang, ``Catching popular prefixes at AS border routers with a prediction based method'', Computer Networks, vol. 56, pp. 1486--1502, March 2012.

E. Tsidon, I. Hanniel, and I. Keslassy, ``Estimators also need shared values to grow together'', in IEEE INFOCOM, March 2012, pp. 1889--1897.

O. Rottenstreich and I. Keslassy, ``The Bloom paradox: When not to use a Bloom filter?'', in IEEE INFOCOM, March 2012, pp. 1638--1646.

O. Rottenstreich, Y. Kanizo, and I. Keslassy, ``The variable-increment counting Bloom filter'', in IEEE INFOCOM, March 2012, pp. 1880--1888.

T. Pan, X. Guo, C. Zhang, J. Jiang, H. Wu, and B. Liu, ``Tracking millions of flows in high speed networks for application identification'', in IEEE Conf. on Computer Communications (INFOCOM), March 2012, pp. 1647--1655.

C. Lee, D.K. Lee, and S. Moon, ``Unmasking the growing UDP traffic in a campus network'', in Passive and Active Measurement (PAM), March 2012, vol. 7192 of Lecture Notes in Computer Science, pp. 1--10.

A. Houmansadr, N. Kiyavash, and N. Borisov, ``Non-blind watermarking of network flows'', Tech. rep., arxiv.org, March 2012.

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Optimal configuration of energy-efficient ethernet'', Computer Networks, pp. 2456--2467, March 2012.

J. Gilbert, ``Scalable wavelet-based active network stepping stone detection'', M.S. thesis, Air Force Inst. of Technology, Air Univ,, March 2012.

M. Lee, N. Duffield, and R.R. Kompella, ``Opportunistic flow-level latency estimation using consistent NetFlow'', IEEE/ACM Trans. on Networking (TON), vol. 20, no. 1, pp. 139--152, February 2012.

Y. Kanizo, D. Hay, and I. Keslassy, ``Maximizing the throughput of cuckoo hashing in network devices'', Tech. rep., ComNet, Technion, Israel, February 2012.

A. Shpiner, I. Keslassy, and R. Cohen, ``Reducing the reordering delay in multi-core network processors'', Tech. rep., ComNet, Technion, Israel, January 2012.

V.M. Martinez, ``Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks'', M.S. thesis, Univ. Autonoma de Madrid, January 2012.

M. Kim, S. Jung, and M. Park, ``A Distributed Self-Organizing Map for DoS Attack Detection'', in Intl Conf. on Ubiquitous and Future Networks, January 2012, vol. 7, pp. 19--22.

A. Houmansadr, Design, analysis, and implementation of effective network flow watermarking schemes, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2012.

N. Blefari-Melazzi, M. Cancellieri, A. Detti, M. Pomposini, and S. Salsano, ``The CONET solution for information centric networking'', Tech. rep., Univ. Rome, January 2012.

K. Xu and F. Wang, ``Behavioral graph analysis of Internet applications'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2011, p. (5 pages).

A. Vishwanath, V. Sivaraman, Z. Zhao, C. Russell, and M. Thottan, ``Adapting router buffers for energy efficiency'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2011, p. (12 pages).

S.D.B. Moreno, ``Evaluacion de desempeno de diversas arquitecturas de commutadores opticos'', M.S. thesis, Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia, December 2011.

R. Matias, A.M.M. Carvalho, V.A. Teodoro, D. Tes, and L.B. Araujo, ``Performance comparison of forecasting models applied to LAN/MAN traffic prediction'', in IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), October 2011, p. (6 pages).

N. Hua, E. Norige, S Kumar, and B. Lynch, ``Non-crypto hardware hash functions for high performance networking ASICs'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2011, pp. 156--166.

A. Houmansadr, G.T.K. Nguyen, M. Caesar, and N. Borisov, ``Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability'', in ACM Conf. on Computer and Communications Security (CCS), October 2011, pp. 187--199.

Z. Guo and Y. Yang, ``Pipelining multicast scheduling in all-optical packet switches with delay guarantee'', in Intl Teletraffic Congress (ITC), September 2011, pp. 174--181.

R. Clegg, R. Landa, and M. Rio, ``Criticisms of modelling packet traffic using long-range dependence (extended version)'', J. Computer and System Sciences, vol. 77, no. 5, pp. 861--868, September 2011.

L.P. Spinelli, ``Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias'', M.S. thesis, Univ. Federal Do Rio de Janeiro, Brazil, August 2011.

A. Detti, N.B. Melazzi, S. Salsano, and M. Pomposini, ``CONET: a content centric inter-networking architecture'', in ACM SIGCOMM Workshop on Information-Centric Networking (ICN), August 2011, pp. 50--55.

R. Venkataramanan, M.-W. Jeong, and B. Prabhakar, ``A flow- and packet-level model of the Internet'', Tech. rep., Univ. Michigan, July 2011.

M.A. Marsan, A. Fernandez~Anta, V. Mancuso, B. Rengarajan, P. Vasallo, and G. Rizzo, ``A simple analytical model for energy efficient ethernet'', IEEE Communications Lett., vol. 15, no. 7, pp. 773--775, July 2011.

A. Leiva, J.M. Finochietto, B. Huiszoon, V. Lopez, M. Tarifeno, J. Aracil, and A. Beghelli, ``Comparison in power consumption of static and dynamic WDM networks'', Optical Switching and Networking, vol. 8, no. 3, pp. 149--161, July 2011.

D. Larrabeiti, P. Reviriego, J.A. Hernandez, J.A. Maestro, and M.. Uruena, ``Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability'', Optical Switching and Networking, vol. 8, no. 3, pp. 131--138, July 2011.

V.C. Valgenti, R.R. Paul, and M.S. Kim, ``Netshuffle: Improving traffic trace anonymization through graph distortion'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).

O. Rottenstreich and I. Keslassy, ``The Bloom paradox: When not to use a Bloom filter'', Tech. rep., ComNet, Technion, Israel, June 2011.

L.A. Grieco, C. Barakat, and M. Marzulli, ``Spectral models for bitrate measurement from packet sampled traffic'', IEEE Trans. on Network and Service Management, vol. 8, no. 2, pp. 141--152, June 2011.

I. Mothersole and M.J. Reed, ``Optimising rule order for a packet filtering firewall'', in Conf. on Network and Information Systems Security (SAR-SSI), May 2011, p. (6 pages).

F. He, F. Xiang, Y. Yibo~Xue, and J. Jun~Li, ``Towards high-performance network application identification with aggregate-flow cache'', Tech. rep., arxiv.org, May 2011.

K. Xu, F. Wang, and L. Gu, ``Network-aware behavior clustering of Internet end hosts'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 2078--2086.

N. Ekiz, A.H. Rahman, and P.D. Amer, ``Misbehaviors in TCP SACK generation'', ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 17--23, April 2011.

M. Dusi, F. Gringoli, and L. Salgarelli, ``Quantifying the accuracy of the ground truth associated with Internet traffic traces'', Computer Networks, vol. 55, no. 5, pp. 1158--1167, April 2011.

P. Reviriego, B. Huiszoon, V. Lopez, R.B. Coenen, J.A. Hernandez, and J.A. Maestro, ``Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links'', IEEE J. Selected Topics in Quantum Electronics, vol. 17, no. 2, pp. 419--427, March 2011.

L. Jose, M. Yu, and J. Rexford, ``Online measurement of large traffic aggregates on commodity switches'', in Usenix Conf. Hot-ICE 2011, March 2011.

A. Houmansadr and N. Borisov, ``SWIRL: A scalable watermark to detect correlated network flows'', in Symp. on Network and Distributed System Security (NDSS), February 2011.

N. Schear, Preventing encrypted traffic analysis, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2011.

F.M. Pouzols, D.R. Lopez, and A.B. Barros, ``Predictive models of network traffic load'', Studies in Computational Intelligence, vol. 342, pp. 87--145, January 2011.

H. Liu, Y. Sun, V.C. Valgenti, and M.S. Kim, ``TrustGuard: A flow-level reputation-based DDoS defense system'', in Conf. on Consumer Communications and Networking (CCNC), January 2011, pp. 287--291.

K. He, C. Hu, J. Jiang, Y. Zhou, and B. Liu, ``A2C: Anti-attack counters for traffic measurement'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2010, p. (5 pages).

A. Haider, K. Acharya, and M.Y.A. Raja, ``Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks'', in High-Capacity Optical Networks and Enabling Technologies (HONET), December 2010, pp. 67--72.

C. Mouchos, A. Tsokanos, and D.D. Kouvatsos, ``Dynamic OBS offset allocation in WDM networks'', Computer Communications, vol. 33, no. Suppl 1, pp. S130--S145, November 2010.

M. Zadnik and M. Canini, ``Evolution of cache replacement policies to track heavy-hitter flows'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2010, p. (2 pages).

M. Saxena and R. Kompella, ``CLAMP: Efficient class-based sampling for flexible flow monitoring'', Computer Networks, vol. 54, no. 14, pp. 2345--2356, October 2010.

V. Ishakian, J. Akinwumi, F. Esposito, and I. Matta, ``On supporting mobility and multihoming in recursive internet architectures'', Tech. rep., Boston Univ., CS Dept., October 2010.

Y. Kanizo, D. Hay, and I. Keslassy, ``Hash tables with finite buckets are less resistant to deletions'', in Allerton Conf. on Communication, Control and Computing, September 2010, pp. 678--685.

R. Scappini, ``Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas'', M.S. thesis, Facultad de Informatica, Univ. Nacional de la Plata, August 2010.

P.M. Santiago~del Rio, J. Ramos, A. Salvador, J.E.L. de Vergara, J. Aracil, A. Cuadra, and M. Cutanda, ``Application of Internet traffic characterization to all-optical networks'', in Conf. on. Transparent Optical Networks (ICTON), August 2010.

R. Yuan, Y. Weibing, C. Mingyu, Z. Xiaofang, and F. Jianping, ``Robust TCP reassembly with a hardware-based solution for backbone traffic'', in Conf. on Networking, Architecture and Storage (NAS), July 2010, pp. 439--447.

M. Woldeselassie, R. Clegg, and M. Rio, ``Forecasting full-path network congestion using one bit signalling'', in IEEE Conf. on Communications (ICC), July 2010, pp. 1--5.

P. Reviriego, D. Larrabeiti, and J.A. Maestro, ``Would energy efficient ethernet be effective on 10Gbps optical links?'', in OSA Photonics in Switching (PS), July 2010.

D. Fenacci and B. Franke, ``Empirical evaluation of data transformations for network infrastructure applications'', in Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X), July 2010, pp. 55--62.

N. Zhang, F. Wang, B. Gong, and L. Li, ``Identifying heavy-hitter flows fast and accurately'', in Conf. on Future Computer and Communication (ICFCC), June 2010, vol. 3, pp. 26--29.

P. Reviriego, A. Sanchez-Macian, J.A. Maestro, and C.J. Bleakley, ``Increasing the MTU size for energy efficiency in ethernet'', in IET Signals and Systems Conf. (ISSC), June 2010, pp. 124--128.

D. Lee, B.E. Carpenter, and N. Brownlee, ``Observations of UDP to TCP ratio and port numbers'', in Conf. on Internet Monitoring and Protection (ICIMP), June 2010, pp. 99--104.

H.V. Hansen, V. Goebel, T. Plagemann, and M. Siekkinen, ``Resource adaptive distributed information sharing'', in Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE 2010), F.A. Aagesen and S.J. Knapskog, Eds., June 2010, vol. 6164 of Lecture Notes in Computer Science (LNCS), pp. 246--255.

O. Gremillet, P. Goncalves, P. Vicat-Blanc~Primet, and A. Dupas, ``Traffic classification techniques supporting semantic networks'', in Wireless Communications and Mobile Computing (IWCMC), June 2010, pp. 463--467.

D. Moon, ``Achieving flexibility and performance for packet forwarding and data center management'', Tech. rep., UC Berkeley, May 2010.

M. Lee, N. Duffield, and R. Kompella, ``Two samples are enough: Opportunistic flow-level latency estimation using NetFlow'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 9 pp.

Y. Zhang, B.X. Fang, and Y.Z. Zhang, ``Parallelizing weighted frequency counting in high-speed network monitoring'', Computer Communications, vol. 34, no. 4, pp. 536--547, April 2010.

Y. Zhang, B.X. Fang, and Y.Z. Zhang, ``Identifying heavy hitters in high-speed network monitoring'', Science China Information Sciences, vol. 53, no. 3, pp. 659--676, March 2010.

R. Ohlendorf, M. Meitinger, T. Wild, and A. Herkersdorf, ``FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors'', in Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17, M. Platzner, J. Teich, and N. Wehn, Eds. March 2010, pp. 355--374, Springer.

C. Albrecht, J. Foag, R. Koch, E. Maehle, and T. Pionteck, ``DynaCORE - dynamically reconfigurable coprocessor for network processors'', in Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16, M. Platzner, J. Teich, and N. Wehn, Eds. March 2010, pp. 335--354, Springer.

W. John, Characterization and classification of internet backbone traffic, Ph.D. thesis, Chalmers Univ. of Technology, Gothenborg, Sweden, February 2010.

O. Rottenstreich and I. Keslassy, ``The variable-increment counting Bloom filter'', Tech. rep., ComNet, Technion, Israel, January 2010.

R. Ohlendorf, M. Meitinger, T. Wild, and A. Herkersdorf, ``An application-aware load balancing strategy for network processors'', in Conf. on High performance embedded architectures and compilers (HIPEAC). January 2010, vol. 5952 of Lecture Notes in Computer Science (LNCS), pp. 156--170, Springer.

D. Moon, J. Naous, J. Liu, K. Zarifis, M. Casado, T. Koponen, S. Shenker, and L. Breslau, ``Bridging the software/hardware forwarding divide'', Tech. rep., anon., January 2010.

H. Sellke, C.-C. Wang, S. Bagchi, and N.B. Shroff, ``Camouflaging timing channels in web traffic'', Tech. rep., Purdue Univ., December 2009.

N. Beheshti-Zavareh, Tiny buffers for electronic and optical routers, Ph.D. thesis, Stanford Univ., Stanford, CA, US, December 2009.

N. Schear and N. Borisov, ``Preventing SSL traffic analysis with realistic cover traffic'', in ACM Conf. on Computer and Communications Security (CCS), November 2009.

W. Jiang and V.K. Prasanna, ``Reducing dynamic power dissipation in pipelined forwarding engines'', in IEEE Conf. on Computer Design (ICCD), October 2009.

M. Zhang, M. Dusi, W. John, and C. Chen, ``Analysis of UDP traffic usage on internet backbone links'', in Symp. on Applications and the Internet (SAINT), September 2009, pp. 280--281.

A. Este, F. Gringoli, and L. Salgarelli, ``Support Vector Machines for TCP traffic classification'', Computer Networks, vol. 53, no. 14, pp. 2476--2490, September 2009.

M.S. Andreou, Message traceback systems. Dancing with the devil, Ph.D. thesis, Univ. Newcastle upon Tyne, September 2009.

H. Rahmani, N. Sahli, and F. Kamoun, ``Joint entropy analysis model for DDoS attack detection'', in Conf. on Information Assurance and Security (IAS), August 2009, pp. 267--271.

H. Rahmani, N. Sahli, and F. Kamoun, ``A traffic coherence analysis model for DDoS attack detection'', in Conf. on Security and Cryptography (SECRYPT), E. Fernandez-Medina, M. Malek, and J. Hernando, Eds. July 2009, pp. 148--154, INSTICC Press.

K.V. Vishwanath and A. Vahdat, ``Swing: Realistic and responsive network traffic generation'', IEEE/ACM Trans. on Networking (TON), vol. 17, no. 3, pp. 712--725, June 2009.

V. Ishakian, J. Akinwumi, and I. Matta, ``On the cost of supporting multihoming and mobility'', Tech. rep., Boston Univ., CS Dept., June 2009.

R.G. Clegg, M.S. Withall, A.W. Moore, I.W. Phillips, D.J. Parish, M. Rio, R. Landa, H. Haddadi, K. Kyriakopoulos, J. Auge, R. Clayton, and D. Salmon, ``Challenges in the capture and dissemination of measurements from high-speed networks'', IET Communications, vol. 3, no. 6, pp. 957--966, June 2009.

S.T. Brugger, The quantitative comparison of computer networks, Ph.D. thesis, UC Davis, June 2009.

M. Saxena and R. Kompella, ``A framework for efficient class-based sampling'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009.

G. Terdik and T. Gyires, ``Does the internet still demonstrate fractal nature?'', in IEEE Conf. on Networking (ICN), March 2009, pp. 30--34.

F. Idzikowski, ``Search and analysis of backbone traffic measurements in the internet'', Tech. rep., Technische Univ. Berlin (TKN-09-004), March 2009.

G. Terdik and T. Gyires, ``Levy flights and fractal modeling of internet traffic'', IEEE/ACM Trans. on Networking (TON), vol. 17, no. 1, pp. 120--129, February 2009.

G. Maiolini, G. Molina, A. Baiocchi, and A. Rizzi, ``On the fly application flows identification by exploiting K-means based classifiers'', J. Information Assurance and Security, vol. 4, no. 2, pp. 142--150, January 2009.

Y. Kanizo, D. Hay, and I. Keslassy, ``Optimal dynamic hash tables'', Tech. rep., ComNet, Technion, Israel, January 2009.

M.S. Andreou and A. van Moorsel, ``COTraSE Connection Oriented Traceback in Switched Ethernet'', J. Information Assurance and Security, vol. 4, no. 2, pp. 91--105, January 2009.

M. Casado, T. Koponen, D. Moon, and S. Shenker, ``Rethinking packet forwarding hardware'', in ACM SIGCOMM HotNets Workshop, November 2008, p. (6 pages).

A. Baiocchi, G. Maiolini, G. Molina, and A. Rizzi, ``On-the-fly statistical classification of internet traffic at application layer based on cluster analysis'', in Workshop on Computational Intelligence in Security for Information Systems (CISIS). October 2008, vol. 53 of Advances in Soft Computing, pp. 178--185, Springer.

M. Andreou and A. Moorsel, ``COTraSE: Connection Oriented Traceback in Switched Ethernet'', in Intl Conf. on Information Assurance and Security, September 2008, vol. 4, pp. 198--204.

M. Dusi, F. Gringoli, and L. Salgarelli, ``IP traffic classification for QoS guarantees: the independence of packets'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2008, pp. 914--921.

F.M. Pouzols, A. Barriga, D.R. Lopez, and S. Sanchez-Solano, ``Linguistic summarization of network traffic flows'', in IEEE Conf. on Fuzzy Systems (FUZZ-IEEE), June 2008, pp. 619--624.

A. Shevtekar and N. Ansari, ``A router-based technique to mitigate reduction of quality (RoQ) attacks'', Computer Networks, vol. 52, no. 5, pp. 957--970, April 2008.

R. Clegg, R. Landa, H. Haddadi, M. Rio, and A.W. Moore, ``Techniques for flow inversion on sampled data'', in IEEE INFOCOM Workshop Global Internet Symp., April 2008, p. (6 pages).

M. Meitinger, R. Ohlendorf, T. Wild, and A. Herkersdorf, ``A hardware packet re-sequencer unit for network processors'', in Architecture of Computing Systems (ARCS). February 2008, vol. 4934 of Lecture Notes in Computer Science, pp. 85--97, Springer.

F. Raspall and S. Sallent, ``Adaptive shared-state sampling'', in Internet Measurement Conf. (IMC), January 2008, pp. 271--284.

E. Proebstel, ``Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic'', M.S. thesis, UC Davis, January 2008.

A. Este, F. Gringoli, and L. Salgarelli, ``An SMV-based approach to traffic classification'', Tech. rep., Univ. Brescia, January 2008.

E. Hernandez-Orallo and J. Vila-Carbo, ``Network performance analysis based on histogram workload models'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), October 2007, pp. 209--216.

A. Shevtekar and N. Ansari, ``A proactive test based differentiation to mitigate low rate DoS attacks'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2007, pp. 639--644.

B. Whitehead, C.-H. Lung, and P. Rabinovitch, ``A TCP connection establishment filter: symmetric connection detection'', in IEEE Conf. on Communications (ICC), June 2007, pp. 247--253.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation'', Tech. rep., UC Riverside, May 2007.

R. Clegg, H. Haddadi, R. Landa, and M. Rio, ``Towards informative statistical flow inversion'', Tech. rep., arxiv.org, May 2007.

H. Haddadi, R. Landa, M. Rio, and S. Bhatti, ``Revisiting the issues on netflow sample and export performance'', Tech. rep., arxiv.org, April 2007.

L. Yuan, C. Chuah, and P. Mohapatra, ``ProgME: towards programmable network measurement'', ACM SIGCOMM Computer Communication Review, vol. 37, no. 4, pp. 97--108, January 2007.

L. Salgarelli, F. Gringoli, and T. Karagiannis, ``Comparing traffic classifiers'', ACM SIGCOMM Computer Communication Review, vol. 37, no. 3, pp. 65--68, January 2007.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network monitoring using traffic dispersion graphs (TDGs)'', in Internet Measurement Conf. (IMC), January 2007, pp. 315--320.

E. Hernandez-Orallo and J. Vila-Carbo, ``A histogram-based stochastic process for finite buffer occupancy analysis'', in Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS), January 2007, vol. 321 (44) of ValueTools.

R. Clegg, ``Simulating internet traffic with Markov-modulated processes'', in UK Performance Engineering Workshop, January 2007.

J. Park, H.-R. Tyan, and C.-C. Jay~Kuo, ``GA-based internet traffic classification technique for QoS provisioning'', in Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), December 2006.

M. Okuno, S. Nishimura, S. Ishida, and H. Nishi, ``Cache-based network processor architecture: evaluation with real network traffic'', IEICE Trans. on Electronics, vol. E89-C, no. 11, pp. 1620--1628, November 2006.

K. Vishwanath and A. Vahdat, ``Realistic and responsive network traffic generation'', ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 111--122, October 2006.

G. Varghese, J. Fingerhut, and F. F.~Bonomi, ``Detecting evasion attacks at high speeds without reassembly'', ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 327--338, October 2006.

C. Estan, G. Varghese, and M. Fisk, ``Bitmap algorithms for counting active flows on high speed links'', IEEE/ACM Trans. on Networking (TON), vol. 14, no. 5, pp. 925--937, October 2006.

R. Clegg, ``Markov-modulated on/off processes for long-range dependent internet traffic'', Tech. rep., arxiv.org, October 2006.

F. Constantinou and P. Mavrommatis, ``Identifying known and unknown peer-to-peer traffic'', in IEEE Symp. on Network Computing and Applications (NCA), July 2006, pp. 93--102.

H. Wang, Y. Lin, Y. Jin, and S. Cheng, ``Easily-implemented adaptive packet sampling for high speed networks flow measurement'', in Conf. on Computational Science (ICCS), May 2006, vol. 3994 of Lecture Notes in Computer Science (LNCS), pp. 128--135.

S. Kumar, J. Maschmeyer, and P. Crowley, ``Exploiting locality to ameliorate packet queue contention and serialization'', in ACM Conf. on Computing Frontiers, May 2006, pp. 279--290.

Y. Chen and K. Hwang, ``Collaborative change detection of DDoS attacks on community and ISP networks'', in IEEE Symp. on Collaborative Technologies and Systems (CTS), May 2006, pp. 401--410.

A. Shriram and J. Kaur, ``Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth'', in Passive and Active Measurement (PAM), April 2006.

Y. Hu, D.-M. Chiu, and J. Lui, ``Entropy based flow aggregation'', in IFIP-TC6 Networking Conf. (NETWORKING), April 2006, vol. 3976 of Lecture Notes in Computer Science (LNCS), pp. 1204--1209.

R. Clegg, ``Modelling internet traffic using Markov chains'' January 2006.

R. Kompella and C. Estan, ``The power of slicing in internet flow measurement'', in Internet Measurement Conf. (IMC), October 2005, pp. 9--9.

D. Veitch, N. Hohna, and P. Abry, ``Multifractality in TCP/IP traffic: the case against'', Computer Networks, vol. 48, no. 3, pp. 293--313, June 2005.

H. Jiang and C. Dovrolis, ``Why is the internet traffic bursty in short (sub-RTT) timescales?'', ACM SIGMETRICS Performance Evaluation Review, vol. 33, no. 1, pp. 241--252, June 2005.

M. Okuno, S. Ishida, and H. Nishi, ``Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera'', IEICE Trans. on Electronics, vol. E88-C, no. 4, pp. 536--543, April 2005.

T. Karagiannis, M. Molle, and M. Faloutsos, ``Long-range dependence: ten years of Internet traffic modeling'', IEEE Internet Computing, vol. 8, no. 5, pp. 57--64, September 2004.

M. Okuno and H. Nishi, ``Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler'', IEICE technical report: Circuits and system, vol. 103, no. 716, pp. 61--66, March 2004.

C. Estan, G. Varghese, and M. Fisk, ``Bitmap algorithms for counting active flows on high speed links'', in Internet Measurement Conf. (IMC), October 2003, p. (14 pages).

C. Estan, S. Savage, and G. Varghese, ``Automatically inferring patterns of resource consumption in network traffic'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2003, pp. 137--148.

C. Estan and G. Varghese, ``New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice'', ACM Trans. on Computer Systems (TOCS), vol. 21, no. 3, pp. 270--313, August 2003.

C. Estan and G. Varghese, ``New directions in traffic measurement and accounting'', ACM SIGCOMM Computer Communication Review, vol. 32, no. 4, pp. 323--336, October 2002.

W. Fang and L. Peterson, ``Inter-AS traffic patterns and there implications'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 1999, vol. 3, pp. 1859--1868.

Denial of Service Attacks

R. Baishya, N. Hoque, and D. Bhattacharya, ``DDoS Attack Detection Using Unique Source IP Deviation'', Intl J. of Network Security, vol. 19, no. 6, pp. 929--939, November 2017.

K. Singh and T. De, ``MLP-GA based algorithm to detect application layer DDoS attack'', J. of Information Security and Applications, vol. 36, pp. 145--153, October 2017.

N. Hoque, H. Kashyap, and D. Bhattacharyya, ``Real-time DDoS attack detection using FPGA'', Computer Communications, vol. 110, pp. 48--55, September 2017.

M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``A Systematic Hands-On Approach to Generate Real-Life Intrusion Datasets'', in Network Traffic Anomaly Detection and Prevention, September 2017, Computer Communications and Networks, pp. 71--114.

S. Behal, K. Kumar, and M. Sachdeva, ``Discriminating Flash Events from DDoS Attacks: A Comprehensive Review'', Intl J. of Network Security, vol. 19, no. 5, September 2017.

D. Sun, K. Yang, Z. Shi, and Y. Wang, ``A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior'', in IEEE Trustcom/BigDataSE/ICESS, August 2017, pp. 65--72.

T. Phan, N. Bao, and M. Park, ``Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks'', J. of Network and Computer Applications, vol. 91, pp. 14--25, August 2017.

Y. Kim, D. Choi, T. Van, M. Long, and M. Park, ``Multiple Machine Learning for Software Defined Networking Combination-based DDoS detection system'', The J. of Korean Institute of Communications and Information Sciences, vol. 42, no. 8, pp. 1581--1590, August 2017.

R. Fouladi, C. Kayatas, and E. Anarim, ``Statistical measures: Promising features for time series based DDoS attack detection'', in European Signal Processing Conf., August 2017, vol. 25, p. (5 pages).

S. Behal, K. Kumar, and M. Sachdeva, ``Characterizing DDoS attacks and flash events: Review, research gaps and future directions'', Computer Science Review, vol. 25, pp. 101--114, August 2017.

O. Alpos, ``Categorization of Network Attacks with Machine Learning methods'' August 2017.

X. Yuan, C. Li, and X. Li, ``DeepDefense: Identifying DDoS Attack via Deep Learning'', in IEEE Intl Conf. on Smart Computing, June 2017, p. (8 pages).

J. Vidal, A. Orozco, and L. Villalba, ``Adaptive artificial immune networks for mitigating DoS flooding attacks'', Swarm and Evolutionary Computation, p. (15 pages), June 2017.

D. Sun, K. Yang, Z. Shi, and B. Lv, ``A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds'', in Intl Conf. on Knowledge Science, Engineering and Management, June 2017, pp. 129--136.

T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, ``Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments'', in Intl Conf. on Cyber Security and Cloud Computing, June 2017, vol. 4, pp. 97--103.

A. Muhammad and F. Alameka, ``Integrasi Metode Normalized Reelative Network Entropy dan Neural Network Backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS'', Jurnal Rekayasa Teknologi Informasi, vol. 1, no. 1, pp. 1--7, June 2017.

N. Mosharraf, A. Jayasumana, and I. Ray, ``A Distributed Mechanism to Protect Against DDoS Attacks'', in IFIP Annual Conf. on Data and Applications Security and Privacy, June 2017, pp. 529--540.

M. Nogueira, A. Santos, and J. Moura, ``Early Signals from Volumetric DDoS Attacks: An Empirical Study'', Tech. rep., arxiv.org, May 2017.

K. Xylogiannopoulos, Data Structures, Algorithms and Applications for Big Data Analytics: Single, Multiple and All Repeated Patterns Detection in Discrete Sequences, Ph.D. thesis, Univ. of Calgary, April 2017.

R. Saravanan, S. Loganathan, S. Shunmuganathan, and Y. Palanichamy, ``Suspicious Score Based Mechanism to Protect Web Servers against Application Layer Distributed Denial of Service Attacks'', Intl J. of Intelligent Engineering and Systems, vol. 10, no. 4, pp. 147--156, April 2017.

S. Rahmat, Q. Niyaz, A. Javaid, and W. Sun, ``Normal and anomalous traffic flow pattern analysis for organizational networks'', in Canadian Conf. on Electrical and Computer Engineering (CCECE), April 2017, vol. 30, p. (4 pages).

S. Behal and K. Kumar, ``Computer Networks Detection of DDoS attacks and flash events using novel information theory metrics'', Computer Networks, vol. 116, pp. 96--110, April 2017.

K. Singh and T. De, ``Mathematical modelling of DDoS attack and detection using correlation'', J. Cyber Security Technology, p. (12 pages), March 2017.

J. Liu, Y. Lai, and S. Zhang, ``FL-GUARD: A Detection and Defense System for DDoS Attack in SDN'', in Intl Conf. on Cryptography, Security and Privacy, March 2017, pp. 107--111.

L. Cheng, D. Divakaran, A. Ang, W. Lim, and V. Thing, ``FACT: A Framework for Authentication in Cloud-Based IP Traceback'', IEEE Trans. on Information Forensics and Security, vol. 12, no. 3, pp. 604--616, March 2017.

D. Boro and D.K Bhattacharyya, ``DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks'', Microsystem Technologies, vol. 23, no. 3, pp. 593--611, March 2017.

W. Bhaya and M.E. Manaa, ``DDoS attack detection approach using an efficient cluster analysis in large data scale'', in Conf. on New Trends in Information and Communications Technology Applications (NTICT), March 2017, pp. 168--173.

S. Al-mamory and S. Algelal, ``A modified DBSCAN clustering algorithm for proactive detection of DDoS attacks'', in Conf. on New Trends in Information and Communications Technology Applications, March 2017, pp. 304--309.

A. AlEroud and I. Alsmadi, ``Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach'', J. of Network and Computer Applications, vol. 80, pp. 152--164, February 2017.

D. Sun, K. Yang, Z. Shi, and Y. Wang, ``Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest'', in Wireless Algorithms, Systems, and Applications, January 2017, Lecture Notes in Computer Science, pp. 729--740.

I. Sharafaldin, A. Gharib, A. Lashkari, and A. Ghorbani, ``Towards a Reliable Intrusion Detection Benchmark Dataset'', Software Networking, vol. 2017, no. 1, pp. 177--200, January 2017.

V. Semenets and A. Alonso, ``A novel rule generator for intrusion detection based on frequent subgraph mining'', Revista chilena de ingenieria, vol. 25, no. 2, pp. 226--234, January 2017.

A. Muhammad, I. Riadi, and S. Sunardi, ``Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window'', Jurnal Informatika Sunan Kalijaga, vol. 1, no. 3, pp. 115--122, January 2017.

I. Kotenko, A. Chechulin, and A. Branitskiy, ``Generation of Source Data for Experiments with Network Attack Detection Software'', J. of Physics: Conf. Series, p. (10 pages), January 2017.

A. Gharib, I. Sharafaldin, A. Lashkari, and A. Ghorbani, ``An Evaluation Framework for Intrusion Detection Dataset'', in Intl Conf. on Information Science and Security, December 2016, p. (5 pages).

S. Bhatia, ``Ensemble-based model for DDoS attack detection and flash event separation'', in Future Technologies Conf., December 2016, pp. 958--967.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``A probabilistic sampling method for efficient flow-based analysis'', J. of Communications and Networks, vol. 18, no. 5, pp. 818--825, November 2016.

R. Deka and D. Bhattacharya, ``Self-similarity based DDoS attack detection using Hurst parameter'', Security and Communication Networks, vol. 9, no. 17, pp. 4468--4481, November 2016.

H. Zhang, W. Su, and W. Quan, ``Security technologies of SINET'', Smart Collaborative Identifier Network, vol. Part II, pp. 223--249, October 2016.

X. Kong, Y. Chen, H. Tian, T. Wang, Y. Cai, and X. Chen, ``A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering'', in Intl Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery, October 2016, pp. 42--45.

O. Osanaiye, K. Choo, and M. Dlodlo, ``Change-point cloud DDoS detection using packet inter-arrival time'', in Computer Science and Electronic Engineering, September 2016, vol. 8, pp. 204--209.

N. Singh, K. Singh, and T. De, ``Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection'', in Intl Conf. on Informatics and Analytics, August 2016, p. (9 pages).

K. Singh, K. Thongam, and T. De, ``Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks'', Entropy, vol. 18, no. 10, pp. (17 pages), August 2016.

N. Hubballi and N. Tripathi, ``An event based technique for detecting spoofed IP packets'', J. of Information Security and Applications, vol. 35, pp. 32--43, August 2016.

A.R. Yusof, N.I. Udzir, and A. Selamat, ``An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS Attack'', Lecture Notes in Computer Science, vol. 9799, pp. 95--102, July 2016.

T. Phan, N. Bao, and M. Park, ``A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking'', in Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress, July 2016, pp. 350--357.

T. Phan, T. Toan, D. Tuyen, T. Huong, and T. Nguyen, ``OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks'', in Intl Conf. on Communications and Electronics, July 2016, vol. 6, pp. 13--18.

O. Osanaiye, DDoS Defence for Service Availability in Cloud Computing, Ph.D. thesis, Univ. of Cape Town, July 2016.

initial last name and initial last name, ``Identifying Anomalous Traffic using Dynamic Programing based Differential Analysis'', in conference title, July 2016, journal title.

V.A. Foroushani, A security framework based on flow marking IP-traceback techniques, Ph.D. thesis, Dalhousie Univ., Halifax, CA, July 2016.

M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric'', Security and Communication Networks, vol. 9, no. 16, pp. 3251--3270, July 2016.

E.Y.M. Muharish, ``PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS'' June 2016.

Y. Chen, X. Chen, H. Tian, T. Wang, and Y. Cai, ``A blind detection method for tracing the real source of DDoS attack packets by cluster matching'', in IEEE Intl Conf. on Communication Software and Networks, June 2016, vol. 8, pp. 551--555.

S. Behal and K. Kumar, ``Trends in Validation of DDoS Research'', Procedia Computer Science, vol. 85, pp. 7--15, June 2016.

A. Karimi, Q. Niyaz, W. Sun, A. Javaid, and V. Devabhaktuni, ``Distributed network traffic feature extraction for a real-time IDS'', in IEEE Intl Conf. on Electro Information Technology, May 2016, pp. 522--526.

K. Giotis, M. Apostolaki, and V. Maglaris, ``A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 495--501.

B.L. Dalmazo, J.P. Vilela, P. Simoes, and M. Curado, ``Expedite feature extraction for enhanced cloud anomaly detection'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 1215--1220.

A. Aleroud and I. Alsmadi, ``Identifying DoS attacks on software defined networks: A relation context approach'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 853--857.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Autonomous system based flow marking scheme for IP-Traceback'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 121--128.

N. Hoque, D. Bhattacharyya, and J. Kalita, ``Denial of Service Attack Detection using Multivariate Correlation Analysis'', in Intl Conf. on Information and Communication Technology for Competitive Strategies, March 2016, p. (6 pages).

A. Bhandari, A.L. Sangal, and K. Kumar, ``Characterizing flash events and distributed denial-of-service attacks: an empirical investigation'', Security and Communication Networks, vol. 9, March 2016.

N. Hoque, D.K. Bhattacharyya, and J.K. Kalita, ``FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis'', Security and Communication Networks, vol. 9, pp. 2032--2041, February 2016.

L. Zheng, J. Li, H. Wang, and X. Zeng, ``Improving accuracy and automation of anomaly detectors based on self-correlation'', J. Internet Technology (JIT), vol. 17, no. 1, pp. 39--51, January 2016.

A. Raza, ``Anomaly Detection Systems for Distributed Denial of Service Attacks'', M.S. thesis, Univ. of Victoria, January 2016.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Intelligent Sampling Using an Optimized Neural Network'', J. of Networks, vol. 11, no. 1, pp. 16--27, January 2016.

N. Hoque, D.K. Bhattacharyya, and J.K. Kalita, ``A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis'', in Intl Conf. on Communication Systems and Networks (COMSNETS), January 2016, pp. 1--2.

K. Giotis, Virtual Network Services for the Monitoring and Security of Software-Defined Networks, Ph.D. thesis, National Technical Univ. of Athens, January 2016.

N. Ghahfarokhi, Cooperative Defense Mechanism for detection, identification, and filtering of DDos attacks, Ph.D. thesis, Colorado State Univ., January 2016.

R.R.R. Robinson and C. Thomas, ``Ranking of machine learning algorithms based on the performance in classifying DDoS attacks'', in 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), December 2015, pp. 185--190.

S. Rastegari, Intelligent network intrusion detection using an evolutionary computation approach, Ph.D. thesis, Edith Cowan Univ., December 2015.

C. Li, J. Yang, Z. Wang, F. Li, and Y. Yang, ``A lightweight DDoS flooding attack detection algorithm based on synchronous long flows'', in Global Communications Conf. (GLOBECOM), December 2015, p. (6 pages).

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Flow-based anomaly detection using semisupervised learning'', in Intl Conf. on Signal Processing and Communication Systems (ICSPCS), December 2015, p. (5 pages).

L. Cheng, D.M. Divakaran, W.Y. Lim, and V.L.L. Thing, ``Opportunistic Piggyback Marking for IP Traceback'', IEEE Trans. on Information Forensics and Security, vol. 11, pp. 273--288, December 2015.

X.-F. Chen and S.-Z. Yu, ``CIPA: A collaborative intrusion prevention architecture for programmable network and SDN'', Computers and Security, vol. 58, pp. 1--19, December 2015.

M. Righi and R. Nunes, ``Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas'', in Simposio Brasileiro em Seguranca da Informacao e Sistemas, November 2015, p. (4 pages).

Y. Purwanto, Hendrawan Kuspriyanto, and B. Rahardjo, ``Statistical analysis on aggregate and flow based traffic features distribution'', in Intl Conf. on Wireless and Telematics (ICWT), November 2015, pp. 1--6.

M. Poongodi and S. Bose, ``Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET'', Cluster Computing, vol. 18, pp. 1549--1559, October 2015.

K. Giotis, G. Androulidakis, and V. Maglaris, ``A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox'', Security and Communication Networks, vol. 9, pp. 1958--1970, October 2015.

E. Balkanli, A.N. Zincir-Heywood, and M.I. Heywood, ``Feature selection for robust backscatter DDoS detection'', in Local Computer Networks Conf. Workshops (LCNW), October 2015, pp. 611--618.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Probabilistic flow marking for IP traceback (PFM)'', in Intl Workshop on Reliable Networks Design and Modeling (RNDM), October 2015, pp. 229--236.

L. Zhou, M. Liao, C. Yuan, Z. Sheng, and H. Zhang, ``DDOS attack detection using packet size interval'', in Intl Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), September 2015, pp. 1--7.

N. Rivetti, Y. Busnel, and A. Mostefaoui, ``Efficiently summarizing data streams over sliding windows'', in Intl Symp. on Network Computing and Applications (NCA), September 2015, pp. 151--158.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Performance of Flow-based Anomaly Detection in Sampled Traffic'', J. of Networks, vol. 10, no. 9, pp. 512--520, September 2015.

M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``Practical Tools for Attackers and Defenders'', in Network Traffic Anomaly Detection and Prevention, September 2015, Computer Communications and Networks, pp. 201--242.

E. Anceaume, Y. Busnel, N. Rivetti, and B. Sericola, ``Identifying global icebergs in distributed streams'', in Symp. on Reliable Distributed Systems (SRDS), September 2015, pp. 266--275.

R. Wang, Z. Jia, and L. Ju, ``An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking'', in Trustcom/BigDataSE/ISPA, 2015 IEEE, August 2015, vol. 1, pp. 310--317.

S. Rastegari, P. Hingston, and C.P. Lam, ``Evolving statistical rulesets for network intrusion detection'', Applied Soft Computing, vol. 33, pp. 348--359, August 2015.

H. Nurohman, Y. Purwanto, and X. Hafidudin, ``Traffic anomaly based detection: Anomaly detection by self-similar analysis'', in Intl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC), August 2015, pp. 1--6.

S. Sharma, ``Shuffling based mechanism for DDoS prevention on cloud environment'', M.S. thesis, National Institute of Technology, Rourkela, May 2015.

L.S. Juturu, ``Applying big data analytics on integrated cybersecurity datasets'', M.S. thesis, Texas Tech Univ., Lubbock, TX, US, May 2015.

S.Y. Dorbala and N. Hubballi, ``An Experience Report on Scalable Implementation of DDoS Attack Detection'', Lecture Notes in Business Information Processing, vol. 215, pp. 518--529, May 2015.

J. David and C. Thomas, ``DDoS Attack Detection Using Fast Entropy Approach on Flow- Based Network Traffic'', Procedia Computer Science, vol. 50, pp. 30--36, May 2015.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Investigating unique flow marking for tracing back DDoS attacks'', in Intl Symp. on Integrated Network Management (IM), May 2015, pp. 762--765.

H. Jiang, S. Chen, H. Hu, and M. Zhang, ``Superpoint-based detection against distributed denial of service (DDoS) flooding attacks'', in Intl Workshop on Local and Metropolitan Area Networks, April 2015, pp. 1--6.

M.H. Bhuyan, A. Kalwar, A. Goswami, D.K. Bhattacharyya, and J.K. Kalita, ``Low-Rate and High-Rate Distributed DoS Attack Detection Using Partial Rank Correlation'', in Intl. Conf. on Communication Systems and Network Technologies (CSNT), April 2015, pp. 706--710.

E. Balkanli, ``A comprehensive study on one-way backscatter traffic analysis'', M.S. thesis, Dalhousie Univ., Halifax, CA, April 2015.

A.S. Pimpalkar and A.R.B. Patil, ``Detection and defense mechanisms against DDoS attacks: A review'', in Intl Conf. on Innovations in Information, Embedded and Communication Systems (ICIIECS), March 2015, pp. 1--6.

S. Wang, Y. Li, X. Zhao, and B. Wang, ``Intrusion detection system design of cloud computing based on abnormal traffic identification'', Intl J. of Reasoning-based Intelligent Systems, vol. 7, January 2015.

R. Wang, Z. Zhang, L. Ju, and Z. Jia, ``A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking'', Intl J. of Information Security and Privacy (IJISP), vol. 9, January 2015.

S. Shamshirband, B. Daghighi, N.B. Anuar, L.M. Kiah, A. Patel, and A. Abraham, ``Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network'', J. Intelligent and Fuzzy Systems, vol. 28, no. 3, pp. 1345--1357, January 2015.

J. Martin, ``Sistema de Deteccion de Ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, January 2015.

Y. Lai, Y. Chen, Z. Liu, Z. Yang, and X. Li, ``On monitoring and predicting mobile network traffic abnormality'', Simulation Modelling Practice and Theory, vol. 50, pp. 176--188, January 2015.

W. Chen and Y. Guan, ``Distinct element counting in distributed dynamic data streams'', in 2015 IEEE Conference on Computer Communications (INFOCOM), January 2015, pp. 2371--2379.

C. Buragohain, M.J. Kalita, S. Singh, and D.K. Bhattacharyya, ``Anomaly based DDoS Attack Detection'', Intl J. of Computer Applications, vol. 123, January 2015.

A. Shrestha, Y. Zhu, and K. Manandhar, ``NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysis'', in Advances in Visual Computing, December 2014, vol. 8887 of Lecture Notes in Computer Science, pp. 357--366.

A. Shrestha, ``Visualizing Spatio-Temporal data'' December 2014.

K. Kato and V. Klyuev, ``Large-scale network packet analysis for intelligent DDoS attack detection development'', in Intl Conf. on Internet Technology and Secured Transactions (ICITST), December 2014, pp. 360--365.

W. Bhaya and M.E. Manaa, ``A proactive DDoS detection approach using data mining cluster analysis'', J. of Next Generation Information Technology, vol. 5, no. 4, pp. 36--47, November 2014.

A. Ain, M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``Rank correlation for low-rate DDoS attack detection: An empirical evaluation'', Intl J. of Network Security, November 2014.

Y. Purwanto, Hendrawan Kuspriyanto, and B. Rahardjo, ``Traffic anomaly detection in DDos flooding attack'', in Intl conf. on Telecommunication Systems Services and Applications (TSSA), October 2014, pp. 1--6.

V. Srihari and R. Anitha, ``DDoS detection system using wavelet features and semi-supervised learning'', in Intl Symp. on Security in Computing and Communications, September 2014, vol. 467 of Communications in Computer and Information Science, pp. 291--303.

K. Kato and V. Klyuev, ``An intelligent DDoS attack detection system using packet analysis and support vector machine'', Intl J. of Intelligent Computing Research (IJICR), vol. 5, September 2014.

K. Giotis, G. Androulidakis, and V. Maglaris, ``Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy Networks'', in 2014 Third European Workshop on Software Defined Networks, September 2014, pp. 85--90.

M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``Information metrics for low-rate DDoS attack detection: A comparative evaluation'', in Intl. Conf. on Contemporary Computing (IC3), August 2014, pp. 80--84.

M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection'', Pattern Recognition Letters, vol. 51, pp. 1--7, August 2014.

M. Barati, A. Abdullah, N.I. Udzir, R. Mahmod, and N. Mustapha, ``Distributed Denial of Service detection using hybrid machine learning technique'', in Intl Symp. on Biometrics and Security Technologies (ISBAST), August 2014, pp. 268--273.

P. Shamsolmoali and M. Zareapoor, ``Statistical-based filtering system against DDOS attacks in cloud computing'', in Intl Conf. on Advances in Computing, Communications and Informatics (ICACCI), July 2014, pp. 1234--1239.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``TDFA: Traceback-based defense against DDoS flooding attacks'', in IEEE Int Conf. on Advanced Information Networking and Applications (AINA), May 2014, pp. 597--604.

S. Bhatia, D. Schmidt, G. Mohay, and A. Tickle, ``A framework for generating realistic traffic for Distributed Denial-of-Service attacks and flash events'', Computers and Security, vol. 40, pp. 95--107, February 2014.

J. Wang and I.C. Paschalidis, ``Botnet detection using social graph analysis'', in Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on, January 2014, pp. 393--400.

M. Wan, H.-K. Zhang, T.-Y. Wu, and C.-H. Lo, ``Anomaly detection and response approach based on mapping requests'', Security and Communication Networks, vol. 7, pp. 2277--2292, January 2014.

R. Takahashi, ``Distributed denial of service (DDoS) attack detection system using burst detection'' January 2014.

C. Fachkha, E. Bou-Harb, and M. Debbabi, ``Fingerprinting Internet DNS Amplification DDoS Activities'', in Intl Conf. on New Technologies, Mobility and Security (NTMS), January 2014, pp. 1--5.

H. Luo, Y. Lin, H. Zhang, and M. Zukerman, ``Preventing DDoS attacks by identifier/locator separation'', IEEE Network, vol. 27, no. 6, pp. 60--65, November 2013.

M.H. Bhuyan, Applying data mining techniques in anomaly based network intrusion detection, Ph.D. thesis, Tezpur Univ., September 2013.

S. Bhatia, Detecting Distributed Denial-of-Service attacks and flash events, Ph.D. thesis, Queensland Univ. of Technology, Brisbane, Australia, August 2013.

C. Joslyn, S. Choudhury, D. Haglin, B. Howe, B. Nickless, and B. Olsen, ``Massive scale cyber traffic analysis: A driver for graph database research'', in Intl Workshop on Graph Data Management Experiences and Systems (GRADES), June 2013, p. (6 pages).

K. Dassouki, H. Debar, H. Safa, and A. Hijazi, ``A TCP delay-based mechanism for detecting congestion in the Internet'', in Intl Conf. on Communications and Information Technology (ICCIT), June 2013, pp. 141--145.

H. Liu, A collaborative defense framework against DDoS attacks in networks, Ph.D. thesis, Washington State Univ., Pullman, WA, US, May 2013.

W. Chen, Y. Liu, and Y. Guan, ``Cardinality change-based early detection of large-scale cyber-attacks'', in IEEE INFOCOM, April 2013, pp. 1788--1796.

M. Callau-Zori, R. Jimenez-Peris, V. Gulisano, M. Papatriantafilou, Z. Fu, and M. Patino-Martinez, ``STONE: A stream-based DDoS defense framework'', in ACM Symp. on Applied Computing (SAC), March 2013, pp. 807--812.

P.A.R. Kumar and S. Selvakumar, ``Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems'', Computer Communications, vol. 36, no. 3, pp. 303--319, February 2013.

S. Bhatia, D. Schmidt, and G. Mohay, ``Ensemble-based DDoS detection and mitigation model'', in Conf. on Security of Information and Networks (SIN), October 2012, pp. 79--86.

Z. Fu, Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation, Ph.D. thesis, Chalmers Univ. of Technology, Gothenborg, Sweden, August 2012.

J. Singh, K. Kumar, M. Sachdeva, and N. Sidhu, ``DDoS attack's simulation using legitimate and attack real data sets'', J. Scientific and Engineering Research, vol. 3, no. 6, pp. 1--5, June 2012.

E. Feitosa, E. Souto, and D.H. Sadok, ``An orchestration approach for unwanted Internet traffic identification'', Computer Networks, vol. 56, pp. 2805--2831, May 2012.

R. Anitha, R. Karthik, V. Pravin, and K. Thirugnanam, ``A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference system'', in Intl Conf. on Computer Science, Engineering and Applications (ICCSEA), May 2012, vol. 167 of Advances in Intelligent Systems and Computing, pp. 773--782.

H. Rahmani, N. Sahli, and F. Kamoun, ``DDoS flooding attack detection scheme based on F-divergence'', Computer Communications, vol. 35, pp. 1380--1391, April 2012.

L. Zheng, P. Zou, Y Jia, and W. Han, ``An online learning and unsupervised traffic anomaly detection system'', Advanced Science Lett., vol. 7, pp. 449--455, March 2012.

M. Kim, S. Jung, and M. Park, ``A Distributed Self-Organizing Map for DoS Attack Detection'', in Intl Conf. on Ubiquitous and Future Networks, January 2012, vol. 7, pp. 19--22.

R.R. Karthick, V.P. Hattiwale, and B. Ravindran, ``Adaptive network intrusion detection system using a hybrid approach'', in Conf. on Communication Systems and Networks (COMSNETS), January 2012, pp. 1--7.

E.K. Takahashi, Y. Chen, and A. Lall, ``Divergence in network traffic'', in Midstates Conf. on Undergraduate Research in Computer Science and Mathematics, November 2011, p. (10 pages).

D.Q. Le, T. Jeong, H.E. Roman, and J.W. Hong, ``Traffic dispersion graph based anomaly detection'', in Symp. on Information and Communication Technology (SolCT), October 2011, pp. 36--41.

S. Bhatia, G. Mohay, A. Tickle, and E. Ahmed, ``Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event'', in Conf. on Availability, Reliability and Security (ARES), August 2011, pp. 210--217.

H. Liu, Y. Sun, V.C. Valgenti, and M.S. Kim, ``TrustGuard: A flow-level reputation-based DDoS defense system'', in Conf. on Consumer Communications and Networking (CCNC), January 2011, pp. 287--291.

F.M. Khan, Assuring network service with bandwidth and integrity based fairness, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2011.

DNS RTT

Z. Liu, Y. Liu, P. Winter, P. Mittal, and Y. Hu, ``TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems'', Tech. rep., arxiv.org, December 2017.

A. Jeyasekar, S. Kasmir~Raja, and R. Annie~Uthra, ``Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networks'', J. of Network and Computer Applications, vol. 93, pp. 91--109, May 2017.

Paper Data Supplements

T. Krenc and A. Feldmann, ``BGP prefix delegations: A deep dive'', in Internet Measurement Conf. (IMC), November 2016, pp. 469--475.

R. Nithyanand, O. Starov, A. Zair, P. Gill, and M. Schapira, ``Measuring and mitigating AS-level adversaries against Tor'', Tech. rep., arxiv.org, December 2015.

Topology with Archipelago

Y. Vanaubel, P. Merindol, J. Pansiot, and B. Donnet, ``Through the Wormhole: Tracking Invisible MPLS Tunnels'', in ACM Internet Measurement Conf. (IMC), November 2017, p. (14 pages).

F. Lichtblau, F. Streibeld, T. Kruger, P. Richter, and A. Feldmann, ``Detection, Classification, and Analysis of Inter-Domain Traffic with Spoofed Source IP Addresses'', in ACM Internet Measurement Conf. (IMC), November 2017, p. (14 pages).

T. Xu, D. Gao, P. Dong, C. Foh, and H. Zhang, ``Mitigating the Table-Overflow Attack in Software-Defined Networking'', IEEE Trans. on Network and Service Management, , no. 99, pp. (12 pages), October 2017.

G. Tilch, T. Ermakova, and B. Fabian, ``A Multilayer Graph Model of the Internet Topology'', Tech. rep., zenodo.org, October 2017.

R. Mayer, L. Graser, H. Gupta, E. Saurez, and U. Ramachandran, ``EmuFog: Extensible and Scalable Emulation of Large-Scale Fog Computing Infrastructures'', Tech. rep., arxiv.org, September 2017.

M. Ando, M. Okada, and A. Kanaoka, ``Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology'', in Asia Joint Conf. on Information Security, September 2017, pp. 75--82.

F. Bronzino, S. Mukherjee, and D. Raychaudhuri, ``The Named-Object Abstraction for Realizing Advanced Mobility Services in the Future Internet'', in Proceedings of the Workshop on Mobility in the Evolving Internet Architecture, August 2017, pp. 37--42.

Q. Scheitle, O. Gasser, P. Sattler, and G. Carle, ``HLOC: Hints-based geolocation leveraging multiple measurement frameworks'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).

G. Hu, W. Chen, Q. Li, Y. Jiang, and K. Xu, ``TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code'', Future Generation Computer Systems, vol. 72, pp. 219--226, June 2017.

M. Candela, M. Bartolomeo, G. Battista, and C. Squarcella, ``Radian: Visual Exploration of Traceroutes'', in IEEE Trans. Visualization and Computer Graphics, June 2017.

B. Fabian, A. Baumann, M. Ehlert, V. Vasilis, and T. Ermakova, ``CORIA - Analyzing internet connectivity risks using network graphs'', in Intl Conf. on Communications, May 2017, p. (6 pages).

S. Ciavarella, N. Bartolini, H. Khamfroush, and T. La~Porta, ``Progressive damage assessment and network recovery after massive failures'', in IEEE Conf. on Computer Communications, May 2017, p. (9 pages).

Y. Sun, A. Edmundson, N. Feamster, M. Chiang, and P. Mittal, ``Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks'', Tech. rep., arxiv.org, April 2017.

K. Kleineberg and D. Helbing, ``Collective navigation of complex networks: Participatory greedy routing'', Scientific Reports, p. (9 pages), April 2017.

X. Zhang, G. Xu, and Y. Xia, ``Optimal defense resource allocation in scale-free networks'', Physica A: Statistical Mechanics and its Applications, vol. 492, pp. 2198--2204, January 2017.

F. Wang, X. Shao, L. Gao, H. Harai, and K. Fujikawa, ``Labeling and Encoding Hierarchical Addressing for Scalable Internet Routing'', Advances in Computer and Computational Sciences, vol. 553, pp. 399--404, January 2017.

P. Sermpezis, G. Nomikos, and X. Dimitropoulos, ``Re-mapping the Internet: Bring the IXPs into Play'', Tech. rep., arxiv.org, January 2017.

P. Pearce, R. Ensalfi, F. Li, N. Feamster, and V. Paxson, ``Augur: Internet-Wide Detection of Connectivity Disruptions'', in IEEE Symp. on Security and Privacy, January 2017, pp. 427--443.

H. Nguyen, C. Phung, S. Secci, B. Felix, and M. Nogueira, ``Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks?'', Tech. rep., arxiv.org, January 2017.

S. Mukherjee, S. Sriram, and D. Raychaudhuri, ``Edge-Aware Inter-Domain Routing for Realizing Next-Generation Mobility Services'', in IEEE ICC 2017 Mobile and Wireless Networking, January 2017, p. (6 pages).

S. Mukherjee, S. Sriram, T. Vu, and D. Raychaudhuri, ``EIR: Edge-aware inter-domain routing protocol for the future mobile internet'', Computer Networks, vol. 127, pp. 13--30, January 2017.

H. Luo, Z. Chen, J. Li, and A.V. Vasilakos, ``Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers'', IEEE Trans. on Information Forensics and Security, vol. 12, pp. 1801--1815, January 2017.

K. Kleineberg, ``Metric clusters in evolutionary games on scale-free networks'', Tech. rep., arxiv.org, January 2017.

Q. Jiang, H. Hu, and G. Hu, ``Two-Type Information Fusion Based IP-to-AS Mapping Table Refining'', J. of Computer Science and Technology, vol. 32, pp. 571--584, January 2017.

M. Imani, A. Barton, and M. Wright, ``Forming Guard Sets using AS Relationships'', Proceedings on Privacy Enhancing Technologies, vol. 3, pp. 1--20, January 2017.

E.W. Gaston, High-frequency mapping of the IPv6 Internet using Yarrp, Ph.D. thesis, Naval Postgraduate School, January 2017.

K. Edeline and B. Donnet, ``A First Look at the Prevalence and Persistence of Middleboxes in the Wild'', in 29th Intl Teletraffic Congress, January 2017, vol. 29, pp. 161--168.

W. Dong, Y. Gao, W. Wu, J. Bu, C. Chen, and X. Li, ``Optimal Monitor Assignment for Preferential Link Tomography in Communication Networks'', IEEE/ACM Trans. on Networking (TON), vol. 25, pp. 210--223, January 2017.

S. Cho, R. Nithyanand, A. Razaghpanah, and P. Gill, ``A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography'', Tech. rep., arxiv.org, January 2017.

M. Apostolaki, A. Zohar, and L. Vanbever, ``Hijacking Bitcoin: Routing Attacks on Cryptocurrencies'', in Symp. on Security and Privacy, January 2017, pp. 375--392.

P. Richter, G. Smaragdakis, D. Plonka, and A. Berger, ``Beyond counting: New perspectives on the active IPv4 address space'', in Internet Measurement Conf. (IMC), November 2016, pp. 135--149.

A. Marder and J.M. Smith, ``MAP-IT: Multipass accurate passive inferences from traceroute'', in Internet Measurement Conf. (IMC), November 2016, pp. 397--411.

C. Liaskos, X. Dimitropoulos, and L. Tassiulas, ``Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach'', IEEE Trans. on Network and Service Management, vol. 0, no. 0, pp. (15 pages), November 2016.

T. Krenc and A. Feldmann, ``BGP prefix delegations: A deep dive'', in Internet Measurement Conf. (IMC), November 2016, pp. 469--475.

R. Beverly, ``Yarrp'ing the Internet: Randomized high-speed active topology discovery'', in Internet Measurement Conf. (IMC), November 2016, pp. 413--420.

C. Lin, Y. Bi, H. Zhao, and W. Cai, ``Research on bottleneck-delay in internet based on IP united mapping'', Peer-to-Peer Networking and Applications, pp. 1--13, July 2016.

K.-K. Kleineberg, M. Boguna, A. Serrano, and F. Papadopoulos, ``Hidden geometric correlations in real multiplex networks'', Nature Physics, vol. 12, pp. 1076--1081, July 2016.

T.H. Kim, D.S. Kim, and H.Y. Jung, ``Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach'', IEICE Trans. on Communications, vol. E99-B, pp. 1511--1522, July 2016.

Y. Wang and K. Zhang, ``Quantifying the flattening of Internet topology'', in Intl Conf. on Future Internet Technologies, June 2016, pp. 113--117.

H. Tan, M. Sherr, and W. Zhou, ``Data-plane defenses against routing attacks on Tor'', in Privacy Enhancing Technologies, June 2016, pp. 276--293.

A. Shah, R. Fontunge, and C. Papadopoulos, ``Towards characterizing international routing detours'', Tech. rep., arxiv.org, June 2016.

J.J. Czyz, A brave new world: Studies on the deployment and security of the emerging IPv6 Internet, Ph.D. thesis, Univ. of Michigan, Ann Arbor, MI, US, June 2016.

J. Rohrer, B. LaFever, and R. Beverly, ``Empirical Study of Router IPv6 Interface Address Distributions'', IEEE Internet Computing, vol. PP, pp. 1, May 2016.

R. Nithyanand, R. Singh, S. Cho, and P. Gill, ``Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client design'', Tech. rep., arxiv.org, May 2016.

A. Baumann and B. Fabian, ``Vulnerability against Internet disruptions - A graph-based perspective'', Lecture Notes in Computer Science, vol. 9578, pp. 120--131, May 2016.

E.C. Rye, J.P. Rohrer, and R. Beverly, ``Revisiting AS-level graph reduction'', in Computer Communications Workshops (INFOCOM WKSHPS), April 2016, p. (6 pages).

Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing resilience of inter-domain routing system under regional failures'', KSII Trans. on Internet and Information Systems, vol. 10, no. 4, pp. 1630--1642, April 2016.

Q. Li, Reducing short flows' latency in the internet, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, April 2016.

F. Li, J. Yang, X. Wang, T. Pan, C. An, and J. Wu, ``Characteristics analysis at prefix granularity: A case study in an IPv6 network'', J. of Network and Computer Applications, vol. 70, pp. 156--170, April 2016.

D. Veitch and K. Vijayalayan, ``Network timing and the 2015 leap second'', in Passive and Active Measurement (PAM), March 2016, vol. 9631 of Lecture Notes in Computer Science (LNCS), pp. 385--396.

Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``A brief history of MPLS usage in IPv6'', in Passive and Active Measurement (PAM), March 2016, Lecture Notes in Computer Science.

G. Nomikos and X. Dimitropoulos, ``traIXroute: Detecting IXPs in traceroute paths'', Lecture Notes in Computer Science (LNCS), vol. 9631, pp. 346--358, March 2016.

S. Marcisak, ``Correlating inferred data plane IPv6 reboot events with control plane BGP activity'', M.S. thesis, Naval Postgraduate School, Monterey, CA, US, March 2016.

B. Jiao and J.-M. Shi, ``Graph perturbations and corresponding spectral changes in Internet topologies'', Computer Communications, vol. 76, pp. 77--86, February 2016.

Z. Wang, Q. Li, F. Jin, W. Xiong, and Y. Wu, ``Hyperbolic mapping of complex networks based on community information'', Physica A: Statistical Mechanics and its Applications, vol. 455, pp. 104--119, January 2016.

F. Wang, X. Shao, L. Gao, H. Harai, and K. Fujikawa, ``Towards variable length addressing for scalable Internet routing'', in IEEE Intl Performance Computing and Communications Conf. (IPCCC), January 2016, pp. 1--9.

J.S. Varghese and L. Ruan, ``A machine learning approach to edge type inference in Internet AS graphs'', in Computer Communications Workshops (INFOCOM WKSHPS), January 2016, p. (6 pages).

Z.D.H. Tan, Network Level Attacks and Defenses Against Anonymity Networks, Ph.D. thesis, Georgetown University, January 2016.

J. Singh, ``Using Looking Glasses to Understand the Internet's Structure'', in Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), January 2016, pp. 47--53.

M. Schuchard, J. Geddes, M. Schliep, and N. Hopper, ``The Cost of the Path Not Taken'', in IEEE Global Communications Conf. (GLOBECOM), January 2016, pp. 1--6.

Q. Jacquemart, Towards Uncovering BGP Hijacking Attacks, Ph.D. thesis, ParisTech, January 2016.

D. Gosain, A. Agarwal, H.B. Acharya, and S. Chakravarty, ``Qi points : placing decoy routers in the internet'', Tech. rep., Indraprastha Institute of Information Technology Delhi (IIITD), January 2016.

Q. Gao, F. Wang, and L. Gao, ``Quantifying AS Path Inflation by Routing Policies'', Intl J. of Future Generation Communication and Networking, pp. 167--186, January 2016.

J. Chen, V.S.A. Kumar, M.V. Marathe, R. Sundaram, M. Thakur, and S. Thulasidasan, ``A study of the structure and vulnerabilities of metropolitan area networks'', in Intl. Conf. on Communication Systems and Networks (COMSNETS), January 2016.

B. Chandrasekaran, Head into the Cloud: An Analysis of the Emerging Cloud Infrastructure, Ph.D. thesis, Duke University, January 2016.

M.A. Canbaz, ``Data-driven large scale network-layer Internet simulation'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), January 2016, pp. 1--2.

Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``MPLS under the microscope: Revealing actual transit path diversity'', in Internet Measurement Conf. (IMC), October 2015, pp. 49--62.

J.P.S. Medeiros, P.S. Motta~Pires, J.B. Borges~Neto, and A.A.F. Loureiro, ``Minimization and placement of sensors in structurally observable networks'', in Intl Conf. on Computer and Information Technology (CIT), October 2015, pp. 75--82.

M. Vijayalakshmi and S.M. Shalinie, ``Single Packet ICMP Traceback Technique Using Router Interface'', J. of Information Science and Engineering, vol. 31, pp. 1757--1778, September 2015.

M.D. Gray, ``Discovery of IPv6 router interface addresses via heuristic methods'', M.S. thesis, Naval Postgraduate School, September 2015.

Z. Sha, ``Decision-centric foundations for complex systems engineering and design'' August 2015.

F. Papadopoulos, R. Aldecoa, and D. Krioukov, ``Network geometry inference using common neighbors'', Phys. Rev. E, vol. 92, August 2015.

M.G. Beiro, S.P. Grynberg, and J.I. Alvarez-Hamelin, ``Router-level community structure of the Internet Autonomous Systems'', EPJ Data Science, vol. 4, no. 12, pp. (22 pages), August 2015.

X. Zhou and K.L. Calvert, ``Lightweight privacy-preserving passive measurement for home networks'', in IEEE Conf. on Communications (ICC), June 2015.

J. Juen, A. Johnson, A. Das, N. Borisov, and M. Caesar, ``Defending Tor from network adversaries: A case study of network path prediction'', in Privacy Enhancing Technologies, June 2015, vol. 2015, pp. 171--187.

B. Fabian, A. Baumann, and J. Lackner, ``Topological analysis of cloud service connectivity'', Computers and Industrial Engineering, vol. 88, pp. 151--165, June 2015.

P. Simoens, L.V. Herzeele, F. Vandeputte, and L. Vermoesen, ``Challenges for orchestration and instance selection of composite services in distributed edge clouds'', in Intl. Symp. on Integrated Network Management (IM), May 2015, pp. 1196--1201.

R. Motamedi, R. Rejaie, and W. Willinger, ``A Survey of Techniques for Internet Topology Discovery'', IEEE Communications Surveys and Tutorials, vol. 17, pp. 1044--1065, May 2015.

A.D. Jaggard, A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, ``20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables'', Privacy Enhancing Technologies, vol. 2015, pp. 4--24, April 2015.

K. Edeline and B. Donnet, ``Towards a middlebox policy taxonomy: Path impairments'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), April 2015.

J. Chavula, N. Fearnster, A. Bagula, and H. Suleman, ``Quantifying the effects of circuitous routes on the latency of intra-Africa Internet traffic: A study of research and education networks'', Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 147, pp. 64--73, April 2015.

A. West, ``Toward a robust method of presenting a rich, interconnected deceptive network topology'', M.S. thesis, Naval Postgraduate School, March 2015.

M.S. Siddiqui, D. Montero, R. Serral-Gracia, and M. Yannuzzi, ``Self-reliant detection of route leaks in inter-domain routing'', Computer Networks, vol. 82, pp. 135--155, March 2015.

M.G. Beiro, S.P. Grynberg, and J.I. Alvarez-Hamelin, ``Router-level community structure of the Internet autonomous systems'', Tech. rep., arxiv.org, March 2015.

P. Mell, R. Harang, and A. Gueye, ``The resilience of the Internet to colluding country induced connectivity disruptions'', in Network and Distributed System Security Symp. (NDSS), February 2015.

Q. Jacquement, Towards uncovering BGP hijacking attacks, Ph.D. thesis, ParisTech, January 2015.

Q. Gao, F. Wang, and L. Gao, ``Routing-policy aware peering for large content providers'', Computer Communications, vol. 67, pp. 23--33, January 2015.

A. Faggiani, E. Gregori, L. Lenzini, and V. Luconi, ``Measuring the Internet topology with smartphones'', in C2B(1)D '15 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, January 2015, pp. 45--50.

B. Chandrasekaran, M. Bai, M. Schoenfield, A. Berger, N. Caruso, G. Economou, S. Gilliss, B. Maggs, K. Moses, D. Duff, K.C. Ng, E.G. Sirer, R. Weber, and B. Wong, ``Alidade: IP Geolocation without Active Probing'', Tech. rep., Duke University, January 2015.

M.S. Siddiqui, D. Montero, M. Yannuzzi, R. Serral-Gracia, X. Masip-Bruin, and W. Ramirez, ``Route leak detection using real-time analytics on local BGP information'', in IEEE Global Communications Conf., December 2014, pp. 1942--1948.

D. Hric, R.K. Darst, and S. Fortunato, ``Community detection in networks: Structural communities versus ground truth'', Phys. Rev. E, vol. 90, December 2014.

J Fowler, T Johnson, P Simonetto, P Lazos, S. Kobourov, M. Schneider, and C. Aceda, ``IMap: Visualizing network activity over Internet maps'', in Visualization for Cyber Security (VizSec), November 2014, p. (8 pages).

R. Durairajan, J. Sommers, and P. Barford, ``Layer 1-informed Internet topology measurement'', in Internet Measurement Conf. (IMC), November 2014, p. (14 pages).

A.R. Kiremire, M.R. Brust, and V.V. Phoha, ``Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes'', Computer Networks, vol. 72, pp. 14--32, October 2014.

J. Juen, A. Das, A. Johnson, N. Borisov, and M. Caesar, ``Defending Tor from network adversaries: A case study of network path prediction'', Tech. rep., arxiv.org, October 2014.

R. Craven, R. Beverly, and M. Allman, ``A middlebox-cooperative TCP for a non end-to-end internet'', ACM SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 151--162, October 2014.

D. Reed, D. Warbritton, and D. Sicker, ``Current trends and controversies in Internet peering and transit: Implications for the future evolution of the Internet'', in Conf. on Communication, Information and Internet Policy (TPRC), September 2014, p. (25 pages).

G. Nomikos, P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``Comparative assessment of centrality indices and implications on the vulnerability of ISP networks'', in Intl Teletraffic Congress (ITC), September 2014, p. (9 pages).

L.D. Mosley, ``IPv6 network infrastructure and stability inference'', M.S. thesis, Naval Postgraduate School, September 2014.

B. Maggs, ``Mapping the whole Internet'', Tech. rep., Duke Univ., August 2014.

J. Czyz, M. Allman, J. Zhang, S. Iekel-Johnson, E. Osterweil, and M. Bailey, ``Measuring IPv6 adoption'', in Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), August 2014, pp. 87--98.

S.R. Burnett, Empowering bystanders to facilitate Internet censorship measurement and circumvention, Ph.D. thesis, Georgia Tech, July 2014.

J.E. Wright, ``Temporal comparisons of Internet topology'', M.S. thesis, Naval Postgraduate School, June 2014.

B. Landry, ``Comparing internet probing methodologies through an analysis of large dynamic graphs'', M.S. thesis, Naval Postgraduate School, June 2014.

A.D. Jaggard, A. Johnson, P. Syverson, and J. Feigenbaum, ``Representing network trust and using it to improve anonymous communication'', Tech. rep., arxiv.org, June 2014.

M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet - causes, exploits, and countermeasures'', Tech. rep., Carnegie Mellon Univ., May 2014.

T.V.H. Tran, ``IPv6 geolocation using latency constraints'', M.S. thesis, Naval Postgraduate School, March 2014.

G. Baltra, R. Beverly, and G.G. Xie, ``Ingress point spreading: A new primitive for adaptive active network mapping'', in Passive and Active Measurement (PAM), March 2014, vol. 8362 of Lecture Notes in Computer Science (LNCS), pp. 56--66.

Y. Xu and W. Ma, ``Robustness analyses of Internet topology with power-law features'', Intl J. of Future Generation Communication and Networking, vol. 7, no. 1, pp. 19--28, January 2014.

S.-N. Orzen, ``Domain relations in trees arborescence for interaction search on persistent routing availability'', in Intl Symp. on Applied Machine Intelligence and Informatics (SAMI), January 2014.

R. Motamedi, B. Chandrasekaran, B. Maggs, R. Rejaie, and W. Willinger, ``https://onrg.cs.uoregon.edu/pub/CIS-TR-2014-02.pdf'', Tech. rep., Univ. of Oregon, January 2014.

M.S. Kang and V.D. Gligor, ``Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures'', in Conf. on Computer and Communications Security, January 2014, pp. 321--333.

S. Gopika and I.D.J. Jingle, ``A system for Distributed Denial-of-Service attack detection based on multivariate correlation analysis'', CiiT Intl J. of Networking and Communication Engineering, vol. 6, January 2014.

J. Gersch, D. Massey, and C. Papadopoulos, ``Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin Hijacks'', in Intl Conf. on Distributed Computing Systems (ICDCS), January 2014, pp. 670--679.

E.R. Gansner, B. Krishnamurthy, W. Willinger, F.E. Bustamante, and M.A. Sanchez, ``Demo abstract: towards extracting semantics by visualizing large traceroute datasets'', Computing, vol. 96, no. 1, pp. 81--83, January 2014.

G. Da~Lozzo, G. Di~Battista, and C. Squarcella, ``Visual discovery of the correlation between BGP routing and round-trip delay active measurements'', Computing, vol. 96, pp. 67--77, January 2014.

A.L. Verigin, ``Evaluating the effectiveness of Sybil attacks against peer-to-peer botnets'', M.S. thesis, Univ. of Victoria, Victoria, CA, December 2013.

G. Nomikos, P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``The multiple instances of node centrality and their implications on the vulnerability of ISP networks'', Tech. rep., arxiv.org, December 2013.

A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson, ``Users get routed: Traffic correlation on Tor by realistic adversaries'', in ACM SIGSAC Conf. on Computer and Communications Security (CCS), November 2013, pp. 337--348.

Y. Vanaubel, J.-J. Pansiot, P. Merindol, and B. Donnet, ``Network fingerprinting: TTL-based router signatures'', in Internet Measurement Conf. (IMC), October 2013, pp. 369--376.

L. Ma, T. He, K.K. Leung, A. Swami, and D. Towsley, ``Identifiability of link metrics based on end-to-end path measurements'', in Internet Measurement Conf. (IMC), October 2013, pp. 391--404.

A. Khan, T. Kwon, H. Kim, and Y. Choi, ``AS-level topology collection through looking glass servers'', in Internet Measurement Conf. (IMC), October 2013, pp. 245--242.

A. Sapegin and S. Uhlig, ``On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events'', Computer Communications, vol. 36, no. 15-16, pp. 1592--1605, September 2013.

L.H.A. Daryl, ``Toward large-graph comparison measures to understand Internet topology dynamics'', M.S. thesis, Naval Postgraduate School, Monterey, CA, US, September 2013.

J. Czyz, M. Allman, J. Zhang, S. Iekel-Johnson, E. Osterweil, and M. Bailey, ``Measuring IPv6 adoption'', Tech. rep., Intl Computer Science Inst. (ICSI), August 2013.

J. Chabarek and P. Barford, ``What's in a name?: decoding router interface names'', in ACM workshop on HotPlanet, August 2013, pp. 3--8.

N. Lu, Y. Wang, S. Su, F. Yang, and R. Han, ``Filtering location optimization for the reactive packet filtering'', Security and Communication Networks, vol. XX, no. X, pp. X, July 2013.

P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``On the local approximations of node centrality in Internet router-level topologies'', in Intl Workshop on Self-Organizing Systems (IWSOS), May 2013, vol. 8221 of Lecture Notes in Computer Science (LNCS), pp. 115--126.

A. Chen, E.W.W. Chan, X. Luo, W.W.T. Fok, and R.K.C. Chang, ``An efficient approach to multi-level route analytics'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2013, pp. 101--108.

B. Yang, H. Zhao, J. Zhang, J. Ai, S. Jia, x. Ge, and W. Liu, ``Analysis of interlayer connection catastrophe characteristics in Internet AS level topology'', Telkomnika, vol. 11, no. 2, pp. 567--576, February 2013.

C. Wacek, H. Tan, K. Bauer, and M. Sherr, ``An empirical evaluation of relay selection in Tor'', in Network and Distributed System Security Symp. (NDSS), February 2013, p. (17 pages).

Y. Wang, J. Bi, and J. Wu, ``Revisiting the rich club of the Internet AS-level topology'', IEICE Trans. on Communications, vol. E96-B, no. 3, pp. 900--904, January 2013.

M. Yu, W. Jiang, H. Li, and I. Stoica, ``Tradeoffs in CDN designs for throughput oriented traffic'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2012, pp. 145--156.

J. Sherry, ``Future architectures for middlebox processing services on the Internet and in the Cloud'', M.S. thesis, UC Berkeley, December 2012.

D. Ren, W. Wong, and S.-H. Gary~Chan, ``Toward continuous push-based P2P live streaming'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2012, pp. 1969--1974.

M.Z. Ahmad and R. Guha, ``Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation'', J. Supercomputing, vol. 62, no. 3, pp. 1425--1450, December 2012.

G. D'Angelo, M. D'Emidio, D. Frigioni, and D. Romano, ``Enhancing the computation of distributed shortest paths on real dynamic networks'', in Mediterranean Conf. on Algorithms, November 2012, vol. 7659 of Lecture Notes in Computer Science, pp. 148--158.

M. Wachs, C. Grothoff, and R. Thurimella, ``Partitioning the Internet'', in Conf. on Risks and Security of Internet and Systems (CRiSIS), October 2012, p. (8 pages).

M.Z. Ahmad and R. Guha, ``Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks'', in IEEE Conf. on Local Computer Networks (LCN), October 2012, p. (8 pages).

G. Tyson, S. Kaune, S. Miles, Y. El-khatib, A. Mauthe, and A. Taweel, ``A trace-driven analysis of caching in content-centric networks'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2012, pp. 1--7.

V. Kambhampati, C. Papadopolous, and D. Massey, ``Epiphany: A location hiding architecture for protecting critical services from DDoS attacks'', in IEEE/IFIP Conf. on Dependable Systems and Networks (DSN), June 2012, p. (12 pages).

A. Fiorese, P. Simoes, and F. Boavida, ``Peer selection in P2P service overlays using geographical location criteria'', in Computational Science and Its Applications (ICCSA), June 2012, vol. 7334 of Lecture Notes in Computer Science, pp. 234--248.

Y. Xu and X. Zhang, ``Analysis of Internet robustness in attacks'', in Conf. on Systems and Informatics (ICSAI), May 2012, pp. 1494--1497.

R. Schlegel and D.S. Wong, ``Anonymous overlay network supporting authenticated routing'', Information Sciences, vol. 210, pp. 99--117, May 2012.

D. Ren and S.G. Chan, ``Achieving high-bitrate overlay live streaming with proxy helpers'', in Packet Video Workshop (PV), May 2012, pp. 7--12.

H. Papadakis, P. Fragopoulou, E. Markatos, and M. Roussopoulos, ``ITA: Innocuous topology awareness for unstructured P2P networks'', IEEE Trans. on Parallel and Distributed Systems, vol. PP, no. 99, May 2012.

A. Faggiani, E. Gregori, L. Lenzini, S. Mainardi, and A. Vecchio, ``On the feasibility of measuring the internet through smartphone-based crowdsourcing'', in Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), May 2012, pp. 318--323.

Y. Xu and Z. Wang, ``Collapse by cascading failures in hybrid attacked regional Internet'', J. Security and Its Applications, vol. 6, no. 2, pp. 287--292, April 2012.

L. Jacquin, V. Roca, M.A. Kaafar, F. Schuler, and J.-L. Roch, ``IBTrack: an ICMP black holes tracker'', Tech. rep., hal.archives-ouvertes.fr, March 2012.

H. Huang, B. Zhang, S.-H.G. Chan, G. Cheung, and P. Frossard, ``Coding and replication co-design for interactive multiview video streaming'', in IEEE INFOCOM, March 2012, pp. 2791--2795.

S. Cicerone, G. D'Angelo, G. Di~Stefano, D. Frigioni, and V. Maurizio, ``Engineering a new algorithm for distributed shortest paths on dynamic networks'', Algorithmica, vol. online, pp. (36 pages), March 2012.

Y. Wang, S. Su, Y. Yang, and J. Ren, ``A more efficient hybrid approach for single-packet IP traceback'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2012, pp. 275--282.

G. D'Angelo, M. D'Emidio, D. Frigioni, and V. Maurizio, ``Engineering a new loop-free shortest paths routing algorithm'', in Symp. on Experimental Algorithms (SEA), January 2012, vol. 7276 of Lecture Notes in Computer Science, pp. 123--134.

J. Sommers, B. Erikson, and P. Barford, ``On the prevalence and characteristics of MPLS deployments in the open Internet'', in Internet Measurement Conf. (IMC), November 2011, pp. 445--458.

Y. Zhang, R. Oliveira, Y. Wang, S. Su, B. Zhang, J. Bi, H. Zhang, and L. Zhang, ``A framework to quantify the pitfalls of using traceroute in AS-level topology measurement'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1822--1836, October 2011.

P. Marchetta, P. Merindol, B. Donnet, A. Pescape, and J.-J. Pansiot, ``Topology discovery at the router level: a new hybrid tool targeting ISP networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 6, pp. 1776--1787, October 2011.

V. Jesus, R.L. Aguiar, and P. Steenkiste, ``Topological implications of cascading interdomain bilateral traffic agreements'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1848--1862, October 2011.

M.Z. Ahmad and R. Guha, ``Internet exchange points and Internet routing'', in Conf. on Network Protocols (ICNP), October 2011, pp. 292--294.

M.D.D. Moreira, R. Laufer, N.C. Fernandes, and O.C.M.B. Duarte, ``A stateless traceback technique for identifying the origin of attacks from a single packet'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).

E. Gregori, L. Lenzini, and C. Orsini, ``k-clique communities in the Internet AS-level topology graph'', in Distributed Computing Systems Workshops (ICDCSW), June 2011, pp. 134--139.

J. Tomasik and M.-A. Weisser, ``Internet topology on as-level: Model, generation methods and tool'', in IEEE Performance Computing and Communications Conf. (IPCC), January 2011, pp. 263--270.

E. Gregori, L Lenzini, and C. Orsini, ``k-dense communities in the internet AS-level topology'', in Conf. on Communication Systems and Networks (COMSNETS), January 2011, p. (10 pages).

E. Gregori, A. Improta, L. Lenzini, and C. Orsini, ``The impact of IXPs on the AS-level topology structure of the Internet'', Computer Communications, vol. 34, pp. 68--82, January 2011.

X. Fan and J. Heidemann, ``Selecting representative IP addresses for internet topology studies'', in Internet Measurement Conf. (IMC), November 2010, pp. 411--423.

R. Beverly, A. Berger, and G.G. Xie, ``Primitives for active internet topology mapping: toward high-frequency characterization'', in Internet Measurement Conf. (IMC), November 2010, pp. 165--171.

M.Z. Ahmad and R. Guha, ``Impact of Internet exchange points on Internet topology evolution'', in Conf. on Local Computer Networks (LCN), October 2010, pp. 332--335.

J. Tomasik and M.-A. Weisser, ``aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2010, pp. 388--390.

A. Knauf, G. Hege, T.C. Schmidt, and M. Wahlisch, ``A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP'', in Principles, Systems and Applications of IP Telecommunications (IPTComm), August 2010.

D. Fenacci and B. Franke, ``Empirical evaluation of data transformations for network infrastructure applications'', in Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X), July 2010, pp. 55--62.

Y. Zhang, R. Oliveira, H. Zhang, and L. Zhang, ``Quantifying the pitfalls of traceroute in AS connectivity inference'', in Passive and Active Measurement (PAM), A. Krishnamurthy and B. Plattner, Eds. April 2010, vol. 6032 of Lecture Notes in Computer Science (LNCS), pp. 91--100, Springer.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, ``Spotter: a model based active geolocation service'', in IEEE Conf. on Computer Communications (INFOCOM), April 2010, p. (9).

A. King, ``Efficient internet topology discovery techniques'', M.S. thesis, Univ. Waikato, New Zealand, February 2010.

S. Ciceronea, G. D'Angelo, G. Di~Stefanoa, and D. Frigioni, ``Partially dynamic efficient algorithms for distributed shortest paths'', Theoretical Computer Science, vol. 411, no. 7-9, pp. 1013--1037, February 2010.

G.-Q. Zhang, G.-Q. Zhang, S.-Q. Cheng, and T. Zhou, ``Symbiotic effect: A guideline for network modeling'', EPL (Europhysics Letters), vol. 87, pp. 68002 (5--pages), September 2009.

G. Germoglio, B. Dias, and P. Sousa, ``Automated and distributed network service monitoring'', in Asia-Pacific Network Operations and Management Symp. (APNOMS), September 2009, vol. 5787 of Lecture Notes in Computer Science (LNCS), pp. 143--150.

D. Saucez, B. Donnet, and O. Bonaventure, ``On the impact of clustering on measurement reduction'', in IFIP-TC6 Networking Conf. (NETWORKING). May 2009, vol. 5550 of Lecture Notes in Computer Science (LNCS), pp. 835--846, Springer.

L Dai, Y. Cao, Y. Cui, and Y. Xue, ``On scalability of proximity-aware peer-to-peer streaming'', Computer Communications, vol. 32, no. 1, pp. 144--153, January 2009.

M.-F. Wu, T.M. Jiang, and A. Wu, ``A virtual service framework for service composition QoS based on active measurement'', in Symp. on Service-Oriented System Engineering (SOSE), December 2008, pp. 68--72.

M. Dramburg, ``Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien'', M.S. thesis, Hochschule fuer Angewandte Wissenschaften Hamburg, Germany, August 2008.

M. Wahlisch, T.C. Schmidt, and W. Spalt, ``What is happening from behind?: Making the impact of internet topology visible'', Campus-Wide Information Systems, vol. 25, no. 5, pp. 392--406, January 2008.

C. Li, H. Zhao, X. Zhang, and X. Ge, ``Research on the distribution of network nodes based on multiple measurement points'', Computer Science, vol. 35, no. 10, pp. 98--137, January 2008.

C. Li, H. Zhao, X. Zhang, and S. Yuan, ``Analysis on traveling time of internet'', China Institute of Communications, vol. 28, no. 7, pp. 54--60, January 2007.

H. Chan, D. Dash, A. Perrig, and H. Zhang, ``Modeling adoptability of secure BGP protocols'', in Joint Conf. on Measurement and Modeling of Computer Systems, September 2006, pp. 389--390.

W.-J. Su, H. Zhao, Y. Xu, and W.-B. Zhang, ``Internet complex network separation degree analysis based on hops'', J. China Inst. of Communications, vol. 26, no. 9, pp. 1--8, September 2005.

C. Panse, Visualizing Geo-Related Data Using Cartograms, Ph.D. thesis, Univ. of Konstanz, December 2004.

Topology with BGP

J. Rula, F. Bustamente, and M. Steiner, ``Cell Spotting: Studying the Role of Cellular Networks in the Internet'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).

A. Murdock, F. Li, P. Bramsen, Z. Durumeric, and V. Paxson, ``Target Generation for Internet-wide IPv6 Scanning'', in ACM Internet Measurement Conf. (IMC), November 2017, p. (12 pages).

B. Goodchild, Y. Chiu, R. Hansen, H. Lu, M. Calder, M. Luckie, W. Lloyd, D. Choffnes, and E. Katz-Bassett, ``The Record Route Option is an Option!'', in Internet Measurement Conf. (IMC), November 2017, p. (7 pages).

V. Giotsas, G. Smaragdakis, C. Dietzel, P. Richter, A. Feldmann, and A. Berger, ``Inferring BGP Blackholing Activity in the Internet'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).

G. Tilch, T. Ermakova, and B. Fabian, ``A Multilayer Graph Model of the Internet Topology'', Tech. rep., zenodo.org, October 2017.

M. Nasr, H. Zolfaghari, and A. Houmansadr, ``The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks'', in Conf. on Computer and Communications Security (SIGSAC), October 2017, p. (16 pages).

V. Kotronis, G. Nomikos, L. Manassakis, D. Mavrommatis, and X. Dimitropoulos, ``Shortcuts through Colocation Facilities'', Tech. rep., arxiv.org, October 2017.

Z. Liu, H. Jin, Y. Hu, and M. Bailey, ``MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation'', Tech. rep., arxiv.org, September 2017.

N. Haghtalab, A. Laszka, A. Procaccia, Y. Vorobeychik, and X. Koutsoukos, ``Monitoring stealthy diffusion'', Knowledge and Information Systems, vol. 52, no. 3, pp. 657--685, September 2017.

A. Canbaz, K. Bakhshaliyev, and M. Gunes, ``Analysis of path stability within autonomous systems'', in Intl Workshop on Measurement and Networking, September 2017, p. (6 pages).

M. Ando, M. Okada, and A. Kanaoka, ``Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology'', in Asia Joint Conf. on Information Security, September 2017, pp. 75--82.

E. Gregori, L. Lenzini, and V. Luconi, ``AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systems'', Computer Communications, vol. 112, pp. 47--57, August 2017.

V. Burger, Wurzburger Beitrage zur Leistungsbewertung Verteilter Systeme, Ph.D. thesis, Univ. Wurzburg, August 2017.

M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, X. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou, ``Understanding the Mirai Botnet'', in USENIX Security Symp., August 2017, vol. 26, p. (18 pages).

M. Wachs, Q. Scheitle, and G. Carle, ``Push away your privacy: Precise user tracking based on TLS client certificate authentication'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).

A. Reuter, R. Bush, I. Cunha, E. Katz-Bassett, T. Schmidt, and M. Wahlisch, ``Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering'', Tech. rep., arxiv.org, June 2017.

G. Hu, W. Chen, Q. Li, Y. Jiang, and K. Xu, ``TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code'', Future Generation Computer Systems, vol. 72, pp. 219--226, June 2017.

B. Tang, J. Xu, H. He, and H. Man, ``ADL: Active dictionary learning for sparse representation'', in Intl Joint Conf. on Neural Networks, May 2017, pp. 2723--2729.

G. Tyson, S. Huang, F. Cuadrado, T. Castro, V. Perta, and A. Sathiaseelan, ``Exploring HTTP Header Manipulation In-The-Wild'', in Intl Conf. on World Wide Web, April 2017, vol. 26, pp. 451--458.

V. Burger, Performance Evaluation and Optimization of Content Delivery Networks, Ph.D. thesis, Julius-Maximilians-Univ. Wurzburg, February 2017.

H. Yang and S.S. Lam, ``Scalable Verification of Networks With Packet Transformers Using Atomic Predicates'', IEEE/ACM Trans. on Networking (TON), vol. PP, pp. 1--16, January 2017.

Y. Wang, J. Bi, and K. Zhang, ``A SDN-Based Framework for Fine-Grained Inter-domain Routing Diversity'', Mobile Networks and Applications, pp. 1--12, January 2017.

M.E. Tozal, ``Autonomous system ranking by topological characteristics: A comparative study'', in IEEE Intl Systems Conf. (SysCon), January 2017, pp. 1--8.

M. Tozal, ``Policy-Preferred Paths in AS-level Internet Topology Graphs'', Tech. rep., Univ. of Louisiana, Lafayette, January 2017.

J.Y. Suen and S. Navlakha, ``Using Inspiration from Synaptic Plasticity Rules to Optimize Traffic Flow in Distributed Engineered Networks'', Neural Computation, vol. 29, pp. 1204--1228, January 2017.

K. Shin, T. Rad, and C. Faloutsos, ``Patterns and anomalies in k-cores of real-world graphs with applications'', Knowledge and Information Systems, pp. 1--34, January 2017.

P. Sermpezis, G. Nomikos, and X. Dimitropoulos, ``Re-mapping the Internet: Bring the IXPs into Play'', Tech. rep., arxiv.org, January 2017.

P. Sermpezis and X. Dimitropoulos, ``Can SDN Accelerate BGP Convergence? A Performance Analysis of Inter-domain Routing Centralization'', Tech. rep., arxiv.org, January 2017.

V. Pacifici and G. Dan, ``Distributed Caching Algorithms for Interconnected Operator CDNs'', IEEE J. on Selected Areas in Communications, vol. 35, pp. 380--391, January 2017.

Y. Nozaki, E. Golen, and N. Shenoy, ``A modular architecture for scalable inter-domain routing'', in IEEE Computing and Communication Workshop and Conf. (CCWC), January 2017, pp. 1--6.

A. Muscoloni and C.V. Cannistraci, ``Local-ring network automata and the impact of hyperbolic geometry in complex network link-prediction'', Tech. rep., arxiv.org, January 2017.

S. Matsumoto, R.M. Reischuk, P. Szalachowski, T.H. Kim, and A. Perrig, ``Authentication Challenges in a Global Environment'', ACM Trans. on Privacy and Security (TOPS), vol. 20, pp. 1--34, January 2017.

P. London, Distributed Optimization and Data Market Design, Ph.D. thesis, California Institute of Technology, January 2017.

Z. Li, D. Levin, N. Spring, and B. Bhattacharjee, ``Longitudinal Analysis of Root Server Anycast Inefficiencies'', Tech. rep., Univ. of Maryland, January 2017.

S. Kuenzer, A. Ivanov, F. Manco, J. Mendes, Y. Volchkov, F. Schmidt, K. Yasukata, M. Honda, and F. Huici, ``Unikernels Everywhere: The Case for Elastic CDNs'', in Intl Conf. on Virtual Execution Environments (SIGPLAN), January 2017, pp. 15--29.

Q. Jiang, H. Hu, and G. Hu, ``Two-Type Information Fusion Based IP-to-AS Mapping Table Refining'', J. of Computer Science and Technology, vol. 32, pp. 571--584, January 2017.

J. Jakub, ``Automatic classification of network entities'', Tech. rep., Charles Univ., January 2017.

M. Imani, A. Barton, and M. Wright, ``Forming Guard Sets using AS Relationships'', Proceedings on Privacy Enhancing Technologies, vol. 3, pp. 1--20, January 2017.

M. Huth and B. Fabian, ``Inferring business relationships in the internet backbone'', Intl J. of Networking and Virtual Organisations, vol. 16, pp. 315--345, January 2017.

R. Hiran, N. Carlsson, and N. Shahmehri, ``Collaborative framework for protection against attacks targeting BGP and edge networks'', Computer Networks, vol. 122, pp. 120--137, January 2017.

J.F. Grailet and B. Donnet, ``Towards a Renewed Alias Resolution with Space Search Reduction and IP Fingerprinting'', in Network Traffic Measurement and Analysis Conf. (TMA), January 2017, pp. 1--9.

O. Gasser, Q. Scheitle, B. Rudolph, C. Denis, N. Schriker, and G. Carle, ``The Amplification Threat Posed by Publicly Reachable BACnet Devices'', J. of Cyber Security and Mobility, vol. 6, no. 1, pp. 77--104, January 2017.

R. Fanou, P. Francois, E. Aben, M. Mwangi, N. Goburdhan, and F. Valera, ``Four years tracking unrevealed topological changes in the african interdomain'', Computer Communications, vol. 106, pp. 117--135, January 2017.

W. Dong, Y. Gao, W. Wu, J. Bu, C. Chen, and X. Li, ``Optimal Monitor Assignment for Preferential Link Tomography in Communication Networks'', IEEE/ACM Trans. on Networking (TON), vol. 25, pp. 210--223, January 2017.

S. Cho, R. Nithyanand, A. Razaghpanah, and P. Gill, ``A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography'', Tech. rep., arxiv.org, January 2017.

S. Bublitz, Towards a BitTorrent Weather Forecast, Ph.D. thesis, Univ. of Zurich, January 2017.

T. Bottger, F. Cuadrado, and S. Uhlig, ``Looking for Hypergiants in PeeringDB'', in ACM SIGCOMM Computer Communication Review, January 2017, vol. 47 (1), p. (6 pages).

R. Birkner, A. Gupta, N. Feamster, and L. Vanbever, ``SDX-Based Flexibility or Internet Correctness?: Pick Two!'', Symp. on SDN Research, pp. 1--7, January 2017.

P. Bangera and S. Gorinsky, ``Ads versus Regular Contents: Dissecting the Web Hosting Ecosystem'', in IFIP Networking Conf. (NETWORKING), January 2017, pp. 1--9.

G. Asharov, D. Demmler, M. Schapira, T. Schneider, G. Segev, S. Shenker, and M. Zohner, ``Privacy-Preserving Interdomain Routing at Internet Scale'', Proceedings on Privacy Enhancing Technologies, vol. 3, pp. 143--163, January 2017.

M. Apostolaki, A. Zohar, and L. Vanbever, ``Hijacking Bitcoin: Routing Attacks on Cryptocurrencies'', in Symp. on Security and Privacy, January 2017, pp. 375--392.

R. Almeida, O. Fonseca, E. Fazzion, D. Guedes, W. Meira, and I. Cunha, ``A Characterization of Load Balancing on the IPv6 Internet'', in Intl Conf. on Passive and Active Network Measurement, January 2017, pp. 242--254.

A. Al-Baghdadi, COMPUTING TOP-K CLOSENESS CENTRALITY IN UNWEIGHTED UNDIRECTED GRAPHS REVISITED, Ph.D. thesis, Kent State University, January 2017.

A. Marder and J.M. Smith, ``MAP-IT: Multipass accurate passive inferences from traceroute'', in Internet Measurement Conf. (IMC), November 2016, pp. 397--411.

C. Liaskos, X. Dimitropoulos, and L. Tassiulas, ``Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach'', IEEE Trans. on Network and Service Management, vol. 0, no. 0, pp. (15 pages), November 2016.

T. Krenc and A. Feldmann, ``BGP prefix delegations: A deep dive'', in Internet Measurement Conf. (IMC), November 2016, pp. 469--475.

J. Klick, S. Lau, M. Wahlisch, and V. Roth, ``Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selection'', in Internet Measurement Conf. (IMC), November 2016, pp. 421--427.

M. Jonker, A. Sperotto, R. van Rijswijk-Deij, R. Sadre, and A. Pras, ``Measuring the adoption of DDoS protection services'', in Internet Measurement Conf. (IMC), November 2016, pp. 279--285.

G. Comarela, E. Terzi, and M. Crovella, ``Detecting unusually-routed ASes: Methods and applications'', in Internet Measurement Conf. (IMC), November 2016, pp. 445--459.

T. Chung, Y. Liu, D. Choffnes, D. Levin, B.M. Maggs, A. Mislove, and C. Wilson, ``Measuring and applying invalid SSL certificates: The silent majority'', in Internet Measurement Conf. (IMC), November 2016, pp. 527--541.

T. Chung, D. Choffnes, and A. Mislove, ``Tunneling for transparency: A large-scale analysis of end-to-end violations in the Internet'', in Internet Measurement Conf. (IMC), November 2016, pp. 199--213.

L. Liquori and M. Sereno, ``LogNet: Extending Internet with a network aware discovery service'', Tech. rep., Inria-French Inst. for Research in Computer Science, September 2016.

A. Ata and M. Mustafa, ``Tree-like structure in graphs and embedability to trees'' August 2016.

E. Bergamini, M. Wegner, D. Lukarski, and H. Meyerhenke, ``Estimating current-flow closeness centrality with a multigrid Laplacian solver'', Tech. rep., arxiv.org, July 2016.

Y. Zhang, X. Wang, A. Perrig, and Z. Zheng, ``Tumbler: Adaptable link access in the bots-infested Internet'', Computer Networks, vol. 105, pp. 180--193, June 2016.

Y. Wang and K. Zhang, ``Quantifying the flattening of Internet topology'', in Intl Conf. on Future Internet Technologies, June 2016, pp. 113--117.

H. Tan, M. Sherr, and W. Zhou, ``Data-plane defenses against routing attacks on Tor'', in Privacy Enhancing Technologies, June 2016, pp. 276--293.

K. Sriram, D. Montgomery, D. McPherson, E. Osterweil, and B. Dickson, ``Problem Definition and Classification of BGP Route Leaks'', Tech. rep., Internet Engineering Task Force, June 2016.

R. Singh, H. Koo, N. Miramirkhani, Akoglu Miraj~F., and Gill~P. L., ``The politics of routing: Investigating the relationship between AS connectivity and Internet freedom'', Tech. rep., arxiv.org, June 2016.

A. Shah, R. Fontunge, and C. Papadopoulos, ``Towards characterizing international routing detours'', Tech. rep., arxiv.org, June 2016.

M. Schuchard and N. Hopper, ``E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentives'', Tech. rep., arxiv.org, June 2016.

S.A.U. Hasan, The role of topology and contracts in Internet content delivery, Ph.D. thesis, Univ. of Carlos III de Madrid, June 2016.

J.C. Cardona, Inter-domain traffic management in an evolving Internet peering ecosystem, Ph.D. thesis, Univ. Carlos III de Madrid, June 2016.

S. Li, H. Duan, Z. Wang, J. Liang, and X. Li, ``An accurate distributed scheme for detection of prefix interception'', Science China Information Sciences, vol. 59, pp. (17 pages), May 2016.

D. Eppstein, M.T. Goodrich, J. Lam, N. Mamano, M. Mitzenmacher, and M. Torres, ``Models and algorithms for graph watermarking'', Tech. rep., arxiv.org, May 2016.

A. Baumann and B. Fabian, ``Vulnerability against Internet disruptions - A graph-based perspective'', Lecture Notes in Computer Science, vol. 9578, pp. 120--131, May 2016.

M. Zhao, W. Zhou, A.J.T. Gurney, A. Haeberlen, M. Sherr, and B.T. Loo, ``Private and Verifiable Interdomain Routing Decisions'', IEEE/ACM Trans. on Networking (TON), vol. 24, pp. 1011--1024, April 2016.

Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing resilience of inter-domain routing system under regional failures'', KSII Trans. on Internet and Information Systems, vol. 10, no. 4, pp. 1630--1642, April 2016.

Q. Li, Reducing short flows' latency in the internet, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, April 2016.

C. Guo and M. Karsten, ``On the feasibility of core-rooted path addressing'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 306--314.

K. Giotis, M. Apostolaki, and V. Maglaris, ``A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 495--501.

Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``A brief history of MPLS usage in IPv6'', in Passive and Active Measurement (PAM), March 2016, Lecture Notes in Computer Science.

G. Sukrit, P. Rami, and K. Konstantin, ``Comparative network analysis using KronFit'', in Complex Networks, March 2016, vol. 644 of Studies in Computational Intelligence, pp. 363--375.

G. Nomikos and X. Dimitropoulos, ``traIXroute: Detecting IXPs in traceroute paths'', Lecture Notes in Computer Science (LNCS), vol. 9631, pp. 346--358, March 2016.

M. Niemela, ``Estimating Internet-scale Quality of Service parameters for VoIP'', M.S. thesis, Linkoping Univ., March 2016.

S. Frey, Y. Elkhatib, A. Rashid, K. Follis, J. Vidler, N. Race, and C. Edwards, ``It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe'', in IEEE European Symp. on Security and Privacy (EuroSP), March 2016, pp. 423--438.

J.C. Cardona, S. Vissicchio, P. Lucente, and P. Francois, ``'I can't get no satisfaction': Helping autonomous systems identify their unsatisfied interdomain interests'', IEEE Trans. on Network and Service Management, vol. 13, no. 1, pp. 43--57, March 2016.

A. Agache, G. Antichi, F. Eberhardt, L. Eggert, P. Hasselmeyer, O. Hohlfeld, M. Honda, A. Ivanov, M. Kimmerlin, S. Klauck, J. Kommeri, G. Lettieri, S. Oechsner, M. Plauth, C. Raiciu, A. Ripke, P. Sarolahti, L. Schulte, E. Tsolakou, and M. Wojcik, ``Initial design of cloud infrastructure and federation mechanisms'', Tech. rep., SSICLOPS, February 2016.

M. Zhao, Accountability in distributed systems with incomplete information, Ph.D. thesis, Univ. of Pennsylvania, January 2016.

X. Zhang, C. Moore, and M.E.J. Newman, Random graph models for dynamic networks, Ph.D. thesis, Cornell University, January 2016.

E. Yuce and A.A. Selcuk, ``Server Notaries: A Complementary Approach to the Web PKI Trust Model'', IACR Cryptology, vol. 126, pp. 1--14, January 2016.

Y. Yang, X. Shi, X. Yin, and Z. Wang, ``The Power of Prefix Hijackings in the Internet Hierarchy'', in IEEE Trustcom/BigDataSE/ISPA, January 2016, pp. 228--235.

M. Wubbeling and M. Meier, ``Improved Calculation of aS Resilience against IP Prefix Hijacking'', in IEEE Conf. on Local Computer Networks Workshops (LCN Workshops), January 2016, pp. 121--128.

S. Wassermann and P. Casas, ``Reverse Traceroute with DisNETPerf, a Distributed Internet Paths Performance Analyzer'', in IEEE Conf. on Local Computer Networks, January 2016, pp. 1--3.

S. Wassermann, P. Casas, B. Donnet, G. Leduc, and M. Mellia, ``On the Analysis of Internet Paths with DisNETPerf, a Distributed Paths Performance Analyzer'', in IEEE Conf. on Local Computer Networks Workshops (LCN Workshops), January 2016, pp. 72--79.

Y. Wang, J. Bi, K. Zhang, and Y. Wu, ``A framework for fine-grained inter-domain routing diversity via SDN'', in Intl Conf. on Ubiquitous and Future Networks (ICUFN), January 2016, pp. 751--756.

C. Wang, Z. Li, X. Huang, and P. Zhang, ``Inferring the average as path length of the Internet'', in IEEE Intl Conf. on Network Infrastructure and Digital Content (IC-NIDC), January 2016, pp. 391--395.

J.S. Varghese and L. Ruan, ``A machine learning approach to edge type inference in Internet AS graphs'', in Computer Communications Workshops (INFOCOM WKSHPS), January 2016, p. (6 pages).

J.S. Varghese and L. Ruan, ``Computing Customer Cones of Peering Networks'', in Applied Networking Research Workshop, January 2016, pp. 35--37.

M.E. Tozal, ``Enumerating single destination, policy-preferred paths in AS-level Internet topology maps'', in IEEE Sarnoff Symp., January 2016, pp. 1--6.

M.E. Tozal, ``The Internet: A system of interconnected autonomous systems'', in IEEE Systems Conf. (SysCon), January 2016, pp. 1--8.

N. Teneva, P.K. Mudrakarta, and R. Kondor, ``Multiresolution Matrix Compression'', in Intl Conf. on Artificial Intelligence and Statistics, January 2016, pp. 1441--1449.

Z.D.H. Tan, Network Level Attacks and Defenses Against Anonymity Networks, Ph.D. thesis, Georgetown University, January 2016.

M. Syamkumar, R. Durairajan, and P. Barford, ``Bigfoot: A geo-based visualization methodology for detecting BGP threats'', in IEEE Symp. on Visualization for Cyber Security (VizSec), January 2016, pp. 1--8.

J.L. Sobrinho, L. Vanbever, F. Le, A. Sousa, and J. Rexford, ``Scaling the Internet Routing System Through Distributed Route Aggregation'', IEEE/ACM Trans. on Networking (TON), pp. 3462--3476, January 2016.

X. Shao, F. Wang, L. Gao, K. Fujikawa, and H. Harai, ``Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the Internet'', in IEEE Intl Conf. on Distributed Computing Systems (ICDCS), January 2016, pp. 751--752.

K. Semertzidis, E. Pitoura, E. Terzi, and P. Tsaparas, ``Best Friends Forever (BFF): Finding Lasting Dense Subgraphs'', Tech. rep., arxiv.org, January 2016.

M.J. Schuchard, Adversarial Degradation of the Availability of Routing Infrastructures and Other Internet-Scale Distributed Systems, Ph.D. thesis, Univ. of Minnesota, January 2016.

K. Satake, S. Arakawa, and M. Murata, Analyses of core-periphery structure in Internet's AS-level topologies, Ph.D. thesis, Graduate School of Information Science and Technology, Osaka University, January 2016.

D. Revelo, M.A. Ricci, B. Donnet, and J.I. Alvarez-Hamlin, ``Unveiling the MPLS Structure on Internet Topology'', in Intl Workshop on Traffic Monitoring and Analysis (TMA), January 2016, pp. 1--8.

V. Pacifici and G. Dan, ``Coordinated selfish distributed caching for peering content-centric networks'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 6, pp. 3690--3701, January 2016.

M. Nasr and A. Houmansadr, ``GAME OF DECOYS: Optimal Decoy Routing Through Game Theory'', in Conf. on Computer and Communications Security (SIGSAC), January 2016, pp. 1727--1738.

R. Motamedi, Measurement-Based Characterization of Large-Scale Networked Systems, Ph.D. thesis, Univ. of Oregon, January 2016.

F.F. Machado, ANALYSIS OF THE DEGREE RANKING STABILITY IN SCALE-FREE NETWORKS, Ph.D. thesis, Federal Univ. of Rio de Janeiro, January 2016.

Z. Liu, H. Jin, Y.C. Hu, and M. Bailey, ``MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet'', in Conf. on Computer and Communications Security (SIGSAC), January 2016, pp. 1268--1279.

P. Kriegel, DETERMINING THE LOCATION OF AUTONOMOUS SYSTEM RELATIONS AMONG TOP TIER INTERNET SERVICE PROVIDERS IN THE UNITED STATES, Ph.D. thesis, Univ. of Oregon, January 2016.

V. Kotronis, R. Kloti, M. Rost, P. Georgopoulos, B. Ager, S. Schmid, and X. Dimitropoulos, ``Stitching Inter-Domain Paths over IXPs'', in Symp. on SDN Research, January 2016, pp. 1--12.

N.P. Hoang, Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network, Ph.D. thesis, Graduate School of Informatics, Kyoto University, January 2016.

B. Greunke, Distributed Emulation in Support of Large Networks, Ph.D. thesis, Naval Postgraduate School, January 2016.

D. Gosain, A. Agarwal, H.B. Acharya, and S. Chakravarty, ``Qi points : placing decoy routers in the internet'', Tech. rep., Indraprastha Institute of Information Technology Delhi (IIITD), January 2016.

K. Giotis, Virtual Network Services for the Monitoring and Security of Software-Defined Networks, Ph.D. thesis, National Technical Univ. of Athens, January 2016.

A. Garcia-Robledo, A. Diaz-Perez, and G. Morales-Luna, ``Characterization and Coarsening of Autonomous System Networks: Measuring and Simplifying the Internet'', in Advanced Methods for Complex Network Analysis, N. Meghanathan, Ed., January 2016, pp. 148--179.

Z. Feng, M. Xu, and Y. Yang, ``Revolutionizing the inter-domain business model by information-centric thinking'', in IEEE Intl Conf. on Communications (ICC), January 2016, pp. 1--6.

W. Eberle and L. Holder, ``Identifying Anomalies in Graph Streams Using Change Detection'', in Intl Workshop on Mining and Learning with Graphs, January 2016.

A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira, ``Jumpstarting BGP Security with Path-End Validation'', in ACM SIGCOMM Conf., January 2016, pp. 342--355.

M. Chen, M. Xu, Q. Li, and Y. Yang, ``Measurement of large-scale BGP events: Definition, detection, and analysis'', Computer Networks, vol. 110, pp. 31--45, January 2016.

C. Chen and A. Perrig, ``PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer'', Privacy Enhancing Technologies, vol. 2017, pp. 100--117, January 2016.

B. Chandrasekaran, Head into the Cloud: An Analysis of the Emerging Cloud Infrastructure, Ph.D. thesis, Duke University, January 2016.

A. Barton and M. Wright, ``DeNASA: Destination-Naive AS-Awareness in Anonymous Communications'', Proceedings on Privacy Enhancing Technologies, pp. 356--372, January 2016.

S. Wassermann, P. Casas, and B. Donnet, ``Towards DisNETPerf: a distributed Internet paths performance analyzer'', in ACM CoNEXT Student Workshop, December 2015, p. (3 pages).

Y. Miyao, ``Network operation system, network operation method and network operation program'', Tech. rep., Nec Corp., December 2015.

M. Thai, ``Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving Networks'', Tech. rep., Florida Univ., November 2015.

A. Sosnovich, O. Grumberg, and G. Nakibly, ``Analyzing Internet routing security using model checking'', Lecture Notes in Computer Science, vol. 9450, pp. 112--129, November 2015.

Y. Miyao, ``Network designing system, network designing method, data transfer path determination method and network designing program '', Tech. rep., Nec Corp., November 2015.

S. Meiling, T.C. Schmidt, and T. Steinbach, ``On performance and robustness of Internet-based smart grid communication: A case study for Germany'', in Intl Conf. on Smart Grid Communications (SmartGridComm), November 2015, pp. 295--300.

M. Konte, ``Understanding and defending against internet infrastructures supporting cybecrime operations'' November 2015.

A. Johnson, R. Jansen, A.D. Jaggard, J. Feigenbaum, and P. Syverson, ``Avoiding the Man on the Wire: Improving Tor's security with trust-aware path selection'', Tech. rep., arxiv.org, November 2015.

T. Hirayama, K. Toyoda, and I. Sasase, ``Fast target link flooding attack detection scheme by analyzing traceroute packets flow'', in Intl Workshop on Information Forensics and Security (WIFS), November 2015, p. (6 pages).

A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira, ``One hop for RPKI, one giant leap for BGP security'', in Workshop on Hot Topics in Networks, November 2015, p. (7 pages).

Z. Chen, J. Bi, Y. Fu, Y. Wang, and A. Xu, ``MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDN'', in Intl Conf. on Network Protocols (ICNP), November 2015, pp. 438--445.

D. Szabo, A. Korosi, J. Biro, and A. Gulyas, ``Deductive way of reasoning about the Internet AS level topology'', Chin. Phys. B, vol. 24, no. 11, October 2015.

M.A.S. Meslmawy, Efficient resources management in a ditributed computer system, modeled as a dynamic complex system, Ph.D. thesis, Univ. du Havre, October 2015.

S. Li, H. Duan, Z. Wang, and X. Li, ``Route leaks identification by detecting routing loops'', in Intl Conf. on Security and Privacy in Communication Systems (SecureComm), October 2015, vol. 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 313--329.

A. Lareida, G. Petropoulos, V. Burger, M. Seufert, S. Soursos, and B. Stiller, ``Augmenting home routers for socially-aware traffic management'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 347--355.

M. Konte, R. Perdisci, and N. Feamster, ``ASwatch: An AS reputation system to expose bulletproof hosting ASes'', ACM SIGCOMM Computer Communication Review, vol. 45, no. 4, pp. 625--638, October 2015.

Z. Feng, M. Xu, Y. Yang, Q. Li, Y. Wang, Q. Li, B. Ohlman, and M. Chen, ``Joint optimization of content replication and Traffic Engineering in ICN'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 55--63.

Y.-C. Chiu, B. Schlinker, A.B. Radhakrishnan, E. Katz-Bassett, and R. Govindan, ``Are we one hop away from a better Internet?'', in Internet Measurement Conf. (IMC), October 2015, pp. 523--529.

C. Chen, D.E. Asoni, D. Barrera, G. Danezis, and A. Perrig, ``HORNET: High-speed onion routing at the network layer'', in Conf. on Computer and Communications Security (CCS), October 2015, pp. 1441--1454.

C. Basescu, R.M. Reischuk, P. Szalachowski, A. Perrig, Y. Zhang, H.-C. Hsiao, A. Kubota, and J. Urakawa, ``SIBRA: Scalable Internet Bandwidth Reservation Architecture'', Tech. rep., arxiv.org, October 2015.

R. Anwar, H. Niaz, D. Choffnes, I. Cunha, P. Gill, and E. Katz-Bassett, ``Investigating interdomain routing policies in the wild'', in Internet Measurement Conf. (IMC), October 2015, pp. 71--77.

N. Ahmed and K. Sarac, ``An experimental study on inter-domain routing dynamics using IP-level path traces'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 510--517.

B. Liu and J. Bi, ``DISCS: A DIStributed Collaboration System for Inter-AS Spoofing Defense'', in Intl Conf. on Parallel Processing (ICPP), September 2015, pp. 160--169.

H. Yang and S.S. Lam, ``Scalable verification of networks with packet transformers using atomic predicates'', Tech. rep., Univ. Texas, Austin, August 2015.

Z. Sha, ``Decision-centric foundations for complex systems engineering and design'' August 2015.

T. Lee, P. Szalachowski, D. Barrera, A. Perrig, H. Lee, and D. Watrin, ``Bootstrapping real-world deployment of future Internet architectures'', Tech. rep., arxiv.org, August 2015.

B. Kurar and R. Tahboub, ``Internet scale DoS attacks'', Intl J. of Applied Mathematics, Electronics and Computers, vol. 3, no. 2, pp. 83--89, August 2015.

E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, ``Eclipse attacks on bitcoin's peer-to-peer network'', in Usenix Security Symp., August 2015.

N. Cohen, D. Coudert, and A. Lancin, ``On Computing the Gromov Hyperbolicity'', J. of Experimental Algorithmics, vol. 20, pp. 1--18, August 2015.

M. Abu-Ata and F.F. Dragan, ``Metric tree-like structures in real-world networks: an empirical study'', Networks, vol. 67, no. 1, pp. 49--68, August 2015.

X. Yin, D. Wu, Z. Wang, X. Shi, and J. Wu, ``DIMR: Disjoint Interdomain Multipath Routing'', Computer Networks, vol. 91, pp. 356--375, July 2015.

J.S. Varghese and L. Ruan, ``A machine learning approach to edge type prediction in Internet AS graphs'', Tech. rep., Iowa State Univ., July 2015.

N.P. Hoang, Y. Asano, and M. Yoshikawa, ``Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable Tor'', in Intl Conf. on Advanced Communication Technology (ICACT), July 2015, pp. 147--154.

C. Gavoille, C. Glacet, N. Hanusse, and D. Ilcinkas, ``Brief announcement: Routing the Internet with very few entries'', in Symp. on Principles of Distributed Computing (PODC), July 2015, pp. 33--35.

E.C. Rye, ``Evaluating the limits of network topology inference via virtualized network emulation'', M.S. thesis, Naval Postgraduate School, June 2015.

S. Matsumoto, R.M. Reischuk, P. Szalachowski, T.H.-J. Kim, and A. Perrig, ``Designing a global authentication infrastructure'', Tech. rep., arxiv.org, June 2015.

N. Kamiyama, ``Analyzing Impact of Introducing CCN on Profit of ISPs'', IEEE Trans. on Network and Service Management, vol. 12, pp. 176--187, June 2015.

T.N. Dinh and M.T. Thai, ``Network under joint node and link attacks: Vulnerability assessment methods and analysis'', IEEE/ACM Trans. on Networking (TON), vol. 23, pp. 1001--1011, June 2015.

C. Chen, S. Matsumoto, and A. Perrig, ``ECO-DNS: Expected consistency optimization for DNS'', in Intl. Conf. on Distributed Computing Systems (ICDCS), June 2015, pp. 256--267.

N. Tao, X. Chen, and X. Fu, ``AS path inference: From complex network perspective'', in Networking Conf. (IFIP), May 2015, p. (9 pages).

J.Y. Lee and J.C. Oh, ``A node-centric reputation computation algorithm on online social networks'', in Applications of Social Media and Social Network Analysis, May 2015, Lecture Notes in Social Networks, pp. 1--22.

O. Fonseca, E. Fazzion, I. Cunha, P. Las-Casas, D. Guedes, W. Meira, C. Hoepers, K. Steding-Jessen, and M.H.P.C. Chaves, ``A spam traffic cost analysis for network operators'', in Symp. on Computer Networks and Distributed Systems (SBRC), May 2015, pp. 41--49.

A. D'Ignazio and E. Giovannetti, ``Predicting internet commercial connectivity wars: The impact of trust and operators' asymmetry'', Intl J. of Forecasting, vol. 31, pp. 1127--1137, May 2015.

A.D. Jaggard, A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, ``20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables'', Privacy Enhancing Technologies, vol. 2015, pp. 4--24, April 2015.

R. Fanou, P. Francois, and E. Aben, ``On the diversity of interdomain routing in Africa'', Lecture Notes in Computer Science (LNCS), vol. 8895, pp. 41--54, March 2015.

O. Erunika, K. Kaneko, and F. Taraoka, ``Performance evaluation of host-based mobility management schemes in the Internet'', in Intl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU), March 2015, pp. 173--178.

H. Wang, W. Cui, Y. Xiao, and H. Tong, ``Robust network construction against intentional attacks'', in Intl Conf. on Big Data and Smart Computing (BIGCOMP), February 2015, pp. 279--286.

M.O. Ascigil, ``Design of a Scalable Path Service for the Internet'' February 2015.

M. Wang, H. Zhou, and J. Chen, ``OpenISMA: An Approach of Achieving a Scalable OpenFlow Network by Identifiers Separating and Mapping'', in Intl Symp. on Parallel Architectures, Algorithms and Programming (PAAP), January 2015, pp. 26--33.

A. Shah and C. Papadopoulos, ``Characterizing International BGP Detours'', Tech. rep., Colorado State University Technical Report, January 2015.

Y. Nakata, S. Arakawa, and M. Murata, ``A provider and peer selection policy for the future sustainable internet'', Intl J. of Management and Network Economics, vol. 3, no. 3, pp. 238--256, January 2015.

E. Masatoshi, H. Hayama, O. Tsuyoshi, and Y. Yamaguchi, A Proposal of Estimation Method of Consumed Memory Amount by Regression Analysis for Constructing AS Emulation Environment by Virtual Computer, Ph.D. thesis, Nara Institute of Science and Technology, January 2015.

J. Leskovec, K.J. Lang, A. Dasgupta, and M.W. Mahoney, ``Large-scale community structure in social and information networks'', Tech. rep., Carnegie Mellon, Univ., January 2015.

R. Kloti, V. Kotronis, B. Ager, and X. Dimitropoulos, ``Policy-compliant path diversity and bisection bandwidth'', in IEEE Conf. on Computer Communications (INFOCOM), January 2015, pp. 1--9.

Q. Jacquement, Towards uncovering BGP hijacking attacks, Ph.D. thesis, ParisTech, January 2015.

X.Y. Hu and J. Gong, ``Multipath inter-domain routing for named data networking'', J. on Communications, vol. 36, no. 20, pp. (13 pages), January 2015.

C. Gavoille, C. Glacet, N. Hanusse, and D. Ilcinkas, ``Router in Internet with fifteen entries'', in 17th Francophone Meeting on Algorithmic Aspects of Telecommunications, January 2015, pp. 1--5.

B. Eikema, BGP Routing Security and Deployment Strategies, Ph.D. thesis, Univ. of Amsterdam, January 2015.

W. Eberle and L. Holder, ``Scalable anomaly detection in graphs'', Intelligent Data Analysis, vol. 19, pp. 57--74, January 2015.

B. Chandrasekaran, M. Bai, M. Schoenfield, A. Berger, N. Caruso, G. Economou, S. Gilliss, B. Maggs, K. Moses, D. Duff, K.C. Ng, E.G. Sirer, R. Weber, and B. Wong, ``Alidade: IP Geolocation without Active Probing'', Tech. rep., Duke University, January 2015.

J.C. Acedo, ``Evolution of the Internet topology from a regional perspective'', M.S. thesis, Univ. of Arizona, January 2015.

M. Palacin, A. Bikfalvi, and M. Oliver, ``Mercury: Revealing hidden interconnections between access ISPs and content providers'', in EUNICE, December 2014, vol. 8846 of Lecture Notes in Computer Science (LNCS), pp. 147--159.

T. Johnson and L. Lazos, ``Network anomaly detection using autonomous system flow aggregates'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2014, p. (8 pages).

D. Hric, R.K. Darst, and S. Fortunato, ``Community detection in networks: Structural communities versus ground truth'', Phys. Rev. E, vol. 90, December 2014.

N. Ahmed and Sarac Kamil, ``Measuring path divergence in the Internet'', in Intl Conf. on Performance Computing and Communications (IPCCC), December 2014, pp. 1--8.

A.H. Lodhi, The economics of internet peering interconnections, Ph.D. thesis, Georgia Inst. of Technology, November 2014.

N. Kamiyama, ``CCN economics: Can ISPs profit by introducing CCN?'', in Intl Conf. on Network and Service Management (CNSM) and Workshop, November 2014, pp. 242--247.

H. Yang and S.S. Lam, ``Collaborative verification of forward and reverse reachability in the Internet data plane'', in IEEE Intl Conf. on Network Protocol (ICNP), October 2014, p. (12 pages).

A.C.M. Sousa, ``Scaling the Internet routing system through route aggregation'', M.S. thesis, Tecnico Lisboa, October 2014.

Z. Sha and J. Panchal, ``Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice mode'', in Intl Conf. on Systems, Man, and Cybernetics (SMC), October 2014, p. (7 pages).

G. Retvari, D. Szabo, A. Gulyas, A. Korosi, and J. Tapolcai, ``An information-theoretic approach to routing scalability'', in Workshop on Hot Topics in Networks (HotNets), October 2014, p. (7 pages).

A. Gamperli, V. Kotronis, and X. Dimitropoulos, ``Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework'', SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 369--370, October 2014.

W. Eberle and L. Holder, ``A partitioning approach to scaling anomaly detection in graph streams'', in Intl. Conf. on Big Data, October 2014.

M. Antikainen, T. Aura, and M. Sarela, ``Denial-of-service attacks in bloom-filter-based forwarding'', IEEE/ACM Trans. on Networking (TON), vol. 22, pp. 1463--1476, October 2014.

J.M. Wang, X. Dai, and B. Bensaou, ``Content peering in content centric networks'', in IEEE Conf. on Local Computer Networks, September 2014, pp. 10--18.

X. Wu and J. Griffioen, ``Supporting application-based route selection'', in Intl Conf. on Computer Communication and Networks (ICCCN), August 2014, p. (8 pages).

Y. Nozaki, ``Tiered Based Addressing in Internetwork Routing Protocols for the Future Internet'' August 2014.

B. Maggs, ``Mapping the whole Internet'', Tech. rep., Duke Univ., August 2014.

Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet'', New Generation Computing, vol. 32, pp. 237--255, August 2014.

J. Sankey and M. Wright, ``Dovetail: stronger anonymity in next-generation Internet routing'', in Intl Symp. on Privacy Enhancing Technologies (PETS), July 2014, vol. 8555 of Lecture Notes in Computer Science (LNCS), pp. 283--303.

A.D. Jaggard, A. Johnson, P. Syverson, and J. Feigenbaum, ``Representing network trust and using it to improve anonymous communication'', Tech. rep., arxiv.org, June 2014.

H.-C. Hsiao, Toward a highly available future Internet, Ph.D. thesis, Carnegie Mellon Univ., June 2014.

S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, ``How secure are secure interdomain routing protocols?'', Computer Networks, vol. 70, pp. 260--287, June 2014.

P. Bangera and G. Gorinsky, ``Economics of traffic attraction by transit providers'', in IFIP Networking Conf., June 2014, p. (9 pages).

O. Ascigil, K.L. Calvert, and J.N. Griffioen, ``On the scalability of interdomain path computations'', in Networking Conf. (IFIP), June 2014, pp. 1--9.

P. Amaral, L. Bernardo, and P.F. Pinto, ``Multipath policy routing for the inter-domain scenario'', in Intl Conf. on Communications (ICC), June 2014, pp. 1550--3607.

M. Zhu, J. Li, Y. Liu, D. Li, and J. Wu, ``TED: Inter-domain traffic engineering via deflection'', in Intl Symp. of Quality of Service (IWQoS), May 2014, pp. 117--122.

M. Zhu, Y. Liu, J. Li, and J. Wu, ``CCOF: Congestion control on the fly for inter-domain routing'', in Intl Workshop on Local and Metropolitan Area Networks (LANMAN), May 2014, pp. 1--2.

S. Qazi and T. Moors, ``Disjoint-path selection in Internet: What traceroutes tell us?'', Tech. rep., arxiv.org, May 2014.

M. Li, H. Wang, J. Yang, and C. Li, ``A value based framework for provider selection of regional ISPs'', in Symp. on Network Operations and Management (NOMS), May 2014, pp. 1--8.

M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet - causes, exploits, and countermeasures'', Tech. rep., Carnegie Mellon Univ., May 2014.

A. Borici and A. Thomo, ``Semantic graph compression with hypergraphs'', in Intl Conf. on Advanced Information Networking and Applications, May 2014, pp. 1097--1104.

K. Visala, A. Keating, and R.H. Khan, ``Models and tools for the high-level simulation of a name-based interdomain routing architecture'', in Computer Communications Workshops (INFOCOM WKSHPS), April 2014, pp. 55--60.

Z. Sha and J.H. Panchal, ``Estimating local decision-making behavior in complex evolutionary systems'', J. of Mechanical Design, vol. 136, no. 8, pp. (11 pages), April 2014.

S. Sahhaf, W. Tavernier, D. Colle, M. Pickavet, and P. Demeester, ``Availability analysis of resilient geometric routing on Internet topology'', in Intl Conf. on Design of Reliable Communication Networks (DRCN), April 2014, p. (8 pages).

S. Hasan, S. Gorinsky, C. Dovrolis, and R.K. Sitaraman, ``Trade-offs in optimizing the cache deployments of CDNs'', in IEEE Conf. on Computer Communications (INFOCOM), April 2014, p. (9 pages).

K. Chen, D.R. Fhoffnes, R. Potharaju, Y. Chen, F.E. Bustamante, D. Pei, and Y. Zhao, ``Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users'', IEEE Trans. on Computers, vol. 63, no. 4, pp. 1021--1036, April 2014.

R. Mazloum, M.-O. Buob, J. Auge, B. Baynat, D. Ross, and T. Friedman, ``Violation of interdomain routing assumptions'', in Passive and Active Measurement (PAM), March 2014, p. (10 pages).

A. Laszka, B. Johnson, J. Grossklags, and M. Felegyhazi, ``Estimating systematic risk in real-world networks'', in Conf. on Financial Cryptography and Data Security, March 2014, p. (18 pages).

J. Shi and B. Zhang, ``Making inter-domain routing power-aware?'', in Intl conf. on Computing, Networking and Communications (ICNC), February 2014, pp. 932--938.

A. Houmansadr, E.L. Wong, and V. Shmatikov, ``No direction home: The true cost of routing around decoys'', in Network and Distributed System Security Symp. (NDSS), February 2014, p. (14 pages).

F Tan, J. Wu, Y. Xia, and C.K. Tse, ``Traffic congestion in interconnected complex networks'', Tech. rep., arxiv.org, January 2014.

M.S. Kang and V.D. Gligor, ``Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures'', in Conf. on Computer and Communications Security, January 2014, pp. 321--333.

R. Hiran, N. Carlsson, and N. Shahmehri, ``PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based security'', in ACM Workshop on Information Sharing and Collaborative Security, January 2014, pp. 3--12.

M. Geva, A. Herzberg, and Y. Gev, ``Bandwidth Distributed Denial of Service: Attacks and defenses'', IEEE Security and Privacy, vol. 12, no. 1, pp. 54--61, January 2014.

J. Gersch, D. Massey, and C. Papadopoulos, ``Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin Hijacks'', in Intl Conf. on Distributed Computing Systems (ICDCS), January 2014, pp. 670--679.

S.B. Lee, M.S. Kang, and V.D. Gligor, ``CoDef: Collaborative defense against large-scale link-flooding attacks'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2013, pp. 417--428.

B Eriksson, R. Durairajan, and P. Barford, ``RiskRoute: A framework for mitigating network outage threats'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2013, pp. 405--416.

W. Eberle and L. Holder, ``Incremental anomaly detection in graphs'', in Intl Conf. on Data Mining Workshops, December 2013, pp. 521--528.

A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson, ``Users get routed: Traffic correlation on Tor by realistic adversaries'', in ACM SIGSAC Conf. on Computer and Communications Security (CCS), November 2013, pp. 337--348.

J. Gersch and D. Massey, ``Characterizing vulnerability to IP hijack attempts'', in IEEE Intl Conf. on Technologies for Homeland Security (HST), November 2013, pp. 328--333.

M. Zhao, P. Aditya, A. Chen, Y. Lin, A. Haeberlen, P. Druschel, B. Maggs, B. Wishon, and M. Ponec, ``Peer-assisted content distribution in Akamai NetSession'', in Internet Measurement Conf. (IMC), October 2013, pp. 31--42.

S. Papadopoulos, G. Theodoridis, and D. Tzovaras, ``BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies'', in Visualization for Cyber Security (VizSec), October 2013, pp. 57--64.

E. Karaarslan, A.G. Perez, and C. Siaterlis, ``Recreating a large-scale BGP incident in a realistic environment'', in Information Sciences and Systems 2013, Proc Intl Symp. on Computer and Information Sciences, October 2013, vol. 264 of Lecture Notes in Electrical Engineering, pp. 349--357.

P. Bangera and S. Gorinsky, ``An economic perspective on traffic attraction by Internet transit providers'', in IEEE Intl Conf. on Network Protocols (ICNP), October 2013, p. (2 pages).

K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack'', Tech. rep., Hong Kong Univ. of Science and Technology, September 2013.

E.A. Meirom, S. Mannor, and A. Orda, ``Network formation games and the Internet structure'', Tech. rep., arxiv.org, August 2013.

W. Lian, E. Rescorla, H. Shacham, and S. Savage, ``Measuring the practical impact of DNSSEC deploymen'', in Usenix Security Conf. (SEC), August 2013, pp. 573--588.

J.Y. Lee and J.C. Oh, ``A model for recursive propagations of reputations in social networks'', in IEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining (ASONAM), August 2013, pp. 666--670.

Y. Wang, Z. Wang, and L. Zhang, ``An epidemic-dynamics-based model for CXPST spreading in inter-domain routing system'', in Intl Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA), July 2013, vol. 212 of Advances in Intelligent Systems and Computing, pp. 485--493.

A. Nappa, M.Z. Rafique, and J. Caballero1, ``Driving in the cloud: An analysis of drive-by download operations and abuse reporting'', in Intl Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), July 2013, vol. 7967 of Lecture Notes in Computer Science, pp. 1--20.

Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing survivability of inter-domain routing system under cascading failures'', in Frontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC), July 2013, vol. 401 of Communications in Computer and Information Science, pp. 97--108.

B. Kaur, K.S. Kahlon, and S. Sharma, ``Inter-domain routing with shielded infrastructure and buzzer technique'', Intl J. of Computer Applications, vol. 74, no. 15, pp. 29--32, July 2013.

V. Pacifici and G. Dan, ``Stable content-peering of autonomous systems in a content-centric network'', in Swedish National Computer Networking Workshop (SNCNW), June 2013, p. (4 pages).

X. Misseri, I. Gojmerac, and J.-L. Rougier, ``IDRD: Enabling inter-domain route diversity'', in IEEE Intl Conf. on Communications (ICC), June 2013, pp. 3536--3541.

F. Lehrieder, Performance evaluation and optimization of content distribution using overlay networks, Ph.D. thesis, Julius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE, June 2013.

J.M Sankey, ``Dovetail: stronger anonymity in next-generation Internet routing'', M.S. thesis, Univ. Texas, Arlington, TX, US, May 2013.

J. Jiang, J. Luo, W. Li, and Y. Lu, ``Constraint conditions to eliminate AS incentive of lying in interdomain routing'', in Symp. on Integrated Network Management (IM), May 2013, pp. 650--656.

H.-C. Hsiao, T.H. Kim, S. Yoo, X. Zhang, S.B. Lee, V. Gligor, and A. Perrig, ``STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapment'', in ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS), May 2013, pp. 415--426.

V. Pacifici and G. Dan, ``Content-peering dynamics of autonomous caches in a content-centric network'', in IEEE INFOCOM, April 2013, pp. 1079--1087.

L. Neudorfer, Y. Shavitt, and N. Zilberman, ``Improving AS relationship inference using PoPs'', in IEEE INFOCOM, April 2013, pp. 3483--3488.

D. Miyamoto, T. Miyachi, Y. Taenaka, and H. Hazeyama, ``PhishCage: reproduction of fraudulent websites in the emulated Internet'', in Intl ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 242--247.

D. Miyamoto and T. Miyachi, ``COSMO - Emulation of Internet traffic (poster abstract)'', in Intl ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 274--276.

T. Miyachi and S. Miwa, ``Design and implementation of XBurner'', in Intl ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 227--234.

P. Marchetta, W. de Donato, and A. Pescape, ``Detecting third-party addresses in traceroute traces with IP timestamp option'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science (LNCS), pp. 21--30.

J.M. Camacho, A. Garcia-Martinez, M. Bagnulo, and F. Valera, ``BGP-XM: BGP eXtended multipath for transit Autonomous Systems'', Computer Networks, vol. 57, pp. 954--975, March 2013.

C. Wacek, H. Tan, K. Bauer, and M. Sherr, ``An empirical evaluation of relay selection in Tor'', in Network and Distributed System Security Symp. (NDSS), February 2013, p. (17 pages).

K. Matsuda, G. Hasegawa, S. Kamei, and M. Murata, ``A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurement'', IEICE Trans. on Information and Systems, vol. E96-D, no. 2, pp. 289--302, February 2013.

Y. Liu, W. Peng, and J. Su, ``A study of IP prefix hijacking in cloud computing networks'', Security Comm. Networks, vol. XX, no. X, pp. X, February 2013.

D. Qin, J. Yang, and H. Wang, ``Experimental study on diversity and novelty of interdomain paths'', Chinese J. of Electronics, vol. 22, no. 1, pp. 160--166, January 2013.

M. Palacin, M. Oliver, J. Infante, S. Oechsner, and A. Bikfalvi, ``The impact of content delivery networks on the Internet ecosystem'', J. of Information Policy, vol. 3, pp. 304--330, January 2013.

K.V. Moses, ``Improving IP-based geo-location through Internet topology and geospatial datasets'', M.S. thesis, Duke Univ., Durham, NC, US, January 2013.

A. Mislove, H.S. Koppula, K.P. Gummadi, P. Druschel, and B. Bhattacharjee, ``An empirical validation of growth models for complex networks'', in Dynamics On and Of Complex Networks, January 2013, vol. 2, pp. 19--40.

P. Erola, S. Gomez, and A. Arenas, ``On the routability of the Internet'', in Dynamics On and Of Complex Networks, January 2013, vol. 2, pp. 41--54.

W.H. Chong, W.S.B. Toh, and L.N. Teow, ``Efficient extraction of high-Betweenness vertices from heterogeneous networks'', in The Influence of Technology on Social Network Analysis and Mining, Ch. 11, January 2013, vol. 6 of Lecture Notes in Social Networks, pp. 255--273.

X. Vasilakos, K. Katsaros, and G. Xylomenos, ``Cloud computing for global name-resolution in information-centric networks'', in IEEE Symp. on Network Cloud Computing and Applications (NCCA), December 2012, p. (7 pages).

J. Sherry, ``Future architectures for middlebox processing services on the Internet and in the Cloud'', M.S. thesis, UC Berkeley, December 2012.

S. Meyer, M. Wahlisch, and T.C. Schmidt, ``Exploring reachability via settlement-free peering'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2012, p. 49.

H.R. Ekbatani, Investigating the mutual impact of the P2P overlay and the AS-level underlay, Ph.D. thesis, Univ. Oregon, Eugene, OR, US, December 2012.

M. Wachs, C. Grothoff, and R. Thurimella, ``Partitioning the Internet'', in Conf. on Risks and Security of Internet and Systems (CRiSIS), October 2012, p. (8 pages).

M. Schuchard, J. Geddes, C. Thompson, and N. Hopper, ``Routing around decoys'', in ACM Conf. on Computer and Communications Security (CCS), October 2012, pp. 85--96.

T.N. Dinh, Y. Shen, and M.T. Thai, ``An efficient spectral bound for link vulnerability assessment in large-scale networks'', in IEEE Military Communications Conf. (MILCOM), October 2012.

M.Z. Ahmad and R. Guha, ``A tale of nine Internet exchange points: studying path latencies through major regional IXPs'', in IEEE Conf. on Local Computer Networks (LCN), October 2012, p. (8 pages).

M. Li, H. Wang, and J. Yang, ``Flattening and preferential attachment in the Internet evolution'', in Network Operations and Management Symp. (APNOMS), September 2012, p. (8 pages).

J. Juen, ``Protecting anonymity in the presence of autonomous system and internet exchange level adversaries'', M.S. thesis, Univ. Illinois, Urbana-Champaign, September 2012.

N. Cohen, D. Couderty, and A. Lancin, ``Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs'', Tech. rep., Project-Team MASCOTTE, INRIA, September 2012.

V. Burger, F. Lehrieder, T. Hossfeld, and J. Seedorf, ``Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms'', in Teletraffic Congress (ITC), September 2012, pp. 1--8.

J. Rajahalma, Inter-domain incentives and Internet architecture, Ph.D. thesis, Aalto Univ., FI, August 2012.

G.K. Orman, V. Labatut, and H. Cherifi, ``Comparative evaluation of community detection algorithms: a topological approach'', J. Stat. Mechanics: Theory and Experiment, vol. 2012, pp. P08001, August 2012.

M. Gjoka, M. Kurant, and A. Markopoulou, ``2.5K-graphs: from sampling to generation'', Tech. rep., arxiv.org, August 2012.

A. Beben, J.M. Batalla, W.K. Chai, and J. Sliwinski, ``Multi-criteria decision algorithms for efficient content delivery in content networks'', Ann. Telecommunications, p. (13 pages), August 2012.

B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger, ``Anatomy of a large European IXP'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2012, pp. 163--174.

J. Sherry, D. Kim, S. Mahalingam, A. Tang, S. Wang, and S. Ratnasamy, ``Netcalls: End host function calls to network traffic processing services'', Tech. rep., UC Berkeley, July 2012.

K. Fujikawa, H. Tazaki, and H. Harai, ``Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network'', in Symp. on Applications and the Internet (SAINT), July 2012, pp. 68--73.

M.Z. Ahmad and R. Guha, ``Evaluating end-user network benefits of peering with path latencies'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2012, pp. 1--7.

J. Tomasik and M.-A. Weisser, ``The inter-domain hierarchy in measured and randomly generated AS-level topologies'', in IEEE Conf. on Communications (ICC), June 2012, pp. 1448--1453.

J.L. Sobrinho and T. Tiago~Quelhas, ``A theory for the connectivity discovered by routing protocols'', IEEE/ACM Trans. on Networking (TON), vol. 20, no. 3, pp. 677--689, June 2012.

A. Keating, ``Models for the simulation of a name-based interdomain routing architecture'', M.S. thesis, Aalto Univ., FI, June 2012.

H.-C. Hsiao, T. Kim, S. Yoo, X. Zhang, S.B. Lee, V.D. Gligor, and A. Perrig, ``Sanctuary trail: refuge from Internet DDoS entrapment'', Tech. rep., Carnegie Mellon Univ., June 2012.

W. Deng, W. Muhlbauer, Y. Yang, P. Zhu, X. Lu, and B. Plattner, ``Shedding light on the use of AS relationships for path inference'', J. Communications and Networks, vol. 14, no. 3, pp. 336--345, June 2012.

J. Cesareo, J. Karlin, M. Schapira, and J. Rexford, ``Optimizing the placement of implicit proxies'', Tech. rep., Princeton Univ., June 2012.

J. Cesareo, ``Optimizing implicit proxy placement to evade traffic filters'', M.S. thesis, Princeton Univ., June 2012.

M.E. Tozal and K. Sarac, ``Estimating network layer subnet characteristics via statistical sampling'', in Intl IFIP TC 6 Networking Conf., Part I, May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 274--288.

J. Seibert, Security and economic implications of localizing traffic in overlay networks, Ph.D. thesis, Purdue Univ., May 2012.

D. Saucez and B. Donnet, ``On the dynamics of locators in LISP'', in Networking 2012, May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 385--396.

H. Papadakis, P. Fragopoulou, E. Markatos, and M. Roussopoulos, ``ITA: Innocuous topology awareness for unstructured P2P networks'', IEEE Trans. on Parallel and Distributed Systems, vol. PP, no. 99, May 2012.

Y. Nozaki, H. Tuncer, and N. Shenoy, ``ISP tiered model based architecture for routing scalability'', in IEEE Conf. on Communications (ICC), May 2012, pp. 5817--5821.

Y. Liu, J. Su, and R.K.C. Chang, ``LDC: Detecting BGP prefix hijacking by load distribution change'', in Parallel and Distributed Processing Symp. Workshops (IPDPSW), May 2012, pp. 1197--1203.

S. Hasan and S. Gorinsky, ``Obscure giants: detecting the provider-free ASes'', in Networking 2012, May 2012, vol. 7290 of Lecture Notes in Computer Science, pp. 149--160.

A. Chaudhury, P. Basuchowdhuri, and S. Majumder, ``Spread of information in a social network using influential nodes'', in Advances in Knowledge Discovery and Data Mining, May 2012, vol. 7302 of Lecture Notes in Computer Science, pp. 121--132.

W.K. Chai, D. He, I. Psaras, and G. Pavlou, ``Cache 'less for more' in information-centric networks'', in Networking 2012, May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 27--40.

R. Pasquini, F.L. Verdi, and M.F. Magalhaes, ``Towards local routing state in the future internet'', in WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC), April 2012.

H. Liu, X. Hu, D. Zhao, and X. Lu, ``Failure isolation based defense against Internet CXPST-like attack'', J. Hybrid Information Technology, vol. 5, no. 2, pp. 175--180, April 2012.

S.D. Strowes and C. Perkins, ``Harnessing Internet topological stability in Thorup-Zwick compact routing'', in IEEE INFOCOM, March 2012, pp. 2551--2555.

J.L. Sobrinho and F. Le, ``A fresh look at inter-domain route aggregation'', in IEEE INFOCOM, March 2012, pp. 2556--2560.

B. Ribeiro, P. Basu, and D. Towsley, ``Multiple random walks to uncover short paths in power law networks'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), March 2012, pp. 250--255.

D. Qin, J. Yang, Z. Liu, H. Wang, B. Zhang, and W. Zhang, ``AMIR: Another multipath interdomain routing'', in IEEE Conf. on Advanced Information Networking and Applications (AINA), March 2012, pp. 581--588.

A. Lutu, M. Bagnulo, and R. Stanojevic, ``An economic side-effect for prefix deaggregation'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), March 2012, pp. 190--195.

M. Grey, M. Rossberg, and G. Schaefer, ``Automatic creation of VPN backup paths for improved resilience against BGP-attackers'', in ACM Symp. on Applied Computing (SAC), March 2012, pp. 613--620.

D. Qin, J. Yang, H. Wang, B. Zhang, L. Gao, and Z. Liu, ``Multipath interdomain routing via deviation from primary path'', in Conf. on Information Networking (ICOIN), February 2012, pp. 222--227.

B. Edwards, S. Hofmeyr, G. Stelle, and S. Forrest, ``Internet topology over time'', Tech. rep., arxiv.org, February 2012.

W. Wei, X. Yingjie, and D. Yabo, ``ASTVA: DDoS-limiting architecture for Next Generation Internet'', Adv. Materials Research, vol. 542-543, pp. 1275--1281, January 2012.

Y. Chen, E. Le~Merrer, Z. Li, Y. Yaning~Liu, and G. Simon, ``OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV'', Computer Networks, vol. 56, no. 1, pp. 365--377, January 2012.

A.A. Drivere, ``Can we study the topology of the Internet from the vantage points of large and small content providers?'', M.S. thesis, Youngstown State Univ., December 2011.

J. Sommers, B. Erikson, and P. Barford, ``On the prevalence and characteristics of MPLS deployments in the open Internet'', in Internet Measurement Conf. (IMC), November 2011, pp. 445--458.

Y. Liu, W. Peng, and J. Su, ``Study on IP prefix hijacking in cloud computing networks based on attack planning'', in Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), November 2011, pp. 922--926.

M. Chen, L. Yu, and H. Bai, ``Two propositions about geographical distributions of BitTorrent file resources'', in Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE). November 2011, vol. 110 of Advances in Intelligent and Soft Computing, pp. 361--368, Springer.

Y. Takahashi and K. Ishibashi, ``Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic'', in Conf. on Network Games, Control and Optimization (NetGCooP), October 2011, p. (6 pages).

M. Kurant and A. Markopoulou, ``Towards unbiased BFS sampling'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1799--1809, October 2011.

M. Gjoka, M. Kurant, C.T. Butts, and A. Markopoulou, ``Practical recommendations on crawling online social networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1872--1892, October 2011.

B.-F. Zhang, Y. Li, Y.-J. Liu, and J.-S. Su, ``Analysis of prefix hijacking based on AS hierarchical model'', in Conf. on Network and System Security (NSS), September 2011, pp. 322--326.

A. Szekeres, ``Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failures'', M.S. thesis, Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam, August 2011.

J.I. Alvarez-Hamelin, D. Anunziata, M.G. Beiro, A. Barrat, L. Dall'Asta, and A. Vespignani, ``http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool)'', Tech. rep., Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires, July 2011.

E.L. Wong and V. Shmatikov, ``Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing'', in Conf. on Dependable Systems and Networks (DSN), June 2011, pp. 233--244.

S.D. Strowes, G. Mooney, and C. Perkins, ``Compact routing on the Internet AS-graph'', in IEEE Conf. on Computer Communications (INFOCOM), June 2011, pp. 852--857.

Y. Liu, B. Dai, P. Zhu, and J. Su, ``Whom to convince? It really matters in BGP prefix hijacking attack and defense'', in Future Information Technology, June 2011, vol. 184 (1) of Communications in Computer and Information Science, pp. 1--10.

H.T. Karaoglu, M. Yuksel, and M.H. Gunes, ``On the scalability of path exploration using opportunistic path-vector routing'', in IEEE Conf. on Communications (ICC), June 2011, p. (5 pages).

M. Helminger, ``Interactive visualization of global routing dynamics'', Tech. rep., Technische Univ. Muenchen, Faculty of Informatics, June 2011.

P. Amaral, E. Silva, L. Bernardo, and P. Pinto, ``Inter-domain traffic engineering using an AS-level multipath routing architecture'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).

H. Siritana, S. Kitisin, and S. Gertphol, ``A study of autonomous system relationships within Thailand'', in Conf. on Computer Science and Software Engineering (JCSSE), May 2011, pp. 7--11.

O. Akashi, ``Analysis of cooperative management strategies against route-hijacking'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2011, pp. 1164--1171.

J. Scholz and M. Greiner, ``Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics'', EPL (Europhysics Letters), vol. 94, no. 2, pp. 28008, April 2011.

W. Deng, P. Zhu, N. Xiong, Y. Xiao, and H. Xiaofeng, ``How resilient are individual ASes against AS-level link failures?'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 982--987.

W. Deng, M. Karaliopoulos, W. Muehlbauer, P. Zhu, X. Lu, and B. Plattner, ``k-Fault tolerance of the Internet AS graph'', Computer Networks, vol. 55, no. 10, pp. 2492--2503, April 2011.

H. Wu and G. Kvizhinadze, ``Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies'', Statistics and Probability Letters, vol. 81, no. 8, pp. 1128--1135, March 2011.

S. Melnik, A. Hackett, M.A. Porter, P.J. Mucha, and J.P. Gleeson, ``The unreasonable effectiveness of tree-based theory for networks with clustering'', Phys. Rev. E, vol. 83, March 2011.

J. Tomasik and M.-A. Weisser, ``Internet topology on as-level: Model, generation methods and tool'', in IEEE Performance Computing and Communications Conf. (IPCC), January 2011, pp. 263--270.

P. Bangera and S. Gorinsky, ``Impact of prefix hijacking on payments of providers'', in Conf. on Communication Systems and Networks (COMSNETS), January 2011, p. (10 pages).

L. Yujing, Z. Bofeng, W. Fei, and S. Jinshu, ``Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system'', J. of Next Generation Information Technology, vol. 1, no. 3, pp. 96--105, November 2010.

A.H. Rasti, N. Magharei, R. Rejaie, and W. Willinger, ``Eyeball ASes: from geography to connectivity'', in Internet Measurement Conf. (IMC), November 2010, pp. 192--198.

D. Huang, J. Zhao, and X. Wang, ``Trading bandwidth for playback lag: Can active peers help?'', in Multi-media Conf., October 2010, pp. 791--794.

S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, ``How secure are secure interdomain routing protocols?'', ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 87--98, October 2010.

H. Asai and H. Esaki, ``Towards interdomain transit traffic reduction in peer-assisted content delivery networks'', in Symp. on Telecommunications Network Strategy and Planning (NETWORKS), September 2010.

H. Asai and H. Esaki, ``Estimating AS relationships for application-layer traffic optimization'', in Workshop on Incentives, Overlays, and Economic Traffic Control (ETM), September 2010, vol. 6236 of Lecture Notes in Computer Science (LNCS), pp. 51--63.

S. Hanif, ``Impact of topology on BGP convergence'', M.S. thesis, Dept. Computer Science, VU Univ. Amsterdam, August 2010.

T. Guo, N. Wang, R. Tafazolli, and K. Moessner, ``Policy-aware virtual relay placement for inter-domain path diversity'', in IEEE Symp. on Computers and Communications (ISCC), August 2010, pp. 38--43.

W.H. Chong, W.S.B. Toh, and L.N. Teow, ``Efficient extraction of high-betweenness vertices'', in Conf. on Advances in Social Networks Analysis and Mining (ASONAM), August 2010, pp. 286--290.

E. Elena, J. Rougier, and S. Secci, ``Characterisation of AS-level path deviations and multipath in Internet routing'', in EURO-NF Conf. on Next Generation Internet (NGI), July 2010, pp. 1--7.

A. Vilhar, R. Novak, and G. Kandus, ``The impact of network topology on the performance of MAP selection algorithms'', Computer Networks, vol. 54, no. 7, pp. 1197--1209, May 2010.

S. Tarkoma and M. Antikainen, ``Canopy: publish/subscribe with upgraph combination'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, pp. 1--6.

J. Rajahalme, ``Incentive-informed inter-domain multicast'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 6 pp.

C. Hu, K. Chen, Y. Chen, and B. Liu, ``Evaluating potential routing diversity for internet failure recovery'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 5 pp.

B-L Dou, X-G Wang, and S-Y Zhang, ``Robustness of networks against cascading failures'', Physica A: Statistical Mechanics and its Applications, vol. 389, no. 11, pp. 2310--2317, May 2010.

Q. Xuan, F. Du, and T-J Wu, ``Partially ordered sets in complex networks'', J. Phys. A: Math. Theor., vol. 43, pp. 185001 (13 pp), April 2010.

J.-J. Pansiot, P. Merindol, B. Donnet, and O. Bonaventura, ``Extracting intra-domain topology from mrinfo probing'', in Passive and Active Measurement (PAM), A. Krishnamurthy and B. Plattner, Eds. April 2010, vol. 6032 of Lecture Notes in Computer Science (LNCS), pp. 81--90, Springer.

S. DiBenedetto, A. Stone, M. Strout, and D. Massey, ``Simulating internet scale topologies with metarouting'', Tech. rep., Colorado State Univ., March 2010.

K. Chen, C. Hu, W. Zhang, Y. Chen, and B. Liu, ``On the eyeshots of BGP vantage points'', in IEEE Global Telecommunications Conf. (GLOBECOM), March 2010, p. 6 pp.

P. Amaral, F. Ganhao, C. Assuncao, L. Bernardo, and P. Pinto, ``Scalable multi-region routing at inter-domain level'', in IEEE Global Telecommunications Conf. (GLOBECOM), March 2010, p. 8 pp.

L. Yujing, Z. Bofeng, W. Fei, and S. Jinshu, ``A study of hinge-transmit property of BGP routing system'', in Forum on Computer Science-Technology and Applications (IFCSTA), January 2010, vol. 1, pp. 462--465.

S.D. Strowes and C. Perkins, ``Deterministic, reduced-visibility inter-domain forwarding'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2009, pp. 9--10.

J. Rajahalme, M. Sarela, K. Visala, and J. Riihijarvi, ``Inter-domain rendezvous service architecture'', Tech. rep., PSIRP (TR09-003), December 2009.

K. Miller and T. Eliassi-Rad, ``Continuous time group discovery in dynamic graphs'', in Workshop on Analyzing Networks and Learning with Graphs (NIPS), December 2009.

K. Chen, D.R. Choffnes, R. Potharaju, Y. Chen, F.E. Bustamante, D. Pei, and Y. Zhao, ``Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2009.

P. Merindol, V. Van~den Schrieck, B. Donnet, O. Bonaventure, and J.-J. Pansiot, ``Quantifying ASes multiconnectivity using multicast information'', in Internet Measurement Conf. (IMC), November 2009, pp. 370--376.

A. Studer and A. Perrig, ``The coremelt attack'', in Symp. on Research in Computer Security (ESORICS), September 2009, vol. 5789 of Lecture Notes in Computer Science (LNCS), pp. 37--52.

W. Shu and C. Changjia, ``Backup routing for BGP: Virtual ring routing scheme'', in IEEE Conf. on Computer Science and Information Technology (ICCSIT), September 2009, pp. 603--607.

I. Avramopoulos and M. Suchara, ``Protecting DNS from routing attacks: a comparison of two alternative anycast implementations'', IEEE Security and Privacy, vol. 7, no. 5, pp. 14--20, September 2009.

G. Yang and W. Dou, ``An efficient algorithm for AS path inferring'', in Conf. on Hybrid Information Technology, August 2009, vol. 321, pp. 151--154.

S. Miwa, M. Suzuki, H. Hazeyama, S. Uda, T. Miyachi, Y. Kadobayashi, and Y. Shinoda, ``Experiences in emulating 10K AS topology with massive VM multiplexing'', in ACM workshop on Virtualized infrastructure systems and architectures, August 2009, pp. 97--104.

L. Cittadini, M. Rimondini, M. Corea, and G. Di~Battista, ``On the feasibility of static analysis for BGP convergence'', in IFIP/IEEE Symp. on Integrated Network Management (IM), August 2009, pp. 521--528.

H. Asai and H. Esaki, ``AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs'', in Asia Future Internet summer school, Jeju, Korea, August 2009.

P. Amaral, L. Bernardo, and P. Pinto, ``DTIA: An Architecture for Inter-Domain Routing'', in IEEE Conf. on Communications (ICC), August 2009, pp. 1--7.

Q.D. Bui and A. Jennings, ``Relay node selection in large-scale VoIP overlay networks'', in Conf. on Ubiquitous and Future Networks (ICUFN), July 2009, pp. 56--61.

Y. Xu and W. Zhang, ``A power-law approach on router-level internet macroscopic topology modeling'', in Fuzzy Information and Engineering, Volume 2, B. Cao, T.-F. Li, and C.-Y. Zhang, Eds., June 2009, vol. 62 of Advances in Soft Computing (ASC), pp. 1471--1479.

Y. Shavitt, E. Shir, and U. Weinsberg, ``Near-deterministic inference of AS relationships'', in Conf. on Telecommunications (ConTEL), June 2009, pp. 191--198.

H. Asai and H. Esaki, ``A methodology for magnitude-based inter-AS distance estimation'', in WIT2009, Hokkaido, Japan, June 2009.

A. Di~Menna, T. Refice, L. Cittadini, and G. Di~Battista, ``Measuring route diversity in the internet from remote vantage points'', in IEEE Conf. on Networking (ICN), May 2009, pp. 24--29.

A. D'Ignazio and E. Giovannetti, ``Asymmetry and discrimination in Internet peering: evidence from the LINX'', J. Industrial Organization, vol. 27, no. 3, pp. 441--448, May 2009.

U. Weinsberg, Y. Shavitt, and E. Shir, ``Near-deterministic inference of AS relationships'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009, pp. 1--2.

B. Liu, Y. Cui, Y. Lu, and Y. Xue, ``Locality-awareness in BitTorrent-like P2P applications'', IEEE Trans. on Multimedia, vol. 11, no. 3, pp. 361--371, April 2009.

G. Hasegawa, Y. Hiraoka, and M. Murata, ``Evaluation of free-riding traffic problem in overlay routing and its mitigation method'', in Conf. on Networking and Services (ICNS), April 2009, pp. 210--215.

A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel, ``NetReview: detecting when interdomain routing goes wrong'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI). April 2009, pp. 437--452, Usenix Ass. Berkeley, CA, US.

W. Eberle, L. Holder, and D. Cook, ``Identifying threats using graph-based anomaly detection'', in Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4, J.J.P Tsai and P.S. Yu, Eds. April 2009, pp. 73--108, Springer.

G. Zhang, ``Measuring the impacts of sampling bias on internet AS-level topology inference'', in WRI Conf. on Communications and Mobile Computing (CMC), March 2009, pp. 181--188.

C. Lumezanu, R. Baden, N. Spring, and B. Bhattacharjee, ``Triangle inequality and routing policy violations in the internet'', in Passive and Active Measurement (PAM), March 2009, vol. 5448 of Lecture Notes in Computer Science (LNCS), pp. 45--54.

R. Puzis, D. Yagil, Y. Elovici, and D. Braha, ``Collaborative attack on internet users' anonymity'', Internet Research, vol. 19, no. 1, pp. 60--77, January 2009.

L Dai, Y. Cao, Y. Cui, and Y. Xue, ``On scalability of proximity-aware peer-to-peer streaming'', Computer Communications, vol. 32, no. 1, pp. 144--153, January 2009.

U. Kang, C. Tsourakakis, A.P. Appel, C. Faloutsos, and J. Leskovec, ``HADI: Fast diameter estimation and mining in massive graphs with Hadoop'', Tech. rep., Carnegie Mellon Univ., December 2008.

Y. Hei, A. Nakao, T. Hasegawa, T. Ogishi, and S. Yamamoto, ``AS alliance: cooperatively improving resilience of intra-alliance communication'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2008, p. (6 pages).

M.A. Serrano and P. De~Los~Rios, ``Structural efficiency of percolated landscapes in flow networks'', Plos One, vol. 3, no. 11, November 2008.

B.D. MacArthur, R.J. Sanchez-Garcia, and J.W. Anderson, ``Symmetry in complex networks'', Discrete Applied Mathematics, vol. 156, no. 18, pp. 3525--3531, November 2008.

A. Vilhar and R. Novak, ``Policy relationship annotations of predefined AS-level topologies'', Computer Networks, vol. 52, no. 15, pp. 2859--2871, October 2008.

M. Wojciechowski, ``Border Gateway modeling and simulation'', M.S. thesis, Dep. Computer Science, VU Univ. Amsterdam, September 2008.

V. Raghavan, G. Riley, and T. Jaafar, ``Realistic topology modeling for the internet BGP infrastructure'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2008, pp. 1--8.

G.J. Katz and J.T. Kider, ``All-pairs shortest-paths for large graphs on the GPU'', in ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware, June 2008, pp. 47--55.

L. Li and C. Chen, ``Exploring possible strategies for competitions between Autonomous Systems'', in IEEE Conf. on Communications (ICC), May 2008, pp. 5919--5923.

Y. Xiao, B.D. MacArthur, H. Wang, M. Xiong, and W. Wang, ``Network quotients: structural skeletons of complex systems'', Phys. Rev. E, vol. 78, pp. 046102 (7 pages), January 2008.

J.P. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, and A. Venkataramani, ``Consensus routing: the internet as a distributed system'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), January 2008, pp. 351--364.

H. Hazeyama, M. Suzuki, S. Miwa, D. Miyamoto, and Y. Kadobayashi, ``Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures'', in Conf. on Cyber Security Experimentation and Test, January 2008.

S. Qazi and T. Moors, ``Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2007, pp. 2602--2606.

W. Muehlbauer, S. Uhlig, B. Fu, M. Meulle, and O. Maennel, ``In search for an appropriate granularity to model routing policies'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, October 2007, vol. 37 (4), pp. 145--156.

H. Ballani, P. Francis, and X. Zhang, ``A study of prefix hijacking and interception in the internet'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, October 2007, vol. 37 (4).

J. Wu, Y. Zhang, Z.M. Mao, and K.G. Shin, ``Internet routing resilience to failures: analysis and implications'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), January 2007, p. 25.

C. Huang, J. Li, and K.W. Ross, ``Can internet video-on-demand be profitable?'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, January 2007, pp. 133--144.

J.G. Restrepo, E. Ott, and B.R. Hunt, ``Characterizing the dynamical importance of network nodes and links'', Phys. Rev. Lett., vol. 97, pp. 094102 (4 pages), September 2006.

A. D'Ignazio and E. Giovannetti, ``Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach'', J. Competition Law and Economics, vol. 2, no. 1, pp. 43--69, February 2006.

M. Fayed, P. Krapivsky, J.W. Byers, M. Crovella, D. Finkel, and S. Redner, ``On the emergence of highly variable distributions in the autonomous system topology'', ACM SIGCOMM Computer Communication Review, vol. 33, pp. 41--49, January 2003.

Topology with Skitter

V.A. Foroushani, A security framework based on flow marking IP-traceback techniques, Ph.D. thesis, Dalhousie Univ., Halifax, CA, July 2016.

Y. Wang and K. Zhang, ``Quantifying the flattening of Internet topology'', in Intl Conf. on Future Internet Technologies, June 2016, pp. 113--117.

D. Eppstein, M.T. Goodrich, J. Lam, N. Mamano, M. Mitzenmacher, and M. Torres, ``Models and algorithms for graph watermarking'', Tech. rep., arxiv.org, May 2016.

M.M. Fadel, A.I. El-Desoky, A.Y. Haikel, and L.M. Labib, ``A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging'', The Computer J., April 2016.

J. Chen, V.S.A. Kumar, M.V. Marathe, R. Sundaram, M. Thakur, and S. Thulasidasan, ``A study of the structure and vulnerabilities of metropolitan area networks'', in Intl. Conf. on Communication Systems and Networks (COMSNETS), January 2016.

O. Bhardwaj, E. Anschelevich, and K. Kar, ``Coalitionally stable pricing schemes for inter-domain forwarding'', Computer Networks, vol. 97, pp. 128--146, January 2016.

K. Kloster and D.F. Gleich, ``Seeded PageRank solution paths'', Tech. rep., arxiv.org, December 2015.

G. Francois and O. Festor, ``Anomaly traceback using software defined networking'', in Intl. Workshop on Information Forensics and Security (WIFS), December 2015, pp. 203--208.

C.L. Staudt, A. Sazonovs, and H. Meyerhenke, ``NetworKit: A tool suite for large-scale complex network analysis'', Tech. rep., arxiv.org, November 2015.

S. Saha, Efficient methods on reducing data redundancy in the Internet, Ph.D. thesis, Aalto Univ., FI, October 2015.

T.T. Huang and B.Q. Sun, ``The impact of the Internet on global industry: New evidence of Internet measurement'', Research in Intl Business and Finance, vol. 37, pp. 93--112, September 2015.

Z. Sha, ``Decision-centric foundations for complex systems engineering and design'' August 2015.

M. Abu-Ata and F.F. Dragan, ``Metric tree-like structures in real-world networks: an empirical study'', Networks, vol. 67, no. 1, pp. 49--68, August 2015.

D. Li and W. Sha, ``Dynamic ring for seamless mobility in identity centric networks'', in Computers and Communication (ISCC), July 2015, pp. 930--935.

X. Liu, Y. Sun, L. Fang, J. Liu, and L. Yu, ``A Survey of Network Traffic Visualization in Detecting Network Security Threats'', Communications in Computer and Information Science, vol. 520, pp. 91--98, June 2015.

R. Motamedi, R. Rejaie, and W. Willinger, ``A Survey of Techniques for Internet Topology Discovery'', IEEE Communications Surveys and Tutorials, vol. 17, pp. 1044--1065, May 2015.

M. Vijayalakshmi, N. Nithya, and S.M. Shalinie, ``A novel algorithm on IP traceback to find the real source of spoofed IP packets'', Adv. in Intelligent Systems and Computing, vol. 325, pp. 79--87, November 2014.

M.H. Yang, ``Storage-efficient 16-bit hybrid IP traceback with single packet'', The Scientific World J., vol. 2014, October 2014.

M.H. Yang, M.C. Yang, J.-N. Luo, and W.C. Hsu, ``High accuracy and low storage hybrid IP traceback'', in Intl Conf. on Computer, Information and Telecommunication Systems (CITS), July 2014, pp. 1--5.

A.G. Medrano-Chavez, E. Perez-Cortes, and M. Lopez-Guerrero, ``A performance comparison of Chord and Kademlia DHTs in high churn scenarios'', Peer-to-Peer Networking and Applications, vol. 8, pp. 807--821, June 2014.

H.-C. Hsiao, Toward a highly available future Internet, Ph.D. thesis, Carnegie Mellon Univ., June 2014.

J. Zhang, Statistical inference on network data, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, May 2014.

M. Li, H. Wang, J. Yang, and C. Li, ``A value based framework for provider selection of regional ISPs'', in Symp. on Network Operations and Management (NOMS), May 2014, pp. 1--8.

D. Arora, A. Verigin, T. Godkin, and S.W. Neville, ``Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnets'', in Intl Conf. on Advanced Information Networking and Applications (AINA)), May 2014, p. (8 pages).

M.S. Fallah and N. Kahani, ``TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks'', Security and Communication Networks, vol. 7, no. 2, pp. 245--264, February 2014.

D. Dundjerski and M. Tomasevic, ``Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols'', Concurrency Computation: Practice and Experience, vol. XX, no. X, pp. X, February 2014.

R. Motamedi, B. Chandrasekaran, B. Maggs, R. Rejaie, and W. Willinger, ``https://onrg.cs.uoregon.edu/pub/CIS-TR-2014-02.pdf'', Tech. rep., Univ. of Oregon, January 2014.

P. Mohanraj and A. Mummoorthy, ``Detecting Denail of Services attacks in wireless network under the Distributed Jammer Network'', Intl J. of Computer Applications, January 2014.

A. Freno, M. Keller, and M. Tommasi, ``Probability estimation over large-scale random networks via the Fiedler delta statistic'', J. of Machine Learning Research, vol. XX, no. X, pp. X, December 2013.

D. Seo, H. Lee, and A. Perrig, ``APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks'', Computers and Security, vol. 39, no. Part B, pp. 366--385, November 2013.

V.M. Preciado and A. Jadbabaie, ``Moment-based spectral analysis of large-scale networks using local structural information'', IEEE/ACM Trans. on Networking (TON), vol. 21, no. 2, pp. 373--382, April 2013.

T. Godkin, ``Statistical assessment of peer-to-peer botnet features'', M.S. thesis, Univ. of Victoria, Victoria, CA, April 2013.

A.W. Fu, H. Wu, J. Cheng, and R.C. Wong, ``IS-Label: an independent-set based labeling scheme for point-to-point distance querying'', VLDB Endowment, vol. 6, no. 6, pp. 457--468, April 2013.

I. Nikolaevskiy, A. Lukyanenko, T. Polishchuk, V. Polishchuk, and A. Gurtov, ``isBF: scalable in-packet Bloom filter based multicast'', in ACM Symp. on Applied Computing (SAC), March 2013, pp. 646--648.

Y. Chen, V. Kawadia, and R. Urgaonkar, ``Detecting overlapping temporal community structure in time-evolving networks'', Tech. rep., arxiv.org, March 2013.

M. Tang, G. Zhang, T. Lin, and J. Liu, ``HDLBR: A name-independent compact routing scheme for power-law networks'', Computer Communications, vol. 36, no. 3, pp. 351--359, February 2013.

Y. Wang, J. Bi, and J. Wu, ``Revisiting the rich club of the Internet AS-level topology'', IEICE Trans. on Communications, vol. E96-B, no. 3, pp. 900--904, January 2013.

C. Ni and G. Jin, ``CTFPi: A new method for packet filtering of firewall'', in Intl Conf. on Information Technology and Software Engineering, Ch. 48, January 2013, vol. 210 of Lecture Notes in Electrical Engineering, pp. 465--475.

T. Karasawa, M. Soshi, and A. Miyaji, ``A novel hybrid IP traceback scheme with packet counters'', in Conf. on Internet and Distributed Computing Systems (IDCS). November 2012, vol. 7646 of Lecture Notes in Computer Science, pp. 71--84, Springer.

B. Parno, Z. Zhou, and A. Perrig, ``Using trustworthy host-based information in the network'', in Workshop on Scalable trusted computing (STC), October 2012, pp. 33--44.

V.M. Preciado, M. Draief, and A. Jadbabaie, ``Structural analysis of viral spreading processes in social and communication networks using egonets'', Tech. rep., arxiv.org, September 2012.

A.V. Goltsev, S.N. Dorogovtsev, J.G. Oliveira, and J.F.F. Mendes, ``Localization and spreading of diseases in complex networks'', Phys. Rev. Lett., vol. 109, pp. 128702, September 2012.

M.-H. Yang and M.-C. Yang, ``RIHT: A novel hybrid IP traceback scheme'', IEEE Trans. on Information Forensics and Security, vol. 7, no. 2, pp. 789--797, April 2012.

K. Wehmuth and A. Ziviani, ``Distributed assessment of the closeness centrality ranking in complex networks'', in Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX), April 2012, pp. 43--48.

Y. Wang, S. Su, Y. Yang, and J. Ren, ``A more efficient hybrid approach for single-packet IP traceback'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2012, pp. 275--282.

A. Mukaddam and I. ELHajj, ``Hop count variability'', in Conf. for Internet Technology and Secured Transactions (ICITST), December 2011, pp. 240--244.

K. Wehmuth and A. Ziviani, ``Distributed location of the critical nodes to network robustness based on spectral analysis'', in Latin American Network Operations and Management Symp. (LANOMS), October 2011, p. (8 pages).

P. Marchetta, P. Merindol, B. Donnet, A. Pescape, and J.-J. Pansiot, ``Topology discovery at the router level: a new hybrid tool targeting ISP networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 6, pp. 1776--1787, October 2011.

C. Bell, ``Examining change in Internet topology in terms of external events, April 2001 - April 2002'', M.S. thesis, Univ. Nebraska at Omaha, August 2011.

O. Akashi, ``Analysis of cooperative management strategies against route-hijacking'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2011, pp. 1164--1171.

J. Scholz and M. Greiner, ``Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics'', EPL (Europhysics Letters), vol. 94, no. 2, pp. 28008, April 2011.

M. Youssef, R. Kooij, and C. Scoglio, ``Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics'', J. Computational Science, vol. 61, pp. (13 pages), March 2011.

S. Melnik, A. Hackett, M.A. Porter, P.J. Mucha, and J.P. Gleeson, ``The unreasonable effectiveness of tree-based theory for networks with clustering'', Phys. Rev. E, vol. 83, March 2011.

J.I. Alvarez-Hamelin, M.G. Beiro, and J.R. Busch, ``Understanding edge connectivity in the Internet through core decomposition'', Internet Mathematics, vol. 7, no. 1, pp. 45--66, March 2011.

J. Song, H. Zhao, B. Yang, and H. Sun, ``AS-level Internet macroscopic topology centralization evolvement analysis'', J. Software Engineering and Applications, vol. 3, pp. 901--905, October 2010.

F. de Montgolfier, M. Soto, and L. Viennot, ``Autour du caractere arborescent d'Internet'', in MajecSTIC 2010, October 2010, p. (8 pages).

M.Z. Ahmad and R. Guha, ``Impact of Internet exchange points on Internet topology evolution'', in Conf. on Local Computer Networks (LCN), October 2010, pp. 332--335.

Y. Xu and Z. Wang, ``On an IBA topology model for internet topology structure'', in Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), June 2010, vol. 2, pp. 114--117.

G. Yan, S. Eidenbenz, S. Thulasidasan, P. Datta, and V. Ramaswamy, ``Criticality analysis of Internet infrastructure'', Computer Networks, vol. 54, pp. 1169--1182, May 2010.

B. Augustin, B. Krishnamurthy, and W. Willinger, ``IXP's: mapped?'', in Internet Measurement Conf. (IMC), November 2009, pp. 336--349.

G. Jin, F. Zhang, Y. Li, H. Zhang, and J. Qian, ``A Hash-Based Path Identification Scheme for DDoS Attacks Defense'', in Intl Conf. on Computer and Information Technology, October 2009, vol. 9, pp. 219--224.

H. Haddadi, D. Fay, A. Jamakovic, O. Maennel, A. Moore, R. Mortier, and S. Uhlig, ``Analysis of the Internet's structural evolution'', Tech. rep., Univ. of Cambridge, September 2009.

H. Haddadi, D. Fay, A. Jamakovic, O. Maennel, A. Moore, R. Mortier, and S. Uhlig, ``On the importance of local connectivity for Internet topology models'', in Intl Teletraffic Congress, September 2009, vol. 21, p. (8 pages).

M.S. Andreou, Message traceback systems. Dancing with the devil, Ph.D. thesis, Univ. Newcastle upon Tyne, September 2009.

T. Erlebach, L.S. Moonen, F.C.R. Spieksma, and D. Vukadinovic, ``Connectivity measures for internet topologies on the level of autonomous systems'', Operations Research, vol. 57, no. 4, pp. 1006--1025, July 2009.

A. Korn, A. Schubert, and A. Telcs, ``Lobby index in networks'', Physica A: Statistical Mechanics and its Applications, vol. 388, no. 11, pp. 2221--2226, June 2009.

Y. Xu and H. Zhao, ``An improved BA model for router-level internet macroscopic topology'', IAENG J. Computer Science, vol. 36, no. 2, pp. 122--128, May 2009.

H.V. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, ``iPlane Nano: path prediction for peer-to-peer applications'', in USENIX Symp. on Networked Systems Design and Implementation (NSDI), April 2009, pp. 137--152.

M.H. Gunes and K. Sarac, ``Analyzing router responsiveness to active measurement probes'', in Passive and Active Measurement (PAM), March 2009, vol. 5448 of Lecture Notes in Computer Science (LNCS), pp. 23--32.

A. Durresi, V. Paruchuri, and L. Barolli, ``Fast autonomous system traceback'', J. Network and Computer Applications, vol. 32, no. 2, pp. 448--454,, March 2009.

B. Xiao, L. Liu, X. Guo, and K. Xu, ``Modeling the IPv6 internet AS-level topology'', Physica A: Statistical Mechanics and its Applications, vol. 388, no. 4, pp. 529--540, February 2009.

S. Kaune, K. Pussep, C. Leng, A. Kovacevic, G. Tyson, and R. Steinmetz, ``Modelling the internet delay space based on geographical locations'', in Conf. on Parallel, Distributed and Network-based Processing, February 2009, pp. 301--310.

X. Zhang, H. Zhao, L. Wang, and C. Li, ``On the internet AS-level topology evolution basing on hierarchy characteristic'', in Chinese Control and Decision Conf., December 2008, p. (6 pages).

M. Sung, J. Xu, J. Li, and L. Li, ``Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation'', IEEE/ACM Trans. on Networking (TON), vol. 16, no. 6, pp. 1253--1266, December 2008.

Z. Qu, C. Huang, and N. Liu, ``A Novel Two-Step Traceback Scheme for DDoS Attacks'', in Intl. Symp. on Intelligent Information Technology Application, December 2008, vol. 2, pp. 879--883.

V. Paruchuri, A. Durresi, and S. Chellappan, ``TTL Based Packet Marking for IP Traceback'', in Global Telecommunications Conf., December 2008, p. (5 pages).

L. Liu and K. Xu, ``Time series of Internet AS-level topology graphs: four patterns and one model'', Tech. rep., arxiv.org, December 2008.

M.G. Beiro, J.I. Alvarez-Hamelin, and J.R. Busch, ``A low complexity visualization tool that helps to perform complex systems analysis'', New J. Physics, vol. 10, no. 12, pp. 125003, December 2008.

C. Li, H. Zhao, X. Zhang, and L. Wang, ``Correctness of sampling bias on Internet router-level topology'', in Intl Conf. on Wireless Communications, Networking and Mobile Computing, October 2008, p. (4 pages).

X. Bi, W. Tan, and R. Xiao, ``A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems'', in Symp. on Computer and Computational Sciences (IMSCSS), October 2008, pp. 132--135.

W. Wei, Y. Dong, D. Lu, and G. Jin, ``Optimal control of DDoS defense with multi-resource max-min fairness'', in Conf. on Cybernetics and Intelligent Systems, September 2008, pp. 1285--1293.

M. Andreou and A. Moorsel, ``COTraSE: Connection Oriented Traceback in Switched Ethernet'', in Intl Conf. on Information Assurance and Security, September 2008, vol. 4, pp. 198--204.

N. Kahani, S. Shiry, and M. Bagherzadeh, ``Detecting Denial of Service Attacks Utilizing Machine Learning Methods'', in IEEE Intl Conf. on the Applications of Digital Information and Web Technologies, August 2008, p. (7 pages).

G. Jin, Y. Li, H. Zhang, and J. Qian, ``A Pi2HC mechanism against DDoS attacks'', in Intl Conf. on Communications and Networking in China, August 2008, vol. 3, p. (5 pages).

B. Eriksson, P. Barford, and R. Nowak, ``Network discovery from passive measurements'', in ACM SIGCOMM Conf. on Data communication, August 2008, pp. 291--302.

M. Dramburg, ``Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien'', M.S. thesis, Hochschule fuer Angewandte Wissenschaften Hamburg, Germany, August 2008.

J. Zhang, H. Zhao, and Y. Zhou, ``The study on characteristics of the coreness of router-level internet nodes'', in Chinese Control and Decision Conf. (CCDC), July 2008, pp. 4803--4808.

H. Haddadi, D. Fay, A. Jamakovic, O. Maennel, A. Moore, R. Mortier, M. Rui, and S. Uhlig, ``Beyond Node Degree: Evaluating AS Topology Models'', Tech. rep., arxiv.org, July 2008.

M. Muthuprasanna and G. Manimaran, ``Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses'', in Intl Conf. on Distributed Computing Systems, June 2008, vol. 28, p. (10 pages).

H. Haddadi, D. Fay, S. Uhlig, A. Moore, R. Mortier, A. Jamakovic, and M. Rio, ``Tuning Topology Generators Using Spectral Distributions'', in Performance Evaluation: Metrics, Models and Benchmarks, June 2008, Lecture Notes in Computer Science, pp. 154--173.

M. Latapy and C. Magnien, ``Complex network measurements: estimating the relevance of observed properties'', in IEEE Conf. on Computer Communications (INFOCOM), April 2008, pp. 1660--1668.

P. Fraigniaud, E. Febhar, and F. Viennot, ``The inframetric model for the internet'', in IEEE Conf. on Computer Communications (INFOCOM), April 2008, pp. 1085--1093.

I. Scholtes, J. Botev, M. Esch, A. Hohfeld, H. Schloss, and B. Zech, ``TopGen - internet router-level topology generation based on technology constraints'', in Conf. on Simulation Tools and Techniques for Communications, Networks and Systems, March 2008, p. (10 pages).

R. Kooij, A. Jamakovic, F. Van~Kesteren, T. De~Koning, I. Theisler, and P. Veldhoven, ``Het Nederlands elftal als complex netwerk'', Tech. rep., Delft Univ., March 2008.

L. Cheng, N. Hutchinson, and M. Ito, ``RealNet: A Topology Generator Based on Real Internet Topology'', in Intl Conf. on Advanced Information Networking and Applications Workshops, March 2008, vol. 22, pp. 526--532.

M. Wahlisch, T.C. Schmidt, and W. Spalt, ``What is happening from behind?: Making the impact of internet topology visible'', Campus-Wide Information Systems, vol. 25, no. 5, pp. 392--406, January 2008.

S. Amr, M. El-Beltagy, and M. Helmy, ``Analyzing Internet Connectivity Data Using Modified k-shell Analysis'', Tech. rep., Cairo Univ., January 2008.

M. Allman, L. Martin, and M. Rabinovich, ``On Community-Oriented Internet Measurement'', in Passive and Active Network Measurement, January 2008, Lecture Notes in Computer Science, pp. 112--121.

A. Flaxman and J. Vera, ``Bias Reduction in Traceroute Sampling - Towards a More Accurate Map of the Internet'', in Algorithms and Models for the Web-Graph, December 2007, Lecture Notes in Computer Science, pp. 1--15.

M. Abdelhafez, Modeling and Simulations of Worms and Mitigation Techniques, Ph.D. thesis, Georgia Institute of Technology, December 2007.

V. Paruchuri, A. Durresi, and R. Jain, ``On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS Attacks'', in Global Telecommunications Conf., November 2007, pp. 1965--1970.

R. Narasimha, Application of Information Theory and Learning to Network and Biological Tomography, Ph.D. thesis, Georgia Tech, November 2007.

B. Eriksson, P. Barford, R. Nowak, and M. Crovella, ``Learning network structure from passive measurements'', in ACM SIGCOMM Conf. on Internet measurement, October 2007, vol. 7, pp. 209--214.

O Akashi, K. Fukuda, T. Hirotsu, and T. Sugawara, ``Analysis of Diagnostic Capability for Hijacked Route Problem'', in IP Operations and Management, October 2007, Lecture Notes in Computer Science, pp. 37--48.

A. Jamakovic, S. Uhlig, and I. Theisler, ``On the relationships between topological measures in real-world networks'', Networks and Heterogeneous Media, vol. 3, no. 2, pp. 349--355, September 2007.

R. Oliveira, B. Zhang, and L. Zhang, ``Observing the evolution of internet as topology'', in Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2007, pp. 313--324.

R. Bush, J. Hiebert, O. Maennel, M. Roughan, and S. Uhlig, ``Testing the reachability of (new) address space'', in SIGCOMM workshop on Internet network management, August 2007, pp. 236--241.

B. Choi, S. Moon, R. Cruz, Z. Zhang, and C. Diot, ``Quantile sampling for practical delay monitoring in Internet backbone networks'', Computer Networks, vol. 51, no. 10, pp. 2701--2716, July 2007.

J. Leguay, M. Latapy, T. Friedman, and K. Salamatiana, ``Describing and simulating internet routes'', Computer Networks, vol. 51, no. 8, pp. 2067--2085, June 2007.

A. Jackson, W. Milliken, C. Santivanez, M. Condell, and T. Strayer, ``A Topological Analysis of Monitor Placement'', in IEEE Int. Symp. on Network Computing and Applications, June 2007, p. (11 pages).

F. Viger, A. Barrat, L. Dallasta, C. Zhang, and E. Kolaczyk, ``What is the real size of a sampled network? The case of the Internet'', Physical Review, vol. 75, pp. (10 pages), May 2007.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation'', Tech. rep., UC Riverside, May 2007.

D. Ha and H. Ngo, ``On the trade-off between the expected number of infected nodes and expected propagation time of malcodes'', Tech. rep., State Univ. of New York at Buffalo, May 2007.

S. Zhou and G.-Q. Zhang, ``Chinese Internet AS-level topology'', IET Communications, vol. 1, no. 2, pp. 209--214, April 2007.

T.C. Schmidt, M. Wahlisch, and Y. Zhang, ``On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing'', in IEEE Conf. on Networking (ICN), April 2007, pp. 94--94.

G. Kunzmann, R. Nagel, T. Hossfeld, A. Binzenhofer, and K. Eger, ``Efficient simulation of large-scale P2P networks: modeling network transmission times'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2007, pp. 475--481.

Z. Gao and N. Ansari, ``A practical and robust inter-domain marking scheme for IP traceback'', Computer Networks, vol. 51, no. 3, pp. 732--750, February 2007.

P. Mahadevan, Mechanisms for Generating Realistic Annotated Internet Topologies, Ph.D. thesis, Univ. of California, San Diego, January 2007.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network monitoring using traffic dispersion graphs (TDGs)'', in Internet Measurement Conf. (IMC), January 2007, pp. 315--320.

B. Donnet, P. Raoult, T. Friedman, and M. Crovella, ``Deployment of an algorithm for large-scale topology discovery'', IEEE J. Selected Areas in Communications, vol. 24, no. 12, pp. 2210--2220, December 2006.

B. Donnet, B. Bayant, and T. Friedman, ``Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2006, p. 13.

Z. Li and Y. Xiang, ``Mathematical Analysis of Active DDoS Defense Systems'', in Intl Conf. on Computational Intelligence and Security, November 2006, pp. 1563--1566.

J.-L. Guillaume, M. Latapy, and D. Magoni, ``Relevance of massively distributed explorations of the internet topology: qualitative results'', Computer Networks, vol. 50, no. 16, pp. 3197--3224, November 2006.

A. Yaar, A. Perrig, and D. Song, ``StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense'', IEEE J. Selected Areas in Communications, vol. 24, no. 10, pp. 1853--1863, October 2006.

M. Latapy and C. Magnien, ``Measuring fundamental properties of real-world complex networks'', Tech. rep., arxiv.org, September 2006.

H. Farhat, ``Protecting TCP services from denial of service attacks'', in SIGCOMM workshop on Large-Scale Attack Defense (LSAD), September 2006, pp. 155--160.

L. Dallasta, ``Dynamical Phenomena on Complex Networks'', Tech. rep., arxiv.org, September 2006.

L. Zhang and Y. Guan, ``TOPO: a topology-aware single packet attack traceback scheme'', in Securecomm and Workshops, August 2006, pp. 1--10.

S. Zhou, ``Characterising and modelling the internet topology - The rich-club phenomenon and the PFP model'', BT Technology J., vol. 24, no. 3, pp. 108--115, July 2006.

B. Donnet and T. Friedman, ``Topology discovery using an address prefix based stopping rule'', in UNICE 2005: Networks and Applications Towards a Ubiquitously Connected World. June 2006, vol. 196 of IFIP Federation for Information Processing, pp. 119--130, Springer.

B. Donnet, P. Raoult, and T. Friedman, ``Efficient route tracing from a single source'', Tech. rep., arxiv.org, May 2006.

S. Jin and A. Bestavros, ``Small-world characteristics of internet topologies and implications on multicast scaling'', Computer Networks, vol. 50, no. 5, pp. 648--666, April 2006.

M. Faloutsos, ``Public Real Data Repositories and Measurement Tools'', in ACM SIGCOMM Computer Communication Review, April 2006, vol. 36 (2), pp. 37--40.

M. Brennan, L. Morley, and B. Wilson, ``Measuring and Understanding Connectivity'', Tech. rep., Worcester Polytechnic Institute, March 2006.

P. Yan and M. Lee, ``Towards an adaptive packet marking scheme for IP traceback'', in e-Business and Telecommunication Networks, January 2006, 150-157, pp. 141--148.

M. Sung, J. Chiang, and J. Xu, ``Scalable Hash-based IP Traceback Using Rate-limited Probabilistic Packet Marking'', Tech. rep., Georgia Institute of Technology, January 2006.

S. Srinivasan and E. Zegura, ``RouteSeer: Topological Placement of Nodes in Service Overlays'', Tech. rep., Georgia Institute of Technology, January 2006.

Z. Li, Y. Xiang, and D. He, ``Simulation and Analysis of DDoS in Active Defense Environment'', in Intl Conf. on Computational and Information Science, January 2006, pp. 878--886.

K. Khanmohammadi and M. Fallah, ``Distributed Packet Filtering Based on IP Traceback'', in Intl Computer Engineering Conf., January 2006, p. (6 pages).

Y. He, G. Siganos, M. Faloutsos, and S. Krishnamurthy, ``Putting the Links Together: Measurements and Impact'', Tech. rep., Univ. of California, Riverside, January 2006.

A. Dhamdhere and C. Dovrolis, ``ISP and Egress Path Selection for Multihomed Networks'', in Intl Conf. on Computer Communications, January 2006, p. (12 pages).

G. Chen, Z. Fan, and X. Li, ``Modelling the Complex Internet Topology'', in Complex Dynamics in Communication Networks, January 2006, Lecture Notes in Computer Science, pp. 213--234.

X. Zhu, S. Wang, F. Hong, and J. Liao, ``Safeguard Information Infrastructure Against DDos Attacks: Experiments and Modeling'', in Cryptology and Network Security, December 2005, Lecture Notes in Computer Science, pp. 320--333.

U. Tariq, M. Hong, and K. Lhee, ``PMS an expeditious marking scheme to combat with the DDoS attack'', in Intl Multitopic Conf., December 2005, vol. 9, p. (4 pages).

T. Erlebach, L.S. Moonen, F. Spieksma, and D. Vukadinovic, ``Connectivity measures for internet topologies'', Tech. rep., K.U. Leuven, December 2005.

D. Alderson, L. Li, W. Willinger, and J. Doyle, ``Understanding Internet Topology: Principles, Models, and Validation'', in IEEE/ACM Trans. on Networking (TON), December 2005, vol. 13 (6), pp. 1205--1218.

Y. Xiang and W. Zhou, ``Mark-aided distributed filtering by using neural network for DDoS defense'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2005, p. (5 pages).

M. Janic and P. Van~Mieghem, ``On properties of multicast routing trees'', J. Communication Systems, vol. 19, no. 1, pp. 95--114, November 2005.

T. Hobfeld, A. Binzenhofer, D. Schlosser, K. Eger, J. Oberender, I. Dedinski, and G. Kunzmann, ``Towards Efficient Simulation of Large Scale P2P Networks'', Tech. rep., Univ. of Wurzburg, October 2005.

R. Chen and J.-M. Park, ``Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources'', in IEEE Conf. on Computer Communications and Networks (ICCCN), October 2005, pp. 275--280.

D. Pezaros, Network Traffic Measurement for the Next Generation Internet, Ph.D. thesis, Lancaster Univ., August 2005.

M. Kim, Building and Maintaining Overlay Networks for Bandwidth-Demanding Applications, Ph.D. thesis, Univ. of Texas at Austin, August 2005.

O.A. Martins, ``Affecting IP traceback with recent Internet topology maps'', M.S. thesis, Iowa State Univ., June 2005.

B. Donnet, P. Raoult, T. Friedman, and M. Crovella, ``Efficient algorithms for large-scale topology discovery'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2005, pp. 327--338.

B. Donnet and T. Friedman, ``A CIDR stopping rule for topology discovery'', in Algotel, May 2005.

B. Andreopoulos, A. Aijun, and X. Wang, ``Multi-Layer Increasing Coherence Clustering of Autonomous Systems with MULICsoft'', Tech. rep., York Univ., April 2005.

A. Yaar, A. Perrig, and D. Song, ``FIT: Fast Internet Traceback'', in IEEE Conf. on Computer Communications (INFOCOM), March 2005, vol. 2 of IEEE INFOCOM 2005, pp. 1395--1406.

B. Donnet, T. Friedman, and M. Crovella, ``Improved algorithms for network topology discovery'', in Passive and Active Measurement (PAM). March 2005, vol. 3431 of Lecture Notes in Computer Science (LNCS), pp. 149--162, Springer.

B. Yip, S. Goyette, and C. Madden, ``Visualising internet traffic data with three-dimensional spherical display'', in Asia-Pacific symposium on Information visualisation, January 2005, vol. 45, pp. 153--158.

B. Choi, S. Moon, R. Cruz, Z. Zhang, and C. Diot, ``Practical delay monitoring for ISPs'', in ACM Conf. on Emerging network experiment and technology, January 2005, pp. 83--92.

C. Prince and D. Wyatt, ``Confidence-weighted marginal utility analyses for improved internet mapping'', Tech. rep., Univ. Washington, CSE Dept., December 2004.

R. Dube, ``Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking'', M.S. thesis, Texas A and M Univ., December 2004.

A. Yaar, A. Perrig, and D. Song, ``SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacks'', in IEEE Symp. on Security and Privacy, May 2004, pp. 130--143.

L. Tang and M. Crovella, ``Geometric exploration of the landmark selection problem'', in Passive and Active Measurement (PAM). May 2004, vol. 3015 of Lecture Notes in Computer Science (LNCS), pp. 63--72, Springer.

S. Jin and A. Bestavros, ``Small-world characteristics of the Internet and multicast scaling'', in Modeling, Analysis and Simulation of Computer Telecommunications Systems, May 2004, p. (9 pages).

K. Xu, Z. Duan, Z.-L. Zhang, and J. Chandrashekar, ``On properties of Internet Exchange Points and their impact on AS topology and relationship'', in IFIP-TC6 Networking Conf. (NETWORKING), April 2004, vol. 3042 of Lecture Notes in Computer Science (LNCS), pp. 284--295.

J. Leguay, An Analysis on the Internet Topology, Ph.D. thesis, Linkoping Univ., March 2004.

S. Zhou and R.J. Mondragon, ``Redundancy and robustness of AS-level Internet topology and its models'', Electronics Letters, vol. 40, no. 2, pp. 151--152, February 2004.

X. Wang and M. Reiter, ``Mitigating bandwidth-exhaustion attacks using congestion puzzles'', in ACM Conf. on Computer and Communications Security (CCS), January 2004, vol. 11, pp. 257--267.

D. Veitch, S. Babu, and A. Pasztor, ``Robust synchronization of software clocks across the internet'', in ACM SIGCOMM Conf. on Internet Measurement (IMC), January 2004, vol. 4, pp. 219--232.

R. Reitsma, L. Thabane, and J. MacLeod, ``Spatialization of Web sites using a weighted frequency model of navigation data'', J. of the Association for Information Science and Technology, vol. 55, no. 1, pp. 13--22, January 2004.

M. Oe, Y. Kadobayashi, and S. Yamaguchi, ``An implementation of a hierarchical IP traceback architecture'', in Symp. on Applications and the Internet Workshops, January 2004, p. (4 pages).

G. Lee, H. Lim, M. Hong, and D. Lee, ``A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks'', in Information Networking Convergence in Broadband and Mobile Networking, January 2004, Lecture Notes in Computer Science, pp. 806--813.

S. Kim, M. Hong, and D. Kim, ``A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host'', in Intl Conf. on Computational Science and Its Applications, January 2004, p. (6 pages).

S. Kettner, C. Madden, and R. Ziegler, ``Direct rotational interaction with a spherical projection'', Tech. rep., TUM, Muenchen, January 2004.

M. Collins and M. Reiter, ``An Empirical Analysis of Target-Resident DoS Filters'', in IEEE Symp. on Security and Privacy, January 2004, p. (12 pages).

L. Amini, A. Shaikh, and H. Schulzrinne, ``Effective peering for multi-provider content delivery services'', in Conf. of the IEEE Computer and Communications Societies (INFOCOM), January 2004, vol. 23, pp. 850--861.

A. Akella, S. Seshan, and A. Shaikh, ``Toward Representative Internet Measurements'', Tech. rep., Carnegie Mellon Univ., January 2004.

L. Tang and M. Crovella, ``Virtual landmarks for the internet'', in Internet Measurement Conf. (IMC), October 2003, pp. 143--152.

M. Sung and J. Xu, ``IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks'', IEEE Trans. on Parallel and Distributed Systems, vol. 14, no. 9, pp. 861--872, September 2003.

Z. Mao, J. Rexford, J. Wang, and R. Katz, ``Towards an accurate AS-level traceroute tool'', in ACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications, August 2003, pp. 365--378.

A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, ``On the geographic location of internet resources'', J. on Selected Areas in Communications, vol. 21, no. 6, pp. 934--947, August 2003.

K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica, ``The impact of DHT routing geometry on resilience and proximity'', in ACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications, August 2003, pp. 381--394.

S. Zhou and R. Mondragon, ``Analyzing and modelling the AS-level Internet topology'', Tech. rep., arxiv.org, June 2003.

T. Teixeira, K. Marzullo, S. Savage, and G.M. Voelker, ``Characterizing and measuring path diversity of internet topologies'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2003, vol. 31 (1) of ACM SIGMETRICS Performance Evaluation Review, pp. 304--305.

N. Feamster, D. Anderson, H. Balakrishnan, and M. Kaashoek, ``Measuring the effects of internet path faults on reactive routing'', in ACM SIGMETRICS Intl Conf. on Measurement and modeling of computer systems, June 2003, pp. 126--137.

A. Yaar, A. Perrig, and D. Song, ``Pi: a path identification mechanism to defend against DDoS attacks'', in IEEE Symp. on Security and Privacy, May 2003, pp. 93--107.

R. Motamedi, B. Chandrasekaran, B. Maggs, R. Rejaie, and W. Willinger, ``StackPi : a new defense mechanism against IP spoofing and DDoS attacks'', Tech. rep., Carnegie Mellon Univ., January 2003.

R. Mahajan, D. Wetherall, and T. Anderson, ``Understanding BGP misconfiguration'', in ACM SIGCOMM Computer Communication Review, October 2002, pp. 3--16.

UCSD Network Telescope

N. Blenn, V. Ghiette, and C. Doerr, ``Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter'', in Conf. on Availability, Reliability and Security, August 2017, vol. 12, p. (10 pages).

F. Iglesias and T. Zseby, ``Pattern discovery in Internet background radiation'', IEEE Trans. on Big Data, vol. PP, no. 99, pp. (14 pages), July 2017.

E. Bou-Harb, M. Husak, M. Debbabi, and C. Assi, ``Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective'', IEEE Trans. on Big Data, , no. 99, pp. (16 pages), July 2017.

F. Haddadi and A. Heywood, ``Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?'', Intl J. of Network Management, vol. 27, no. 4, pp. (19 pages), May 2017.

N. Ochieng, A. Ismail, M. Waweru, and J. Orero, ``Detecting scanning computer worms using machine learning and darkspace network traffic'', in Pan African Conf. on Science, Computing and Telecommunications, March 2017, p. (6 pages).

J. Dauxois and A. Nucit, ``Some estimation problems in epidemic modeling'', Communications in Statistics - Simulation and Computation, pp. 1--22, March 2017.

H. Polat, H. Mehr, and A. Cetin, ``Diagnosis of Chronic Kidney Disease Based on Support Vector Machine by Feature Selection Methods'', J. of Medical Systems, vol. 41, no. 55, pp. (11 pages), February 2017.

A. Cenedese, F. Tramarin, and S. Vitturi, ``An Energy Efficient Ethernet Strategy Based on Traffic Prediction and Shaping'', IEEE Trans. on Communications, vol. 65, no. 1, pp. 270--282, January 2017.

M. Xu, L. Hua, and S. Xu, ``A vine copula model for predicting the effectiveness of cyber defense early-warning'', Technometrics, vol. 0, pp. (42), November 2016.

P. Chen, M. Xu, S. Xu, and T. Hu, ``Modeling and predicting extreme cyber attack rates via marked point processes'', J. Applied Statistics, vol. 0, pp. 0, November 2016.

C. Lin, C. Wu, M. Huang, Z. Wen, and Q. Cheng, ``Adaptive IP mutation: A proactive approach for defending against worm propagation'', in IEEE Symp. onReliable Distributed Systems Workshops (SRDSW), September 2016, pp. 61--66.

T. Hirakawa, K. Ogura, B. Bista, and T. Takata, ``A Defense Method against Distributed Slow HTTP DoS Attack'', in Intl Conf. on Network-Based Information Systems, September 2016, vol. 19, pp. (152--158).

F. Haddadi, Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithms, Ph.D. thesis, Dalhousie Univ., September 2016.

K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attack'', Management Information Systems Quarterly, vol. 41, pp. (28 pages), May 2016.

C. Fachkha and M. Debbabi, ``Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization'', IEEE Communications Surveys and Tutorials, vol. 18, pp. 1197--1227, May 2016.

A. Marnerides and A. Mauthe, ``Analysis and characterisation of botnet scan traffic'', in Intl Conf. on Computing, Networking and Communications (ICNC), March 2016.

A. Kolesnichenko, B. Haverkort, A. Remke, and P. de Boer, ``Fitting a code-red virus spread model: An account of putting theory into practice'', in Intl Conf. on the Design of Reliable Communication Networks (DRCN), March 2016, pp. 39--46.

G. Kirubavathi and R. Anitha, ``Botnet detection via mining of traffic flow characteristics'', Computers and Electrical Engineering, vol. 50, pp. 91--101, February 2016.

L. Zheng, J. Li, H. Wang, and X. Zeng, ``Improving accuracy and automation of anomaly detectors based on self-correlation'', J. Internet Technology (JIT), vol. 17, no. 1, pp. 39--51, January 2016.

Z. Chen and C. Chen, ``Characterising heterogeneity in vulnerable hosts on worm propagation'', Intl J. Security and Networks, vol. 11, no. 4, January 2016.

R.R.R. Robinson and C. Thomas, ``Ranking of machine learning algorithms based on the performance in classifying DDoS attacks'', in 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), December 2015, pp. 185--190.

Y. Haga, A. Saso, T. Mori, and S. Goto, ``Increasing the darkness of darknet traffic'', in Global Communications Conf. (GLOBECOM), December 2015, pp. 1--7.

X.-F. Chen and S.-Z. Yu, ``CIPA: A collaborative intrusion prevention architecture for programmable network and SDN'', Computers and Security, vol. 58, pp. 1--19, December 2015.

C. Fachkha, Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacks, Ph.D. thesis, Concordia Univ., November 2015.

N. Donoghue, B. Hahn, H. Xu, T. Kroeger, D. Zage, and R. Johnson, ``Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Database'', Tech. rep., arxiv.org, November 2015.

E. Balkanli, A.N. Zincir-Heywood, and M.I. Heywood, ``Feature selection for robust backscatter DDoS detection'', in Local Computer Networks Conf. Workshops (LCNW), October 2015, pp. 611--618.

S. Gupta and B.B. Gupta, ``Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art'', Intl J. System Assurance Engineering and Management, pp. 1--19, September 2015.

Z. Zhan, M. Xu, and S. Xu, ``Predicting cyber attack rates with extreme values'', IEEE Trans. on Information Forensics and Security, vol. 10, no. 8, pp. 1666--1677, August 2015.

T. Vaidya, ``2001-2013: Survey and analysis of major cyberattacks'', Tech. rep., arxiv.org, July 2015.

C. Zhang, S. Zhou, and B. Chain, ``Hybrid epidemics - A case study on computer worm Conficker'', Plos One, vol. 10, no. 5, May 2015.

F. Haddadi, D. Le~Cong, L. Porter, and A. Zincir-Heywood, ``On the effectiveness of different botnet detection approaches'', in Information Security Practice and Experience (ISPE), May 2015, vol. 9065 of Lecture Notes in Computer Science, pp. 121--135.

E. Balkanli and A.N. Zincir-Heywood, ``Highlights on analyzing one-way traffic using different tools'', in IEEE Symp. on Computational Intelligence for Security and Defense Applications (CISDA), May 2015, pp. 1--8.

C. Zhang, S. Zhou, J. Miller, I. Cox, and B. Chain, ``Optimizing hybrid spreading in metapopulations'', Nature Scientific Reports, vol. 5, April 2015.

E. Balkanli, ``A comprehensive study on one-way backscatter traffic analysis'', M.S. thesis, Dalhousie Univ., Halifax, CA, April 2015.

G. Yao, J. Bi, and A.V. Vasilakos, ``Passive IP Traceback: disclosing the locations of IP spoofers from path backscatter'', IEEE Trans. on Information Forensics and Security, vol. 10, pp. 471--484, January 2015.

Y. Lai, Y. Chen, Z. Liu, Z. Yang, and X. Li, ``On monitoring and predicting mobile network traffic abnormality'', Simulation Modelling Practice and Theory, vol. 50, pp. 176--188, January 2015.

Z. Zhan, M. Xu, and S. Xu, ``A characterization of cybersecurity posture from Network Telescope data'', in Intl Conf. on Trustworthy Systems (InTrust), December 2014, vol. 9473 of Lecture Notes in Computer Science (LNCS), pp. 105--126.

A. Kolesnichenko, Model-checking mean-field models: algorithms and applications, Ph.D. thesis, Univ. of Twente, December 2014.

F. Iglesias and T. Zseby, ``Entropy-based characterization of Internet background radiation'', Entropy, vol. 17, no. 1, pp. 74--101, December 2014.

E. Balkanli, J. Alves, and A.N. Zincir-Heywood, ``Supervised learning to detect DDoS attacks'', in IEEE Computational Intelligence in Cyber Security (CICS), December 2014.

J Fowler, T Johnson, P Simonetto, P Lazos, S. Kobourov, M. Schneider, and C. Aceda, ``IMap: Visualizing network activity over Internet maps'', in Visualization for Cyber Security (VizSec), November 2014, p. (8 pages).

S. Yang, H. Du, J. Holsopple, and M. Sudit, ``Attack Projection'', Advances in Information Security, vol. 62, pp. 239--261, October 2014.

F. Iglesias and T. Zseby, ``Modelling IP darkspace traffic by means of clustering techniques'', in Communications and Network Security (CNS), October 2014, pp. 166--174.

S. Garcia, M. Grill, J. Stiborek, and A. Zunino, ``An empirical comparison of botnet detection methods'', Computers and Security, vol. 45, pp. 100--123, September 2014.

E. Balkanli and A.N. Zincir-Heywood, ``On the analysis of backscatter traffic'', in IEEE Local Computer Networks Workshops (LCN Workshops), September 2014.

H. Du, Probabilistic modeling and inference for obfuscated network attack sequences, Ph.D. thesis, Rochester Inst. of Technology, August 2014.

M. Kale and D.M. Choudhari, ``DDOS attack detection based on an ensemble of neural classifier'', Intl J. Computer Science and Network Security (IJCSNS), vol. 14, no. 7, pp. 122--129, July 2014.

S.R. Burnett, Empowering bystanders to facilitate Internet censorship measurement and circumvention, Ph.D. thesis, Georgia Tech, July 2014.

C. Gonzalez, ``Information theoretic measures for the detection of anomalies in IP darkspace traffic'', M.S. thesis, Barcelona Tech, June 2014.

H. Du and S.J. Yang, ``Probabilistic Inference for Obfuscated Network Attack Sequences'', in Intl Conf. on Dependable Systems and Networks, June 2014, pp. 57--67.

Z. Zhan, A statistical framework for analyzing cyber attacks, Ph.D. thesis, Univ. Texas, San Antonio, TX, US, May 2014.

P. Wang, X. Guan, J. Zhao, J. Tao, and T. Qin, ``A new sketch method for measuring host connection degree distribution'', IEEE Trans. on Information Forensics and Security, vol. 9, pp. 948--960, April 2014.

S. Strapp and S. Yang, ``Segmenting large-scale cyber attacks for online behavior model generation'', in Social Computing, Behavioral-Cultural Modeling and Prediction (SBP), April 2014, vol. 8393 of Lecture Notes in Computer Science (LNCS), pp. 169--177.

F. Khan, N. Hosein, S. Ghiasi, C. Chuah, and P. Sharma, ``Streaming solutions for fine-grained network traffic measurements and analysis'', in IEEE/ACM Trans. on Networking (TON), April 2014, vol. 22 (2), pp. 377--390.

K. Singh, S.C. Guntuku, A. Thakur, and C. Hota, ``Big data analytics framework for peer-to-peer botnet detection using random forests'', Information Sciences, vol. 278, pp. 488--497, March 2014.

T. Kudo and T. Takin, ``On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling'', Intl J. of Network Management, vol. 24, no. 1, pp. 28--47, January 2014.

S. Ko, K. Kim, Y. Lee, and J. Song, ``A classification method of darknet traffic for advanced security monitoring and response'', Lecture Notes in Computer Science, vol. 8836, pp. 357--364, January 2014.

P. Chatziadam, I.G. Askoxylakis, and A. Fragkiadakis, ``A Network Telescope for Early Warning Intrusion Detection'', Lecture Notes in Computer Science, vol. 8533, pp. 11--22, January 2014.

Huang~Y. Huang~S.Y., ``Network forensic analysis using growing hierarchical SOM'', in IEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov), December 2013, pp. 536--543.

L.J. Tidy, S. Woodhead, and J. Wetherall, ``Simulation of zero-day worm epidemiology in the dynamic, heterogeneous Internet'', J. Defense Modeling and Simulation: Applications, Methodology, Technology, p. (17 pages), October 2013.

K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack'', Tech. rep., Hong Kong Univ. of Science and Technology, September 2013.

S. Strapp, ``Segmentation and model generation for large-scale cyber attacks'', M.S. thesis, Rochester Inst. of Technology, August 2013.

S. Guntuku, P. Narang, and C. Hota, ``Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural network'', Tech. rep., arxiv.org, July 2013.

B. Irwin, ``A source analysis of the Conficker outbreak from a Network Telescope'', SAIEE Africa Research J., vol. 104, no. 2, pp. 38--88, June 2013.

C. Ma, Y. Yang, and X. Guo, ``Improved SEIR viruses propagation model and the patch's impact on the propagation of the virus'', J. of Computational Information Systems, vol. 9, no. 8, pp. 3243--3251, April 2013.

W. Chen, Y. Liu, and Y. Guan, ``Cardinality change-based early detection of large-scale cyber-attacks'', in IEEE INFOCOM, April 2013, pp. 1788--1796.

L. Tidy, S. Woodhead, and J. Wetherall, ``A large-scale zero-day worm simulator for cyber-epidemiological analysis'', in Intl Conf. on Advances in Computer Science and Electronics Engineering (CSEE), February 2013, pp. 230--234.

P.A.R. Kumar and S. Selvakumar, ``Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems'', Computer Communications, vol. 36, no. 3, pp. 303--319, February 2013.

F. Wang, Y. Zhang, H. Guo, and C. Wang, ``Combating good point set scanning-based self-learning worms by using predators'', J. Network Security, vol. 15, no. 3, pp. 171--178, January 2013.

H. Du and S.J. Yang, ``Temporal and spatial analyses for large-scale cyber attacks'', in Handbook of Computational Approaches to Counterterrorism, January 2013, pp. 559--578.

T. Andrysiak, L. Saganowski, and M. Choras, ``DDoS attacks detection by means of greedy algorithms'', in Image Processing and Communications Challenges 4, R.S. Choras, Ed., January 2013, vol. 184 of Advances in Intelligent Systems and Computing, pp. 303--310.

E. Xu, W. Hsu, M.L. Lee, and D. Patel, ``Top-k maximal influential paths in network data'', in Database and Expert Systems Applications, September 2012, vol. 7446 of Lecture Notes in Computer Science, pp. 369--383.

S. Martin, L. Chiarello, and G. Leduc, ``DISco: A distributed information store for network challenges and their outcome'', in IEEE Network Operations and Management Symp. (NOMS), May 2012, pp. 1221--1226.

L. Zheng, P. Zou, Y. Jia, and W. Han, ``Traffic anomaly detection improvement based on spatial-temporal characteristics'', Advanced Science Lett., vol. 7, pp. 456--462, March 2012.

H. Du and S.J. Yang, ``Characterizing transition behaviors in Internet attack sequences'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2011, p. (6 pages).

M. Suresh and R. Anitha, ``Evaluating machine learning algorithms for detecting DDoS attacks'', in Advances in Network Security and Applications (CNSA), D.C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, and D. Nagamalai, Eds., June 2011, vol. 196 of Communications in Computer and Information Science, pp. 441--452.

K. Xu, F. Wang, and L. Gu, ``Network-aware behavior clustering of Internet end hosts'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 2078--2086.

N.S. Abouzakhar, H. Chen, and B. Christianson, ``An enhanced fuzzy ARM approach for intrusion detection'', J. Digital Crime and Forensics, vol. 3, no. 2, pp. 41--61, April 2011.

M. Narita, T. Katoh, B.B. Bista, and T. Takata, ``Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace'', in Advanced Information Networking and Applications (WAINA), March 2011, pp. 341--348.

H. Du and S.J. Yang, ``Discovering collaborative cyber attack patterns using social network analysis'', in Conf. on Social computing, behavioral-cultural modeling and prediction (SBP), March 2011, vol. 6589 of Lecture Notes in Computer Science, pp. 129--136.

L. Saganowski, T. Andrysiak, M. Choras, and R. Renk, ``Expansion of matching pursuit methodology for anomaly detection in computer networks'', Advances in Intelligent and Soft Computing, vol. 95, pp. 727--736, January 2011.

M. Choras, L. Saganowski, R. Renk, and W. Holubowicz, ``Statistical and signal-based network traffic recognition for anomaly detection'', Expert Systems, p. (14 pages), January 2011.

G. Yao, J. Bi, and Z. Zhou, ``Passive IP traceback: capturing the origin of anonymous traffic through network telescopes'', ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 413--414, October 2010.

N.S. Abouzakhar and A. Bakar, ``A chi-square testing-based intrusion detection model'', in Conf. on Cybercrime Forensics Education and Training (CFET 2010), September 2010.

Z.M. Fadlullah, T. Taleb, A.V. Vasilakos, M. Guizani, and N. Kato, ``DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis'', IEEE/ACM Trans. on Networking (TON), vol. 18, no. 4, pp. 1234--1247, August 2010.

J. Bi, P. Hu, and P. Li, ``Study on classification and characteristics of source address spoofing attacks in the Internet'', in IEEE Conf. on Networking (ICN), April 2010, pp. 226--230.

R. Gupta, K. Ramamritham, and M. Mohania, ``Ratio threshold queries over distributed data sources'', Intl Conf. on Data Engineering (ICDE), pp. 581--584, March 2010.

K.G. Kyriakopoulos and D.J. Parish, ``Using wavelets for compression and detecting events in anomalous network traffic'', in Conf. on Systems and Networks Communication, September 2009, pp. 195--200.

H. Rahmani, N. Sahli, and F. Kamoun, ``Joint entropy analysis model for DDoS attack detection'', in Conf. on Information Assurance and Security (IAS), August 2009, pp. 267--271.

H. Rahmani, N. Sahli, and F. Kamoun, ``A traffic coherence analysis model for DDoS attack detection'', in Conf. on Security and Cryptography (SECRYPT), E. Fernandez-Medina, M. Malek, and J. Hernando, Eds. July 2009, pp. 148--154, INSTICC Press.

J. Riihijarvi, P. Mahonen, and M. Wellens, ``Measuring complexity and predictability in networks with multiscale entropy analysis'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009.

X. He and S. Parameswaran, ``MCAD: Multiple connection based anomaly detection'', in IEEE Conf. on Communication Systems (ICCS), November 2008, pp. 999--1004.

H. Choi, H. Lee, and H. Kim, ``Fast detection and visualization of network attacks on parallel coordinates'', Computers and Security, vol. 28, no. 5, pp. 276--288, July 2008.

J. Riihijarvi, P. Mahonen, and M. Wellens, ``Metrics for characterizing complexity of network traffic'', in Conf. on Telecommunications (ICT), June 2008, pp. 1--6.

B. Irwin and N. Pilkington, ``High level internet scale traffic visualization using Hilbert curve mapping'', in Visualization for Computer Security (VizSec), J.R. Goodall, G. Conti, and K.-L. Ma, Eds., May 2008, Mathematics and Visualization, pp. 147--158.

S. Wei and J. Mirkovic, ``Correcting congestion-based error in network telescope's observations of worm dynamics'', in Internet Measurement Conf. (IMC), January 2008, pp. 125--130.

P. Li, J. Bi, and Z. Zhou, ``A backscatter technology based study on source address spoofing'', Periodical of Ocean Univ. of China, vol. 38, pp. 125--128, January 2008.

J. Francois, R. State, and O. Festor, ``Activity monitoring for large honeynets and network telescopes'', J. Advances in Systems and Measurements, vol. 1, pp. 1--13, January 2008.

A. Dainotti, A. Pescape, and G. Ventre, ``Worm traffic analysis and characterization'', in IEEE Conf. on Communications (ICC), June 2007, pp. 1435--1442.

Z. Chen and C. Ji, ``Measuring network-aware worm spreading ability'', in IEEE Conf. on Computer Communications (INFOCOM), May 2007, pp. 116--124.

M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis, ``Sampling strategies for epidemic-style information dissemination'', in IEEE Conf. on Computer Communications (INFOCOM), April 2007, pp. 1678--1686.

Z. Chen and C. Ji, ``Optimal worm-scanning method using vulnerable-host distributions'', J. Security and Networks, vol. 2, no. 1/2, pp. 71--80, January 2007.

M. Rajab, F. Monrose, and A. Terzis, ``Fast and evasive attacks: highlighting the challenges ahead'', in Symp. on Recent Advances in Intrusion Detection (RAID). September 2006, vol. 4219 of Lecture Notes in Computer Science, pp. 206--225, Springer.

J. Francois, R. State, and O. Festor, ``Tracking global wide configuration errors'', in IEEE Workshop on Monitoring, Attack Detection and Mitigation, September 2006.

I. Hamadeh and G. Kesidis, ``Toward a framework for forensic analysis of scanning worms'', in Emerging Trends in Information and Communication Security (ETRICS), June 2006, vol. 3995 of Lecture Notes in Computer Science (LNCS), pp. 282--297.

Y. Peng, J. Gong, W. Yang, and W. Liu, ``Disclosing the element distribution of Bloom filter'', in Conf. on Computational Science (ICCS). May 2006, vol. 3991 of Lecture Notes in Computer Science (LNCS), pp. 1022--1025, Springer.

M. Rajab, F. Monrose, and A. Terzis, ``Worm evolution tracking via timing analysis'', in ACM workshop on Rapid Malcode (WORM), November 2005, pp. 52--59.

Z. Chen, C. Lin, J. Ni, D.-H. Ruan, B. Zheng, Y.-X. Jiang, X. Peng, Y. Wang, A. Luo, B. Zhu, Y. Yue, and F.-Y. Ren, ``Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN'', in IEEE Conf. on Local Computer Networks (LCN), November 2005, pp. 748--755.

Z. Chen and C. Ji, ``Importance-scanning worm using vulnerable-host distribution'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2005, p. (6 pages).

A. Kumar, V. Paxson, and N. Weaver, ``Exploiting underlying structure for detailed reconstruction of an internet-scale event'', in Internet Measurement Conf. (IMC), October 2005, pp. 33--33.

M. Rajab, F. Monrose, and A. Terzis, ``On the effectiveness of distributed worm monitoring'', in Usenix Security Conf. (SEC), July 2005, pp. 15--15.

P. Chhabra, A. John, and H. Saran, ``PISA: Automatic extraction of traffic signatures'', in IFIP-TC6 Networking Conf. (NETWORKING). May 2005, vol. 3462 of Lecture Notes in Computer Science (LNCS), pp. 730--742, Springer.

  Last Modified: Wed Jun-13-2018 11:38:19 PDT
  Page URL: http://www.caida.org/data/publications/bydataset/bydataset_full.xml