This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of our datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.
We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.
For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.
2013
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2013
|
Janeja, V.P. |
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks | IEEE Conf. on Intelligence and Security Informatics |
|
2013
|
Sadre, R. Pras, A. |
Gaussian traffic revisited | IFIP Networking Conf. |
|
2013
|
Karaliopoulos, M. Stavrakakis, I. |
On the local approximations of node centrality in Internet router-level topologies | Int. Workshop on Self-Organizing Systems (IWSOS) |
|
2013
|
Chan, E.W.W. Luo, X. Fok, W.W.T. Chang, R.K.C. |
An efficient approach to multi-level route analytics | IFIP/IEEE Symp. on Integrated Network Management |
|
2013
|
Jose, L. Miao, R. |
Software defined traffic measurement with OpenSketch | Usenix Symp. on Networked Systems Design and Implementation (NSDI) |
|
2013
|
Drago, I. Sperotto, A. Sadre, R. Pras, A. |
Measurement artifacts in NetFlow data | Conf. Passive and Active Measurement (PAM) |
|
2013
|
Woodhead, S. Wetherall, J. |
A large-scale zero-day worm simulator for cyber-epidemiological analysis | Int. Conf. on Advances in Computer Science and Electronics Engineering (CSEE) |
|
2013
|
Zhang, Y. Guo, H. Wang, C. |
Combating good point set scanning-based self-learning worms by using predators | J. Network Security |
2012
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2012
|
Jiang, W. Li, H. Stoica, I. |
Tradeoffs in CDN designs for throughput oriented traffic | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2012
|
Katsaros, K. Xylomenos, G. |
Cloud computing for global name-resolution in information-centric networks | IEEE Symp. on Network Cloud Computing and Applications (NCCA) |
|
2012
|
|
Future architectures for middlebox processing services on the Internet and in the Cloud | UC Berkeley |
|
2012
|
Wong, W. Gary Chan, S.-H. |
Toward continuous push-based P2P live streaming | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2012
|
Wahlisch, M. Schmidt, T.C. |
Exploring reachability via settlement-free peering | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2012
|
Yan, Y. Dong, T. Run-hua, T. |
Self-similarity and heavy-tail of ICMP traffic | J. Computers |
|
2012
|
|
Profiling de trafego inter-operador baseado em analise multi-escalar | Univ. de Aveiro |
|
2012
|
Kang, K.-D. Zhou, Y. Suzer, M.H. |
Adaptive load shedding via fuzzy control in data stream management systems | Int. Conf. on Service-Oriented Computing and Applications (SOCA) |
|
2012
|
Guha, R. |
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation | J. Supercomputing |
|
2012
|
Rossi, D. Gringoli, F. Nava, L. Salgarelli, L. Aracil, J. |
Wire-speed statistical classification of network traffic on commodity hardware | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2012
|
Takahashi, T. Miyamoto, D. |
DNS-based defense against IP spoofing attacks | Conf. on Neural Information Processing |
|
2012
|
Soshi, M. Miyaji, A. |
A novel hybrid IP traceback scheme with packet counters | Conf. on Internet and Distributed Computing Systems (IDCS) |
|
2012
|
Rodriguez-Perez, M. Fernandez-Veiga, M. Lopez-Garcia, C. |
A GI/G/1 model for 10 Gb/s energy efficient ethernet links | IEEE Trans. on Communications |
|
2012
|
D'Emidio, M. Frigioni, D. Romano, D. |
Enhancing the computation of distributed shortest paths on real dynamic networks | Mediterranean Conf. on Algorithms |
|
2012
|
Garcia-Martinez, A. Bagnulo, M. Valera, F. |
BGP-XM: BGP eXtended multipath for transit Autonomous Systems | Computer Networks |
|
2012
|
Ding, W. |
Comparative research on internet flows characteristics | Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics |
|
2012
|
Wang, J. Yegneswaran, V. Briesemeister, L. Cheung, S. Wang, F. Boneh, D. |
StegoTorus: a camouflage proxy for the Tor anonymity system | ACM Conf. on Computer and Communications Security (CCS) |
|
2012
|
Grothoff, C. Thurimella, R. |
Partitioning the Internet | Conf. on Risks and Security of Internet and Systems (CRiSIS) |
|
2012
|
Geddes, J. Thompson, C. Hopper, N. |
Routing around decoys | ACM Conf. on Computer and Communications Security (CCS) |
|
2012
|
Zhou, Z. Perrig, A. |
Using trustworthy host-based information in the network | Workshop on Scalable trusted computing (STC) |
|
2012
|
Santiago del Rio, P.M. Ramos, J. Garnica, J. Garcia-Dorado, J.L. |
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines | IEEE Communications Lett. |
|
2012
|
Park, M. Han, S. Kim, J. |
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup | IEICE Trans. on Communications |
|
2012
|
Cho, K. Honda, M. Tokuda, H. |
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation | Workshop on Managing Systems Automatically and Dynamically |
|
2012
|
John, L.K. |
Efficient traffic aware power management in multicore communications processors | ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) |
|
2012
|
Shen, Y. Thai, M.T. |
An efficient spectral bound for link vulnerability assessment in large-scale networks | IEEE Military Communications Conf. (MILCOM) |
|
2012
|
Panwar, S.S. |
Efficient buffering and scheduling for a single-chip crosspoint-queued switch | ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) |
|
2012
|
Schmidt, D. Mohay, G. |
Ensemble-based DDoS detection and mitigation model | Conf. on Security of Information and Networks (SIN) |
|
2012
|
Guha, R. |
A tale of nine Internet exchange points: studying path latencies through major regional IXPs | IEEE Conf. on Local Computer Networks (LCN) |
|
2012
|
Guha, R. |
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks | IEEE Conf. on Local Computer Networks (LCN) |
|
2012
|
Kaplan, H. Korenfeld, B. Morrison, A. Tarjan, R.E. |
CBTree: A practical concurrent self-adjusting search tree | Distributed Computing (DISC) |
|
2012
|
Hsu, W. Lee, M.L. Patel, D. |
Top-k maximal influential paths in network data | Database and Expert Systems Applications |
|
2012
|
Bin, L. |
Stream data analysis for backbone network intrusion detection system | Conf. on Oxide Materials for Electronic Engineering (OMEE) |
|
2012
|
Zhang, G. Lind, T. Liua, J. |
HDLBR: A name-independent compact routing scheme for power-law networks | Computer Communications |
|
2012
|
Draief, M. Jadbabaie, A. |
Structural analysis of viral spreading processes in social and communication networks using egonets | arxiv.org |
|
2012
|
Wang, H. Yang, J. |
Flattening and preferential attachment in the internet evolution | Network Operations and Management Symposium (APNOMS) |
|
2012
|
Selvakumar, S. |
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems | Computer Communications |
|
2012
|
|
Protecting anonymity in the presence of autonomous system and internet exchange level adversaries | Univ. of Illinois at Urbana-Champaign |
|
2012
|
Dorogovtsev, S.N. Oliveira, J.G. Mendes, J.F.F. |
Localization and spreading of diseases in complex networks | Phys. Rev. Lett. |
|
2012
|
Couderty, D. Lancin, A. |
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs | Project-Team MASCOTTE, INRIA |
|
2012
|
Lehrieder, F. Hossfeld, T. Seedorf, J. |
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms | Teletraffic Congress (ITC) |
|
2012
|
Kaune, S. Miles, S. El-khatib, Y. Mauthe, A. Taweel, A. |
A trace-driven analysis of caching in content-centric networks | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2012
|
|
Inter-domain incentives and Internet architecture | Aalto Univ., FI |
|
2012
|
Labatut, V. Cherifi, H. |
Comparative evaluation of community detection algorithms: a topological approach | J. Stat. Mechanics: Theory and Experiment |
|
2012
|
Congdon, P. |
Hey, you darned counters!: get off my ASIC! | Workshop on Hot topics in software defined networks (HotSDN) |
|
2012
|
Hopper, N. |
New attacks on timing-based network flow watermarks | Usenix Security Symp. |
|
2012
|
Guan, H. Xie, G. Salamatian, K. |
Evaluating and Optimizing IP Lookup on Many Core Processors | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2012
|
Nava, L. Este, A. Salgarelli, L. |
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware | Wireless Communications and Mobile Computing Conf. (IWCMC) |
|
2012
|
Kurant, M. Markopoulou, A. |
2.5K-graphs: from sampling to generation | arxiv.org |
|
2012
|
Pomposini, M. Blefari-Melazzi, N. Salsano, S. |
Supporting the Web with an information centric network that routes by name | Computer Networks |
|
2012
|
Batalla, J.M. Chai, W.K. Sliwinski, J. |
Multi-criteria decision algorithms for efficient content delivery in content networks | Ann. Telecommunications |
|
2012
|
Chatzis, N. Feldmann, A. Sarrar, N. Uhlig, S. Willinger, W. |
Anatomy of a large european IXP | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications |
|
2012
|
Lima, S.R. |
Multiadaptive sampling for lightweight network measurements | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2012
|
Kim, D. Mahalingam, S. Tang, A. Wang, S. Ratnasamy, S. |
Netcalls: End host function calls to network traffic processing services | UC Berkeley |
|
2012
|
|
Toward building practical privacy enhancing technologies | Univ. Minnesota |
|
2012
|
Akinwumi, J. Esposito, F. Matta, I. |
On supporting mobility and multihoming in recursive internet architectures | Computer Communications |
|
2012
|
Tazaki, H. Harai, H. |
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network | Symp. on Applications and the Internet (SAINT) |
|
2012
|
Guha, R. |
Evaluating end-user network benefits of peering with path latencies | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2012
|
Yuan, R. Wang, W. Meng, D. Zhang, S. Li, J. |
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic | Conf. on Networking, Architecture and Storage (NAS) |
|
2012
|
Duan, R. Lu, J. Zhang, S. Dai, H. Liu, B. |
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy | Conf. on Distributed Computing Systems (ICDCS) |
|
2012
|
Weisser, M.-A. |
The inter-domain hierarchy in measured and randomly generated AS-level topologies | IEEE Conf. on Communications (ICC) |
|
2012
|
Tiago Quelhas, T. |
A theory for the connectivity discovered by routing protocols | IEEE/ACM Trans. on Networking (TON) |
|
2012
|
Kumar, K. Sachdeva, M. Sidhu, N. |
DDoS attack's simulation using legitimate and attack real data sets | J. Scientific and Engineering Research |
|
2012
|
Lima, S.R. |
Optimizing network measurements through self-adaptive sampling | Conf. on High Performance Computing and Communication (HPCC) |
|
2012
|
Li, N. |
Anonymizing network traces with temporal pseudonym consistency | Conf. on Distributed Computing Systems Workshops (ICDCSW) |
|
2012
|
Tokheim, S. |
Reliable broadcast contribution over the public Internet | Norwegian Univ. of Science and Technology |
|
2012
|
Bhuyan, L. Klefstad, R. |
Traffic-aware power optimization for network applications on multicore servers | Annual Design Automation Conf. |
|
2012
|
|
Models for the simulation of a name-based interdomain routing architecture | Aalto Univ., FI |
|
2012
|
Papadopolous, C. Massey, D. |
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks | IEEE/IFIP Conf. on Dependable Systems and Networks (DSN) |
|
2012
|
Kim, T. Yoo, S. Zhang, X. Lee, S.B. Gligor, V.D. Perrig, A. |
Sanctuary trail: refuge from Internet DDoS entrapment | Carnegie Mellon Univ. |
|
2012
|
Rodriguez-Perez, M. Fernandez-Veiga, M. Lopez-Garcia, C. |
Bounded energy consumption with dynamic packet coalescing | Networks and Optical Communications (NOC) |
|
2012
|
Li, W. Tessier, R. Wolf, T. |
Saving energy and improving TCP throughput with rate adaptation in Ethernet | IEEE Conf. on Communications (ICC) |
|
2012
|
Yang, Y. |
High speed multicast scheduling in hybrid optical packet switches with guaranteed latency | IEEE Trans. on Computers |
|
2012
|
Costa, L.H.M.K. |
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers | Computer Networks |
|
2012
|
Simoes, P. Boavida, F. |
Peer selection in P2P service overlays using geographical location criteria | Computational Science and Its Applications (ICCSA) |
|
2012
|
Muhlbauer, W. Yang, Y. Zhu, P. Lu, X. Plattner, B. |
Shedding light on the use of AS relationships for path inference | J. Communications and Networks |
|
2012
|
Jennings, B. Botvich, D. |
QoSPlan: A measurement based quality of service aware network planning framework | J. Network and Systems Management |
|
2012
|
Karlin, J. Schapira, M. Rexford, J. |
Optimizing the placement of implicit proxies | Princeton Univ. |
|
2012
|
|
Optimizing implicit proxy placement to evade traffic filters | Princeton Univ. |
|
2012
|
Zhang, X. |
Analysis of Internet robustness in attacks | Conf. on Systems and Informatics (ICSAI) |
|
2012
|
Sarac, K. |
Estimating network layer subnet characteristics via statistical sampling | Lecture Notes in Computer Science, Vol. |
|
2012
|
|
Security and economic implications of localizing traffic in overlay networks | Purdue Univ. |
|
2012
|
Wong, D.S. |
Anonymous overlay network supporting authenticated routing | Information Sciences |
|
2012
|
Donnet, B. |
On the dynamics of locators in LISP | Networking |
|
2012
|
Chan, S.G. |
Achieving high-bitrate overlay live streaming with proxy helpers | Packet Video Workshop (PV) |
|
2012
|
Fragopoulou, P. Markatos, E. Roussopoulos, M. |
ITA: Innocuous topology awareness for unstructured P2P networks | IEEE Trans. on Parallel and Distributed Systems, Vol. PP (99) |
|
2012
|
Tuncer, H. Shenoy, N. |
ISP tiered model based architecture for routing scalability | Conf. on Communications (ICC) |
|
2012
|
Chiarello, L. Leduc, G. |
DISco: A distributed information store for network challenges and their outcome | IEEE Conf. on Network Operations and Management Symposium (NOMS) |
|
2012
|
Su, J. Chang, R.K.C. |
LDC: Detecting BGP prefix hijacking by load distribution change | Parallel and Distributed Processing Symp. Workshops (IPDPSW) |
|
2012
|
|
CBTree: A practical concurrent self-adjusting search tree | Tel Aviv Univ., Israel |
|
2012
|
Gorinsky, S. |
Obscure giants: detecting the provider-free ASes | Networking |
|
2012
|
Souto, E. Sadok, D.H. |
An orchestration approach for unwanted Internet traffic identification | Computer Networks |
|
2012
|
Hu, C. He, K. Jiang, J. Liuy, B. |
Reducing power of traffic manager in routers via dynamic on/off-chip scheduling | IEEE INFOCOM |
|
2012
|
Gregori, E. Lenzini, L. Mainardi, S. Vecchio, A. |
On the feasibility of measuring the internet through smartphone-based crowdsourcing | Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) |
|
2012
|
Basuchowdhuri, P. Majumder, S. |
Spread of information in a social network using influential nodes | Advances in Knowledge Discovery and Data Mining |
|
2012
|
He, D. Psaras, I. Pavlou, G. |
Cache 'less for more' in information-centric networks | Networking |
|
2012
|
Lu, G. Qassrawi, M.T. Zhang, Y. Yu, X. |
Feature selection for optimizing traffic classification | Computer Communications |
|
2012
|
Yang, M.-C. |
RIHT: A novel hybrid IP traceback scheme | IEEE Transactions on Information Forensics and Security |
|
2012
|
Wang, Z. |
Collapse by cascading failures in hybrid attacked regional Internet | J. Security and Its Applications |
|
2012
|
Ziviani, A. |
Distributed assessment of the closeness centrality ranking in complex networks | Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX) |
|
2012
|
Yadav, B. Bansal, P. Raj, S. |
IPv4 to IPv6 shift: major challenges | J. Engineering and Innovative Technology (IJEIT) |
|
2012
|
|
Performance analysis of TCAMs in switches | Univ. Waterloo, Ontario, CA |
|
2012
|
Sahli, N. Kamoun, F. |
DDoS flooding attack detection scheme based on F-divergence | Computer Communications |
|
2012
|
Verdi, F.L. Magalhaes, M.F. |
Towards local routing state in the future internet | WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) |
|
2012
|
Hu, X. Zhao, D. Lu, X. |
Failure isolation based defense against Internet CXPST-like attack | J. Hybrid Information Technology |
|
2012
|
Zou, P. Jia, Y. Han, W. |
Traffic anomaly detection improvement based on spatial-temporal characteristics | Advanced Science Lett. |
|
2012
|
Zou, P. Jia, Y Han, W. |
An online learning and unsupervised traffic anomaly detection system | Advanced Science Lett. |
|
2012
|
Bi, J. Wu, J. Zhang, B. |
Catching popular prefixes at AS border routers with a prediction based method | Computer Networks |
|
2012
|
Hanniel, I. Keslassy, I. |
Estimators also need shared values to grow together | IEEE INFOCOM |
|
2012
|
Perkins, C. |
Harnessing Internet topological stability in Thorup-Zwick compact routing | IEEE INFOCOM |
|
2012
|
Le, F. |
A fresh look at inter-domain route aggregation | IEEE INFOCOM |
|
2012
|
Keslassy, I. |
The Bloom paradox: When not to use a Bloom filter? | IEEE INFOCOM |
|
2012
|
Kanizo, Y. Keslassy, I. |
The variable-increment counting Bloom filter | IEEE INFOCOM |
|
2012
|
Basu, P. Towsley, D. |
Multiple random walks to uncover short paths in power law networks | IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) |
|
2012
|
Yang, J. Liu, Z. Wang, H. Zhang, B. Zhang, W. |
AMIR: Another multipath interdomain routing | IEEE Conf. on Advanced Information Networking and Applications (AINA) |
|
2012
|
Guo, X. Zhang, C. Jiang, J. Wu, H. Liu, B. |
Tracking millions of flows in high speed networks for application identification | IEEE Conf. on Computer Communications (INFOCOM) |
|
2012
|
Bagnulo, M. Stanojevic, R. |
An economic side-effect for prefix deaggregation | IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) |
|
2012
|
Lee, D.K. Moon, S. |
Unmasking the growing UDP traffic in a campus network | Conf. Passive and Active Measurement (PAM) |
|
2012
|
Roca, V. Kaafar, M.A. Schuler, F. Roch, J.-L. |
IBTrack: an ICMP black holes tracker | hal.archives-ouvertes.fr |
|
2012
|
Zhang, B. Chan, S.-H.G. Cheung, G. Frossard, P. |
Coding and replication co-design for interactive multiview video streaming | IEEE INFOCOM |
|
2012
|
Kiyavash, N. Borisov, N. |
Non-blind watermarking of network flows | arxiv.org |
|
2012
|
Rodriguez-Perez, M. Fernandez-Veiga, M. Lopez-Garcia, C. |
Optimal configuration of energy-efficient ethernet | Computer Networks |
|
2012
|
Rossberg, M. Schaefer, G. |
Automatic creation of VPN backup paths for improved resilience against BGP-attackers | ACM Symp. on Applied Computing (SAC) |
|
2012
|
|
Scalable wavelet-based active network stepping stone detection | Air Force Inst. of Technology, Air Univ, |
|
2012
|
D'Angelo, G. Di Stefano, G. Frigioni, D. Maurizio, V. |
Engineering a new algorithm for distributed shortest paths on dynamic networks | Algorithmica |
|
2012
|
Su, S. Yang, Y. Ren, J. |
A more efficient hybrid approach for single-packet IP traceback | EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) |
|
2012
|
Yang, J. Wang, H. Zhang, B. Gao, L. Liu, Z. |
Multipath interdomain routing via deviation from primary path | Conf. on Information Networking (ICOIN) |
|
2012
|
Duffield, N. Kompella, R.R. |
Opportunistic flow-level latency estimation using consistent NetFlow | IEEE/ACM Trans. on Networking (TON) |
|
2012
|
Hay, D. Keslassy, I. |
Maximizing the throughput of cuckoo hashing in network devices | ComNet, Technion, Israel |
|
2012
|
Hofmeyr, S. Stelle, G. Forrest, S. |
Internet topology over time | arxiv.org |
|
2012
|
Yingjie, X. Yabo, D. |
ASTVA: DDoS-limiting architecture for Next Generation Internet | Adv. Materials Research |
|
2012
|
Keslassy, I. Cohen, R. |
Reducing the reordering delay in multi-core network processors | ComNet, Technion, Israel |
|
2012
|
Hattiwale, V.P. Ravindran, B. |
Adaptive network intrusion detection system using a hybrid approach | Conf. on Communication Systems and Networks (COMSNETS) |
|
2012
|
Le Merrer, E. Li, Z. Yaning Liu, Y. Simon, G. |
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV | Computer Networks |
|
2012
|
Cancellieri, M. Detti, A. Pomposini, M. Salsano, S. |
The CONET solution for information centric networking | Univ. of Rome |
|
2012
|
|
Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks | Univ. Autonoma de Madrid |
|
2012
|
|
Design, analysis, and implementation of effective network flow watermarking schemes | Univ. of Illinois at Urbana-Champaign |
|
2012
|
|
Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation | Chalmers Univ. of Technology, Gothenborg, Sweden |
|
2012
|
Amer, P.D. |
Transport layer reneging | Univ. of Delaware |
|
2012
|
D'Emidio, M. Frigioni, D. Maurizio, V. |
Engineering a new loop-free shortest paths routing algorithm | Symp. on Experimental Algorithms (SEA) |
2011
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2011
|
Wang, F. |
Behavioral graph analysis of Internet applications | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2011
|
Sivaraman, V. Zhao, Z. Russell, C. Thottan, M. |
Adapting router buffers for energy efficiency | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2011
|
ELHajj, I. |
Hop count variability | Conf. for Internet Technology and Secured Transactions (ICITST) |
|
2011
|
|
Evaluacion de desempeno de diversas arquitecturas de commutadores opticos | Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia |
|
2011
|
|
Can we study the topology of the Internet from the vantage points of large and small content providers? | Youngstown State Univ. |
|
2011
|
Chen, Y. Lall, A. |
Divergence in network traffic | Midstates Conf. on Undergraduate Research in Computer Science and Mathematics |
|
2011
|
Erikson, B. Barford, P. |
On the prevalence and characteristics of MPLS deployments in the open Internet | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2011
|
Peng, W. Su, J. |
Study on IP prefix hijacking in cloud computing networks based on attack planning | Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom) |
|
2011
|
Yu, L. Bai, H. |
Two propositions about geographical distributions of BitTorrent file resources | Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE) |
|
2011
|
Oliveira, R. Wang, Y. Su, S. Zhang, B. Bi, J. Zhang, H. Zhang, L. |
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement | IEEE J. Selected Areas in Communications |
|
2011
|
Ziviani, A. |
Distributed location of the critical nodes to network robustness based on spectral analysis | Latin American Network Operations and Management Symp. (LANOMS) |
|
2011
|
Ishibashi, K. |
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic | Conf. on Network Games, Control and Optimization (NetGCooP) |
|
2011
|
Jeong, T. Roman, H.E. Hong, J.W. |
Traffic dispersion graph based anomaly detection | Symp. on Information and Communication Technology (SolCT) |
|
2011
|
Markopoulou, A. |
Towards unbiased BFS sampling | IEEE J. Selected Areas in Communications |
|
2011
|
Aguiar, R.L. Steenkiste, P. |
Topological implications of cascading interdomain bilateral traffic agreements | IEEE J. Selected Areas in Communications |
|
2011
|
Norige, E. Kumar, S Lynch, B. |
Non-crypto hardware hash functions for high performance networking ASICs | Symp. on Architectures for Networking and Communications Systems (ANCS) |
|
2011
|
Nguyen, G.T.K. Caesar, M. Borisov, N. |
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability | ACM Conf. on Computer and Communications Security (CCS) |
|
2011
|
Kurant, M. Butts, C.T. Markopoulou, A. |
Practical recommendations on crawling online social networks | IEEE J. Selected Areas in Communications |
|
2011
|
Guha, R. |
Internet exchange points and Internet routing | Conf. on Network Protocols (ICNP) |
|
2011
|
Li, Y. Liu, Y.-J. Su, J.-S. |
Analysis of prefix hijacking based on AS hierarchical model | Conf. on Network and System Security (NSS) |
|
2011
|
Yang, Y. |
Pipelining multicast scheduling in all-optical packet switches with delay guarantee | International Teletraffic Congress (ITC) |
|
2011
|
Landa, R. Rio, M. |
Criticisms of modelling packet traffic using long-range dependence (extended version) | J. Computer and System Sciences |
|
2011
|
|
Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failures | Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam |
|
2011
|
|
Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias | Univ. Federal Do Rio de Janeiro, Brazil |
|
2011
|
Melazzi, N.B. Salsano, S. Pomposini, M. |
CONET: a content centric inter-networking architecture | ACM SIGCOMM Workshop on Information-Centric Networking (ICN) |
|
2011
|
Mohay, G. Tickle, A. Ahmed, E. |
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event | Conf. on Availability, Reliability and Security (ARES) |
|
2011
|
|
Examining change in Internet topology in terms of external events, April 2001 - April 2002 | Univ. of Nebraska at Omaha |
|
2011
|
Jeong, M.-W. Prabhakar, B. |
A flow- and packet-level model of the Internet | Univ. Michigan |
|
2011
|
Fernandez Anta, A. Mancuso, V. Rengarajan, B. Vasallo, P. Rizzo, G. |
A simple analytical model for energy efficient ethernet | IEEE Communications Lett. |
|
2011
|
Finochietto, J.M. Huiszoon, B. Lopez, V. Tarifeno, M. Aracil, J. Beghelli, A. |
Comparison in power consumption of static and dynamic WDM networks | Optical Switching and Networking |
|
2011
|
Reviriego, P. Hernandez, J.A. Maestro, J.A. Uruena, M.. |
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability | Optical Switching and Networking |
|
2011
|
Yang, S.J. |
Characterizing transition behaviors in Internet attack sequences | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2011
|
Anunziata, D. Beiro, M.G. Barrat, A. Dall'Asta, L. Vespignani, A. |
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool) | Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires |
|
2011
|
Shmatikov, V. |
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing | Conf. on Dependable Systems and Networks (DSN) |
|
2011
|
Paul, R.R. Kim, M.S. |
Netshuffle: Improving traffic trace anonymization through graph distortion | IEEE Conf. on Communications (ICC) |
|
2011
|
Anitha, R. |
Evaluating machine learning algorithms for detecting DDoS attacks | Advances in Network Security and Applications (CNSA) |
|
2011
|
Mooney, G. Perkins, C. |
Compact routing on the Internet AS-graph | IEEE Conf. on Computer Communications (INFOCOM) |
|
2011
|
Keslassy, I. |
The Bloom paradox: When not to use a Bloom filter | ComNet, Technion, Israel |
|
2011
|
Laufer, R. Fernandes, N.C. Duarte, O.C.M.B. |
A stateless traceback technique for identifying the origin of attacks from a single packet | IEEE Conf. on Communications (ICC) |
|
2011
|
Dai, B. Zhu, P. Su, J. |
Whom to convince? It really matters in BGP prefix hijacking attack and defense | Future Information Technology |
|
2011
|
Yuksel, M. Gunes, M.H. |
On the scalability of path exploration using opportunistic path-vector routing | IEEE Conf. on Communications (ICC) |
|
2011
|
|
Interactive visualization of global routing dynamics | Technische Univ. Muenchen, Faculty of Informatics |
|
2011
|
Barakat, C. Marzulli, M. |
Spectral models for bitrate measurement from packet sampled traffic | IEEE Trans. on Network and Service Management |
|
2011
|
Lenzini, L. Orsini, C. |
k-clique communities in the Internet AS-level topology graph | Distributed Computing Systems Workshops (ICDCSW) |
|
2011
|
Silva, E. Bernardo, L. Pinto, P. |
Inter-domain traffic engineering using an AS-level multipath routing architecture | IEEE Conf. on Communications (ICC) |
|
2011
|
Kitisin, S. Gertphol, S. |
A study of autonomous system relationships within Thailand | Conf. on Computer Science and Software Engineering (JCSSE) |
|
2011
|
Reed, M.J. |
Optimising rule order for a packet filtering firewall | Conf. on Network and Information Systems Security (SAR-SSI) |
|
2011
|
Xiang, F. Yibo Xue, Y. Jun Li, J. |
Towards high-performance network application identification with aggregate-flow cache | arxiv.org |
|
2011
|
|
Analysis of cooperative management strategies against route-hijacking | IFIP/IEEE Symp. on Integrated Network Management (IM) |
|
2011
|
Wang, F. Gu, L. |
Network-aware behavior clustering of Internet end hosts | IEEE Conf. on Computer Communications (INFOCOM) |
|
2011
|
Greiner, M. |
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics | EPL (Europhysics Letters) |
|
2011
|
Rahman, A.H. Amer, P.D. |
Misbehaviors in TCP SACK generation | ACM SIGCOMM Computer Communication Review |
|
2011
|
Gringoli, F. Salgarelli, L. |
Quantifying the accuracy of the ground truth associated with Internet traffic traces | Computer Networks |
|
2011
|
Zhu, P. Xiong, N. Xiao, Y. Xiaofeng, H. |
How resilient are individual ASes against AS-level link failures? | IEEE Conf. on Computer Communications (INFOCOM) |
|
2011
|
Karaliopoulos, M. Muehlbauer, W. Zhu, P. Lu, X. Plattner, B. |
k-Fault tolerance of the Internet AS graph | Computer Networks |
|
2011
|
Chen, H. Christianson, B. |
An enhanced fuzzy ARM approach for intrusion detection | J. Digital Crime and Forensics |
|
2011
|
Kooij, R. Scoglio, C. |
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics | J. Computational Science |
|
2011
|
Kvizhinadze, G. |
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies | Statistics and Probability Letters |
|
2011
|
Huiszoon, B. Lopez, V. Coenen, R.B. Hernandez, J.A. Maestro, J.A. |
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links | IEEE J. Selected Topics in Quantum Electronics |
|
2011
|
Katoh, T. Bista, B.B. Takata, T. |
Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace | Advanced Information Networking and Applications (WAINA) |
|
2011
|
Hackett, A. Porter, M.A. Mucha, P.J. Gleeson, J.P. |
The unreasonable effectiveness of tree-based theory for networks with clustering | Phys. Rev. E |
|
2011
|
Yu, M. Rexford, J. |
Online measurement of large traffic aggregates on commodity switches | Usenix Conf. Hot-ICE |
|
2011
|
Yang, S.J. |
Discovering collaborative cyber attack patterns using social network analysis | Conf. on Social computing, behavioral-cultural modeling and prediction (SBP) |
|
2011
|
Beiro, M.G. Busch, J.R. |
Understanding edge connectivity in the Internet through core decomposition | Internet Mathematics |
|
2011
|
Borisov, N. |
SWIRL: A scalable watermark to detect correlated network flows | Symp. on Network and Distributed System Security (NDSS) |
|
2011
|
Weisser, M.-A. |
Internet topology on as-level: Model, generation methods and tool | IEEE Performance Computing and Communications Conf. (IPCC) |
|
2011
|
|
Preventing encrypted traffic analysis | Univ. Illinois at Urbana-Champagne |
|
2011
|
Sun, Y. Valgenti, V.C. Kim, M.S. |
TrustGuard: A flow-level reputation-based DDoS defense system | Conf. on Consumer Communications and Networking (CCNC) |
|
2011
|
Lenzini, L Orsini, C. |
k-dense communities in the internet AS-level topology | Conf. on Communication Systems and Networks (COMSNETS) |
|
2011
|
Improta, A. Lenzini, L. Orsini, C. |
The impact of IXPs on the AS-level topology structure of the Internet | Computer Communications |
|
2011
|
Saganowski, L. Renk, R. Holubowicz, W. |
Statistical and signal-based network traffic recognition for anomaly detection | Expert Systems |
|
2011
|
Gorinsky, S. |
Impact of prefix hijacking on payments of providers | Conf. on Communication Systems and Networks (COMSNETS) |
|
2011
|
Andrysiak, T. Choras, M. Renk, R. |
Expansion of matching pursuit methodology for anomaly detection in computer networks | Advances in Intelligent and Soft Computing |
|
2011
|
Lopez, D.R. Barros, A.B. |
Predictive models of network traffic load | Studies in Computational Intelligence |
|
2011
|
|
Assuring network service with bandwidth and integrity based fairness | Univ. of Illinois at Urbana-Champaign |
2010
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2010
|
Hu, C. Jiang, J. Zhou, Y. Liu, B. |
A2C: Anti-attack counters for traffic measurement | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2010
|
Acharya, K. Raja, M.Y.A. |
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks | High-Capacity Optical Networks and Enabling Technologies (HONET) |
|
2010
|
Bofeng, Z. Fei, W. Jinshu, S. |
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system | J. of Next Generation Information Technology |
|
2010
|
Magharei, N. Rejaie, R. Willinger, W. |
Eyeball ASes: from geography to connectivity | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2010
|
Tsokanos, A. Kouvatsos, D.D. |
Dynamic OBS offset allocation in WDM networks | Computer Communications |
|
2010
|
Heidemann, J. |
Selecting representative IP addresses for internet topology studies | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2010
|
Berger, A. Xie, G.G. |
Primitives for active internet topology mapping: toward high-frequency characterization | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2010
|
Canini, M. |
Evolution of cache replacement policies to track heavy-hitter flows | Symp. on Architectures for Networking and Communications Systems (ANCS) |
|
2010
|
Bi, J. Zhou, Z. |
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes | ACM SIGCOMM Computer Communication Review |
|
2010
|
Zhao, H. Yang, B. Sun, H. |
AS-level Internet macroscopic topology centralization evolvement analysis | J. Software Engineering and Applications |
|
2010
|
Kompella, R. |
CLAMP: Efficient class-based sampling for flexible flow monitoring | Computer Networks |
|
2010
|
Akinwumi, J. Esposito, F. Matta, I. |
On supporting mobility and multihoming in recursive internet architectures | Boston Univ., CS Dept. |
|
2010
|
Zhao, J. Wang, X. |
Trading bandwidth for playback lag: Can active peers help? | Multi-media Conf. |
|
2010
|
Schapira, M. Hummon, P. Rexford, J. |
How secure are secure interdomain routing protocols? | ACM SIGCOMM Computer Communication Review |
|
2010
|
Soto, M. Viennot, L. |
Autour du caractere arborescent d'Internet | MajecSTIC |
|
2010
|
Guha, R. |
Impact of Internet exchange points on Internet topology evolution | Conf. on Local Computer Networks (LCN) |
|
2010
|
Weisser, M.-A. |
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy | IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) |
|
2010
|
Hay, D. Keslassy, I. |
Hash tables with finite buckets are less resistant to deletions | Allerton Conf. on Communication, Control and Computing |
|
2010
|
Esaki, H. |
Estimating AS relationships for application-layer traffic optimization | Workshop on Incentives, Overlays, and Economic Traffic Control (ETM) |
|
2010
|
Esaki, H. |
Towards interdomain transit traffic reduction in peer-assisted content delivery networks | Symp. on Telecommunications Network Strategy and Planning (NETWORKS) |
|
2010
|
Bakar, A. |
A chi-square testing-based intrusion detection model | Conf. on Cybercrime Forensics Education and Training (CFET ) |
|
2010
|
|
Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas | Facultad de Informatica, Univ. Nacional de la Plata |
|
2010
|
Hege, G. Schmidt, T.C. Wahlisch, M. |
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP | Principles, Systems and Applications of IP Telecommunications (IPTComm) |
|
2010
|
Wang, N. Tafazolli, R. Moessner, K. |
Policy-aware virtual relay placement for inter-domain path diversity | IEEE Symp. on Computers and Communications (ISCC) |
|
2010
|
Taleb, T. Vasilakos, A.V. Guizani, M. Kato, N. |
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis | IEEE/ACM Trans. on Networking (TON) |
|
2010
|
Ramos, J. Salvador, A. de Vergara, J.E.L. Aracil, J. Cuadra, A. Cutanda, M. |
Application of Internet traffic characterization to all-optical networks | Conf. on. Transparent Optical Networks (ICTON) |
|
2010
|
Toh, W.S.B. Teow, L.N. |
Efficient extraction of high-betweenness vertices | Conf. on Advances in Social Networks Analysis and Mining (ASONAM) |
|
2010
|
Weibing, Y. Mingyu, C. Xiaofang, Z. Jianping, F. |
Robust TCP reassembly with a hardware-based solution for backbone traffic | Conf. on Networking, Architecture and Storage (NAS) |
|
2010
|
Clegg, R. Rio, M. |
Forecasting full-path network congestion using one bit signalling | IEEE Conf. on Communications (ICC) |
|
2010
|
Larrabeiti, D. Maestro, J.A. |
Would energy efficient ethernet be effective on 10Gbps optical links? | OSA Photonics in Switching (PS), Monterey, CA |
|
2010
|
Franke, B. |
Empirical evaluation of data transformations for network infrastructure applications | Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X) |
|
2010
|
Rougier, J. Secci, S. |
Characterisation of AS-level path deviations and multipath in Internet routing | EURO-NF Conf. on Next Generation Internet (NGI) |
|
2010
|
Wang, F. Gong, B. Li, L. |
Identifying heavy-hitter flows fast and accurately | Conf. on Future Computer and Communication (ICFCC) |
|
2010
|
Wang, Z. |
On an IBA topology model for internet topology structure | Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) |
|
2010
|
Sanchez-Macian, A. Maestro, J.A. Bleakley, C.J. |
Increasing the MTU size for energy efficiency in ethernet | IET Signals and Systems Conf. (ISSC) |
|
2010
|
Carpenter, B.E. Brownlee, N. |
Observations of UDP to TCP ratio and port numbers | Conf. on Internet Monitoring and Protection (ICIMP) |
|
2010
|
Goebel, V. Plagemann, T. Siekkinen, M. |
Resource adaptive distributed information sharing | Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE ) |
|
2010
|
Goncalves, P. Vicat-Blanc Primet, P. Dupas, A. |
Traffic classification techniques supporting semantic networks | Conf. on Wireless Communications and Mobile Computing |
|
2010
|
Eidenbenz, S. Thulasidasan, S. Datta, P. Ramaswamy, V. |
Criticality analysis of Internet infrastructure | Computer Networks |
|
2010
|
Novak, R. Kandus, G. |
The impact of network topology on the performance of MAP selection algorithms | Computer Networks |
|
2010
|
Antikainen, M. |
Canopy: publish/subscribe with upgraph combination | IEEE Conf. on Computer Communications (INFOCOM) |
|
2010
|
|
Incentive-informed inter-domain multicast | IEEE Conf. on Computer Communications (INFOCOM) |
|
2010
|
|
Achieving flexibility and performance for packet forwarding and data center management | UC Berkeley |
|
2010
|
Duffield, N. Kompella, R. |
Two samples are enough: Opportunistic flow-level latency estimation using NetFlow | IEEE Conf. on Computer Communications (INFOCOM) |
|
2010
|
Chen, K. Chen, Y. Liu, B. |
Evaluating potential routing diversity for internet failure recovery | IEEE Conf. on Computer Communications (INFOCOM) |
|
2010
|
Wang, X-G Zhang, S-Y |
Robustness of networks against cascading failures | Physica A: Statistical Mechanics and its Applications |
|
2010
|
Fang, B.X. Zhang, Y.Z. |
Parallelizing weighted frequency counting in high-speed network monitoring | Computer Communications |
|
2010
|
Oliveira, R. Zhang, H. Zhang, L. |
Quantifying the pitfalls of traceroute in AS connectivity inference | Conf. Passive and Active Measurement (PAM) |
|
2010
|
Du, F. Wu, T-J |
Partially ordered sets in complex networks | J. Phys. A: Math. Theor. |
|
2010
|
Merindol, P. Donnet, B. Bonaventura, O. |
Extracting intra-domain topology from mrinfo probing | Conf. Passive and Active Measurement (PAM) |
|
2010
|
Matray, P. Haga, P. Sebok, T. Csabai, I. Vattay, G. |
Spotter: a model based active geolocation service | IEEE Conf. on Computer Communications (INFOCOM) |
|
2010
|
Hu, P. Li, P. |
Study on classification and characteristics of source address spoofing attacks in the Internet | IEEE Conf. on Networking (ICN) |
|
2010
|
Fang, B.X. Zhang, Y.Z. |
Identifying heavy hitters in high-speed network monitoring | Science China Information Sciences |
|
2010
|
Meitinger, M. Wild, T. Herkersdorf, A. |
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors | Dynamically reconfigurable systems, architectures, design methods and applications |
|
2010
|
Stone, A. Strout, M. Massey, D. |
Simulating internet scale topologies with metarouting | Colorado State Univ. |
|
2010
|
Hu, C. Zhang, W. Chen, Y. Liu, B. |
On the eyeshots of BGP vantage points | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2010
|
Ganhao, F. Assuncao, C. Bernardo, L. Pinto, P. |
Scalable multi-region routing at inter-domain level | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2010
|
Foag, J. Koch, R. Maehle, E. Pionteck, T. |
DynaCORE - dynamically reconfigurable coprocessor for network processors | Dynamically reconfigurable systems, architectures, design methods and applications |
|
2010
|
|
Efficient internet topology discovery techniques | Univ. of Waikato, New Zealand |
|
2010
|
|
Characterization and classification of internet backbone traffic | Chalmers Univ. of Technology, Gothenborg, Sweden |
|
2010
|
D'Angelo, G. Di Stefanoa, G. Frigioni, D. |
Partially dynamic efficient algorithms for distributed shortest paths | Theoretical Computer Science |
|
2010
|
Bofeng, Z. Fei, W. Jinshu, S. |
A study of hinge-transmit property of BGP routing system | Forum on Computer Science-Technology and Applications (IFCSTA) |
|
2010
|
Meitinger, M. Wild, T. Herkersdorf, A. |
An application-aware load balancing strategy for network processors | Conf. on High performance embedded architectures and compilers (HIPEAC) |
|
2010
|
Keslassy, I. |
The variable-increment counting Bloom filter | ComNet, Technion, Israel |
|
2010
|
Naous, J. Liu, J. Zarifis, K. Casado, M. Koponen, T. Shenker, S. Breslau, L. |
Bridging the software/hardware forwarding divide | anon. |
2009
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2009
|
Perkins, C. |
Deterministic, reduced-visibility inter-domain forwarding | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2009
|
Wang, C.-C. Bagchi, S. Shroff, N.B. |
Camouflaging timing channels in web traffic | Purdue Univ. |
|
2009
|
Sarela, M. Visala, K. Riihijarvi, J. |
Inter-domain rendezvous service architecture | PSIRP |
|
2009
|
Eliassi-Rad, T. |
Continuous time group discovery in dynamic graphs | Workshop on Analyzing Networks and Learning with Graphs (NIPS) |
|
2009
|
Choffnes, D.R. Potharaju, R. Chen, Y. Bustamante, F.E. Pei, D. Zhao, Y. |
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2009
|
|
Tiny buffers for electronic and optical routers | Stanford Univ. |
|
2009
|
Borisov, N. |
Preventing SSL traffic analysis with realistic cover traffic | ACM Conf. on Computer and Communications Security (CCS) |
|
2009
|
Van den Schrieck, V. Donnet, B. Bonaventure, O. Pansiot, J.-J. |
Quantifying ASes multiconnectivity using multicast information | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2009
|
Krishnamurthy, B. Willinger, W. |
IXP's: mapped? | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2009
|
Prasanna, V.K. |
Reducing dynamic power dissipation in pipelined forwarding engines | IEEE Conf. on Computer Design (ICCD) |
|
2009
|
Dusi, M. John, W. Chen, C. |
Analysis of UDP traffic usage on internet backbone links | Symp. on Applications and the Internet (SAINT) |
|
2009
|
Zhang, G.-Q. Cheng, S.-Q. Zhou, T. |
Symbiotic effect: A guideline for network modeling | EPL (Europhysics Letters) |
|
2009
|
Perrig, A. |
The coremelt attack | Symp. on Research in Computer Security (ESORICS) |
|
2009
|
Changjia, C. |
Backup routing for BGP: Virtual ring routing scheme | IEEE Conf. on Computer Science and Information Technology (ICCSIT) |
|
2009
|
Parish, D.J. |
Using wavelets for compression and detecting events in anomalous network traffic | Conf. on Systems and Networks Communication |
|
2009
|
Dias, B. Sousa, P. |
Automated and distributed network service monitoring | Asia-Pacific Network Operations and Management Symp. (APNOMS) |
|
2009
|
Gringoli, F. Salgarelli, L. |
Support Vector Machines for TCP traffic classification | Computer Networks |
|
2009
|
Suchara, M. |
Protecting DNS from routing attacks: a comparison of two alternative anycast implementations | IEEE Security and Privacy |
|
2009
|
|
Message traceback systems. Dancing with the devil | Univ. of Newcastle upon Tyne |
|
2009
|
Dou, W. |
An efficient algorithm for AS path inferring | Conf. on Hybrid Information Technology |
|
2009
|
Sahli, N. Kamoun, F. |
Joint entropy analysis model for DDoS attack detection | Conf. on Information Assurance and Security (IAS) |
|
2009
|
Suzuki, M. Hazeyama, H. Uda, S. Miyachi, T. Kadobayashi, Y. Shinoda, Y. |
Experiences in emulating 10K AS topology with massive VM multiplexing | ACM workshop on Virtualized infrastructure systems and architectures |
|
2009
|
Rimondini, M. Corea, M. Di Battista, G. |
On the feasibility of static analysis for BGP convergence | IFIP/IEEE Symp. on Integrated Network Management (IM) |
|
2009
|
Esaki, H. |
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs | Asia Future Internet summer school, Jeju, Korea |
|
2009
|
Bernardo, L. Pinto, P. |
DTIA: An Architecture for Inter-Domain Routing | IEEE Conf. on Communications (ICC) |
|
2009
|
Sahli, N. Kamoun, F. |
A traffic coherence analysis model for DDoS attack detection | Conf. on Security and Cryptography (SECRYPT) |
|
2009
|
Moonen, L.S. Spieksma, F.C.R. Vukadinovic, D. |
Connectivity measures for internet topologies on the level of autonomous systems | Operations Research |
|
2009
|
Jennings, A. |
Relay node selection in large-scale VoIP overlay networks | Conf. on Ubiquitous and Future Networks (ICUFN) |
|
2009
|
Zhang, W. |
A power-law approach on router-level internet macroscopic topology modeling | Fuzzy Information and Engineering, Volume 2 |
|
2009
|
Shir, E. Weinsberg, U. |
Near-deterministic inference of AS relationships | Conf. on Telecommunications (ConTEL) |
|
2009
|
Schubert, A. Telcs, A. |
Lobby index in networks | Physica A: Statistical Mechanics and its Applications |
|
2009
|
Akinwumi, J. Matta, I. |
On the cost of supporting multihoming and mobility | Boston Univ., CS Dept. |
|
2009
|
|
The quantitative comparison of computer networks | UC Davis |
|
2009
|
Esaki, H. |
A methodology for magnitude-based inter-AS distance estimation | WIT, Hokkaido, Japan |
|
2009
|
Zhao, H. |
An improved BA model for router-level internet macroscopic topology | IAENG J. Computer Science |
|
2009
|
Donnet, B. Bonaventure, O. |
On the impact of clustering on measurement reduction | IFIP-TC6 Networking Conf. (NETWORKING) |
|
2009
|
Refice, T. Cittadini, L. Di Battista, G. |
Measuring route diversity in the internet from remote vantage points | IEEE Conf. on Networking (ICN) |
|
2009
|
Giovannetti, E. |
Asymmetry and discrimination in Internet peering: evidence from the LINX | J. Industrial Organization |
|
2009
|
Shavitt, Y. Shir, E. |
Near-deterministic inference of AS relationships | IEEE Conf. on Computer Communications (INFOCOM) |
|
2009
|
Kompella, R. |
A framework for efficient class-based sampling | IEEE Conf. on Computer Communications (INFOCOM) |
|
2009
|
Mahonen, P. Wellens, M. |
Measuring complexity and predictability in networks with multiscale entropy analysis | IEEE Conf. on Computer Communications (INFOCOM) |
|
2009
|
Cui, Y. Lu, Y. Xue, Y. |
Locality-awareness in BitTorrent-like P2P applications | IEEE Trans. on Multimedia |
|
2009
|
Hiraoka, Y. Murata, M. |
Evaluation of free-riding traffic problem in overlay routing and its mitigation method | Conf. on Networking and Services (ICNS) |
|
2009
|
Avramopoulos, I. Rexford, J. Druschel, P. |
NetReview: detecting when interdomain routing goes wrong | Usenix Symp. on Networked Systems Design and Implementation (NSDI) |
|
2009
|
Holder, L. Cook, D. |
Identifying threats using graph-based anomaly detection | Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4 |
|
2009
|
|
Measuring the impacts of sampling bias on internet AS-level topology inference | WRI Conf. on Communications and Mobile Computing (CMC) |
|
2009
|
Gyires, T. |
Does the internet still demonstrate fractal nature? | IEEE Conf. on Networking (ICN) |
|
2009
|
Baden, R. Spring, N. Bhattacharjee, B. |
Triangle inequality and routing policy violations in the internet | Conf. Passive and Active Measurement (PAM) |
|
2009
|
|
Search and analysis of backbone traffic measurements in the internet | Technische Univ. Berlin |
|
2009
|
Sarac, K. |
Analyzing router responsiveness to active measurement probes | Conf. Passive and Active Measurement (PAM) |
|
2009
|
Paruchuri, V. Barolli, L. |
Fast autonomous system traceback | J. Network and Computer Applications |
|
2009
|
Liu, L. Guo, X. Xu, K. |
Modeling the IPv6 internet AS-level topology | Physica A: Statistical Mechanics and its Applications |
|
2009
|
Gyires, T. |
Levy flights and fractal modeling of internet traffic | IEEE/ACM Trans. on Networking (TON) |
|
2009
|
Pussep, K. Leng, C. Kovacevic, A. Tyson, G. Steinmetz, R. |
Modelling the internet delay space based on geographical locations | Conf. on Parallel, Distributed and Network-based Processing |
|
2009
|
Cao, Y. Cui, Y. Xue, Y. |
On scalability of proximity-aware peer-to-peer streaming | Computer Communications |
|
2009
|
Yagil, D. Elovici, Y. Braha, D. |
Collaborative attack on internet users' anonymity | Internet Research |
|
2009
|
Molina, G. Baiocchi, A. Rizzi, A. |
On the fly application flows identification by exploiting K-means based classifiers | J. Information Assurance and Security |
|
2009
|
Hay, D. Keslassy, I. |
Optimal dynamic hash tables | ComNet, Technion, Israel |
|
2009
|
van Moorsel, A. |
COTraSE Connection Oriented Traceback in Switched Ethernet | J. Information Assurance and Security |
2008
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2008
|
Jiang, T.M. Wu, A. |
A virtual service framework for service composition QoS based on active measurement | Symp. on Service-Oriented System Engineering (SOSE) |
|
2008
|
Tsourakakis, C. Appel, A.P. Faloutsos, C. Leskovec, J. |
HADI: Fast diameter estimation and mining in massive graphs with Hadoop | Carnegie Mellon Univ. |
|
2008
|
Nakao, A. Hasegawa, T. Ogishi, T. Yamamoto, S. |
AS alliance: cooperatively improving resilience of intra-alliance communication | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2008
|
Alvarez-Hamelin, J.I. Busch, J.R. |
A low complexity visualization tool that helps to perform complex systems analysis | New J. Physics |
|
2008
|
De Los Rios, P. |
Structural efficiency of percolated landscapes in flow networks | Plos One |
|
2008
|
Sanchez-Garcia, R.J. Anderson, J.W. |
Symmetry in complex networks | Discrete Applied Mathematics |
|
2008
|
Parameswaran, S. |
MCAD: Multiple connection based anomaly detection | IEEE Conf. on Communication Systems (ICCS) |
|
2008
|
Koponen, T. Moon, D. Shenker, S. |
Rethinking packet forwarding hardware | ACM SIGCOMM HotNets Workshop |
|
2008
|
Novak, R. |
Policy relationship annotations of predefined AS-level topologies | Computer Networks |
|
2008
|
Tan, W. Xiao, R. |
A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems | Symp. on Computer and Computational Sciences (IMSCSS) |
|
2008
|
Maiolini, G. Molina, G. Rizzi, A. |
On-the-fly statistical classification of internet traffic at application layer based on cluster analysis | Workshop on Computational Intelligence in Security for Information Systems (CISIS) |
|
2008
|
Dong, Y. Lu, D. Jin, G. |
Optimal control of DDoS defense with multi-resource max-min fairness | Conf. on Cybernetics and Intelligent Systems |
|
2008
|
Riley, G. Jaafar, T. |
Realistic topology modeling for the internet BGP infrastructure | IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) |
|
2008
|
Gringoli, F. Salgarelli, L. |
IP traffic classification for QoS guarantees: the independence of packets | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2008
|
|
Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien | Hochschule fuer Angewandte Wissenschaften Hamburg, Germany |
|
2008
|
Lee, H. Kim, H. |
Fast detection and visualization of network attacks on parallel coordinates | Computers and Security |
|
2008
|
Mahonen, P. Wellens, M. |
Metrics for characterizing complexity of network traffic | Conf. on Telecommunications (ICT) |
|
2008
|
Barriga, A. Lopez, D.R. Sanchez-Solano, S. |
Linguistic summarization of network traffic flows | IEEE Conf. on Fuzzy Systems (FUZZ-IEEE) |
|
2008
|
Kider, J.T. |
All-pairs shortest-paths for large graphs on the GPU | ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware |
|
2008
|
Chen, C. |
Exploring possible strategies for competitions between Autonomous Systems | IEEE Conf. on Communications (ICC) |
|
2008
|
Pilkington, N. |
High level internet scale traffic visualization using Hilbert curve mapping | Workshop on Visualization for Computer Security (VizSEC) |
|
2008
|
Ansari, N. |
A router-based technique to mitigate reduction of quality (RoQ) attacks | Computer Networks |
|
2008
|
Magnien, C. |
Complex network measurements: estimating the relevance of observed properties | IEEE Conf. on Computer Communications (INFOCOM) |
|
2008
|
Febhar, E. Viennot, F. |
The inframetric model for the internet | IEEE Conf. on Computer Communications (INFOCOM) |
|
2008
|
Landa, R. Haddadi, H. Rio, M. Moore, A.W. |
Techniques for flow inversion on sampled data | IEEE INFOCOM Workshop Global Internet Symp. |
|
2008
|
Ohlendorf, R. Wild, T. Herkersdorf, A. |
A hardware packet re-sequencer unit for network processors | Architecture of Computing Systems (ARCS) |
|
2008
|
MacArthur, B.D. Wang, H. Xiong, M. Wang, W. |
Network quotients: structural skeletons of complex systems | Phys. Rev. E |
|
2008
|
Mirkovic, J. |
Correcting congestion-based error in network telescope's observations of worm dynamics | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2008
|
Schmidt, T.C. Spalt, W. |
What is happening from behind?: Making the impact of internet topology visible | Campus-Wide Information Systems |
|
2008
|
Sallent, S. |
Adaptive shared-state sampling | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2008
|
|
Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic | UC Davis |
|
2008
|
Bi, J. Zhou, Z. |
A backscatter technology based study on source address spoofing | Periodical of Ocean Univ. of China |
|
2008
|
Zhao, H. Zhang, X. Ge, X. |
Research on the distribution of network nodes based on multiple measurement points | Computer Science |
|
2008
|
Katz-Bassett, E. Krishnamurthy, A. Anderson, T. Venkataramani, A. |
Consensus routing: the internet as a distributed system | Usenix Symp. on Networked Systems Design and Implementation (NSDI) |
|
2008
|
Suzuki, M. Miwa, S. Miyamoto, D. Kadobayashi, Y. |
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures | Conf. on Cyber Security Experimentation and Test |
|
2008
|
State, R. Festor, O. |
Activity monitoring for large honeynets and network telescopes | J. Advances in Systems and Measurements |
|
2008
|
Gringoli, F. Salgarelli, L. |
An SMV-based approach to traffic classification | Univ. of Brescia |
2007
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2007
|
Moors, T. |
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2007
|
Uhlig, S. Fu, B. Meulle, M. Maennel, O. |
In search for an appropriate granularity to model routing policies | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications |
|
2007
|
Vila-Carbo, J. |
Network performance analysis based on histogram workload models | IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) |
|
2007
|
Francis, P. Zhang, X. |
A study of prefix hijacking and interception in the internet | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications |
|
2007
|
Ansari, N. |
A proactive test based differentiation to mitigate low rate DoS attacks | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2007
|
Lung, C.-H. Rabinovitch, P. |
A TCP connection establishment filter: symmetric connection detection | IEEE Conf. on Communications (ICC) |
|
2007
|
Latapy, M. Friedman, T. Salamatiana, K. |
Describing and simulating internet routes | Computer Networks |
|
2007
|
Pescape, A. Ventre, G. |
Worm traffic analysis and characterization | IEEE Conf. on Communications (ICC) |
|
2007
|
Pappu, P. Faloutsos, M. Mitzenmacher, M. Singh, S. Varghese, G. |
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation | UC Riverside |
|
2007
|
Haddadi, H. Landa, R. Rio, M. |
Towards informative statistical flow inversion | arxiv.org |
|
2007
|
Ji, C. |
Measuring network-aware worm spreading ability | IEEE Conf. on Computer Communications (INFOCOM) |
|
2007
|
Zhang, G.-Q. |
Chinese Internet AS-level topology | IET Communications |
|
2007
|
Gupta, V. Karagiannis, T. Gkantsidis, C. |
Sampling strategies for epidemic-style information dissemination | IEEE Conf. on Computer Communications (INFOCOM) |
|
2007
|
Wahlisch, M. Zhang, Y. |
On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing | IEEE Conf. on Networking (ICN) |
|
2007
|
Landa, R. Rio, M. Bhatti, S. |
Revisiting the issues on netflow sample and export performance | arxiv.org |
|
2007
|
Nagel, R. Hossfeld, T. Binzenhofer, A. Eger, K. |
Efficient simulation of large-scale P2P networks: modeling network transmission times | EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) |
|
2007
|
Chuah, C. Mohapatra, P. |
ProgME: towards programmable network measurement | ACM SIGCOMM Computer Communication Review |
|
2007
|
Zhang, Y. Mao, Z.M. Shin, K.G. |
Internet routing resilience to failures: analysis and implications | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2007
|
Gringoli, F. Karagiannis, T. |
Comparing traffic classifiers | ACM SIGCOMM Computer Communication Review |
|
2007
|
Zhao, H. Zhang, X. Yuan, S. |
Analysis on traveling time of internet | China Institute of Communications |
|
2007
|
Pappu, P. Faloutsos, M. Mitzenmacher, M. Singh, S. Varghese, G. |
Network monitoring using traffic dispersion graphs (TDGs) | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2007
|
Li, J. Ross, K.W. |
Can internet video-on-demand be profitable? | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications |
|
2007
|
Vila-Carbo, J. |
A histogram-based stochastic process for finite buffer occupancy analysis | Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS) |
|
2007
|
|
Simulating internet traffic with Markov-modulated processes | UK Performance Engineering Workshop |
|
2007
|
Ji, C. |
Optimal worm-scanning method using vulnerable-host distributions | J. Security and Networks |
2006
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2006
|
Tyan, H.-R. Jay Kuo, C.-C. |
GA-based internet traffic classification technique for QoS provisioning | Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) |
|
2006
|
Raoult, P. Friedman, T. Crovella, M. |
Deployment of an algorithm for large-scale topology discovery | IEEE J. Selected Areas in Communications |
|
2006
|
Nishimura, S. Ishida, S. Nishi, H. |
Cache-based network processor architecture: evaluation with real network traffic | IEICE Transactions on Electronics |
|
2006
|
Latapy, M. Magoni, D. |
Relevance of massively distributed explorations of the internet topology: qualitative results | Computer Networks |
|
2006
|
Perrig, A. Song, D. |
StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense | IEEE J. Selected Areas in Communications |
|
2006
|
Varghese, G. Fisk, M. |
Bitmap algorithms for counting active flows on high speed links | IEEE/ACM Trans. on Networking (TON) |
|
2006
|
|
Markov-modulated on/off processes for long-range dependent internet traffic | arxiv.org |
|
2006
|
Ott, E. Hunt, B.R. |
Characterizing the dynamical importance of network nodes and links | Phys. Rev. Lett. |
|
2006
|
Monrose, F. Terzis, A. |
Fast and evasive attacks: highlighting the challenges ahead | Symp. on Recent Advances in Intrusion Detection (RAID) |
|
2006
|
Magnien, C. |
Measuring fundamental properties of real-world complex networks | arxiv.org |
|
2006
|
State, R. Festor, O. |
Tracking global wide configuration errors | IEEE Workshop on Monitoring, Attack Detection and Mitigation |
|
2006
|
Guan, Y. |
TOPO: a topology-aware single packet attack traceback scheme | Securecomm and Workshops |
|
2006
|
Mavrommatis, P. |
Identifying known and unknown peer-to-peer traffic | IEEE Symp. on Network Computing and Applications (NCA) |
|
2006
|
Kesidis, G. |
Toward a framework for forensic analysis of scanning worms | Emerging Trends in Information and Communication Security (ETRICS) |
|
2006
|
Friedman, T. |
Topology discovery using an address prefix based stopping rule | UNICE : Networks and Applications Towards a Ubiquitously Connected World |
|
2006
|
Lin, Y. Jin, Y. Cheng, S. |
Easily-implemented adaptive packet sampling for high speed networks flow measurement | Conf. on Computational Science (ICCS) |
|
2006
|
Gong, J. Yang, W. Liu, W. |
Disclosing the element distribution of Bloom filter | Conf. on Computational Science (ICCS) |
|
2006
|
Raoult, P. Friedman, T. |
Efficient route tracing from a single source | arxiv.org |
|
2006
|
Hwang, K. |
Collaborative change detection of DDoS attacks on community and ISP networks | IEEE Symp. on Collaborative Technologies and Systems (CTS) |
|
2006
|
Bestavros, A. |
Small-world characteristics of internet topologies and implications on multicast scaling | Computer Networks |
|
2006
|
Chiu, D.-M. Lui, J. |
Entropy based flow aggregation | IFIP-TC6 Networking Conf. (NETWORKING) |
|
2006
|
Giovannetti, E. |
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach | J. Competition Law and Economics |
|
2006
|
Vahdat, A. |
Realistic and responsive network traffic generation | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications |
|
2006
|
Fingerhut, J. F. Bonomi, F. |
Detecting evasion attacks at high speeds without reassembly | ACM SIGCOMM Computer Communication Review |
|
2006
|
Kaur, J. |
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth | Conf. Passive and Active Measurement (PAM) |
|
2006
|
Maschmeyer, J. Crowley, P. |
Exploiting locality to ameliorate packet queue contention and serialization | ACM Conf. on Computing Frontiers |
|
2006
|
Dovrolis, C. |
Why is the internet traffic bursty in short (sub-RTT) timescales? | ACM SIGMETRICS Performance Evaluation Review |
|
2006
|
|
Protecting TCP services from denial of service attacks | SIGCOMM workshop on Large-scale attack defense |
|
2006
|
Bayant, B. Friedman, T. |
Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives | ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT) |
|
2006
|
|
Modelling internet traffic using Markov chains | Imperial College, London, UK |
|
2006
|
Dash, D. Perrig, A. Zhang, H. |
Modeling adoptability of secure BGP protocols | Joint Conf. on Measurement and Modeling of Computer Systems |
2005
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2005
|
Moonen, L.S. Spieksma, F. Vukadinovic, D. |
Connectivity measures for internet topologies | K.U. Leuven |
|
2005
|
Zhou, W. |
Mark-aided distributed filtering by using neural network for DDoS defense | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2005
|
Monrose, F. Terzis, A. |
Worm evolution tracking via timing analysis | ACM workshop on Rapid Malcode (WORM) |
|
2005
|
Van Mieghem, P. |
On properties of multicast routing trees | J. Communication Systems |
|
2005
|
Ji, C. |
Importance-scanning worm using vulnerable-host distribution | IEEE Global Telecommunications Conf. (GLOBECOM) |
|
2005
|
Lin, C. Ni, J. Ruan, D.-H. Zheng, B. Jiang, Y.-X. Peng, X. Wang, Y. Luo, A. Zhu, B. Yue, Y. Ren, F.-Y. |
Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN | IEEE Conf. on Local Computer Networks (LCN) |
|
2005
|
Paxson, V. Weaver, N. |
Exploiting underlying structure for detailed reconstruction of an internet-scale event | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2005
|
Estan, C. |
The power of slicing in internet flow measurement | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2005
|
Park, J.-M. |
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources | IEEE Conf. on Computer Communications and Networks (ICCCN) |
|
2005
|
Zhao, H. Xu, Y. Zhang, W.-B. |
Internet complex network separation degree analysis based on hops | J. China Inst. of Communications |
|
2005
|
Monrose, F. Terzis, A. |
On the effectiveness of distributed worm monitoring | Usenix Security Symp. |
|
2005
|
Hohna, N. Abry, P. |
Multifractality in TCP/IP traffic: the case against | Computer Networks |
|
2005
|
Raoult, P. Friedman, T. Crovella, M. |
Efficient algorithms for large-scale topology discovery | ACM SIGMETRICS Conf. on Measurement and modeling of computer systems |
|
2005
|
Friedman, T. |
A CIDR stopping rule for topology discovery | Algotel |
|
2005
|
John, A. Saran, H. |
PISA: Automatic extraction of traffic signatures | IFIP-TC6 Networking Conf. (NETWORKING) |
|
2005
|
Ishida, S. Nishi, H. |
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera | IEICE Transactions on Electronics |
|
2005
|
Perrig, A. Song, D. |
FIT: Fast Internet Traceback | IEEE Conf. on Computer Communications (INFOCOM) |
|
2005
|
Friedman, T. Crovella, M. |
Improved algorithms for network topology discovery | Conf. Passive and Active Measurement (PAM) |
|
2005
|
|
Affecting IP traceback with recent Internet topology maps | Iowa State Univ. |
2004
2003
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2003
|
Crovella, M. |
Virtual landmarks for the internet | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2003
|
Varghese, G. Fisk, M. |
Bitmap algorithms for counting active flows on high speed links | ACM SIGCOMM Conf. on Internet Measurement (IMC) |
|
2003
|
Byers, J.W. Crovella, M. Matta, I. |
On the geographic location of internet resources | J. on Selected Areas in Communications |
|
2003
|
Varghese, G. |
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice | ACM Transactions on Computer Systems (TOCS) |
|
2003
|
Savage, S. Varghese, G. |
Automatically inferring patterns of resource consumption in network traffic | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications |
|
2003
|
Marzullo, K. Savage, S. Voelker, G.M. |
Characterizing and measuring path diversity of internet topologies | ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) |
|
2003
|
Perrig, A. Song, D. |
Pi: a path identification mechanism to defend against DDoS attacks | IEEE Symp. on Security and Privacy |
2002
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
2002
|
Varghese, G. |
New directions in traffic measurement and accounting | ACM SIGCOMM Computer Communication Review |
1999
| Year | Author(s) | Title | Publication |
|---|---|---|---|
|
1999
|
Peterson, L. |
Inter-AS traffic patterns and there implications | IEEE Global Telecommunications Conf. (GLOBECOM) |
![[CAIDA - Cooperative Association for Internet Data Analysis logo]](/images/caida_globe_faded.png)