Skip to Content
[CAIDA - Cooperative Association for Internet Data Analysis logo]
The Cooperative Association for Internet Data Analysis
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of our datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|  View By:    date    dataset    publication    location  |
|  Citation Format:    abbreviated    complete  |

2014

Year Author(s) Title Publication
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
De Turck, F.
Latre, S.
Design and evaluation of learning algorithms for dynamic resource management in virtual networks IEEE/IFIP Network Operations and Management Symp. (NOMS)
2014
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
TDFA: Traceback-based defense against DDoS flooding attacks IEEE Int Conf. on Advanced Information Networking and Applications (AINA)
2014
Hasan, S.
Gorinsky, S.
Dovrolis, C.
Sitaraman, R.K.
Trade-offs in optimizing the cache deployments of CDNs IEEE Conf. on Computer Communications (INFOCOM)
2014
Mazloum, R.
Buob, M.-O.
Auge, J.
Baynat, B.
Ross, D.
Friedman, T.
Violation of interdomain routing assumptions Conf. Passive and Active Measurement (PAM)
2014
Laszka, A.
Johnson, B.
Grossklags, J.
Felegyhazi, M.
Estimating systematic risk in real-world networks Proc. Conf. on Financial Cryptography and Data Security
2014
Houmansadr, A.
Wong, E.L.
Shmatikov, V.
No direction home: The true cost of routing around decoys Network and Distributed System Security Symp. (NDSS)
2014
Fallah, M.S.
Kahani, N.
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks Security and Communication Networks
2014
Dundjerski, D.
Tomasevic, M.
Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols Concurrency Computation: Practice and Experience
2014
Abu-Ata, M.
Dragan, F.F.
Metric tree-like structures in real-life networks: an empirical study arxiv.org
2014
Xu, Y.
Ma, W.
Robustness analyses of Internet topology with power-law features Intl J. of Future Generation Communication and Networking
2014
Tan, F
Wu, J.
Xia, Y.
Tse, C.K.
Traffic congestion in interconnected complex networks arxiv.org
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Efficient implementation of error correction codes in hash tables Microelectronics Reliability
2014
Kudo, T.
Takin, T.
On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling Intl J. of Network Management
2014
Geva, M.
Herzberg, A.
Gev, Y.
Bandwidth Distributed Denial of Service: Attacks and defenses IEEE Security and Privacy
2014
Gansner, E.R.
Krishnamurthy, B.
Willinger, W.
Bustamante, F.E.
Sanchez, M.A.
Demo abstract: towards extracting semantics by visualizing large traceroute datasets Computing
2014
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoption IEEE/ACM Trans. on Networking

2013

Year Author(s) Title Publication
2013
Zhang, Y.
Sun, Y.
Zhang, J.
Xu, J.
Wu, Y.
An efficient framework for parallel and continuous frequent item monitoring Concurrency Computation: Practice and Experience
2013
Verigin, A.L. Evaluating the effectiveness of Sybil attacks against peer-to-peer botnets University of Victoria, Victoria, CA
2013
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
The multiple instances of node centrality and their implications on the vulnerability of ISP networks arxiv.org
2013
Lee, S.B.
Kang, M.S.
Gligor, V.D.
CoDef: Collaborative defense against large-scale link-flooding attacks Proc. ACM Conf. on Emerging networking experiments and technologies (CoNEXT)
2013
Huang S.Y., Huang Y. Network forensic analysis using growing hierarchical SOM IEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov)
2013
Herzberg, A.
Shulman, H.
Socket overloading for fun and cache-poisoning Annual Computer Security Applications Conf. (ACSAC)
2013
Freno, A.
Keller, M.
Tommasi, M.
Probability estimation over large-scale random networks via the Fiedler delta statistic Journal of Machine Learning Research
2013
Eriksson, B
Durairajan, R.
Barford, P.
RiskRoute: A framework for mitigating network outage threats Proc. ACM Conf. on Emerging networking experiments and technologies (CoNEXT)
2013
Eberle, W.
Holder, L.
Incremental anomaly detection in graphs Intl Conf. on Data Mining Workshops
2013
Seo, D.
Lee, H.
Perrig, A.
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks Computers and Security
2013
Luo, H.
Lin, Y.
Zhang, H.
Zukerman, M.
Preventing DDoS attacks by identifier/locator separation IEEE Network
2013
Larsen, R. Slow Port Scanning with Bro Gjovik Univ. College, Gjovik, Norway
2013
Johnson, A.
Wacek, C.
Jansen, R.
Sherr, M.
Syverson, P.
Users get routed: Traffic correlation on Tor by realistic adversaries ACM SIGSAC Conf. on Computer and Communications Security (CCS)
2013
Gersch, J.
Massey, D.
Characterizing vulnerability to IP hijack attempts IEEE Intl Conf. on Technologies for Homeland Security (HST)
2013
Chen, J.
Addie, R.G.
Zukerman, M.
Performance evaluation and service rate provisioning for a queue with fractional Brownian input Performance Evaluation
2013
Zhao, M.
Aditya, P.
Chen, A.
Lin, Y.
Haeberlen, A.
Druschel, P.
Maggs, B.
Wishon, B.
Ponec, M.
Peer-assisted content distribution in Akamai NetSession Proc. Internet Measurement Conf. (IMC)
2013
Vanaubel, Y.
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Network fingerprinting: TTL-based router signatures ACM SIGCOMM Conf. on Internet Measurement (IMC)
2013
Tidy, L.J.
Woodhead, S.
Wetherall, J.
Simulation of zero-day worm epidemiology in the dynamic, heterogeneous Internet J. Defense Modeling and Simulation: Applications, Methodology, Technology
2013
Schmidt, R.
Sadre, R.
Sperotto, A.
Pras, A.
Lightweight link dimensioning using sFlow sampling Intl Conf. on Network and Services Management (CNSM)
2013
Retvari, G.
Tapolcai, J.
Korosi, A.
Majdan, A.
Heszberger, Z.
Compressing IP forwarding tables: towards entropy bounds and beyond ACM SIGCOMM Computer Communication Review
2013
Papadopoulos, S.
Theodoridis, G.
Tzovaras, D.
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies Proc. Workshop on Visualization for Cyber Security (VizSec)
2013
Ma, L.
He, T.
Leung, K.K.
Swami, A.
Towsley, D.
Identifiability of link metrics based on end-to-end path measurements ACM SIGCOMM Conf. on Internet Measurement (IMC)
2013
Lee, M.
Duffield, N.
Kompella, R.R.
High-fidelity per-flow delay measurements with reference latency interpolation IEEE/ACM Trans. on Networking
2013
Khan, A.
Kwon, T.
Kim, H.
Choi, Y.
AS-level topology collection through looking glass servers Proc. Internet Measurement Conf. (IMC)
2013
Karaarslan, E.
Perez, A.G.
Siaterlis, C.
Recreating a large-scale BGP incident in a realistic environment Information Sciences and Systems , Proc Intl Symp. on Computer and Information Sciences
2013
Iqbal, M.F.
Holt, J.
Ryoo, J.H.
John, L.K.
de Veciana, G.
Flow migration on multicore network processors: Load balancing while minimizing packet reordering Intl Conf. on Parallel Processing (ICPP)
2013
Gilad, Y.
Herzberg, A.
Shulman, H.
Off-path hacking: the illusion of challenge-response authentication IEEE Security and Privacy
2013
Casey, C.J.
Sutton, A.
Dos Reis, G.
Sprintson, A.
Eliminating network protocol vulnerabilities through abstraction and systems language design Conf. on Network Protocols (ICNP)
2013
Sapegin, A.
Uhlig, S.
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events Computer Communications
2013
Karpowicz, M. On the design of energy-efficient service rate control mechanisms: CPU frequency control for Linux Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC)
2013
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack Hong Kong Univ. of Science and Technology
2013
Herzberg, A.
Shulman, H.
Vulnerable delegation of DNS resolution European Symp. on Research in Computer Security (ESORICS)
2013
Garfinkel, S.L.
Shick, M.
Passive TCP reconstruction and forensic analysis with tcpflow Naval Postgraduate School, Monterey, CA, US
2013
Frangoudis, P.A.
Ksentini, A.
Hadjadj-Aoul, Y.
Boime, G.
PTPv2-based metwork load estimation Intl IEEE Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS)
2013
Daryl, L.H.A. Toward large-graph comparison measures to understand Internet topology dynamics Naval Postgraduate School, Monterey, CA, US
2013
Moshref, M.
Yu, M.
Govindan, R.
Resource/accuracy tradeoffs in software-defined measurement ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN)
2013
Meirom, E.A.
Mannor, S.
Orda, A.
Network formation games and the Internet structure arxiv.org
2013
Megyesi, P.
Molnar, S.
Analysis of elephant users in broadband network traffic EUNICE/IFIP WG 6.6 Intl Workshop: Advances in Communication Networking
2013
Lian, W.
Rescorla, E.
Shacham, H.
Savage, S.
Measuring the practical impact of DNSSEC deploymen USENIX Conf. on Security (SEC)
2013
Lee, J.Y.
Oh, J.C.
A model for recursive propagations of reputations in social networks IEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining (ASONAM)
2013
Iqbal, M.F. Workload-aware network processors: improving performance while minimizing power consumption Univ. of Texas, Austin, TX, US
2013
Hu, Y.-H. A fluid-based approach for modeling network activities J Electr Electron Syst
2013
Coelho, N.
Salvador, P.
Nogueira, A.
Inter-operator traffic differentiation based on multiscale analysis ThinkMind, Intl Conf. on Advances in Future Internet (AFIN)
2013
Chabarek, J.
Barford, P.
What's in a name?: decoding router interface names Proc. ACM workshop on HotPlanet
2013
Bhatia, S. Detecting Distributed Denial-of-Service attacks and flash events Queensland University of Technology, Brisbane, Australia
2013
Wang, Y.
Wang, Z.
Zhang, L.
An epidemic-dynamics-based model for CXPST spreading in inter-domain routing system Proc. Intl Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA)
2013
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Reducing the cost of implementing error correction codes in content addressable memories IEEE Trans. on Circuits and Systems II: Express Briefs
2013
Nappa, A.
Rafique, M.Z.
Caballero1, J.
Driving in the cloud: An analysis of drive-by download operations and abuse reporting Proc. Intl Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
2013
Lu, N.
Wang, Y.
Su, S.
Yang, F.
Han, R.
Filtering location optimization for the reactive packet filtering Security and Communication Networks
2013
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing survivability of inter-domain routing system under cascading failures Frontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC)
2013
Kaur, B.
Kahlon, K.S.
Sharma, S.
Inter-domain routing with shielded infrastructure and buzzer technique Intl J. of Computer Applications
2013
Guo, Z.
Yang, Y.
High-speed multicast scheduling for all-optical packet switches Conf. on Networking, Architecture and Storage (NAS)
2013
Ghoshal, P.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for Software Defined Firewalls IEEE Conf. on Computer Communications and Networks (ICCCN)
2013
Santiago, S.S. Latency estimation of IP flows using NetFlow Univ. Politecnica de Catalunya, Barcelona, Spain
2013
Pacifici, V.
Dan, G.
Stable content-peering of autonomous systems in a content-centric network Swedish National Computer Networking Workshop (SNCNW)
2013
Namayanja, J.M.
Janeja, V.P.
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks IEEE Conf. on Intelligence and Security Informatics
2013
Misseri, X.
Gojmerac, I.
Rougier, J.-L.
IDRD: Enabling inter-domain route diversity IEEE Intl Conf. on Communications (ICC)
2013
Leira, R.
Gomez, P.
Gonzalez, I.
Lopez de Vergara, J.E.
Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardware Conf. on Smart Communications in Network Technologies (SaCoNeT)
2013
Lehrieder, F. Performance evaluation and optimization of content distribution using overlay networks Julius-Maximilians-Universitaet Wuerzburg, Wuerzburg, DE
2013
Joslyn, C.
Choudhury, S.
Haglin, D.
Howe, B.
Nickless, B.
Olsen, B.
Massive scale cyber traffic analysis: A driver for graph database research Intl Workshop on Graph Data Management Experiences and Systems (GRADES)
2013
Iacovazzi, A.
Baiocchi, A.
Investigating the trade-off between overhead and delay for full packet traffic privacy Intl Conf on Communications (ICC)
2013
Handigol, N.A. Using packet histories to troubleshoot networks Stanford Univ., Stanford, CA, US
2013
Gupta, R.
Ramamritham, K.
Mohania, M.
Ratio threshold queries over distributed data sources Proc. of the VLDB Endowment
2013
Fokkema, J. A study of impacts of flow timeouts on link provisioning Twente Student Conf. on IT
2013
Dassouki, K.
Debar, H.
Safa, H.
Hijazi, A.
A TCP delay-based mechanism for detecting congestion in the Internet Intl Conf. on Communications and Information Technology (ICCIT)
2013
Clegg, R.G.
Araujo, J.T.
Landa, R.
Mykoniati, E.
Griffin, D.
Rio, M.
On the relationship between fundamental measurements in TCP flows IEEE Conf. on Communications (ICC)
2013
Zadnik, M. Optimization of network flow monitoring Information Sciences and Technologies Bulletin of the ACM Slovakia
2013
Schmidt, R.
Sadre, R.
Pras, A.
Gaussian traffic revisited IFIP Networking Conf.
2013
Santiago del Rio, P.M. Internet traffic classification for high-performance and off-the-shelf systems Universidad Autonoma de Madrid
2013
Sankey, J.M Dovetail: stronger anonymity In next-generation Internet routing Univ. of Texas, Arlington, TX, US
2013
Petkov, V.
Rajagopal, R.
Obraczka, K.
Characterizing per-application network traffic using entropy ACM Trans. on Modeling and Computer Simulation (TOMACS)
2013
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
On the local approximations of node centrality in Internet router-level topologies Intl Workshop on Self-Organizing Systems (IWSOS)
2013
Liu, H. A collaborative defense framework against DDoS attacks in networks Washington State Univ., Pullman, WA, US
2013
Jiang, J.
Luo, J.
Li, W.
Lu, Y.
Constraint conditions to eliminate AS incentive of lying in interdomain routing Symp. on Integrated Network Management (IM)
2013
Hsiao, H.-C.
Kim, T.H.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.
Perrig, A.
STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapment Proc. ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS)
2013
Erazo, M.A.
Liu, J.
Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation Conf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS)
2013
Chen, A.
Chan, E.W.W.
Luo, X.
Fok, W.W.T.
Chang, R.K.C.
An efficient approach to multi-level route analytics IFIP/IEEE Symp. on Integrated Network Management
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
On evaluating IP traceback schemes: a practical perspective IEEE Security and Privacy Workshops
2013
Yu, M.
Jose, L.
Miao, R.
Software defined traffic measurement with OpenSketch Usenix Symp. on Networked Systems Design and Implementation (NSDI)
2013
Preciado, V.M.
Jadbabaie, A.
Moment-based spectral analysis of large-scale networks using local structural information IEEE/ACM Trans. on Networking (TON)
2013
Pacifici, V.
Dan, G.
Content-peering dynamics of autonomous caches in a content-centric network Proc. IEEE INFOCOM
2013
Neudorfer, L.
Shavitt, Y.
Zilberman, N.
Improving AS relationship inference using PoPs Proc. IEEE INFOCOM
2013
Ma, C.
Yang, Y.
Guo, X.
Improved SEIR viruses propagation model and the patch's impact on the propagation of the virus J. of Computational Information Systems
2013
Godkin, T. Statistical assessment of peer-to-peer botnet features University of Victoria, Victoria, CA
2013
Gilad, Y.
Herzberg, A.
Fragmentation considered vulnerable ACM Trans. on Information and System Security (TISSEC)
2013
Fu, A.W.
Wu, H.
Cheng, J.
Wong, R.C.
IS-Label: an independent-set based labeling scheme for point-to-point distance querying Proc. of the VLDB Endowment
2013
Chen, W.
Liu, Y.
Guan, Y.
Cardinality change-based early detection of large-scale cyber-attacks Proc. IEEE INFOCOM
2013
Ahmadzadeh, S.A.
Agnew, G.
Turbo covert channel: An iterative framework for covert communication over data networks Proc. IEEE INFOCOM
2013
Nikolaevskiy, I.
Lukyanenko, A.
Polishchuk, T.
Polishchuk, V.
Gurtov, A.
isBF: scalable in-packet Bloom filter based multicast Proc. ACM Symp. on Applied Computing (SAC)
2013
Miyamoto, D.
Miyachi, T.
Taenaka, Y.
Hazeyama, H.
PhishCage: reproduction of fraudulent websites in the emulated Internet Proc. Intl ICST Conf. on Simulation Tools and Techniques (SimuTools)
2013
Miyamoto, D.
Miyachi, T.
COSMO - Emulation of Internet traffic (poster abstract) Proc. Intl ICST Conf. on Simulation Tools and Techniques (SimuTools)
2013
Miyachi, T.
Miwa, S.
Design and implementation of XBurner Proc. Intl ICST Conf. on Simulation Tools and Techniques (SimuTools)
2013
Marchetta, P.
de Donato, W.
Pescape, A.
Detecting third-party addresses in traceroute traces with IP timestamp option Conf. Passive and Active Measurement (PAM)
2013
Hofstede, R.
Drago, I.
Sperotto, A.
Sadre, R.
Pras, A.
Measurement artifacts in NetFlow data Conf. Passive and Active Measurement (PAM)
2013
He, G.-F.
Yang, M.
Luo, J.-Z.
Zhang, L.
Online identification of Tor anonymous communication traffic J. of Software
2013
Dautrich Jr, J.L.
Ravishankar, C.V.
Inferential time-decaying Bloom filters Intl Conf. on Extending Database Technology (EDBT)
2013
Chen, Y.
Kawadia, V.
Urgaonkar, R.
Detecting overlapping temporal community structure in time-evolving networks arxiv.org
2013
Camacho, J.M.
Garcia-Martinez, A.
Bagnulo, M.
Valera, F.
BGP-XM: BGP eXtended multipath for transit Autonomous Systems Computer Networks
2013
Callau-Zori, M.
Jimenez-Peris, R.
Gulisano, V.
Papatriantafilou, M.
Fu, Z.
Patino-Martinez, M.
STONE: A stream-based DDoS defense framework ACM Symp. on Applied Computing (SAC)
2013
Yang, B.
Zhao, H.
Zhang, J.
Ai, J.
Jia, S.
Ge, x.
Liu, W.
Analysis of interlayer connection catastrophe characteristics in Internet AS level topology Telkomnika
2013
Wacek, C.
Tan, H.
Bauer, K.
Sherr, M.
An empirical evaluation of relay selection in Tor Network and Distributed System Security Symp. (NDSS)
2013
Tidy, L.
Woodhead, S.
Wetherall, J.
A large-scale zero-day worm simulator for cyber-epidemiological analysis Intl Conf. on Advances in Computer Science and Electronics Engineering (CSEE)
2013
Tang, M.
Zhang, G.
Lin, T.
Liu, J.
HDLBR: A name-independent compact routing scheme for power-law networks Computer Communications
2013
Matsuda, K.
Hasegawa, G.
Kamei, S.
Murata, M.
A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurement IEICE Trans. on Information and Systems
2013
Liu, Y.
Peng, W.
Su, J.
A study of IP prefix hijacking in cloud computing networks Security Comm. Networks
2013
Kumar, P.A.R.
Selvakumar, S.
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Computer Communications
2013
De Sensi, D. DPI over commodity hardware: implementation of a scalable framework using FastFlow Univ. Pisa, Pisa, IT
2013
Wang, Y.
Bi, J.
Wu, J.
Revisiting the rich club of the Internet AS-level topology IEICE Trans. Commun.
2013
Wang, F.
Zhang, Y.
Guo, H.
Wang, C.
Combating good point set scanning-based self-learning worms by using predators J. Network Security
2013
Qin, D.
Yang, J.
Wang, H.
Experimental study on diversity and novelty of interdomain paths Chinese Journal of Electronics
2013
Palacin, M.
Oliver, M.
Infante, J.
Oechsner, S.
Bikfalvi, A.
The impact of content delivery networks on the Internet ecosystem J. of Information Policy
2013
Ni, C.
Jin, G.
CTFPi: A new method for packet filtering of firewall Proc. Intl Conf. on Information Technology and Software Engineering, Ch. 48
2013
Moses, K.V. Improving IP-based geo-location through Internet topology and geospatial datasets Duke Univ., Durham, NC, US
2013
Mislove, A.
Koppula, H.S.
Gummadi, K.P.
Druschel, P.
Bhattacharjee, B.
An empirical validation of growth models for complex networks Dynamics On and Of Complex Networks
2013
Kim, S.
Nam, S.Y.
A long range dependent Internet traffic model using unbounded Johnson distribution IEICE Trans. on Communications
2013
Erola, P.
Gomez, S.
Arenas, A.
On the routability of the Internet Dynamics On and Of Complex Networks
2013
Du, H.
Yang, S.J.
Temporal and spatial analyses for large-scale cyber attacks Handbook of Computational Approaches to Counterterrorism
2013
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-Betweenness vertices from heterogeneous networks The Influence of Technology on Social Network Analysis and Mining, Ch. 11
2013
Andrysiak, T.
Saganowski, L.
Choras, M.
DDoS attacks detection by means of greedy algorithms Image Processing and Communications Challenges 4
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation EURASIP Journal on Information Security

2012

Year Author(s) Title Publication
2012
Yu, M.
Jiang, W.
Li, H.
Stoica, I.
Tradeoffs in CDN designs for throughput oriented traffic ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2012
Vasilakos, X.
Katsaros, K.
Xylomenos, G.
Cloud computing for global name-resolution in information-centric networks IEEE Symp. on Network Cloud Computing and Applications (NCCA)
2012
Sherry, J. Future architectures for middlebox processing services on the Internet and in the Cloud UC Berkeley
2012
Ren, D.
Wong, W.
Gary Chan, S.-H.
Toward continuous push-based P2P live streaming IEEE Global Telecommunications Conf. (GLOBECOM)
2012
Meyer, S.
Wahlisch, M.
Schmidt, T.C.
Exploring reachability via settlement-free peering ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2012
Liu, W.
Yan, Y.
Dong, T.
Run-hua, T.
Self-similarity and heavy-tail of ICMP traffic J. Computers
2012
Ekbatani, H.R. Investigating the mutual impact of the P2P overlay and the AS-level underlay Univ. of Oregon, Eugene, OR, US
2012
Detal, G.
Paasch, C.
van der Linden, S.
Merindol, P.
Avoine, G.
Bonaventure, O.
Revisiting flow-based load balancing: Stateless path selection in data center networks Computer Networks
2012
Coelho, N.M.M. Profiling de trafego inter-operador baseado em analise multi-escalar Univ. de Aveiro
2012
Basaran, C.
Kang, K.-D.
Zhou, Y.
Suzer, M.H.
Adaptive load shedding via fuzzy control in data stream management systems Intl Conf. on Service-Oriented Computing and Applications (SOCA)
2012
Ahmad, M.Z.
Guha, R.
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation J. Supercomputing
2012
Santiago del Rio, P.M.
Rossi, D.
Gringoli, F.
Nava, L.
Salgarelli, L.
Aracil, J.
Wire-speed statistical classification of network traffic on commodity hardware ACM SIGCOMM Conf. on Internet Measurement (IMC)
2012
Moriyama, E.
Takahashi, T.
Miyamoto, D.
DNS-based defense against IP spoofing attacks Conf. on Neural Information Processing
2012
Karasawa, T.
Soshi, M.
Miyaji, A.
A novel hybrid IP traceback scheme with packet counters Conf. on Internet and Distributed Computing Systems (IDCS)
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
A GI/G/1 model for 10 Gb/s energy efficient ethernet links IEEE Trans. on Communications
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Romano, D.
Enhancing the computation of distributed shortest paths on real dynamic networks Mediterranean Conf. on Algorithms
2012
Zhang, X.
Ding, W.
Comparative research on internet flows characteristics Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics
2012
Weinberg, Z.
Wang, J.
Yegneswaran, V.
Briesemeister, L.
Cheung, S.
Wang, F.
Boneh, D.
StegoTorus: a camouflage proxy for the Tor anonymity system ACM Conf. on Computer and Communications Security (CCS)
2012
Wachs, M.
Grothoff, C.
Thurimella, R.
Partitioning the Internet Conf. on Risks and Security of Internet and Systems (CRiSIS)
2012
Schuchard, M.
Geddes, J.
Thompson, C.
Hopper, N.
Routing around decoys ACM Conf. on Computer and Communications Security (CCS)
2012
Parno, B.
Zhou, Z.
Perrig, A.
Using trustworthy host-based information in the network Workshop on Scalable trusted computing (STC)
2012
Moreno, V.
Santiago del Rio, P.M.
Ramos, J.
Garnica, J.
Garcia-Dorado, J.L.
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines IEEE Communications Lett.
2012
Kim, J.
Park, M.
Han, S.
Kim, J.
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup IEICE Trans. on Communications
2012
Kato, M.
Cho, K.
Honda, M.
Tokuda, H.
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation Workshop on Managing Systems Automatically and Dynamically
2012
Iqbal, M.F.
John, L.K.
Efficient traffic aware power management in multicore communications processors ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS)
2012
Dinh, T.N.
Shen, Y.
Thai, M.T.
An efficient spectral bound for link vulnerability assessment in large-scale networks IEEE Military Communications Conf. (MILCOM)
2012
Cao, Z.
Panwar, S.S.
Efficient buffering and scheduling for a single-chip crosspoint-queued switch ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS)
2012
Bhatia, S.
Schmidt, D.
Mohay, G.
Ensemble-based DDoS detection and mitigation model Conf. on Security of Information and Networks (SIN)
2012
Ahmad, M.Z.
Guha, R.
A tale of nine Internet exchange points: studying path latencies through major regional IXPs IEEE Conf. on Local Computer Networks (LCN)
2012
Ahmad, M.Z.
Guha, R.
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks IEEE Conf. on Local Computer Networks (LCN)
2012
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
CBTree: A practical concurrent self-adjusting search tree Distributed Computing (DISC)
2012
Xu, E.
Hsu, W.
Lee, M.L.
Patel, D.
Top-k maximal influential paths in network data Database and Expert Systems Applications
2012
Xiaojuan, S.
Bin, L.
Stream data analysis for backbone network intrusion detection system Conf. on Oxide Materials for Electronic Engineering (OMEE)
2012
Preciado, V.M.
Draief, M.
Jadbabaie, A.
Structural analysis of viral spreading processes in social and communication networks using egonets arxiv.org
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the internet evolution Network Operations and Management Symposium (APNOMS)
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the Internet evolution Network Operations and Management Symp. (APNOMS)
2012
Juen, J. Protecting anonymity in the presence of autonomous system and internet exchange level adversaries Univ. of Illinois at Urbana-Champaign
2012
Goltsev, A.V.
Dorogovtsev, S.N.
Oliveira, J.G.
Mendes, J.F.F.
Localization and spreading of diseases in complex networks Phys. Rev. Lett.
2012
Cohen, N.
Couderty, D.
Lancin, A.
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs Project-Team MASCOTTE, INRIA
2012
Burger, V.
Lehrieder, F.
Hossfeld, T.
Seedorf, J.
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms Teletraffic Congress (ITC)
2012
Tyson, G.
Kaune, S.
Miles, S.
El-khatib, Y.
Mauthe, A.
Taweel, A.
A trace-driven analysis of caching in content-centric networks IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Rajahalma, J. Inter-domain incentives and Internet architecture Aalto Univ., FI
2012
Orman, G.K.
Labatut, V.
Cherifi, H.
Comparative evaluation of community detection algorithms: a topological approach J. Stat. Mechanics: Theory and Experiment
2012
Mogul, J.C.
Congdon, P.
Hey, you darned counters!: get off my ASIC! ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN)
2012
Lin, Z
Hopper, N.
New attacks on timing-based network flow watermarks Usenix Security Symp.
2012
He, P.
Guan, H.
Xie, G.
Salamatian, K.
Evaluating and optimizing IP lookup on many core processors IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Gringoli, F.
Nava, L.
Este, A.
Salgarelli, L.
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware Wireless Communications and Mobile Computing Conf. (IWCMC)
2012
Gjoka, M.
Kurant, M.
Markopoulou, A.
2.5K-graphs: from sampling to generation arxiv.org
2012
Fu, Z. Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation Chalmers Univ. of Technology, Gothenborg, Sweden
2012
Detti, A.
Pomposini, M.
Blefari-Melazzi, N.
Salsano, S.
Supporting the Web with an information centric network that routes by name Computer Networks
2012
Beben, A.
Batalla, J.M.
Chai, W.K.
Sliwinski, J.
Multi-criteria decision algorithms for efficient content delivery in content networks Ann. Telecommunications
2012
Ager, B.
Chatzis, N.
Feldmann, A.
Sarrar, N.
Uhlig, S.
Willinger, W.
Anatomy of a large European IXP ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2012
Silva, J.M.C.
Lima, S.R.
Multiadaptive sampling for lightweight network measurements IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Sherry, J.
Kim, D.
Mahalingam, S.
Tang, A.
Wang, S.
Ratnasamy, S.
Netcalls: End host function calls to network traffic processing services UC Berkeley
2012
Lin, Z. Toward building practical privacy enhancing technologies Univ. Minnesota
2012
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architectures Computer Communications
2012
Fujikawa, K.
Tazaki, H.
Harai, H.
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network Symp. on Applications and the Internet (SAINT)
2012
Ahmad, M.Z.
Guha, R.
Evaluating end-user network benefits of peering with path latencies IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Zhao, Y.
Yuan, R.
Wang, W.
Meng, D.
Zhang, S.
Li, J.
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic Conf. on Networking, Architecture and Storage (NAS)
2012
Yang, T.
Duan, R.
Lu, J.
Zhang, S.
Dai, H.
Liu, B.
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy Conf. on Distributed Computing Systems (ICDCS)
2012
Tomasik, J.
Weisser, M.-A.
The inter-domain hierarchy in measured and randomly generated AS-level topologies IEEE Conf. on Communications (ICC)
2012
Sobrinho, J.L.
Tiago Quelhas, T.
A theory for the connectivity discovered by routing protocols IEEE/ACM Trans. on Networking (TON)
2012
Singh, J.
Kumar, K.
Sachdeva, M.
Sidhu, N.
DDoS attack's simulation using legitimate and attack real data sets J. Scientific and Engineering Research
2012
Silva, J.M.C.
Lima, S.R.
Optimizing network measurements through self-adaptive sampling Conf. on High Performance Computing and Communication (HPCC)
2012
Qardaji, W.
Li, N.
Anonymizing network traces with temporal pseudonym consistency Conf. on Distributed Computing Systems Workshops (ICDCSW)
2012
Markman, M.A.J.
Tokheim, S.
Reliable broadcast contribution over the public Internet Norwegian Univ. of Science and Technology
2012
Kuang, J.
Bhuyan, L.
Klefstad, R.
Traffic-aware power optimization for network applications on multicore servers Annual Design Automation Conf.
2012
Keating, A. Models for the simulation of a name-based interdomain routing architecture Aalto Univ., FI
2012
Kambhampati, V.
Papadopolous, C.
Massey, D.
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks IEEE/IFIP Conf. on Dependable Systems and Networks (DSN)
2012
Hsiao, H.-C.
Kim, T.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.D.
Perrig, A.
Sanctuary trail: refuge from Internet DDoS entrapment Carnegie Mellon Univ. (CMU-CyLab-12-013)
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Bounded energy consumption with dynamic packet coalescing Networks and Optical Communications (NOC)
2012
Hanay, Y.S.
Li, W.
Tessier, R.
Wolf, T.
Saving energy and improving TCP throughput with rate adaptation in Ethernet IEEE Conf. on Communications (ICC)
2012
Guo, Z.
Yang, Y.
High speed multicast scheduling in hybrid optical packet switches with guaranteed latency IEEE Trans. on Computers
2012
Fragni, C.
Costa, L.H.M.K.
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers Computer Networks
2012
Fiorese, A.
Simoes, P.
Boavida, F.
Peer selection in P2P service overlays using geographical location criteria Computational Science and Its Applications (ICCSA)
2012
Deng, W.
Muhlbauer, W.
Yang, Y.
Zhu, P.
Lu, X.
Plattner, B.
Shedding light on the use of AS relationships for path inference J. Communications and Networks
2012
Davy, A.
Jennings, B.
Botvich, D.
QoSPlan: A measurement based quality of service aware network planning framework J. Network and Systems Management
2012
Cesareo, J.
Karlin, J.
Schapira, M.
Rexford, J.
Optimizing the placement of implicit proxies Princeton Univ.
2012
Cesareo, J. Optimizing implicit proxy placement to evade traffic filters Princeton Univ.
2012
Xu, Y.
Zhang, X.
Analysis of Internet robustness in attacks Conf. on Systems and Informatics (ICSAI)
2012
Tozal, M.E.
Sarac, K.
Estimating network layer subnet characteristics via statistical sampling Intl IFIP TC 6 Networking Conf., Part I
2012
Seibert, J. Security and economic implications of localizing traffic in overlay networks Purdue Univ.
2012
Schlegel, R.
Wong, D.S.
Anonymous overlay network supporting authenticated routing Information Sciences
2012
Saucez, D.
Donnet, B.
On the dynamics of locators in LISP Networking
2012
Ren, D.
Chan, S.G.
Achieving high-bitrate overlay live streaming with proxy helpers Packet Video Workshop (PV)
2012
Papadakis, H.
Fragopoulou, P.
Markatos, E.
Roussopoulos, M.
ITA: Innocuous topology awareness for unstructured P2P networks IEEE Trans. on Parallel and Distributed Systems
2012
Nozaki, Y.
Tuncer, H.
Shenoy, N.
ISP tiered model based architecture for routing scalability IEEE Conf. on Communications (ICC)
2012
Melazzi, N.B.
A. Detti, A.
Pomposini, M.
Scalability measurements in an information-centric network Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project
2012
Martin, S.
Chiarello, L.
Leduc, G.
DISco: A distributed information store for network challenges and their outcome IEEE Conf. on Network Operations and Management Symposium (NOMS)
2012
Liu, Y.
Su, J.
Chang, R.K.C.
LDC: Detecting BGP prefix hijacking by load distribution change Parallel and Distributed Processing Symp. Workshops (IPDPSW)
2012
Korenfeld, B. CBTree: A practical concurrent self-adjusting search tree Tel Aviv Univ., Israel
2012
Hasan, S.
Gorinsky, S.
Obscure giants: detecting the provider-free ASes Networking
2012
Feitosa, E.
Souto, E.
Sadok, D.H.
An orchestration approach for unwanted Internet traffic identification Computer Networks
2012
Fan, J.
Hu, C.
He, K.
Jiang, J.
Liuy, B.
Reducing power of traffic manager in routers via dynamic on/off-chip scheduling IEEE INFOCOM
2012
Faggiani, A.
Gregori, E.
Lenzini, L.
Mainardi, S.
Vecchio, A.
On the feasibility of measuring the internet through smartphone-based crowdsourcing Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt)
2012
Chaudhury, A.
Basuchowdhuri, P.
Majumder, S.
Spread of information in a social network using influential nodes Advances in Knowledge Discovery and Data Mining
2012
Chai, W.K.
He, D.
Psaras, I.
Pavlou, G.
Cache 'less for more' in information-centric networks Networking
2012
Anitha, R.
Karthik, R.
Pravin, V.
Thirugnanam, K.
A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference system Proc. Second Intl Conf. on Computer Science, Engineering and Applications (ICCSEA)
2012
Zhang, H.
Lu, G.
Qassrawi, M.T.
Zhang, Y.
Yu, X.
Feature selection for optimizing traffic classification Computer Communications
2012
Yang, M.-H.
Yang, M.-C.
RIHT: A novel hybrid IP traceback scheme IEEE Transactions on Information Forensics and Security
2012
Xu, Y.
Wang, Z.
Collapse by cascading failures in hybrid attacked regional Internet J. Security and Its Applications
2012
Wehmuth, K.
Ziviani, A.
Distributed assessment of the closeness centrality ranking in complex networks Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX)
2012
Verma, H.
Yadav, B.
Bansal, P.
Raj, S.
IPv4 to IPv6 shift: major challenges J. Engineering and Innovative Technology (IJEIT)
2012
Tawakol, A. Performance analysis of TCAMs in switches Univ. Waterloo, Ontario, CA
2012
Rahmani, H.
Sahli, N.
Kamoun, F.
DDoS flooding attack detection scheme based on F-divergence Computer Communications
2012
Pasquini, R.
Verdi, F.L.
Magalhaes, M.F.
Towards local routing state in the future internet WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC)
2012
Liu, H.
Hu, X.
Zhao, D.
Lu, X.
Failure isolation based defense against Internet CXPST-like attack J. Hybrid Information Technology
2012
Iqbal, M.F.
John, L.K.
Power and performance analysis of network traffic prediction techniques IEEE Intl Symp. on Performance Analysis of Systems and Software (ISPASS)
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection improvement based on spatial-temporal characteristics Advanced Science Lett.
2012
Zheng, L.
Zou, P.
Jia, Y
Han, W.
An online learning and unsupervised traffic anomaly detection system Advanced Science Lett.
2012
Zhang, W.
Bi, J.
Wu, J.
Zhang, B.
Catching popular prefixes at AS border routers with a prediction based method Computer Networks
2012
Tsidon, E.
Hanniel, I.
Keslassy, I.
Estimators also need shared values to grow together IEEE INFOCOM
2012
Strowes, S.D.
Perkins, C.
Harnessing Internet topological stability in Thorup-Zwick compact routing IEEE INFOCOM
2012
Sobrinho, J.L.
Le, F.
A fresh look at inter-domain route aggregation IEEE INFOCOM
2012
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter? IEEE INFOCOM
2012
Rottenstreich, O.
Kanizo, Y.
Keslassy, I.
The variable-increment counting Bloom filter IEEE INFOCOM
2012
Ribeiro, B.
Basu, P.
Towsley, D.
Multiple random walks to uncover short paths in power law networks IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS)
2012
Qin, D.
Yang, J.
Liu, Z.
Wang, H.
Zhang, B.
Zhang, W.
AMIR: Another multipath interdomain routing IEEE Conf. on Advanced Information Networking and Applications (AINA)
2012
Pan, T.
Guo, X.
Zhang, C.
Jiang, J.
Wu, H.
Liu, B.
Tracking millions of flows in high speed networks for application identification IEEE Conf. on Computer Communications (INFOCOM)
2012
Lutu, A.
Bagnulo, M.
Stanojevic, R.
An economic side-effect for prefix deaggregation IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS)
2012
Lee, C.
Lee, D.K.
Moon, S.
Unmasking the growing UDP traffic in a campus network Conf. Passive and Active Measurement (PAM)
2012
Jacquin, L.
Roca, V.
Kaafar, M.A.
Schuler, F.
Roch, J.-L.
IBTrack: an ICMP black holes tracker hal.archives-ouvertes.fr
2012
Huang, H.
Zhang, B.
Chan, S.-H.G.
Cheung, G.
Frossard, P.
Coding and replication co-design for interactive multiview video streaming IEEE INFOCOM
2012
Houmansadr, A.
Kiyavash, N.
Borisov, N.
Non-blind watermarking of network flows arxiv.org
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Optimal configuration of energy-efficient ethernet Computer Networks
2012
Grey, M.
Rossberg, M.
Schaefer, G.
Automatic creation of VPN backup paths for improved resilience against BGP-attackers ACM Symp. on Applied Computing (SAC)
2012
Gilbert, J. Scalable wavelet-based active network stepping stone detection Air Force Inst. of Technology, Air Univ,
2012
Cicerone, S.
D'Angelo, G.
Di Stefano, G.
Frigioni, D.
Maurizio, V.
Engineering a new algorithm for distributed shortest paths on dynamic networks Algorithmica
2012
Wang, Y.
Su, S.
Yang, Y.
Ren, J.
A more efficient hybrid approach for single-packet IP traceback EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP)
2012
Qin, D.
Yang, J.
Wang, H.
Zhang, B.
Gao, L.
Liu, Z.
Multipath interdomain routing via deviation from primary path Conf. on Information Networking (ICOIN)
2012
Lee, M.
Duffield, N.
Kompella, R.R.
Opportunistic flow-level latency estimation using consistent NetFlow IEEE/ACM Trans. on Networking (TON)
2012
Kanizo, Y.
Hay, D.
Keslassy, I.
Maximizing the throughput of cuckoo hashing in network devices ComNet, Technion, Israel (TR12-02)
2012
Edwards, B.
Hofmeyr, S.
Stelle, G.
Forrest, S.
Internet topology over time arxiv.org
2012
Wei, W.
Yingjie, X.
Yabo, D.
ASTVA: DDoS-limiting architecture for Next Generation Internet Adv. Materials Research
2012
Shpiner, A.
Keslassy, I.
Cohen, R.
Reducing the reordering delay in multi-core network processors ComNet, Technion, Israel (TR12-01)
2012
Martinez, V.M. Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks Univ. Autonoma de Madrid
2012
Karthick, R.R.
Hattiwale, V.P.
Ravindran, B.
Adaptive network intrusion detection system using a hybrid approach Conf. on Communication Systems and Networks (COMSNETS)
2012
Houmansadr, A. Design, analysis, and implementation of effective network flow watermarking schemes Univ. of Illinois at Urbana-Champaign
2012
Ekiz, N.
Amer, P.D.
Transport layer reneging Univ. of Delaware
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Maurizio, V.
Engineering a new loop-free shortest paths routing algorithm Symp. on Experimental Algorithms (SEA)
2012
Chen, Y.
Le Merrer, E.
Li, Z.
Yaning Liu, Y.
Simon, G.
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV Computer Networks
2012
Blefari-Melazzi, N.
Cancellieri, M.
Detti, A.
Pomposini, M.
Salsano, S.
The CONET solution for information centric networking Univ. of Rome

2011

Year Author(s) Title Publication
2011
Xu, K.
Wang, F.
Behavioral graph analysis of Internet applications IEEE Global Telecommunications Conf. (GLOBECOM)
2011
Vishwanath, A.
Sivaraman, V.
Zhao, Z.
Russell, C.
Thottan, M.
Adapting router buffers for energy efficiency ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2011
Mukaddam, A.
ELHajj, I.
Hop count variability Conf. for Internet Technology and Secured Transactions (ICITST)
2011
Moreno, S.D.B. Evaluacion de desempeno de diversas arquitecturas de commutadores opticos Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia
2011
Drivere, A.A. Can we study the topology of the Internet from the vantage points of large and small content providers? Youngstown State Univ.
2011
Takahashi, E.K.
Chen, Y.
Lall, A.
Divergence in network traffic Midstates Conf. on Undergraduate Research in Computer Science and Mathematics
2011
Sommers, J.
Erikson, B.
Barford, P.
On the prevalence and characteristics of MPLS deployments in the open Internet ACM SIGCOMM Conf. on Internet Measurement (IMC)
2011
Liu, Y.
Peng, W.
Su, J.
Study on IP prefix hijacking in cloud computing networks based on attack planning Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom)
2011
Chen, M.
Yu, L.
Bai, H.
Two propositions about geographical distributions of BitTorrent file resources Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE)
2011
Zhang, Y.
Oliveira, R.
Wang, Y.
Su, S.
Zhang, B.
Bi, J.
Zhang, H.
Zhang, L.
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement IEEE J. Selected Areas in Communications
2011
Wehmuth, K.
Ziviani, A.
Distributed location of the critical nodes to network robustness based on spectral analysis Latin American Network Operations and Management Symp. (LANOMS)
2011
Takahashi, Y.
Ishibashi, K.
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic Conf. on Network Games, Control and Optimization (NetGCooP)
2011
Marchetta, P.
Merindol, P.
Donnet, B.
Pescape, A.
Pansiot, J.-J.
Topology discovery at the router level: a new hybrid tool targeting ISP networks IEEE J. Selected Areas in Communications
2011
Le, D.Q.
Jeong, T.
Roman, H.E.
Hong, J.W.
Traffic dispersion graph based anomaly detection Symp. on Information and Communication Technology (SolCT)
2011
Kurant, M.
Markopoulou, A.
Towards unbiased BFS sampling IEEE J. Selected Areas in Communications
2011
Jesus, V.
Aguiar, R.L.
Steenkiste, P.
Topological implications of cascading interdomain bilateral traffic agreements IEEE J. Selected Areas in Communications
2011
Hua, N.
Norige, E.
Kumar, S
Lynch, B.
Non-crypto hardware hash functions for high performance networking ASICs Symp. on Architectures for Networking and Communications Systems (ANCS)
2011
Houmansadr, A.
Nguyen, G.T.K.
Caesar, M.
Borisov, N.
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability ACM Conf. on Computer and Communications Security (CCS)
2011
Gjoka, M.
Kurant, M.
Butts, C.T.
Markopoulou, A.
Practical recommendations on crawling online social networks IEEE J. Selected Areas in Communications
2011
Ahmad, M.Z.
Guha, R.
Internet exchange points and Internet routing Conf. on Network Protocols (ICNP)
2011
Zhang, B.-F.
Li, Y.
Liu, Y.-J.
Su, J.-S.
Analysis of prefix hijacking based on AS hierarchical model Conf. on Network and System Security (NSS)
2011
Guo, Z.
Yang, Y.
Pipelining multicast scheduling in all-optical packet switches with delay guarantee International Teletraffic Congress (ITC)
2011
Clegg, R.
Landa, R.
Rio, M.
Criticisms of modelling packet traffic using long-range dependence (extended version) J. Computer and System Sciences
2011
Szekeres, A. Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failures Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam
2011
Spinelli, L.P. Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias Univ. Federal Do Rio de Janeiro, Brazil
2011
Detti, A.
Melazzi, N.B.
Salsano, S.
Pomposini, M.
CONET: a content centric inter-networking architecture ACM SIGCOMM Workshop on Information-Centric Networking (ICN)
2011
Bhatia, S.
Mohay, G.
Tickle, A.
Ahmed, E.
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event Conf. on Availability, Reliability and Security (ARES)
2011
Bell, C. Examining change in Internet topology in terms of external events, April 2001 - April 2002 Univ. of Nebraska at Omaha
2011
Venkataramanan, R.
Jeong, M.-W.
Prabhakar, B.
A flow- and packet-level model of the Internet Univ. Michigan
2011
Marsan, M.A.
Fernandez Anta, A.
Mancuso, V.
Rengarajan, B.
Vasallo, P.
Rizzo, G.
A simple analytical model for energy efficient ethernet IEEE Communications Lett.
2011
Leiva, A.
Finochietto, J.M.
Huiszoon, B.
Lopez, V.
Tarifeno, M.
Aracil, J.
Beghelli, A.
Comparison in power consumption of static and dynamic WDM networks Optical Switching and Networking
2011
Larrabeiti, D.
Reviriego, P.
Hernandez, J.A.
Maestro, J.A.
Uruena, M..
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability Optical Switching and Networking
2011
Du, H.
Yang, S.J.
Characterizing transition behaviors in Internet attack sequences IEEE Conf. on Computer Communications and Networks (ICCCN)
2011
Alvarez-Hamelin, J.I.
Anunziata, D.
Beiro, M.G.
Barrat, A.
Dall'Asta, L.
Vespignani, A.
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool) Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires
2011
Wong, E.L.
Shmatikov, V.
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing Conf. on Dependable Systems and Networks (DSN)
2011
Valgenti, V.C.
Paul, R.R.
Kim, M.S.
Netshuffle: Improving traffic trace anonymization through graph distortion IEEE Conf. on Communications (ICC)
2011
Suresh, M.
Anitha, R.
Evaluating machine learning algorithms for detecting DDoS attacks Advances in Network Security and Applications (CNSA)
2011
Strowes, S.D.
Mooney, G.
Perkins, C.
Compact routing on the Internet AS-graph IEEE Conf. on Computer Communications (INFOCOM)
2011
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter ComNet, Technion, Israel (TR11-06)
2011
Moreira, M.D.D.
Laufer, R.
Fernandes, N.C.
Duarte, O.C.M.B.
A stateless traceback technique for identifying the origin of attacks from a single packet IEEE Conf. on Communications (ICC)
2011
Liu, Y.
Dai, B.
Zhu, P.
Su, J.
Whom to convince? It really matters in BGP prefix hijacking attack and defense Future Information Technology
2011
Karaoglu, H.T.
Yuksel, M.
Gunes, M.H.
On the scalability of path exploration using opportunistic path-vector routing IEEE Conf. on Communications (ICC)
2011
Helminger, M. Interactive visualization of global routing dynamics Technische Univ. Muenchen, Faculty of Informatics
2011
Grieco, L.A.
Barakat, C.
Marzulli, M.
Spectral models for bitrate measurement from packet sampled traffic IEEE Trans. on Network and Service Management
2011
Gregori, E.
Lenzini, L.
Orsini, C.
k-clique communities in the Internet AS-level topology graph Distributed Computing Systems Workshops (ICDCSW)
2011
Amaral, P.
Silva, E.
Bernardo, L.
Pinto, P.
Inter-domain traffic engineering using an AS-level multipath routing architecture IEEE Conf. on Communications (ICC)
2011
Siritana, H.
Kitisin, S.
Gertphol, S.
A study of autonomous system relationships within Thailand Conf. on Computer Science and Software Engineering (JCSSE)
2011
Mothersole, I.
Reed, M.J.
Optimising rule order for a packet filtering firewall Conf. on Network and Information Systems Security (SAR-SSI)
2011
He, F.
Xiang, F.
Yibo Xue, Y.
Jun Li, J.
Towards high-performance network application identification with aggregate-flow cache arxiv.org
2011
Akashi, O. Analysis of cooperative management strategies against route-hijacking IFIP/IEEE Symp. on Integrated Network Management (IM)
2011
Xu, K.
Wang, F.
Gu, L.
Network-aware behavior clustering of Internet end hosts IEEE Conf. on Computer Communications (INFOCOM)
2011
Scholz, J.
Greiner, M.
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics EPL (Europhysics Letters)
2011
Ekiz, N.
Rahman, A.H.
Amer, P.D.
Misbehaviors in TCP SACK generation ACM SIGCOMM Computer Communication Review
2011
Dusi, M.
Gringoli, F.
Salgarelli, L.
Quantifying the accuracy of the ground truth associated with Internet traffic traces Computer Networks
2011
Deng, W.
Zhu, P.
Xiong, N.
Xiao, Y.
Xiaofeng, H.
How resilient are individual ASes against AS-level link failures? IEEE Conf. on Computer Communications (INFOCOM)
2011
Deng, W.
Karaliopoulos, M.
Muehlbauer, W.
Zhu, P.
Lu, X.
Plattner, B.
k-Fault tolerance of the Internet AS graph Computer Networks
2011
Abouzakhar, N.S.
Chen, H.
Christianson, B.
An enhanced fuzzy ARM approach for intrusion detection J. Digital Crime and Forensics
2011
Youssef, M.
Kooij, R.
Scoglio, C.
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics J. Computational Science
2011
Wu, H.
Kvizhinadze, G.
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies Statistics and Probability Letters
2011
Reviriego, P.
Huiszoon, B.
Lopez, V.
Coenen, R.B.
Hernandez, J.A.
Maestro, J.A.
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links IEEE J. Selected Topics in Quantum Electronics
2011
Narita, M.
Katoh, T.
Bista, B.B.
Takata, T.
Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace Advanced Information Networking and Applications (WAINA)
2011
Melnik, S.
Hackett, A.
Porter, M.A.
Mucha, P.J.
Gleeson, J.P.
The unreasonable effectiveness of tree-based theory for networks with clustering Phys. Rev. E
2011
Jose, L.
Yu, M.
Rexford, J.
Online measurement of large traffic aggregates on commodity switches Usenix Conf. Hot-ICE
2011
Du, H.
Yang, S.J.
Discovering collaborative cyber attack patterns using social network analysis Conf. on Social computing, behavioral-cultural modeling and prediction (SBP)
2011
Alvarez-Hamelin, J.I.
Beiro, M.G.
Busch, J.R.
Understanding edge connectivity in the Internet through core decomposition Internet Mathematics
2011
Houmansadr, A.
Borisov, N.
SWIRL: A scalable watermark to detect correlated network flows Symp. on Network and Distributed System Security (NDSS)
2011
Tomasik, J.
Weisser, M.-A.
Internet topology on as-level: Model, generation methods and tool IEEE Performance Computing and Communications Conf. (IPCC)
2011
Schear, N. Preventing encrypted traffic analysis Univ. Illinois at Urbana-Champagne
2011
Saganowski, L.
Andrysiak, T.
Choras, M.
Renk, R.
Expansion of matching pursuit methodology for anomaly detection in computer networks Advances in Intelligent and Soft Computing
2011
Pouzols, F.M.
Lopez, D.R.
Barros, A.B.
Predictive models of network traffic load Studies in Computational Intelligence
2011
Liu, H.
Sun, Y.
Valgenti, V.C.
Kim, M.S.
TrustGuard: A flow-level reputation-based DDoS defense system Conf. on Consumer Communications and Networking (CCNC)
2011
Khan, F.M. Assuring network service with bandwidth and integrity based fairness Univ. of Illinois at Urbana-Champaign
2011
Gregori, E.
Improta, A.
Lenzini, L.
Orsini, C.
The impact of IXPs on the AS-level topology structure of the Internet Computer Communications
2011
Gregori, E.
Lenzini, L
Orsini, C.
k-dense communities in the internet AS-level topology Conf. on Communication Systems and Networks (COMSNETS)
2011
Choras, M.
Saganowski, L.
Renk, R.
Holubowicz, W.
Statistical and signal-based network traffic recognition for anomaly detection Expert Systems
2011
Bangera, P.
Gorinsky, S.
Impact of prefix hijacking on payments of providers Conf. on Communication Systems and Networks (COMSNETS)

2010

Year Author(s) Title Publication
2010
He, K.
Hu, C.
Jiang, J.
Zhou, Y.
Liu, B.
A2C: Anti-attack counters for traffic measurement IEEE Global Telecommunications Conf. (GLOBECOM)
2010
Haider, A.
Acharya, K.
Raja, M.Y.A.
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks High-Capacity Optical Networks and Enabling Technologies (HONET)
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system J. of Next Generation Information Technology
2010
Rasti, A.H.
Magharei, N.
Rejaie, R.
Willinger, W.
Eyeball ASes: from geography to connectivity ACM SIGCOMM Conf. on Internet Measurement (IMC)
2010
Mouchos, C.
Tsokanos, A.
Kouvatsos, D.D.
Dynamic OBS offset allocation in WDM networks Computer Communications
2010
Fan, X.
Heidemann, J.
Selecting representative IP addresses for internet topology studies ACM SIGCOMM Conf. on Internet Measurement (IMC)
2010
Beverly, R.
Berger, A.
Xie, G.G.
Primitives for active internet topology mapping: toward high-frequency characterization ACM SIGCOMM Conf. on Internet Measurement (IMC)
2010
Zadnik, M.
Canini, M.
Evolution of cache replacement policies to track heavy-hitter flows Symp. on Architectures for Networking and Communications Systems (ANCS)
2010
Yao, G.
Bi, J.
Zhou, Z.
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes ACM SIGCOMM Computer Communication Review
2010
Song, J.
Zhao, H.
Yang, B.
Sun, H.
AS-level Internet macroscopic topology centralization evolvement analysis J. Software Engineering and Applications
2010
Saxena, M.
Kompella, R.
CLAMP: Efficient class-based sampling for flexible flow monitoring Computer Networks
2010
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architectures Boston Univ., CS Dept. (BUCS-TR--035)
2010
Huang, D.
Zhao, J.
Wang, X.
Trading bandwidth for playback lag: Can active peers help? Multi-media Conf.
2010
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols? ACM SIGCOMM Computer Communication Review
2010
de Montgolfier, F.
Soto, M.
Viennot, L.
Autour du caractere arborescent d'Internet MajecSTIC
2010
Ahmad, M.Z.
Guha, R.
Impact of Internet exchange points on Internet topology evolution Conf. on Local Computer Networks (LCN)
2010
Tomasik, J.
Weisser, M.-A.
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
2010
Kanizo, Y.
Hay, D.
Keslassy, I.
Hash tables with finite buckets are less resistant to deletions Allerton Conf. on Communication, Control and Computing
2010
Asai, H.
Esaki, H.
Estimating AS relationships for application-layer traffic optimization Workshop on Incentives, Overlays, and Economic Traffic Control (ETM)
2010
Asai, H.
Esaki, H.
Towards interdomain transit traffic reduction in peer-assisted content delivery networks Symp. on Telecommunications Network Strategy and Planning (NETWORKS)
2010
Abouzakhar, N.S.
Bakar, A.
A chi-square testing-based intrusion detection model Conf. on Cybercrime Forensics Education and Training (CFET )
2010
Scappini, R. Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas Facultad de Informatica, Univ. Nacional de la Plata
2010
Santiago del Rio, P.M.
Ramos, J.
Salvador, A.
de Vergara, J.E.L.
Aracil, J.
Cuadra, A.
Cutanda, M.
Application of Internet traffic characterization to all-optical networks Conf. on. Transparent Optical Networks (ICTON)
2010
Knauf, A.
Hege, G.
Schmidt, T.C.
Wahlisch, M.
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP Principles, Systems and Applications of IP Telecommunications (IPTComm)
2010
Hanif, S. Impact of topology on BGP convergence Dept. Computer Science, VU Univ. Amsterdam
2010
Guo, T.
Wang, N.
Tafazolli, R.
Moessner, K.
Policy-aware virtual relay placement for inter-domain path diversity IEEE Symp. on Computers and Communications (ISCC)
2010
Fadlullah, Z.M.
Taleb, T.
Vasilakos, A.V.
Guizani, M.
Kato, N.
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis IEEE/ACM Trans. on Networking (TON)
2010
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-betweenness vertices Conf. on Advances in Social Networks Analysis and Mining (ASONAM)
2010
Yuan, R.
Weibing, Y.
Mingyu, C.
Xiaofang, Z.
Jianping, F.
Robust TCP reassembly with a hardware-based solution for backbone traffic Conf. on Networking, Architecture and Storage (NAS)
2010
Woldeselassie, M.
Clegg, R.
Rio, M.
Forecasting full-path network congestion using one bit signalling IEEE Conf. on Communications (ICC)
2010
Reviriego, P.
Larrabeiti, D.
Maestro, J.A.
Would energy efficient ethernet be effective on 10Gbps optical links? OSA Photonics in Switching (PS)
2010
Fenacci, D.
Franke, B.
Empirical evaluation of data transformations for network infrastructure applications Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X)
2010
Elena, E.
Rougier, J.
Secci, S.
Characterisation of AS-level path deviations and multipath in Internet routing EURO-NF Conf. on Next Generation Internet (NGI)
2010
Zhang, N.
Wang, F.
Gong, B.
Li, L.
Identifying heavy-hitter flows fast and accurately Conf. on Future Computer and Communication (ICFCC)
2010
Xu, Y.
Wang, Z.
On an IBA topology model for internet topology structure Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC)
2010
Reviriego, P.
Sanchez-Macian, A.
Maestro, J.A.
Bleakley, C.J.
Increasing the MTU size for energy efficiency in ethernet IET Signals and Systems Conf. (ISSC)
2010
Lee, D.
Carpenter, B.E.
Brownlee, N.
Observations of UDP to TCP ratio and port numbers Conf. on Internet Monitoring and Protection (ICIMP)
2010
Hansen, H.V.
Goebel, V.
Plagemann, T.
Siekkinen, M.
Resource adaptive distributed information sharing Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE )
2010
Gremillet, O.
Goncalves, P.
Vicat-Blanc Primet, P.
Dupas, A.
Traffic classification techniques supporting semantic networks Conf. on Wireless Communications and Mobile Computing
2010
Yan, G.
Eidenbenz, S.
Thulasidasan, S.
Datta, P.
Ramaswamy, V.
Criticality analysis of Internet infrastructure Computer Networks
2010
Vilhar, A.
Novak, R.
Kandus, G.
The impact of network topology on the performance of MAP selection algorithms Computer Networks
2010
Tarkoma, S.
Antikainen, M.
Canopy: publish/subscribe with upgraph combination IEEE Conf. on Computer Communications (INFOCOM)
2010
Rajahalme, J. Incentive-informed inter-domain multicast IEEE Conf. on Computer Communications (INFOCOM)
2010
Moon, D. Achieving flexibility and performance for packet forwarding and data center management UC Berkeley
2010
Lee, M.
Duffield, N.
Kompella, R.
Two samples are enough: Opportunistic flow-level latency estimation using NetFlow IEEE Conf. on Computer Communications (INFOCOM)
2010
Hu, C.
Chen, K.
Chen, Y.
Liu, B.
Evaluating potential routing diversity for internet failure recovery IEEE Conf. on Computer Communications (INFOCOM)
2010
Dou, B-L
Wang, X-G
Zhang, S-Y
Robustness of networks against cascading failures Physica A: Statistical Mechanics and its Applications
2010
Zhang, Y.
Oliveira, R.
Zhang, H.
Zhang, L.
Quantifying the pitfalls of traceroute in AS connectivity inference Conf. Passive and Active Measurement (PAM)
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Parallelizing weighted frequency counting in high-speed network monitoring Computer Communications
2010
Xuan, Q.
Du, F.
Wu, T-J
Partially ordered sets in complex networks J. Phys. A: Math. Theor.
2010
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Bonaventura, O.
Extracting intra-domain topology from mrinfo probing Conf. Passive and Active Measurement (PAM)
2010
Laki, S.
Matray, P.
Haga, P.
Sebok, T.
Csabai, I.
Vattay, G.
Spotter: a model based active geolocation service IEEE Conf. on Computer Communications (INFOCOM)
2010
Bi, J.
Hu, P.
Li, P.
Study on classification and characteristics of source address spoofing attacks in the Internet IEEE Conf. on Networking (ICN)
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Identifying heavy hitters in high-speed network monitoring Science China Information Sciences
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17
2010
DiBenedetto, S.
Stone, A.
Strout, M.
Massey, D.
Simulating internet scale topologies with metarouting Colorado State Univ.
2010
Chen, K.
Hu, C.
Zhang, W.
Chen, Y.
Liu, B.
On the eyeshots of BGP vantage points IEEE Global Telecommunications Conf. (GLOBECOM)
2010
Amaral, P.
Ganhao, F.
Assuncao, C.
Bernardo, L.
Pinto, P.
Scalable multi-region routing at inter-domain level IEEE Global Telecommunications Conf. (GLOBECOM)
2010
Albrecht, C.
Foag, J.
Koch, R.
Maehle, E.
Pionteck, T.
DynaCORE - dynamically reconfigurable coprocessor for network processors Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16
2010
King, A. Efficient internet topology discovery techniques Univ. of Waikato, New Zealand
2010
John, W. Characterization and classification of internet backbone traffic Chalmers Univ. of Technology, Gothenborg, Sweden
2010
Ciceronea, S.
D'Angelo, G.
Di Stefanoa, G.
Frigioni, D.
Partially dynamic efficient algorithms for distributed shortest paths Theoretical Computer Science
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
A study of hinge-transmit property of BGP routing system Forum on Computer Science-Technology and Applications (IFCSTA)
2010
Rottenstreich, O.
Keslassy, I.
The variable-increment counting Bloom filter ComNet, Technion, Israel (TR10-03)
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
An application-aware load balancing strategy for network processors Conf. on High performance embedded architectures and compilers (HIPEAC)
2010
Moon, D.
Naous, J.
Liu, J.
Zarifis, K.
Casado, M.
Koponen, T.
Shenker, S.
Breslau, L.
Bridging the software/hardware forwarding divide anon.

2009

Year Author(s) Title Publication
2009
Strowes, S.D.
Perkins, C.
Deterministic, reduced-visibility inter-domain forwarding ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2009
Sellke, H.
Wang, C.-C.
Bagchi, S.
Shroff, N.B.
Camouflaging timing channels in web traffic Purdue Univ. (TR-ECE-09-14)
2009
Rajahalme, J.
Sarela, M.
Visala, K.
Riihijarvi, J.
Inter-domain rendezvous service architecture PSIRP (TR09-003)
2009
Miller, K.
Eliassi-Rad, T.
Continuous time group discovery in dynamic graphs Workshop on Analyzing Networks and Learning with Graphs (NIPS)
2009
Chen, K.
Choffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2009
Beheshti-Zavareh, N. Tiny buffers for electronic and optical routers Stanford Univ.
2009
Schear, N.
Borisov, N.
Preventing SSL traffic analysis with realistic cover traffic ACM Conf. on Computer and Communications Security (CCS)
2009
Merindol, P.
Van den Schrieck, V.
Donnet, B.
Bonaventure, O.
Pansiot, J.-J.
Quantifying ASes multiconnectivity using multicast information ACM SIGCOMM Conf. on Internet Measurement (IMC)
2009
Augustin, B.
Krishnamurthy, B.
Willinger, W.
IXP's: mapped? ACM SIGCOMM Conf. on Internet Measurement (IMC)
2009
Jiang, W.
Prasanna, V.K.
Reducing dynamic power dissipation in pipelined forwarding engines IEEE Conf. on Computer Design (ICCD)
2009
Zhang, M.
Dusi, M.
John, W.
Chen, C.
Analysis of UDP traffic usage on internet backbone links Symp. on Applications and the Internet (SAINT)
2009
Zhang, G.-Q.
Zhang, G.-Q.
Cheng, S.-Q.
Zhou, T.
Symbiotic effect: A guideline for network modeling EPL (Europhysics Letters)
2009
Studer, A.
Perrig, A.
The coremelt attack Symp. on Research in Computer Security (ESORICS)
2009
Shu, W.
Changjia, C.
Backup routing for BGP: Virtual ring routing scheme IEEE Conf. on Computer Science and Information Technology (ICCSIT)
2009
Kyriakopoulos, K.G.
Parish, D.J.
Using wavelets for compression and detecting events in anomalous network traffic Conf. on Systems and Networks Communication
2009
Germoglio, G.
Dias, B.
Sousa, P.
Automated and distributed network service monitoring Asia-Pacific Network Operations and Management Symp. (APNOMS)
2009
Este, A.
Gringoli, F.
Salgarelli, L.
Support Vector Machines for TCP traffic classification Computer Networks
2009
Avramopoulos, I.
Suchara, M.
Protecting DNS from routing attacks: a comparison of two alternative anycast implementations IEEE Security and Privacy
2009
Andreou, M.S. Message traceback systems. Dancing with the devil Univ. of Newcastle upon Tyne
2009
Yang, G.
Dou, W.
An efficient algorithm for AS path inferring Conf. on Hybrid Information Technology
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
Joint entropy analysis model for DDoS attack detection Conf. on Information Assurance and Security (IAS)
2009
Miwa, S.
Suzuki, M.
Hazeyama, H.
Uda, S.
Miyachi, T.
Kadobayashi, Y.
Shinoda, Y.
Experiences in emulating 10K AS topology with massive VM multiplexing ACM workshop on Virtualized infrastructure systems and architectures
2009
Cittadini, L.
Rimondini, M.
Corea, M.
Di Battista, G.
On the feasibility of static analysis for BGP convergence IFIP/IEEE Symp. on Integrated Network Management (IM)
2009
Asai, H.
Esaki, H.
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs Asia Future Internet summer school, Jeju, Korea
2009
Amaral, P.
Bernardo, L.
Pinto, P.
DTIA: An Architecture for Inter-Domain Routing IEEE Conf. on Communications (ICC)
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
A traffic coherence analysis model for DDoS attack detection Conf. on Security and Cryptography (SECRYPT)
2009
Erlebach, T.
Moonen, L.S.
Spieksma, F.C.R.
Vukadinovic, D.
Connectivity measures for internet topologies on the level of autonomous systems Operations Research
2009
Bui, Q.D.
Jennings, A.
Relay node selection in large-scale VoIP overlay networks Conf. on Ubiquitous and Future Networks (ICUFN)
2009
Xu, Y.
Zhang, W.
A power-law approach on router-level internet macroscopic topology modeling Fuzzy Information and Engineering, Volume 2
2009
Vishwanath, K.V.
Vahdat, A.
Swing: Realistic and responsive network traffic generation IEEE/ACM Trans. on Networking
2009
Shavitt, Y.
Shir, E.
Weinsberg, U.
Near-deterministic inference of AS relationships Conf. on Telecommunications (ConTEL)
2009
Korn, A.
Schubert, A.
Telcs, A.
Lobby index in networks Physica A: Statistical Mechanics and its Applications
2009
Ishakian, V.
Akinwumi, J.
Matta, I.
On the cost of supporting multihoming and mobility Boston Univ., CS Dept. (BUCS-TR--020)
2009
Clegg, R.G.
Withall, M.S.
Moore, A.W.
Phillips, I.W.
Parish, D.J.
Rio, M.
Landa, R.
Haddadi, H.
Kyriakopoulos, K.
Auge, J.
Clayton, R.
Salmon, D.
Challenges in the capture and dissemination of measurements from high-speed networks IET Communications
2009
Brugger, S.T. The quantitative comparison of computer networks UC Davis
2009
Asai, H.
Esaki, H.
A methodology for magnitude-based inter-AS distance estimation WIT, Hokkaido, Japan
2009
Xu, Y.
Zhao, H.
An improved BA model for router-level internet macroscopic topology IAENG J. Computer Science
2009
Saucez, D.
Donnet, B.
Bonaventure, O.
On the impact of clustering on measurement reduction IFIP-TC6 Networking Conf. (NETWORKING)
2009
Di Menna, A.
Refice, T.
Cittadini, L.
Di Battista, G.
Measuring route diversity in the internet from remote vantage points IEEE Conf. on Networking (ICN)
2009
D'Ignazio, A.
Giovannetti, E.
Asymmetry and discrimination in Internet peering: evidence from the LINX J. Industrial Organization
2009
Weinsberg, U.
Shavitt, Y.
Shir, E.
Near-deterministic inference of AS relationships IEEE Conf. on Computer Communications (INFOCOM)
2009
Saxena, M.
Kompella, R.
A framework for efficient class-based sampling IEEE Conf. on Computer Communications (INFOCOM)
2009
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Measuring complexity and predictability in networks with multiscale entropy analysis IEEE Conf. on Computer Communications (INFOCOM)
2009
Liu, B.
Cui, Y.
Lu, Y.
Xue, Y.
Locality-awareness in BitTorrent-like P2P applications IEEE Trans. on Multimedia
2009
Hasegawa, G.
Hiraoka, Y.
Murata, M.
Evaluation of free-riding traffic problem in overlay routing and its mitigation method Conf. on Networking and Services (ICNS)
2009
Haeberlen, A.
Avramopoulos, I.
Rexford, J.
Druschel, P.
NetReview: detecting when interdomain routing goes wrong Usenix Symp. on Networked Systems Design and Implementation (NSDI)
2009
Eberle, W.
Holder, L.
Cook, D.
Identifying threats using graph-based anomaly detection Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4
2009
Zhang, G. Measuring the impacts of sampling bias on internet AS-level topology inference WRI Conf. on Communications and Mobile Computing (CMC)
2009
Terdik, G.
Gyires, T.
Does the internet still demonstrate fractal nature? IEEE Conf. on Networking (ICN)
2009
Lumezanu, C.
Baden, R.
Spring, N.
Bhattacharjee, B.
Triangle inequality and routing policy violations in the internet Conf. Passive and Active Measurement (PAM)
2009
Idzikowski, F. Search and analysis of backbone traffic measurements in the internet Technische Univ. Berlin (TKN-09-004)
2009
Gunes, M.H.
Sarac, K.
Analyzing router responsiveness to active measurement probes Conf. Passive and Active Measurement (PAM)
2009
Durresi, A.
Paruchuri, V.
Barolli, L.
Fast autonomous system traceback J. Network and Computer Applications
2009
Xiao, B.
Liu, L.
Guo, X.
Xu, K.
Modeling the IPv6 internet AS-level topology Physica A: Statistical Mechanics and its Applications
2009
Terdik, G.
Gyires, T.
Levy flights and fractal modeling of internet traffic IEEE/ACM Trans. on Networking (TON)
2009
Kaune, S.
Pussep, K.
Leng, C.
Kovacevic, A.
Tyson, G.
Steinmetz, R.
Modelling the internet delay space based on geographical locations Conf. on Parallel, Distributed and Network-based Processing
2009
Puzis, R.
Yagil, D.
Elovici, Y.
Braha, D.
Collaborative attack on internet users' anonymity Internet Research
2009
Maiolini, G.
Molina, G.
Baiocchi, A.
Rizzi, A.
On the fly application flows identification by exploiting K-means based classifiers J. Information Assurance and Security
2009
Kanizo, Y.
Hay, D.
Keslassy, I.
Optimal dynamic hash tables ComNet, Technion, Israel (TR09-03)
2009
Dai, L
Cao, Y.
Cui, Y.
Xue, Y.
On scalability of proximity-aware peer-to-peer streaming Computer Communications
2009
Andreou, M.S.
van Moorsel, A.
COTraSE Connection Oriented Traceback in Switched Ethernet J. Information Assurance and Security

2008

Year Author(s) Title Publication
2008
Wu, M.-F.
Jiang, T.M.
Wu, A.
A virtual service framework for service composition QoS based on active measurement Symp. on Service-Oriented System Engineering (SOSE)
2008
Kang, U.
Tsourakakis, C.
Appel, A.P.
Faloutsos, C.
Leskovec, J.
HADI: Fast diameter estimation and mining in massive graphs with Hadoop Carnegie Mellon Univ. (CMU-ML-08-117)
2008
Hei, Y.
Nakao, A.
Hasegawa, T.
Ogishi, T.
Yamamoto, S.
AS alliance: cooperatively improving resilience of intra-alliance communication ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2008
Beiro, M.G.
Alvarez-Hamelin, J.I.
Busch, J.R.
A low complexity visualization tool that helps to perform complex systems analysis New J. Physics
2008
Serrano, M.A.
De Los Rios, P.
Structural efficiency of percolated landscapes in flow networks Plos One
2008
MacArthur, B.D.
Sanchez-Garcia, R.J.
Anderson, J.W.
Symmetry in complex networks Discrete Applied Mathematics
2008
He, X.
Parameswaran, S.
MCAD: Multiple connection based anomaly detection IEEE Conf. on Communication Systems (ICCS)
2008
Casado, M.
Koponen, T.
Moon, D.
Shenker, S.
Rethinking packet forwarding hardware ACM SIGCOMM HotNets Workshop
2008
Vilhar, A.
Novak, R.
Policy relationship annotations of predefined AS-level topologies Computer Networks
2008
Li, C.
Zhao, H.
Zhang, X.
Wang, L.
Correctness of sampling bias on Internet router-level topology Intl Conf. on Wireless Communications, Networking and Mobile Computing
2008
Bi, X.
Tan, W.
Xiao, R.
A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems Symp. on Computer and Computational Sciences (IMSCSS)
2008
Baiocchi, A.
Maiolini, G.
Molina, G.
Rizzi, A.
On-the-fly statistical classification of internet traffic at application layer based on cluster analysis Workshop on Computational Intelligence in Security for Information Systems (CISIS)
2008
Wojciechowski, M. Border Gateway modeling and simulation Dep. Computer Science, VU Univ. Amsterdam
2008
Wei, W.
Dong, Y.
Lu, D.
Jin, G.
Optimal control of DDoS defense with multi-resource max-min fairness Conf. on Cybernetics and Intelligent Systems
2008
Raghavan, V.
Riley, G.
Jaafar, T.
Realistic topology modeling for the internet BGP infrastructure IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
2008
Dusi, M.
Gringoli, F.
Salgarelli, L.
IP traffic classification for QoS guarantees: the independence of packets IEEE Conf. on Computer Communications and Networks (ICCCN)
2008
Dramburg, M. Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien Hochschule fuer Angewandte Wissenschaften Hamburg, Germany
2008
Zhang, J.
Zhao, H.
Zhou, Y.
The study on characteristics of the coreness of router-level internet nodes Chinese Control and Decision Conf. (CCDC)
2008
Choi, H.
Lee, H.
Kim, H.
Fast detection and visualization of network attacks on parallel coordinates Computers and Security
2008
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Metrics for characterizing complexity of network traffic Conf. on Telecommunications (ICT)
2008
Pouzols, F.M.
Barriga, A.
Lopez, D.R.
Sanchez-Solano, S.
Linguistic summarization of network traffic flows IEEE Conf. on Fuzzy Systems (FUZZ-IEEE)
2008
Katz, G.J.
Kider, J.T.
All-pairs shortest-paths for large graphs on the GPU ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware
2008
Li, L.
Chen, C.
Exploring possible strategies for competitions between Autonomous Systems IEEE Conf. on Communications (ICC)
2008
Irwin, B.
Pilkington, N.
High level internet scale traffic visualization using Hilbert curve mapping Workshop on Visualization for Computer Security (VizSEC)
2008
Shevtekar, A.
Ansari, N.
A router-based technique to mitigate reduction of quality (RoQ) attacks Computer Networks
2008
Latapy, M.
Magnien, C.
Complex network measurements: estimating the relevance of observed properties IEEE Conf. on Computer Communications (INFOCOM)
2008
Fraigniaud, P.
Febhar, E.
Viennot, F.
The inframetric model for the internet IEEE Conf. on Computer Communications (INFOCOM)
2008
Clegg, R.
Landa, R.
Haddadi, H.
Rio, M.
Moore, A.W.
Techniques for flow inversion on sampled data IEEE INFOCOM Workshop Global Internet Symp.
2008
Meitinger, M.
Ohlendorf, R.
Wild, T.
Herkersdorf, A.
A hardware packet re-sequencer unit for network processors Architecture of Computing Systems (ARCS)
2008
Xiao, Y.
MacArthur, B.D.
Wang, H.
Xiong, M.
Wang, W.
Network quotients: structural skeletons of complex systems Phys. Rev. E
2008
Wei, S.
Mirkovic, J.
Correcting congestion-based error in network telescope's observations of worm dynamics ACM SIGCOMM Conf. on Internet Measurement (IMC)
2008
Wahlisch, M.
Schmidt, T.C.
Spalt, W.
What is happening from behind?: Making the impact of internet topology visible Campus-Wide Information Systems
2008
Raspall, F.
Sallent, S.
Adaptive shared-state sampling ACM SIGCOMM Conf. on Internet Measurement (IMC)
2008
Proebstel, E. Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic UC Davis
2008
Li, P.
Bi, J.
Zhou, Z.
A backscatter technology based study on source address spoofing Periodical of Ocean Univ. of China
2008
Li, C.
Zhao, H.
Zhang, X.
Ge, X.
Research on the distribution of network nodes based on multiple measurement points Computer Science
2008
John, J.P.
Katz-Bassett, E.
Krishnamurthy, A.
Anderson, T.
Venkataramani, A.
Consensus routing: the internet as a distributed system Usenix Symp. on Networked Systems Design and Implementation (NSDI)
2008
Hazeyama, H.
Suzuki, M.
Miwa, S.
Miyamoto, D.
Kadobayashi, Y.
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures Conf. on Cyber Security Experimentation and Test
2008
Francois, J.
State, R.
Festor, O.
Activity monitoring for large honeynets and network telescopes J. Advances in Systems and Measurements
2008
Este, A.
Gringoli, F.
Salgarelli, L.
An SMV-based approach to traffic classification Univ. of Brescia

2007

Year Author(s) Title Publication
2007
Qazi, S.
Moors, T.
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks IEEE Global Telecommunications Conf. (GLOBECOM)
2007
Muehlbauer, W.
Uhlig, S.
Fu, B.
Meulle, M.
Maennel, O.
In search for an appropriate granularity to model routing policies ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
Network performance analysis based on histogram workload models IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
2007
Ballani, H.
Francis, P.
Zhang, X.
A study of prefix hijacking and interception in the internet ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2007
Shevtekar, A.
Ansari, N.
A proactive test based differentiation to mitigate low rate DoS attacks IEEE Conf. on Computer Communications and Networks (ICCCN)
2007
Whitehead, B.
Lung, C.-H.
Rabinovitch, P.
A TCP connection establishment filter: symmetric connection detection IEEE Conf. on Communications (ICC)
2007
Leguay, J.
Latapy, M.
Friedman, T.
Salamatiana, K.
Describing and simulating internet routes Computer Networks
2007
Dainotti, A.
Pescape, A.
Ventre, G.
Worm traffic analysis and characterization IEEE Conf. on Communications (ICC)
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation UC Riverside
2007
Clegg, R.
Haddadi, H.
Landa, R.
Rio, M.
Towards informative statistical flow inversion arxiv.org
2007
Chen, Z.
Ji, C.
Measuring network-aware worm spreading ability IEEE Conf. on Computer Communications (INFOCOM)
2007
Zhou, S.
Zhang, G.-Q.
Chinese Internet AS-level topology IET Communications
2007
Vojnovic, M.
Gupta, V.
Karagiannis, T.
Gkantsidis, C.
Sampling strategies for epidemic-style information dissemination IEEE Conf. on Computer Communications (INFOCOM)
2007
Schmidt, T.C.
Wahlisch, M.
Zhang, Y.
On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing IEEE Conf. on Networking (ICN)
2007
Haddadi, H.
Landa, R.
Rio, M.
Bhatti, S.
Revisiting the issues on netflow sample and export performance arxiv.org
2007
Kunzmann, G.
Nagel, R.
Hossfeld, T.
Binzenhofer, A.
Eger, K.
Efficient simulation of large-scale P2P networks: modeling network transmission times EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP)
2007
Yuan, L.
Chuah, C.
Mohapatra, P.
ProgME: towards programmable network measurement ACM SIGCOMM Computer Communication Review
2007
Wu, J.
Zhang, Y.
Mao, Z.M.
Shin, K.G.
Internet routing resilience to failures: analysis and implications ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2007
Salgarelli, L.
Gringoli, F.
Karagiannis, T.
Comparing traffic classifiers ACM SIGCOMM Computer Communication Review
2007
Li, C.
Zhao, H.
Zhang, X.
Yuan, S.
Analysis on traveling time of internet China Institute of Communications
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network monitoring using traffic dispersion graphs (TDGs) ACM SIGCOMM Conf. on Internet Measurement (IMC)
2007
Huang, C.
Li, J.
Ross, K.W.
Can internet video-on-demand be profitable? ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
A histogram-based stochastic process for finite buffer occupancy analysis Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS)
2007
Clegg, R. Simulating internet traffic with Markov-modulated processes UK Performance Engineering Workshop
2007
Chen, Z.
Ji, C.
Optimal worm-scanning method using vulnerable-host distributions J. Security and Networks

2006

Year Author(s) Title Publication
2006
Park, J.
Tyan, H.-R.
Jay Kuo, C.-C.
GA-based internet traffic classification technique for QoS provisioning Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
2006
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Deployment of an algorithm for large-scale topology discovery IEEE J. Selected Areas in Communications
2006
Donnet, B.
Bayant, B.
Friedman, T.
Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2006
Okuno, M.
Nishimura, S.
Ishida, S.
Nishi, H.
Cache-based network processor architecture: evaluation with real network traffic IEICE Trans. on Electronics
2006
Guillaume, J.-L.
Latapy, M.
Magoni, D.
Relevance of massively distributed explorations of the internet topology: qualitative results Computer Networks
2006
Yaar, A.
Perrig, A.
Song, D.
StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense IEEE J. Selected Areas in Communications
2006
Vishwanath, K.
Vahdat, A.
Realistic and responsive network traffic generation ACM SIGCOMM Computer Communication Review
2006
Varghese, G.
Fingerhut, J.
F. Bonomi, F.
Detecting evasion attacks at high speeds without reassembly ACM SIGCOMM Computer Communication Review
2006
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links IEEE/ACM Trans. on Networking (TON)
2006
Clegg, R. Markov-modulated on/off processes for long-range dependent internet traffic arxiv.org
2006
Restrepo, J.G.
Ott, E.
Hunt, B.R.
Characterizing the dynamical importance of network nodes and links Phys. Rev. Lett.
2006
Rajab, M.
Monrose, F.
Terzis, A.
Fast and evasive attacks: highlighting the challenges ahead Symp. on Recent Advances in Intrusion Detection (RAID)
2006
Latapy, M.
Magnien, C.
Measuring fundamental properties of real-world complex networks arxiv.org
2006
Francois, J.
State, R.
Festor, O.
Tracking global wide configuration errors IEEE Workshop on Monitoring, Attack Detection and Mitigation
2006
Farhat, H. Protecting TCP services from denial of service attacks SIGCOMM workshop on Large-Scale Attack Defense (LSAD)
2006
Chan, H.
Dash, D.
Perrig, A.
Zhang, H.
Modeling adoptability of secure BGP protocols Joint Conf. on Measurement and Modeling of Computer Systems
2006
Zhang, L.
Guan, Y.
TOPO: a topology-aware single packet attack traceback scheme Securecomm and Workshops
2006
Constantinou, F.
Mavrommatis, P.
Identifying known and unknown peer-to-peer traffic IEEE Symp. on Network Computing and Applications (NCA)
2006
Hamadeh, I.
Kesidis, G.
Toward a framework for forensic analysis of scanning worms Emerging Trends in Information and Communication Security (ETRICS)
2006
Donnet, B.
Friedman, T.
Topology discovery using an address prefix based stopping rule UNICE : Networks and Applications Towards a Ubiquitously Connected World
2006
Wang, H.
Lin, Y.
Jin, Y.
Cheng, S.
Easily-implemented adaptive packet sampling for high speed networks flow measurement Conf. on Computational Science (ICCS)
2006
Peng, Y.
Gong, J.
Yang, W.
Liu, W.
Disclosing the element distribution of Bloom filter Conf. on Computational Science (ICCS)
2006
Kumar, S.
Maschmeyer, J.
Crowley, P.
Exploiting locality to ameliorate packet queue contention and serialization ACM Conf. on Computing Frontiers
2006
Donnet, B.
Raoult, P.
Friedman, T.
Efficient route tracing from a single source arxiv.org
2006
Chen, Y.
Hwang, K.
Collaborative change detection of DDoS attacks on community and ISP networks IEEE Symp. on Collaborative Technologies and Systems (CTS)
2006
Shriram, A.
Kaur, J.
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth Conf. Passive and Active Measurement (PAM)
2006
Jin, S.
Bestavros, A.
Small-world characteristics of internet topologies and implications on multicast scaling Computer Networks
2006
Hu, Y.
Chiu, D.-M.
Lui, J.
Entropy based flow aggregation IFIP-TC6 Networking Conf. (NETWORKING)
2006
D'Ignazio, A.
Giovannetti, E.
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach J. Competition Law and Economics
2006
Clegg, R. Modelling internet traffic using Markov chains Imperial College, London, UK

2005

Year Author(s) Title Publication
2005
Erlebach, T.
Moonen, L.S.
Spieksma, F.
Vukadinovic, D.
Connectivity measures for internet topologies K.U. Leuven
2005
Xiang, Y.
Zhou, W.
Mark-aided distributed filtering by using neural network for DDoS defense IEEE Global Telecommunications Conf. (GLOBECOM)
2005
Rajab, M.
Monrose, F.
Terzis, A.
Worm evolution tracking via timing analysis ACM workshop on Rapid Malcode (WORM)
2005
Janic, M.
Van Mieghem, P.
On properties of multicast routing trees J. Communication Systems
2005
Chen, Z.
Ji, C.
Importance-scanning worm using vulnerable-host distribution IEEE Global Telecommunications Conf. (GLOBECOM)
2005
Chen, Z.
Lin, C.
Ni, J.
Ruan, D.-H.
Zheng, B.
Jiang, Y.-X.
Peng, X.
Wang, Y.
Luo, A.
Zhu, B.
Yue, Y.
Ren, F.-Y.
Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN IEEE Conf. on Local Computer Networks (LCN)
2005
Kumar, A.
Paxson, V.
Weaver, N.
Exploiting underlying structure for detailed reconstruction of an internet-scale event ACM SIGCOMM Conf. on Internet Measurement (IMC)
2005
Kompella, R.
Estan, C.
The power of slicing in internet flow measurement ACM SIGCOMM Conf. on Internet Measurement (IMC)
2005
Chen, R.
Park, J.-M.
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources IEEE Conf. on Computer Communications and Networks (ICCCN)
2005
Su, W.-J.
Zhao, H.
Xu, Y.
Zhang, W.-B.
Internet complex network separation degree analysis based on hops J. China Inst. of Communications
2005
Rajab, M.
Monrose, F.
Terzis, A.
On the effectiveness of distributed worm monitoring Usenix Security Symp.
2005
Veitch, D.
Hohna, N.
Abry, P.
Multifractality in TCP/IP traffic: the case against Computer Networks
2005
Martins, O.A. Affecting IP traceback with recent Internet topology maps Iowa State Univ.
2005
Jiang, H.
Dovrolis, C.
Why is the internet traffic bursty in short (sub-RTT) timescales? ACM SIGMETRICS Performance Evaluation Review
2005
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Efficient algorithms for large-scale topology discovery ACM SIGMETRICS Conf. on Measurement and modeling of computer systems
2005
Donnet, B.
Friedman, T.
A CIDR stopping rule for topology discovery Algotel
2005
Chhabra, P.
John, A.
Saran, H.
PISA: Automatic extraction of traffic signatures IFIP-TC6 Networking Conf. (NETWORKING)
2005
Okuno, M.
Ishida, S.
Nishi, H.
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera IEICE Trans. on Electronics
2005
Yaar, A.
Perrig, A.
Song, D.
FIT: Fast Internet Traceback IEEE Conf. on Computer Communications (INFOCOM)
2005
Donnet, B.
Friedman, T.
Crovella, M.
Improved algorithms for network topology discovery Conf. Passive and Active Measurement (PAM)

2004

Year Author(s) Title Publication
2004
Prince, C.
Wyatt, D.
Confidence-weighted marginal utility analyses for improved internet mapping CSE, Univ. of Washington
2004
Karagiannis, T.
Molle, M.
Faloutsos, M.
Long-range dependence: ten years of Internet traffic modeling IEEE Internet Computing
2004
Yaar, A.
Perrig, A.
Song, D.
SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacks IEEE Symp. on Security and Privacy
2004
Tang, L.
Crovella, M.
Geometric exploration of the landmark selection problem Conf. Passive and Active Measurement (PAM)
2004
Xu, K.
Duan, Z.
Zhang, Z.-L.
Chandrashekar, J.
On properties of Internet Exchange Points and their impact on AS topology and relationship IFIP-TC6 Networking Conf. (NETWORKING)
2004
Okuno, M.
Nishi, H.
Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler IEICE technical report: Circuits and system
2004
Zhou, S.
Mondragon, R.J.
Redundancy and robustness of AS-level Internet topology and its models Electronics Letters

2003

Year Author(s) Title Publication
2003
Tang, L.
Crovella, M.
Virtual landmarks for the internet ACM SIGCOMM Conf. on Internet Measurement (IMC)
2003
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links ACM SIGCOMM Conf. on Internet Measurement (IMC)
2003
Lakhina, A.
Byers, J.W.
Crovella, M.
Matta, I.
On the geographic location of internet resources J. on Selected Areas in Communications
2003
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice ACM Trans. on Computer Systems (TOCS)
2003
Estan, C.
Savage, S.
Varghese, G.
Automatically inferring patterns of resource consumption in network traffic ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2003
Teixeira, T.
Marzullo, K.
Savage, S.
Voelker, G.M.
Characterizing and measuring path diversity of internet topologies ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS)
2003
Yaar, A.
Perrig, A.
Song, D.
Pi: a path identification mechanism to defend against DDoS attacks IEEE Symp. on Security and Privacy

2002

Year Author(s) Title Publication
2002
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting ACM SIGCOMM Computer Communication Review

1999

Year Author(s) Title Publication
1999
Fang, W.
Peterson, L.
Inter-AS traffic patterns and there implications IEEE Global Telecommunications Conf. (GLOBECOM)

  Last Modified: Mon Mar-17-2014 13:55:49 PDT
  Page URL: http://www.caida.org/data/publications/bydate/index.xml