Skip to Content
[CAIDA - Cooperative Association for Internet Data Analysis logo]
The Cooperative Association for Internet Data Analysis
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of our datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|  View By:    date    author    dataset    publication    location  |
|  Citation Format:    abbreviated    complete  |

2013

Year Author(s) Title Publication
2013
Namayanja, J.M.
Janeja, V.P.
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks IEEE Conf. on Intelligence and Security Informatics
2013
Schmidt, R.
Sadre, R.
Pras, A.
Gaussian traffic revisited IFIP Networking Conf.
2013
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
On the local approximations of node centrality in Internet router-level topologies Int. Workshop on Self-Organizing Systems (IWSOS)
2013
Chen, A.
Chan, E.W.W.
Luo, X.
Fok, W.W.T.
Chang, R.K.C.
An efficient approach to multi-level route analytics IFIP/IEEE Symp. on Integrated Network Management
2013
Yu, M.
Jose, L.
Miao, R.
Software defined traffic measurement with OpenSketch Usenix Symp. on Networked Systems Design and Implementation (NSDI)
2013
Hofstede, R.
Drago, I.
Sperotto, A.
Sadre, R.
Pras, A.
Measurement artifacts in NetFlow data Conf. Passive and Active Measurement (PAM)
2013
Tidy, L.
Woodhead, S.
Wetherall, J.
A large-scale zero-day worm simulator for cyber-epidemiological analysis Int. Conf. on Advances in Computer Science and Electronics Engineering (CSEE)
2013
Wang, F.
Zhang, Y.
Guo, H.
Wang, C.
Combating good point set scanning-based self-learning worms by using predators J. Network Security

2012

Year Author(s) Title Publication
2012
Yu, M.
Jiang, W.
Li, H.
Stoica, I.
Tradeoffs in CDN designs for throughput oriented traffic ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2012
Vasilakos, X.
Katsaros, K.
Xylomenos, G.
Cloud computing for global name-resolution in information-centric networks IEEE Symp. on Network Cloud Computing and Applications (NCCA)
2012
Sherry, J. Future architectures for middlebox processing services on the Internet and in the Cloud UC Berkeley
2012
Ren, D.
Wong, W.
Gary Chan, S.-H.
Toward continuous push-based P2P live streaming IEEE Global Telecommunications Conf. (GLOBECOM)
2012
Meyer, S.
Wahlisch, M.
Schmidt, T.C.
Exploring reachability via settlement-free peering ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2012
Liu, W.
Yan, Y.
Dong, T.
Run-hua, T.
Self-similarity and heavy-tail of ICMP traffic J. Computers
2012
Coelho, N.M.M. Profiling de trafego inter-operador baseado em analise multi-escalar Univ. de Aveiro
2012
Basaran, C.
Kang, K.-D.
Zhou, Y.
Suzer, M.H.
Adaptive load shedding via fuzzy control in data stream management systems Int. Conf. on Service-Oriented Computing and Applications (SOCA)
2012
Ahmad, M.Z.
Guha, R.
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation J. Supercomputing
2012
Santiago del Rio, P.M.
Rossi, D.
Gringoli, F.
Nava, L.
Salgarelli, L.
Aracil, J.
Wire-speed statistical classification of network traffic on commodity hardware ACM SIGCOMM Conf. on Internet Measurement (IMC)
2012
Moriyama, E.
Takahashi, T.
Miyamoto, D.
DNS-based defense against IP spoofing attacks Conf. on Neural Information Processing
2012
Karasawa, T.
Soshi, M.
Miyaji, A.
A novel hybrid IP traceback scheme with packet counters Conf. on Internet and Distributed Computing Systems (IDCS)
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
A GI/G/1 model for 10 Gb/s energy efficient ethernet links IEEE Trans. on Communications
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Romano, D.
Enhancing the computation of distributed shortest paths on real dynamic networks Mediterranean Conf. on Algorithms
2012
Camacho, J.M.
Garcia-Martinez, A.
Bagnulo, M.
Valera, F.
BGP-XM: BGP eXtended multipath for transit Autonomous Systems Computer Networks
2012
Zhang, X.
Ding, W.
Comparative research on internet flows characteristics Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics
2012
Weinberg, Z.
Wang, J.
Yegneswaran, V.
Briesemeister, L.
Cheung, S.
Wang, F.
Boneh, D.
StegoTorus: a camouflage proxy for the Tor anonymity system ACM Conf. on Computer and Communications Security (CCS)
2012
Wachs, M.
Grothoff, C.
Thurimella, R.
Partitioning the Internet Conf. on Risks and Security of Internet and Systems (CRiSIS)
2012
Schuchard, M.
Geddes, J.
Thompson, C.
Hopper, N.
Routing around decoys ACM Conf. on Computer and Communications Security (CCS)
2012
Parno, B.
Zhou, Z.
Perrig, A.
Using trustworthy host-based information in the network Workshop on Scalable trusted computing (STC)
2012
Moreno, V.
Santiago del Rio, P.M.
Ramos, J.
Garnica, J.
Garcia-Dorado, J.L.
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines IEEE Communications Lett.
2012
Kim, J.
Park, M.
Han, S.
Kim, J.
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup IEICE Trans. on Communications
2012
Kato, M.
Cho, K.
Honda, M.
Tokuda, H.
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation Workshop on Managing Systems Automatically and Dynamically
2012
Iqbal, M.F.
John, L.K.
Efficient traffic aware power management in multicore communications processors ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS)
2012
Dinh, T.N.
Shen, Y.
Thai, M.T.
An efficient spectral bound for link vulnerability assessment in large-scale networks IEEE Military Communications Conf. (MILCOM)
2012
Cao, Z.
Panwar, S.S.
Efficient buffering and scheduling for a single-chip crosspoint-queued switch ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS)
2012
Bhatia, S.
Schmidt, D.
Mohay, G.
Ensemble-based DDoS detection and mitigation model Conf. on Security of Information and Networks (SIN)
2012
Ahmad, M.Z.
Guha, R.
A tale of nine Internet exchange points: studying path latencies through major regional IXPs IEEE Conf. on Local Computer Networks (LCN)
2012
Ahmad, M.Z.
Guha, R.
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks IEEE Conf. on Local Computer Networks (LCN)
2012
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
CBTree: A practical concurrent self-adjusting search tree Distributed Computing (DISC)
2012
Xu, E.
Hsu, W.
Lee, M.L.
Patel, D.
Top-k maximal influential paths in network data Database and Expert Systems Applications
2012
Xiaojuan, S.
Bin, L.
Stream data analysis for backbone network intrusion detection system Conf. on Oxide Materials for Electronic Engineering (OMEE)
2012
Tanga, M.
Zhang, G.
Lind, T.
Liua, J.
HDLBR: A name-independent compact routing scheme for power-law networks Computer Communications
2012
Preciado, V.M.
Draief, M.
Jadbabaie, A.
Structural analysis of viral spreading processes in social and communication networks using egonets arxiv.org
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the internet evolution Network Operations and Management Symposium (APNOMS)
2012
Kumar, P.A.R.
Selvakumar, S.
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Computer Communications
2012
Juen, J Protecting anonymity in the presence of autonomous system and internet exchange level adversaries Univ. of Illinois at Urbana-Champaign
2012
Goltsev, A.V.
Dorogovtsev, S.N.
Oliveira, J.G.
Mendes, J.F.F.
Localization and spreading of diseases in complex networks Phys. Rev. Lett.
2012
Cohen, N.
Couderty, D.
Lancin, A.
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs Project-Team MASCOTTE, INRIA
2012
Burger, V.
Lehrieder, F.
Hossfeld, T.
Seedorf, J.
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms Teletraffic Congress (ITC)
2012
Tyson, G.
Kaune, S.
Miles, S.
El-khatib, Y.
Mauthe, A.
Taweel, A.
A trace-driven analysis of caching in content-centric networks IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Rajahalma, J. Inter-domain incentives and Internet architecture Aalto Univ., FI
2012
Orman, G.K.
Labatut, V.
Cherifi, H.
Comparative evaluation of community detection algorithms: a topological approach J. Stat. Mechanics: Theory and Experiment
2012
Mogul, J.C.
Congdon, P.
Hey, you darned counters!: get off my ASIC! Workshop on Hot topics in software defined networks (HotSDN)
2012
Lin, Z
Hopper, N.
New attacks on timing-based network flow watermarks Usenix Security Symp.
2012
He, P.
Guan, H.
Xie, G.
Salamatian, K.
Evaluating and Optimizing IP Lookup on Many Core Processors IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Gringoli, F.
Nava, L.
Este, A.
Salgarelli, L.
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware Wireless Communications and Mobile Computing Conf. (IWCMC)
2012
Gjoka, M.
Kurant, M.
Markopoulou, A.
2.5K-graphs: from sampling to generation arxiv.org
2012
Detti, A.
Pomposini, M.
Blefari-Melazzi, N.
Salsano, S.
Supporting the Web with an information centric network that routes by name Computer Networks
2012
Beben, A.
Batalla, J.M.
Chai, W.K.
Sliwinski, J.
Multi-criteria decision algorithms for efficient content delivery in content networks Ann. Telecommunications
2012
Ager, B.
Chatzis, N.
Feldmann, A.
Sarrar, N.
Uhlig, S.
Willinger, W.
Anatomy of a large european IXP ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2012
Silva, J.M.C.
Lima, S.R.
Multiadaptive sampling for lightweight network measurements IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Sherry, J.
Kim, D.
Mahalingam, S.
Tang, A.
Wang, S.
Ratnasamy, S.
Netcalls: End host function calls to network traffic processing services UC Berkeley
2012
Lin, Z. Toward building practical privacy enhancing technologies Univ. Minnesota
2012
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architectures Computer Communications
2012
Fujikawa, K.
Tazaki, H.
Harai, H.
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network Symp. on Applications and the Internet (SAINT)
2012
Ahmad, M.Z.
Guha, R.
Evaluating end-user network benefits of peering with path latencies IEEE Conf. on Computer Communications and Networks (ICCCN)
2012
Zhao, Y.
Yuan, R.
Wang, W.
Meng, D.
Zhang, S.
Li, J.
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic Conf. on Networking, Architecture and Storage (NAS)
2012
Yang, T.
Duan, R.
Lu, J.
Zhang, S.
Dai, H.
Liu, B.
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy Conf. on Distributed Computing Systems (ICDCS)
2012
Tomasik, J.
Weisser, M.-A.
The inter-domain hierarchy in measured and randomly generated AS-level topologies IEEE Conf. on Communications (ICC)
2012
Sobrinho, J.L.
Tiago Quelhas, T.
A theory for the connectivity discovered by routing protocols IEEE/ACM Trans. on Networking (TON)
2012
Singh, J.
Kumar, K.
Sachdeva, M.
Sidhu, N.
DDoS attack's simulation using legitimate and attack real data sets J. Scientific and Engineering Research
2012
Silva, J.M.C.
Lima, S.R.
Optimizing network measurements through self-adaptive sampling Conf. on High Performance Computing and Communication (HPCC)
2012
Qardaji, W.
Li, N.
Anonymizing network traces with temporal pseudonym consistency Conf. on Distributed Computing Systems Workshops (ICDCSW)
2012
Markman, M.A.J.
Tokheim, S.
Reliable broadcast contribution over the public Internet Norwegian Univ. of Science and Technology
2012
Kuang, J.
Bhuyan, L.
Klefstad, R.
Traffic-aware power optimization for network applications on multicore servers Annual Design Automation Conf.
2012
Keating, A. Models for the simulation of a name-based interdomain routing architecture Aalto Univ., FI
2012
Kambhampati, V.
Papadopolous, C.
Massey, D.
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks IEEE/IFIP Conf. on Dependable Systems and Networks (DSN)
2012
Hsiao, H.-C.
Kim, T.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.D.
Perrig, A.
Sanctuary trail: refuge from Internet DDoS entrapment Carnegie Mellon Univ.
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Bounded energy consumption with dynamic packet coalescing Networks and Optical Communications (NOC)
2012
Hanay, Y.S.
Li, W.
Tessier, R.
Wolf, T.
Saving energy and improving TCP throughput with rate adaptation in Ethernet IEEE Conf. on Communications (ICC)
2012
Guo, Z.
Yang, Y.
High speed multicast scheduling in hybrid optical packet switches with guaranteed latency IEEE Trans. on Computers
2012
Fragni, C.
Costa, L.H.M.K.
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers Computer Networks
2012
Fiorese, A.
Simoes, P.
Boavida, F.
Peer selection in P2P service overlays using geographical location criteria Computational Science and Its Applications (ICCSA)
2012
Deng, W.
Muhlbauer, W.
Yang, Y.
Zhu, P.
Lu, X.
Plattner, B.
Shedding light on the use of AS relationships for path inference J. Communications and Networks
2012
Davy, A.
Jennings, B.
Botvich, D.
QoSPlan: A measurement based quality of service aware network planning framework J. Network and Systems Management
2012
Cesareo, J.
Karlin, J.
Schapira, M.
Rexford, J.
Optimizing the placement of implicit proxies Princeton Univ.
2012
Cesareo, J. Optimizing implicit proxy placement to evade traffic filters Princeton Univ.
2012
Xu, Y.
Zhang, X.
Analysis of Internet robustness in attacks Conf. on Systems and Informatics (ICSAI)
2012
Tozal, M.E.
Sarac, K.
Estimating network layer subnet characteristics via statistical sampling Lecture Notes in Computer Science, Vol.
2012
Seibert, J. Security and economic implications of localizing traffic in overlay networks Purdue Univ.
2012
Schlegel, R.
Wong, D.S.
Anonymous overlay network supporting authenticated routing Information Sciences
2012
Saucez, D.
Donnet, B.
On the dynamics of locators in LISP Networking
2012
Ren, D.
Chan, S.G.
Achieving high-bitrate overlay live streaming with proxy helpers Packet Video Workshop (PV)
2012
Papadakis, H.
Fragopoulou, P.
Markatos, E.
Roussopoulos, M.
ITA: Innocuous topology awareness for unstructured P2P networks IEEE Trans. on Parallel and Distributed Systems, Vol. PP (99)
2012
Nozaki, Y.
Tuncer, H.
Shenoy, N.
ISP tiered model based architecture for routing scalability Conf. on Communications (ICC)
2012
Martin, S.
Chiarello, L.
Leduc, G.
DISco: A distributed information store for network challenges and their outcome IEEE Conf. on Network Operations and Management Symposium (NOMS)
2012
Liu, Y.
Su, J.
Chang, R.K.C.
LDC: Detecting BGP prefix hijacking by load distribution change Parallel and Distributed Processing Symp. Workshops (IPDPSW)
2012
Korenfeld, B. CBTree: A practical concurrent self-adjusting search tree Tel Aviv Univ., Israel
2012
Hasan, S.
Gorinsky, S.
Obscure giants: detecting the provider-free ASes Networking
2012
Feitosa, E.
Souto, E.
Sadok, D.H.
An orchestration approach for unwanted Internet traffic identification Computer Networks
2012
Fan, J.
Hu, C.
He, K.
Jiang, J.
Liuy, B.
Reducing power of traffic manager in routers via dynamic on/off-chip scheduling IEEE INFOCOM
2012
Faggiani, A.
Gregori, E.
Lenzini, L.
Mainardi, S.
Vecchio, A.
On the feasibility of measuring the internet through smartphone-based crowdsourcing Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt)
2012
Chaudhury, A.
Basuchowdhuri, P.
Majumder, S.
Spread of information in a social network using influential nodes Advances in Knowledge Discovery and Data Mining
2012
Chai, W.K.
He, D.
Psaras, I.
Pavlou, G.
Cache 'less for more' in information-centric networks Networking
2012
Zhang, H.
Lu, G.
Qassrawi, M.T.
Zhang, Y.
Yu, X.
Feature selection for optimizing traffic classification Computer Communications
2012
Yang, M.-H.
Yang, M.-C.
RIHT: A novel hybrid IP traceback scheme IEEE Transactions on Information Forensics and Security
2012
Xu, Y.
Wang, Z.
Collapse by cascading failures in hybrid attacked regional Internet J. Security and Its Applications
2012
Wehmuth, K.
Ziviani, A.
Distributed assessment of the closeness centrality ranking in complex networks Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX)
2012
Verma, H.
Yadav, B.
Bansal, P.
Raj, S.
IPv4 to IPv6 shift: major challenges J. Engineering and Innovative Technology (IJEIT)
2012
Tawakol, A. Performance analysis of TCAMs in switches Univ. Waterloo, Ontario, CA
2012
Rahmani, H.
Sahli, N.
Kamoun, F.
DDoS flooding attack detection scheme based on F-divergence Computer Communications
2012
Pasquini, R.
Verdi, F.L.
Magalhaes, M.F.
Towards local routing state in the future internet WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC)
2012
Liu, H.
Hu, X.
Zhao, D.
Lu, X.
Failure isolation based defense against Internet CXPST-like attack J. Hybrid Information Technology
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection improvement based on spatial-temporal characteristics Advanced Science Lett.
2012
Zheng, L.
Zou, P.
Jia, Y
Han, W.
An online learning and unsupervised traffic anomaly detection system Advanced Science Lett.
2012
Zhang, W.
Bi, J.
Wu, J.
Zhang, B.
Catching popular prefixes at AS border routers with a prediction based method Computer Networks
2012
Tsidon, E.
Hanniel, I.
Keslassy, I.
Estimators also need shared values to grow together IEEE INFOCOM
2012
Strowes, S.D.
Perkins, C.
Harnessing Internet topological stability in Thorup-Zwick compact routing IEEE INFOCOM
2012
Sobrinho, J.L.
Le, F.
A fresh look at inter-domain route aggregation IEEE INFOCOM
2012
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter? IEEE INFOCOM
2012
Rottenstreich, O.
Kanizo, Y.
Keslassy, I.
The variable-increment counting Bloom filter IEEE INFOCOM
2012
Ribeiro, B.
Basu, P.
Towsley, D.
Multiple random walks to uncover short paths in power law networks IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS)
2012
Qin, D.
Yang, J.
Liu, Z.
Wang, H.
Zhang, B.
Zhang, W.
AMIR: Another multipath interdomain routing IEEE Conf. on Advanced Information Networking and Applications (AINA)
2012
Pan, T.
Guo, X.
Zhang, C.
Jiang, J.
Wu, H.
Liu, B.
Tracking millions of flows in high speed networks for application identification IEEE Conf. on Computer Communications (INFOCOM)
2012
Lutu, A.
Bagnulo, M.
Stanojevic, R.
An economic side-effect for prefix deaggregation IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS)
2012
Lee, C.
Lee, D.K.
Moon, S.
Unmasking the growing UDP traffic in a campus network Conf. Passive and Active Measurement (PAM)
2012
Jacquin, L.
Roca, V.
Kaafar, M.A.
Schuler, F.
Roch, J.-L.
IBTrack: an ICMP black holes tracker hal.archives-ouvertes.fr
2012
Huang, H.
Zhang, B.
Chan, S.-H.G.
Cheung, G.
Frossard, P.
Coding and replication co-design for interactive multiview video streaming IEEE INFOCOM
2012
Houmansadr, A.
Kiyavash, N.
Borisov, N.
Non-blind watermarking of network flows arxiv.org
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Optimal configuration of energy-efficient ethernet Computer Networks
2012
Grey, M.
Rossberg, M.
Schaefer, G.
Automatic creation of VPN backup paths for improved resilience against BGP-attackers ACM Symp. on Applied Computing (SAC)
2012
Gilbert, J. Scalable wavelet-based active network stepping stone detection Air Force Inst. of Technology, Air Univ,
2012
Cicerone, S.
D'Angelo, G.
Di Stefano, G.
Frigioni, D.
Maurizio, V.
Engineering a new algorithm for distributed shortest paths on dynamic networks Algorithmica
2012
Wang, Y.
Su, S.
Yang, Y.
Ren, J.
A more efficient hybrid approach for single-packet IP traceback EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP)
2012
Qin, D.
Yang, J.
Wang, H.
Zhang, B.
Gao, L.
Liu, Z.
Multipath interdomain routing via deviation from primary path Conf. on Information Networking (ICOIN)
2012
Lee, M.
Duffield, N.
Kompella, R.R.
Opportunistic flow-level latency estimation using consistent NetFlow IEEE/ACM Trans. on Networking (TON)
2012
Kanizo, Y.
Hay, D.
Keslassy, I.
Maximizing the throughput of cuckoo hashing in network devices ComNet, Technion, Israel
2012
Edwards, B.
Hofmeyr, S.
Stelle, G.
Forrest, S.
Internet topology over time arxiv.org
2012
Wei, W.
Yingjie, X.
Yabo, D.
ASTVA: DDoS-limiting architecture for Next Generation Internet Adv. Materials Research
2012
Shpiner, A.
Keslassy, I.
Cohen, R.
Reducing the reordering delay in multi-core network processors ComNet, Technion, Israel
2012
Karthick, R.R.
Hattiwale, V.P.
Ravindran, B.
Adaptive network intrusion detection system using a hybrid approach Conf. on Communication Systems and Networks (COMSNETS)
2012
Chen, Y.
Le Merrer, E.
Li, Z.
Yaning Liu, Y.
Simon, G.
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV Computer Networks
2012
Blefari-Melazzi, N.
Cancellieri, M.
Detti, A.
Pomposini, M.
Salsano, S.
The CONET solution for information centric networking Univ. of Rome
2012
Martinez, V.M. Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks Univ. Autonoma de Madrid
2012
Houmansadr, A. Design, analysis, and implementation of effective network flow watermarking schemes Univ. of Illinois at Urbana-Champaign
2012
Fu, Z. Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation Chalmers Univ. of Technology, Gothenborg, Sweden
2012
Ekiz, N.
Amer, P.D.
Transport layer reneging Univ. of Delaware
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Maurizio, V.
Engineering a new loop-free shortest paths routing algorithm Symp. on Experimental Algorithms (SEA)

2011

Year Author(s) Title Publication
2011
Xu, K.
Wang, F.
Behavioral graph analysis of Internet applications IEEE Global Telecommunications Conf. (GLOBECOM)
2011
Vishwanath, A.
Sivaraman, V.
Zhao, Z.
Russell, C.
Thottan, M.
Adapting router buffers for energy efficiency ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2011
Mukaddam, A.
ELHajj, I.
Hop count variability Conf. for Internet Technology and Secured Transactions (ICITST)
2011
Moreno, S.D.B. Evaluacion de desempeno de diversas arquitecturas de commutadores opticos Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia
2011
Drivere, A.A. Can we study the topology of the Internet from the vantage points of large and small content providers? Youngstown State Univ.
2011
Takahashi, E.K.
Chen, Y.
Lall, A.
Divergence in network traffic Midstates Conf. on Undergraduate Research in Computer Science and Mathematics
2011
Sommers, J.
Erikson, B.
Barford, P.
On the prevalence and characteristics of MPLS deployments in the open Internet ACM SIGCOMM Conf. on Internet Measurement (IMC)
2011
Liu, Y.
Peng, W.
Su, J.
Study on IP prefix hijacking in cloud computing networks based on attack planning Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom)
2011
Chen, M.
Yu, L.
Bai, H.
Two propositions about geographical distributions of BitTorrent file resources Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE)
2011
Zhang, Y.
Oliveira, R.
Wang, Y.
Su, S.
Zhang, B.
Bi, J.
Zhang, H.
Zhang, L.
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement IEEE J. Selected Areas in Communications
2011
Wehmuth, K.
Ziviani, A.
Distributed location of the critical nodes to network robustness based on spectral analysis Latin American Network Operations and Management Symp. (LANOMS)
2011
Takahashi, Y.
Ishibashi, K.
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic Conf. on Network Games, Control and Optimization (NetGCooP)
2011
Le, D.Q.
Jeong, T.
Roman, H.E.
Hong, J.W.
Traffic dispersion graph based anomaly detection Symp. on Information and Communication Technology (SolCT)
2011
Kurant, M.
Markopoulou, A.
Towards unbiased BFS sampling IEEE J. Selected Areas in Communications
2011
Jesus, V.
Aguiar, R.L.
Steenkiste, P.
Topological implications of cascading interdomain bilateral traffic agreements IEEE J. Selected Areas in Communications
2011
Hua, N.
Norige, E.
Kumar, S
Lynch, B.
Non-crypto hardware hash functions for high performance networking ASICs Symp. on Architectures for Networking and Communications Systems (ANCS)
2011
Houmansadr, A.
Nguyen, G.T.K.
Caesar, M.
Borisov, N.
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability ACM Conf. on Computer and Communications Security (CCS)
2011
Gjoka, M.
Kurant, M.
Butts, C.T.
Markopoulou, A.
Practical recommendations on crawling online social networks IEEE J. Selected Areas in Communications
2011
Ahmad, M.Z.
Guha, R.
Internet exchange points and Internet routing Conf. on Network Protocols (ICNP)
2011
Zhang, B.-F.
Li, Y.
Liu, Y.-J.
Su, J.-S.
Analysis of prefix hijacking based on AS hierarchical model Conf. on Network and System Security (NSS)
2011
Guo, Z.
Yang, Y.
Pipelining multicast scheduling in all-optical packet switches with delay guarantee International Teletraffic Congress (ITC)
2011
Clegg, R.
Landa, R.
Rio, M.
Criticisms of modelling packet traffic using long-range dependence (extended version) J. Computer and System Sciences
2011
Szekeres, A. Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failures Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam
2011
Spinelli, L.P. Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias Univ. Federal Do Rio de Janeiro, Brazil
2011
Detti, A.
Melazzi, N.B.
Salsano, S.
Pomposini, M.
CONET: a content centric inter-networking architecture ACM SIGCOMM Workshop on Information-Centric Networking (ICN)
2011
Bhatia, S.
Mohay, G.
Tickle, A.
Ahmed, E.
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event Conf. on Availability, Reliability and Security (ARES)
2011
Bell, C. Examining change in Internet topology in terms of external events, April 2001 - April 2002 Univ. of Nebraska at Omaha
2011
Venkataramanan, R.
Jeong, M.-W.
Prabhakar, B.
A flow- and packet-level model of the Internet Univ. Michigan
2011
Marsan, M.A.
Fernandez Anta, A.
Mancuso, V.
Rengarajan, B.
Vasallo, P.
Rizzo, G.
A simple analytical model for energy efficient ethernet IEEE Communications Lett.
2011
Leiva, A.
Finochietto, J.M.
Huiszoon, B.
Lopez, V.
Tarifeno, M.
Aracil, J.
Beghelli, A.
Comparison in power consumption of static and dynamic WDM networks Optical Switching and Networking
2011
Larrabeiti, D.
Reviriego, P.
Hernandez, J.A.
Maestro, J.A.
Uruena, M..
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability Optical Switching and Networking
2011
Du, H.
Yang, S.J.
Characterizing transition behaviors in Internet attack sequences IEEE Conf. on Computer Communications and Networks (ICCCN)
2011
Alvarez-Hamelin, J.I.
Anunziata, D.
Beiro, M.G.
Barrat, A.
Dall'Asta, L.
Vespignani, A.
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool) Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires
2011
Wong, E.L.
Shmatikov, V.
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing Conf. on Dependable Systems and Networks (DSN)
2011
Valgenti, V.C.
Paul, R.R.
Kim, M.S.
Netshuffle: Improving traffic trace anonymization through graph distortion IEEE Conf. on Communications (ICC)
2011
Suresh, M.
Anitha, R.
Evaluating machine learning algorithms for detecting DDoS attacks Advances in Network Security and Applications (CNSA)
2011
Strowes, S.D.
Mooney, G.
Perkins, C.
Compact routing on the Internet AS-graph IEEE Conf. on Computer Communications (INFOCOM)
2011
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter ComNet, Technion, Israel
2011
Moreira, M.D.D.
Laufer, R.
Fernandes, N.C.
Duarte, O.C.M.B.
A stateless traceback technique for identifying the origin of attacks from a single packet IEEE Conf. on Communications (ICC)
2011
Liu, Y.
Dai, B.
Zhu, P.
Su, J.
Whom to convince? It really matters in BGP prefix hijacking attack and defense Future Information Technology
2011
Karaoglu, H.T.
Yuksel, M.
Gunes, M.H.
On the scalability of path exploration using opportunistic path-vector routing IEEE Conf. on Communications (ICC)
2011
Helminger, M. Interactive visualization of global routing dynamics Technische Univ. Muenchen, Faculty of Informatics
2011
Grieco, L.A.
Barakat, C.
Marzulli, M.
Spectral models for bitrate measurement from packet sampled traffic IEEE Trans. on Network and Service Management
2011
Gregori, E.
Lenzini, L.
Orsini, C.
k-clique communities in the Internet AS-level topology graph Distributed Computing Systems Workshops (ICDCSW)
2011
Amaral, P.
Silva, E.
Bernardo, L.
Pinto, P.
Inter-domain traffic engineering using an AS-level multipath routing architecture IEEE Conf. on Communications (ICC)
2011
Siritana, H.
Kitisin, S.
Gertphol, S.
A study of autonomous system relationships within Thailand Conf. on Computer Science and Software Engineering (JCSSE)
2011
Mothersole, I.
Reed, M.J.
Optimising rule order for a packet filtering firewall Conf. on Network and Information Systems Security (SAR-SSI)
2011
He, F.
Xiang, F.
Yibo Xue, Y.
Jun Li, J.
Towards high-performance network application identification with aggregate-flow cache arxiv.org
2011
Akashi, O. Analysis of cooperative management strategies against route-hijacking IFIP/IEEE Symp. on Integrated Network Management (IM)
2011
Xu, K.
Wang, F.
Gu, L.
Network-aware behavior clustering of Internet end hosts IEEE Conf. on Computer Communications (INFOCOM)
2011
Scholz, J.
Greiner, M.
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics EPL (Europhysics Letters)
2011
Ekiz, N.
Rahman, A.H.
Amer, P.D.
Misbehaviors in TCP SACK generation ACM SIGCOMM Computer Communication Review
2011
Dusi, M.
Gringoli, F.
Salgarelli, L.
Quantifying the accuracy of the ground truth associated with Internet traffic traces Computer Networks
2011
Deng, W.
Zhu, P.
Xiong, N.
Xiao, Y.
Xiaofeng, H.
How resilient are individual ASes against AS-level link failures? IEEE Conf. on Computer Communications (INFOCOM)
2011
Deng, W.
Karaliopoulos, M.
Muehlbauer, W.
Zhu, P.
Lu, X.
Plattner, B.
k-Fault tolerance of the Internet AS graph Computer Networks
2011
Abouzakhar, N.S.
Chen, H.
Christianson, B.
An enhanced fuzzy ARM approach for intrusion detection J. Digital Crime and Forensics
2011
Youssef, M.
Kooij, R.
Scoglio, C.
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics J. Computational Science
2011
Wu, H.
Kvizhinadze, G.
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies Statistics and Probability Letters
2011
Reviriego, P.
Huiszoon, B.
Lopez, V.
Coenen, R.B.
Hernandez, J.A.
Maestro, J.A.
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links IEEE J. Selected Topics in Quantum Electronics
2011
Narita, M.
Katoh, T.
Bista, B.B.
Takata, T.
Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace Advanced Information Networking and Applications (WAINA)
2011
Melnik, S.
Hackett, A.
Porter, M.A.
Mucha, P.J.
Gleeson, J.P.
The unreasonable effectiveness of tree-based theory for networks with clustering Phys. Rev. E
2011
Jose, L.
Yu, M.
Rexford, J.
Online measurement of large traffic aggregates on commodity switches Usenix Conf. Hot-ICE
2011
Du, H.
Yang, S.J.
Discovering collaborative cyber attack patterns using social network analysis Conf. on Social computing, behavioral-cultural modeling and prediction (SBP)
2011
Alvarez-Hamelin, J.I.
Beiro, M.G.
Busch, J.R.
Understanding edge connectivity in the Internet through core decomposition Internet Mathematics
2011
Houmansadr, A.
Borisov, N.
SWIRL: A scalable watermark to detect correlated network flows Symp. on Network and Distributed System Security (NDSS)
2011
Tomasik, J.
Weisser, M.-A.
Internet topology on as-level: Model, generation methods and tool IEEE Performance Computing and Communications Conf. (IPCC)
2011
Schear, N. Preventing encrypted traffic analysis Univ. Illinois at Urbana-Champagne
2011
Liu, H.
Sun, Y.
Valgenti, V.C.
Kim, M.S.
TrustGuard: A flow-level reputation-based DDoS defense system Conf. on Consumer Communications and Networking (CCNC)
2011
Gregori, E.
Lenzini, L
Orsini, C.
k-dense communities in the internet AS-level topology Conf. on Communication Systems and Networks (COMSNETS)
2011
Gregori, E.
Improta, A.
Lenzini, L.
Orsini, C.
The impact of IXPs on the AS-level topology structure of the Internet Computer Communications
2011
Choras, M.
Saganowski, L.
Renk, R.
Holubowicz, W.
Statistical and signal-based network traffic recognition for anomaly detection Expert Systems
2011
Bangera, P.
Gorinsky, S.
Impact of prefix hijacking on payments of providers Conf. on Communication Systems and Networks (COMSNETS)
2011
Saganowski, L.
Andrysiak, T.
Choras, M.
Renk, R.
Expansion of matching pursuit methodology for anomaly detection in computer networks Advances in Intelligent and Soft Computing
2011
Pouzols, F.M.
Lopez, D.R.
Barros, A.B.
Predictive models of network traffic load Studies in Computational Intelligence
2011
Khan, F.M. Assuring network service with bandwidth and integrity based fairness Univ. of Illinois at Urbana-Champaign

2010

Year Author(s) Title Publication
2010
He, K.
Hu, C.
Jiang, J.
Zhou, Y.
Liu, B.
A2C: Anti-attack counters for traffic measurement IEEE Global Telecommunications Conf. (GLOBECOM)
2010
Haider, A.
Acharya, K.
Raja, M.Y.A.
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks High-Capacity Optical Networks and Enabling Technologies (HONET)
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system J. of Next Generation Information Technology
2010
Rasti, A.H.
Magharei, N.
Rejaie, R.
Willinger, W.
Eyeball ASes: from geography to connectivity ACM SIGCOMM Conf. on Internet Measurement (IMC)
2010
Mouchos, C.
Tsokanos, A.
Kouvatsos, D.D.
Dynamic OBS offset allocation in WDM networks Computer Communications
2010
Fan, X.
Heidemann, J.
Selecting representative IP addresses for internet topology studies ACM SIGCOMM Conf. on Internet Measurement (IMC)
2010
Beverly, R.
Berger, A.
Xie, G.G.
Primitives for active internet topology mapping: toward high-frequency characterization ACM SIGCOMM Conf. on Internet Measurement (IMC)
2010
Zadnik, M.
Canini, M.
Evolution of cache replacement policies to track heavy-hitter flows Symp. on Architectures for Networking and Communications Systems (ANCS)
2010
Yao, G.
Bi, J.
Zhou, Z.
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes ACM SIGCOMM Computer Communication Review
2010
Song, J.
Zhao, H.
Yang, B.
Sun, H.
AS-level Internet macroscopic topology centralization evolvement analysis J. Software Engineering and Applications
2010
Saxena, M.
Kompella, R.
CLAMP: Efficient class-based sampling for flexible flow monitoring Computer Networks
2010
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architectures Boston Univ., CS Dept.
2010
Huang, D.
Zhao, J.
Wang, X.
Trading bandwidth for playback lag: Can active peers help? Multi-media Conf.
2010
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols? ACM SIGCOMM Computer Communication Review
2010
de Montgolfier, F.
Soto, M.
Viennot, L.
Autour du caractere arborescent d'Internet MajecSTIC
2010
Ahmad, M.Z.
Guha, R.
Impact of Internet exchange points on Internet topology evolution Conf. on Local Computer Networks (LCN)
2010
Tomasik, J.
Weisser, M.-A.
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
2010
Kanizo, Y.
Hay, D.
Keslassy, I.
Hash tables with finite buckets are less resistant to deletions Allerton Conf. on Communication, Control and Computing
2010
Asai, H.
Esaki, H.
Estimating AS relationships for application-layer traffic optimization Workshop on Incentives, Overlays, and Economic Traffic Control (ETM)
2010
Asai, H.
Esaki, H.
Towards interdomain transit traffic reduction in peer-assisted content delivery networks Symp. on Telecommunications Network Strategy and Planning (NETWORKS)
2010
Abouzakhar, N.S.
Bakar, A.
A chi-square testing-based intrusion detection model Conf. on Cybercrime Forensics Education and Training (CFET )
2010
Scappini, R. Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas Facultad de Informatica, Univ. Nacional de la Plata
2010
Knauf, A.
Hege, G.
Schmidt, T.C.
Wahlisch, M.
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP Principles, Systems and Applications of IP Telecommunications (IPTComm)
2010
Guo, T.
Wang, N.
Tafazolli, R.
Moessner, K.
Policy-aware virtual relay placement for inter-domain path diversity IEEE Symp. on Computers and Communications (ISCC)
2010
Fadlullah, Z.M.
Taleb, T.
Vasilakos, A.V.
Guizani, M.
Kato, N.
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis IEEE/ACM Trans. on Networking (TON)
2010
del Rio, P.M.S.
Ramos, J.
Salvador, A.
de Vergara, J.E.L.
Aracil, J.
Cuadra, A.
Cutanda, M.
Application of Internet traffic characterization to all-optical networks Conf. on. Transparent Optical Networks (ICTON)
2010
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-betweenness vertices Conf. on Advances in Social Networks Analysis and Mining (ASONAM)
2010
Yuan, R.
Weibing, Y.
Mingyu, C.
Xiaofang, Z.
Jianping, F.
Robust TCP reassembly with a hardware-based solution for backbone traffic Conf. on Networking, Architecture and Storage (NAS)
2010
Woldeselassie, M.
Clegg, R.
Rio, M.
Forecasting full-path network congestion using one bit signalling IEEE Conf. on Communications (ICC)
2010
Reviriego, P.
Larrabeiti, D.
Maestro, J.A.
Would energy efficient ethernet be effective on 10Gbps optical links? OSA Photonics in Switching (PS), Monterey, CA
2010
Fenacci, D.
Franke, B.
Empirical evaluation of data transformations for network infrastructure applications Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X)
2010
Elena, E.
Rougier, J.
Secci, S.
Characterisation of AS-level path deviations and multipath in Internet routing EURO-NF Conf. on Next Generation Internet (NGI)
2010
Zhang, N.
Wang, F.
Gong, B.
Li, L.
Identifying heavy-hitter flows fast and accurately Conf. on Future Computer and Communication (ICFCC)
2010
Xu, Y.
Wang, Z.
On an IBA topology model for internet topology structure Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC)
2010
Reviriego, P.
Sanchez-Macian, A.
Maestro, J.A.
Bleakley, C.J.
Increasing the MTU size for energy efficiency in ethernet IET Signals and Systems Conf. (ISSC)
2010
Lee, D.
Carpenter, B.E.
Brownlee, N.
Observations of UDP to TCP ratio and port numbers Conf. on Internet Monitoring and Protection (ICIMP)
2010
Hansen, H.V.
Goebel, V.
Plagemann, T.
Siekkinen, M.
Resource adaptive distributed information sharing Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE )
2010
Gremillet, O.
Goncalves, P.
Vicat-Blanc Primet, P.
Dupas, A.
Traffic classification techniques supporting semantic networks Conf. on Wireless Communications and Mobile Computing
2010
Yan, G.
Eidenbenz, S.
Thulasidasan, S.
Datta, P.
Ramaswamy, V.
Criticality analysis of Internet infrastructure Computer Networks
2010
Vilhar, A.
Novak, R.
Kandus, G.
The impact of network topology on the performance of MAP selection algorithms Computer Networks
2010
Tarkoma, S.
Antikainen, M.
Canopy: publish/subscribe with upgraph combination IEEE Conf. on Computer Communications (INFOCOM)
2010
Rajahalme, J. Incentive-informed inter-domain multicast IEEE Conf. on Computer Communications (INFOCOM)
2010
Moon, D. Achieving flexibility and performance for packet forwarding and data center management UC Berkeley
2010
Lee, M.
Duffield, N.
Kompella, R.
Two samples are enough: Opportunistic flow-level latency estimation using NetFlow IEEE Conf. on Computer Communications (INFOCOM)
2010
Hu, C.
Chen, K.
Chen, Y.
Liu, B.
Evaluating potential routing diversity for internet failure recovery IEEE Conf. on Computer Communications (INFOCOM)
2010
Dou, B-L
Wang, X-G
Zhang, S-Y
Robustness of networks against cascading failures Physica A: Statistical Mechanics and its Applications
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Parallelizing weighted frequency counting in high-speed network monitoring Computer Communications
2010
Zhang, Y.
Oliveira, R.
Zhang, H.
Zhang, L.
Quantifying the pitfalls of traceroute in AS connectivity inference Conf. Passive and Active Measurement (PAM)
2010
Xuan, Q.
Du, F.
Wu, T-J
Partially ordered sets in complex networks J. Phys. A: Math. Theor.
2010
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Bonaventura, O.
Extracting intra-domain topology from mrinfo probing Conf. Passive and Active Measurement (PAM)
2010
Laki, S.
Matray, P.
Haga, P.
Sebok, T.
Csabai, I.
Vattay, G.
Spotter: a model based active geolocation service IEEE Conf. on Computer Communications (INFOCOM)
2010
Bi, J.
Hu, P.
Li, P.
Study on classification and characteristics of source address spoofing attacks in the Internet IEEE Conf. on Networking (ICN)
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Identifying heavy hitters in high-speed network monitoring Science China Information Sciences
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors Dynamically reconfigurable systems, architectures, design methods and applications
2010
DiBenedetto, S.
Stone, A.
Strout, M.
Massey, D.
Simulating internet scale topologies with metarouting Colorado State Univ.
2010
Chen, K.
Hu, C.
Zhang, W.
Chen, Y.
Liu, B.
On the eyeshots of BGP vantage points IEEE Global Telecommunications Conf. (GLOBECOM)
2010
Amaral, P.
Ganhao, F.
Assuncao, C.
Bernardo, L.
Pinto, P.
Scalable multi-region routing at inter-domain level IEEE Global Telecommunications Conf. (GLOBECOM)
2010
Albrecht, C.
Foag, J.
Koch, R.
Maehle, E.
Pionteck, T.
DynaCORE - dynamically reconfigurable coprocessor for network processors Dynamically reconfigurable systems, architectures, design methods and applications
2010
King, A. Efficient internet topology discovery techniques Univ. of Waikato, New Zealand
2010
John, W. Characterization and classification of internet backbone traffic Chalmers Univ. of Technology, Gothenborg, Sweden
2010
Ciceronea, S.
D'Angelo, G.
Di Stefanoa, G.
Frigioni, D.
Partially dynamic efficient algorithms for distributed shortest paths Theoretical Computer Science
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
A study of hinge-transmit property of BGP routing system Forum on Computer Science-Technology and Applications (IFCSTA)
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
An application-aware load balancing strategy for network processors Conf. on High performance embedded architectures and compilers (HIPEAC)
2010
Rottenstreich, O.
Keslassy, I.
The variable-increment counting Bloom filter ComNet, Technion, Israel
2010
Moon, D.
Naous, J.
Liu, J.
Zarifis, K.
Casado, M.
Koponen, T.
Shenker, S.
Breslau, L.
Bridging the software/hardware forwarding divide anon.

2009

Year Author(s) Title Publication
2009
Strowes, S.D.
Perkins, C.
Deterministic, reduced-visibility inter-domain forwarding ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2009
Sellke, H.
Wang, C.-C.
Bagchi, S.
Shroff, N.B.
Camouflaging timing channels in web traffic Purdue Univ.
2009
Rajahalme, J.
Sarela, M.
Visala, K.
Riihijarvi, J.
Inter-domain rendezvous service architecture PSIRP
2009
Miller, K.
Eliassi-Rad, T.
Continuous time group discovery in dynamic graphs Workshop on Analyzing Networks and Learning with Graphs (NIPS)
2009
Chen, K.
Choffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2009
Beheshti-Zavareh, N. Tiny buffers for electronic and optical routers Stanford Univ.
2009
Schear, N.
Borisov, N.
Preventing SSL traffic analysis with realistic cover traffic ACM Conf. on Computer and Communications Security (CCS)
2009
Merindol, P.
Van den Schrieck, V.
Donnet, B.
Bonaventure, O.
Pansiot, J.-J.
Quantifying ASes multiconnectivity using multicast information ACM SIGCOMM Conf. on Internet Measurement (IMC)
2009
Augustin, B.
Krishnamurthy, B.
Willinger, W.
IXP's: mapped? ACM SIGCOMM Conf. on Internet Measurement (IMC)
2009
Jiang, W.
Prasanna, V.K.
Reducing dynamic power dissipation in pipelined forwarding engines IEEE Conf. on Computer Design (ICCD)
2009
Zhang, M.
Dusi, M.
John, W.
Chen, C.
Analysis of UDP traffic usage on internet backbone links Symp. on Applications and the Internet (SAINT)
2009
Zhang, G.-Q.
Zhang, G.-Q.
Cheng, S.-Q.
Zhou, T.
Symbiotic effect: A guideline for network modeling EPL (Europhysics Letters)
2009
Studer, A.
Perrig, A.
The coremelt attack Symp. on Research in Computer Security (ESORICS)
2009
Shu, W.
Changjia, C.
Backup routing for BGP: Virtual ring routing scheme IEEE Conf. on Computer Science and Information Technology (ICCSIT)
2009
Kyriakopoulos, K.G.
Parish, D.J.
Using wavelets for compression and detecting events in anomalous network traffic Conf. on Systems and Networks Communication
2009
Germoglio, G.
Dias, B.
Sousa, P.
Automated and distributed network service monitoring Asia-Pacific Network Operations and Management Symp. (APNOMS)
2009
Este, A.
Gringoli, F.
Salgarelli, L.
Support Vector Machines for TCP traffic classification Computer Networks
2009
Avramopoulos, I.
Suchara, M.
Protecting DNS from routing attacks: a comparison of two alternative anycast implementations IEEE Security and Privacy
2009
Andreou, M.S. Message traceback systems. Dancing with the devil Univ. of Newcastle upon Tyne
2009
Yang, G.
Dou, W.
An efficient algorithm for AS path inferring Conf. on Hybrid Information Technology
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
Joint entropy analysis model for DDoS attack detection Conf. on Information Assurance and Security (IAS)
2009
Miwa, S.
Suzuki, M.
Hazeyama, H.
Uda, S.
Miyachi, T.
Kadobayashi, Y.
Shinoda, Y.
Experiences in emulating 10K AS topology with massive VM multiplexing ACM workshop on Virtualized infrastructure systems and architectures
2009
Cittadini, L.
Rimondini, M.
Corea, M.
Di Battista, G.
On the feasibility of static analysis for BGP convergence IFIP/IEEE Symp. on Integrated Network Management (IM)
2009
Asai, H.
Esaki, H.
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs Asia Future Internet summer school, Jeju, Korea
2009
Amaral, P.
Bernardo, L.
Pinto, P.
DTIA: An Architecture for Inter-Domain Routing IEEE Conf. on Communications (ICC)
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
A traffic coherence analysis model for DDoS attack detection Conf. on Security and Cryptography (SECRYPT)
2009
Erlebach, T.
Moonen, L.S.
Spieksma, F.C.R.
Vukadinovic, D.
Connectivity measures for internet topologies on the level of autonomous systems Operations Research
2009
Bui, Q.D.
Jennings, A.
Relay node selection in large-scale VoIP overlay networks Conf. on Ubiquitous and Future Networks (ICUFN)
2009
Xu, Y.
Zhang, W.
A power-law approach on router-level internet macroscopic topology modeling Fuzzy Information and Engineering, Volume 2
2009
Shavitt, Y.
Shir, E.
Weinsberg, U.
Near-deterministic inference of AS relationships Conf. on Telecommunications (ConTEL)
2009
Korn, A.
Schubert, A.
Telcs, A.
Lobby index in networks Physica A: Statistical Mechanics and its Applications
2009
Ishakian, V.
Akinwumi, J.
Matta, I.
On the cost of supporting multihoming and mobility Boston Univ., CS Dept.
2009
Brugger, S.T. The quantitative comparison of computer networks UC Davis
2009
Asai, H.
Esaki, H.
A methodology for magnitude-based inter-AS distance estimation WIT, Hokkaido, Japan
2009
Xu, Y.
Zhao, H.
An improved BA model for router-level internet macroscopic topology IAENG J. Computer Science
2009
Saucez, D.
Donnet, B.
Bonaventure, O.
On the impact of clustering on measurement reduction IFIP-TC6 Networking Conf. (NETWORKING)
2009
Di Menna, A.
Refice, T.
Cittadini, L.
Di Battista, G.
Measuring route diversity in the internet from remote vantage points IEEE Conf. on Networking (ICN)
2009
D'Ignazio, A.
Giovannetti, E.
Asymmetry and discrimination in Internet peering: evidence from the LINX J. Industrial Organization
2009
Weinsberg, U.
Shavitt, Y.
Shir, E.
Near-deterministic inference of AS relationships IEEE Conf. on Computer Communications (INFOCOM)
2009
Saxena, M.
Kompella, R.
A framework for efficient class-based sampling IEEE Conf. on Computer Communications (INFOCOM)
2009
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Measuring complexity and predictability in networks with multiscale entropy analysis IEEE Conf. on Computer Communications (INFOCOM)
2009
Liu, B.
Cui, Y.
Lu, Y.
Xue, Y.
Locality-awareness in BitTorrent-like P2P applications IEEE Trans. on Multimedia
2009
Hasegawa, G.
Hiraoka, Y.
Murata, M.
Evaluation of free-riding traffic problem in overlay routing and its mitigation method Conf. on Networking and Services (ICNS)
2009
Haeberlen, A.
Avramopoulos, I.
Rexford, J.
Druschel, P.
NetReview: detecting when interdomain routing goes wrong Usenix Symp. on Networked Systems Design and Implementation (NSDI)
2009
Eberle, W.
Holder, L.
Cook, D.
Identifying threats using graph-based anomaly detection Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4
2009
Zhang, G. Measuring the impacts of sampling bias on internet AS-level topology inference WRI Conf. on Communications and Mobile Computing (CMC)
2009
Terdik, G.
Gyires, T.
Does the internet still demonstrate fractal nature? IEEE Conf. on Networking (ICN)
2009
Lumezanu, C.
Baden, R.
Spring, N.
Bhattacharjee, B.
Triangle inequality and routing policy violations in the internet Conf. Passive and Active Measurement (PAM)
2009
Idzikowski, F. Search and analysis of backbone traffic measurements in the internet Technische Univ. Berlin
2009
Gunes, M.H.
Sarac, K.
Analyzing router responsiveness to active measurement probes Conf. Passive and Active Measurement (PAM)
2009
Durresi, A.
Paruchuri, V.
Barolli, L.
Fast autonomous system traceback J. Network and Computer Applications
2009
Xiao, B.
Liu, L.
Guo, X.
Xu, K.
Modeling the IPv6 internet AS-level topology Physica A: Statistical Mechanics and its Applications
2009
Terdik, G.
Gyires, T.
Levy flights and fractal modeling of internet traffic IEEE/ACM Trans. on Networking (TON)
2009
Kaune, S.
Pussep, K.
Leng, C.
Kovacevic, A.
Tyson, G.
Steinmetz, R.
Modelling the internet delay space based on geographical locations Conf. on Parallel, Distributed and Network-based Processing
2009
Dai, L
Cao, Y.
Cui, Y.
Xue, Y.
On scalability of proximity-aware peer-to-peer streaming Computer Communications
2009
Puzis, R.
Yagil, D.
Elovici, Y.
Braha, D.
Collaborative attack on internet users' anonymity Internet Research
2009
Maiolini, G.
Molina, G.
Baiocchi, A.
Rizzi, A.
On the fly application flows identification by exploiting K-means based classifiers J. Information Assurance and Security
2009
Kanizo, Y.
Hay, D.
Keslassy, I.
Optimal dynamic hash tables ComNet, Technion, Israel
2009
Andreou, M.S.
van Moorsel, A.
COTraSE Connection Oriented Traceback in Switched Ethernet J. Information Assurance and Security

2008

Year Author(s) Title Publication
2008
Wu, M.-F.
Jiang, T.M.
Wu, A.
A virtual service framework for service composition QoS based on active measurement Symp. on Service-Oriented System Engineering (SOSE)
2008
Kang, U.
Tsourakakis, C.
Appel, A.P.
Faloutsos, C.
Leskovec, J.
HADI: Fast diameter estimation and mining in massive graphs with Hadoop Carnegie Mellon Univ.
2008
Hei, Y.
Nakao, A.
Hasegawa, T.
Ogishi, T.
Yamamoto, S.
AS alliance: cooperatively improving resilience of intra-alliance communication ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2008
Beiro, M.G.
Alvarez-Hamelin, J.I.
Busch, J.R.
A low complexity visualization tool that helps to perform complex systems analysis New J. Physics
2008
Serrano, M.A.
De Los Rios, P.
Structural efficiency of percolated landscapes in flow networks Plos One
2008
MacArthur, B.D.
Sanchez-Garcia, R.J.
Anderson, J.W.
Symmetry in complex networks Discrete Applied Mathematics
2008
He, X.
Parameswaran, S.
MCAD: Multiple connection based anomaly detection IEEE Conf. on Communication Systems (ICCS)
2008
Casado, M.
Koponen, T.
Moon, D.
Shenker, S.
Rethinking packet forwarding hardware ACM SIGCOMM HotNets Workshop
2008
Vilhar, A.
Novak, R.
Policy relationship annotations of predefined AS-level topologies Computer Networks
2008
Bi, X.
Tan, W.
Xiao, R.
A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems Symp. on Computer and Computational Sciences (IMSCSS)
2008
Baiocchi, A.
Maiolini, G.
Molina, G.
Rizzi, A.
On-the-fly statistical classification of internet traffic at application layer based on cluster analysis Workshop on Computational Intelligence in Security for Information Systems (CISIS)
2008
Wei, W.
Dong, Y.
Lu, D.
Jin, G.
Optimal control of DDoS defense with multi-resource max-min fairness Conf. on Cybernetics and Intelligent Systems
2008
Raghavan, V.
Riley, G.
Jaafar, T.
Realistic topology modeling for the internet BGP infrastructure IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
2008
Dusi, M.
Gringoli, F.
Salgarelli, L.
IP traffic classification for QoS guarantees: the independence of packets IEEE Conf. on Computer Communications and Networks (ICCCN)
2008
Dramburg, M. Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien Hochschule fuer Angewandte Wissenschaften Hamburg, Germany
2008
Choi, H.
Lee, H.
Kim, H.
Fast detection and visualization of network attacks on parallel coordinates Computers and Security
2008
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Metrics for characterizing complexity of network traffic Conf. on Telecommunications (ICT)
2008
Pouzols, F.M.
Barriga, A.
Lopez, D.R.
Sanchez-Solano, S.
Linguistic summarization of network traffic flows IEEE Conf. on Fuzzy Systems (FUZZ-IEEE)
2008
Katz, G.J.
Kider, J.T.
All-pairs shortest-paths for large graphs on the GPU ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware
2008
Li, L.
Chen, C.
Exploring possible strategies for competitions between Autonomous Systems IEEE Conf. on Communications (ICC)
2008
Irwin, B.
Pilkington, N.
High level internet scale traffic visualization using Hilbert curve mapping Workshop on Visualization for Computer Security (VizSEC)
2008
Shevtekar, A.
Ansari, N.
A router-based technique to mitigate reduction of quality (RoQ) attacks Computer Networks
2008
Latapy, M.
Magnien, C.
Complex network measurements: estimating the relevance of observed properties IEEE Conf. on Computer Communications (INFOCOM)
2008
Fraigniaud, P.
Febhar, E.
Viennot, F.
The inframetric model for the internet IEEE Conf. on Computer Communications (INFOCOM)
2008
Clegg, R.
Landa, R.
Haddadi, H.
Rio, M.
Moore, A.W.
Techniques for flow inversion on sampled data IEEE INFOCOM Workshop Global Internet Symp.
2008
Meitinger, M.
Ohlendorf, R.
Wild, T.
Herkersdorf, A.
A hardware packet re-sequencer unit for network processors Architecture of Computing Systems (ARCS)
2008
Xiao, Y.
MacArthur, B.D.
Wang, H.
Xiong, M.
Wang, W.
Network quotients: structural skeletons of complex systems Phys. Rev. E
2008
Wei, S.
Mirkovic, J.
Correcting congestion-based error in network telescope's observations of worm dynamics ACM SIGCOMM Conf. on Internet Measurement (IMC)
2008
Wahlisch, M.
Schmidt, T.C.
Spalt, W.
What is happening from behind?: Making the impact of internet topology visible Campus-Wide Information Systems
2008
Raspall, F.
Sallent, S.
Adaptive shared-state sampling ACM SIGCOMM Conf. on Internet Measurement (IMC)
2008
Proebstel, E. Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic UC Davis
2008
Li, P.
Bi, J.
Zhou, Z.
A backscatter technology based study on source address spoofing Periodical of Ocean Univ. of China
2008
Li, C.
Zhao, H.
Zhang, X.
Ge, X.
Research on the distribution of network nodes based on multiple measurement points Computer Science
2008
John, J.P.
Katz-Bassett, E.
Krishnamurthy, A.
Anderson, T.
Venkataramani, A.
Consensus routing: the internet as a distributed system Usenix Symp. on Networked Systems Design and Implementation (NSDI)
2008
Hazeyama, H.
Suzuki, M.
Miwa, S.
Miyamoto, D.
Kadobayashi, Y.
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures Conf. on Cyber Security Experimentation and Test
2008
Francois, J.
State, R.
Festor, O.
Activity monitoring for large honeynets and network telescopes J. Advances in Systems and Measurements
2008
Este, A.
Gringoli, F.
Salgarelli, L.
An SMV-based approach to traffic classification Univ. of Brescia

2007

Year Author(s) Title Publication
2007
Qazi, S.
Moors, T.
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks IEEE Global Telecommunications Conf. (GLOBECOM)
2007
Muehlbauer, W.
Uhlig, S.
Fu, B.
Meulle, M.
Maennel, O.
In search for an appropriate granularity to model routing policies ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
Network performance analysis based on histogram workload models IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
2007
Ballani, H.
Francis, P.
Zhang, X.
A study of prefix hijacking and interception in the internet ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2007
Shevtekar, A.
Ansari, N.
A proactive test based differentiation to mitigate low rate DoS attacks IEEE Conf. on Computer Communications and Networks (ICCCN)
2007
Whitehead, B.
Lung, C.-H.
Rabinovitch, P.
A TCP connection establishment filter: symmetric connection detection IEEE Conf. on Communications (ICC)
2007
Leguay, J.
Latapy, M.
Friedman, T.
Salamatiana, K.
Describing and simulating internet routes Computer Networks
2007
Dainotti, A.
Pescape, A.
Ventre, G.
Worm traffic analysis and characterization IEEE Conf. on Communications (ICC)
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation UC Riverside
2007
Clegg, R.
Haddadi, H.
Landa, R.
Rio, M.
Towards informative statistical flow inversion arxiv.org
2007
Chen, Z.
Ji, C.
Measuring network-aware worm spreading ability IEEE Conf. on Computer Communications (INFOCOM)
2007
Zhou, S.
Zhang, G.-Q.
Chinese Internet AS-level topology IET Communications
2007
Vojnovic, M.
Gupta, V.
Karagiannis, T.
Gkantsidis, C.
Sampling strategies for epidemic-style information dissemination IEEE Conf. on Computer Communications (INFOCOM)
2007
Schmidt, T.C.
Wahlisch, M.
Zhang, Y.
On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing IEEE Conf. on Networking (ICN)
2007
Haddadi, H.
Landa, R.
Rio, M.
Bhatti, S.
Revisiting the issues on netflow sample and export performance arxiv.org
2007
Kunzmann, G.
Nagel, R.
Hossfeld, T.
Binzenhofer, A.
Eger, K.
Efficient simulation of large-scale P2P networks: modeling network transmission times EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP)
2007
Yuan, L.
Chuah, C.
Mohapatra, P.
ProgME: towards programmable network measurement ACM SIGCOMM Computer Communication Review
2007
Wu, J.
Zhang, Y.
Mao, Z.M.
Shin, K.G.
Internet routing resilience to failures: analysis and implications ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2007
Salgarelli, L.
Gringoli, F.
Karagiannis, T.
Comparing traffic classifiers ACM SIGCOMM Computer Communication Review
2007
Li, C.
Zhao, H.
Zhang, X.
Yuan, S.
Analysis on traveling time of internet China Institute of Communications
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network monitoring using traffic dispersion graphs (TDGs) ACM SIGCOMM Conf. on Internet Measurement (IMC)
2007
Huang, C.
Li, J.
Ross, K.W.
Can internet video-on-demand be profitable? ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
A histogram-based stochastic process for finite buffer occupancy analysis Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS)
2007
Clegg, R. Simulating internet traffic with Markov-modulated processes UK Performance Engineering Workshop
2007
Chen, Z.
Ji, C.
Optimal worm-scanning method using vulnerable-host distributions J. Security and Networks

2006

Year Author(s) Title Publication
2006
Park, J.
Tyan, H.-R.
Jay Kuo, C.-C.
GA-based internet traffic classification technique for QoS provisioning Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
2006
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Deployment of an algorithm for large-scale topology discovery IEEE J. Selected Areas in Communications
2006
Okuno, M.
Nishimura, S.
Ishida, S.
Nishi, H.
Cache-based network processor architecture: evaluation with real network traffic IEICE Transactions on Electronics
2006
Guillaume, J.-L.
Latapy, M.
Magoni, D.
Relevance of massively distributed explorations of the internet topology: qualitative results Computer Networks
2006
Yaar, A.
Perrig, A.
Song, D.
StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense IEEE J. Selected Areas in Communications
2006
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links IEEE/ACM Trans. on Networking (TON)
2006
Clegg, R. Markov-modulated on/off processes for long-range dependent internet traffic arxiv.org
2006
Restrepo, J.G.
Ott, E.
Hunt, B.R.
Characterizing the dynamical importance of network nodes and links Phys. Rev. Lett.
2006
Rajab, M.
Monrose, F.
Terzis, A.
Fast and evasive attacks: highlighting the challenges ahead Symp. on Recent Advances in Intrusion Detection (RAID)
2006
Latapy, M.
Magnien, C.
Measuring fundamental properties of real-world complex networks arxiv.org
2006
Francois, J.
State, R.
Festor, O.
Tracking global wide configuration errors IEEE Workshop on Monitoring, Attack Detection and Mitigation
2006
Zhang, L.
Guan, Y.
TOPO: a topology-aware single packet attack traceback scheme Securecomm and Workshops
2006
Constantinou, F.
Mavrommatis, P.
Identifying known and unknown peer-to-peer traffic IEEE Symp. on Network Computing and Applications (NCA)
2006
Hamadeh, I.
Kesidis, G.
Toward a framework for forensic analysis of scanning worms Emerging Trends in Information and Communication Security (ETRICS)
2006
Donnet, B.
Friedman, T.
Topology discovery using an address prefix based stopping rule UNICE : Networks and Applications Towards a Ubiquitously Connected World
2006
Wang, H.
Lin, Y.
Jin, Y.
Cheng, S.
Easily-implemented adaptive packet sampling for high speed networks flow measurement Conf. on Computational Science (ICCS)
2006
Peng, Y.
Gong, J.
Yang, W.
Liu, W.
Disclosing the element distribution of Bloom filter Conf. on Computational Science (ICCS)
2006
Donnet, B.
Raoult, P.
Friedman, T.
Efficient route tracing from a single source arxiv.org
2006
Chen, Y.
Hwang, K.
Collaborative change detection of DDoS attacks on community and ISP networks IEEE Symp. on Collaborative Technologies and Systems (CTS)
2006
Jin, S.
Bestavros, A.
Small-world characteristics of internet topologies and implications on multicast scaling Computer Networks
2006
Hu, Y.
Chiu, D.-M.
Lui, J.
Entropy based flow aggregation IFIP-TC6 Networking Conf. (NETWORKING)
2006
D'Ignazio, A.
Giovannetti, E.
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach J. Competition Law and Economics
2006
Vishwanath, K.
Vahdat, A.
Realistic and responsive network traffic generation ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2006
Varghese, G.
Fingerhut, J.
F. Bonomi, F.
Detecting evasion attacks at high speeds without reassembly ACM SIGCOMM Computer Communication Review
2006
Shriram, A.
Kaur, J.
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth Conf. Passive and Active Measurement (PAM)
2006
Kumar, S.
Maschmeyer, J.
Crowley, P.
Exploiting locality to ameliorate packet queue contention and serialization ACM Conf. on Computing Frontiers
2006
Jiang, H.
Dovrolis, C.
Why is the internet traffic bursty in short (sub-RTT) timescales? ACM SIGMETRICS Performance Evaluation Review
2006
Farhat, H. Protecting TCP services from denial of service attacks SIGCOMM workshop on Large-scale attack defense
2006
Donnet, B.
Bayant, B.
Friedman, T.
Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives ACM Conf. on Emerging Networking Experiments And Technologies (CoNEXT)
2006
Clegg, R. Modelling internet traffic using Markov chains Imperial College, London, UK
2006
Chan, H.
Dash, D.
Perrig, A.
Zhang, H.
Modeling adoptability of secure BGP protocols Joint Conf. on Measurement and Modeling of Computer Systems

2005

Year Author(s) Title Publication
2005
Erlebach, T.
Moonen, L.S.
Spieksma, F.
Vukadinovic, D.
Connectivity measures for internet topologies K.U. Leuven
2005
Xiang, Y.
Zhou, W.
Mark-aided distributed filtering by using neural network for DDoS defense IEEE Global Telecommunications Conf. (GLOBECOM)
2005
Rajab, M.
Monrose, F.
Terzis, A.
Worm evolution tracking via timing analysis ACM workshop on Rapid Malcode (WORM)
2005
Janic, M.
Van Mieghem, P.
On properties of multicast routing trees J. Communication Systems
2005
Chen, Z.
Ji, C.
Importance-scanning worm using vulnerable-host distribution IEEE Global Telecommunications Conf. (GLOBECOM)
2005
Chen, Z.
Lin, C.
Ni, J.
Ruan, D.-H.
Zheng, B.
Jiang, Y.-X.
Peng, X.
Wang, Y.
Luo, A.
Zhu, B.
Yue, Y.
Ren, F.-Y.
Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN IEEE Conf. on Local Computer Networks (LCN)
2005
Kumar, A.
Paxson, V.
Weaver, N.
Exploiting underlying structure for detailed reconstruction of an internet-scale event ACM SIGCOMM Conf. on Internet Measurement (IMC)
2005
Kompella, R.
Estan, C.
The power of slicing in internet flow measurement ACM SIGCOMM Conf. on Internet Measurement (IMC)
2005
Chen, R.
Park, J.-M.
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources IEEE Conf. on Computer Communications and Networks (ICCCN)
2005
Su, W.-J.
Zhao, H.
Xu, Y.
Zhang, W.-B.
Internet complex network separation degree analysis based on hops J. China Inst. of Communications
2005
Rajab, M.
Monrose, F.
Terzis, A.
On the effectiveness of distributed worm monitoring Usenix Security Symp.
2005
Veitch, D.
Hohna, N.
Abry, P.
Multifractality in TCP/IP traffic: the case against Computer Networks
2005
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Efficient algorithms for large-scale topology discovery ACM SIGMETRICS Conf. on Measurement and modeling of computer systems
2005
Donnet, B.
Friedman, T.
A CIDR stopping rule for topology discovery Algotel
2005
Chhabra, P.
John, A.
Saran, H.
PISA: Automatic extraction of traffic signatures IFIP-TC6 Networking Conf. (NETWORKING)
2005
Okuno, M.
Ishida, S.
Nishi, H.
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera IEICE Transactions on Electronics
2005
Yaar, A.
Perrig, A.
Song, D.
FIT: Fast Internet Traceback IEEE Conf. on Computer Communications (INFOCOM)
2005
Donnet, B.
Friedman, T.
Crovella, M.
Improved algorithms for network topology discovery Conf. Passive and Active Measurement (PAM)
2005
Martins, O.A. Affecting IP traceback with recent Internet topology maps Iowa State Univ.

2004

Year Author(s) Title Publication
2004
Prince, C.
Wyatt, D.
Confidence-weighted marginal utility analyses for improved internet mapping Univ. of Washington, CSE Class Project
2004
Karagiannis, T.
Molle, M.
Faloutsos, M.
Long-range dependence: ten years of Internet traffic modeling IEEE Internet Computing
2004
Yaar, A.
Perrig, A.
Song, D.
SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacks IEEE Symp. on Security and Privacy
2004
Tang, L.
Crovella, M.
Geometric exploration of the landmark selection problem Conf. Passive and Active Measurement (PAM)
2004
Xu, K.
Duan, Z.
Zhang, Z.-L.
Chandrashekar, J.
On properties of Internet Exchange Points and their impact on AS topology and relationship IFIP-TC6 Networking Conf. (NETWORKING)
2004
Okuno, M.
Nishi, H.
Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler IEICE technical report: Circuits and system
2004
Zhou, S.
Mondragon, R.J.
Redundancy and robustness of AS-level Internet topology and its models Electronics Letters

2003

Year Author(s) Title Publication
2003
Tang, L.
Crovella, M.
Virtual landmarks for the internet ACM SIGCOMM Conf. on Internet Measurement (IMC)
2003
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links ACM SIGCOMM Conf. on Internet Measurement (IMC)
2003
Lakhina, A.
Byers, J.W.
Crovella, M.
Matta, I.
On the geographic location of internet resources J. on Selected Areas in Communications
2003
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice ACM Transactions on Computer Systems (TOCS)
2003
Estan, C.
Savage, S.
Varghese, G.
Automatically inferring patterns of resource consumption in network traffic ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications
2003
Teixeira, T.
Marzullo, K.
Savage, S.
Voelker, G.M.
Characterizing and measuring path diversity of internet topologies ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS)
2003
Yaar, A.
Perrig, A.
Song, D.
Pi: a path identification mechanism to defend against DDoS attacks IEEE Symp. on Security and Privacy

2002

Year Author(s) Title Publication
2002
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting ACM SIGCOMM Computer Communication Review

1999

Year Author(s) Title Publication
1999
Fang, W.
Peterson, L.
Inter-AS traffic patterns and there implications IEEE Global Telecommunications Conf. (GLOBECOM)

  Last Modified: Thurs May-2-2013 17:30:37 PDT
  Page URL: http://www.caida.org/data/publications/bydate/index.xml