Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > publications : bib : networking : byauthor : byauthor_full.xml
Annotated Bibliography of Networking Papers

An annotated bibliography of papers and presentations in the wide-area networking literature.

This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers.

|   View By:    date    author    topic    publication   |
|   Citation Format:    abbreviated    complete   |

A., Moore

Zuev D. and Moore A., "Traffic Classification using a Statistical Approach", in Passive and Active Measurement Conference (PAM), Mar 2005.

Afek, Y.

Y. Afek, O. Ben-Shalom, and A. Bremler-Barr, "On the Structure and Application of BGP Policy Atoms", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Y. Afek, A. Bremler-Barr, and S. Har-Peled, "Routing with a Clue", in ACM SIGCOMM, 1999.

Agarwal, S.

S. Agarwal and J.R. Lorch, "Matchmaking for online games and other latency-sensitive P2P systems", Computer Communication Review, vol. 39, no. 4, pp. 315-326, Oct 2009.

L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet Hierarchy from Multiple Vantage Points", in IEEE INFOCOM, Jun 2002.

Aggarwal, C.C.

C.C. Aggarwal and P.S. Yu, "On Anonymization of String Data", in SDM, 2007.

Ahuja, A.

C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence", in IEEE INFOCOM, Apr 2001, pp. 537-546.

C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "An Experimental Study of Internet Routing Convergence", Tech. Rep. MSR-TR-2000-08, Microsoft Research, 2000.

C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Wide-Area Backbone Failures", Tech. Rep. CSE-TR-382-98, University of Michigan, 1998.

Aiken, B.

B. Aiken, H.-W. Braun, and P. Ford, "NSF implementation plan for interim NREN", 1993.

Akodjenou, .

L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.

Allman, M.

G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On Dominant Characteristics of Residential Broadband Internet Traffic", in ACM SIGCOMM IMC, Nov 2009.

M. Allman and V. Paxson, "Issues and etiquette concerning use of shared measurement data", in ACM SIGCOMM IMC, 2007.

R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization", ACM SIGCOMM Computer Communication Review, 2006.

Almeroth, K.

P. Rajvaidya, K. Almeroth, and k. claffy, "A scalable architecture for monitoring and visualizing multicast statistics", in Distributed Systems: Operations and Management, Dec 2000.

Alrabady, A.

B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking", in ACM Conference on Computer and Communications Security (CCS), 2007.

Alvarez-Hamelin, J.

M. Beiro, J. Alvarez-Hamelin, and J. Busch, "A low complexity visualization tool that helps to perform complex systems analysis", New Journal of Physics, vol. 10, no. 12, pp. 125003, Dec 2008.

Ammar, M.

J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", Computer Networks, 2004.

J. Xu, J. Fan, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", IEEE International Conference on Network Protocols (ICNP), nov 2002.

J. Xu, J. Fan, M. Ammar, and S. Moon, "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization", in ACM SIGCOMM IMC, 2001.

Anagnostakis, K.G.

D. Koukis, S. Antonatos, and K.G. Anagnostakis, "On the Privacy Risks of Publishing Anonymized IP Network Traces.", in Communications and Multimedia Security, 2006.

Andersen, D. G.

N. Feamster, D.~G. Andersen, H. Balakrishnan, and M.~F. Kaashoek, "Measuring the Effects of Internet Path Faults on Reactive Routing", in ACM SIGMETRICS, Jun 2003.

Andersen, D.G.

D.G. Andersen, N. Feamster, S. Bauer, and H. Balakrishnan, "Topology Inference from BGP Routing Dynamics", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Anderson, T.

H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.

E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.

R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP Misconfiguration", in ACM SIGCOMM, 2002.

Antonatos, S.

D. Koukis, S. Antonatos, and K.G. Anagnostakis, "On the Privacy Risks of Publishing Anonymized IP Network Traces.", in Communications and Multimedia Security, 2006.

D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.

D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.

Antoniades, D.

D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.

D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.

Arif, M.J.

M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, "Internet Host Geolocation Using Maximum Likelihood Estimation Technique", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Washington, DC, USA, 2010, pp. 422-429, IEEE Computer Society.

M.J. Arif, S. Karunasekera, and S. Kulkarni, "GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements", in Australasian Conference on Computer Science (ASCS), Darlinghurst, Australia, Australia, 2010, pp. 89-98, Australian Computer Society, Inc.

Arlitt, M.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.

J. Mogul and M. Arlitt, "SC2D: an alternative to trace anonymization", in ACM SIGCOMM MineNet, 2006.

J. Erman, A. Mahanti, and M. Arlitt, "Internet Traffic Identification using Machine Learning", in IEEE GLOBECOM 2006, Nov 2006.

J. Erman, M. Arlitt, and A. Mahanti, "Traffic Classification Using Clustering Algorithms", in ACM SIGCOMM 2006, Aug 2006.

Armitage, G.

Nguyen T. and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning", in IEEE Communications Surveys and Tutorials 2008, Oct 2008.

N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification", in ACM SIGCOMM 2006, Aug 2006.

S. Zander, T. Nguyen, and G. Armitage, "Self-learning IP Traffic Classification based on Statistical Flow Characteristics", in Passive and Active Measurement Conference (PAM), Mar 2005.

Arnes, A.

L. Overlier, T. Brekne, and A. Arnes, "Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.", in CANS, 2005.

T. Brekne, A. Arnes, and A. Oslebo, "Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.", in Privacy Enhancing Technologies, 2005.

Asaba, T.

T. Asaba, k. claffy, O. Nakamura, and J. Murai, "An analysis of international academic research network traffic between Japan and other nations", in International Networking Conference (INET) '92, Jan 1992.

B., Huffaker

Huffaker B., J. Jung, D. Wessels, and k. claffy, "Visualization of the Growth and Topology of the NLANR Caching Hierarchy", in International WWW Caching Workshop 1998, June 1998.

Balakrishnan, H.

M.~J. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic Locality of IP Prefixes", in Internet Measurement Conference (IMC), Berkeley, CA, USA, 2005, p. 13, USENIX Association.

N. Feamster, D.~G. Andersen, H. Balakrishnan, and M.~F. Kaashoek, "Measuring the Effects of Internet Path Faults on Reactive Routing", in ACM SIGMETRICS, Jun 2003.

D.G. Andersen, N. Feamster, S. Bauer, and H. Balakrishnan, "Topology Inference from BGP Routing Dynamics", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bannister, J.

A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.

Barford, P.

B. Eriksson, P. Barford, B. Maggs, and R. Nowak, "Posit: a lightweight approach for IP geolocation", ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 2, pp. 2-11, Sep 2012.

B. Eriksson, P. Barford, J. Sommers, and R. Nowak, "A Learning-Based Approach for IP Geolocation", in PAM, LNCS Volume 6032, Apr 2010, pp. 171-180.

Barman, D.

H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.

Bartlett, G.

G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, "Estimating P2P Traffic Volume at USC", Tech. rep., USC/Information Sciences Institute, 2007.

G. Bartlett, J. Heidemann, and C. Papadopoulos, "Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing", in IEEE Global Internet Symposium 2007, May 2007.

A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.

Bauer, S.

D.G. Andersen, N. Feamster, S. Bauer, and H. Balakrishnan, "Topology Inference from BGP Routing Dynamics", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Beiro, M.

M. Beiro, J. Alvarez-Hamelin, and J. Busch, "A low complexity visualization tool that helps to perform complex systems analysis", New Journal of Physics, vol. 10, no. 12, pp. 125003, Dec 2008.

Ben-Shalom, O.

Y. Afek, O. Ben-Shalom, and A. Bremler-Barr, "On the Structure and Application of BGP Policy Atoms", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bernaille, L.

L. Bernaille and R. Teixeira, "Early Recognition of Encrypted Application", in Passive and Active Measurement Conference (PAM), Apr 2007.

L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.

L. Bernaille, R. Teixeira, and K. Salamatian, "Early Application Identification", in ACM CoNEXT 2006, Jul 2006.

L. Bernaille, A. Soule, M. Jeannin, and K. Salamatian, "Blind Application Recognition Through Behavioral Classification", Tech. rep., Paris 2005, 2005.

Beverly, R.

R. Beverly and k. claffy, "Wide-Area IP Multicast Traffic Characterization", IEEE Network, Jan 2003.

Bhattacharyya, S.

K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications", in ACM SIGCOMM 2005, Aug 2004.

G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bhumiratana, B.

R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.

M. Bishop, R. Crawford, B. Bhumiratana, L. Clark, and K. Levitt, "Some Problems in Sanitizing Network Data", in IEEE WETICE, 2006.

Bishop, M.

R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.

M. Bishop, R. Crawford, B. Bhumiratana, L. Clark, and K. Levitt, "Some Problems in Sanitizing Network Data", in IEEE WETICE, 2006.

Bohn, R.

R. Bohn, H.-W. Braun, k. claffy, and S. Wolff, "Mitigating the coming Internet crunch: multiple service levels via Precedence", Tech. rep., CAIDA, Nov 1994.

Bonfiglio, D.

D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: when randomness plays with you", in ACM SIGCOMM 2007, Aug 2007.

Borisov, N.

J. Zhang, N. Borisov, and W. Yurcik, "Outsourcing Security Analysis with Anonymized Logs", Securecomm and Workshops, aug 2006.

Bose, A.

C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "An Experimental Study of Internet Routing Convergence", Tech. Rep. MSR-TR-2000-08, Microsoft Research, 2000.

Bradner, S.

D. Mitchell, S. Bradner, and k. claffy, "In whose domain: name service in adolescence", Sept 1996.

Braun, H.-W.

k. claffy and H.-W. Braun, "Post-NSFNET statistics collection", in International Networking Conference (INET) '95, Jun 1995.

k. claffy, A Gross, and H.-W. Braun, "Measured interference of security mechanisms with network performance", in International Networking Conference (INET) '95, Jun 1995.

k. claffy, H.-W. Braun, and G. Polyzos, "A parameterizable methodology for Internet traffic flow profiling", Mar 1995.

R. Bohn, H.-W. Braun, k. claffy, and S. Wolff, "Mitigating the coming Internet crunch: multiple service levels via Precedence", Tech. rep., CAIDA, Nov 1994.

H.-W. Braun and k. claffy, "Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server", in World Wide Web (WWW) Conference, Oct 1994.

H.-W. Braun, B. Chinoy, and k. claffy, "Applied Network Research: 1994 annual status report", Tech. rep., CAIDA, Apr 1994.

k. claffy, H.-W. Braun, and G. Polyzos, "Tracking long-term growth of the NSFNET", Mar 1994.

k. claffy, H.-W. Braun, and G. Polyzos, "Internet traffic flow profiling", Tech. rep., CAIDA, Mar 1994.

B. Aiken, H.-W. Braun, and P. Ford, "NSF implementation plan for interim NREN", 1993.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Measurement considerations for assessing unidirectional latencies", Sep 1993.

H.-W. Braun, k. claffy, and G. Polyzos, "A framework for flow-based accounting on the Internet", in IEEE Singapore International Conference on Networks'93 (SICON'93), Sep 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Application of sampling methodologies to wide-area network traffic characterization", in ACM SIGCOMM '93, May 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Long-term traffic aspects of the NSFNET", in International Networking Conference (INET) '93, May 1993.

H.-W. Braun and k. claffy, "Network analysis issues for a public Internet", in Public Access to the Internet, A Harvard JFK School Workshop, May 1993.

H.-W. Braun, P. Ford, and Y. Rekhter, "CIDR and the evolution of the Internet", in International Networking Conference (INET) '93, May 1993.

H.-W. Braun and k. claffy, "Network analysis in support of Internet policy requirements", in International Networking Conference (INET) '93, May 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Traffic characteristics of the T1 NSFNET backbone", in IEEE INFOCOM, Jan 1993.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1992.

B. Chinoy and H.-W. Braun, "The National Science Foundation Network", Tech. rep., CAIDA, Sep 1992.

Brekne, T.

L. Overlier, T. Brekne, and A. Arnes, "Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.", in CANS, 2005.

T. Brekne, A. Arnes, and A. Oslebo, "Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.", in Privacy Enhancing Technologies, 2005.

Bremler-Barr, A.

Y. Afek, O. Ben-Shalom, and A. Bremler-Barr, "On the Structure and Application of BGP Policy Atoms", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Y. Afek, A. Bremler-Barr, and S. Har-Peled, "Routing with a Clue", in ACM SIGCOMM, 1999.

Broido, A.

T. Karagiannis, A. Broido, N. Brownless, K. Claffy, and M. Faloutsos, "Is P2P Dying or Just Hiding", in IEEE GLOBECOM, Nov 2004.

T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport Layer Identification of P2p Traffic", in ACM SIGCOMM 2004, Aug 2004.

A. Broido, Y. Hyun, R. Gao, and k. claffy, "Their share: diversity and disparity in IP traffic", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, "A Nonstationary Poisson View of Internet Traffic", in IEEE INFOCOM. March 2004, IEEE INFOCOM.

P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of Private DNS Update Sources", in IEEE Workshop on Internet Applications (WIAPP), June 2003.

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of DNS Update Traffic", in ACM SIGMETRICS 2003, June 2003.

Y. Hyun, A. Broido, and k. claffy, "On Third-party Addresses in Traceroute Paths", in Passive and Active Measurement Conference (PAM), Apr 2003.

Y. Hyun, A. Broido, and k. claffy, "Traceroute and BGP AS Path Incongruities", Tech. rep., CAIDA, Mar 2003.

A. Broido, R. King, E. Nemeth, and k. claffy, "Radon Spectroscopy of Inter-Packet Delay", in IEEE High-Speeding Networking Workshop (HSN), March 2003.

A. Broido, k. claffy, and E. Nemeth, "Internet Expansion, Refinement, and Churn", European Transactions on Telecommunications, Jan 2002.

A. Broido and k. claffy, "Internet topology: connectivity of IP graphs", in SPIE International symposium on Convergence of IT and Communication, Aug 2001.

A. Broido and k. claffy, "Complexity of global routing policies", Tech. rep., CAIDA, Jul 2001.

A. Broido and k. claffy, "Analysis of RouteViews BGP data: policy atoms", in Network Resource Data Management Workshop, May 2001.

Browlee, N.

H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.

Brown, J.

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop 2002, Nov 2002.

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov 2002, ACM SIGCOMM/USENIX Internet Measurement Workshop.

Brown, P.

L. Plissonneau, J. Costeux, and P. Brown, "Analysis of Peer-to-Peer Traffic on ADSL", in Passive and Active Measurement Conference (PAM), Mar 2005.

Brownlee, N.

D. Wessels, M. Fomenkov, N. Brownlee, and k. claffy, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

T. Lindh and N. Brownlee, "Integrating Active Methods and Flow Meters - an implementation using NeTraMet", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.

N. Brownlee and k. claffy, "Understanding Internet Traffic Streams: Dragonflies and Tortoises", Jul 2002.

N. Brownlee and I. Ziedins, "Response time distributions for global name servers", in Passive and Active Measurement Conference (PAM) 2002, Mar 2002.

N. Brownlee, k. claffy, and E. Nemeth, "DNS Root/gTLD Performance Measurements", in USENIX LISA, Dec 2001.

N. Brownlee, k. claffy, and E. Nemeth, "DNS Measurements at a Root Server", in IEEE GLOBECOM. Nov 2001, IEEE GLOBECOM.

N. Brownlee, "Using NeTraMet for Production Traffic Measurement", in Integrated Management Strategies for the New Millenium, May 2001.

N. Brownlee and M. Murray, "Streams, Flows and Torrents", in Passive and Active Measurement Conference (PAM), Apr 2001.

N. Brownlee, k. claffy, M. Murray, and E. Nemeth, "Methodology for passive analysis of a university Internet link", in Passive and Active Measurement Conference (PAM), Apr 2001.

N. Brownlee and R. Fulton, "Kawaihiko and the third-quartile day [traffic management]", Aug 2000.

Brownless, N.

T. Karagiannis, A. Broido, N. Brownless, K. Claffy, and M. Faloutsos, "Is P2P Dying or Just Hiding", in IEEE GLOBECOM, Nov 2004.

Burgener, D.

Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards Street-Level Client-Independent IP Geolocation", in Usenix, Mar 2011.

Burstein, A.

A. Burstein, "Toward a Culture of Cybersecurity Research", in University of California, Berkeley, 2008.

A. Burstein, "Conducting Cybersecurity Research Legally and Ethically", in LEET '08, 2008.

Busch, J.

M. Beiro, J. Alvarez-Hamelin, and J. Busch, "A low complexity visualization tool that helps to perform complex systems analysis", New Journal of Physics, vol. 10, no. 12, pp. 125003, Dec 2008.

Bush, R.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Butkovic, A.

A. Butkovic, F. Orucevic, and A. Tanovic, "Using Whois based geolocation and Google maps API for support cybercrime investigations", pp. 194-200, Jun 2013.

Byers, J.W.

A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, "On the geographic location of Internet resources", in Selected Areas in Communications, Volume 21, Aug 2003, pp. 934-948.

CAIDA

CAIDA, "ISMA Winter 2000 Workshop - Final Report", in Internet Statistics and Metrics Analysis (ISMA), Dec 2000.

CAIDA, "Report from the ISMA Network Visualization Workshop", in Internet Statistics and Metrics Analysis (ISMA), Apr 1999.

CAIDA, "ISMA passive measurement data and analysis, workshop report", in Internet Statistics and Metrics Analysis (ISMA), Jan 1999.

CAIDA, "Comments by CAIDA concerning the FCC's review of the acquisition of MCI Communications Corp. by Worldcom, Inc.", Tech. rep., CAIDA, Apr 1998.

CAIDA, "Cooperative Association for Internet Data Analysis", Tech. rep., CAIDA, Oct 1996.

Carlos, O.

A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.

Castelluccia, C.

C. Castelluccia, M.A. Kaafar, P. Manils, and D. Perito, "Geolocalization of proxied services and its application to fast-flux hidden servers", in IMC, 2009.

Chandramouli, R.

Z. Dong, R.D.W. Perera, R. Chandramouli, and K.P. Subbalakshmi, "Network measurement based modeling and optimization for IP geolocation", Computer Networks, vol. 56, no. 1, pp. 85-98, Jan 2012.

Chang, D.

D. Chang, R. Govindan, and J. Heidemann, "An Empirical Study of Router Response to Large BGP Routing Table Load", Tech. Rep. ISI-TR-2001-552, USC/Information Sciences Institute, December 2001.

Chang, H.

H. Chang, S. Jamin, and W. Willinger, "Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach", in ACM SIGCOMM Workshop on MoMeTools, August 2003.

Chawathe, Y.

E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.

Chen, W.

B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.

Chinoy, B.

B. Chinoy and T. Salo, "Internet Exchanges: Policy-Driven Evolution", in Coordination and Administration of the Internet Workshop, Sep 1996.

H.-W. Braun, B. Chinoy, and k. claffy, "Applied Network Research: 1994 annual status report", Tech. rep., CAIDA, Apr 1994.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1993.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1992.

B. Chinoy, "Dynamics of Internet routing information", Oct 1992.

B. Chinoy and H.-W. Braun, "The National Science Foundation Network", Tech. rep., CAIDA, Sep 1992.

Y. Rekhter and B. Chinoy, "Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis", Jan 1992.

Cho, K.

K. Cho, K. Fukuda, H. Esaki, and A. Kato, "Observing Slow Crustal Movement in Residential User Traffic", in ACM CoNEXT 2008, Dec 2008.

K. Cho, M. Luckie, and B. Huffaker, "Identifying IPv6 Network Problems in the Dual-Stack World", in ACM SIGCOMM, Aug 2004.

Chuah, C.

G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Claessenss, J.

C. Diaz, B. Seys, J. Claessenss, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, 2002.

claffy, k.

D. Wessels, M. Fomenkov, N. Brownlee, and k. claffy, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

A. Broido, Y. Hyun, R. Gao, and k. claffy, "Their share: diversity and disparity in IP traffic", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.

C. Dovrolis, R. Prasad, M. Murray, and k. claffy, "Bandwidth estimation: metrics, measurement techniques, and tools", IEEE Network, Nov 2003.

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of Private DNS Update Sources", in IEEE Workshop on Internet Applications (WIAPP), June 2003.

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of DNS Update Traffic", in ACM SIGMETRICS 2003, June 2003.

D. Wessels, M. Fomenkov, and k. claffy, "Wow, That's a lot of packets", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.

Y. Hyun, A. Broido, and k. claffy, "On Third-party Addresses in Traceroute Paths", in Passive and Active Measurement Conference (PAM), Apr 2003.

M. Fomenkov, K. Keys, D. Moore, and k. claffy, "Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites", Tech. rep., CAIDA, Apr 2003.

T. Lee, B. Huffaker, M. Fomenkov, and k. claffy, "On the problem of optimization of DNS root servers' placement", in Passive and Active Measurement Conference (PAM), Mar 2003.

Y. Hyun, A. Broido, and k. claffy, "Traceroute and BGP AS Path Incongruities", Tech. rep., CAIDA, Mar 2003.

A. Broido, R. King, E. Nemeth, and k. claffy, "Radon Spectroscopy of Inter-Packet Delay", in IEEE High-Speeding Networking Workshop (HSN), March 2003.

R. Beverly and k. claffy, "Wide-Area IP Multicast Traffic Characterization", IEEE Network, Jan 2003.

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.

N. Brownlee and k. claffy, "Understanding Internet Traffic Streams: Dragonflies and Tortoises", Jul 2002.

B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing", in Symposium on Applications and the Internet (SAINT), Jan 2002.

A. Broido, k. claffy, and E. Nemeth, "Internet Expansion, Refinement, and Churn", European Transactions on Telecommunications, Jan 2002.

D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.

M. Fomenkov, k. claffy, B. Huffaker, and D. Moore, "Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers", in USENIX LISA, Dec 2001.

N. Brownlee, k. claffy, and E. Nemeth, "DNS Root/gTLD Performance Measurements", in USENIX LISA, Dec 2001.

C. Shannon, D. Moore, and k. claffy, "Characteristics of Fragmented Traffic on Internet Links", in ACM SIGCOMM Internet Measurement Workshop 2001. Nov 2001, ACM SIGCOMM.

N. Brownlee, k. claffy, and E. Nemeth, "DNS Measurements at a Root Server", in IEEE GLOBECOM. Nov 2001, IEEE GLOBECOM.

A. Broido and k. claffy, "Internet topology: connectivity of IP graphs", in SPIE International symposium on Convergence of IT and Communication, Aug 2001.

A. Broido and k. claffy, "Complexity of global routing policies", Tech. rep., CAIDA, Jul 2001.

A. Broido and k. claffy, "Analysis of RouteViews BGP data: policy atoms", in Network Resource Data Management Workshop, May 2001.

C. Shannon, D. Moore, and k. claffy, "Characteristics of fragmented IP traffic on Internet links", in Passive and Active Measurement Conference (PAM), Amsterdam, Netherlands, Apr 2001, RIPE NCC.

M. Murray and k. claffy, "Measuring the Immeasurable: Global Internet Measurement Infrastructure", in Passive and Active Measurement Conference (PAM), Apr 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

B. Huffaker, M. Fomenkov, D. Moore, and k. claffy, "Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance", in Passive and Active Measurement Conference (PAM), Apr 2001.

N. Brownlee, k. claffy, M. Murray, and E. Nemeth, "Methodology for passive analysis of a university Internet link", in Passive and Active Measurement Conference (PAM), Apr 2001.

M. Mathis, G. Huntoon, and k. claffy, "Traffic dynamics testbed", in Large Scale Networking (LSN) Workshop, Mar 2001.

k. claffy, "CAIDA: Visualizing the Internet", Jan 2001.

P. Rajvaidya, K. Almeroth, and k. claffy, "A scalable architecture for monitoring and visualizing multicast statistics", in Distributed Systems: Operations and Management, Dec 2000.

S. McCreary and k. claffy, "Trends in wide area IP traffic patterns - A view from Ames Internet Exchange", in ITC Specialist Seminar, Sep 2000.

E. Nemeth, T. Ott, K. Thompson, and k. claffy, "The Internet Engineering Curriculum Repository", in International Networking Conference (INET) '00, Jul 2000.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET) '00, Jul 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) '00, July 2000.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET), Yokohama, Japan, 18-21 Jul 2000, The Internet Society.

k. claffy, "Measuring the Internet", Jan 2000.

k. claffy and S. McCreary, "Internet measurement and data analysis: passive and active measurement", in American Statistical Association, Aug 1999.

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) 1999, June 1999.

B. Huffaker, k. claffy, and E. Nemeth, "Tools to visualize the Internet multicast backbone", in International Networking Conference (INET) '99, Jun 1999.

B. Huffaker, k. claffy, and E. Nemeth, "Tools to Visualize the Internet Multicast Backbone", in International Networking Conference (INET) 1999, June 1999.

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) '99, Jun 1999.

k. claffy, "Internet measurement and data analysis: topology, workload, performance and routing statistics", in NAE '99 Workshop, Mar 1999.

k. claffy, T. Monk, and D. McRobb, "Internet Tomography", Jan 1999.

k. claffy, G. Miller, and K. Thompson, "The nature of the beast: Recent traffic measurements from an Internet backbone", in International Networking Conference (INET) '98, Jul 1998.

B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.

Huffaker B., J. Jung, D. Wessels, and k. claffy, "Visualization of the Growth and Topology of the NLANR Caching Hierarchy", in International WWW Caching Workshop 1998, June 1998.

D. Wessels and k. claffy, "ICP and the Squid web cache", Mar 1998.

k. claffy and T. Monk, "What's next for Internet data analysis? Status and challenges facing the community", Oct 1997.

D. Wessels and k. claffy, "RFC 2187: Application of Internet Cache Protocol (ICP), version 2" Sept 1997.

D. Wessels and k. claffy, "RFC 2186: Internet Cache Protocol (ICP), version 2" Sept 1997.

T. Monk and k. claffy, "Internet data acquisition and analysis: Status and next steps", Tech. rep., CAIDA, Mar 1997.

E. Hoffman and k. claffy, "Geographic addressing reconsidered", 1996.

D. Wessels and k. claffy, "Evolution of the NLANR cache hierarchy: Global configuration challenges", Tech. rep., CAIDA, Nov 1996.

T. Munzner, E. Hoffman, k. claffy, and B. Fenner, "Visualizing the global topology of the MBone", in IEEE Symposium on Information Visualization, Oct 1996.

E. Hoffman and k. claffy, "Address administration in IPv6", in 1996 IEEE Symposium on Information Visualization, Oct 1996.

D. Wessels and k. claffy, "Can WWW caches help to save the Internet?", in Coordination and Administration of the Internet Workshop, Sep 1996.

T. Monk and k. claffy, "Cooperation in Internet data acquisition and analysis", Sept 1996.

D. Mitchell, S. Bradner, and k. claffy, "In whose domain: name service in adolescence", Sept 1996.

k. claffy, "'But some data is worse than others': Measurement of the global Internet", Tech. rep., CAIDA, Aug 1996.

T. Monk and k. claffy, "A survey of Internet statistics / metrics activities", Tech. rep., CAIDA, Jun 1996.

k. claffy and H.-W. Braun, "Post-NSFNET statistics collection", in International Networking Conference (INET) '95, Jun 1995.

k. claffy, A Gross, and H.-W. Braun, "Measured interference of security mechanisms with network performance", in International Networking Conference (INET) '95, Jun 1995.

k. claffy, H.-W. Braun, and G. Polyzos, "A parameterizable methodology for Internet traffic flow profiling", Mar 1995.

k. claffy, Internet traffic characterization., Ph.D. thesis, University of California, San Diego, 1994.

R. Bohn, H.-W. Braun, k. claffy, and S. Wolff, "Mitigating the coming Internet crunch: multiple service levels via Precedence", Tech. rep., CAIDA, Nov 1994.

H.-W. Braun and k. claffy, "Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server", in World Wide Web (WWW) Conference, Oct 1994.

H.-W. Braun, B. Chinoy, and k. claffy, "Applied Network Research: 1994 annual status report", Tech. rep., CAIDA, Apr 1994.

k. claffy, H.-W. Braun, and G. Polyzos, "Tracking long-term growth of the NSFNET", Mar 1994.

k. claffy, H.-W. Braun, and G. Polyzos, "Internet traffic flow profiling", Tech. rep., CAIDA, Mar 1994.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Measurement considerations for assessing unidirectional latencies", Sep 1993.

H.-W. Braun, k. claffy, and G. Polyzos, "A framework for flow-based accounting on the Internet", in IEEE Singapore International Conference on Networks'93 (SICON'93), Sep 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Application of sampling methodologies to wide-area network traffic characterization", in ACM SIGCOMM '93, May 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Long-term traffic aspects of the NSFNET", in International Networking Conference (INET) '93, May 1993.

H.-W. Braun and k. claffy, "Network analysis issues for a public Internet", in Public Access to the Internet, A Harvard JFK School Workshop, May 1993.

H.-W. Braun and k. claffy, "Network analysis in support of Internet policy requirements", in International Networking Conference (INET) '93, May 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Traffic characteristics of the T1 NSFNET backbone", in IEEE INFOCOM, Jan 1993.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1992.

T. Asaba, k. claffy, O. Nakamura, and J. Murai, "An analysis of international academic research network traffic between Japan and other nations", in International Networking Conference (INET) '92, Jan 1992.

Claffy, K.

H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.

T. Karagiannis, A. Broido, N. Brownless, K. Claffy, and M. Faloutsos, "Is P2P Dying or Just Hiding", in IEEE GLOBECOM, Nov 2004.

T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport Layer Identification of P2p Traffic", in ACM SIGCOMM 2004, Aug 2004.

claffy, kc

B. Huffaker, M. Fomenkov, and kc claffy, "Geocompare: a comparison of public and commercial geolocation databases", Tech. rep., CAIDA, May 2011.

Clark, L.

R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.

M. Bishop, R. Crawford, B. Bhumiratana, L. Clark, and K. Levitt, "Some Problems in Sanitizing Network Data", in IEEE WETICE, 2006.

Cohen, I.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.

Collins, M.

M. Collins and M. Reiter, "Hit-list worm detection and bot identification in large networks using protocol graphs", in RAID 2007, Sep 2007.

S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.

Constantinou, F.

F. Constantinou and P. Mavrommatiss, "Identifying Known and Unknown Peer-to-Peer Traffic", in IEEE NCA 2006, Aug 2006.

Conti, G.

G. Conti, "Googling Considering Harmful", in New Security Paradigms Workshop (NSPW), 2006.

Costeux, J.

L. Plissonneau, J. Costeux, and P. Brown, "Analysis of Peer-to-Peer Traffic on ADSL", in Passive and Active Measurement Conference (PAM), Mar 2005.

Costeux, J.-L.

M. Pietrzyk, J.-L. Costeux, G. Urvoy-Keller, and T. En-Najjary, "Challenging Statistical Classification for Operational Usage: the ADSL Case", in ACM SIGCOMM IMC, Nov 2009.

Cotton, C.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Coull, S.

S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.

S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.

Cox, R.

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, "Vivaldi: A Decentralized Network Coordinate System", in SIGCOMM, Portland, Oregon, Aug 2004.

Crawford, R.

R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.

M. Bishop, R. Crawford, B. Bhumiratana, L. Clark, and K. Levitt, "Some Problems in Sanitizing Network Data", in IEEE WETICE, 2006.

Crogan, M.

A. Moore, D. Zuev, and M. Crogan, "Discriminators for Use in Flow-based Classification", Tech. rep., Intel Research, Cambridge, 2005.

Crotti, M.

M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, "Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting", in Computer Networks 2008, Sep 2008.

M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting", in ACM SIGCOMM 2007, Aug 2007.

Crovella, M.

A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions", in ACM SIGCOMM 2005, Aug 2005.

B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based Geolocation of Internet Hosts", IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 288-293, 2004.

L. Tang and M. Crovella, "Virtual Landmarks for the Internet", in Internet Measurement Conference (IMC), Oct 2003, pp. 143-152.

A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, "On the geographic location of Internet resources", in Selected Areas in Communications, Volume 21, Aug 2003, pp. 934-948.

Csabai, I.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.

S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.

D., Zuev

A. Moore and Zuev D., "Internet Traffic Classification Using Bayesian Analysis Techniques", in ACM SIGMETRICS 2005, Jun 2005.

Zuev D. and Moore A., "Traffic Classification using a Statistical Approach", in Passive and Active Measurement Conference (PAM), Mar 2005.

Dabek, F.

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, "Vivaldi: A Decentralized Network Coordinate System", in SIGCOMM, Portland, Oregon, Aug 2004.

Dainotti, A.

A. Dainotti, W. de Donato, A. Pescape, and G. Ventre, "TIE: a Community-oriented Traffic Classification Platform", in International Workshop on Traffic Monitoring and Analysis (TMA), 2009.

A. Dainotti, W. de Donato, A. Pescape, and P. Salvo~Rossi, "Classification of Network Traffic via Packet-Level Hidden Markov Models", in IEEE GLOBECOM, 2008.

Danezis, G.

A. Serjantov and G. Danezis, "Towards an Information Theoretic Metric for Anonymity", in Privacy Enhancing Technologies, 2002.

Dang, T.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer", in Systems and Computers in Japan 2008, Mar 2008.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Identification and Analysis of Peer-to-Peer Traffic", in Journal of Communications 2006, Mar 2006.

Davis, C.

C. Davis, P. Vixie, T. Goodwin, and I. Dickinson, "A Means for Expressing Location Information in the Domain Name System", RFC Editor, 1996.

de Donato, W.

A. Dainotti, W. de Donato, A. Pescape, and G. Ventre, "TIE: a Community-oriented Traffic Classification Platform", in International Workshop on Traffic Monitoring and Analysis (TMA), 2009.

A. Dainotti, W. de Donato, A. Pescape, and P. Salvo~Rossi, "Classification of Network Traffic via Packet-Level Hidden Markov Models", in IEEE GLOBECOM, 2008.

de Rezende, J. F.

A. Ziviani, S. Fdida, J.~F. de Rezende, and O.~C. M.~B. Duarte, "Improving the accuracy of measurement-based geographic location of internet hosts", Computer Networks and ISDN Systems, vol. 47, no. 4, pp. 503-523, 2005.

A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.

de Rezende, J.F.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Demographic placement for Internet host location", in GLOBECOM, Dec 2003.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Similarity models for Internet host location", in ICON, Sep 2003.

Dewes, C.

C. Dewes, A. Wichmann, and A. Feldmann, "An Analysis of Internet Chat Systems", in ACM SIGCOMM 2003, Aug 2003.

Dey, R.

Y. Tian, R. Dey, Y. Liu, and K.W. Ross, "Topology mapping and geolocating for China's Internet", IEEE Trans. On Parallel and Distributed Systems, vol. 24, no. 9, pp. 1908-1917, Sep 2013.

Diaz, C.

C. Diaz, B. Seys, J. Claessenss, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, 2002.

Dickinson, I.

C. Davis, P. Vixie, T. Goodwin, and I. Dickinson, "A Means for Expressing Location Information in the Domain Name System", RFC Editor, 1996.

Diot, C.

A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions", in ACM SIGCOMM 2005, Aug 2005.

G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Dong, Z.

Z. Dong, R.D.W. Perera, R. Chandramouli, and K.P. Subbalakshmi, "Network measurement based modeling and optimization for IP geolocation", Computer Networks, vol. 56, no. 1, pp. 85-98, Jan 2012.

Donnet, B.

I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.

Donohoe, J.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET) '00, Jul 2000.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET), Yokohama, Japan, 18-21 Jul 2000, The Internet Society.

Dovrolis, C.

C. Dovrolis, R. Prasad, M. Murray, and k. claffy, "Bandwidth estimation: metrics, measurement techniques, and tools", IEEE Network, Nov 2003.

C. Dovrolis, P. Ramanathan, and D. Moore, "Packet Dispersion Techniques and Capacity Estimation", July 2001.

C. Dovrolis, P. Ramanathan, and D. Moore, "What do packet dispersion techniques measure?", in IEEE INFOCOM, Jan 2001.

Duarte, M. B.

A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.

Duarte, O. C. M. B.

A. Ziviani, S. Fdida, J.~F. de Rezende, and O.~C. M.~B. Duarte, "Improving the accuracy of measurement-based geographic location of internet hosts", Computer Networks and ISDN Systems, vol. 47, no. 4, pp. 503-523, 2005.

Duarte, O.C.M.B.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Demographic placement for Internet host location", in GLOBECOM, Dec 2003.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Similarity models for Internet host location", in ICON, Sep 2003.

Duffield, N.

S. Roughan, O. Sen, and N. Duffield, "Class-of-service Mapping for QoS", in ACM SIGCOMM IMC, Oct 2004.

Dusi, M.

M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, "Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting", in Computer Networks 2008, Sep 2008.

M. Dusi, F. Gringoli, and L. Salgarelli, "A Preliminary Look at the Privacy of SSH Tunnels", in IEEE International Conference on Communications (ICC) 2008, May 2008.

M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting", in ACM SIGCOMM 2007, Aug 2007.

Emilion, R.

A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.

En-Najjary, T.

M. Pietrzyk, J.-L. Costeux, G. Urvoy-Keller, and T. En-Najjary, "Challenging Statistical Classification for Operational Usage: the ADSL Case", in ACM SIGCOMM IMC, Nov 2009.

Endo, P.T.

P.T. Endo and D. Sadok, "Whois based geolocation: A strategy to geolocate Internet hosts", pp. 408-413, Apr 2010.

Eriksson, B.

B. Eriksson, P. Barford, B. Maggs, and R. Nowak, "Posit: a lightweight approach for IP geolocation", ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 2, pp. 2-11, Sep 2012.

B. Eriksson, P. Barford, J. Sommers, and R. Nowak, "A Learning-Based Approach for IP Geolocation", in PAM, LNCS Volume 6032, Apr 2010, pp. 171-180.

Erman, J.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.

J. Erman, A. Mahanti, and M. Arlitt, "Internet Traffic Identification using Machine Learning", in IEEE GLOBECOM 2006, Nov 2006.

J. Erman, M. Arlitt, and A. Mahanti, "Traffic Classification Using Clustering Algorithms", in ACM SIGCOMM 2006, Aug 2006.

Ermopoulos, C.

K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.

Ertoz, L.

A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.

Esaki, H.

K. Cho, K. Fukuda, H. Esaki, and A. Kato, "Observing Slow Crustal Movement in Residential User Traffic", in ACM CoNEXT 2008, Dec 2008.

Estan, C.

C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a Better NetFlow", in ACM SIGCOMM, Sept 2004.

C. Estan, S. Savage, and G. Vargheses, "Automatically Inferring Patterns of Resources Consumption in Network Traffic", in ACM SIGCOMM 2003, Aug 2003.

F., Chang

Chang~Feng W., Chang F., Chi~Feng W., and Walpole J., "A Traffic Characterization of Popular on-line Games", in IEEE/ACM Transactions on Networking 2005, Oct 2005.

Faloutso, M.

T. Karagiannis, K. Papgiannaki, N. Taft, and M. Faloutso, "Profiling the End Host", in Passive and Active Measurement Conference (PAM), Apr 2007.

Faloutsos, M.

M. Iliofotou, P. Pappu, and M. Faloutsos, "Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs", in Tech Report 2008, Jun 2008.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.

H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC Multilevel Traffic Classification in the Dark", in ACM SIGCOMM 2005, Aug 2005.

T. Karagiannis, A. Broido, N. Brownless, K. Claffy, and M. Faloutsos, "Is P2P Dying or Just Hiding", in IEEE GLOBECOM, Nov 2004.

T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport Layer Identification of P2p Traffic", in ACM SIGCOMM 2004, Aug 2004.

G. Siganos and M. Faloutsos, "Analyzing BGP Policies: Methodology and Tool", in IEEE INFOCOM, March 2004.

T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, "A Nonstationary Poisson View of Internet Traffic", in IEEE INFOCOM. March 2004, IEEE INFOCOM.

Fan, J.

J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", Computer Networks, 2004.

J. Xu, J. Fan, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", IEEE International Conference on Network Protocols (ICNP), nov 2002.

J. Xu, J. Fan, M. Ammar, and S. Moon, "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization", in ACM SIGCOMM IMC, 2001.

Fdida, S.

B. Gueye, S. Uhlig, and S. Fdida, "Investigating the Imprecision of IP Block-based Geolocation", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2007, pp. 237-240, Springer-Verlag.

B. Gueye, S. Uhlig, A. Ziviani, and S. Fdida, "Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts" 2006.

A. Ziviani, S. Fdida, J.~F. de Rezende, and O.~C. M.~B. Duarte, "Improving the accuracy of measurement-based geographic location of internet hosts", Computer Networks and ISDN Systems, vol. 47, no. 4, pp. 503-523, 2005.

A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.

B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based Geolocation of Internet Hosts", IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 288-293, 2004.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Demographic placement for Internet host location", in GLOBECOM, Dec 2003.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Similarity models for Internet host location", in ICON, Sep 2003.

Feamster, N.

M.~J. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic Locality of IP Prefixes", in Internet Measurement Conference (IMC), Berkeley, CA, USA, 2005, p. 13, USENIX Association.

N. Feamster, D.~G. Andersen, H. Balakrishnan, and M.~F. Kaashoek, "Measuring the Effects of Internet Path Faults on Reactive Routing", in ACM SIGMETRICS, Jun 2003.

D.G. Andersen, N. Feamster, S. Bauer, and H. Balakrishnan, "Topology Inference from BGP Routing Dynamics", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Feldman, D.

D. Feldman, Y. Shavitt, and N. Zilberman, "A structural approach for PoP geo-location", Computer Networks, vol. 56, no. 3, pp. 1029-1040, Feb 2012.

Feldmann, A.

G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On Dominant Characteristics of Residential Broadband Internet Traffic", in ACM SIGCOMM IMC, Nov 2009.

C. Dewes, A. Wichmann, and A. Feldmann, "An Analysis of Internet Chat Systems", in ACM SIGCOMM 2003, Aug 2003.

Fenner, B.

T. Munzner, E. Hoffman, k. claffy, and B. Fenner, "Visualizing the global topology of the MBone", in IEEE Symposium on Information Visualization, Oct 1996.

Flores, M.

Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards Street-Level Client-Independent IP Geolocation", in Usenix, Mar 2011.

Floyd, S.

J. Padhye and S. Floyd, "Identifying the TCP Behavior of Web Servers", in ACM SIGCOMM, 2001.

Fomenkov, M.

B. Huffaker, M. Fomenkov, and kc claffy, "Geocompare: a comparison of public and commercial geolocation databases", Tech. rep., CAIDA, May 2011.

D. Wessels, M. Fomenkov, N. Brownlee, and k. claffy, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

D. Wessels, M. Fomenkov, and k. claffy, "Wow, That's a lot of packets", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.

M. Fomenkov, K. Keys, D. Moore, and k. claffy, "Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites", Tech. rep., CAIDA, Apr 2003.

T. Lee, B. Huffaker, M. Fomenkov, and k. claffy, "On the problem of optimization of DNS root servers' placement", in Passive and Active Measurement Conference (PAM), Mar 2003.

B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.

M. Fomenkov, k. claffy, B. Huffaker, and D. Moore, "Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers", in USENIX LISA, Dec 2001.

B. Huffaker, M. Fomenkov, D. Moore, and k. claffy, "Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance", in Passive and Active Measurement Conference (PAM), Apr 2001.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) '00, July 2000.

Fomenkova, M.

H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.

Ford, P.

B. Aiken, H.-W. Braun, and P. Ford, "NSF implementation plan for interim NREN", 1993.

H.-W. Braun, P. Ford, and Y. Rekhter, "CIDR and the evolution of the Internet", in International Networking Conference (INET) '93, May 1993.

Fraleigh, C.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Franklin, J.

J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", in ACM Conference on Computer and Communications Security (CCS), 2007.

Freedman, M. J.

M.~J. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic Locality of IP Prefixes", in Internet Measurement Conference (IMC), Berkeley, CA, USA, 2005, p. 13, USENIX Association.

Fukuda, K.

K. Cho, K. Fukuda, H. Esaki, and A. Kato, "Observing Slow Crustal Movement in Residential User Traffic", in ACM CoNEXT 2008, Dec 2008.

Fulton, R.

N. Brownlee and R. Fulton, "Kawaihiko and the third-quartile day [traffic management]", Aug 2000.

Ganjali, Y.

P. Gill, Y. Ganjali, and B. Wong, "Dude, where's that IP? Circumventing measurement-based IP geolocation", in Usenix Security Symposium, Aug 2010.

Gao, L.

L. Gao, "On inferring autonomous system relationships in the Internet", in IEEE Global Internet Symposium, nov 2000.

Gao, R.

A. Broido, Y. Hyun, R. Gao, and k. claffy, "Their share: diversity and disparity in IP traffic", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.

Gefferth, A.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer", in Systems and Computers in Japan 2008, Mar 2008.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Identification and Analysis of Peer-to-Peer Traffic", in Journal of Communications 2006, Mar 2006.

Gehrke, J.

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity.", in IEEE International Conference on Data Engineering (ICDE), 2006.

Getoor, L.

E. Zheleva and L. Getoor, "Preserving the Privacy of Sensitive Relationships in Graph Data", in ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD), 2007.

Gill, P.

P. Gill, Y. Ganjali, and B. Wong, "Dude, where's that IP? Circumventing measurement-based IP geolocation", in Usenix Security Symposium, Aug 2010.

Giovannetti, E.

E. Giovannetti and C.~A. Ristuccia, "Estimating Market Power in the Internet Backbone Using Band-X data" June 2003.

Goodwin, T.

C. Davis, P. Vixie, T. Goodwin, and I. Dickinson, "A Means for Expressing Location Information in the Domain Name System", RFC Editor, 1996.

Govindan, R.

Z. Mao, R. Govindan, G. Varghese, and R.~H. Katz, "Route Flap Damping Exacerbates Internet Routing Convergence", in ACM SIGCOMM, Aug 2002.

D. Chang, R. Govindan, and J. Heidemann, "An Empirical Study of Router Response to Large BGP Routing Table Load", Tech. Rep. ISI-TR-2001-552, USC/Information Sciences Institute, December 2001.

Greenstein, B.

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting", in ACM MobiCom, 2007.

Griffin, T.

T. Griffin and G. Wilfong, "Analysis of the MED Oscillation Problem in BGP", in IEEE International Conference on Network Protocols (ICNP), 2002.

T. Griffin and G. Wilfong, "On the Correctness of IBGP Configuration", in ACM SIGCOMM, 2002.

Griffin, T. G.

T.~G. Griffin, "What is the Sound of One Route Flapping?" July 2002.

Gringoli, F.

M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, "Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting", in Computer Networks 2008, Sep 2008.

M. Dusi, F. Gringoli, and L. Salgarelli, "A Preliminary Look at the Privacy of SSH Tunnels", in IEEE International Conference on Communications (ICC) 2008, May 2008.

M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting", in ACM SIGCOMM 2007, Aug 2007.

Groschwitz, N.

N. Groschwitz and G. Polyzos, "A Time-Series Model of Long-Term Traffic on the NSFNET Backbone", in IEEE International Conference on Communications (ICC), May 1994.

Gross, A

k. claffy, A Gross, and H.-W. Braun, "Measured interference of security mechanisms with network performance", in International Networking Conference (INET) '95, Jun 1995.

Grunwald, D.

D. Sicker, P. Ohm, and D. Grunwald, "Legal issues surrounding monitoring during network research", in ACM SIGCOMM IMC, 2007.

Gruteser, M.

B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking", in ACM Conference on Computer and Communications Security (CCS), 2007.

Gueye, B.

I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.

S.~S. Siwpersad, B. Gueye, and S. Uhlig, "Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2008, pp. 11-20, Springer-Verlag.

B. Gueye, S. Uhlig, and S. Fdida, "Investigating the Imprecision of IP Block-based Geolocation", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2007, pp. 237-240, Springer-Verlag.

B. Gueye, S. Uhlig, A. Ziviani, and S. Fdida, "Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts" 2006.

B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based Geolocation of Internet Hosts", IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 288-293, 2004.

Gummadi, R.

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting", in ACM MobiCom, 2007.

Gun Sirer, E.

B. Wong, I. Stoyanov, and E. Gun~Sirer, "Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts", in Symposium on Networked System Design and Implementation (NSDI), Cambridge, MA, USA, Apr 2007.

Gunatilaka, A.

M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, "Internet Host Geolocation Using Maximum Likelihood Estimation Technique", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Washington, DC, USA, 2010, pp. 422-429, IEEE Computer Society.

Guo, C.

C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.

Guttag, J.

G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks based on Connection Patterns", in USENIX 2003, Jun 2003.

Haffner, P.

P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "Acas: Automated Construction of Application Signatures", in ACM SIGCOMM 2005, Aug 2005.

Haga, P.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.

S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.

Halak, J.

S. Ubik, P. Zejdl, and J. Halak, "Real-time anonymization in passive network monitoring", in International Conference on Networking and Services (ICNS), 2007.

Hall, M.

A. McGregor, M. Hall, Brunskill J., and Lorier P., "Flow Clustering Using Machine Learning Techniques", in Passive and Active Measurement Conference (PAM), Apr 2004.

Hansen, M.

A. Pfitzmann and M. Hansen, "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology" February 2008.

Har-Peled, S.

Y. Afek, A. Bremler-Barr, and S. Har-Peled, "Routing with a Clue", in ACM SIGCOMM, 1999.

Harvan, M.

M. Harvan and J. Schonwalder, "Prefix- and Lexicographical-order-preserving IP Address Anonymization", IEEE/IFIP Network Operations and Management Symposium (NOMS), 2006.

Heidemann, J.

Z. Hu, J. Heidemann, and Y. Pradkin, "Towards geolocation of millions of IP addresses", pp. 123-130, Nov 2012.

G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, "Estimating P2P Traffic Volume at USC", Tech. rep., USC/Information Sciences Institute, 2007.

G. Bartlett, J. Heidemann, and C. Papadopoulos, "Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing", in IEEE Global Internet Symposium 2007, May 2007.

A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.

D. Chang, R. Govindan, and J. Heidemann, "An Empirical Study of Router Response to Large BGP Routing Table Load", Tech. Rep. ISI-TR-2001-552, USC/Information Sciences Institute, December 2001.

Hellings, G.

W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.

Hoffman, E.

E. Hoffman and k. claffy, "Geographic addressing reconsidered", 1996.

T. Munzner, E. Hoffman, k. claffy, and B. Fenner, "Visualizing the global topology of the MBone", in IEEE Symposium on Information Visualization, Oct 1996.

E. Hoffman and k. claffy, "Address administration in IPv6", in 1996 IEEE Symposium on Information Visualization, Oct 1996.

Hoh, B.

B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking", in ACM Conference on Computer and Communications Security (CCS), 2007.

Holzhauer, F.

F. Holzhauer, "IP Geolocation", Internet Measurement seminar, Jul 2007.

Hu, Z.

Z. Hu, J. Heidemann, and Y. Pradkin, "Towards geolocation of millions of IP addresses", pp. 123-130, Nov 2012.

Huang, C.

Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards Street-Level Client-Independent IP Geolocation", in Usenix, Mar 2011.

Huffaker, B.

B. Huffaker, M. Fomenkov, and kc claffy, "Geocompare: a comparison of public and commercial geolocation databases", Tech. rep., CAIDA, May 2011.

K. Cho, M. Luckie, and B. Huffaker, "Identifying IPv6 Network Problems in the Dual-Stack World", in ACM SIGCOMM, Aug 2004.

T. Lee, B. Huffaker, M. Fomenkov, and k. claffy, "On the problem of optimization of DNS root servers' placement", in Passive and Active Measurement Conference (PAM), Mar 2003.

B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.

B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing", in Symposium on Applications and the Internet (SAINT), Jan 2002.

M. Fomenkov, k. claffy, B. Huffaker, and D. Moore, "Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers", in USENIX LISA, Dec 2001.

B. Huffaker, M. Fomenkov, D. Moore, and k. claffy, "Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance", in Passive and Active Measurement Conference (PAM), Apr 2001.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) '00, July 2000.

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) 1999, June 1999.

B. Huffaker, k. claffy, and E. Nemeth, "Tools to visualize the Internet multicast backbone", in International Networking Conference (INET) '99, Jun 1999.

B. Huffaker, k. claffy, and E. Nemeth, "Tools to Visualize the Internet Multicast Backbone", in International Networking Conference (INET) 1999, June 1999.

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) '99, Jun 1999.

B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.

Huntoon, G.

M. Mathis, G. Huntoon, and k. claffy, "Traffic dynamics testbed", in Large Scale Networking (LSN) Workshop, Mar 2001.

Hussain, A.

A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.

Huston, G.

G. Huston, "Commentary on Inter-Domain Routing in the Internet, RFC 3221" Dec 2001.

G. Huston, "Analyzing the Internet's BGP Routing Table", The Internet Protocol Journal, vol. 4, no. 1, Mar 2001.

Hyun, Y.

A. Broido, Y. Hyun, R. Gao, and k. claffy, "Their share: diversity and disparity in IP traffic", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.

Y. Hyun, A. Broido, and k. claffy, "On Third-party Addresses in Traceroute Paths", in Passive and Active Measurement Conference (PAM), Apr 2003.

Y. Hyun, A. Broido, and k. claffy, "Traceroute and BGP AS Path Incongruities", Tech. rep., CAIDA, Mar 2003.

Iannaccone, G.

G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Iliofotou, M.

M. Iliofotou, P. Pappu, and M. Faloutsos, "Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs", in Tech Report 2008, Jun 2008.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.

isp-bgpdnswg@nicwg.org

isp bgpdnswg@nicwg.org, "Enhancing the Security of Name Resolution and Inter-Domain Internet Routing" May 2002.

J., Brunskill

A. McGregor, M. Hall, Brunskill J., and Lorier P., "Flow Clustering Using Machine Learning Techniques", in Passive and Active Measurement Conference (PAM), Apr 2004.

J., Walpole

Chang~Feng W., Chang F., Chi~Feng W., and Walpole J., "A Traffic Characterization of Popular on-line Games", in IEEE/ACM Transactions on Networking 2005, Oct 2005.

Jahanian, F.

C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "An Experimental Study of Internet Routing Convergence", Tech. Rep. MSR-TR-2000-08, Microsoft Research, 2000.

C. Labovitz, G.~R. Malan, and F. Jahanian, "Origins of Internet Routing Instability", in IEEE INFOCOM, Mar 1999.

C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Wide-Area Backbone Failures", Tech. Rep. CSE-TR-382-98, University of Michigan, 1998.

C. Labovitz, G.~R. Malan, and F. Jahanian, "Internet Routing Instability", IEEE/ACM Transactions on Networking, vol. 6, no. 5, pp. 515-528, 1998.

Jamin, S.

H. Chang, S. Jamin, and W. Willinger, "Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach", in ACM SIGCOMM Workshop on MoMeTools, August 2003.

Jeannin, M.

L. Bernaille, A. Soule, M. Jeannin, and K. Salamatian, "Blind Application Recognition Through Behavioral Classification", Tech. rep., Paris 2005, 2005.

Johari, R.

R. Johari and J. Tsitsiklis, "Routing and Peering in a Competitive Internet" January 2003.

John, J. P.

E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.

John, W.

W. John and S. Tafvelin, "Heuristics to Classify Internet Backbone Traffic based on Connection Patterns", in International Conference on Information Networking (ICOIN), Sept 2008.

W. John, S. Tafvelin, and T. Olovsson, "Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic", in Passive and Active Measurement Conference (PAM), Mar 2008.

W. John and S. Tafvelin, "Analysis of Internet Backbone Traffic and Header Anomalies Observed", in ACM SIGCOMM IMC, Oct 2007.

Johnson, D.

Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.

Jung, J.

B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.

Huffaker B., J. Jung, D. Wessels, and k. claffy, "Visualization of the Growth and Topology of the NLANR Caching Hierarchy", in International WWW Caching Workshop 1998, June 1998.

Kaafar, M.A.

I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.

C. Castelluccia, M.A. Kaafar, P. Manils, and D. Perito, "Geolocalization of proxied services and its application to fast-flux hidden servers", in IMC, 2009.

Kaashoek, F.

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, "Vivaldi: A Decentralized Network Coordinate System", in SIGCOMM, Portland, Oregon, Aug 2004.

G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks based on Connection Patterns", in USENIX 2003, Jun 2003.

Kaashoek, M. F.

N. Feamster, D.~G. Andersen, H. Balakrishnan, and M.~F. Kaashoek, "Measuring the Effects of Internet Path Faults on Reactive Routing", in ACM SIGMETRICS, Jun 2003.

Kalmanek, C.

J. Merwe, S. Sen, and C. Kalmanek, "Streaming Video Traffic: Characterization and Network Impact", in WCW 2002, Aug 2002.

Karagiannis, T.

T. Karagiannis, K. Papgiannaki, N. Taft, and M. Faloutso, "Profiling the End Host", in Passive and Active Measurement Conference (PAM), Apr 2007.

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC Multilevel Traffic Classification in the Dark", in ACM SIGCOMM 2005, Aug 2005.

T. Karagiannis, A. Broido, N. Brownless, K. Claffy, and M. Faloutsos, "Is P2P Dying or Just Hiding", in IEEE GLOBECOM, Nov 2004.

T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport Layer Identification of P2p Traffic", in ACM SIGCOMM 2004, Aug 2004.

T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, "A Nonstationary Poisson View of Internet Traffic", in IEEE INFOCOM. March 2004, IEEE INFOCOM.

Karunasekera, S.

M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, "Internet Host Geolocation Using Maximum Likelihood Estimation Technique", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Washington, DC, USA, 2010, pp. 422-429, IEEE Computer Society.

M.J. Arif, S. Karunasekera, and S. Kulkarni, "GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements", in Australasian Conference on Computer Science (ASCS), Darlinghurst, Australia, Australia, 2010, pp. 89-98, Australian Computer Society, Inc.

Kato, A.

K. Cho, K. Fukuda, H. Esaki, and A. Kato, "Observing Slow Crustal Movement in Residential User Traffic", in ACM CoNEXT 2008, Dec 2008.

Katz, R.

Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.

L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet Hierarchy from Multiple Vantage Points", in IEEE INFOCOM, Jun 2002.

Katz, R. H.

Z. Mao, J. Rexford, J. Wang, and R.~H. Katz, "Towards an Accurate AS-Level Traceroute Tool", in ACM SIGCOMM, August 2003.

Z. Mao, R. Govindan, G. Varghese, and R.~H. Katz, "Route Flap Damping Exacerbates Internet Routing Convergence", in ACM SIGCOMM, Aug 2002.

Katz-Bassett, E.

H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.

E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.

Keromytis, A.

S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.

Keys, K.

C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a Better NetFlow", in ACM SIGCOMM, Sept 2004.

M. Fomenkov, K. Keys, D. Moore, and k. claffy, "Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites", Tech. rep., CAIDA, Apr 2003.

D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

Khan, L.

W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.

Khan, M.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Kifer, D.

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity.", in IEEE International Conference on Data Engineering (ICDE), 2006.

Kim, H.

H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.

Kim, M. Hong, J.

B. Park, Y. Won, and J. Kim, M.~Hong, "Towards Automated Application Signature Generation", in IEEE/IFIP Network Operations and Management Symposium (NOMS), Apr 2008.

King, R.

A. Broido, R. King, E. Nemeth, and k. claffy, "Radon Spectroscopy of Inter-Packet Delay", in IEEE High-Speeding Networking Workshop (HSN), March 2003.

Koga, R.

D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

Koukis, D.

D. Koukis, S. Antonatos, and K.G. Anagnostakis, "On the Privacy Risks of Publishing Anonymized IP Network Traces.", in Communications and Multimedia Security, 2006.

D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.

Kreibich, C.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. Voelker, "Unexpected Means of Protocol Inference", in ACM SIGCOMM IMC, Oct 2006.

Krishnamurthy, A.

H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.

E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.

Kulkarni, S.

M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, "Internet Host Geolocation Using Maximum Likelihood Estimation Technique", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Washington, DC, USA, 2010, pp. 422-429, IEEE Computer Society.

M.J. Arif, S. Karunasekera, and S. Kulkarni, "GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements", in Australasian Conference on Computer Science (ASCS), Darlinghurst, Australia, Australia, 2010, pp. 89-98, Australian Computer Society, Inc.

Kumar, V.

A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.

Kuzmanovic, A.

Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards Street-Level Client-Independent IP Geolocation", in Usenix, Mar 2011.

Labovitz, C.

C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence", in IEEE INFOCOM, Apr 2001, pp. 537-546.

C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "An Experimental Study of Internet Routing Convergence", Tech. Rep. MSR-TR-2000-08, Microsoft Research, 2000.

C. Labovitz, G.~R. Malan, and F. Jahanian, "Origins of Internet Routing Instability", in IEEE INFOCOM, Mar 1999.

C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Wide-Area Backbone Failures", Tech. Rep. CSE-TR-382-98, University of Michigan, 1998.

C. Labovitz, G.~R. Malan, and F. Jahanian, "Internet Routing Instability", IEEE/ACM Transactions on Networking, vol. 6, no. 5, pp. 515-528, 1998.

Lagache, E.

D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

Lakhina, A.

A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions", in ACM SIGCOMM 2005, Aug 2005.

A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, "On the geographic location of Internet resources", in Selected Areas in Communications, Volume 21, Aug 2003, pp. 934-948.

Laki, S.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.

S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.

Lakkaraju, K.

A. Slagell, K. Lakkaraju, and K. Luo, "FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs", in USENIX LISA, dec 2006.

Lazarevic, A.

A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.

Lee, J.

R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization", ACM SIGCOMM Computer Communication Review, 2006.

Lee, T.

T. Lee, B. Huffaker, M. Fomenkov, and k. claffy, "On the problem of optimization of DNS root servers' placement", in Passive and Active Measurement Conference (PAM), Mar 2003.

Levchenko, K.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. Voelker, "Unexpected Means of Protocol Inference", in ACM SIGCOMM IMC, Oct 2006.

Levitt, K.

R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.

M. Bishop, R. Crawford, B. Bhumiratana, L. Clark, and K. Levitt, "Some Problems in Sanitizing Network Data", in IEEE WETICE, 2006.

Li, N.

N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity", in IEEE International Conference on Data Engineering (ICDE), 2007.

Li, T.

N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity", in IEEE International Conference on Data Engineering (ICDE), 2007.

Li, Xing

Qianli Zhang and Xing Li, "An IP Address Anonymization Scheme with Multiple Access Levels", in ICOIN, 2006.

Li, Y.

K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.

Y. Li, Adam Slagell, K. Luo, and W. Yurcik, "CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security", in International Conference on Telecommunication Systems, Modeling and Analysis, nov 2005.

K. Luo, Y. Li, A. Slagell, and W. Yurcik, "CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing", in FLOCON - Network Flow Analysis Workshop, sep 2005.

Lincoln, P.

P. Lincoln, P. Porras, and V. Shmatikov, "Privacy-Preserving Sharing and Correlation of Security Alerts", in USENIX Security Symposium, 2004.

Lindh, T.

T. Lindh and N. Brownlee, "Integrating Active Methods and Flow Meters - an implementation using NeTraMet", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.

Liu, Y.

Y. Tian, R. Dey, Y. Liu, and K.W. Ross, "Topology mapping and geolocating for China's Internet", IEEE Trans. On Parallel and Distributed Systems, vol. 24, no. 9, pp. 1908-1917, Sep 2013.

C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.

Lorch, J.R.

S. Agarwal and J.R. Lorch, "Matchmaking for online games and other latency-sensitive P2P systems", Computer Communication Review, vol. 39, no. 4, pp. 315-326, Oct 2009.

Luckie, M.

K. Cho, M. Luckie, and B. Huffaker, "Identifying IPv6 Network Problems in the Dual-Stack World", in ACM SIGCOMM, Aug 2004.

Luo, K.

A. Slagell, K. Lakkaraju, and K. Luo, "FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs", in USENIX LISA, dec 2006.

K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.

Y. Li, Adam Slagell, K. Luo, and W. Yurcik, "CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security", in International Conference on Telecommunication Systems, Modeling and Analysis, nov 2005.

K. Luo, Y. Li, A. Slagell, and W. Yurcik, "CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing", in FLOCON - Network Flow Analysis Workshop, sep 2005.

Lyles, B.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Ma, J.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. Voelker, "Unexpected Means of Protocol Inference", in ACM SIGCOMM IMC, Oct 2006.

Machanavajjhala, A.

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity.", in IEEE International Conference on Data Engineering (ICDE), 2006.

Madhukar, A.

A. Madhukar and C. Williamson, "A Longitudinal Study of P2P Traffic Classification", in MASCOTS 2006, Sep 2006.

Madhyasth, H.V.

H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.

Maggs, B.

B. Eriksson, P. Barford, B. Maggs, and R. Nowak, "Posit: a lightweight approach for IP geolocation", ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 2, pp. 2-11, Sep 2012.

Magharei, N.

A. Rasti, N. Magharei, R. Rejaie, and W. Willinger, "Eyeball ASes: From Geography to Conectivity", in Internet Measurement Conference (IMC), Nov 2010, pp. 192-198.

Mahajan, R.

R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP Misconfiguration", in ACM SIGCOMM, 2002.

D. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP Topologies with Rocketfuel", in ACM SIGCOMM, Aug 2002.

Mahanti, A.

J. Erman, A. Mahanti, and M. Arlitt, "Internet Traffic Identification using Machine Learning", in IEEE GLOBECOM 2006, Nov 2006.

J. Erman, M. Arlitt, and A. Mahanti, "Traffic Classification Using Clustering Algorithms", in ACM SIGCOMM 2006, Aug 2006.

Maier, G.

G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On Dominant Characteristics of Residential Broadband Internet Traffic", in ACM SIGCOMM IMC, Nov 2009.

Malan, G. R.

C. Labovitz, G.~R. Malan, and F. Jahanian, "Origins of Internet Routing Instability", in IEEE INFOCOM, Mar 1999.

C. Labovitz, G.~R. Malan, and F. Jahanian, "Internet Routing Instability", IEEE/ACM Transactions on Networking, vol. 6, no. 5, pp. 515-528, 1998.

Malomsoky, S.

G. Szabo, D. Orincasy, S. Malomsoky, and I. Szabo, "On the Validation of Traffic Classification Algorithms", in Passive and Active Measurement Conference (PAM), Apr 2008.

Manhanti, A.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.

Manils, P.

C. Castelluccia, M.A. Kaafar, P. Manils, and D. Perito, "Geolocalization of proxied services and its application to fast-flux hidden servers", in IMC, 2009.

Mankin, A.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Mao, Z.

Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.

Z. Mao, J. Rexford, J. Wang, and R.~H. Katz, "Towards an Accurate AS-Level Traceroute Tool", in ACM SIGCOMM, August 2003.

Z. Mao, R. Govindan, G. Varghese, and R.~H. Katz, "Route Flap Damping Exacerbates Internet Routing Convergence", in ACM SIGCOMM, Aug 2002.

Mark, B. L.

I. Youn, B.~L. Mark, and D. Richards, "Statistical geolocation of Internet hosts", International Conference on Computer Communications and Networks (ICCCN), vol. 0, pp. 1-6, 2009.

Markatos, E.

D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.

Markatos, E.P.

D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.

Massey, D.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Masson, G.

C. Wright, F. Monrose, and G. Masson, "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", in Journal of Machine Learning Research 2006, Dec 2006.

Mathis, M.

M. Mathis, G. Huntoon, and k. claffy, "Traffic dynamics testbed", in Large Scale Networking (LSN) Workshop, Mar 2001.

Matray, P.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.

S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.

Matta, I.

A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, "On the geographic location of Internet resources", in Selected Areas in Communications, Volume 21, Aug 2003, pp. 934-948.

Mavrommatiss, P.

F. Constantinou and P. Mavrommatiss, "Identifying Known and Unknown Peer-to-Peer Traffic", in IEEE NCA 2006, Aug 2006.

Maziku, H.

H. Maziku, K. Shetty, S.~Han, and T. Rogers, "Enhancing the classification accuracy of IP geolocation", pp. 1-6, Oct 2012.

McCreary, S.

S. McCreary and k. claffy, "Trends in wide area IP traffic patterns - A view from Ames Internet Exchange", in ITC Specialist Seminar, Sep 2000.

k. claffy and S. McCreary, "Internet measurement and data analysis: passive and active measurement", in American Statistical Association, Aug 1999.

McGregor, A.

A. McGregor, M. Hall, Brunskill J., and Lorier P., "Flow Clustering Using Machine Learning Techniques", in Passive and Active Measurement Conference (PAM), Apr 2004.

McRobb, D.

k. claffy, T. Monk, and D. McRobb, "Internet Tomography", Jan 1999.

Mellia, M.

D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: when randomness plays with you", in ACM SIGCOMM 2007, Aug 2007.

Meo, M.

D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: when randomness plays with you", in ACM SIGCOMM 2007, Aug 2007.

Merwe, J.

J. Merwe, S. Sen, and C. Kalmanek, "Streaming Video Traffic: Characterization and Network Impact", in WCW 2002, Aug 2002.

Miklau, G.

B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.

Miller, G.

k. claffy, G. Miller, and K. Thompson, "The nature of the beast: Recent traffic measurements from an Internet backbone", in International Networking Conference (INET) '98, Jul 1998.

Minshall, G.

G. Minshall, "TCPdPriv" 2005.

Mitchell, D.

D. Mitchell, S. Bradner, and k. claffy, "In whose domain: name service in adolescence", Sept 1996.

Mitzenmacher, M.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.

Mogul, J.

J. Mogul and M. Arlitt, "SC2D: an alternative to trace anonymization", in ACM SIGCOMM MineNet, 2006.

Moll, D.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Molle, M.

T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, "A Nonstationary Poisson View of Internet Traffic", in IEEE INFOCOM. March 2004, IEEE INFOCOM.

Monk, T.

k. claffy, T. Monk, and D. McRobb, "Internet Tomography", Jan 1999.

k. claffy and T. Monk, "What's next for Internet data analysis? Status and challenges facing the community", Oct 1997.

T. Monk and k. claffy, "Internet data acquisition and analysis: Status and next steps", Tech. rep., CAIDA, Mar 1997.

T. Monk and k. claffy, "Cooperation in Internet data acquisition and analysis", Sept 1996.

T. Monk and k. claffy, "A survey of Internet statistics / metrics activities", Tech. rep., CAIDA, Jun 1996.

Monlnar, S.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer", in Systems and Computers in Japan 2008, Mar 2008.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Identification and Analysis of Peer-to-Peer Traffic", in Journal of Communications 2006, Mar 2006.

Monrose, F.

S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.

S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.

C. Wright, F. Monrose, and G. Masson, "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", in Journal of Machine Learning Research 2006, Dec 2006.

Moon, S.

J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", Computer Networks, 2004.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

J. Xu, J. Fan, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", IEEE International Conference on Network Protocols (ICNP), nov 2002.

J. Xu, J. Fan, M. Ammar, and S. Moon, "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization", in ACM SIGCOMM IMC, 2001.

Moore, A.

A. Moore, D. Zuev, and M. Crogan, "Discriminators for Use in Flow-based Classification", Tech. rep., Intel Research, Cambridge, 2005.

A. Moore and Zuev D., "Internet Traffic Classification Using Bayesian Analysis Techniques", in ACM SIGMETRICS 2005, Jun 2005.

A. Moore and K Papagiannaki, "Toward the Accurate Identification of Network Applications", in Passive and Active Measurement Conference (PAM), Mar 2001.

Moore, D.

C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a Better NetFlow", in ACM SIGCOMM, Sept 2004.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.

D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.

D. Moore, C. Shannon, G.~M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, San Francisco, CA, April 2003, IEEE INFOCOM.

M. Fomenkov, K. Keys, D. Moore, and k. claffy, "Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites", Tech. rep., CAIDA, Apr 2003.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop 2002, Nov 2002.

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov 2002, ACM SIGCOMM/USENIX Internet Measurement Workshop.

B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.

B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing", in Symposium on Applications and the Internet (SAINT), Jan 2002.

D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.

M. Fomenkov, k. claffy, B. Huffaker, and D. Moore, "Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers", in USENIX LISA, Dec 2001.

C. Shannon, D. Moore, and k. claffy, "Characteristics of Fragmented Traffic on Internet Links", in ACM SIGCOMM Internet Measurement Workshop 2001. Nov 2001, ACM SIGCOMM.

D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Aug 2001.

D. Moore, G.~M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Washington, D.C., Aug 2001.

C. Dovrolis, P. Ramanathan, and D. Moore, "Packet Dispersion Techniques and Capacity Estimation", July 2001.

C. Shannon, D. Moore, and k. claffy, "Characteristics of fragmented IP traffic on Internet links", in Passive and Active Measurement Conference (PAM), Amsterdam, Netherlands, Apr 2001, RIPE NCC.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

B. Huffaker, M. Fomenkov, D. Moore, and k. claffy, "Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance", in Passive and Active Measurement Conference (PAM), Apr 2001.

C. Dovrolis, P. Ramanathan, and D. Moore, "What do packet dispersion techniques measure?", in IEEE INFOCOM, Jan 2001.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET) '00, Jul 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) '00, July 2000.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET), Yokohama, Japan, 18-21 Jul 2000, The Internet Society.

Morris, R.

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, "Vivaldi: A Decentralized Network Coordinate System", in SIGCOMM, Portland, Oregon, Aug 2004.

Mortier, R.

G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Muir, J.

J. Muir and P.~C. van Oorschot, "Internet Geolocation: Evasion and Counterevasion", ACM Computing Surveys, vol. 42, no. 1, 2009.

Munzner, T.

T. Munzner, E. Hoffman, k. claffy, and B. Fenner, "Visualizing the global topology of the MBone", in IEEE Symposium on Information Visualization, Oct 1996.

Murai, J.

T. Asaba, k. claffy, O. Nakamura, and J. Murai, "An analysis of international academic research network traffic between Japan and other nations", in International Networking Conference (INET) '92, Jan 1992.

Murray, M.

C. Dovrolis, R. Prasad, M. Murray, and k. claffy, "Bandwidth estimation: metrics, measurement techniques, and tools", IEEE Network, Nov 2003.

M. Murray and k. claffy, "Measuring the Immeasurable: Global Internet Measurement Infrastructure", in Passive and Active Measurement Conference (PAM), Apr 2001.

N. Brownlee and M. Murray, "Streams, Flows and Torrents", in Passive and Active Measurement Conference (PAM), Apr 2001.

N. Brownlee, k. claffy, M. Murray, and E. Nemeth, "Methodology for passive analysis of a university Internet link", in Passive and Active Measurement Conference (PAM), Apr 2001.

Nakamura, O.

T. Asaba, k. claffy, O. Nakamura, and J. Murai, "An analysis of international academic research network traffic between Japan and other nations", in International Networking Conference (INET) '92, Jan 1992.

Nemeth, E.

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of Private DNS Update Sources", in IEEE Workshop on Internet Applications (WIAPP), June 2003.

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of DNS Update Traffic", in ACM SIGMETRICS 2003, June 2003.

A. Broido, R. King, E. Nemeth, and k. claffy, "Radon Spectroscopy of Inter-Packet Delay", in IEEE High-Speeding Networking Workshop (HSN), March 2003.

A. Broido, k. claffy, and E. Nemeth, "Internet Expansion, Refinement, and Churn", European Transactions on Telecommunications, Jan 2002.

N. Brownlee, k. claffy, and E. Nemeth, "DNS Root/gTLD Performance Measurements", in USENIX LISA, Dec 2001.

N. Brownlee, k. claffy, and E. Nemeth, "DNS Measurements at a Root Server", in IEEE GLOBECOM. Nov 2001, IEEE GLOBECOM.

N. Brownlee, k. claffy, M. Murray, and E. Nemeth, "Methodology for passive analysis of a university Internet link", in Passive and Active Measurement Conference (PAM), Apr 2001.

E. Nemeth, T. Ott, K. Thompson, and k. claffy, "The Internet Engineering Curriculum Repository", in International Networking Conference (INET) '00, Jul 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) '00, July 2000.

R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in Usenix LISA, Berkeley, CA, US, 1999, pp. 69-78, USENIX Association.

R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in USENIX LISA, Nov 1999.

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) 1999, June 1999.

B. Huffaker, k. claffy, and E. Nemeth, "Tools to visualize the Internet multicast backbone", in International Networking Conference (INET) '99, Jun 1999.

B. Huffaker, k. claffy, and E. Nemeth, "Tools to Visualize the Internet Multicast Backbone", in International Networking Conference (INET) 1999, June 1999.

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) '99, Jun 1999.

B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.

Neudorfer, L.

L. Neudorfer, Y. Shavitt, and N. Zilberman, "Improving AS relationship inference using PoPs", pp. 459-464, Apr 2013.

Newman, D.

D. Newman, "Internet Core Router Test" Mar 2001.

Ng, T. S. E.

T.~S.~E. Ng and H. Zhang, "Predicting Internet Network Distance with Coordinates-Based Approaches", in IEEE Conference on Computer Communications (INFOCOM), 2001, pp. 170-179.

Nguyen, T.

S. Zander, T. Nguyen, and G. Armitage, "Self-learning IP Traffic Classification based on Statistical Flow Characteristics", in Passive and Active Measurement Conference (PAM), Mar 2005.

Nicol, D. M.

D.~M. Nicol, S.~W. Smith, and M. Zhao, "Efficient Security for BGP Route Announcements", Tech. Rep. TR2003-440, Dartmouth College, Computer Science, Hanover, NH, May 2003.

Ning, P.

D. Xu and P. Ning, "A Flexible Approach to Intrusion Alert Anonymization and Correlation", Securecomm and Workshops, aug 2006.

NLANR

NLANR, "Redesign and extension of multi-agency interconnection point", Tech. rep., CAIDA, Jun 1992.

Norton, W. B.

W.~B. Norton, "The Evolution of the U.S. Internet Peering Ecosystem" 2004.

W.~B. Norton, "Internet Service Providers and Peering" 2001.

Nowak, R.

B. Eriksson, P. Barford, B. Maggs, and R. Nowak, "Posit: a lightweight approach for IP geolocation", ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 2, pp. 2-11, Sep 2012.

B. Eriksson, P. Barford, J. Sommers, and R. Nowak, "A Learning-Based Approach for IP Geolocation", in PAM, LNCS Volume 6032, Apr 2010, pp. 171-180.

O'Dell, M.

M. O'Dell, "GSE - An Alternate Addressing Architecture for IPv6" 1997.

Ohm, P.

D. Sicker, P. Ohm, and D. Grunwald, "Legal issues surrounding monitoring during network research", in ACM SIGCOMM IMC, 2007.

Olovsson, T.

W. John, S. Tafvelin, and T. Olovsson, "Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic", in Passive and Active Measurement Conference (PAM), Mar 2008.

Orincasy, D.

G. Szabo, D. Orincasy, S. Malomsoky, and I. Szabo, "On the Validation of Traffic Classification Algorithms", in Passive and Active Measurement Conference (PAM), Apr 2008.

G. Szabo, I. Szabo, and D. Orincasy, "Accurate Traffic Classification", in WoWMoM 2007, Jun 2007.

Orucevic, F.

A. Butkovic, F. Orucevic, and A. Tanovic, "Using Whois based geolocation and Google maps API for support cybercrime investigations", pp. 194-200, Jun 2013.

Oslebo, A.

T. Brekne, A. Arnes, and A. Oslebo, "Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.", in Privacy Enhancing Technologies, 2005.

Ott, T.

E. Nemeth, T. Ott, K. Thompson, and k. claffy, "The Internet Engineering Curriculum Repository", in International Networking Conference (INET) '00, Jul 2000.

Overlier, L.

L. Overlier, T. Brekne, and A. Arnes, "Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.", in CANS, 2005.

Ozgur, A.

A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.

P., Lorier

A. McGregor, M. Hall, Brunskill J., and Lorier P., "Flow Clustering Using Machine Learning Techniques", in Passive and Active Measurement Conference (PAM), Apr 2004.

Padhye, J.

J. Padhye and S. Floyd, "Identifying the TCP Behavior of Web Servers", in ACM SIGCOMM, 2001.

Padmanabhan, V. N.

V.~N. Padmanabhan and L. Subramanian, "An Investigation of Geographic Mapping Techniques for Internet Hosts", in SIGCOMM, New York, NY, USA, 2001, pp. 173-185, ACM.

Pang, J.

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting", in ACM MobiCom, 2007.

Pang, R.

R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization", ACM SIGCOMM Computer Communication Review, 2006.

R. Pang and V. Paxson, "A high-level programming environment for packet trace anonymization and transformation", in ACM SIGCOMM, 2003.

Papadopoulos, C.

G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, "Estimating P2P Traffic Volume at USC", Tech. rep., USC/Information Sciences Institute, 2007.

G. Bartlett, J. Heidemann, and C. Papadopoulos, "Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing", in IEEE Global Internet Symposium 2007, May 2007.

A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.

Papagiannaki, K

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC Multilevel Traffic Classification in the Dark", in ACM SIGCOMM 2005, Aug 2005.

A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.

Papagiannaki, K.

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC Multilevel Traffic Classification in the Dark", in ACM SIGCOMM 2005, Aug 2005.

A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.

Papgiannaki, K.

T. Karagiannis, K. Papgiannaki, N. Taft, and M. Faloutso, "Profiling the End Host", in Passive and Active Measurement Conference (PAM), Apr 2007.

Pappu, P.

M. Iliofotou, P. Pappu, and M. Faloutsos, "Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs", in Tech Report 2008, Jun 2008.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.

Park, B.

B. Park, Y. Won, and J. Kim, M.~Hong, "Towards Automated Application Signature Generation", in IEEE/IFIP Network Operations and Management Symposium (NOMS), Apr 2008.

Paxson, V.

G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On Dominant Characteristics of Residential Broadband Internet Traffic", in ACM SIGCOMM IMC, Nov 2009.

J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", in ACM Conference on Computer and Communications Security (CCS), 2007.

M. Allman and V. Paxson, "Issues and etiquette concerning use of shared measurement data", in ACM SIGCOMM IMC, 2007.

R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization", ACM SIGCOMM Computer Communication Review, 2006.

R. Pang and V. Paxson, "A high-level programming environment for packet trace anonymization and transformation", in ACM SIGCOMM, 2003.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.

V. Paxson, "End-to-end routing behavior in the Internet", IEEE/ACM Transactions on Networking, vol. 5, no. 5, pp. 601-615, 1997.

Pei, D.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Pepin, J.

G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, "Estimating P2P Traffic Volume at USC", Tech. rep., USC/Information Sciences Institute, 2007.

Percacci, R.

R. Percacci and A. Vespignani, "Scale-free behavior of the Internet global performance", European Physical Journal B, vol. 32, pp. 411-414, 2003.

Perenyi, M.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer", in Systems and Computers in Japan 2008, Mar 2008.

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Identification and Analysis of Peer-to-Peer Traffic", in Journal of Communications 2006, Mar 2006.

Perera, R.D.W.

Z. Dong, R.D.W. Perera, R. Chandramouli, and K.P. Subbalakshmi, "Network measurement based modeling and optimization for IP geolocation", Computer Networks, vol. 56, no. 1, pp. 85-98, Jan 2012.

Periakaruppan, R.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET) '00, Jul 2000.

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET), Yokohama, Japan, 18-21 Jul 2000, The Internet Society.

R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in Usenix LISA, Berkeley, CA, US, 1999, pp. 69-78, USENIX Association.

R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in USENIX LISA, Nov 1999.

Perito, D.

C. Castelluccia, M.A. Kaafar, P. Manils, and D. Perito, "Geolocalization of proxied services and its application to fast-flux hidden servers", in IMC, 2009.

Perrig, A.

J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", in ACM Conference on Computer and Communications Security (CCS), 2007.

Pescape, A.

A. Dainotti, W. de Donato, A. Pescape, and G. Ventre, "TIE: a Community-oriented Traffic Classification Platform", in International Workshop on Traffic Monitoring and Analysis (TMA), 2009.

A. Dainotti, W. de Donato, A. Pescape, and P. Salvo~Rossi, "Classification of Network Traffic via Packet-Level Hidden Markov Models", in IEEE GLOBECOM, 2008.

Petrovic, S.

V. Seeberg and S. Petrovic, "A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking", in ARES, 2007.

Pfitzmann, A.

A. Pfitzmann and M. Hansen, "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology" February 2008.

Pietrzyk, M.

M. Pietrzyk, J.-L. Costeux, G. Urvoy-Keller, and T. En-Najjary, "Challenging Statistical Classification for Operational Usage: the ADSL Case", in ACM SIGCOMM IMC, Nov 2009.

Plissonneau, L.

L. Plissonneau, J. Costeux, and P. Brown, "Analysis of Peer-to-Peer Traffic on ADSL", in Passive and Active Measurement Conference (PAM), Mar 2005.

Plummer, D.

B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing", in Symposium on Applications and the Internet (SAINT), Jan 2002.

Plummer, D. J.

B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.

Poese, I.

I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.

Poletto, M.

G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks based on Connection Patterns", in USENIX 2003, Jun 2003.

Polychronakis, M.

D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.

Polyzos, G.

k. claffy, H.-W. Braun, and G. Polyzos, "A parameterizable methodology for Internet traffic flow profiling", Mar 1995.

N. Groschwitz and G. Polyzos, "A Time-Series Model of Long-Term Traffic on the NSFNET Backbone", in IEEE International Conference on Communications (ICC), May 1994.

k. claffy, H.-W. Braun, and G. Polyzos, "Tracking long-term growth of the NSFNET", Mar 1994.

k. claffy, H.-W. Braun, and G. Polyzos, "Internet traffic flow profiling", Tech. rep., CAIDA, Mar 1994.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Measurement considerations for assessing unidirectional latencies", Sep 1993.

H.-W. Braun, k. claffy, and G. Polyzos, "A framework for flow-based accounting on the Internet", in IEEE Singapore International Conference on Networks'93 (SICON'93), Sep 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Application of sampling methodologies to wide-area network traffic characterization", in ACM SIGCOMM '93, May 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Long-term traffic aspects of the NSFNET", in International Networking Conference (INET) '93, May 1993.

k. claffy, H.-W. Braun, and G. Polyzos, "Traffic characteristics of the T1 NSFNET backbone", in IEEE INFOCOM, Jan 1993.

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1992.

Porras, P.

P. Porras and V. Shmatikov, "Large-scale collection and sanitization of network security data: risks and challenges", in New Security Paradigms Workshop (NSPW), 2006.

P. Lincoln, P. Porras, and V. Shmatikov, "Privacy-Preserving Sharing and Correlation of Security Alerts", in USENIX Security Symposium, 2004.

Pradkin, Y.

Z. Hu, J. Heidemann, and Y. Pradkin, "Towards geolocation of millions of IP addresses", pp. 123-130, Nov 2012.

Prasad, R.

C. Dovrolis, R. Prasad, M. Murray, and k. claffy, "Bandwidth estimation: metrics, measurement techniques, and tools", IEEE Network, Nov 2003.

Preneel, B.

C. Diaz, B. Seys, J. Claessenss, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, 2002.

Pryadkin, Y.

A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.

Rajvaidya, P.

P. Rajvaidya, K. Almeroth, and k. claffy, "A scalable architecture for monitoring and visualizing multicast statistics", in Distributed Systems: Operations and Management, Dec 2000.

Ramanathan, P.

C. Dovrolis, P. Ramanathan, and D. Moore, "Packet Dispersion Techniques and Capacity Estimation", July 2001.

C. Dovrolis, P. Ramanathan, and D. Moore, "What do packet dispersion techniques measure?", in IEEE INFOCOM, Jan 2001.

Ramaswamy, R.

R. Ramaswamy and T. Wolf, "High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems", IEEE/ACM Transactions on Networking, jan 2007.

Rasti, A.

A. Rasti, N. Magharei, R. Rejaie, and W. Willinger, "Eyeball ASes: From Geography to Conectivity", in Internet Measurement Conference (IMC), Nov 2010, pp. 192-198.

Reiter, M.

S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.

M. Collins and M. Reiter, "Hit-list worm detection and bot identification in large networks using protocol graphs", in RAID 2007, Sep 2007.

S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.

Rejaie, R.

A. Rasti, N. Magharei, R. Rejaie, and W. Willinger, "Eyeball ASes: From Geography to Conectivity", in Internet Measurement Conference (IMC), Nov 2010, pp. 192-198.

Rekhter, Y.

H.-W. Braun, P. Ford, and Y. Rekhter, "CIDR and the evolution of the Internet", in International Networking Conference (INET) '93, May 1993.

Y. Rekhter and B. Chinoy, "Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis", Jan 1992.

Rexford, J.

Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.

Z. Mao, J. Rexford, J. Wang, and R.~H. Katz, "Towards an Accurate AS-Level Traceroute Tool", in ACM SIGCOMM, August 2003.

J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP Routing Stability of Popular Destinations", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet Hierarchy from Multiple Vantage Points", in IEEE INFOCOM, Jun 2002.

Ribeiro, B.

B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.

Richards, D.

I. Youn, B.~L. Mark, and D. Richards, "Statistical geolocation of Internet hosts", International Conference on Computer Communications and Networks (ICCCN), vol. 0, pp. 1-6, 2009.

Ristic, B.

M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, "Internet Host Geolocation Using Maximum Likelihood Estimation Technique", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Washington, DC, USA, 2010, pp. 422-429, IEEE Computer Society.

Ristuccia, C. A.

E. Giovannetti and C.~A. Ristuccia, "Estimating Market Power in the Internet Backbone Using Band-X data" June 2003.

Rockell, R.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Roesch, M.

M. Roesch, "Snort Lightweight Intrusion Detection for Networks", in USENIX LISA 1999, Nov 1999.

Rogers, T.

H. Maziku, K. Shetty, S.~Han, and T. Rogers, "Enhancing the classification accuracy of IP geolocation", pp. 1-6, Oct 2012.

Ross, K.W.

Y. Tian, R. Dey, Y. Liu, and K.W. Ross, "Topology mapping and geolocating for China's Internet", IEEE Trans. On Parallel and Distributed Systems, vol. 24, no. 9, pp. 1908-1917, Sep 2013.

Rossi, D.

D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: when randomness plays with you", in ACM SIGCOMM 2007, Aug 2007.

Roughan, S.

S. Roughan, O. Sen, and N. Duffield, "Class-of-service Mapping for QoS", in ACM SIGCOMM IMC, Oct 2004.

Sadok, D.

P.T. Endo and D. Sadok, "Whois based geolocation: A strategy to geolocate Internet hosts", pp. 408-413, Apr 2010.

Salamatian, K.

L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.

L. Bernaille, R. Teixeira, and K. Salamatian, "Early Application Identification", in ACM CoNEXT 2006, Jul 2006.

L. Bernaille, A. Soule, M. Jeannin, and K. Salamatian, "Blind Application Recognition Through Behavioral Classification", Tech. rep., Paris 2005, 2005.

A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.

Salgarelli, L.

M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, "Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting", in Computer Networks 2008, Sep 2008.

M. Dusi, F. Gringoli, and L. Salgarelli, "A Preliminary Look at the Privacy of SSH Tunnels", in IEEE International Conference on Communications (ICC) 2008, May 2008.

M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting", in ACM SIGCOMM 2007, Aug 2007.

Salo, T.

B. Chinoy and T. Salo, "Internet Exchanges: Policy-Driven Evolution", in Coordination and Administration of the Internet Workshop, Sep 1996.

Salvo Rossi, P.

A. Dainotti, W. de Donato, A. Pescape, and P. Salvo~Rossi, "Classification of Network Traffic via Packet-Level Hidden Markov Models", in IEEE GLOBECOM, 2008.

Samarati, P.

P. Samarati and L. Sweeney, "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Tech. rep., Computer Science Laboratory, (SRI) International, 1998.

Savage, S.

J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", in ACM Conference on Computer and Communications Security (CCS), 2007.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. Voelker, "Unexpected Means of Protocol Inference", in ACM SIGCOMM IMC, Oct 2006.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.

C. Estan, S. Savage, and G. Vargheses, "Automatically Inferring Patterns of Resources Consumption in Network Traffic", in ACM SIGCOMM 2003, Aug 2003.

D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.

D. Moore, C. Shannon, G.~M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, San Francisco, CA, April 2003, IEEE INFOCOM.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.

D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Aug 2001.

D. Moore, G.~M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Washington, D.C., Aug 2001.

Schonwalder, J.

M. Harvan and J. Schonwalder, "Prefix- and Lexicographical-order-preserving IP Address Anonymization", IEEE/IFIP Network Operations and Management Symposium (NOMS), 2006.

Sebok, T.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.

Seeberg, V.

V. Seeberg and S. Petrovic, "A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking", in ARES, 2007.

Seely, T.

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Sen, O.

S. Roughan, O. Sen, and N. Duffield, "Class-of-service Mapping for QoS", in ACM SIGCOMM IMC, Oct 2004.

Sen, S.

P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "Acas: Automated Construction of Application Signatures", in ACM SIGCOMM 2005, Aug 2005.

S. Sen and J. Wang, "Analyzing Peer-to-Peer Traffic across Large Networks", in IEEE/ACM Transactions on Networking 2004, Oct 2004.

S. Sen, O. Spatscheck, and D. Wang, "Accurate Scalable In-Network Identification of P2P Traffic", in World Wide Web (WWW) Conference, May 2004.

J. Merwe, S. Sen, and C. Kalmanek, "Streaming Video Traffic: Characterization and Network Impact", in WCW 2002, Aug 2002.

Serjantov, A.

A. Serjantov and G. Danezis, "Towards an Information Theoretic Metric for Anonymity", in Privacy Enhancing Technologies, 2002.

Seshan, S.

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting", in ACM MobiCom, 2007.

Seys, B.

C. Diaz, B. Seys, J. Claessenss, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, 2002.

Shannon, C.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.

D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.

D. Moore, C. Shannon, G.~M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, San Francisco, CA, April 2003, IEEE INFOCOM.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop 2002, Nov 2002.

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov 2002, ACM SIGCOMM/USENIX Internet Measurement Workshop.

C. Shannon, D. Moore, and k. claffy, "Characteristics of Fragmented Traffic on Internet Links", in ACM SIGCOMM Internet Measurement Workshop 2001. Nov 2001, ACM SIGCOMM.

C. Shannon, D. Moore, and k. claffy, "Characteristics of fragmented IP traffic on Internet links", in Passive and Active Measurement Conference (PAM), Amsterdam, Netherlands, Apr 2001, RIPE NCC.

Shavitt, Y.

L. Neudorfer, Y. Shavitt, and N. Zilberman, "Improving AS relationship inference using PoPs", pp. 459-464, Apr 2013.

D. Feldman, Y. Shavitt, and N. Zilberman, "A structural approach for PoP geo-location", Computer Networks, vol. 56, no. 3, pp. 1029-1040, Feb 2012.

Y. Shavitt and N. Zilberman, "A Study of Geolocation Databases", arXiv cs.NI/1005.5674v3, May 2010.

Shen, W.

C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.

Shetty, S. Han, K.

H. Maziku, K. Shetty, S.~Han, and T. Rogers, "Enhancing the classification accuracy of IP geolocation", pp. 1-6, Oct 2012.

Shmatikov, V.

P. Porras and V. Shmatikov, "Large-scale collection and sanitization of network security data: risks and challenges", in New Security Paradigms Workshop (NSPW), 2006.

P. Lincoln, P. Porras, and V. Shmatikov, "Privacy-Preserving Sharing and Correlation of Security Alerts", in USENIX Security Symposium, 2004.

Sicker, D.

D. Sicker, P. Ohm, and D. Grunwald, "Legal issues surrounding monitoring during network research", in ACM SIGCOMM IMC, 2007.

Siganos, G.

G. Siganos and M. Faloutsos, "Analyzing BGP Policies: Methodology and Tool", in IEEE INFOCOM, March 2004.

Singh, S.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.

Siwpersad, S. S.

S.~S. Siwpersad, B. Gueye, and S. Uhlig, "Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2008, pp. 11-20, Springer-Verlag.

Slagell, A.

A. Slagell, K. Lakkaraju, and K. Luo, "FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs", in USENIX LISA, dec 2006.

K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.

A. Slagell and W. Yurcik, "Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization", Security and Privacy for Emerging Areas in Communication Networks, sep 2005.

K. Luo, Y. Li, A. Slagell, and W. Yurcik, "CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing", in FLOCON - Network Flow Analysis Workshop, sep 2005.

Slagell, Adam

Y. Li, Adam Slagell, K. Luo, and W. Yurcik, "CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security", in International Conference on Telecommunication Systems, Modeling and Analysis, nov 2005.

Smith, S. W.

D.~M. Nicol, S.~W. Smith, and M. Zhao, "Efficient Security for BGP Route Announcements", Tech. Rep. TR2003-440, Dartmouth College, Computer Science, Hanover, NH, May 2003.

Sommers, J.

B. Eriksson, P. Barford, J. Sommers, and R. Nowak, "A Learning-Based Approach for IP Geolocation", in PAM, LNCS Volume 6032, Apr 2010, pp. 171-180.

Soule, A.

L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.

L. Bernaille, A. Soule, M. Jeannin, and K. Salamatian, "Blind Application Recognition Through Behavioral Classification", Tech. rep., Paris 2005, 2005.

A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.

Spatscheck, O.

P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "Acas: Automated Construction of Application Signatures", in ACM SIGCOMM 2005, Aug 2005.

S. Sen, O. Spatscheck, and D. Wang, "Accurate Scalable In-Network Identification of P2P Traffic", in World Wide Web (WWW) Conference, May 2004.

Spring, D.

D. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP Topologies with Rocketfuel", in ACM SIGCOMM, Aug 2002.

Srinivasan, V.

C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence", in IEEE INFOCOM, Apr 2001, pp. 537-546.

Srirvastava, J.

A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.

Staniford, S.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.

Stoyanov, I.

B. Wong, I. Stoyanov, and E. Gun~Sirer, "Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts", in Symposium on Networked System Design and Implementation (NSDI), Cambridge, MA, USA, Apr 2007.

Subbalakshmi, K.P.

Z. Dong, R.D.W. Perera, R. Chandramouli, and K.P. Subbalakshmi, "Network measurement based modeling and optimization for IP geolocation", Computer Networks, vol. 56, no. 1, pp. 85-98, Jan 2012.

Subramanian, L.

L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet Hierarchy from Multiple Vantage Points", in IEEE INFOCOM, Jun 2002.

V.~N. Padmanabhan and L. Subramanian, "An Investigation of Geographic Mapping Techniques for Internet Hosts", in SIGCOMM, New York, NY, USA, 2001, pp. 173-185, ACM.

Sweeney, L.

P. Samarati and L. Sweeney, "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Tech. rep., Computer Science Laboratory, (SRI) International, 1998.

Szabo, G.

G. Szabo, D. Orincasy, S. Malomsoky, and I. Szabo, "On the Validation of Traffic Classification Algorithms", in Passive and Active Measurement Conference (PAM), Apr 2008.

G. Szabo, I. Szabo, and D. Orincasy, "Accurate Traffic Classification", in WoWMoM 2007, Jun 2007.

Szabo, I.

G. Szabo, D. Orincasy, S. Malomsoky, and I. Szabo, "On the Validation of Traffic Classification Algorithms", in Passive and Active Measurement Conference (PAM), Apr 2008.

G. Szabo, I. Szabo, and D. Orincasy, "Accurate Traffic Classification", in WoWMoM 2007, Jun 2007.

T., Nguyen

Nguyen T. and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning", in IEEE Communications Surveys and Tutorials 2008, Oct 2008.

Taft, N.

T. Karagiannis, K. Papgiannaki, N. Taft, and M. Faloutso, "Profiling the End Host", in Passive and Active Measurement Conference (PAM), Apr 2007.

A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.

Tafvelin, S.

W. John and S. Tafvelin, "Heuristics to Classify Internet Backbone Traffic based on Connection Patterns", in International Conference on Information Networking (ICOIN), Sept 2008.

W. John, S. Tafvelin, and T. Olovsson, "Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic", in Passive and Active Measurement Conference (PAM), Mar 2008.

W. John and S. Tafvelin, "Analysis of Internet Backbone Traffic and Header Anomalies Observed", in ACM SIGCOMM IMC, Oct 2007.

Tan, G.

G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks based on Connection Patterns", in USENIX 2003, Jun 2003.

Tang, L.

L. Tang and M. Crovella, "Virtual Landmarks for the Internet", in Internet Measurement Conference (IMC), Oct 2003, pp. 143-152.

Tanovic, A.

A. Butkovic, F. Orucevic, and A. Tanovic, "Using Whois based geolocation and Google maps API for support cybercrime investigations", pp. 194-200, Jun 2013.

Teixeira, R.

L. Bernaille and R. Teixeira, "Early Recognition of Encrypted Application", in Passive and Active Measurement Conference (PAM), Apr 2007.

L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.

L. Bernaille, R. Teixeira, and K. Salamatian, "Early Application Identification", in ACM CoNEXT 2006, Jul 2006.

Tesch, M.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

Thompson, K.

E. Nemeth, T. Ott, K. Thompson, and k. claffy, "The Internet Engineering Curriculum Repository", in International Networking Conference (INET) '00, Jul 2000.

k. claffy, G. Miller, and K. Thompson, "The nature of the beast: Recent traffic measurements from an Internet backbone", in International Networking Conference (INET) '98, Jul 1998.

Thuraisingham, B.

W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.

Tian, Y.

Y. Tian, R. Dey, Y. Liu, and K.W. Ross, "Topology mapping and geolocating for China's Internet", IEEE Trans. On Parallel and Distributed Systems, vol. 24, no. 9, pp. 1908-1917, Sep 2013.

Tofanelli, P.

D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: when randomness plays with you", in ACM SIGCOMM 2007, Aug 2007.

Towsley, D.

B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.

Trimintzios, P.

D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.

Tsitsiklis, J.

R. Johari and J. Tsitsiklis, "Routing and Peering in a Competitive Internet" January 2003.

Ubik, S.

S. Ubik, P. Zejdl, and J. Halak, "Real-time anonymization in passive network monitoring", in International Conference on Networking and Services (ICNS), 2007.

D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.

Uhlig, S.

I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.

S.~S. Siwpersad, B. Gueye, and S. Uhlig, "Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2008, pp. 11-20, Springer-Verlag.

B. Gueye, S. Uhlig, and S. Fdida, "Investigating the Imprecision of IP Block-based Geolocation", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2007, pp. 237-240, Springer-Verlag.

B. Gueye, S. Uhlig, A. Ziviani, and S. Fdida, "Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts" 2006.

Uijterwaal, H.

H. Uijterwaal, "First analysis of the Beacon data" Nov 2002.

Urvoy-Keller, G.

M. Pietrzyk, J.-L. Costeux, G. Urvoy-Keller, and T. En-Najjary, "Challenging Statistical Classification for Operational Usage: the ADSL Case", in ACM SIGCOMM IMC, Nov 2009.

van der Pol, R.

P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.

van Oorschot, P. C.

J. Muir and P.~C. van Oorschot, "Internet Geolocation: Evasion and Counterevasion", ACM Computing Surveys, vol. 42, no. 1, 2009.

Varghese, G.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.

C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a Better NetFlow", in ACM SIGCOMM, Sept 2004.

Z. Mao, R. Govindan, G. Varghese, and R.~H. Katz, "Route Flap Damping Exacerbates Internet Routing Convergence", in ACM SIGCOMM, Aug 2002.

Vargheses, G.

C. Estan, S. Savage, and G. Vargheses, "Automatically Inferring Patterns of Resources Consumption in Network Traffic", in ACM SIGCOMM 2003, Aug 2003.

Vattay, G.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.

S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.

Venkataramani, A.

H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.

Venkatasubramanian, S.

N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity", in IEEE International Conference on Data Engineering (ICDE), 2007.

Venkitasubramaniam, M.

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity.", in IEEE International Conference on Data Engineering (ICDE), 2006.

Ventre, G.

A. Dainotti, W. de Donato, A. Pescape, and G. Ventre, "TIE: a Community-oriented Traffic Classification Platform", in International Workshop on Traffic Monitoring and Analysis (TMA), 2009.

Verkaik, P.

P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.

Vespignani, A.

R. Percacci and A. Vespignani, "Scale-free behavior of the Internet global performance", European Physical Journal B, vol. 32, pp. 411-414, 2003.

Vixie, P.

C. Davis, P. Vixie, T. Goodwin, and I. Dickinson, "A Means for Expressing Location Information in the Domain Name System", RFC Editor, 1996.

Voelker, G.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. Voelker, "Unexpected Means of Protocol Inference", in ACM SIGCOMM IMC, Oct 2006.

D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.

D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Aug 2001.

Voelker, G. M.

D. Moore, C. Shannon, G.~M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, San Francisco, CA, April 2003, IEEE INFOCOM.

D. Moore, G.~M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Washington, D.C., Aug 2001.

Vutukuru, M.

M.~J. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic Locality of IP Prefixes", in Internet Measurement Conference (IMC), Berkeley, CA, USA, 2005, p. 13, USENIX Association.

W., Chang Feng

Chang~Feng W., Chang F., Chi~Feng W., and Walpole J., "A Traffic Characterization of Popular on-line Games", in IEEE/ACM Transactions on Networking 2005, Oct 2005.

W., Chi Feng

Chang~Feng W., Chang F., Chi~Feng W., and Walpole J., "A Traffic Characterization of Popular on-line Games", in IEEE/ACM Transactions on Networking 2005, Oct 2005.

Wang, D.

P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "Acas: Automated Construction of Application Signatures", in ACM SIGCOMM 2005, Aug 2005.

S. Sen, O. Spatscheck, and D. Wang, "Accurate Scalable In-Network Identification of P2P Traffic", in World Wide Web (WWW) Conference, May 2004.

Wang, H.J.

C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.

Wang, J.

S. Sen and J. Wang, "Analyzing Peer-to-Peer Traffic across Large Networks", in IEEE/ACM Transactions on Networking 2004, Oct 2004.

Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.

Z. Mao, J. Rexford, J. Wang, and R.~H. Katz, "Towards an Accurate AS-Level Traceroute Tool", in ACM SIGCOMM, August 2003.

J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP Routing Stability of Popular Destinations", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Wang, L.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Wang, Y.

Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards Street-Level Client-Independent IP Geolocation", in Usenix, Mar 2011.

Wattenhofer, R.

C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence", in IEEE INFOCOM, Apr 2001, pp. 537-546.

Weaver, N.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.

Wessels, D.

D. Wessels, M. Fomenkov, N. Brownlee, and k. claffy, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

D. Wessels, M. Fomenkov, and k. claffy, "Wow, That's a lot of packets", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.

B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.

Huffaker B., J. Jung, D. Wessels, and k. claffy, "Visualization of the Growth and Topology of the NLANR Caching Hierarchy", in International WWW Caching Workshop 1998, June 1998.

D. Wessels and k. claffy, "ICP and the Squid web cache", Mar 1998.

D. Wessels and k. claffy, "RFC 2187: Application of Internet Cache Protocol (ICP), version 2" Sept 1997.

D. Wessels and k. claffy, "RFC 2186: Internet Cache Protocol (ICP), version 2" Sept 1997.

D. Wessels and k. claffy, "Evolution of the NLANR cache hierarchy: Global configuration challenges", Tech. rep., CAIDA, Nov 1996.

D. Wessels and k. claffy, "Can WWW caches help to save the Internet?", in Coordination and Administration of the Internet Workshop, Sep 1996.

Wetherall, D.

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting", in ACM MobiCom, 2007.

E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.

R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP Misconfiguration", in ACM SIGCOMM, 2002.

D. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP Topologies with Rocketfuel", in ACM SIGCOMM, Aug 2002.

Wichmann, A.

C. Dewes, A. Wichmann, and A. Feldmann, "An Analysis of Internet Chat Systems", in ACM SIGCOMM 2003, Aug 2003.

Wilfong, G.

T. Griffin and G. Wilfong, "Analysis of the MED Oscillation Problem in BGP", in IEEE International Conference on Network Protocols (ICNP), 2002.

T. Griffin and G. Wilfong, "On the Correctness of IBGP Configuration", in ACM SIGCOMM, 2002.

Williams, N.

N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification", in ACM SIGCOMM 2006, Aug 2006.

Williamson, C.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.

A. Madhukar and C. Williamson, "A Longitudinal Study of P2P Traffic Classification", in MASCOTS 2006, Sep 2006.

Willinger, W.

A. Rasti, N. Magharei, R. Rejaie, and W. Willinger, "Eyeball ASes: From Geography to Conectivity", in Internet Measurement Conference (IMC), Nov 2010, pp. 192-198.

H. Chang, S. Jamin, and W. Willinger, "Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach", in ACM SIGCOMM Workshop on MoMeTools, August 2003.

Wolf, T.

R. Ramaswamy and T. Wolf, "High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems", IEEE/ACM Transactions on Networking, jan 2007.

Wolff, S.

R. Bohn, H.-W. Braun, k. claffy, and S. Wolff, "Mitigating the coming Internet crunch: multiple service levels via Precedence", Tech. rep., CAIDA, Nov 1994.

Won, Y.

B. Park, Y. Won, and J. Kim, M.~Hong, "Towards Automated Application Signature Generation", in IEEE/IFIP Network Operations and Management Symposium (NOMS), Apr 2008.

Wong, B.

P. Gill, Y. Ganjali, and B. Wong, "Dude, where's that IP? Circumventing measurement-based IP geolocation", in Usenix Security Symposium, Aug 2010.

B. Wong, I. Stoyanov, and E. Gun~Sirer, "Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts", in Symposium on Networked System Design and Implementation (NSDI), Cambridge, MA, USA, Apr 2007.

Woolam, C.

W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.

Workshop, NSF

NSF Workshop, "Report of NSF Workshop on Network Research Testbeds" Oct 2002.

Wright, C.

S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.

S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.

C. Wright, F. Monrose, and G. Masson, "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", in Journal of Machine Learning Research 2006, Dec 2006.

Wu, S.

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Wu, S. F.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Xiao, Z.

J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP Routing Stability of Popular Destinations", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Xiong, H.

B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking", in ACM Conference on Computer and Communications Security (CCS), 2007.

Xu, D.

D. Xu and P. Ning, "A Flexible Approach to Intrusion Alert Anonymization and Correlation", Securecomm and Workshops, aug 2006.

Xu, J.

J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", Computer Networks, 2004.

J. Xu, J. Fan, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", IEEE International Conference on Network Protocols (ICNP), nov 2002.

J. Xu, J. Fan, M. Ammar, and S. Moon, "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization", in ACM SIGCOMM IMC, 2001.

Xu, K.

K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications", in ACM SIGCOMM 2005, Aug 2004.

Ylonen, T.

T. Ylonen, "Thoughts on how to mount an attack on tcpdpriv's '-a50' option" 2005.

Youn, I.

I. Youn, B.~L. Mark, and D. Richards, "Statistical geolocation of Internet hosts", International Conference on Computer Communications and Networks (ICCCN), vol. 0, pp. 1-6, 2009.

Yu, P.S.

C.C. Aggarwal and P.S. Yu, "On Anonymization of String Data", in SDM, 2007.

Yu, Q.

C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.

Yurcik, W.

W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.

J. Zhang, N. Borisov, and W. Yurcik, "Outsourcing Security Analysis with Anonymized Logs", Securecomm and Workshops, aug 2006.

K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.

Y. Li, Adam Slagell, K. Luo, and W. Yurcik, "CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security", in International Conference on Telecommunication Systems, Modeling and Analysis, nov 2005.

A. Slagell and W. Yurcik, "Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization", Security and Privacy for Emerging Areas in Communication Networks, sep 2005.

K. Luo, Y. Li, A. Slagell, and W. Yurcik, "CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing", in FLOCON - Network Flow Analysis Workshop, sep 2005.

Zander, S.

N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification", in ACM SIGCOMM 2006, Aug 2006.

S. Zander, T. Nguyen, and G. Armitage, "Self-learning IP Traffic Classification based on Statistical Flow Characteristics", in Passive and Active Measurement Conference (PAM), Mar 2005.

Zejdl, P.

S. Ubik, P. Zejdl, and J. Halak, "Real-time anonymization in passive network monitoring", in International Conference on Networking and Services (ICNS), 2007.

Zhang, H.

T.~S.~E. Ng and H. Zhang, "Predicting Internet Network Distance with Coordinates-Based Approaches", in IEEE Conference on Computer Communications (INFOCOM), 2001, pp. 170-179.

Zhang, J.

J. Zhang, N. Borisov, and W. Yurcik, "Outsourcing Security Analysis with Anonymized Logs", Securecomm and Workshops, aug 2006.

Zhang, L.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Zhang, Qianli

Qianli Zhang and Xing Li, "An IP Address Anonymization Scheme with Multiple Access Levels", in ICOIN, 2006.

Zhang, Y.

C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.

J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP Routing Stability of Popular Destinations", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Zhang, Z.

K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications", in ACM SIGCOMM 2005, Aug 2004.

Zhao, M.

D.~M. Nicol, S.~W. Smith, and M. Zhao, "Efficient Security for BGP Route Announcements", Tech. Rep. TR2003-440, Dartmouth College, Computer Science, Hanover, NH, May 2003.

Zhao, X.

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Zheleva, E.

E. Zheleva and L. Getoor, "Preserving the Privacy of Sensitive Relationships in Graph Data", in ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD), 2007.

Ziedins, I.

N. Brownlee and I. Ziedins, "Response time distributions for global name servers", in Passive and Active Measurement Conference (PAM) 2002, Mar 2002.

Zilberman, N.

L. Neudorfer, Y. Shavitt, and N. Zilberman, "Improving AS relationship inference using PoPs", pp. 459-464, Apr 2013.

D. Feldman, Y. Shavitt, and N. Zilberman, "A structural approach for PoP geo-location", Computer Networks, vol. 56, no. 3, pp. 1029-1040, Feb 2012.

Y. Shavitt and N. Zilberman, "A Study of Geolocation Databases", arXiv cs.NI/1005.5674v3, May 2010.

Ziviani, A.

B. Gueye, S. Uhlig, A. Ziviani, and S. Fdida, "Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts" 2006.

A. Ziviani, S. Fdida, J.~F. de Rezende, and O.~C. M.~B. Duarte, "Improving the accuracy of measurement-based geographic location of internet hosts", Computer Networks and ISDN Systems, vol. 47, no. 4, pp. 503-523, 2005.

A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.

B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based Geolocation of Internet Hosts", IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 288-293, 2004.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Demographic placement for Internet host location", in GLOBECOM, Dec 2003.

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Similarity models for Internet host location", in ICON, Sep 2003.

Zuev, D.

A. Moore, D. Zuev, and M. Crogan, "Discriminators for Use in Flow-based Classification", Tech. rep., Intel Research, Cambridge, 2005.

  Last Modified: Mon Jan-12-2015 11:32:17 PST
  Page URL: http://www.caida.org/publications/bib/networking/byauthor/byauthor_full.xml