Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
Annotated Bibliography of Networking Papers

An annotated bibliography of papers and presentations in the wide-area networking literature.

This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers.

Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.

|   View By:    date    author    topic    publication   |
|   Citation Format:    abbreviated    complete   |

A., Moore

YearAuthor(s)TitlePublication
2005
Zuev D.
Moore A.
Traffic Classification using a Statistical ApproachPassive and Active Measurement Conference (PAM)

Afek, Y.

YearAuthor(s)TitlePublication
2002
Y. Afek
O. Ben-Shalom
A. Bremler-Barr
On the Structure and Application of BGP Policy AtomsACM SIGCOMM Internet Measurement Workshop
1999
Y. Afek
A. Bremler-Barr
S. Har-Peled
Routing with a ClueACM SIGCOMM

Agarwal, S.

YearAuthor(s)TitlePublication
2009
S. Agarwal
J.R. Lorch
Matchmaking for online games and other latency-sensitive P2P systemsComputer Communication Review
2002
L. Subramanian
S. Agarwal
J. Rexford
R. Katz
Characterizing the Internet Hierarchy from Multiple Vantage PointsIEEE INFOCOM

Aggarwal, C.C.

YearAuthor(s)TitlePublication
2007
C.C. Aggarwal
P.S. Yu
On Anonymization of String DataSDM

Ahuja, A.

YearAuthor(s)TitlePublication
2001
C. Labovitz
A. Ahuja
R. Wattenhofer
V. Srinivasan
The Impact of Internet Policy and Topology on Delayed Routing ConvergenceIEEE INFOCOM
2000
C. Labovitz
A. Ahuja
A. Bose
F. Jahanian
An Experimental Study of Internet Routing ConvergenceMicrosoft Research
1998
C. Labovitz
A. Ahuja
F. Jahanian
Experimental Study of Internet Stability and Wide-Area Backbone FailuresUniversity of Michigan

Aiken, B.

YearAuthor(s)TitlePublication
1993
B. Aiken
H.-W. Braun
P. Ford
NSF implementation plan for interim NRENJournal on High Speed Networking

Akodjenou, .

YearAuthor(s)TitlePublication
2006
L. Bernaille
R. Teixeira
. Akodjenou
A. Soule
K. Salamatian
Traffic Classification on the flyACM SIGCOMM Computer Communication Review

Allman, M.

YearAuthor(s)TitlePublication
2009
G. Maier
A. Feldmann
V. Paxson
M. Allman
On Dominant Characteristics of Residential Broadband Internet TrafficACM SIGCOMM IMC
2007
M. Allman
V. Paxson
Issues and etiquette concerning use of shared measurement dataACM SIGCOMM IMC
2006
R. Pang
M. Allman
V. Paxson
J. Lee
The devil and packet trace anonymizationACM SIGCOMM Computer Communication Review

Almeroth, K.

YearAuthor(s)TitlePublication
2000
P. Rajvaidya
K. Almeroth
k. claffy
A scalable architecture for monitoring and visualizing multicast statisticsDistributed Systems: Operations and Management

Alrabady, A.

YearAuthor(s)TitlePublication
2007
B. Hoh
M. Gruteser
H. Xiong
A. Alrabady
Preserving privacy in gps traces via uncertainty-aware path cloakingACM Conference on Computer and Communications Security (CCS)

Alvarez-Hamelin, J.

YearAuthor(s)TitlePublication
2008
M. Beiro
J. Alvarez-Hamelin
J. Busch
A low complexity visualization tool that helps to perform complex systems analysisNew Journal of Physics

Ammar, M.

YearAuthor(s)TitlePublication
2004
J. Fan
J. Xu
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeComputer Networks
2002
J. Xu
J. Fan
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeIEEE International Conference on Network Protocols (ICNP)
2001
J. Xu
J. Fan
M. Ammar
S. Moon
On the Design and Performance of Prefix-Preserving IP Traffic Trace AnonymizationACM SIGCOMM IMC

Anagnostakis, K.G.

YearAuthor(s)TitlePublication
2006
D. Koukis
S. Antonatos
K.G. Anagnostakis
On the Privacy Risks of Publishing Anonymized IP Network Traces.Communications and Multimedia Security

Andersen, D. G.

YearAuthor(s)TitlePublication
2003
N. Feamster
D. G. Andersen
H. Balakrishnan
M. F. Kaashoek
Measuring the Effects of Internet Path Faults on Reactive RoutingACM SIGMETRICS

Andersen, D.G.

YearAuthor(s)TitlePublication
2002
D.G. Andersen
N. Feamster
S. Bauer
H. Balakrishnan
Topology Inference from BGP Routing DynamicsACM SIGCOMM Internet Measurement Workshop

Anderson, T.

YearAuthor(s)TitlePublication
2009
H.V. Madhyasth
E. Katz-Bassett
T. Anderson
A. Krishnamurthy
A. Venkataramani
iPlane Nano: path prediction for peer-to-peer applicationsProc. USENIX symp. on Networked systems design and implementation (NSDI)
2006
E. Katz-Bassett
J. P. John
A. Krishnamurthy
D. Wetherall
T. Anderson
Y. Chawathe
Towards IP geolocation using delay and topology measurementsInternet Measurement Conference (IMC)
2002
R. Mahajan
D. Wetherall
T. Anderson
Understanding BGP MisconfigurationACM SIGCOMM

Antonatos, S.

YearAuthor(s)TitlePublication
2006
D. Koukis
S. Antonatos
K.G. Anagnostakis
On the Privacy Risks of Publishing Anonymized IP Network Traces.Communications and Multimedia Security
2006
D. Antoniades
M. Polychronakis
S. Antonatos
E. Markatos
S. Ubik
Appmon: An Application for Accurate per Application Network Traffic CharacterizationBroadBand Europe
2006
D. Koukis
S. Antonatos
D. Antoniades
E.P. Markatos
P. Trimintzios
A Generic Anonymization Framework for Network TrafficIEEE International Conference on Communications (ICC)

Antoniades, D.

YearAuthor(s)TitlePublication
2006
D. Antoniades
M. Polychronakis
S. Antonatos
E. Markatos
S. Ubik
Appmon: An Application for Accurate per Application Network Traffic CharacterizationBroadBand Europe
2006
D. Koukis
S. Antonatos
D. Antoniades
E.P. Markatos
P. Trimintzios
A Generic Anonymization Framework for Network TrafficIEEE International Conference on Communications (ICC)

Arif, M.J.

YearAuthor(s)TitlePublication
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency MeasurementsAustralasian Conference on Computer Science (ASCS)
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
A. Gunatilaka
B. Ristic
Internet Host Geolocation Using Maximum Likelihood Estimation TechniqueIEEE International Conference on Advanced Information Networking and Applications (AINA)

Arlitt, M.

YearAuthor(s)TitlePublication
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Offline/realitme Traffic Classification Using Semi-supervised LearningPerform Eval
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network CoreWorld Wide Web (WWW) Conference
2006
J. Mogul
M. Arlitt
SC2D: an alternative to trace anonymizationACM SIGCOMM MineNet
2006
J. Erman
A. Mahanti
M. Arlitt
Internet Traffic Identification using Machine LearningIEEE GLOBECOM
2006
J. Erman
M. Arlitt
A. Mahanti
Traffic Classification Using Clustering AlgorithmsACM SIGCOMM

Armitage, G.

YearAuthor(s)TitlePublication
2008
Nguyen T.
G. Armitage
A Survey of Techniques for Internet Traffic Classification Using Machine LearningIEEE Communications Surveys and Tutorials
2006
N. Williams
S. Zander
G. Armitage
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow ClassificationACM SIGCOMM
2005
S. Zander
T. Nguyen
G. Armitage
Self-learning IP Traffic Classification based on Statistical Flow CharacteristicsPassive and Active Measurement Conference (PAM)

Arnes, A.

YearAuthor(s)TitlePublication
2005
L. Overlier
T. Brekne
A. Arnes
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.CANS
2005
T. Brekne
A. Arnes
A. Oslebo
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.Privacy Enhancing Technologies

Asaba, T.

YearAuthor(s)TitlePublication
1992
T. Asaba
k. claffy
O. Nakamura
J. Murai
An analysis of international academic research network traffic between Japan and other nationsInternational Networking Conference (INET)

B., Huffaker

YearAuthor(s)TitlePublication
1998
Huffaker B.
J. Jung
D. Wessels
k. claffy
Visualization of the Growth and Topology of the NLANR Caching HierarchyInternational WWW Caching Workshop

Balakrishnan, H.

YearAuthor(s)TitlePublication
2005
M. J. Freedman
M. Vutukuru
N. Feamster
H. Balakrishnan
Geographic Locality of IP PrefixesInternet Measurement Conference (IMC)
2003
N. Feamster
D. G. Andersen
H. Balakrishnan
M. F. Kaashoek
Measuring the Effects of Internet Path Faults on Reactive RoutingACM SIGMETRICS
2002
D.G. Andersen
N. Feamster
S. Bauer
H. Balakrishnan
Topology Inference from BGP Routing DynamicsACM SIGCOMM Internet Measurement Workshop

Bannister, J.

YearAuthor(s)TitlePublication
2005
A. Hussain
G. Bartlett
Y. Pryadkin
J. Heidemann
C. Papadopoulos
J. Bannister
Experiences with a continuous network tracing infrastructureACM SIGCOMM MineNet

Barford, P.

YearAuthor(s)TitlePublication
2012
B. Eriksson
P. Barford
B. Maggs
R. Nowak
Posit: a lightweight approach for IP geolocationACM SIGMETRICS Performance Evaluation Review
2010
B. Eriksson
P. Barford
J. Sommers
R. Nowak
A Learning-Based Approach for IP GeolocationPAM, LNCS Volume

Barman, D.

YearAuthor(s)TitlePublication
2007
H. Kim
K. Claffy
M. Fomenkova
N. Browlee
D. Barman
M. Faloutsos
Comparison of Internet Traffic Classification ToolsIMRG WACI

Bartlett, G.

YearAuthor(s)TitlePublication
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
J. Pepin
Estimating P2P Traffic Volume at USCUSC/Information Sciences Institute
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
Inherent Behaviors for On-Line Detection of Peer-to-Peer SharingIEEE Global Internet Symposium
2005
A. Hussain
G. Bartlett
Y. Pryadkin
J. Heidemann
C. Papadopoulos
J. Bannister
Experiences with a continuous network tracing infrastructureACM SIGCOMM MineNet

Bauer, S.

YearAuthor(s)TitlePublication
2002
D.G. Andersen
N. Feamster
S. Bauer
H. Balakrishnan
Topology Inference from BGP Routing DynamicsACM SIGCOMM Internet Measurement Workshop

Beiro, M.

YearAuthor(s)TitlePublication
2008
M. Beiro
J. Alvarez-Hamelin
J. Busch
A low complexity visualization tool that helps to perform complex systems analysisNew Journal of Physics

Ben-Shalom, O.

YearAuthor(s)TitlePublication
2002
Y. Afek
O. Ben-Shalom
A. Bremler-Barr
On the Structure and Application of BGP Policy AtomsACM SIGCOMM Internet Measurement Workshop

Bernaille, L.

YearAuthor(s)TitlePublication
2007
L. Bernaille
R. Teixeira
Early Recognition of Encrypted ApplicationPassive and Active Measurement Conference (PAM)
2006
L. Bernaille
R. Teixeira
. Akodjenou
A. Soule
K. Salamatian
Traffic Classification on the flyACM SIGCOMM Computer Communication Review
2006
L. Bernaille
R. Teixeira
K. Salamatian
Early Application IdentificationACM CoNEXT
2005
L. Bernaille
A. Soule
M. Jeannin
K. Salamatian
Blind Application Recognition Through Behavioral ClassificationParis

Beverly, R.

YearAuthor(s)TitlePublication
2003
R. Beverly
k. claffy
Wide-Area IP Multicast Traffic CharacterizationIEEE Network

Bhattacharyya, S.

YearAuthor(s)TitlePublication
2004
K. Xu
Z. Zhang
S. Bhattacharyya
Profiling Internet Backbone Traffic: Behavior Models and ApplicationsACM SIGCOMM
2002
G. Iannaccone
C. Chuah
R. Mortier
S. Bhattacharyya
C. Diot
Analysis of link failures in an IP backboneACM SIGCOMM Internet Measurement Workshop

Bhumiratana, B.

YearAuthor(s)TitlePublication
2007
R. Crawford
M. Bishop
B. Bhumiratana
L. Clark
K. Levitt
Sanitization models and their limitationsNew Security Paradigms Workshop (NSPW)
2006
M. Bishop
R. Crawford
B. Bhumiratana
L. Clark
K. Levitt
Some Problems in Sanitizing Network DataIEEE WETICE

Bishop, M.

YearAuthor(s)TitlePublication
2007
R. Crawford
M. Bishop
B. Bhumiratana
L. Clark
K. Levitt
Sanitization models and their limitationsNew Security Paradigms Workshop (NSPW)
2006
M. Bishop
R. Crawford
B. Bhumiratana
L. Clark
K. Levitt
Some Problems in Sanitizing Network DataIEEE WETICE

Bohn, R.

YearAuthor(s)TitlePublication
1994
R. Bohn
H.-W. Braun
k. claffy
S. Wolff
Mitigating the coming Internet crunch: multiple service levels via PrecedenceCAIDA

Bonfiglio, D.

YearAuthor(s)TitlePublication
2007
D. Bonfiglio
M. Mellia
M. Meo
D. Rossi
P. Tofanelli
Revealing Skype Traffic: when randomness plays with youACM SIGCOMM

Borisov, N.

YearAuthor(s)TitlePublication
2006
J. Zhang
N. Borisov
W. Yurcik
Outsourcing Security Analysis with Anonymized LogsSecurecomm and Workshops

Bose, A.

YearAuthor(s)TitlePublication
2000
C. Labovitz
A. Ahuja
A. Bose
F. Jahanian
An Experimental Study of Internet Routing ConvergenceMicrosoft Research

Bradner, S.

YearAuthor(s)TitlePublication
1996
D. Mitchell
S. Bradner
k. claffy
In whose domain: name service in adolescenceCoordination and Administration of the Internet Workshop

Braun, H.-W.

YearAuthor(s)TitlePublication
1995
k. claffy
A Gross
H.-W. Braun
Measured interference of security mechanisms with network performanceInternational Networking Conference (INET)
1995
k. claffy
H.-W. Braun
Post-NSFNET statistics collectionInternational Networking Conference (INET)
1995
k. claffy
H.-W. Braun
G. Polyzos
A parameterizable methodology for Internet traffic flow profilingCAIDA
1994
R. Bohn
H.-W. Braun
k. claffy
S. Wolff
Mitigating the coming Internet crunch: multiple service levels via PrecedenceCAIDA
1994
H.-W. Braun
k. claffy
Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web serverWorld Wide Web (WWW) Conference
1994
H.-W. Braun
B. Chinoy
k. claffy
Applied Network Research: 1994 annual status reportCAIDA
1994
k. claffy
H.-W. Braun
G. Polyzos
Tracking long-term growth of the NSFNETCAIDA
1994
k. claffy
H.-W. Braun
G. Polyzos
Internet traffic flow profilingCAIDA
1993
B. Aiken
H.-W. Braun
P. Ford
NSF implementation plan for interim NRENJournal on High Speed Networking
1993
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1993
k. claffy
H.-W. Braun
G. Polyzos
Measurement considerations for assessing unidirectional latenciesCAIDA
1993
H.-W. Braun
k. claffy
G. Polyzos
A framework for flow-based accounting on the InternetIEEE Singapore International Conference on Networks (SICON'93)
1993
k. claffy
H.-W. Braun
G. Polyzos
Application of sampling methodologies to wide-area network traffic characterizationACM SIGCOMM
1993
k. claffy
H.-W. Braun
G. Polyzos
Long-term traffic aspects of the NSFNETInternational Networking Conference (INET)
1993
H.-W. Braun
k. claffy
Network analysis in support of Internet policy requirementsInternational Networking Conference (INET)
1993
H.-W. Braun
k. claffy
Network analysis issues for a public InternetPublic Access to the Internet, A Harvard JFK School Workshop
1993
H.-W. Braun
P. Ford
Y. Rekhter
CIDR and the evolution of the InternetInternational Networking Conference (INET)
1993
k. claffy
H.-W. Braun
G. Polyzos
Traffic characteristics of the T1 NSFNET backboneIEEE INFOCOM
1992
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1992
B. Chinoy
H.-W. Braun
The National Science Foundation NetworkCAIDA

Brekne, T.

YearAuthor(s)TitlePublication
2005
L. Overlier
T. Brekne
A. Arnes
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.CANS
2005
T. Brekne
A. Arnes
A. Oslebo
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.Privacy Enhancing Technologies

Bremler-Barr, A.

YearAuthor(s)TitlePublication
2002
Y. Afek
O. Ben-Shalom
A. Bremler-Barr
On the Structure and Application of BGP Policy AtomsACM SIGCOMM Internet Measurement Workshop
1999
Y. Afek
A. Bremler-Barr
S. Har-Peled
Routing with a ClueACM SIGCOMM

Broido, A.

YearAuthor(s)TitlePublication
2004
T. Karagiannis
A. Broido
N. Brownless
K. Claffy
M. Faloutsos
Is P2P Dying or Just HidingIEEE GLOBECOM
2004
T. Karagiannis
A. Broido
M. Faloutsos
K. Claffy
Transport Layer Identification of P2p TrafficACM SIGCOMM
2004
A. Broido
Y. Hyun
R. Gao
k. claffy
Their share: diversity and disparity in IP trafficPassive and Active Measurement Conference (PAM)
2004
T. Karagiannis
M. Molle
M. Faloutsos
A. Broido
A Nonstationary Poisson View of Internet TrafficIEEE INFOCOM
2004
P. Verkaik
A. Broido
k. claffy
R. Gao
Y. Hyun
R. van der Pol
Beyond CIDR AggregationCAIDA
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of Private DNS Update SourcesIEEE Workshop on Internet Applications (WIAPP)
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of DNS Update TrafficACM SIGMETRICS
2003
Y. Hyun
A. Broido
k. claffy
On Third-party Addresses in Traceroute PathsPassive and Active Measurement Conference (PAM)
2003
Y. Hyun
A. Broido
k. claffy
Traceroute and BGP AS Path IncongruitiesCAIDA
2003
A. Broido
R. King
E. Nemeth
k. claffy
Radon Spectroscopy of Inter-Packet DelayIEEE High-Speeding Networking Workshop (HSN)
2002
A. Broido
k. claffy
E. Nemeth
Internet Expansion, Refinement, and ChurnEuropean Transactions on Telecommunications
2001
A. Broido
k. claffy
Internet topology: connectivity of IP graphsSPIE International symposium on Convergence of IT and Communication
2001
A. Broido
k. claffy
Complexity of global routing policiesCAIDA
2001
A. Broido
k. claffy
Analysis of RouteViews BGP data: policy atomsNetwork Resource Data Management Workshop

Browlee, N.

YearAuthor(s)TitlePublication
2007
H. Kim
K. Claffy
M. Fomenkova
N. Browlee
D. Barman
M. Faloutsos
Comparison of Internet Traffic Classification ToolsIMRG WACI

Brown, J.

YearAuthor(s)TitlePublication
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop

Brown, P.

YearAuthor(s)TitlePublication
2005
L. Plissonneau
J. Costeux
P. Brown
Analysis of Peer-to-Peer Traffic on ADSLPassive and Active Measurement Conference (PAM)

Brownlee, N.

YearAuthor(s)TitlePublication
2004
D. Wessels
M. Fomenkov
N. Brownlee
k. claffy
Measurements and Laboratory Simulations of the Upper DNS HierarchyPassive and Active Measurement Conference (PAM)
2003
T. Lindh
N. Brownlee
Integrating Active Methods and Flow Meters - an implementation using NeTraMetPassive and Active Measurement Conference (PAM)
2002
N. Brownlee
k. claffy
Understanding Internet Traffic Streams: Dragonflies and TortoisesCAIDA
2002
N. Brownlee
I. Ziedins
Response time distributions for global name serversPassive and Active Measurement Conference (PAM)
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Root/gTLD Performance MeasurementsUSENIX LISA
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Measurements at a Root ServerIEEE GLOBECOM
2001
N. Brownlee Using NeTraMet for Production Traffic MeasurementIntegrated Management Strategies for the New Millenium
2001
N. Brownlee
M. Murray
Streams, Flows and TorrentsPassive and Active Measurement Conference (PAM)
2001
N. Brownlee
k. claffy
M. Murray
E. Nemeth
Methodology for passive analysis of a university Internet linkPassive and Active Measurement Conference (PAM)
2000
N. Brownlee
R. Fulton
Kawaihiko and the third-quartile day [traffic management]CAIDA

Brownless, N.

YearAuthor(s)TitlePublication
2004
T. Karagiannis
A. Broido
N. Brownless
K. Claffy
M. Faloutsos
Is P2P Dying or Just HidingIEEE GLOBECOM

Burgener, D.

YearAuthor(s)TitlePublication
2011
Y. Wang
D. Burgener
M. Flores
A. Kuzmanovic
C. Huang
Towards Street-Level Client-Independent IP GeolocationUsenix

Burstein, A.

YearAuthor(s)TitlePublication
2008
A. Burstein Toward a Culture of Cybersecurity ResearchUniversity of California, Berkeley
2008
A. Burstein Conducting Cybersecurity Research Legally and EthicallyLEET

Busch, J.

YearAuthor(s)TitlePublication
2008
M. Beiro
J. Alvarez-Hamelin
J. Busch
A low complexity visualization tool that helps to perform complex systems analysisNew Journal of Physics

Bush, R.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop

Butkovic, A.

YearAuthor(s)TitlePublication
2013
A. Butkovic
F. Orucevic
A. Tanovic
Using Whois based geolocation and Google maps API for support cybercrime investigationsRecent Advances in Telecommunications and Circuits

Byers, J.W.

YearAuthor(s)TitlePublication
2003
A. Lakhina
J.W. Byers
M. Crovella
I. Matta
On the geographic location of Internet resourcesSelected Areas in Communications, Volume 21

CAIDA

YearAuthor(s)TitlePublication
2000
CAIDA ISMA Winter 2000 Workshop - Final ReportInternet Statistics and Metrics Analysis (ISMA)
1999
CAIDA Report from the ISMA Network Visualization WorkshopInternet Statistics and Metrics Analysis (ISMA)
1999
CAIDA ISMA passive measurement data and analysis, workshop reportInternet Statistics and Metrics Analysis (ISMA)
1998
CAIDA Comments by CAIDA concerning the FCC's review of the acquisition of MCI Communications Corp. by Worldcom, Inc.CAIDA
1996
CAIDA Cooperative Association for Internet Data AnalysisCAIDA

Carlos, O.

YearAuthor(s)TitlePublication
2004
A. Ziviani
S. Fdida
J. F. de Rezende
O. Carlos
M. B. Duarte
Toward a measurement-based geographic location servicePassive and Active Network Measurement Workshop (PAM)

Castelluccia, C.

YearAuthor(s)TitlePublication
2009
C. Castelluccia
M.A. Kaafar
P. Manils
D. Perito
Geolocalization of proxied services and its application to fast-flux hidden serversIMC

Chandramouli, R.

YearAuthor(s)TitlePublication
2012
Z. Dong
R.D.W. Perera
R. Chandramouli
K.P. Subbalakshmi
Network measurement based modeling and optimization for IP geolocationComputer Networks

Chang, D.

YearAuthor(s)TitlePublication
2001
D. Chang
R. Govindan
J. Heidemann
An Empirical Study of Router Response to Large BGP Routing Table LoadUSC/Information Sciences Institute

Chang, H.

YearAuthor(s)TitlePublication
2003
H. Chang
S. Jamin
W. Willinger
Internet Connectivity at the AS-level: An Optimization-Driven Modeling ApproachACM SIGCOMM Workshop on MoMeTools

Chawathe, Y.

YearAuthor(s)TitlePublication
2006
E. Katz-Bassett
J. P. John
A. Krishnamurthy
D. Wetherall
T. Anderson
Y. Chawathe
Towards IP geolocation using delay and topology measurementsInternet Measurement Conference (IMC)

Chen, W.

YearAuthor(s)TitlePublication
2007
B. Ribeiro
W. Chen
G. Miklau
D. Towsley
Analyzing Privacy in Enterprise Packet Trace AnonymizationUMass Amherst

Chinoy, B.

YearAuthor(s)TitlePublication
1996
B. Chinoy
T. Salo
Internet Exchanges: Policy-Driven EvolutionCoordination and Administration of the Internet Workshop
1994
H.-W. Braun
B. Chinoy
k. claffy
Applied Network Research: 1994 annual status reportCAIDA
1993
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1992
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1992
B. Chinoy Dynamics of Internet routing informationCAIDA
1992
B. Chinoy
H.-W. Braun
The National Science Foundation NetworkCAIDA
1992
Y. Rekhter
B. Chinoy
Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysisCAIDA

Cho, K.

YearAuthor(s)TitlePublication
2008
K. Cho
K. Fukuda
H. Esaki
A. Kato
Observing Slow Crustal Movement in Residential User TrafficACM CoNEXT
2004
K. Cho
M. Luckie
B. Huffaker
Identifying IPv6 Network Problems in the Dual-Stack WorldACM SIGCOMM

Chuah, C.

YearAuthor(s)TitlePublication
2002
G. Iannaccone
C. Chuah
R. Mortier
S. Bhattacharyya
C. Diot
Analysis of link failures in an IP backboneACM SIGCOMM Internet Measurement Workshop

Claessenss, J.

YearAuthor(s)TitlePublication
2002
C. Diaz
B. Seys
J. Claessenss
B. Preneel
Towards Measuring AnonymityPrivacy Enhancing Technologies

Claffy, K.

YearAuthor(s)TitlePublication
2007
H. Kim
K. Claffy
M. Fomenkova
N. Browlee
D. Barman
M. Faloutsos
Comparison of Internet Traffic Classification ToolsIMRG WACI
2004
T. Karagiannis
A. Broido
N. Brownless
K. Claffy
M. Faloutsos
Is P2P Dying or Just HidingIEEE GLOBECOM
2004
T. Karagiannis
A. Broido
M. Faloutsos
K. Claffy
Transport Layer Identification of P2p TrafficACM SIGCOMM

claffy, k.

YearAuthor(s)TitlePublication
2004
D. Wessels
M. Fomenkov
N. Brownlee
k. claffy
Measurements and Laboratory Simulations of the Upper DNS HierarchyPassive and Active Measurement Conference (PAM)
2004
A. Broido
Y. Hyun
R. Gao
k. claffy
Their share: diversity and disparity in IP trafficPassive and Active Measurement Conference (PAM)
2004
P. Verkaik
A. Broido
k. claffy
R. Gao
Y. Hyun
R. van der Pol
Beyond CIDR AggregationCAIDA
2003
C. Dovrolis
R. Prasad
M. Murray
k. claffy
Bandwidth estimation: metrics, measurement techniques, and toolsIEEE Network
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of Private DNS Update SourcesIEEE Workshop on Internet Applications (WIAPP)
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of DNS Update TrafficACM SIGMETRICS
2003
D. Wessels
M. Fomenkov
k. claffy
Wow, That's a lot of packetsPassive and Active Measurement Conference (PAM)
2003
Y. Hyun
A. Broido
k. claffy
On Third-party Addresses in Traceroute PathsPassive and Active Measurement Conference (PAM)
2003
M. Fomenkov
K. Keys
D. Moore
k. claffy
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sitesCAIDA
2003
T. Lee
B. Huffaker
M. Fomenkov
k. claffy
On the problem of optimization of DNS root servers' placementPassive and Active Measurement Conference (PAM)
2003
Y. Hyun
A. Broido
k. claffy
Traceroute and BGP AS Path IncongruitiesCAIDA
2003
A. Broido
R. King
E. Nemeth
k. claffy
Radon Spectroscopy of Inter-Packet DelayIEEE High-Speeding Networking Workshop (HSN)
2003
R. Beverly
k. claffy
Wide-Area IP Multicast Traffic CharacterizationIEEE Network
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
2002
B. Huffaker
M. Fomenkov
D. J. Plummer
D. Moore
k. claffy
Distance Metrics in the InternetIEEE International Telecommunications Symposium
2002
N. Brownlee
k. claffy
Understanding Internet Traffic Streams: Dragonflies and TortoisesCAIDA
2002
B. Huffaker
D. Plummer
D. Moore
k. claffy
Topology discovery by active probingSymposium on Applications and the Internet (SAINT)
2002
A. Broido
k. claffy
E. Nemeth
Internet Expansion, Refinement, and ChurnEuropean Transactions on Telecommunications
2001
D. Moore
K. Keys
R. Koga
E. Lagache
k. claffy
CoralReef software suite as a tool for system and network administratorsUSENIX LISA
2001
M. Fomenkov
k. claffy
B. Huffaker
D. Moore
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name ServersUSENIX LISA
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Root/gTLD Performance MeasurementsUSENIX LISA
2001
C. Shannon
D. Moore
k. claffy
Characteristics of Fragmented Traffic on Internet LinksACM SIGCOMM Internet Measurement Workshop
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Measurements at a Root ServerIEEE GLOBECOM
2001
A. Broido
k. claffy
Internet topology: connectivity of IP graphsSPIE International symposium on Convergence of IT and Communication
2001
A. Broido
k. claffy
Complexity of global routing policiesCAIDA
2001
A. Broido
k. claffy
Analysis of RouteViews BGP data: policy atomsNetwork Resource Data Management Workshop
2001
C. Shannon
D. Moore
k. claffy
Characteristics of fragmented IP traffic on Internet linksPassive and Active Measurement Conference (PAM)
2001
M. Murray
k. claffy
Measuring the Immeasurable: Global Internet Measurement InfrastructurePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
B. Huffaker
M. Fomenkov
D. Moore
k. claffy
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performancePassive and Active Measurement Conference (PAM)
2001
N. Brownlee
k. claffy
M. Murray
E. Nemeth
Methodology for passive analysis of a university Internet linkPassive and Active Measurement Conference (PAM)
2001
M. Mathis
G. Huntoon
k. claffy
Traffic dynamics testbedLarge Scale Networking (LSN) Workshop
2001
k. claffy CAIDA: Visualizing the InternetCAIDA
2000
P. Rajvaidya
K. Almeroth
k. claffy
A scalable architecture for monitoring and visualizing multicast statisticsDistributed Systems: Operations and Management
2000
S. McCreary
k. claffy
Trends in wide area IP traffic patterns - A view from Ames Internet ExchangeITC Specialist Seminar
2000
E. Nemeth
T. Ott
K. Thompson
k. claffy
The Internet Engineering Curriculum RepositoryInternational Networking Conference (INET)
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
2000
k. claffy Measuring the InternetCAIDA
1999
k. claffy
S. McCreary
Internet measurement and data analysis: passive and active measurementAmerican Statistical Association
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to visualize the Internet multicast backboneInternational Networking Conference (INET)
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to Visualize the Internet Multicast BackboneInternational Networking Conference (INET)
1999
k. claffy Internet measurement and data analysis: topology, workload, performance and routing statisticsNAE Workshop
1999
k. claffy
T. Monk
D. McRobb
Internet TomographyCAIDA
1998
k. claffy
G. Miller
K. Thompson
The nature of the beast: Recent traffic measurements from an Internet backboneInternational Networking Conference (INET)
1998
B. Huffaker
J. Jung
E. Nemeth
D. Wessels
k. claffy
Visualization of the growth and topology of the NLANR caching hierarchyInternational WWW Caching Workshop
1998
Huffaker B.
J. Jung
D. Wessels
k. claffy
Visualization of the Growth and Topology of the NLANR Caching HierarchyInternational WWW Caching Workshop
1998
D. Wessels
k. claffy
ICP and the Squid web cacheCAIDA
1997
k. claffy
T. Monk
What's next for Internet data analysis? Status and challenges facing the communityCAIDA
1997
D. Wessels
k. claffy
RFC 2187: Application of Internet Cache Protocol (ICP), version 2CAIDA
1997
D. Wessels
k. claffy
RFC 2186: Internet Cache Protocol (ICP), version 2CAIDA
1997
T. Monk
k. claffy
Internet data acquisition and analysis: Status and next stepsCAIDA
1996
E. Hoffman
k. claffy
Geographic addressing reconsideredCoordination and Administration of the Internet Workshop
1996
D. Wessels
k. claffy
Evolution of the NLANR cache hierarchy: Global configuration challengesCAIDA
1996
T. Munzner
E. Hoffman
k. claffy
B. Fenner
Visualizing the global topology of the MBoneIEEE Symposium on Information Visualization
1996
E. Hoffman
k. claffy
Address administration in IPv6IEEE Symposium on Information Visualization
1996
D. Wessels
k. claffy
Can WWW caches help to save the Internet?Coordination and Administration of the Internet Workshop
1996
T. Monk
k. claffy
Cooperation in Internet data acquisition and analysisCoordination and Administration of the Internet Workshop
1996
D. Mitchell
S. Bradner
k. claffy
In whose domain: name service in adolescenceCoordination and Administration of the Internet Workshop
1996
k. claffy 'But some data is worse than others': Measurement of the global InternetCAIDA
1996
T. Monk
k. claffy
A survey of Internet statistics / metrics activitiesCAIDA
1995
k. claffy
A Gross
H.-W. Braun
Measured interference of security mechanisms with network performanceInternational Networking Conference (INET)
1995
k. claffy
H.-W. Braun
Post-NSFNET statistics collectionInternational Networking Conference (INET)
1995
k. claffy
H.-W. Braun
G. Polyzos
A parameterizable methodology for Internet traffic flow profilingCAIDA
1994
k. claffy Internet traffic characterization.University of California, San Diego
1994
R. Bohn
H.-W. Braun
k. claffy
S. Wolff
Mitigating the coming Internet crunch: multiple service levels via PrecedenceCAIDA
1994
H.-W. Braun
k. claffy
Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web serverWorld Wide Web (WWW) Conference
1994
H.-W. Braun
B. Chinoy
k. claffy
Applied Network Research: 1994 annual status reportCAIDA
1994
k. claffy
H.-W. Braun
G. Polyzos
Tracking long-term growth of the NSFNETCAIDA
1994
k. claffy
H.-W. Braun
G. Polyzos
Internet traffic flow profilingCAIDA
1993
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1993
k. claffy
H.-W. Braun
G. Polyzos
Measurement considerations for assessing unidirectional latenciesCAIDA
1993
H.-W. Braun
k. claffy
G. Polyzos
A framework for flow-based accounting on the InternetIEEE Singapore International Conference on Networks (SICON'93)
1993
k. claffy
H.-W. Braun
G. Polyzos
Application of sampling methodologies to wide-area network traffic characterizationACM SIGCOMM
1993
k. claffy
H.-W. Braun
G. Polyzos
Long-term traffic aspects of the NSFNETInternational Networking Conference (INET)
1993
H.-W. Braun
k. claffy
Network analysis in support of Internet policy requirementsInternational Networking Conference (INET)
1993
H.-W. Braun
k. claffy
Network analysis issues for a public InternetPublic Access to the Internet, A Harvard JFK School Workshop
1993
k. claffy
H.-W. Braun
G. Polyzos
Traffic characteristics of the T1 NSFNET backboneIEEE INFOCOM
1992
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1992
T. Asaba
k. claffy
O. Nakamura
J. Murai
An analysis of international academic research network traffic between Japan and other nationsInternational Networking Conference (INET)

claffy, kc

YearAuthor(s)TitlePublication
2011
B. Huffaker
M. Fomenkov
kc claffy
Geocompare: a comparison of public and commercial geolocation databasesCAIDA

Clark, L.

YearAuthor(s)TitlePublication
2007
R. Crawford
M. Bishop
B. Bhumiratana
L. Clark
K. Levitt
Sanitization models and their limitationsNew Security Paradigms Workshop (NSPW)
2006
M. Bishop
R. Crawford
B. Bhumiratana
L. Clark
K. Levitt
Some Problems in Sanitizing Network DataIEEE WETICE

Cohen, I.

YearAuthor(s)TitlePublication
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Offline/realitme Traffic Classification Using Semi-supervised LearningPerform Eval
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network CoreWorld Wide Web (WWW) Conference

Collins, M.

YearAuthor(s)TitlePublication
2007
M. Collins
M. Reiter
Hit-list worm detection and bot identification in large networks using protocol graphsRAID
2007
S. Coull
C. Wright
F. Monrose
M. Collins
M. Reiter
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network TracesNDSS

Constantinou, F.

YearAuthor(s)TitlePublication
2006
F. Constantinou
P. Mavrommatiss
Identifying Known and Unknown Peer-to-Peer TrafficIEEE NCA

Conti, G.

YearAuthor(s)TitlePublication
2006
G. Conti Googling Considering HarmfulNew Security Paradigms Workshop (NSPW)

Costeux, J.

YearAuthor(s)TitlePublication
2005
L. Plissonneau
J. Costeux
P. Brown
Analysis of Peer-to-Peer Traffic on ADSLPassive and Active Measurement Conference (PAM)

Costeux, J.-L.

YearAuthor(s)TitlePublication
2009
M. Pietrzyk
J.-L. Costeux
G. Urvoy-Keller
T. En-Najjary
Challenging Statistical Classification for Operational Usage: the ADSL CaseACM SIGCOMM IMC

Cotton, C.

YearAuthor(s)TitlePublication
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network

Coull, S.

YearAuthor(s)TitlePublication
2008
S. Coull
C. Wright
F. Monrose
A. Keromytis
M. Reiter
Taming the Devil: Techniques for Evaluating Anonymized Network DataNDSS
2007
S. Coull
C. Wright
F. Monrose
M. Collins
M. Reiter
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network TracesNDSS

Cox, R.

YearAuthor(s)TitlePublication
2004
F. Dabek
R. Cox
F. Kaashoek
R. Morris
Vivaldi: A Decentralized Network Coordinate SystemSIGCOMM

Crawford, R.

YearAuthor(s)TitlePublication
2007
R. Crawford
M. Bishop
B. Bhumiratana
L. Clark
K. Levitt
Sanitization models and their limitationsNew Security Paradigms Workshop (NSPW)
2006
M. Bishop
R. Crawford
B. Bhumiratana
L. Clark
K. Levitt
Some Problems in Sanitizing Network DataIEEE WETICE

Crogan, M.

YearAuthor(s)TitlePublication
2005
A. Moore
D. Zuev
M. Crogan
Discriminators for Use in Flow-based ClassificationIntel Research, Cambridge

Crotti, M.

YearAuthor(s)TitlePublication
2008
M. Dusi
M. Crotti
F. Gringoli
L. Salgarelli
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical FingerprintingComputer Networks
2007
M. Crotti
M. Dusi
F. Gringoli
L. Salgarelli
Traffic Classification through Simple Statistical FingerprintingACM SIGCOMM

Crovella, M.

YearAuthor(s)TitlePublication
2005
A. Lakhina
M. Crovella
C. Diot
Mining Anomalies Using Traffic Feature DistributionsACM SIGCOMM
2004
B. Gueye
A. Ziviani
M. Crovella
S. Fdida
Constraint-based Geolocation of Internet HostsIEEE/ACM Transactions on Networking
2003
L. Tang
M. Crovella
Virtual Landmarks for the InternetInternet Measurement Conference (IMC)
2003
A. Lakhina
J.W. Byers
M. Crovella
I. Matta
On the geographic location of Internet resourcesSelected Areas in Communications, Volume 21

Csabai, I.

YearAuthor(s)TitlePublication
2011
S. Laki
P. Matray
P. Haga
T. Sebok
I. Csabai
G. Vattay
Spotter: A Model Based Active Geolocation ServiceINFOCOM
2010
S. Laki
P. Matray
P. Haga
I. Csabai
G. Vattay
A Model Based Approach for Improving Router GeolocationComputer Networks: The International Journal of Computer and Telecommunications Networking

D., Zuev

YearAuthor(s)TitlePublication
2005
A. Moore
Zuev D.
Internet Traffic Classification Using Bayesian Analysis TechniquesACM SIGMETRICS
2005
Zuev D.
Moore A.
Traffic Classification using a Statistical ApproachPassive and Active Measurement Conference (PAM)

Dabek, F.

YearAuthor(s)TitlePublication
2004
F. Dabek
R. Cox
F. Kaashoek
R. Morris
Vivaldi: A Decentralized Network Coordinate SystemSIGCOMM

Dainotti, A.

YearAuthor(s)TitlePublication
2009
A. Dainotti
W. de Donato
A. Pescape
G. Ventre
TIE: a Community-oriented Traffic Classification PlatformInternational Workshop on Traffic Monitoring and Analysis (TMA)
2008
A. Dainotti
W. de Donato
A. Pescape
P. Salvo Rossi
Classification of Network Traffic via Packet-Level Hidden Markov ModelsIEEE GLOBECOM

Danezis, G.

YearAuthor(s)TitlePublication
2002
A. Serjantov
G. Danezis
Towards an Information Theoretic Metric for AnonymityPrivacy Enhancing Technologies

Dang, T.

YearAuthor(s)TitlePublication
2008
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-PeerSystems and Computers in Japan
2006
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Identification and Analysis of Peer-to-Peer TrafficJournal of Communications

Davis, C.

YearAuthor(s)TitlePublication
1996
C. Davis
P. Vixie
T. Goodwin
I. Dickinson
A Means for Expressing Location Information in the Domain Name SystemRFC Editor

de Donato, W.

YearAuthor(s)TitlePublication
2009
A. Dainotti
W. de Donato
A. Pescape
G. Ventre
TIE: a Community-oriented Traffic Classification PlatformInternational Workshop on Traffic Monitoring and Analysis (TMA)
2008
A. Dainotti
W. de Donato
A. Pescape
P. Salvo Rossi
Classification of Network Traffic via Packet-Level Hidden Markov ModelsIEEE GLOBECOM

de Rezende, J. F.

YearAuthor(s)TitlePublication
2005
A. Ziviani
S. Fdida
J. F. de Rezende
O. C. M. B. Duarte
Improving the accuracy of measurement-based geographic location of internet hostsComputer Networks and ISDN Systems
2004
A. Ziviani
S. Fdida
J. F. de Rezende
O. Carlos
M. B. Duarte
Toward a measurement-based geographic location servicePassive and Active Network Measurement Workshop (PAM)

de Rezende, J.F.

YearAuthor(s)TitlePublication
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Demographic placement for Internet host locationGLOBECOM
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Similarity models for Internet host locationICON

Dewes, C.

YearAuthor(s)TitlePublication
2003
C. Dewes
A. Wichmann
A. Feldmann
An Analysis of Internet Chat SystemsACM SIGCOMM

Dey, R.

YearAuthor(s)TitlePublication
2013
Y. Tian
R. Dey
Y. Liu
K.W. Ross
Topology mapping and geolocating for China's InternetIEEE Trans. On Parallel and Distributed Systems

Diaz, C.

YearAuthor(s)TitlePublication
2002
C. Diaz
B. Seys
J. Claessenss
B. Preneel
Towards Measuring AnonymityPrivacy Enhancing Technologies

Dickinson, I.

YearAuthor(s)TitlePublication
1996
C. Davis
P. Vixie
T. Goodwin
I. Dickinson
A Means for Expressing Location Information in the Domain Name SystemRFC Editor

Diot, C.

YearAuthor(s)TitlePublication
2005
A. Lakhina
M. Crovella
C. Diot
Mining Anomalies Using Traffic Feature DistributionsACM SIGCOMM
2002
G. Iannaccone
C. Chuah
R. Mortier
S. Bhattacharyya
C. Diot
Analysis of link failures in an IP backboneACM SIGCOMM Internet Measurement Workshop

Dong, Z.

YearAuthor(s)TitlePublication
2012
Z. Dong
R.D.W. Perera
R. Chandramouli
K.P. Subbalakshmi
Network measurement based modeling and optimization for IP geolocationComputer Networks

Donnet, B.

YearAuthor(s)TitlePublication
2011
I. Poese
S. Uhlig
M.A. Kaafar
B. Donnet
B. Gueye
IP geolocation databases: unreliable?ACM SIGCOMM Computer Communication Review

Donohoe, J.

YearAuthor(s)TitlePublication
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)

Dovrolis, C.

YearAuthor(s)TitlePublication
2003
C. Dovrolis
R. Prasad
M. Murray
k. claffy
Bandwidth estimation: metrics, measurement techniques, and toolsIEEE Network
2001
C. Dovrolis
P. Ramanathan
D. Moore
Packet Dispersion Techniques and Capacity EstimationCAIDA
2001
C. Dovrolis
P. Ramanathan
D. Moore
What do packet dispersion techniques measure?IEEE INFOCOM

Duarte, M. B.

YearAuthor(s)TitlePublication
2004
A. Ziviani
S. Fdida
J. F. de Rezende
O. Carlos
M. B. Duarte
Toward a measurement-based geographic location servicePassive and Active Network Measurement Workshop (PAM)

Duarte, O. C. M. B.

YearAuthor(s)TitlePublication
2005
A. Ziviani
S. Fdida
J. F. de Rezende
O. C. M. B. Duarte
Improving the accuracy of measurement-based geographic location of internet hostsComputer Networks and ISDN Systems

Duarte, O.C.M.B.

YearAuthor(s)TitlePublication
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Demographic placement for Internet host locationGLOBECOM
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Similarity models for Internet host locationICON

Duffield, N.

YearAuthor(s)TitlePublication
2004
S. Roughan
O. Sen
N. Duffield
Class-of-service Mapping for QoSACM SIGCOMM IMC

Dusi, M.

YearAuthor(s)TitlePublication
2008
M. Dusi
M. Crotti
F. Gringoli
L. Salgarelli
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical FingerprintingComputer Networks
2008
M. Dusi
F. Gringoli
L. Salgarelli
A Preliminary Look at the Privacy of SSH TunnelsIEEE International Conference on Communications (ICC)
2007
M. Crotti
M. Dusi
F. Gringoli
L. Salgarelli
Traffic Classification through Simple Statistical FingerprintingACM SIGCOMM

Emilion, R.

YearAuthor(s)TitlePublication
2004
A. Soule
K. Salamatian
N. Taft
R. Emilion
K. Papagiannaki
Flow Classification by Histograms or How to Go on Safari in the InternetACM SIGMETRICS

En-Najjary, T.

YearAuthor(s)TitlePublication
2009
M. Pietrzyk
J.-L. Costeux
G. Urvoy-Keller
T. En-Najjary
Challenging Statistical Classification for Operational Usage: the ADSL CaseACM SIGCOMM IMC

Endo, P.T.

YearAuthor(s)TitlePublication
2010
P.T. Endo
D. Sadok
Whois based geolocation: A strategy to geolocate Internet hostsAdvanced Information Networking and Applications (AINA)

Eriksson, B.

YearAuthor(s)TitlePublication
2012
B. Eriksson
P. Barford
B. Maggs
R. Nowak
Posit: a lightweight approach for IP geolocationACM SIGMETRICS Performance Evaluation Review
2010
B. Eriksson
P. Barford
J. Sommers
R. Nowak
A Learning-Based Approach for IP GeolocationPAM, LNCS Volume

Erman, J.

YearAuthor(s)TitlePublication
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Offline/realitme Traffic Classification Using Semi-supervised LearningPerform Eval
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network CoreWorld Wide Web (WWW) Conference
2006
J. Erman
A. Mahanti
M. Arlitt
Internet Traffic Identification using Machine LearningIEEE GLOBECOM
2006
J. Erman
M. Arlitt
A. Mahanti
Traffic Classification Using Clustering AlgorithmsACM SIGCOMM

Ermopoulos, C.

YearAuthor(s)TitlePublication
2006
K. Luo
Y. Li
C. Ermopoulos
W. Yurcik
A. Slagell
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process AccountingTech Report

Ertoz, L.

YearAuthor(s)TitlePublication
2003
A. Lazarevic
L. Ertoz
V. Kumar
A. Ozgur
J. Srirvastava
A Comparative Study of Anomaly Detection Schemes in Network Intrusion DetectionSIAM

Esaki, H.

YearAuthor(s)TitlePublication
2008
K. Cho
K. Fukuda
H. Esaki
A. Kato
Observing Slow Crustal Movement in Residential User TrafficACM CoNEXT

Estan, C.

YearAuthor(s)TitlePublication
2004
C. Estan
K. Keys
D. Moore
G. Varghese
Building a Better NetFlowACM SIGCOMM
2003
C. Estan
S. Savage
G. Vargheses
Automatically Inferring Patterns of Resources Consumption in Network TrafficACM SIGCOMM

F., Chang

YearAuthor(s)TitlePublication
2005
Chang Feng W.
Chang F.
Chi Feng W.
Walpole J.
A Traffic Characterization of Popular on-line GamesIEEE/ACM Transactions on Networking

Faloutso, M.

YearAuthor(s)TitlePublication
2007
T. Karagiannis
K. Papgiannaki
N. Taft
M. Faloutso
Profiling the End HostPassive and Active Measurement Conference (PAM)

Faloutsos, M.

YearAuthor(s)TitlePublication
2008
M. Iliofotou
P. Pappu
M. Faloutsos
Graption: Automated Detection of P2P Applications Using Traffic Dispersion GraphsTech Report
2007
M. Iliofotou
P. Pappu
M. Faloutsos
M. Mitzenmacher
S. Singh
G. Varghese
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware ImplementationUniversity of California, Riverside
2007
H. Kim
K. Claffy
M. Fomenkova
N. Browlee
D. Barman
M. Faloutsos
Comparison of Internet Traffic Classification ToolsIMRG WACI
2005
T. Karagiannis
K. Papagiannaki
M. Faloutsos
BLINC Multilevel Traffic Classification in the DarkACM SIGCOMM
2004
T. Karagiannis
A. Broido
N. Brownless
K. Claffy
M. Faloutsos
Is P2P Dying or Just HidingIEEE GLOBECOM
2004
T. Karagiannis
A. Broido
M. Faloutsos
K. Claffy
Transport Layer Identification of P2p TrafficACM SIGCOMM
2004
G. Siganos
M. Faloutsos
Analyzing BGP Policies: Methodology and ToolIEEE INFOCOM
2004
T. Karagiannis
M. Molle
M. Faloutsos
A. Broido
A Nonstationary Poisson View of Internet TrafficIEEE INFOCOM

Fan, J.

YearAuthor(s)TitlePublication
2004
J. Fan
J. Xu
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeComputer Networks
2002
J. Xu
J. Fan
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeIEEE International Conference on Network Protocols (ICNP)
2001
J. Xu
J. Fan
M. Ammar
S. Moon
On the Design and Performance of Prefix-Preserving IP Traffic Trace AnonymizationACM SIGCOMM IMC

Fdida, S.

YearAuthor(s)TitlePublication
2007
B. Gueye
S. Uhlig
S. Fdida
Investigating the Imprecision of IP Block-based GeolocationPassive and Active Network Measurement Workshop (PAM)
2006
B. Gueye
S. Uhlig
A. Ziviani
S. Fdida
Leveraging Buffering Delay Estimation for Geolocation of Internet HostsInternational Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference
2005
A. Ziviani
S. Fdida
J. F. de Rezende
O. C. M. B. Duarte
Improving the accuracy of measurement-based geographic location of internet hostsComputer Networks and ISDN Systems
2004
A. Ziviani
S. Fdida
J. F. de Rezende
O. Carlos
M. B. Duarte
Toward a measurement-based geographic location servicePassive and Active Network Measurement Workshop (PAM)
2004
B. Gueye
A. Ziviani
M. Crovella
S. Fdida
Constraint-based Geolocation of Internet HostsIEEE/ACM Transactions on Networking
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Demographic placement for Internet host locationGLOBECOM
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Similarity models for Internet host locationICON

Feamster, N.

YearAuthor(s)TitlePublication
2005
M. J. Freedman
M. Vutukuru
N. Feamster
H. Balakrishnan
Geographic Locality of IP PrefixesInternet Measurement Conference (IMC)
2003
N. Feamster
D. G. Andersen
H. Balakrishnan
M. F. Kaashoek
Measuring the Effects of Internet Path Faults on Reactive RoutingACM SIGMETRICS
2002
D.G. Andersen
N. Feamster
S. Bauer
H. Balakrishnan
Topology Inference from BGP Routing DynamicsACM SIGCOMM Internet Measurement Workshop

Feldman, D.

YearAuthor(s)TitlePublication
2012
D. Feldman
Y. Shavitt
N. Zilberman
A structural approach for PoP geo-locationComputer Networks

Feldmann, A.

YearAuthor(s)TitlePublication
2009
G. Maier
A. Feldmann
V. Paxson
M. Allman
On Dominant Characteristics of Residential Broadband Internet TrafficACM SIGCOMM IMC
2003
C. Dewes
A. Wichmann
A. Feldmann
An Analysis of Internet Chat SystemsACM SIGCOMM

Fenner, B.

YearAuthor(s)TitlePublication
1996
T. Munzner
E. Hoffman
k. claffy
B. Fenner
Visualizing the global topology of the MBoneIEEE Symposium on Information Visualization

Flores, M.

YearAuthor(s)TitlePublication
2011
Y. Wang
D. Burgener
M. Flores
A. Kuzmanovic
C. Huang
Towards Street-Level Client-Independent IP GeolocationUsenix

Floyd, S.

YearAuthor(s)TitlePublication
2001
J. Padhye
S. Floyd
Identifying the TCP Behavior of Web ServersACM SIGCOMM

Fomenkov, M.

YearAuthor(s)TitlePublication
2011
B. Huffaker
M. Fomenkov
kc claffy
Geocompare: a comparison of public and commercial geolocation databasesCAIDA
2004
D. Wessels
M. Fomenkov
N. Brownlee
k. claffy
Measurements and Laboratory Simulations of the Upper DNS HierarchyPassive and Active Measurement Conference (PAM)
2003
D. Wessels
M. Fomenkov
k. claffy
Wow, That's a lot of packetsPassive and Active Measurement Conference (PAM)
2003
M. Fomenkov
K. Keys
D. Moore
k. claffy
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sitesCAIDA
2003
T. Lee
B. Huffaker
M. Fomenkov
k. claffy
On the problem of optimization of DNS root servers' placementPassive and Active Measurement Conference (PAM)
2002
B. Huffaker
M. Fomenkov
D. J. Plummer
D. Moore
k. claffy
Distance Metrics in the InternetIEEE International Telecommunications Symposium
2001
M. Fomenkov
k. claffy
B. Huffaker
D. Moore
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name ServersUSENIX LISA
2001
B. Huffaker
M. Fomenkov
D. Moore
k. claffy
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performancePassive and Active Measurement Conference (PAM)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)

Fomenkova, M.

YearAuthor(s)TitlePublication
2007
H. Kim
K. Claffy
M. Fomenkova
N. Browlee
D. Barman
M. Faloutsos
Comparison of Internet Traffic Classification ToolsIMRG WACI

Ford, P.

YearAuthor(s)TitlePublication
1993
B. Aiken
H.-W. Braun
P. Ford
NSF implementation plan for interim NRENJournal on High Speed Networking
1993
H.-W. Braun
P. Ford
Y. Rekhter
CIDR and the evolution of the InternetInternational Networking Conference (INET)

Fraleigh, C.

YearAuthor(s)TitlePublication
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network

Franklin, J.

YearAuthor(s)TitlePublication
2007
J. Franklin
A. Perrig
V. Paxson
S. Savage
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsACM Conference on Computer and Communications Security (CCS)

Freedman, M. J.

YearAuthor(s)TitlePublication
2005
M. J. Freedman
M. Vutukuru
N. Feamster
H. Balakrishnan
Geographic Locality of IP PrefixesInternet Measurement Conference (IMC)

Fukuda, K.

YearAuthor(s)TitlePublication
2008
K. Cho
K. Fukuda
H. Esaki
A. Kato
Observing Slow Crustal Movement in Residential User TrafficACM CoNEXT

Fulton, R.

YearAuthor(s)TitlePublication
2000
N. Brownlee
R. Fulton
Kawaihiko and the third-quartile day [traffic management]CAIDA

Ganjali, Y.

YearAuthor(s)TitlePublication
2010
P. Gill
Y. Ganjali
B. Wong
Dude, where's that IP? Circumventing measurement-based IP geolocationUsenix Security Symposium

Gao, L.

YearAuthor(s)TitlePublication
2000
L. Gao On inferring autonomous system relationships in the InternetIEEE Global Internet Symposium

Gao, R.

YearAuthor(s)TitlePublication
2004
A. Broido
Y. Hyun
R. Gao
k. claffy
Their share: diversity and disparity in IP trafficPassive and Active Measurement Conference (PAM)
2004
P. Verkaik
A. Broido
k. claffy
R. Gao
Y. Hyun
R. van der Pol
Beyond CIDR AggregationCAIDA

Gefferth, A.

YearAuthor(s)TitlePublication
2008
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-PeerSystems and Computers in Japan
2006
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Identification and Analysis of Peer-to-Peer TrafficJournal of Communications

Gehrke, J.

YearAuthor(s)TitlePublication
2006
A. Machanavajjhala
J. Gehrke
D. Kifer
M. Venkitasubramaniam
l-Diversity: Privacy Beyond k-Anonymity.IEEE International Conference on Data Engineering (ICDE)

Getoor, L.

YearAuthor(s)TitlePublication
2007
E. Zheleva
L. Getoor
Preserving the Privacy of Sensitive Relationships in Graph DataACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD)

Gill, P.

YearAuthor(s)TitlePublication
2010
P. Gill
Y. Ganjali
B. Wong
Dude, where's that IP? Circumventing measurement-based IP geolocationUsenix Security Symposium

Giovannetti, E.

YearAuthor(s)TitlePublication
2003
E. Giovannetti
C. A. Ristuccia
Estimating Market Power in the Internet Backbone Using Band-X dataCambridge Working Papers in Economics

Goodwin, T.

YearAuthor(s)TitlePublication
1996
C. Davis
P. Vixie
T. Goodwin
I. Dickinson
A Means for Expressing Location Information in the Domain Name SystemRFC Editor

Govindan, R.

YearAuthor(s)TitlePublication
2002
Z. Mao
R. Govindan
G. Varghese
R. H. Katz
Route Flap Damping Exacerbates Internet Routing ConvergenceACM SIGCOMM
2001
D. Chang
R. Govindan
J. Heidemann
An Empirical Study of Router Response to Large BGP Routing Table LoadUSC/Information Sciences Institute

Greenstein, B.

YearAuthor(s)TitlePublication
2007
J. Pang
B. Greenstein
R. Gummadi
S. Seshan
D. Wetherall
802.11 user fingerprintingACM MobiCom

Griffin, T.

YearAuthor(s)TitlePublication
2002
T. Griffin
G. Wilfong
Analysis of the MED Oscillation Problem in BGPIEEE International Conference on Network Protocols (ICNP)
2002
T. Griffin
G. Wilfong
On the Correctness of IBGP ConfigurationACM SIGCOMM

Griffin, T. G.

YearAuthor(s)TitlePublication
2002
T. G. Griffin What is the Sound of One Route Flapping?Dartmouth Summer Workshop

Gringoli, F.

YearAuthor(s)TitlePublication
2008
M. Dusi
M. Crotti
F. Gringoli
L. Salgarelli
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical FingerprintingComputer Networks
2008
M. Dusi
F. Gringoli
L. Salgarelli
A Preliminary Look at the Privacy of SSH TunnelsIEEE International Conference on Communications (ICC)
2007
M. Crotti
M. Dusi
F. Gringoli
L. Salgarelli
Traffic Classification through Simple Statistical FingerprintingACM SIGCOMM

Groschwitz, N.

YearAuthor(s)TitlePublication
1994
N. Groschwitz
G. Polyzos
A Time-Series Model of Long-Term Traffic on the NSFNET BackboneIEEE International Conference on Communications (ICC)

Gross, A

YearAuthor(s)TitlePublication
1995
k. claffy
A Gross
H.-W. Braun
Measured interference of security mechanisms with network performanceInternational Networking Conference (INET)

Grunwald, D.

YearAuthor(s)TitlePublication
2007
D. Sicker
P. Ohm
D. Grunwald
Legal issues surrounding monitoring during network researchACM SIGCOMM IMC

Gruteser, M.

YearAuthor(s)TitlePublication
2007
B. Hoh
M. Gruteser
H. Xiong
A. Alrabady
Preserving privacy in gps traces via uncertainty-aware path cloakingACM Conference on Computer and Communications Security (CCS)

Gueye, B.

YearAuthor(s)TitlePublication
2011
I. Poese
S. Uhlig
M.A. Kaafar
B. Donnet
B. Gueye
IP geolocation databases: unreliable?ACM SIGCOMM Computer Communication Review
2008
S. S. Siwpersad
B. Gueye
S. Uhlig
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hostsPassive and Active Network Measurement Workshop (PAM)
2007
B. Gueye
S. Uhlig
S. Fdida
Investigating the Imprecision of IP Block-based GeolocationPassive and Active Network Measurement Workshop (PAM)
2006
B. Gueye
S. Uhlig
A. Ziviani
S. Fdida
Leveraging Buffering Delay Estimation for Geolocation of Internet HostsInternational Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference
2004
B. Gueye
A. Ziviani
M. Crovella
S. Fdida
Constraint-based Geolocation of Internet HostsIEEE/ACM Transactions on Networking

Gummadi, R.

YearAuthor(s)TitlePublication
2007
J. Pang
B. Greenstein
R. Gummadi
S. Seshan
D. Wetherall
802.11 user fingerprintingACM MobiCom

Gun Sirer, E.

YearAuthor(s)TitlePublication
2007
B. Wong
I. Stoyanov
E. Gun Sirer
Octant: A Comprehensive Framework for the Geolocalization of Internet HostsSymposium on Networked System Design and Implementation (NSDI)

Gunatilaka, A.

YearAuthor(s)TitlePublication
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
A. Gunatilaka
B. Ristic
Internet Host Geolocation Using Maximum Likelihood Estimation TechniqueIEEE International Conference on Advanced Information Networking and Applications (AINA)

Guo, C.

YearAuthor(s)TitlePublication
2009
C. Guo
Y. Liu
W. Shen
H.J. Wang
Q. Yu
Y. Zhang
Mining the Web and the Internet for Accurate IP Address GeolocationsIEEE Conference on Computer Communications (INFOCOM)

Guttag, J.

YearAuthor(s)TitlePublication
2003
G. Tan
M. Poletto
J. Guttag
F. Kaashoek
Role Classification of Hosts within Enterprise Networks based on Connection PatternsUSENIX

Haffner, P.

YearAuthor(s)TitlePublication
2005
P. Haffner
S. Sen
O. Spatscheck
D. Wang
Acas: Automated Construction of Application SignaturesACM SIGCOMM

Haga, P.

YearAuthor(s)TitlePublication
2011
S. Laki
P. Matray
P. Haga
T. Sebok
I. Csabai
G. Vattay
Spotter: A Model Based Active Geolocation ServiceINFOCOM
2010
S. Laki
P. Matray
P. Haga
I. Csabai
G. Vattay
A Model Based Approach for Improving Router GeolocationComputer Networks: The International Journal of Computer and Telecommunications Networking

Halak, J.

YearAuthor(s)TitlePublication
2007
S. Ubik
P. Zejdl
J. Halak
Real-time anonymization in passive network monitoringInternational Conference on Networking and Services (ICNS)

Hall, M.

YearAuthor(s)TitlePublication
2004
A. McGregor
M. Hall
Brunskill J.
Lorier P.
Flow Clustering Using Machine Learning TechniquesPassive and Active Measurement Conference (PAM)

Hansen, M.

YearAuthor(s)TitlePublication
2008
A. Pfitzmann
M. Hansen
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for TerminologyTech Report

Har-Peled, S.

YearAuthor(s)TitlePublication
1999
Y. Afek
A. Bremler-Barr
S. Har-Peled
Routing with a ClueACM SIGCOMM

Harvan, M.

YearAuthor(s)TitlePublication
2006
M. Harvan
J. Schonwalder
Prefix- and Lexicographical-order-preserving IP Address AnonymizationIEEE/IFIP Network Operations and Management Symposium (NOMS)

Heidemann, J.

YearAuthor(s)TitlePublication
2012
Z. Hu
J. Heidemann
Y. Pradkin
Towards geolocation of millions of IP addressesProc. ACM Internet measurement conference (IMC)
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
J. Pepin
Estimating P2P Traffic Volume at USCUSC/Information Sciences Institute
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
Inherent Behaviors for On-Line Detection of Peer-to-Peer SharingIEEE Global Internet Symposium
2005
A. Hussain
G. Bartlett
Y. Pryadkin
J. Heidemann
C. Papadopoulos
J. Bannister
Experiences with a continuous network tracing infrastructureACM SIGCOMM MineNet
2001
D. Chang
R. Govindan
J. Heidemann
An Empirical Study of Router Response to Large BGP Routing Table LoadUSC/Information Sciences Institute

Hellings, G.

YearAuthor(s)TitlePublication
2007
W. Yurcik
C. Woolam
G. Hellings
L. Khan
B. Thuraisingham
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis TradeoffsACM Computing Research Repository (CoRR)

Hoffman, E.

YearAuthor(s)TitlePublication
1996
E. Hoffman
k. claffy
Geographic addressing reconsideredCoordination and Administration of the Internet Workshop
1996
T. Munzner
E. Hoffman
k. claffy
B. Fenner
Visualizing the global topology of the MBoneIEEE Symposium on Information Visualization
1996
E. Hoffman
k. claffy
Address administration in IPv6IEEE Symposium on Information Visualization

Hoh, B.

YearAuthor(s)TitlePublication
2007
B. Hoh
M. Gruteser
H. Xiong
A. Alrabady
Preserving privacy in gps traces via uncertainty-aware path cloakingACM Conference on Computer and Communications Security (CCS)

Holzhauer, F.

YearAuthor(s)TitlePublication
2007
F. Holzhauer IP GeolocationInternet Measurement seminar

Hu, Z.

YearAuthor(s)TitlePublication
2012
Z. Hu
J. Heidemann
Y. Pradkin
Towards geolocation of millions of IP addressesProc. ACM Internet measurement conference (IMC)

Huang, C.

YearAuthor(s)TitlePublication
2011
Y. Wang
D. Burgener
M. Flores
A. Kuzmanovic
C. Huang
Towards Street-Level Client-Independent IP GeolocationUsenix

Huffaker, B.

YearAuthor(s)TitlePublication
2011
B. Huffaker
M. Fomenkov
kc claffy
Geocompare: a comparison of public and commercial geolocation databasesCAIDA
2004
K. Cho
M. Luckie
B. Huffaker
Identifying IPv6 Network Problems in the Dual-Stack WorldACM SIGCOMM
2003
T. Lee
B. Huffaker
M. Fomenkov
k. claffy
On the problem of optimization of DNS root servers' placementPassive and Active Measurement Conference (PAM)
2002
B. Huffaker
M. Fomenkov
D. J. Plummer
D. Moore
k. claffy
Distance Metrics in the InternetIEEE International Telecommunications Symposium
2002
B. Huffaker
D. Plummer
D. Moore
k. claffy
Topology discovery by active probingSymposium on Applications and the Internet (SAINT)
2001
M. Fomenkov
k. claffy
B. Huffaker
D. Moore
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name ServersUSENIX LISA
2001
B. Huffaker
M. Fomenkov
D. Moore
k. claffy
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performancePassive and Active Measurement Conference (PAM)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to visualize the Internet multicast backboneInternational Networking Conference (INET)
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to Visualize the Internet Multicast BackboneInternational Networking Conference (INET)
1998
B. Huffaker
J. Jung
E. Nemeth
D. Wessels
k. claffy
Visualization of the growth and topology of the NLANR caching hierarchyInternational WWW Caching Workshop

Huntoon, G.

YearAuthor(s)TitlePublication
2001
M. Mathis
G. Huntoon
k. claffy
Traffic dynamics testbedLarge Scale Networking (LSN) Workshop

Hussain, A.

YearAuthor(s)TitlePublication
2005
A. Hussain
G. Bartlett
Y. Pryadkin
J. Heidemann
C. Papadopoulos
J. Bannister
Experiences with a continuous network tracing infrastructureACM SIGCOMM MineNet

Huston, G.

YearAuthor(s)TitlePublication
2001
G. Huston Commentary on Inter-Domain Routing in the Internet, RFC 3221The Internet Society
2001
G. Huston Analyzing the Internet's BGP Routing TableThe Internet Protocol Journal

Hyun, Y.

YearAuthor(s)TitlePublication
2004
A. Broido
Y. Hyun
R. Gao
k. claffy
Their share: diversity and disparity in IP trafficPassive and Active Measurement Conference (PAM)
2004
P. Verkaik
A. Broido
k. claffy
R. Gao
Y. Hyun
R. van der Pol
Beyond CIDR AggregationCAIDA
2003
Y. Hyun
A. Broido
k. claffy
On Third-party Addresses in Traceroute PathsPassive and Active Measurement Conference (PAM)
2003
Y. Hyun
A. Broido
k. claffy
Traceroute and BGP AS Path IncongruitiesCAIDA

Iannaccone, G.

YearAuthor(s)TitlePublication
2002
G. Iannaccone
C. Chuah
R. Mortier
S. Bhattacharyya
C. Diot
Analysis of link failures in an IP backboneACM SIGCOMM Internet Measurement Workshop

Iliofotou, M.

YearAuthor(s)TitlePublication
2008
M. Iliofotou
P. Pappu
M. Faloutsos
Graption: Automated Detection of P2P Applications Using Traffic Dispersion GraphsTech Report
2007
M. Iliofotou
P. Pappu
M. Faloutsos
M. Mitzenmacher
S. Singh
G. Varghese
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware ImplementationUniversity of California, Riverside

isp-bgpdnswg@nicwg.org

YearAuthor(s)TitlePublication
2002
isp-bgpdnswg@nicwg.org Enhancing the Security of Name Resolution and Inter-Domain Internet RoutingISP BGPDNS WG

J., Brunskill

YearAuthor(s)TitlePublication
2004
A. McGregor
M. Hall
Brunskill J.
Lorier P.
Flow Clustering Using Machine Learning TechniquesPassive and Active Measurement Conference (PAM)

J., Walpole

YearAuthor(s)TitlePublication
2005
Chang Feng W.
Chang F.
Chi Feng W.
Walpole J.
A Traffic Characterization of Popular on-line GamesIEEE/ACM Transactions on Networking

Jahanian, F.

YearAuthor(s)TitlePublication
2000
C. Labovitz
A. Ahuja
A. Bose
F. Jahanian
An Experimental Study of Internet Routing ConvergenceMicrosoft Research
1999
C. Labovitz
G. R. Malan
F. Jahanian
Origins of Internet Routing InstabilityIEEE INFOCOM
1998
C. Labovitz
A. Ahuja
F. Jahanian
Experimental Study of Internet Stability and Wide-Area Backbone FailuresUniversity of Michigan
1998
C. Labovitz
G. R. Malan
F. Jahanian
Internet Routing InstabilityIEEE/ACM Transactions on Networking

Jamin, S.

YearAuthor(s)TitlePublication
2003
H. Chang
S. Jamin
W. Willinger
Internet Connectivity at the AS-level: An Optimization-Driven Modeling ApproachACM SIGCOMM Workshop on MoMeTools

Jeannin, M.

YearAuthor(s)TitlePublication
2005
L. Bernaille
A. Soule
M. Jeannin
K. Salamatian
Blind Application Recognition Through Behavioral ClassificationParis

Johari, R.

YearAuthor(s)TitlePublication
2003
R. Johari
J. Tsitsiklis
Routing and Peering in a Competitive InternetMIT

John, J. P.

YearAuthor(s)TitlePublication
2006
E. Katz-Bassett
J. P. John
A. Krishnamurthy
D. Wetherall
T. Anderson
Y. Chawathe
Towards IP geolocation using delay and topology measurementsInternet Measurement Conference (IMC)

John, W.

YearAuthor(s)TitlePublication
2008
W. John
S. Tafvelin
Heuristics to Classify Internet Backbone Traffic based on Connection PatternsInternational Conference on Information Networking (ICOIN)
2008
W. John
S. Tafvelin
T. Olovsson
Trends and Differneces in Connections Behavior within Classes of Internet Backbone TrafficPassive and Active Measurement Conference (PAM)
2007
W. John
S. Tafvelin
Analysis of Internet Backbone Traffic and Header Anomalies ObservedACM SIGCOMM IMC

Johnson, D.

YearAuthor(s)TitlePublication
2004
Z. Mao
D. Johnson
J. Rexford
J. Wang
R. Katz
Scalable and Accurate Identification of AS-level Forwarding PathsIEEE INFOCOM

Jung, J.

YearAuthor(s)TitlePublication
1998
B. Huffaker
J. Jung
E. Nemeth
D. Wessels
k. claffy
Visualization of the growth and topology of the NLANR caching hierarchyInternational WWW Caching Workshop
1998
Huffaker B.
J. Jung
D. Wessels
k. claffy
Visualization of the Growth and Topology of the NLANR Caching HierarchyInternational WWW Caching Workshop

Kaafar, M.A.

YearAuthor(s)TitlePublication
2011
I. Poese
S. Uhlig
M.A. Kaafar
B. Donnet
B. Gueye
IP geolocation databases: unreliable?ACM SIGCOMM Computer Communication Review
2009
C. Castelluccia
M.A. Kaafar
P. Manils
D. Perito
Geolocalization of proxied services and its application to fast-flux hidden serversIMC

Kaashoek, F.

YearAuthor(s)TitlePublication
2004
F. Dabek
R. Cox
F. Kaashoek
R. Morris
Vivaldi: A Decentralized Network Coordinate SystemSIGCOMM
2003
G. Tan
M. Poletto
J. Guttag
F. Kaashoek
Role Classification of Hosts within Enterprise Networks based on Connection PatternsUSENIX

Kaashoek, M. F.

YearAuthor(s)TitlePublication
2003
N. Feamster
D. G. Andersen
H. Balakrishnan
M. F. Kaashoek
Measuring the Effects of Internet Path Faults on Reactive RoutingACM SIGMETRICS

Kalmanek, C.

YearAuthor(s)TitlePublication
2002
J. Merwe
S. Sen
C. Kalmanek
Streaming Video Traffic: Characterization and Network ImpactWCW

Karagiannis, T.

YearAuthor(s)TitlePublication
2007
T. Karagiannis
K. Papgiannaki
N. Taft
M. Faloutso
Profiling the End HostPassive and Active Measurement Conference (PAM)
2005
T. Karagiannis
K. Papagiannaki
M. Faloutsos
BLINC Multilevel Traffic Classification in the DarkACM SIGCOMM
2004
T. Karagiannis
A. Broido
N. Brownless
K. Claffy
M. Faloutsos
Is P2P Dying or Just HidingIEEE GLOBECOM
2004
T. Karagiannis
A. Broido
M. Faloutsos
K. Claffy
Transport Layer Identification of P2p TrafficACM SIGCOMM
2004
T. Karagiannis
M. Molle
M. Faloutsos
A. Broido
A Nonstationary Poisson View of Internet TrafficIEEE INFOCOM

Karunasekera, S.

YearAuthor(s)TitlePublication
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency MeasurementsAustralasian Conference on Computer Science (ASCS)
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
A. Gunatilaka
B. Ristic
Internet Host Geolocation Using Maximum Likelihood Estimation TechniqueIEEE International Conference on Advanced Information Networking and Applications (AINA)

Kato, A.

YearAuthor(s)TitlePublication
2008
K. Cho
K. Fukuda
H. Esaki
A. Kato
Observing Slow Crustal Movement in Residential User TrafficACM CoNEXT

Katz, R.

YearAuthor(s)TitlePublication
2004
Z. Mao
D. Johnson
J. Rexford
J. Wang
R. Katz
Scalable and Accurate Identification of AS-level Forwarding PathsIEEE INFOCOM
2002
L. Subramanian
S. Agarwal
J. Rexford
R. Katz
Characterizing the Internet Hierarchy from Multiple Vantage PointsIEEE INFOCOM

Katz, R. H.

YearAuthor(s)TitlePublication
2003
Z. Mao
J. Rexford
J. Wang
R. H. Katz
Towards an Accurate AS-Level Traceroute ToolACM SIGCOMM
2002
Z. Mao
R. Govindan
G. Varghese
R. H. Katz
Route Flap Damping Exacerbates Internet Routing ConvergenceACM SIGCOMM

Katz-Bassett, E.

YearAuthor(s)TitlePublication
2009
H.V. Madhyasth
E. Katz-Bassett
T. Anderson
A. Krishnamurthy
A. Venkataramani
iPlane Nano: path prediction for peer-to-peer applicationsProc. USENIX symp. on Networked systems design and implementation (NSDI)
2006
E. Katz-Bassett
J. P. John
A. Krishnamurthy
D. Wetherall
T. Anderson
Y. Chawathe
Towards IP geolocation using delay and topology measurementsInternet Measurement Conference (IMC)

Keromytis, A.

YearAuthor(s)TitlePublication
2008
S. Coull
C. Wright
F. Monrose
A. Keromytis
M. Reiter
Taming the Devil: Techniques for Evaluating Anonymized Network DataNDSS

Keys, K.

YearAuthor(s)TitlePublication
2004
C. Estan
K. Keys
D. Moore
G. Varghese
Building a Better NetFlowACM SIGCOMM
2003
M. Fomenkov
K. Keys
D. Moore
k. claffy
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sitesCAIDA
2001
D. Moore
K. Keys
R. Koga
E. Lagache
k. claffy
CoralReef software suite as a tool for system and network administratorsUSENIX LISA
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)

Khan, L.

YearAuthor(s)TitlePublication
2007
W. Yurcik
C. Woolam
G. Hellings
L. Khan
B. Thuraisingham
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis TradeoffsACM Computing Research Repository (CoRR)

Khan, M.

YearAuthor(s)TitlePublication
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network

Kifer, D.

YearAuthor(s)TitlePublication
2006
A. Machanavajjhala
J. Gehrke
D. Kifer
M. Venkitasubramaniam
l-Diversity: Privacy Beyond k-Anonymity.IEEE International Conference on Data Engineering (ICDE)

Kim, H.

YearAuthor(s)TitlePublication
2007
H. Kim
K. Claffy
M. Fomenkova
N. Browlee
D. Barman
M. Faloutsos
Comparison of Internet Traffic Classification ToolsIMRG WACI

Kim, M. Hong, J.

YearAuthor(s)TitlePublication
2008
B. Park
Y. Won
M. Hong, J. Kim
Towards Automated Application Signature GenerationIEEE/IFIP Network Operations and Management Symposium (NOMS)

King, R.

YearAuthor(s)TitlePublication
2003
A. Broido
R. King
E. Nemeth
k. claffy
Radon Spectroscopy of Inter-Packet DelayIEEE High-Speeding Networking Workshop (HSN)

Koga, R.

YearAuthor(s)TitlePublication
2001
D. Moore
K. Keys
R. Koga
E. Lagache
k. claffy
CoralReef software suite as a tool for system and network administratorsUSENIX LISA
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)

Koukis, D.

YearAuthor(s)TitlePublication
2006
D. Koukis
S. Antonatos
K.G. Anagnostakis
On the Privacy Risks of Publishing Anonymized IP Network Traces.Communications and Multimedia Security
2006
D. Koukis
S. Antonatos
D. Antoniades
E.P. Markatos
P. Trimintzios
A Generic Anonymization Framework for Network TrafficIEEE International Conference on Communications (ICC)

Kreibich, C.

YearAuthor(s)TitlePublication
2006
J. Ma
K. Levchenko
C. Kreibich
S. Savage
G. Voelker
Unexpected Means of Protocol InferenceACM SIGCOMM IMC

Krishnamurthy, A.

YearAuthor(s)TitlePublication
2009
H.V. Madhyasth
E. Katz-Bassett
T. Anderson
A. Krishnamurthy
A. Venkataramani
iPlane Nano: path prediction for peer-to-peer applicationsProc. USENIX symp. on Networked systems design and implementation (NSDI)
2006
E. Katz-Bassett
J. P. John
A. Krishnamurthy
D. Wetherall
T. Anderson
Y. Chawathe
Towards IP geolocation using delay and topology measurementsInternet Measurement Conference (IMC)

Kulkarni, S.

YearAuthor(s)TitlePublication
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency MeasurementsAustralasian Conference on Computer Science (ASCS)
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
A. Gunatilaka
B. Ristic
Internet Host Geolocation Using Maximum Likelihood Estimation TechniqueIEEE International Conference on Advanced Information Networking and Applications (AINA)

Kumar, V.

YearAuthor(s)TitlePublication
2003
A. Lazarevic
L. Ertoz
V. Kumar
A. Ozgur
J. Srirvastava
A Comparative Study of Anomaly Detection Schemes in Network Intrusion DetectionSIAM

Kuzmanovic, A.

YearAuthor(s)TitlePublication
2011
Y. Wang
D. Burgener
M. Flores
A. Kuzmanovic
C. Huang
Towards Street-Level Client-Independent IP GeolocationUsenix

Labovitz, C.

YearAuthor(s)TitlePublication
2001
C. Labovitz
A. Ahuja
R. Wattenhofer
V. Srinivasan
The Impact of Internet Policy and Topology on Delayed Routing ConvergenceIEEE INFOCOM
2000
C. Labovitz
A. Ahuja
A. Bose
F. Jahanian
An Experimental Study of Internet Routing ConvergenceMicrosoft Research
1999
C. Labovitz
G. R. Malan
F. Jahanian
Origins of Internet Routing InstabilityIEEE INFOCOM
1998
C. Labovitz
A. Ahuja
F. Jahanian
Experimental Study of Internet Stability and Wide-Area Backbone FailuresUniversity of Michigan
1998
C. Labovitz
G. R. Malan
F. Jahanian
Internet Routing InstabilityIEEE/ACM Transactions on Networking

Lagache, E.

YearAuthor(s)TitlePublication
2001
D. Moore
K. Keys
R. Koga
E. Lagache
k. claffy
CoralReef software suite as a tool for system and network administratorsUSENIX LISA
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)

Lakhina, A.

YearAuthor(s)TitlePublication
2005
A. Lakhina
M. Crovella
C. Diot
Mining Anomalies Using Traffic Feature DistributionsACM SIGCOMM
2003
A. Lakhina
J.W. Byers
M. Crovella
I. Matta
On the geographic location of Internet resourcesSelected Areas in Communications, Volume 21

Laki, S.

YearAuthor(s)TitlePublication
2011
S. Laki
P. Matray
P. Haga
T. Sebok
I. Csabai
G. Vattay
Spotter: A Model Based Active Geolocation ServiceINFOCOM
2010
S. Laki
P. Matray
P. Haga
I. Csabai
G. Vattay
A Model Based Approach for Improving Router GeolocationComputer Networks: The International Journal of Computer and Telecommunications Networking

Lakkaraju, K.

YearAuthor(s)TitlePublication
2006
A. Slagell
K. Lakkaraju
K. Luo
FLAIM: A Multi-level Anonymization Framework for Computer and Network LogsUSENIX LISA

Lazarevic, A.

YearAuthor(s)TitlePublication
2003
A. Lazarevic
L. Ertoz
V. Kumar
A. Ozgur
J. Srirvastava
A Comparative Study of Anomaly Detection Schemes in Network Intrusion DetectionSIAM

Lee, J.

YearAuthor(s)TitlePublication
2006
R. Pang
M. Allman
V. Paxson
J. Lee
The devil and packet trace anonymizationACM SIGCOMM Computer Communication Review

Lee, T.

YearAuthor(s)TitlePublication
2003
T. Lee
B. Huffaker
M. Fomenkov
k. claffy
On the problem of optimization of DNS root servers' placementPassive and Active Measurement Conference (PAM)

Levchenko, K.

YearAuthor(s)TitlePublication
2006
J. Ma
K. Levchenko
C. Kreibich
S. Savage
G. Voelker
Unexpected Means of Protocol InferenceACM SIGCOMM IMC

Levitt, K.

YearAuthor(s)TitlePublication
2007
R. Crawford
M. Bishop
B. Bhumiratana
L. Clark
K. Levitt
Sanitization models and their limitationsNew Security Paradigms Workshop (NSPW)
2006
M. Bishop
R. Crawford
B. Bhumiratana
L. Clark
K. Levitt
Some Problems in Sanitizing Network DataIEEE WETICE

Li, N.

YearAuthor(s)TitlePublication
2007
N. Li
T. Li
S. Venkatasubramanian
t-Closeness: Privacy Beyond k-Anonymity and l-DiversityIEEE International Conference on Data Engineering (ICDE)

Li, T.

YearAuthor(s)TitlePublication
2007
N. Li
T. Li
S. Venkatasubramanian
t-Closeness: Privacy Beyond k-Anonymity and l-DiversityIEEE International Conference on Data Engineering (ICDE)

Li, Xing

YearAuthor(s)TitlePublication
2006
Qianli Zhang
Xing Li
An IP Address Anonymization Scheme with Multiple Access LevelsICOIN

Li, Y.

YearAuthor(s)TitlePublication
2006
K. Luo
Y. Li
C. Ermopoulos
W. Yurcik
A. Slagell
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process AccountingTech Report
2005
Y. Li
Adam Slagell
K. Luo
W. Yurcik
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for SecurityInternational Conference on Telecommunication Systems, Modeling and Analysis
2005
K. Luo
Y. Li
A. Slagell
W. Yurcik
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure SharingFLOCON - Network Flow Analysis Workshop

Lincoln, P.

YearAuthor(s)TitlePublication
2004
P. Lincoln
P. Porras
V. Shmatikov
Privacy-Preserving Sharing and Correlation of Security AlertsUSENIX Security Symposium

Lindh, T.

YearAuthor(s)TitlePublication
2003
T. Lindh
N. Brownlee
Integrating Active Methods and Flow Meters - an implementation using NeTraMetPassive and Active Measurement Conference (PAM)

Liu, Y.

YearAuthor(s)TitlePublication
2013
Y. Tian
R. Dey
Y. Liu
K.W. Ross
Topology mapping and geolocating for China's InternetIEEE Trans. On Parallel and Distributed Systems
2009
C. Guo
Y. Liu
W. Shen
H.J. Wang
Q. Yu
Y. Zhang
Mining the Web and the Internet for Accurate IP Address GeolocationsIEEE Conference on Computer Communications (INFOCOM)

Lorch, J.R.

YearAuthor(s)TitlePublication
2009
S. Agarwal
J.R. Lorch
Matchmaking for online games and other latency-sensitive P2P systemsComputer Communication Review

Luckie, M.

YearAuthor(s)TitlePublication
2004
K. Cho
M. Luckie
B. Huffaker
Identifying IPv6 Network Problems in the Dual-Stack WorldACM SIGCOMM

Luo, K.

YearAuthor(s)TitlePublication
2006
A. Slagell
K. Lakkaraju
K. Luo
FLAIM: A Multi-level Anonymization Framework for Computer and Network LogsUSENIX LISA
2006
K. Luo
Y. Li
C. Ermopoulos
W. Yurcik
A. Slagell
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process AccountingTech Report
2005
Y. Li
Adam Slagell
K. Luo
W. Yurcik
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for SecurityInternational Conference on Telecommunication Systems, Modeling and Analysis
2005
K. Luo
Y. Li
A. Slagell
W. Yurcik
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure SharingFLOCON - Network Flow Analysis Workshop

Lyles, B.

YearAuthor(s)TitlePublication
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network

Ma, J.

YearAuthor(s)TitlePublication
2006
J. Ma
K. Levchenko
C. Kreibich
S. Savage
G. Voelker
Unexpected Means of Protocol InferenceACM SIGCOMM IMC

Machanavajjhala, A.

YearAuthor(s)TitlePublication
2006
A. Machanavajjhala
J. Gehrke
D. Kifer
M. Venkitasubramaniam
l-Diversity: Privacy Beyond k-Anonymity.IEEE International Conference on Data Engineering (ICDE)

Madhukar, A.

YearAuthor(s)TitlePublication
2006
A. Madhukar
C. Williamson
A Longitudinal Study of P2P Traffic ClassificationMASCOTS

Madhyasth, H.V.

YearAuthor(s)TitlePublication
2009
H.V. Madhyasth
E. Katz-Bassett
T. Anderson
A. Krishnamurthy
A. Venkataramani
iPlane Nano: path prediction for peer-to-peer applicationsProc. USENIX symp. on Networked systems design and implementation (NSDI)

Maggs, B.

YearAuthor(s)TitlePublication
2012
B. Eriksson
P. Barford
B. Maggs
R. Nowak
Posit: a lightweight approach for IP geolocationACM SIGMETRICS Performance Evaluation Review

Magharei, N.

YearAuthor(s)TitlePublication
2010
A. Rasti
N. Magharei
R. Rejaie
W. Willinger
Eyeball ASes: From Geography to ConectivityInternet Measurement Conference (IMC)

Mahajan, R.

YearAuthor(s)TitlePublication
2002
R. Mahajan
D. Wetherall
T. Anderson
Understanding BGP MisconfigurationACM SIGCOMM
2002
D. Spring
R. Mahajan
D. Wetherall
Measuring ISP Topologies with RocketfuelACM SIGCOMM

Mahanti, A.

YearAuthor(s)TitlePublication
2006
J. Erman
A. Mahanti
M. Arlitt
Internet Traffic Identification using Machine LearningIEEE GLOBECOM
2006
J. Erman
M. Arlitt
A. Mahanti
Traffic Classification Using Clustering AlgorithmsACM SIGCOMM

Maier, G.

YearAuthor(s)TitlePublication
2009
G. Maier
A. Feldmann
V. Paxson
M. Allman
On Dominant Characteristics of Residential Broadband Internet TrafficACM SIGCOMM IMC

Malan, G. R.

YearAuthor(s)TitlePublication
1999
C. Labovitz
G. R. Malan
F. Jahanian
Origins of Internet Routing InstabilityIEEE INFOCOM
1998
C. Labovitz
G. R. Malan
F. Jahanian
Internet Routing InstabilityIEEE/ACM Transactions on Networking

Malomsoky, S.

YearAuthor(s)TitlePublication
2008
G. Szabo
D. Orincasy
S. Malomsoky
I. Szabo
On the Validation of Traffic Classification AlgorithmsPassive and Active Measurement Conference (PAM)

Manhanti, A.

YearAuthor(s)TitlePublication
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Offline/realitme Traffic Classification Using Semi-supervised LearningPerform Eval
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network CoreWorld Wide Web (WWW) Conference

Manils, P.

YearAuthor(s)TitlePublication
2009
C. Castelluccia
M.A. Kaafar
P. Manils
D. Perito
Geolocalization of proxied services and its application to fast-flux hidden serversIMC

Mankin, A.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM

Mao, Z.

YearAuthor(s)TitlePublication
2004
Z. Mao
D. Johnson
J. Rexford
J. Wang
R. Katz
Scalable and Accurate Identification of AS-level Forwarding PathsIEEE INFOCOM
2003
Z. Mao
J. Rexford
J. Wang
R. H. Katz
Towards an Accurate AS-Level Traceroute ToolACM SIGCOMM
2002
Z. Mao
R. Govindan
G. Varghese
R. H. Katz
Route Flap Damping Exacerbates Internet Routing ConvergenceACM SIGCOMM

Mark, B. L.

YearAuthor(s)TitlePublication
2009
I. Youn
B. L. Mark
D. Richards
Statistical geolocation of Internet hostsInternational Conference on Computer Communications and Networks (ICCCN)

Markatos, E.

YearAuthor(s)TitlePublication
2006
D. Antoniades
M. Polychronakis
S. Antonatos
E. Markatos
S. Ubik
Appmon: An Application for Accurate per Application Network Traffic CharacterizationBroadBand Europe

Markatos, E.P.

YearAuthor(s)TitlePublication
2006
D. Koukis
S. Antonatos
D. Antoniades
E.P. Markatos
P. Trimintzios
A Generic Anonymization Framework for Network TrafficIEEE International Conference on Communications (ICC)

Massey, D.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM

Masson, G.

YearAuthor(s)TitlePublication
2006
C. Wright
F. Monrose
G. Masson
On Inferring Application Protocol Behaviors in Encrypted Network TrafficJournal of Machine Learning Research

Mathis, M.

YearAuthor(s)TitlePublication
2001
M. Mathis
G. Huntoon
k. claffy
Traffic dynamics testbedLarge Scale Networking (LSN) Workshop

Matray, P.

YearAuthor(s)TitlePublication
2011
S. Laki
P. Matray
P. Haga
T. Sebok
I. Csabai
G. Vattay
Spotter: A Model Based Active Geolocation ServiceINFOCOM
2010
S. Laki
P. Matray
P. Haga
I. Csabai
G. Vattay
A Model Based Approach for Improving Router GeolocationComputer Networks: The International Journal of Computer and Telecommunications Networking

Matta, I.

YearAuthor(s)TitlePublication
2003
A. Lakhina
J.W. Byers
M. Crovella
I. Matta
On the geographic location of Internet resourcesSelected Areas in Communications, Volume 21

Mavrommatiss, P.

YearAuthor(s)TitlePublication
2006
F. Constantinou
P. Mavrommatiss
Identifying Known and Unknown Peer-to-Peer TrafficIEEE NCA

Maziku, H.

YearAuthor(s)TitlePublication
2012
H. Maziku
S. Han, K. Shetty
T. Rogers
Enhancing the classification accuracy of IP geolocationMilitary Communications Conf. (MILCOM)

McCreary, S.

YearAuthor(s)TitlePublication
2000
S. McCreary
k. claffy
Trends in wide area IP traffic patterns - A view from Ames Internet ExchangeITC Specialist Seminar
1999
k. claffy
S. McCreary
Internet measurement and data analysis: passive and active measurementAmerican Statistical Association

McGregor, A.

YearAuthor(s)TitlePublication
2004
A. McGregor
M. Hall
Brunskill J.
Lorier P.
Flow Clustering Using Machine Learning TechniquesPassive and Active Measurement Conference (PAM)

McRobb, D.

YearAuthor(s)TitlePublication
1999
k. claffy
T. Monk
D. McRobb
Internet TomographyCAIDA

Mellia, M.

YearAuthor(s)TitlePublication
2007
D. Bonfiglio
M. Mellia
M. Meo
D. Rossi
P. Tofanelli
Revealing Skype Traffic: when randomness plays with youACM SIGCOMM

Meo, M.

YearAuthor(s)TitlePublication
2007
D. Bonfiglio
M. Mellia
M. Meo
D. Rossi
P. Tofanelli
Revealing Skype Traffic: when randomness plays with youACM SIGCOMM

Merwe, J.

YearAuthor(s)TitlePublication
2002
J. Merwe
S. Sen
C. Kalmanek
Streaming Video Traffic: Characterization and Network ImpactWCW

Miklau, G.

YearAuthor(s)TitlePublication
2007
B. Ribeiro
W. Chen
G. Miklau
D. Towsley
Analyzing Privacy in Enterprise Packet Trace AnonymizationUMass Amherst

Miller, G.

YearAuthor(s)TitlePublication
1998
k. claffy
G. Miller
K. Thompson
The nature of the beast: Recent traffic measurements from an Internet backboneInternational Networking Conference (INET)

Minshall, G.

YearAuthor(s)TitlePublication
2005
G. Minshall TCPdPrivTech Report

Mitchell, D.

YearAuthor(s)TitlePublication
1996
D. Mitchell
S. Bradner
k. claffy
In whose domain: name service in adolescenceCoordination and Administration of the Internet Workshop

Mitzenmacher, M.

YearAuthor(s)TitlePublication
2007
M. Iliofotou
P. Pappu
M. Faloutsos
M. Mitzenmacher
S. Singh
G. Varghese
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware ImplementationUniversity of California, Riverside

Mogul, J.

YearAuthor(s)TitlePublication
2006
J. Mogul
M. Arlitt
SC2D: an alternative to trace anonymizationACM SIGCOMM MineNet

Moll, D.

YearAuthor(s)TitlePublication
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network

Molle, M.

YearAuthor(s)TitlePublication
2004
T. Karagiannis
M. Molle
M. Faloutsos
A. Broido
A Nonstationary Poisson View of Internet TrafficIEEE INFOCOM

Monk, T.

YearAuthor(s)TitlePublication
1999
k. claffy
T. Monk
D. McRobb
Internet TomographyCAIDA
1997
k. claffy
T. Monk
What's next for Internet data analysis? Status and challenges facing the communityCAIDA
1997
T. Monk
k. claffy
Internet data acquisition and analysis: Status and next stepsCAIDA
1996
T. Monk
k. claffy
Cooperation in Internet data acquisition and analysisCoordination and Administration of the Internet Workshop
1996
T. Monk
k. claffy
A survey of Internet statistics / metrics activitiesCAIDA

Monlnar, S.

YearAuthor(s)TitlePublication
2008
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-PeerSystems and Computers in Japan
2006
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Identification and Analysis of Peer-to-Peer TrafficJournal of Communications

Monrose, F.

YearAuthor(s)TitlePublication
2008
S. Coull
C. Wright
F. Monrose
A. Keromytis
M. Reiter
Taming the Devil: Techniques for Evaluating Anonymized Network DataNDSS
2007
S. Coull
C. Wright
F. Monrose
M. Collins
M. Reiter
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network TracesNDSS
2006
C. Wright
F. Monrose
G. Masson
On Inferring Application Protocol Behaviors in Encrypted Network TrafficJournal of Machine Learning Research

Moon, S.

YearAuthor(s)TitlePublication
2004
J. Fan
J. Xu
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeComputer Networks
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network
2002
J. Xu
J. Fan
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeIEEE International Conference on Network Protocols (ICNP)
2001
J. Xu
J. Fan
M. Ammar
S. Moon
On the Design and Performance of Prefix-Preserving IP Traffic Trace AnonymizationACM SIGCOMM IMC

Moore, A.

YearAuthor(s)TitlePublication
2005
A. Moore
D. Zuev
M. Crogan
Discriminators for Use in Flow-based ClassificationIntel Research, Cambridge
2005
A. Moore
Zuev D.
Internet Traffic Classification Using Bayesian Analysis TechniquesACM SIGMETRICS
2001
A. Moore
K Papagiannaki
Toward the Accurate Identification of Network ApplicationsPassive and Active Measurement Conference (PAM)

Moore, D.

YearAuthor(s)TitlePublication
2004
C. Estan
K. Keys
D. Moore
G. Varghese
Building a Better NetFlowACM SIGCOMM
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
Inside the Slammer WormIEEE Security and Privacy journal
2003
D. Moore
C. Shannon
G. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2003
D. Moore
C. Shannon
G. M. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2003
M. Fomenkov
K. Keys
D. Moore
k. claffy
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sitesCAIDA
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
The Spread of the Sapphire/Slammer WormCAIDA
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop
2002
B. Huffaker
M. Fomenkov
D. J. Plummer
D. Moore
k. claffy
Distance Metrics in the InternetIEEE International Telecommunications Symposium
2002
B. Huffaker
D. Plummer
D. Moore
k. claffy
Topology discovery by active probingSymposium on Applications and the Internet (SAINT)
2001
D. Moore
K. Keys
R. Koga
E. Lagache
k. claffy
CoralReef software suite as a tool for system and network administratorsUSENIX LISA
2001
M. Fomenkov
k. claffy
B. Huffaker
D. Moore
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name ServersUSENIX LISA
2001
C. Shannon
D. Moore
k. claffy
Characteristics of Fragmented Traffic on Internet LinksACM SIGCOMM Internet Measurement Workshop
2001
D. Moore
G. M. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium
2001
D. Moore
G. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium
2001
C. Dovrolis
P. Ramanathan
D. Moore
Packet Dispersion Techniques and Capacity EstimationCAIDA
2001
C. Shannon
D. Moore
k. claffy
Characteristics of fragmented IP traffic on Internet linksPassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
B. Huffaker
M. Fomenkov
D. Moore
k. claffy
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performancePassive and Active Measurement Conference (PAM)
2001
C. Dovrolis
P. Ramanathan
D. Moore
What do packet dispersion techniques measure?IEEE INFOCOM
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)

Morris, R.

YearAuthor(s)TitlePublication
2004
F. Dabek
R. Cox
F. Kaashoek
R. Morris
Vivaldi: A Decentralized Network Coordinate SystemSIGCOMM

Mortier, R.

YearAuthor(s)TitlePublication
2002
G. Iannaccone
C. Chuah
R. Mortier
S. Bhattacharyya
C. Diot
Analysis of link failures in an IP backboneACM SIGCOMM Internet Measurement Workshop

Muir, J.

YearAuthor(s)TitlePublication
2009
J. Muir
P. C. van Oorschot
Internet Geolocation: Evasion and CounterevasionACM Computing Surveys

Munzner, T.

YearAuthor(s)TitlePublication
1996
T. Munzner
E. Hoffman
k. claffy
B. Fenner
Visualizing the global topology of the MBoneIEEE Symposium on Information Visualization

Murai, J.

YearAuthor(s)TitlePublication
1992
T. Asaba
k. claffy
O. Nakamura
J. Murai
An analysis of international academic research network traffic between Japan and other nationsInternational Networking Conference (INET)

Murray, M.

YearAuthor(s)TitlePublication
2003
C. Dovrolis
R. Prasad
M. Murray
k. claffy
Bandwidth estimation: metrics, measurement techniques, and toolsIEEE Network
2001
M. Murray
k. claffy
Measuring the Immeasurable: Global Internet Measurement InfrastructurePassive and Active Measurement Conference (PAM)
2001
N. Brownlee
M. Murray
Streams, Flows and TorrentsPassive and Active Measurement Conference (PAM)
2001
N. Brownlee
k. claffy
M. Murray
E. Nemeth
Methodology for passive analysis of a university Internet linkPassive and Active Measurement Conference (PAM)

Nakamura, O.

YearAuthor(s)TitlePublication
1992
T. Asaba
k. claffy
O. Nakamura
J. Murai
An analysis of international academic research network traffic between Japan and other nationsInternational Networking Conference (INET)

Nemeth, E.

YearAuthor(s)TitlePublication
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of Private DNS Update SourcesIEEE Workshop on Internet Applications (WIAPP)
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of DNS Update TrafficACM SIGMETRICS
2003
A. Broido
R. King
E. Nemeth
k. claffy
Radon Spectroscopy of Inter-Packet DelayIEEE High-Speeding Networking Workshop (HSN)
2002
A. Broido
k. claffy
E. Nemeth
Internet Expansion, Refinement, and ChurnEuropean Transactions on Telecommunications
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Root/gTLD Performance MeasurementsUSENIX LISA
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Measurements at a Root ServerIEEE GLOBECOM
2001
N. Brownlee
k. claffy
M. Murray
E. Nemeth
Methodology for passive analysis of a university Internet linkPassive and Active Measurement Conference (PAM)
2000
E. Nemeth
T. Ott
K. Thompson
k. claffy
The Internet Engineering Curriculum RepositoryInternational Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
1999
R. Periakaruppan
E. Nemeth
GTrace - A Graphical Traceroute ToolUsenix LISA
1999
R. Periakaruppan
E. Nemeth
GTrace - A Graphical Traceroute ToolUSENIX LISA
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to visualize the Internet multicast backboneInternational Networking Conference (INET)
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to Visualize the Internet Multicast BackboneInternational Networking Conference (INET)
1998
B. Huffaker
J. Jung
E. Nemeth
D. Wessels
k. claffy
Visualization of the growth and topology of the NLANR caching hierarchyInternational WWW Caching Workshop

Neudorfer, L.

YearAuthor(s)TitlePublication
2013
L. Neudorfer
Y. Shavitt
N. Zilberman
Improving AS relationship inference using PoPsTraffic Monitoring and Analysis Workshop (TMA)

Newman, D.

YearAuthor(s)TitlePublication
2001
D. Newman Internet Core Router TestLight Reading

Ng, T. S. E.

YearAuthor(s)TitlePublication
2001
T. S. E. Ng
H. Zhang
Predicting Internet Network Distance with Coordinates-Based ApproachesIEEE Conference on Computer Communications (INFOCOM)

Nguyen, T.

YearAuthor(s)TitlePublication
2005
S. Zander
T. Nguyen
G. Armitage
Self-learning IP Traffic Classification based on Statistical Flow CharacteristicsPassive and Active Measurement Conference (PAM)

Nicol, D. M.

YearAuthor(s)TitlePublication
2003
D. M. Nicol
S. W. Smith
M. Zhao
Efficient Security for BGP Route AnnouncementsDartmouth College, Computer Science

Ning, P.

YearAuthor(s)TitlePublication
2006
D. Xu
P. Ning
A Flexible Approach to Intrusion Alert Anonymization and CorrelationSecurecomm and Workshops

NLANR

YearAuthor(s)TitlePublication
1992
NLANR Redesign and extension of multi-agency interconnection pointCAIDA

Norton, W. B.

YearAuthor(s)TitlePublication
2004
W. B. Norton The Evolution of the U.S. Internet Peering EcosystemEquinix White Papers
2001
W. B. Norton Internet Service Providers and PeeringEquinix White Papers

Nowak, R.

YearAuthor(s)TitlePublication
2012
B. Eriksson
P. Barford
B. Maggs
R. Nowak
Posit: a lightweight approach for IP geolocationACM SIGMETRICS Performance Evaluation Review
2010
B. Eriksson
P. Barford
J. Sommers
R. Nowak
A Learning-Based Approach for IP GeolocationPAM, LNCS Volume

O'Dell, M.

YearAuthor(s)TitlePublication
1997
M. O'Dell GSE - An Alternate Addressing Architecture for IPv6INTERNET DRAFT

Ohm, P.

YearAuthor(s)TitlePublication
2007
D. Sicker
P. Ohm
D. Grunwald
Legal issues surrounding monitoring during network researchACM SIGCOMM IMC

Olovsson, T.

YearAuthor(s)TitlePublication
2008
W. John
S. Tafvelin
T. Olovsson
Trends and Differneces in Connections Behavior within Classes of Internet Backbone TrafficPassive and Active Measurement Conference (PAM)

Orincasy, D.

YearAuthor(s)TitlePublication
2008
G. Szabo
D. Orincasy
S. Malomsoky
I. Szabo
On the Validation of Traffic Classification AlgorithmsPassive and Active Measurement Conference (PAM)
2007
G. Szabo
I. Szabo
D. Orincasy
Accurate Traffic ClassificationWoWMoM

Orucevic, F.

YearAuthor(s)TitlePublication
2013
A. Butkovic
F. Orucevic
A. Tanovic
Using Whois based geolocation and Google maps API for support cybercrime investigationsRecent Advances in Telecommunications and Circuits

Oslebo, A.

YearAuthor(s)TitlePublication
2005
T. Brekne
A. Arnes
A. Oslebo
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.Privacy Enhancing Technologies

Ott, T.

YearAuthor(s)TitlePublication
2000
E. Nemeth
T. Ott
K. Thompson
k. claffy
The Internet Engineering Curriculum RepositoryInternational Networking Conference (INET)

Overlier, L.

YearAuthor(s)TitlePublication
2005
L. Overlier
T. Brekne
A. Arnes
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.CANS

Ozgur, A.

YearAuthor(s)TitlePublication
2003
A. Lazarevic
L. Ertoz
V. Kumar
A. Ozgur
J. Srirvastava
A Comparative Study of Anomaly Detection Schemes in Network Intrusion DetectionSIAM

P., Lorier

YearAuthor(s)TitlePublication
2004
A. McGregor
M. Hall
Brunskill J.
Lorier P.
Flow Clustering Using Machine Learning TechniquesPassive and Active Measurement Conference (PAM)

Padhye, J.

YearAuthor(s)TitlePublication
2001
J. Padhye
S. Floyd
Identifying the TCP Behavior of Web ServersACM SIGCOMM

Padmanabhan, V. N.

YearAuthor(s)TitlePublication
2001
V. N. Padmanabhan
L. Subramanian
An Investigation of Geographic Mapping Techniques for Internet HostsSIGCOMM

Pang, J.

YearAuthor(s)TitlePublication
2007
J. Pang
B. Greenstein
R. Gummadi
S. Seshan
D. Wetherall
802.11 user fingerprintingACM MobiCom

Pang, R.

YearAuthor(s)TitlePublication
2006
R. Pang
M. Allman
V. Paxson
J. Lee
The devil and packet trace anonymizationACM SIGCOMM Computer Communication Review
2003
R. Pang
V. Paxson
A high-level programming environment for packet trace anonymization and transformationACM SIGCOMM

Papadopoulos, C.

YearAuthor(s)TitlePublication
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
J. Pepin
Estimating P2P Traffic Volume at USCUSC/Information Sciences Institute
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
Inherent Behaviors for On-Line Detection of Peer-to-Peer SharingIEEE Global Internet Symposium
2005
A. Hussain
G. Bartlett
Y. Pryadkin
J. Heidemann
C. Papadopoulos
J. Bannister
Experiences with a continuous network tracing infrastructureACM SIGCOMM MineNet

Papagiannaki, K

YearAuthor(s)TitlePublication
2005
T. Karagiannis
K. Papagiannaki
M. Faloutsos
BLINC Multilevel Traffic Classification in the DarkACM SIGCOMM
2004
A. Soule
K. Salamatian
N. Taft
R. Emilion
K. Papagiannaki
Flow Classification by Histograms or How to Go on Safari in the InternetACM SIGMETRICS

Papagiannaki, K.

YearAuthor(s)TitlePublication
2005
T. Karagiannis
K. Papagiannaki
M. Faloutsos
BLINC Multilevel Traffic Classification in the DarkACM SIGCOMM
2004
A. Soule
K. Salamatian
N. Taft
R. Emilion
K. Papagiannaki
Flow Classification by Histograms or How to Go on Safari in the InternetACM SIGMETRICS

Papgiannaki, K.

YearAuthor(s)TitlePublication
2007
T. Karagiannis
K. Papgiannaki
N. Taft
M. Faloutso
Profiling the End HostPassive and Active Measurement Conference (PAM)

Pappu, P.

YearAuthor(s)TitlePublication
2008
M. Iliofotou
P. Pappu
M. Faloutsos
Graption: Automated Detection of P2P Applications Using Traffic Dispersion GraphsTech Report
2007
M. Iliofotou
P. Pappu
M. Faloutsos
M. Mitzenmacher
S. Singh
G. Varghese
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware ImplementationUniversity of California, Riverside

Park, B.

YearAuthor(s)TitlePublication
2008
B. Park
Y. Won
M. Hong, J. Kim
Towards Automated Application Signature GenerationIEEE/IFIP Network Operations and Management Symposium (NOMS)

Paxson, V.

YearAuthor(s)TitlePublication
2009
G. Maier
A. Feldmann
V. Paxson
M. Allman
On Dominant Characteristics of Residential Broadband Internet TrafficACM SIGCOMM IMC
2007
J. Franklin
A. Perrig
V. Paxson
S. Savage
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsACM Conference on Computer and Communications Security (CCS)
2007
M. Allman
V. Paxson
Issues and etiquette concerning use of shared measurement dataACM SIGCOMM IMC
2006
R. Pang
M. Allman
V. Paxson
J. Lee
The devil and packet trace anonymizationACM SIGCOMM Computer Communication Review
2003
R. Pang
V. Paxson
A high-level programming environment for packet trace anonymization and transformationACM SIGCOMM
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
Inside the Slammer WormIEEE Security and Privacy journal
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
The Spread of the Sapphire/Slammer WormCAIDA
1997
V. Paxson End-to-end routing behavior in the InternetIEEE/ACM Transactions on Networking

Pei, D.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM

Pepin, J.

YearAuthor(s)TitlePublication
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
J. Pepin
Estimating P2P Traffic Volume at USCUSC/Information Sciences Institute

Percacci, R.

YearAuthor(s)TitlePublication
2003
R. Percacci
A. Vespignani
Scale-free behavior of the Internet global performanceEuropean Physical Journal B

Perenyi, M.

YearAuthor(s)TitlePublication
2008
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-PeerSystems and Computers in Japan
2006
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Identification and Analysis of Peer-to-Peer TrafficJournal of Communications

Perera, R.D.W.

YearAuthor(s)TitlePublication
2012
Z. Dong
R.D.W. Perera
R. Chandramouli
K.P. Subbalakshmi
Network measurement based modeling and optimization for IP geolocationComputer Networks

Periakaruppan, R.

YearAuthor(s)TitlePublication
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
1999
R. Periakaruppan
E. Nemeth
GTrace - A Graphical Traceroute ToolUsenix LISA
1999
R. Periakaruppan
E. Nemeth
GTrace - A Graphical Traceroute ToolUSENIX LISA

Perito, D.

YearAuthor(s)TitlePublication
2009
C. Castelluccia
M.A. Kaafar
P. Manils
D. Perito
Geolocalization of proxied services and its application to fast-flux hidden serversIMC

Perrig, A.

YearAuthor(s)TitlePublication
2007
J. Franklin
A. Perrig
V. Paxson
S. Savage
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsACM Conference on Computer and Communications Security (CCS)

Pescape, A.

YearAuthor(s)TitlePublication
2009
A. Dainotti
W. de Donato
A. Pescape
G. Ventre
TIE: a Community-oriented Traffic Classification PlatformInternational Workshop on Traffic Monitoring and Analysis (TMA)
2008
A. Dainotti
W. de Donato
A. Pescape
P. Salvo Rossi
Classification of Network Traffic via Packet-Level Hidden Markov ModelsIEEE GLOBECOM

Petrovic, S.

YearAuthor(s)TitlePublication
2007
V. Seeberg
S. Petrovic
A New Classification Scheme for Anonymization of Real Data Used in IDS BenchmarkingARES

Pfitzmann, A.

YearAuthor(s)TitlePublication
2008
A. Pfitzmann
M. Hansen
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for TerminologyTech Report

Pietrzyk, M.

YearAuthor(s)TitlePublication
2009
M. Pietrzyk
J.-L. Costeux
G. Urvoy-Keller
T. En-Najjary
Challenging Statistical Classification for Operational Usage: the ADSL CaseACM SIGCOMM IMC

Plissonneau, L.

YearAuthor(s)TitlePublication
2005
L. Plissonneau
J. Costeux
P. Brown
Analysis of Peer-to-Peer Traffic on ADSLPassive and Active Measurement Conference (PAM)

Plummer, D.

YearAuthor(s)TitlePublication
2002
B. Huffaker
D. Plummer
D. Moore
k. claffy
Topology discovery by active probingSymposium on Applications and the Internet (SAINT)

Plummer, D. J.

YearAuthor(s)TitlePublication
2002
B. Huffaker
M. Fomenkov
D. J. Plummer
D. Moore
k. claffy
Distance Metrics in the InternetIEEE International Telecommunications Symposium

Poese, I.

YearAuthor(s)TitlePublication
2011
I. Poese
S. Uhlig
M.A. Kaafar
B. Donnet
B. Gueye
IP geolocation databases: unreliable?ACM SIGCOMM Computer Communication Review

Poletto, M.

YearAuthor(s)TitlePublication
2003
G. Tan
M. Poletto
J. Guttag
F. Kaashoek
Role Classification of Hosts within Enterprise Networks based on Connection PatternsUSENIX

Polychronakis, M.

YearAuthor(s)TitlePublication
2006
D. Antoniades
M. Polychronakis
S. Antonatos
E. Markatos
S. Ubik
Appmon: An Application for Accurate per Application Network Traffic CharacterizationBroadBand Europe

Polyzos, G.

YearAuthor(s)TitlePublication
1995
k. claffy
H.-W. Braun
G. Polyzos
A parameterizable methodology for Internet traffic flow profilingCAIDA
1994
N. Groschwitz
G. Polyzos
A Time-Series Model of Long-Term Traffic on the NSFNET BackboneIEEE International Conference on Communications (ICC)
1994
k. claffy
H.-W. Braun
G. Polyzos
Tracking long-term growth of the NSFNETCAIDA
1994
k. claffy
H.-W. Braun
G. Polyzos
Internet traffic flow profilingCAIDA
1993
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1993
k. claffy
H.-W. Braun
G. Polyzos
Measurement considerations for assessing unidirectional latenciesCAIDA
1993
H.-W. Braun
k. claffy
G. Polyzos
A framework for flow-based accounting on the InternetIEEE Singapore International Conference on Networks (SICON'93)
1993
k. claffy
H.-W. Braun
G. Polyzos
Application of sampling methodologies to wide-area network traffic characterizationACM SIGCOMM
1993
k. claffy
H.-W. Braun
G. Polyzos
Long-term traffic aspects of the NSFNETInternational Networking Conference (INET)
1993
k. claffy
H.-W. Braun
G. Polyzos
Traffic characteristics of the T1 NSFNET backboneIEEE INFOCOM
1992
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA

Porras, P.

YearAuthor(s)TitlePublication
2006
P. Porras
V. Shmatikov
Large-scale collection and sanitization of network security data: risks and challengesNew Security Paradigms Workshop (NSPW)
2004
P. Lincoln
P. Porras
V. Shmatikov
Privacy-Preserving Sharing and Correlation of Security AlertsUSENIX Security Symposium

Pradkin, Y.

YearAuthor(s)TitlePublication
2012
Z. Hu
J. Heidemann
Y. Pradkin
Towards geolocation of millions of IP addressesProc. ACM Internet measurement conference (IMC)

Prasad, R.

YearAuthor(s)TitlePublication
2003
C. Dovrolis
R. Prasad
M. Murray
k. claffy
Bandwidth estimation: metrics, measurement techniques, and toolsIEEE Network

Preneel, B.

YearAuthor(s)TitlePublication
2002
C. Diaz
B. Seys
J. Claessenss
B. Preneel
Towards Measuring AnonymityPrivacy Enhancing Technologies

Pryadkin, Y.

YearAuthor(s)TitlePublication
2005
A. Hussain
G. Bartlett
Y. Pryadkin
J. Heidemann
C. Papadopoulos
J. Bannister
Experiences with a continuous network tracing infrastructureACM SIGCOMM MineNet

Rajvaidya, P.

YearAuthor(s)TitlePublication
2000
P. Rajvaidya
K. Almeroth
k. claffy
A scalable architecture for monitoring and visualizing multicast statisticsDistributed Systems: Operations and Management

Ramanathan, P.

YearAuthor(s)TitlePublication
2001
C. Dovrolis
P. Ramanathan
D. Moore
Packet Dispersion Techniques and Capacity EstimationCAIDA
2001
C. Dovrolis
P. Ramanathan
D. Moore
What do packet dispersion techniques measure?IEEE INFOCOM

Ramaswamy, R.

YearAuthor(s)TitlePublication
2007
R. Ramaswamy
T. Wolf
High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement SystemsIEEE/ACM Transactions on Networking

Rasti, A.

YearAuthor(s)TitlePublication
2010
A. Rasti
N. Magharei
R. Rejaie
W. Willinger
Eyeball ASes: From Geography to ConectivityInternet Measurement Conference (IMC)

Reiter, M.

YearAuthor(s)TitlePublication
2008
S. Coull
C. Wright
F. Monrose
A. Keromytis
M. Reiter
Taming the Devil: Techniques for Evaluating Anonymized Network DataNDSS
2007
M. Collins
M. Reiter
Hit-list worm detection and bot identification in large networks using protocol graphsRAID
2007
S. Coull
C. Wright
F. Monrose
M. Collins
M. Reiter
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network TracesNDSS

Rejaie, R.

YearAuthor(s)TitlePublication
2010
A. Rasti
N. Magharei
R. Rejaie
W. Willinger
Eyeball ASes: From Geography to ConectivityInternet Measurement Conference (IMC)

Rekhter, Y.

YearAuthor(s)TitlePublication
1993
H.-W. Braun
P. Ford
Y. Rekhter
CIDR and the evolution of the InternetInternational Networking Conference (INET)
1992
Y. Rekhter
B. Chinoy
Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysisCAIDA

Rexford, J.

YearAuthor(s)TitlePublication
2004
Z. Mao
D. Johnson
J. Rexford
J. Wang
R. Katz
Scalable and Accurate Identification of AS-level Forwarding PathsIEEE INFOCOM
2003
Z. Mao
J. Rexford
J. Wang
R. H. Katz
Towards an Accurate AS-Level Traceroute ToolACM SIGCOMM
2002
J. Rexford
J. Wang
Z. Xiao
Y. Zhang
BGP Routing Stability of Popular DestinationsACM SIGCOMM Internet Measurement Workshop
2002
L. Subramanian
S. Agarwal
J. Rexford
R. Katz
Characterizing the Internet Hierarchy from Multiple Vantage PointsIEEE INFOCOM

Ribeiro, B.

YearAuthor(s)TitlePublication
2007
B. Ribeiro
W. Chen
G. Miklau
D. Towsley
Analyzing Privacy in Enterprise Packet Trace AnonymizationUMass Amherst

Richards, D.

YearAuthor(s)TitlePublication
2009
I. Youn
B. L. Mark
D. Richards
Statistical geolocation of Internet hostsInternational Conference on Computer Communications and Networks (ICCCN)

Ristic, B.

YearAuthor(s)TitlePublication
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
A. Gunatilaka
B. Ristic
Internet Host Geolocation Using Maximum Likelihood Estimation TechniqueIEEE International Conference on Advanced Information Networking and Applications (AINA)

Ristuccia, C. A.

YearAuthor(s)TitlePublication
2003
E. Giovannetti
C. A. Ristuccia
Estimating Market Power in the Internet Backbone Using Band-X dataCambridge Working Papers in Economics

Rockell, R.

YearAuthor(s)TitlePublication
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network

Roesch, M.

YearAuthor(s)TitlePublication
1999
M. Roesch Snort Lightweight Intrusion Detection for NetworksUSENIX LISA

Rogers, T.

YearAuthor(s)TitlePublication
2012
H. Maziku
S. Han, K. Shetty
T. Rogers
Enhancing the classification accuracy of IP geolocationMilitary Communications Conf. (MILCOM)

Ross, K.W.

YearAuthor(s)TitlePublication
2013
Y. Tian
R. Dey
Y. Liu
K.W. Ross
Topology mapping and geolocating for China's InternetIEEE Trans. On Parallel and Distributed Systems

Rossi, D.

YearAuthor(s)TitlePublication
2007
D. Bonfiglio
M. Mellia
M. Meo
D. Rossi
P. Tofanelli
Revealing Skype Traffic: when randomness plays with youACM SIGCOMM

Roughan, S.

YearAuthor(s)TitlePublication
2004
S. Roughan
O. Sen
N. Duffield
Class-of-service Mapping for QoSACM SIGCOMM IMC

Sadok, D.

YearAuthor(s)TitlePublication
2010
P.T. Endo
D. Sadok
Whois based geolocation: A strategy to geolocate Internet hostsAdvanced Information Networking and Applications (AINA)

Salamatian, K.

YearAuthor(s)TitlePublication
2006
L. Bernaille
R. Teixeira
. Akodjenou
A. Soule
K. Salamatian
Traffic Classification on the flyACM SIGCOMM Computer Communication Review
2006
L. Bernaille
R. Teixeira
K. Salamatian
Early Application IdentificationACM CoNEXT
2005
L. Bernaille
A. Soule
M. Jeannin
K. Salamatian
Blind Application Recognition Through Behavioral ClassificationParis
2004
A. Soule
K. Salamatian
N. Taft
R. Emilion
K. Papagiannaki
Flow Classification by Histograms or How to Go on Safari in the InternetACM SIGMETRICS

Salgarelli, L.

YearAuthor(s)TitlePublication
2008
M. Dusi
M. Crotti
F. Gringoli
L. Salgarelli
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical FingerprintingComputer Networks
2008
M. Dusi
F. Gringoli
L. Salgarelli
A Preliminary Look at the Privacy of SSH TunnelsIEEE International Conference on Communications (ICC)
2007
M. Crotti
M. Dusi
F. Gringoli
L. Salgarelli
Traffic Classification through Simple Statistical FingerprintingACM SIGCOMM

Salo, T.

YearAuthor(s)TitlePublication
1996
B. Chinoy
T. Salo
Internet Exchanges: Policy-Driven EvolutionCoordination and Administration of the Internet Workshop

Salvo Rossi, P.

YearAuthor(s)TitlePublication
2008
A. Dainotti
W. de Donato
A. Pescape
P. Salvo Rossi
Classification of Network Traffic via Packet-Level Hidden Markov ModelsIEEE GLOBECOM

Samarati, P.

YearAuthor(s)TitlePublication
1998
P. Samarati
L. Sweeney
Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and SuppressionTech Report

Savage, S.

YearAuthor(s)TitlePublication
2007
J. Franklin
A. Perrig
V. Paxson
S. Savage
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsACM Conference on Computer and Communications Security (CCS)
2006
J. Ma
K. Levchenko
C. Kreibich
S. Savage
G. Voelker
Unexpected Means of Protocol InferenceACM SIGCOMM IMC
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
Inside the Slammer WormIEEE Security and Privacy journal
2003
C. Estan
S. Savage
G. Vargheses
Automatically Inferring Patterns of Resources Consumption in Network TrafficACM SIGCOMM
2003
D. Moore
C. Shannon
G. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2003
D. Moore
C. Shannon
G. M. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
The Spread of the Sapphire/Slammer WormCAIDA
2001
D. Moore
G. M. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium
2001
D. Moore
G. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium

Schonwalder, J.

YearAuthor(s)TitlePublication
2006
M. Harvan
J. Schonwalder
Prefix- and Lexicographical-order-preserving IP Address AnonymizationIEEE/IFIP Network Operations and Management Symposium (NOMS)

Sebok, T.

YearAuthor(s)TitlePublication
2011
S. Laki
P. Matray
P. Haga
T. Sebok
I. Csabai
G. Vattay
Spotter: A Model Based Active Geolocation ServiceINFOCOM

Seeberg, V.

YearAuthor(s)TitlePublication
2007
V. Seeberg
S. Petrovic
A New Classification Scheme for Anonymization of Real Data Used in IDS BenchmarkingARES

Seely, T.

YearAuthor(s)TitlePublication
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network

Sen, O.

YearAuthor(s)TitlePublication
2004
S. Roughan
O. Sen
N. Duffield
Class-of-service Mapping for QoSACM SIGCOMM IMC

Sen, S.

YearAuthor(s)TitlePublication
2005
P. Haffner
S. Sen
O. Spatscheck
D. Wang
Acas: Automated Construction of Application SignaturesACM SIGCOMM
2004
S. Sen
J. Wang
Analyzing Peer-to-Peer Traffic across Large NetworksIEEE/ACM Transactions on Networking
2004
S. Sen
O. Spatscheck
D. Wang
Accurate Scalable In-Network Identification of P2P TrafficWorld Wide Web (WWW) Conference
2002
J. Merwe
S. Sen
C. Kalmanek
Streaming Video Traffic: Characterization and Network ImpactWCW

Serjantov, A.

YearAuthor(s)TitlePublication
2002
A. Serjantov
G. Danezis
Towards an Information Theoretic Metric for AnonymityPrivacy Enhancing Technologies

Seshan, S.

YearAuthor(s)TitlePublication
2007
J. Pang
B. Greenstein
R. Gummadi
S. Seshan
D. Wetherall
802.11 user fingerprintingACM MobiCom

Seys, B.

YearAuthor(s)TitlePublication
2002
C. Diaz
B. Seys
J. Claessenss
B. Preneel
Towards Measuring AnonymityPrivacy Enhancing Technologies

Shannon, C.

YearAuthor(s)TitlePublication
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
Inside the Slammer WormIEEE Security and Privacy journal
2003
D. Moore
C. Shannon
G. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2003
D. Moore
C. Shannon
G. M. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
The Spread of the Sapphire/Slammer WormCAIDA
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop
2001
C. Shannon
D. Moore
k. claffy
Characteristics of Fragmented Traffic on Internet LinksACM SIGCOMM Internet Measurement Workshop
2001
C. Shannon
D. Moore
k. claffy
Characteristics of fragmented IP traffic on Internet linksPassive and Active Measurement Conference (PAM)

Shavitt, Y.

YearAuthor(s)TitlePublication
2013
L. Neudorfer
Y. Shavitt
N. Zilberman
Improving AS relationship inference using PoPsTraffic Monitoring and Analysis Workshop (TMA)
2012
D. Feldman
Y. Shavitt
N. Zilberman
A structural approach for PoP geo-locationComputer Networks
2010
Y. Shavitt
N. Zilberman
A Study of Geolocation DatabasesarXiv cs.NI/.5674v3

Shen, W.

YearAuthor(s)TitlePublication
2009
C. Guo
Y. Liu
W. Shen
H.J. Wang
Q. Yu
Y. Zhang
Mining the Web and the Internet for Accurate IP Address GeolocationsIEEE Conference on Computer Communications (INFOCOM)

Shetty, S. Han, K.

YearAuthor(s)TitlePublication
2012
H. Maziku
S. Han, K. Shetty
T. Rogers
Enhancing the classification accuracy of IP geolocationMilitary Communications Conf. (MILCOM)

Shmatikov, V.

YearAuthor(s)TitlePublication
2006
P. Porras
V. Shmatikov
Large-scale collection and sanitization of network security data: risks and challengesNew Security Paradigms Workshop (NSPW)
2004
P. Lincoln
P. Porras
V. Shmatikov
Privacy-Preserving Sharing and Correlation of Security AlertsUSENIX Security Symposium

Sicker, D.

YearAuthor(s)TitlePublication
2007
D. Sicker
P. Ohm
D. Grunwald
Legal issues surrounding monitoring during network researchACM SIGCOMM IMC

Siganos, G.

YearAuthor(s)TitlePublication
2004
G. Siganos
M. Faloutsos
Analyzing BGP Policies: Methodology and ToolIEEE INFOCOM

Singh, S.

YearAuthor(s)TitlePublication
2007
M. Iliofotou
P. Pappu
M. Faloutsos
M. Mitzenmacher
S. Singh
G. Varghese
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware ImplementationUniversity of California, Riverside

Siwpersad, S. S.

YearAuthor(s)TitlePublication
2008
S. S. Siwpersad
B. Gueye
S. Uhlig
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hostsPassive and Active Network Measurement Workshop (PAM)

Slagell, A.

YearAuthor(s)TitlePublication
2006
A. Slagell
K. Lakkaraju
K. Luo
FLAIM: A Multi-level Anonymization Framework for Computer and Network LogsUSENIX LISA
2006
K. Luo
Y. Li
C. Ermopoulos
W. Yurcik
A. Slagell
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process AccountingTech Report
2005
A. Slagell
W. Yurcik
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymizationSecurity and Privacy for Emerging Areas in Communication Networks
2005
K. Luo
Y. Li
A. Slagell
W. Yurcik
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure SharingFLOCON - Network Flow Analysis Workshop

Slagell, Adam

YearAuthor(s)TitlePublication
2005
Y. Li
Adam Slagell
K. Luo
W. Yurcik
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for SecurityInternational Conference on Telecommunication Systems, Modeling and Analysis

Smith, S. W.

YearAuthor(s)TitlePublication
2003
D. M. Nicol
S. W. Smith
M. Zhao
Efficient Security for BGP Route AnnouncementsDartmouth College, Computer Science

Sommers, J.

YearAuthor(s)TitlePublication
2010
B. Eriksson
P. Barford
J. Sommers
R. Nowak
A Learning-Based Approach for IP GeolocationPAM, LNCS Volume

Soule, A.

YearAuthor(s)TitlePublication
2006
L. Bernaille
R. Teixeira
. Akodjenou
A. Soule
K. Salamatian
Traffic Classification on the flyACM SIGCOMM Computer Communication Review
2005
L. Bernaille
A. Soule
M. Jeannin
K. Salamatian
Blind Application Recognition Through Behavioral ClassificationParis
2004
A. Soule
K. Salamatian
N. Taft
R. Emilion
K. Papagiannaki
Flow Classification by Histograms or How to Go on Safari in the InternetACM SIGMETRICS

Spatscheck, O.

YearAuthor(s)TitlePublication
2005
P. Haffner
S. Sen
O. Spatscheck
D. Wang
Acas: Automated Construction of Application SignaturesACM SIGCOMM
2004
S. Sen
O. Spatscheck
D. Wang
Accurate Scalable In-Network Identification of P2P TrafficWorld Wide Web (WWW) Conference

Spring, D.

YearAuthor(s)TitlePublication
2002
D. Spring
R. Mahajan
D. Wetherall
Measuring ISP Topologies with RocketfuelACM SIGCOMM

Srinivasan, V.

YearAuthor(s)TitlePublication
2001
C. Labovitz
A. Ahuja
R. Wattenhofer
V. Srinivasan
The Impact of Internet Policy and Topology on Delayed Routing ConvergenceIEEE INFOCOM

Srirvastava, J.

YearAuthor(s)TitlePublication
2003
A. Lazarevic
L. Ertoz
V. Kumar
A. Ozgur
J. Srirvastava
A Comparative Study of Anomaly Detection Schemes in Network Intrusion DetectionSIAM

Staniford, S.

YearAuthor(s)TitlePublication
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
Inside the Slammer WormIEEE Security and Privacy journal
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
The Spread of the Sapphire/Slammer WormCAIDA

Stoyanov, I.

YearAuthor(s)TitlePublication
2007
B. Wong
I. Stoyanov
E. Gun Sirer
Octant: A Comprehensive Framework for the Geolocalization of Internet HostsSymposium on Networked System Design and Implementation (NSDI)

Subbalakshmi, K.P.

YearAuthor(s)TitlePublication
2012
Z. Dong
R.D.W. Perera
R. Chandramouli
K.P. Subbalakshmi
Network measurement based modeling and optimization for IP geolocationComputer Networks

Subramanian, L.

YearAuthor(s)TitlePublication
2002
L. Subramanian
S. Agarwal
J. Rexford
R. Katz
Characterizing the Internet Hierarchy from Multiple Vantage PointsIEEE INFOCOM
2001
V. N. Padmanabhan
L. Subramanian
An Investigation of Geographic Mapping Techniques for Internet HostsSIGCOMM

Sweeney, L.

YearAuthor(s)TitlePublication
1998
P. Samarati
L. Sweeney
Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and SuppressionTech Report

Szabo, G.

YearAuthor(s)TitlePublication
2008
G. Szabo
D. Orincasy
S. Malomsoky
I. Szabo
On the Validation of Traffic Classification AlgorithmsPassive and Active Measurement Conference (PAM)
2007
G. Szabo
I. Szabo
D. Orincasy
Accurate Traffic ClassificationWoWMoM

Szabo, I.

YearAuthor(s)TitlePublication
2008
G. Szabo
D. Orincasy
S. Malomsoky
I. Szabo
On the Validation of Traffic Classification AlgorithmsPassive and Active Measurement Conference (PAM)
2007
G. Szabo
I. Szabo
D. Orincasy
Accurate Traffic ClassificationWoWMoM

T., Nguyen

YearAuthor(s)TitlePublication
2008
Nguyen T.
G. Armitage
A Survey of Techniques for Internet Traffic Classification Using Machine LearningIEEE Communications Surveys and Tutorials

Taft, N.

YearAuthor(s)TitlePublication
2007
T. Karagiannis
K. Papgiannaki
N. Taft
M. Faloutso
Profiling the End HostPassive and Active Measurement Conference (PAM)
2004
A. Soule
K. Salamatian
N. Taft
R. Emilion
K. Papagiannaki
Flow Classification by Histograms or How to Go on Safari in the InternetACM SIGMETRICS

Tafvelin, S.

YearAuthor(s)TitlePublication
2008
W. John
S. Tafvelin
Heuristics to Classify Internet Backbone Traffic based on Connection PatternsInternational Conference on Information Networking (ICOIN)
2008
W. John
S. Tafvelin
T. Olovsson
Trends and Differneces in Connections Behavior within Classes of Internet Backbone TrafficPassive and Active Measurement Conference (PAM)
2007
W. John
S. Tafvelin
Analysis of Internet Backbone Traffic and Header Anomalies ObservedACM SIGCOMM IMC

Tan, G.

YearAuthor(s)TitlePublication
2003
G. Tan
M. Poletto
J. Guttag
F. Kaashoek
Role Classification of Hosts within Enterprise Networks based on Connection PatternsUSENIX

Tang, L.

YearAuthor(s)TitlePublication
2003
L. Tang
M. Crovella
Virtual Landmarks for the InternetInternet Measurement Conference (IMC)

Tanovic, A.

YearAuthor(s)TitlePublication
2013
A. Butkovic
F. Orucevic
A. Tanovic
Using Whois based geolocation and Google maps API for support cybercrime investigationsRecent Advances in Telecommunications and Circuits

Teixeira, R.

YearAuthor(s)TitlePublication
2007
L. Bernaille
R. Teixeira
Early Recognition of Encrypted ApplicationPassive and Active Measurement Conference (PAM)
2006
L. Bernaille
R. Teixeira
. Akodjenou
A. Soule
K. Salamatian
Traffic Classification on the flyACM SIGCOMM Computer Communication Review
2006
L. Bernaille
R. Teixeira
K. Salamatian
Early Application IdentificationACM CoNEXT

Tesch, M.

YearAuthor(s)TitlePublication
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)

Thompson, K.

YearAuthor(s)TitlePublication
2000
E. Nemeth
T. Ott
K. Thompson
k. claffy
The Internet Engineering Curriculum RepositoryInternational Networking Conference (INET)
1998
k. claffy
G. Miller
K. Thompson
The nature of the beast: Recent traffic measurements from an Internet backboneInternational Networking Conference (INET)

Thuraisingham, B.

YearAuthor(s)TitlePublication
2007
W. Yurcik
C. Woolam
G. Hellings
L. Khan
B. Thuraisingham
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis TradeoffsACM Computing Research Repository (CoRR)

Tian, Y.

YearAuthor(s)TitlePublication
2013
Y. Tian
R. Dey
Y. Liu
K.W. Ross
Topology mapping and geolocating for China's InternetIEEE Trans. On Parallel and Distributed Systems

Tofanelli, P.

YearAuthor(s)TitlePublication
2007
D. Bonfiglio
M. Mellia
M. Meo
D. Rossi
P. Tofanelli
Revealing Skype Traffic: when randomness plays with youACM SIGCOMM

Towsley, D.

YearAuthor(s)TitlePublication
2007
B. Ribeiro
W. Chen
G. Miklau
D. Towsley
Analyzing Privacy in Enterprise Packet Trace AnonymizationUMass Amherst

Trimintzios, P.

YearAuthor(s)TitlePublication
2006
D. Koukis
S. Antonatos
D. Antoniades
E.P. Markatos
P. Trimintzios
A Generic Anonymization Framework for Network TrafficIEEE International Conference on Communications (ICC)

Tsitsiklis, J.

YearAuthor(s)TitlePublication
2003
R. Johari
J. Tsitsiklis
Routing and Peering in a Competitive InternetMIT

Ubik, S.

YearAuthor(s)TitlePublication
2007
S. Ubik
P. Zejdl
J. Halak
Real-time anonymization in passive network monitoringInternational Conference on Networking and Services (ICNS)
2006
D. Antoniades
M. Polychronakis
S. Antonatos
E. Markatos
S. Ubik
Appmon: An Application for Accurate per Application Network Traffic CharacterizationBroadBand Europe

Uhlig, S.

YearAuthor(s)TitlePublication
2011
I. Poese
S. Uhlig
M.A. Kaafar
B. Donnet
B. Gueye
IP geolocation databases: unreliable?ACM SIGCOMM Computer Communication Review
2008
S. S. Siwpersad
B. Gueye
S. Uhlig
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hostsPassive and Active Network Measurement Workshop (PAM)
2007
B. Gueye
S. Uhlig
S. Fdida
Investigating the Imprecision of IP Block-based GeolocationPassive and Active Network Measurement Workshop (PAM)
2006
B. Gueye
S. Uhlig
A. Ziviani
S. Fdida
Leveraging Buffering Delay Estimation for Geolocation of Internet HostsInternational Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference

Uijterwaal, H.

YearAuthor(s)TitlePublication
2002
H. Uijterwaal First analysis of the Beacon dataIEPG meeting, Atlanta, GA

Urvoy-Keller, G.

YearAuthor(s)TitlePublication
2009
M. Pietrzyk
J.-L. Costeux
G. Urvoy-Keller
T. En-Najjary
Challenging Statistical Classification for Operational Usage: the ADSL CaseACM SIGCOMM IMC

van der Pol, R.

YearAuthor(s)TitlePublication
2004
P. Verkaik
A. Broido
k. claffy
R. Gao
Y. Hyun
R. van der Pol
Beyond CIDR AggregationCAIDA

van Oorschot, P. C.

YearAuthor(s)TitlePublication
2009
J. Muir
P. C. van Oorschot
Internet Geolocation: Evasion and CounterevasionACM Computing Surveys

Varghese, G.

YearAuthor(s)TitlePublication
2007
M. Iliofotou
P. Pappu
M. Faloutsos
M. Mitzenmacher
S. Singh
G. Varghese
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware ImplementationUniversity of California, Riverside
2004
C. Estan
K. Keys
D. Moore
G. Varghese
Building a Better NetFlowACM SIGCOMM
2002
Z. Mao
R. Govindan
G. Varghese
R. H. Katz
Route Flap Damping Exacerbates Internet Routing ConvergenceACM SIGCOMM

Vargheses, G.

YearAuthor(s)TitlePublication
2003
C. Estan
S. Savage
G. Vargheses
Automatically Inferring Patterns of Resources Consumption in Network TrafficACM SIGCOMM

Vattay, G.

YearAuthor(s)TitlePublication
2011
S. Laki
P. Matray
P. Haga
T. Sebok
I. Csabai
G. Vattay
Spotter: A Model Based Active Geolocation ServiceINFOCOM
2010
S. Laki
P. Matray
P. Haga
I. Csabai
G. Vattay
A Model Based Approach for Improving Router GeolocationComputer Networks: The International Journal of Computer and Telecommunications Networking

Venkataramani, A.

YearAuthor(s)TitlePublication
2009
H.V. Madhyasth
E. Katz-Bassett
T. Anderson
A. Krishnamurthy
A. Venkataramani
iPlane Nano: path prediction for peer-to-peer applicationsProc. USENIX symp. on Networked systems design and implementation (NSDI)

Venkatasubramanian, S.

YearAuthor(s)TitlePublication
2007
N. Li
T. Li
S. Venkatasubramanian
t-Closeness: Privacy Beyond k-Anonymity and l-DiversityIEEE International Conference on Data Engineering (ICDE)

Venkitasubramaniam, M.

YearAuthor(s)TitlePublication
2006
A. Machanavajjhala
J. Gehrke
D. Kifer
M. Venkitasubramaniam
l-Diversity: Privacy Beyond k-Anonymity.IEEE International Conference on Data Engineering (ICDE)

Ventre, G.

YearAuthor(s)TitlePublication
2009
A. Dainotti
W. de Donato
A. Pescape
G. Ventre
TIE: a Community-oriented Traffic Classification PlatformInternational Workshop on Traffic Monitoring and Analysis (TMA)

Verkaik, P.

YearAuthor(s)TitlePublication
2004
P. Verkaik
A. Broido
k. claffy
R. Gao
Y. Hyun
R. van der Pol
Beyond CIDR AggregationCAIDA

Vespignani, A.

YearAuthor(s)TitlePublication
2003
R. Percacci
A. Vespignani
Scale-free behavior of the Internet global performanceEuropean Physical Journal B

Vixie, P.

YearAuthor(s)TitlePublication
1996
C. Davis
P. Vixie
T. Goodwin
I. Dickinson
A Means for Expressing Location Information in the Domain Name SystemRFC Editor

Voelker, G.

YearAuthor(s)TitlePublication
2006
J. Ma
K. Levchenko
C. Kreibich
S. Savage
G. Voelker
Unexpected Means of Protocol InferenceACM SIGCOMM IMC
2003
D. Moore
C. Shannon
G. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2001
D. Moore
G. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium

Voelker, G. M.

YearAuthor(s)TitlePublication
2003
D. Moore
C. Shannon
G. M. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2001
D. Moore
G. M. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium

Vutukuru, M.

YearAuthor(s)TitlePublication
2005
M. J. Freedman
M. Vutukuru
N. Feamster
H. Balakrishnan
Geographic Locality of IP PrefixesInternet Measurement Conference (IMC)

W., Chang Feng

YearAuthor(s)TitlePublication
2005
Chang Feng W.
Chang F.
Chi Feng W.
Walpole J.
A Traffic Characterization of Popular on-line GamesIEEE/ACM Transactions on Networking

W., Chi Feng

YearAuthor(s)TitlePublication
2005
Chang Feng W.
Chang F.
Chi Feng W.
Walpole J.
A Traffic Characterization of Popular on-line GamesIEEE/ACM Transactions on Networking

Wang, D.

YearAuthor(s)TitlePublication
2005
P. Haffner
S. Sen
O. Spatscheck
D. Wang
Acas: Automated Construction of Application SignaturesACM SIGCOMM
2004
S. Sen
O. Spatscheck
D. Wang
Accurate Scalable In-Network Identification of P2P TrafficWorld Wide Web (WWW) Conference

Wang, H.J.

YearAuthor(s)TitlePublication
2009
C. Guo
Y. Liu
W. Shen
H.J. Wang
Q. Yu
Y. Zhang
Mining the Web and the Internet for Accurate IP Address GeolocationsIEEE Conference on Computer Communications (INFOCOM)

Wang, J.

YearAuthor(s)TitlePublication
2004
S. Sen
J. Wang
Analyzing Peer-to-Peer Traffic across Large NetworksIEEE/ACM Transactions on Networking
2004
Z. Mao
D. Johnson
J. Rexford
J. Wang
R. Katz
Scalable and Accurate Identification of AS-level Forwarding PathsIEEE INFOCOM
2003
Z. Mao
J. Rexford
J. Wang
R. H. Katz
Towards an Accurate AS-Level Traceroute ToolACM SIGCOMM
2002
J. Rexford
J. Wang
Z. Xiao
Y. Zhang
BGP Routing Stability of Popular DestinationsACM SIGCOMM Internet Measurement Workshop

Wang, L.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM

Wang, Y.

YearAuthor(s)TitlePublication
2011
Y. Wang
D. Burgener
M. Flores
A. Kuzmanovic
C. Huang
Towards Street-Level Client-Independent IP GeolocationUsenix

Wattenhofer, R.

YearAuthor(s)TitlePublication
2001
C. Labovitz
A. Ahuja
R. Wattenhofer
V. Srinivasan
The Impact of Internet Policy and Topology on Delayed Routing ConvergenceIEEE INFOCOM

Weaver, N.

YearAuthor(s)TitlePublication
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
Inside the Slammer WormIEEE Security and Privacy journal
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
The Spread of the Sapphire/Slammer WormCAIDA

Wessels, D.

YearAuthor(s)TitlePublication
2004
D. Wessels
M. Fomenkov
N. Brownlee
k. claffy
Measurements and Laboratory Simulations of the Upper DNS HierarchyPassive and Active Measurement Conference (PAM)
2003
D. Wessels
M. Fomenkov
k. claffy
Wow, That's a lot of packetsPassive and Active Measurement Conference (PAM)
1998
B. Huffaker
J. Jung
E. Nemeth
D. Wessels
k. claffy
Visualization of the growth and topology of the NLANR caching hierarchyInternational WWW Caching Workshop
1998
Huffaker B.
J. Jung
D. Wessels
k. claffy
Visualization of the Growth and Topology of the NLANR Caching HierarchyInternational WWW Caching Workshop
1998
D. Wessels
k. claffy
ICP and the Squid web cacheCAIDA
1997
D. Wessels
k. claffy
RFC 2187: Application of Internet Cache Protocol (ICP), version 2CAIDA
1997
D. Wessels
k. claffy
RFC 2186: Internet Cache Protocol (ICP), version 2CAIDA
1996
D. Wessels
k. claffy
Evolution of the NLANR cache hierarchy: Global configuration challengesCAIDA
1996
D. Wessels
k. claffy
Can WWW caches help to save the Internet?Coordination and Administration of the Internet Workshop

Wetherall, D.

YearAuthor(s)TitlePublication
2007
J. Pang
B. Greenstein
R. Gummadi
S. Seshan
D. Wetherall
802.11 user fingerprintingACM MobiCom
2006
E. Katz-Bassett
J. P. John
A. Krishnamurthy
D. Wetherall
T. Anderson
Y. Chawathe
Towards IP geolocation using delay and topology measurementsInternet Measurement Conference (IMC)
2002
R. Mahajan
D. Wetherall
T. Anderson
Understanding BGP MisconfigurationACM SIGCOMM
2002
D. Spring
R. Mahajan
D. Wetherall
Measuring ISP Topologies with RocketfuelACM SIGCOMM

Wichmann, A.

YearAuthor(s)TitlePublication
2003
C. Dewes
A. Wichmann
A. Feldmann
An Analysis of Internet Chat SystemsACM SIGCOMM

Wilfong, G.

YearAuthor(s)TitlePublication
2002
T. Griffin
G. Wilfong
Analysis of the MED Oscillation Problem in BGPIEEE International Conference on Network Protocols (ICNP)
2002
T. Griffin
G. Wilfong
On the Correctness of IBGP ConfigurationACM SIGCOMM

Williams, N.

YearAuthor(s)TitlePublication
2006
N. Williams
S. Zander
G. Armitage
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow ClassificationACM SIGCOMM

Williamson, C.

YearAuthor(s)TitlePublication
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Offline/realitme Traffic Classification Using Semi-supervised LearningPerform Eval
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network CoreWorld Wide Web (WWW) Conference
2006
A. Madhukar
C. Williamson
A Longitudinal Study of P2P Traffic ClassificationMASCOTS

Willinger, W.

YearAuthor(s)TitlePublication
2010
A. Rasti
N. Magharei
R. Rejaie
W. Willinger
Eyeball ASes: From Geography to ConectivityInternet Measurement Conference (IMC)
2003
H. Chang
S. Jamin
W. Willinger
Internet Connectivity at the AS-level: An Optimization-Driven Modeling ApproachACM SIGCOMM Workshop on MoMeTools

Wolf, T.

YearAuthor(s)TitlePublication
2007
R. Ramaswamy
T. Wolf
High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement SystemsIEEE/ACM Transactions on Networking

Wolff, S.

YearAuthor(s)TitlePublication
1994
R. Bohn
H.-W. Braun
k. claffy
S. Wolff
Mitigating the coming Internet crunch: multiple service levels via PrecedenceCAIDA

Won, Y.

YearAuthor(s)TitlePublication
2008
B. Park
Y. Won
M. Hong, J. Kim
Towards Automated Application Signature GenerationIEEE/IFIP Network Operations and Management Symposium (NOMS)

Wong, B.

YearAuthor(s)TitlePublication
2010
P. Gill
Y. Ganjali
B. Wong
Dude, where's that IP? Circumventing measurement-based IP geolocationUsenix Security Symposium
2007
B. Wong
I. Stoyanov
E. Gun Sirer
Octant: A Comprehensive Framework for the Geolocalization of Internet HostsSymposium on Networked System Design and Implementation (NSDI)

Woolam, C.

YearAuthor(s)TitlePublication
2007
W. Yurcik
C. Woolam
G. Hellings
L. Khan
B. Thuraisingham
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis TradeoffsACM Computing Research Repository (CoRR)

Workshop, NSF

YearAuthor(s)TitlePublication
2002
NSF Workshop Report of NSF Workshop on Network Research TestbedsNSF Workshop

Wright, C.

YearAuthor(s)TitlePublication
2008
S. Coull
C. Wright
F. Monrose
A. Keromytis
M. Reiter
Taming the Devil: Techniques for Evaluating Anonymized Network DataNDSS
2007
S. Coull
C. Wright
F. Monrose
M. Collins
M. Reiter
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network TracesNDSS
2006
C. Wright
F. Monrose
G. Masson
On Inferring Application Protocol Behaviors in Encrypted Network TrafficJournal of Machine Learning Research

Wu, S.

YearAuthor(s)TitlePublication
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM

Wu, S. F.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop

Xiao, Z.

YearAuthor(s)TitlePublication
2002
J. Rexford
J. Wang
Z. Xiao
Y. Zhang
BGP Routing Stability of Popular DestinationsACM SIGCOMM Internet Measurement Workshop

Xiong, H.

YearAuthor(s)TitlePublication
2007
B. Hoh
M. Gruteser
H. Xiong
A. Alrabady
Preserving privacy in gps traces via uncertainty-aware path cloakingACM Conference on Computer and Communications Security (CCS)

Xu, D.

YearAuthor(s)TitlePublication
2006
D. Xu
P. Ning
A Flexible Approach to Intrusion Alert Anonymization and CorrelationSecurecomm and Workshops

Xu, J.

YearAuthor(s)TitlePublication
2004
J. Fan
J. Xu
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeComputer Networks
2002
J. Xu
J. Fan
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeIEEE International Conference on Network Protocols (ICNP)
2001
J. Xu
J. Fan
M. Ammar
S. Moon
On the Design and Performance of Prefix-Preserving IP Traffic Trace AnonymizationACM SIGCOMM IMC

Xu, K.

YearAuthor(s)TitlePublication
2004
K. Xu
Z. Zhang
S. Bhattacharyya
Profiling Internet Backbone Traffic: Behavior Models and ApplicationsACM SIGCOMM

Ylonen, T.

YearAuthor(s)TitlePublication
2005
T. Ylonen Thoughts on how to mount an attack on tcpdpriv's '-a50' optionTech Report

Youn, I.

YearAuthor(s)TitlePublication
2009
I. Youn
B. L. Mark
D. Richards
Statistical geolocation of Internet hostsInternational Conference on Computer Communications and Networks (ICCCN)

Yu, P.S.

YearAuthor(s)TitlePublication
2007
C.C. Aggarwal
P.S. Yu
On Anonymization of String DataSDM

Yu, Q.

YearAuthor(s)TitlePublication
2009
C. Guo
Y. Liu
W. Shen
H.J. Wang
Q. Yu
Y. Zhang
Mining the Web and the Internet for Accurate IP Address GeolocationsIEEE Conference on Computer Communications (INFOCOM)

Yurcik, W.

YearAuthor(s)TitlePublication
2007
W. Yurcik
C. Woolam
G. Hellings
L. Khan
B. Thuraisingham
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis TradeoffsACM Computing Research Repository (CoRR)
2006
J. Zhang
N. Borisov
W. Yurcik
Outsourcing Security Analysis with Anonymized LogsSecurecomm and Workshops
2006
K. Luo
Y. Li
C. Ermopoulos
W. Yurcik
A. Slagell
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process AccountingTech Report
2005
Y. Li
Adam Slagell
K. Luo
W. Yurcik
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for SecurityInternational Conference on Telecommunication Systems, Modeling and Analysis
2005
A. Slagell
W. Yurcik
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymizationSecurity and Privacy for Emerging Areas in Communication Networks
2005
K. Luo
Y. Li
A. Slagell
W. Yurcik
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure SharingFLOCON - Network Flow Analysis Workshop

Zander, S.

YearAuthor(s)TitlePublication
2006
N. Williams
S. Zander
G. Armitage
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow ClassificationACM SIGCOMM
2005
S. Zander
T. Nguyen
G. Armitage
Self-learning IP Traffic Classification based on Statistical Flow CharacteristicsPassive and Active Measurement Conference (PAM)

Zejdl, P.

YearAuthor(s)TitlePublication
2007
S. Ubik
P. Zejdl
J. Halak
Real-time anonymization in passive network monitoringInternational Conference on Networking and Services (ICNS)

Zhang, H.

YearAuthor(s)TitlePublication
2001
T. S. E. Ng
H. Zhang
Predicting Internet Network Distance with Coordinates-Based ApproachesIEEE Conference on Computer Communications (INFOCOM)

Zhang, J.

YearAuthor(s)TitlePublication
2006
J. Zhang
N. Borisov
W. Yurcik
Outsourcing Security Analysis with Anonymized LogsSecurecomm and Workshops

Zhang, L.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM

Zhang, Qianli

YearAuthor(s)TitlePublication
2006
Qianli Zhang
Xing Li
An IP Address Anonymization Scheme with Multiple Access LevelsICOIN

Zhang, Y.

YearAuthor(s)TitlePublication
2009
C. Guo
Y. Liu
W. Shen
H.J. Wang
Q. Yu
Y. Zhang
Mining the Web and the Internet for Accurate IP Address GeolocationsIEEE Conference on Computer Communications (INFOCOM)
2002
J. Rexford
J. Wang
Z. Xiao
Y. Zhang
BGP Routing Stability of Popular DestinationsACM SIGCOMM Internet Measurement Workshop

Zhang, Z.

YearAuthor(s)TitlePublication
2004
K. Xu
Z. Zhang
S. Bhattacharyya
Profiling Internet Backbone Traffic: Behavior Models and ApplicationsACM SIGCOMM

Zhao, M.

YearAuthor(s)TitlePublication
2003
D. M. Nicol
S. W. Smith
M. Zhao
Efficient Security for BGP Route AnnouncementsDartmouth College, Computer Science

Zhao, X.

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM

Zheleva, E.

YearAuthor(s)TitlePublication
2007
E. Zheleva
L. Getoor
Preserving the Privacy of Sensitive Relationships in Graph DataACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD)

Ziedins, I.

YearAuthor(s)TitlePublication
2002
N. Brownlee
I. Ziedins
Response time distributions for global name serversPassive and Active Measurement Conference (PAM)

Zilberman, N.

YearAuthor(s)TitlePublication
2013
L. Neudorfer
Y. Shavitt
N. Zilberman
Improving AS relationship inference using PoPsTraffic Monitoring and Analysis Workshop (TMA)
2012
D. Feldman
Y. Shavitt
N. Zilberman
A structural approach for PoP geo-locationComputer Networks
2010
Y. Shavitt
N. Zilberman
A Study of Geolocation DatabasesarXiv cs.NI/.5674v3

Ziviani, A.

YearAuthor(s)TitlePublication
2006
B. Gueye
S. Uhlig
A. Ziviani
S. Fdida
Leveraging Buffering Delay Estimation for Geolocation of Internet HostsInternational Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference
2005
A. Ziviani
S. Fdida
J. F. de Rezende
O. C. M. B. Duarte
Improving the accuracy of measurement-based geographic location of internet hostsComputer Networks and ISDN Systems
2004
A. Ziviani
S. Fdida
J. F. de Rezende
O. Carlos
M. B. Duarte
Toward a measurement-based geographic location servicePassive and Active Network Measurement Workshop (PAM)
2004
B. Gueye
A. Ziviani
M. Crovella
S. Fdida
Constraint-based Geolocation of Internet HostsIEEE/ACM Transactions on Networking
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Demographic placement for Internet host locationGLOBECOM
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Similarity models for Internet host locationICON

Zuev, D.

YearAuthor(s)TitlePublication
2005
A. Moore
D. Zuev
M. Crogan
Discriminators for Use in Flow-based ClassificationIntel Research, Cambridge

  Last Modified: Thu Oct-19-2017 14:15:33 PDT
  Page URL: http://www.caida.org/publications/bib/networking/byauthor/index.xml