



An annotated bibliography of papers and presentations in the wide-area networking literature.
This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers.
Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.
A., Moore
Year | Author(s) | Title | Publication |
2005
| Moore A. | Traffic Classification using a Statistical Approach | Passive and Active Measurement Conference (PAM) |
Afek, Y.
Year | Author(s) | Title | Publication |
2002
| O. Ben-Shalom A. Bremler-Barr | On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
1999
| A. Bremler-Barr S. Har-Peled | Routing with a Clue | ACM SIGCOMM |
Agarwal, S.
Year | Author(s) | Title | Publication |
2009
| J.R. Lorch | Matchmaking for online games and other latency-sensitive P2P systems | Computer Communication Review |
2002
| S. Agarwal J. Rexford R. Katz | Characterizing the Internet Hierarchy from Multiple Vantage Points | IEEE INFOCOM |
Aggarwal, C.C.
Year | Author(s) | Title | Publication |
2007
| P.S. Yu | On Anonymization of String Data | SDM |
Ahuja, A.
Year | Author(s) | Title | Publication |
2001
| A. Ahuja R. Wattenhofer V. Srinivasan | The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
2000
| A. Ahuja A. Bose F. Jahanian | An Experimental Study of Internet Routing Convergence | Microsoft Research |
1998
| A. Ahuja F. Jahanian | Experimental Study of Internet Stability and Wide-Area Backbone Failures | University of Michigan |
Aiken, B.
Year | Author(s) | Title | Publication |
1993
| H.-W. Braun P. Ford | NSF implementation plan for interim NREN | Journal on High Speed Networking |
Akodjenou, .
Year | Author(s) | Title | Publication |
2006
| R. Teixeira . Akodjenou A. Soule K. Salamatian | Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
Allman, M.
Year | Author(s) | Title | Publication |
2009
| A. Feldmann V. Paxson M. Allman | On Dominant Characteristics of Residential Broadband Internet Traffic | ACM SIGCOMM IMC |
2007
| V. Paxson | Issues and etiquette concerning use of shared measurement data | ACM SIGCOMM IMC |
2006
| M. Allman V. Paxson J. Lee | The devil and packet trace anonymization | ACM SIGCOMM Computer Communication Review |
Almeroth, K.
Year | Author(s) | Title | Publication |
2000
| K. Almeroth k. claffy | A scalable architecture for monitoring and visualizing multicast statistics | Distributed Systems: Operations and Management |
Alrabady, A.
Year | Author(s) | Title | Publication |
2007
| M. Gruteser H. Xiong A. Alrabady | Preserving privacy in gps traces via uncertainty-aware path cloaking | ACM Conference on Computer and Communications Security (CCS) |
Alvarez-Hamelin, J.
Year | Author(s) | Title | Publication |
2008
| J. Alvarez-Hamelin J. Busch | A low complexity visualization tool that helps to perform complex systems analysis | New Journal of Physics |
Ammar, M.
Year | Author(s) | Title | Publication |
2004
| J. Xu M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | Computer Networks |
2002
| J. Fan M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | IEEE International Conference on Network Protocols (ICNP) |
2001
| J. Fan M. Ammar S. Moon | On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization | ACM SIGCOMM IMC |
Anagnostakis, K.G.
Year | Author(s) | Title | Publication |
2006
| S. Antonatos K.G. Anagnostakis | On the Privacy Risks of Publishing Anonymized IP Network Traces. | Communications and Multimedia Security |
Andersen, D. G.
Year | Author(s) | Title | Publication |
2003
| D. G. Andersen H. Balakrishnan M. F. Kaashoek | Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
Andersen, D.G.
Year | Author(s) | Title | Publication |
2002
| N. Feamster S. Bauer H. Balakrishnan | Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
Anderson, T.
Year | Author(s) | Title | Publication |
2009
| E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani | iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
2006
| J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe | Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
2002
| D. Wetherall T. Anderson | Understanding BGP Misconfiguration | ACM SIGCOMM |
Antonatos, S.
Year | Author(s) | Title | Publication |
2006
| S. Antonatos K.G. Anagnostakis | On the Privacy Risks of Publishing Anonymized IP Network Traces. | Communications and Multimedia Security |
2006
| M. Polychronakis S. Antonatos E. Markatos S. Ubik | Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
2006
| S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios | A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
Antoniades, D.
Year | Author(s) | Title | Publication |
2006
| M. Polychronakis S. Antonatos E. Markatos S. Ubik | Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
2006
| S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios | A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
Arif, M.J.
Year | Author(s) | Title | Publication |
2010
| S. Karunasekera S. Kulkarni | GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements | Australasian Conference on Computer Science (ASCS) |
2010
| S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic | Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
Arlitt, M.
Year | Author(s) | Title | Publication |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
2006
| M. Arlitt | SC2D: an alternative to trace anonymization | ACM SIGCOMM MineNet |
2006
| A. Mahanti M. Arlitt | Internet Traffic Identification using Machine Learning | IEEE GLOBECOM |
2006
| M. Arlitt A. Mahanti | Traffic Classification Using Clustering Algorithms | ACM SIGCOMM |
Armitage, G.
Year | Author(s) | Title | Publication |
2008
| G. Armitage | A Survey of Techniques for Internet Traffic Classification Using Machine Learning | IEEE Communications Surveys and Tutorials |
2006
| S. Zander G. Armitage | A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification | ACM SIGCOMM |
2005
| T. Nguyen G. Armitage | Self-learning IP Traffic Classification based on Statistical Flow Characteristics | Passive and Active Measurement Conference (PAM) |
Arnes, A.
Year | Author(s) | Title | Publication |
2005
| T. Brekne A. Arnes | Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. | CANS |
2005
| A. Arnes A. Oslebo | Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. | Privacy Enhancing Technologies |
Asaba, T.
Year | Author(s) | Title | Publication |
1992
| k. claffy O. Nakamura J. Murai | An analysis of international academic research network traffic between Japan and other nations | International Networking Conference (INET) |
B., Huffaker
Year | Author(s) | Title | Publication |
1998
| J. Jung D. Wessels k. claffy | Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |
Balakrishnan, H.
Year | Author(s) | Title | Publication |
2005
| M. Vutukuru N. Feamster H. Balakrishnan | Geographic Locality of IP Prefixes | Internet Measurement Conference (IMC) |
2003
| D. G. Andersen H. Balakrishnan M. F. Kaashoek | Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
2002
| N. Feamster S. Bauer H. Balakrishnan | Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
Bannister, J.
Year | Author(s) | Title | Publication |
2005
| G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister | Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
Barford, P.
Year | Author(s) | Title | Publication |
2012
| P. Barford B. Maggs R. Nowak | Posit: a lightweight approach for IP geolocation | ACM SIGMETRICS Performance Evaluation Review |
2010
| P. Barford J. Sommers R. Nowak | A Learning-Based Approach for IP Geolocation | PAM, LNCS Volume |
Barman, D.
Year | Author(s) | Title | Publication |
2007
| K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos | Comparison of Internet Traffic Classification Tools | IMRG WACI |
Bartlett, G.
Year | Author(s) | Title | Publication |
2007
| J. Heidemann C. Papadopoulos J. Pepin | Estimating P2P Traffic Volume at USC | USC/Information Sciences Institute |
2007
| J. Heidemann C. Papadopoulos | Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing | IEEE Global Internet Symposium |
2005
| G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister | Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
Bauer, S.
Year | Author(s) | Title | Publication |
2002
| N. Feamster S. Bauer H. Balakrishnan | Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
Beiro, M.
Year | Author(s) | Title | Publication |
2008
| J. Alvarez-Hamelin J. Busch | A low complexity visualization tool that helps to perform complex systems analysis | New Journal of Physics |
Ben-Shalom, O.
Year | Author(s) | Title | Publication |
2002
| O. Ben-Shalom A. Bremler-Barr | On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
Bernaille, L.
Year | Author(s) | Title | Publication |
2007
| R. Teixeira | Early Recognition of Encrypted Application | Passive and Active Measurement Conference (PAM) |
2006
| R. Teixeira . Akodjenou A. Soule K. Salamatian | Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
2006
| R. Teixeira K. Salamatian | Early Application Identification | ACM CoNEXT |
2005
| A. Soule M. Jeannin K. Salamatian | Blind Application Recognition Through Behavioral Classification | Paris |
Beverly, R.
Year | Author(s) | Title | Publication |
2003
| k. claffy | Wide-Area IP Multicast Traffic Characterization | IEEE Network |
Bhattacharyya, S.
Year | Author(s) | Title | Publication |
2004
| Z. Zhang S. Bhattacharyya | Profiling Internet Backbone Traffic: Behavior Models and Applications | ACM SIGCOMM |
2002
| C. Chuah R. Mortier S. Bhattacharyya C. Diot | Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
Bhumiratana, B.
Year | Author(s) | Title | Publication |
2007
| M. Bishop B. Bhumiratana L. Clark K. Levitt | Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
2006
| R. Crawford B. Bhumiratana L. Clark K. Levitt | Some Problems in Sanitizing Network Data | IEEE WETICE |
Bishop, M.
Year | Author(s) | Title | Publication |
2007
| M. Bishop B. Bhumiratana L. Clark K. Levitt | Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
2006
| R. Crawford B. Bhumiratana L. Clark K. Levitt | Some Problems in Sanitizing Network Data | IEEE WETICE |
Bohn, R.
Year | Author(s) | Title | Publication |
1994
| H.-W. Braun k. claffy S. Wolff | Mitigating the coming Internet crunch: multiple service levels via Precedence | CAIDA |
Bonfiglio, D.
Year | Author(s) | Title | Publication |
2007
| M. Mellia M. Meo D. Rossi P. Tofanelli | Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
Borisov, N.
Year | Author(s) | Title | Publication |
2006
| N. Borisov W. Yurcik | Outsourcing Security Analysis with Anonymized Logs | Securecomm and Workshops |
Bose, A.
Year | Author(s) | Title | Publication |
2000
| A. Ahuja A. Bose F. Jahanian | An Experimental Study of Internet Routing Convergence | Microsoft Research |
Bradner, S.
Year | Author(s) | Title | Publication |
1996
| S. Bradner k. claffy | In whose domain: name service in adolescence | Coordination and Administration of the Internet Workshop |
Braun, H.-W.
Year | Author(s) | Title | Publication |
1995
| A Gross H.-W. Braun | Measured interference of security mechanisms with network performance | International Networking Conference (INET) |
1995
| H.-W. Braun | Post-NSFNET statistics collection | International Networking Conference (INET) |
1995
| H.-W. Braun G. Polyzos | A parameterizable methodology for Internet traffic flow profiling | CAIDA |
1994
| H.-W. Braun k. claffy S. Wolff | Mitigating the coming Internet crunch: multiple service levels via Precedence | CAIDA |
1994
| k. claffy | Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server | World Wide Web (WWW) Conference |
1994
| B. Chinoy k. claffy | Applied Network Research: 1994 annual status report | CAIDA |
1994
| H.-W. Braun G. Polyzos | Tracking long-term growth of the NSFNET | CAIDA |
1994
| H.-W. Braun G. Polyzos | Internet traffic flow profiling | CAIDA |
1993
| H.-W. Braun P. Ford | NSF implementation plan for interim NREN | Journal on High Speed Networking |
1993
| B. Chinoy k. claffy G. Polyzos | 1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
1993
| H.-W. Braun G. Polyzos | Measurement considerations for assessing unidirectional latencies | CAIDA |
1993
| k. claffy G. Polyzos | A framework for flow-based accounting on the Internet | IEEE Singapore International Conference on Networks (SICON'93) |
1993
| H.-W. Braun G. Polyzos | Application of sampling methodologies to wide-area network traffic characterization | ACM SIGCOMM |
1993
| H.-W. Braun G. Polyzos | Long-term traffic aspects of the NSFNET | International Networking Conference (INET) |
1993
| k. claffy | Network analysis in support of Internet policy requirements | International Networking Conference (INET) |
1993
| k. claffy | Network analysis issues for a public Internet | Public Access to the Internet, A Harvard JFK School Workshop |
1993
| P. Ford Y. Rekhter | CIDR and the evolution of the Internet | International Networking Conference (INET) |
1993
| H.-W. Braun G. Polyzos | Traffic characteristics of the T1 NSFNET backbone | IEEE INFOCOM |
1992
| B. Chinoy k. claffy G. Polyzos | 1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
1992
| H.-W. Braun | The National Science Foundation Network | CAIDA |
Brekne, T.
Year | Author(s) | Title | Publication |
2005
| T. Brekne A. Arnes | Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. | CANS |
2005
| A. Arnes A. Oslebo | Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. | Privacy Enhancing Technologies |
Bremler-Barr, A.
Year | Author(s) | Title | Publication |
2002
| O. Ben-Shalom A. Bremler-Barr | On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
1999
| A. Bremler-Barr S. Har-Peled | Routing with a Clue | ACM SIGCOMM |
Broido, A.
Year | Author(s) | Title | Publication |
2004
| A. Broido N. Brownless K. Claffy M. Faloutsos | Is P2P Dying or Just Hiding | IEEE GLOBECOM |
2004
| A. Broido M. Faloutsos K. Claffy | Transport Layer Identification of P2p Traffic | ACM SIGCOMM |
2004
| Y. Hyun R. Gao k. claffy | Their share: diversity and disparity in IP traffic | Passive and Active Measurement Conference (PAM) |
2004
| M. Molle M. Faloutsos A. Broido | A Nonstationary Poisson View of Internet Traffic | IEEE INFOCOM |
2004
| A. Broido k. claffy R. Gao Y. Hyun R. van der Pol | Beyond CIDR Aggregation | CAIDA |
2003
| E. Nemeth k. claffy | Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
2003
| E. Nemeth k. claffy | Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
2003
| A. Broido k. claffy | On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
2003
| A. Broido k. claffy | Traceroute and BGP AS Path Incongruities | CAIDA |
2003
| R. King E. Nemeth k. claffy | Radon Spectroscopy of Inter-Packet Delay | IEEE High-Speeding Networking Workshop (HSN) |
2002
| k. claffy E. Nemeth | Internet Expansion, Refinement, and Churn | European Transactions on Telecommunications |
2001
| k. claffy | Internet topology: connectivity of IP graphs | SPIE International symposium on Convergence of IT and Communication |
2001
| k. claffy | Complexity of global routing policies | CAIDA |
2001
| k. claffy | Analysis of RouteViews BGP data: policy atoms | Network Resource Data Management Workshop |
Browlee, N.
Year | Author(s) | Title | Publication |
2007
| K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos | Comparison of Internet Traffic Classification Tools | IMRG WACI |
Brown, J.
Year | Author(s) | Title | Publication |
2002
| C. Shannon J. Brown | Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
2002
| C. Shannon J. Brown | Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
Brown, P.
Year | Author(s) | Title | Publication |
2005
| J. Costeux P. Brown | Analysis of Peer-to-Peer Traffic on ADSL | Passive and Active Measurement Conference (PAM) |
Brownlee, N.
Year | Author(s) | Title | Publication |
2004
| M. Fomenkov N. Brownlee k. claffy | Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
2003
| N. Brownlee | Integrating Active Methods and Flow Meters - an implementation using NeTraMet | Passive and Active Measurement Conference (PAM) |
2002
| k. claffy | Understanding Internet Traffic Streams: Dragonflies and Tortoises | CAIDA |
2002
| I. Ziedins | Response time distributions for global name servers | Passive and Active Measurement Conference (PAM) |
2001
| k. claffy E. Nemeth | DNS Root/gTLD Performance Measurements | USENIX LISA |
2001
| k. claffy E. Nemeth | DNS Measurements at a Root Server | IEEE GLOBECOM |
2001
| Using NeTraMet for Production Traffic Measurement | Integrated Management Strategies for the New Millenium | |
2001
| M. Murray | Streams, Flows and Torrents | Passive and Active Measurement Conference (PAM) |
2001
| k. claffy M. Murray E. Nemeth | Methodology for passive analysis of a university Internet link | Passive and Active Measurement Conference (PAM) |
2000
| R. Fulton | Kawaihiko and the third-quartile day [traffic management] | CAIDA |
Brownless, N.
Year | Author(s) | Title | Publication |
2004
| A. Broido N. Brownless K. Claffy M. Faloutsos | Is P2P Dying or Just Hiding | IEEE GLOBECOM |
Burgener, D.
Year | Author(s) | Title | Publication |
2011
| D. Burgener M. Flores A. Kuzmanovic C. Huang | Towards Street-Level Client-Independent IP Geolocation | Usenix |
Burstein, A.
Year | Author(s) | Title | Publication |
2008
| Toward a Culture of Cybersecurity Research | University of California, Berkeley | |
2008
| Conducting Cybersecurity Research Legally and Ethically | LEET |
Busch, J.
Year | Author(s) | Title | Publication |
2008
| J. Alvarez-Hamelin J. Busch | A low complexity visualization tool that helps to perform complex systems analysis | New Journal of Physics |
Bush, R.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
Butkovic, A.
Year | Author(s) | Title | Publication |
2013
| F. Orucevic A. Tanovic | Using Whois based geolocation and Google maps API for support cybercrime investigations | Recent Advances in Telecommunications and Circuits |
Byers, J.W.
Year | Author(s) | Title | Publication |
2003
| J.W. Byers M. Crovella I. Matta | On the geographic location of Internet resources | Selected Areas in Communications, Volume 21 |
CAIDA
Year | Author(s) | Title | Publication |
2000
| ISMA Winter 2000 Workshop - Final Report | Internet Statistics and Metrics Analysis (ISMA) | |
1999
| Report from the ISMA Network Visualization Workshop | Internet Statistics and Metrics Analysis (ISMA) | |
1999
| ISMA passive measurement data and analysis, workshop report | Internet Statistics and Metrics Analysis (ISMA) | |
1998
| Comments by CAIDA concerning the FCC's review of the acquisition of MCI Communications Corp. by Worldcom, Inc. | CAIDA | |
1996
| Cooperative Association for Internet Data Analysis | CAIDA |
Carlos, O.
Year | Author(s) | Title | Publication |
2004
| S. Fdida J. F. de Rezende O. Carlos M. B. Duarte | Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
Castelluccia, C.
Year | Author(s) | Title | Publication |
2009
| M.A. Kaafar P. Manils D. Perito | Geolocalization of proxied services and its application to fast-flux hidden servers | IMC |
Chandramouli, R.
Year | Author(s) | Title | Publication |
2012
| R.D.W. Perera R. Chandramouli K.P. Subbalakshmi | Network measurement based modeling and optimization for IP geolocation | Computer Networks |
Chang, D.
Year | Author(s) | Title | Publication |
2001
| R. Govindan J. Heidemann | An Empirical Study of Router Response to Large BGP Routing Table Load | USC/Information Sciences Institute |
Chang, H.
Year | Author(s) | Title | Publication |
2003
| S. Jamin W. Willinger | Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
Chawathe, Y.
Year | Author(s) | Title | Publication |
2006
| J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe | Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
Chen, W.
Year | Author(s) | Title | Publication |
2007
| W. Chen G. Miklau D. Towsley | Analyzing Privacy in Enterprise Packet Trace Anonymization | UMass Amherst |
Chinoy, B.
Year | Author(s) | Title | Publication |
1996
| T. Salo | Internet Exchanges: Policy-Driven Evolution | Coordination and Administration of the Internet Workshop |
1994
| B. Chinoy k. claffy | Applied Network Research: 1994 annual status report | CAIDA |
1993
| B. Chinoy k. claffy G. Polyzos | 1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
1992
| B. Chinoy k. claffy G. Polyzos | 1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
1992
| Dynamics of Internet routing information | CAIDA | |
1992
| H.-W. Braun | The National Science Foundation Network | CAIDA |
1992
| B. Chinoy | Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis | CAIDA |
Cho, K.
Year | Author(s) | Title | Publication |
2008
| K. Fukuda H. Esaki A. Kato | Observing Slow Crustal Movement in Residential User Traffic | ACM CoNEXT |
2004
| M. Luckie B. Huffaker | Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
Chuah, C.
Year | Author(s) | Title | Publication |
2002
| C. Chuah R. Mortier S. Bhattacharyya C. Diot | Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
Claessenss, J.
Year | Author(s) | Title | Publication |
2002
| B. Seys J. Claessenss B. Preneel | Towards Measuring Anonymity | Privacy Enhancing Technologies |
Claffy, K.
Year | Author(s) | Title | Publication |
2007
| K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos | Comparison of Internet Traffic Classification Tools | IMRG WACI |
2004
| A. Broido N. Brownless K. Claffy M. Faloutsos | Is P2P Dying or Just Hiding | IEEE GLOBECOM |
2004
| A. Broido M. Faloutsos K. Claffy | Transport Layer Identification of P2p Traffic | ACM SIGCOMM |
claffy, k.
Year | Author(s) | Title | Publication |
2004
| M. Fomenkov N. Brownlee k. claffy | Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
2004
| Y. Hyun R. Gao k. claffy | Their share: diversity and disparity in IP traffic | Passive and Active Measurement Conference (PAM) |
2004
| A. Broido k. claffy R. Gao Y. Hyun R. van der Pol | Beyond CIDR Aggregation | CAIDA |
2003
| R. Prasad M. Murray k. claffy | Bandwidth estimation: metrics, measurement techniques, and tools | IEEE Network |
2003
| E. Nemeth k. claffy | Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
2003
| E. Nemeth k. claffy | Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
2003
| M. Fomenkov k. claffy | Wow, That's a lot of packets | Passive and Active Measurement Conference (PAM) |
2003
| A. Broido k. claffy | On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
2003
| K. Keys D. Moore k. claffy | Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites | CAIDA |
2003
| B. Huffaker M. Fomenkov k. claffy | On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
2003
| A. Broido k. claffy | Traceroute and BGP AS Path Incongruities | CAIDA |
2003
| R. King E. Nemeth k. claffy | Radon Spectroscopy of Inter-Packet Delay | IEEE High-Speeding Networking Workshop (HSN) |
2003
| k. claffy | Wide-Area IP Multicast Traffic Characterization | IEEE Network |
2002
| D. Moore k. claffy | Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
2002
| D. Moore k. claffy | Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
2002
| M. Fomenkov D. J. Plummer D. Moore k. claffy | Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
2002
| k. claffy | Understanding Internet Traffic Streams: Dragonflies and Tortoises | CAIDA |
2002
| D. Plummer D. Moore k. claffy | Topology discovery by active probing | Symposium on Applications and the Internet (SAINT) |
2002
| k. claffy E. Nemeth | Internet Expansion, Refinement, and Churn | European Transactions on Telecommunications |
2001
| K. Keys R. Koga E. Lagache k. claffy | CoralReef software suite as a tool for system and network administrators | USENIX LISA |
2001
| k. claffy B. Huffaker D. Moore | Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
2001
| k. claffy E. Nemeth | DNS Root/gTLD Performance Measurements | USENIX LISA |
2001
| D. Moore k. claffy | Characteristics of Fragmented Traffic on Internet Links | ACM SIGCOMM Internet Measurement Workshop |
2001
| k. claffy E. Nemeth | DNS Measurements at a Root Server | IEEE GLOBECOM |
2001
| k. claffy | Internet topology: connectivity of IP graphs | SPIE International symposium on Convergence of IT and Communication |
2001
| k. claffy | Complexity of global routing policies | CAIDA |
2001
| k. claffy | Analysis of RouteViews BGP data: policy atoms | Network Resource Data Management Workshop |
2001
| D. Moore k. claffy | Characteristics of fragmented IP traffic on Internet links | Passive and Active Measurement Conference (PAM) |
2001
| k. claffy | Measuring the Immeasurable: Global Internet Measurement Infrastructure | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| M. Fomenkov D. Moore k. claffy | Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
2001
| k. claffy M. Murray E. Nemeth | Methodology for passive analysis of a university Internet link | Passive and Active Measurement Conference (PAM) |
2001
| G. Huntoon k. claffy | Traffic dynamics testbed | Large Scale Networking (LSN) Workshop |
2001
| CAIDA: Visualizing the Internet | CAIDA | |
2000
| K. Almeroth k. claffy | A scalable architecture for monitoring and visualizing multicast statistics | Distributed Systems: Operations and Management |
2000
| k. claffy | Trends in wide area IP traffic patterns - A view from Ames Internet Exchange | ITC Specialist Seminar |
2000
| T. Ott K. Thompson k. claffy | The Internet Engineering Curriculum Repository | International Networking Conference (INET) |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
2000
| Measuring the Internet | CAIDA | |
1999
| S. McCreary | Internet measurement and data analysis: passive and active measurement | American Statistical Association |
1999
| E. Nemeth k. claffy | Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
| k. claffy E. Nemeth | Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
1999
| E. Nemeth k. claffy | Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
| k. claffy E. Nemeth | Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
1999
| Internet measurement and data analysis: topology, workload, performance and routing statistics | NAE Workshop | |
1999
| T. Monk D. McRobb | Internet Tomography | CAIDA |
1998
| G. Miller K. Thompson | The nature of the beast: Recent traffic measurements from an Internet backbone | International Networking Conference (INET) |
1998
| J. Jung E. Nemeth D. Wessels k. claffy | Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
1998
| J. Jung D. Wessels k. claffy | Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |
1998
| k. claffy | ICP and the Squid web cache | CAIDA |
1997
| T. Monk | What's next for Internet data analysis? Status and challenges facing the community | CAIDA |
1997
| k. claffy | RFC 2187: Application of Internet Cache Protocol (ICP), version 2 | CAIDA |
1997
| k. claffy | RFC 2186: Internet Cache Protocol (ICP), version 2 | CAIDA |
1997
| k. claffy | Internet data acquisition and analysis: Status and next steps | CAIDA |
1996
| k. claffy | Geographic addressing reconsidered | Coordination and Administration of the Internet Workshop |
1996
| k. claffy | Evolution of the NLANR cache hierarchy: Global configuration challenges | CAIDA |
1996
| E. Hoffman k. claffy B. Fenner | Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
1996
| k. claffy | Address administration in IPv6 | IEEE Symposium on Information Visualization |
1996
| k. claffy | Can WWW caches help to save the Internet? | Coordination and Administration of the Internet Workshop |
1996
| k. claffy | Cooperation in Internet data acquisition and analysis | Coordination and Administration of the Internet Workshop |
1996
| S. Bradner k. claffy | In whose domain: name service in adolescence | Coordination and Administration of the Internet Workshop |
1996
| 'But some data is worse than others': Measurement of the global Internet | CAIDA | |
1996
| k. claffy | A survey of Internet statistics / metrics activities | CAIDA |
1995
| A Gross H.-W. Braun | Measured interference of security mechanisms with network performance | International Networking Conference (INET) |
1995
| H.-W. Braun | Post-NSFNET statistics collection | International Networking Conference (INET) |
1995
| H.-W. Braun G. Polyzos | A parameterizable methodology for Internet traffic flow profiling | CAIDA |
1994
| Internet traffic characterization. | University of California, San Diego | |
1994
| H.-W. Braun k. claffy S. Wolff | Mitigating the coming Internet crunch: multiple service levels via Precedence | CAIDA |
1994
| k. claffy | Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server | World Wide Web (WWW) Conference |
1994
| B. Chinoy k. claffy | Applied Network Research: 1994 annual status report | CAIDA |
1994
| H.-W. Braun G. Polyzos | Tracking long-term growth of the NSFNET | CAIDA |
1994
| H.-W. Braun G. Polyzos | Internet traffic flow profiling | CAIDA |
1993
| B. Chinoy k. claffy G. Polyzos | 1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
1993
| H.-W. Braun G. Polyzos | Measurement considerations for assessing unidirectional latencies | CAIDA |
1993
| k. claffy G. Polyzos | A framework for flow-based accounting on the Internet | IEEE Singapore International Conference on Networks (SICON'93) |
1993
| H.-W. Braun G. Polyzos | Application of sampling methodologies to wide-area network traffic characterization | ACM SIGCOMM |
1993
| H.-W. Braun G. Polyzos | Long-term traffic aspects of the NSFNET | International Networking Conference (INET) |
1993
| k. claffy | Network analysis in support of Internet policy requirements | International Networking Conference (INET) |
1993
| k. claffy | Network analysis issues for a public Internet | Public Access to the Internet, A Harvard JFK School Workshop |
1993
| H.-W. Braun G. Polyzos | Traffic characteristics of the T1 NSFNET backbone | IEEE INFOCOM |
1992
| B. Chinoy k. claffy G. Polyzos | 1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
1992
| k. claffy O. Nakamura J. Murai | An analysis of international academic research network traffic between Japan and other nations | International Networking Conference (INET) |
claffy, kc
Year | Author(s) | Title | Publication |
2011
| M. Fomenkov kc claffy | Geocompare: a comparison of public and commercial geolocation databases | CAIDA |
Clark, L.
Year | Author(s) | Title | Publication |
2007
| M. Bishop B. Bhumiratana L. Clark K. Levitt | Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
2006
| R. Crawford B. Bhumiratana L. Clark K. Levitt | Some Problems in Sanitizing Network Data | IEEE WETICE |
Cohen, I.
Year | Author(s) | Title | Publication |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
Collins, M.
Year | Author(s) | Title | Publication |
2007
| M. Reiter | Hit-list worm detection and bot identification in large networks using protocol graphs | RAID |
2007
| C. Wright F. Monrose M. Collins M. Reiter | Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
Constantinou, F.
Year | Author(s) | Title | Publication |
2006
| P. Mavrommatiss | Identifying Known and Unknown Peer-to-Peer Traffic | IEEE NCA |
Conti, G.
Year | Author(s) | Title | Publication |
2006
| Googling Considering Harmful | New Security Paradigms Workshop (NSPW) |
Costeux, J.
Year | Author(s) | Title | Publication |
2005
| J. Costeux P. Brown | Analysis of Peer-to-Peer Traffic on ADSL | Passive and Active Measurement Conference (PAM) |
Costeux, J.-L.
Year | Author(s) | Title | Publication |
2009
| J.-L. Costeux G. Urvoy-Keller T. En-Najjary | Challenging Statistical Classification for Operational Usage: the ADSL Case | ACM SIGCOMM IMC |
Cotton, C.
Year | Author(s) | Title | Publication |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
Coull, S.
Year | Author(s) | Title | Publication |
2008
| C. Wright F. Monrose A. Keromytis M. Reiter | Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
2007
| C. Wright F. Monrose M. Collins M. Reiter | Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
Cox, R.
Year | Author(s) | Title | Publication |
2004
| R. Cox F. Kaashoek R. Morris | Vivaldi: A Decentralized Network Coordinate System | SIGCOMM |
Crawford, R.
Year | Author(s) | Title | Publication |
2007
| M. Bishop B. Bhumiratana L. Clark K. Levitt | Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
2006
| R. Crawford B. Bhumiratana L. Clark K. Levitt | Some Problems in Sanitizing Network Data | IEEE WETICE |
Crogan, M.
Year | Author(s) | Title | Publication |
2005
| D. Zuev M. Crogan | Discriminators for Use in Flow-based Classification | Intel Research, Cambridge |
Crotti, M.
Year | Author(s) | Title | Publication |
2008
| M. Crotti F. Gringoli L. Salgarelli | Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting | Computer Networks |
2007
| M. Dusi F. Gringoli L. Salgarelli | Traffic Classification through Simple Statistical Fingerprinting | ACM SIGCOMM |
Crovella, M.
Year | Author(s) | Title | Publication |
2005
| M. Crovella C. Diot | Mining Anomalies Using Traffic Feature Distributions | ACM SIGCOMM |
2004
| A. Ziviani M. Crovella S. Fdida | Constraint-based Geolocation of Internet Hosts | IEEE/ACM Transactions on Networking |
2003
| M. Crovella | Virtual Landmarks for the Internet | Internet Measurement Conference (IMC) |
2003
| J.W. Byers M. Crovella I. Matta | On the geographic location of Internet resources | Selected Areas in Communications, Volume 21 |
Csabai, I.
Year | Author(s) | Title | Publication |
2011
| P. Matray P. Haga T. Sebok I. Csabai G. Vattay | Spotter: A Model Based Active Geolocation Service | INFOCOM |
2010
| P. Matray P. Haga I. Csabai G. Vattay | A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
D., Zuev
Year | Author(s) | Title | Publication |
2005
| Zuev D. | Internet Traffic Classification Using Bayesian Analysis Techniques | ACM SIGMETRICS |
2005
| Moore A. | Traffic Classification using a Statistical Approach | Passive and Active Measurement Conference (PAM) |
Dabek, F.
Year | Author(s) | Title | Publication |
2004
| R. Cox F. Kaashoek R. Morris | Vivaldi: A Decentralized Network Coordinate System | SIGCOMM |
Dainotti, A.
Year | Author(s) | Title | Publication |
2009
| W. de Donato A. Pescape G. Ventre | TIE: a Community-oriented Traffic Classification Platform | International Workshop on Traffic Monitoring and Analysis (TMA) |
2008
| W. de Donato A. Pescape P. Salvo Rossi | Classification of Network Traffic via Packet-Level Hidden Markov Models | IEEE GLOBECOM |
Danezis, G.
Year | Author(s) | Title | Publication |
2002
| G. Danezis | Towards an Information Theoretic Metric for Anonymity | Privacy Enhancing Technologies |
Dang, T.
Year | Author(s) | Title | Publication |
2008
| T. Dang A. Gefferth S. Monlnar | Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer | Systems and Computers in Japan |
2006
| T. Dang A. Gefferth S. Monlnar | Identification and Analysis of Peer-to-Peer Traffic | Journal of Communications |
Davis, C.
Year | Author(s) | Title | Publication |
1996
| P. Vixie T. Goodwin I. Dickinson | A Means for Expressing Location Information in the Domain Name System | RFC Editor |
de Donato, W.
Year | Author(s) | Title | Publication |
2009
| W. de Donato A. Pescape G. Ventre | TIE: a Community-oriented Traffic Classification Platform | International Workshop on Traffic Monitoring and Analysis (TMA) |
2008
| W. de Donato A. Pescape P. Salvo Rossi | Classification of Network Traffic via Packet-Level Hidden Markov Models | IEEE GLOBECOM |
de Rezende, J. F.
Year | Author(s) | Title | Publication |
2005
| S. Fdida J. F. de Rezende O. C. M. B. Duarte | Improving the accuracy of measurement-based geographic location of internet hosts | Computer Networks and ISDN Systems |
2004
| S. Fdida J. F. de Rezende O. Carlos M. B. Duarte | Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
de Rezende, J.F.
Year | Author(s) | Title | Publication |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Demographic placement for Internet host location | GLOBECOM |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Similarity models for Internet host location | ICON |
Dewes, C.
Year | Author(s) | Title | Publication |
2003
| A. Wichmann A. Feldmann | An Analysis of Internet Chat Systems | ACM SIGCOMM |
Dey, R.
Year | Author(s) | Title | Publication |
2013
| R. Dey Y. Liu K.W. Ross | Topology mapping and geolocating for China's Internet | IEEE Trans. On Parallel and Distributed Systems |
Diaz, C.
Year | Author(s) | Title | Publication |
2002
| B. Seys J. Claessenss B. Preneel | Towards Measuring Anonymity | Privacy Enhancing Technologies |
Dickinson, I.
Year | Author(s) | Title | Publication |
1996
| P. Vixie T. Goodwin I. Dickinson | A Means for Expressing Location Information in the Domain Name System | RFC Editor |
Diot, C.
Year | Author(s) | Title | Publication |
2005
| M. Crovella C. Diot | Mining Anomalies Using Traffic Feature Distributions | ACM SIGCOMM |
2002
| C. Chuah R. Mortier S. Bhattacharyya C. Diot | Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
Dong, Z.
Year | Author(s) | Title | Publication |
2012
| R.D.W. Perera R. Chandramouli K.P. Subbalakshmi | Network measurement based modeling and optimization for IP geolocation | Computer Networks |
Donnet, B.
Year | Author(s) | Title | Publication |
2011
| S. Uhlig M.A. Kaafar B. Donnet B. Gueye | IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
Donohoe, J.
Year | Author(s) | Title | Publication |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
Dovrolis, C.
Year | Author(s) | Title | Publication |
2003
| R. Prasad M. Murray k. claffy | Bandwidth estimation: metrics, measurement techniques, and tools | IEEE Network |
2001
| P. Ramanathan D. Moore | Packet Dispersion Techniques and Capacity Estimation | CAIDA |
2001
| P. Ramanathan D. Moore | What do packet dispersion techniques measure? | IEEE INFOCOM |
Duarte, M. B.
Year | Author(s) | Title | Publication |
2004
| S. Fdida J. F. de Rezende O. Carlos M. B. Duarte | Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
Duarte, O. C. M. B.
Year | Author(s) | Title | Publication |
2005
| S. Fdida J. F. de Rezende O. C. M. B. Duarte | Improving the accuracy of measurement-based geographic location of internet hosts | Computer Networks and ISDN Systems |
Duarte, O.C.M.B.
Year | Author(s) | Title | Publication |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Demographic placement for Internet host location | GLOBECOM |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Similarity models for Internet host location | ICON |
Duffield, N.
Year | Author(s) | Title | Publication |
2004
| O. Sen N. Duffield | Class-of-service Mapping for QoS | ACM SIGCOMM IMC |
Dusi, M.
Year | Author(s) | Title | Publication |
2008
| M. Crotti F. Gringoli L. Salgarelli | Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting | Computer Networks |
2008
| F. Gringoli L. Salgarelli | A Preliminary Look at the Privacy of SSH Tunnels | IEEE International Conference on Communications (ICC) |
2007
| M. Dusi F. Gringoli L. Salgarelli | Traffic Classification through Simple Statistical Fingerprinting | ACM SIGCOMM |
Emilion, R.
Year | Author(s) | Title | Publication |
2004
| K. Salamatian N. Taft R. Emilion K. Papagiannaki | Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
En-Najjary, T.
Year | Author(s) | Title | Publication |
2009
| J.-L. Costeux G. Urvoy-Keller T. En-Najjary | Challenging Statistical Classification for Operational Usage: the ADSL Case | ACM SIGCOMM IMC |
Endo, P.T.
Year | Author(s) | Title | Publication |
2010
| D. Sadok | Whois based geolocation: A strategy to geolocate Internet hosts | Advanced Information Networking and Applications (AINA) |
Eriksson, B.
Year | Author(s) | Title | Publication |
2012
| P. Barford B. Maggs R. Nowak | Posit: a lightweight approach for IP geolocation | ACM SIGMETRICS Performance Evaluation Review |
2010
| P. Barford J. Sommers R. Nowak | A Learning-Based Approach for IP Geolocation | PAM, LNCS Volume |
Erman, J.
Year | Author(s) | Title | Publication |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
2006
| A. Mahanti M. Arlitt | Internet Traffic Identification using Machine Learning | IEEE GLOBECOM |
2006
| M. Arlitt A. Mahanti | Traffic Classification Using Clustering Algorithms | ACM SIGCOMM |
Ermopoulos, C.
Year | Author(s) | Title | Publication |
2006
| Y. Li C. Ermopoulos W. Yurcik A. Slagell | Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
Ertoz, L.
Year | Author(s) | Title | Publication |
2003
| L. Ertoz V. Kumar A. Ozgur J. Srirvastava | A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
Esaki, H.
Year | Author(s) | Title | Publication |
2008
| K. Fukuda H. Esaki A. Kato | Observing Slow Crustal Movement in Residential User Traffic | ACM CoNEXT |
Estan, C.
Year | Author(s) | Title | Publication |
2004
| K. Keys D. Moore G. Varghese | Building a Better NetFlow | ACM SIGCOMM |
2003
| S. Savage G. Vargheses | Automatically Inferring Patterns of Resources Consumption in Network Traffic | ACM SIGCOMM |
F., Chang
Year | Author(s) | Title | Publication |
2005
| Chang F. Chi Feng W. Walpole J. | A Traffic Characterization of Popular on-line Games | IEEE/ACM Transactions on Networking |
Faloutso, M.
Year | Author(s) | Title | Publication |
2007
| K. Papgiannaki N. Taft M. Faloutso | Profiling the End Host | Passive and Active Measurement Conference (PAM) |
Faloutsos, M.
Year | Author(s) | Title | Publication |
2008
| P. Pappu M. Faloutsos | Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs | Tech Report |
2007
| P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese | Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
2007
| K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos | Comparison of Internet Traffic Classification Tools | IMRG WACI |
2005
| K. Papagiannaki M. Faloutsos | BLINC Multilevel Traffic Classification in the Dark | ACM SIGCOMM |
2004
| A. Broido N. Brownless K. Claffy M. Faloutsos | Is P2P Dying or Just Hiding | IEEE GLOBECOM |
2004
| A. Broido M. Faloutsos K. Claffy | Transport Layer Identification of P2p Traffic | ACM SIGCOMM |
2004
| M. Faloutsos | Analyzing BGP Policies: Methodology and Tool | IEEE INFOCOM |
2004
| M. Molle M. Faloutsos A. Broido | A Nonstationary Poisson View of Internet Traffic | IEEE INFOCOM |
Fan, J.
Year | Author(s) | Title | Publication |
2004
| J. Xu M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | Computer Networks |
2002
| J. Fan M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | IEEE International Conference on Network Protocols (ICNP) |
2001
| J. Fan M. Ammar S. Moon | On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization | ACM SIGCOMM IMC |
Fdida, S.
Year | Author(s) | Title | Publication |
2007
| S. Uhlig S. Fdida | Investigating the Imprecision of IP Block-based Geolocation | Passive and Active Network Measurement Workshop (PAM) |
2006
| S. Uhlig A. Ziviani S. Fdida | Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts | International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference |
2005
| S. Fdida J. F. de Rezende O. C. M. B. Duarte | Improving the accuracy of measurement-based geographic location of internet hosts | Computer Networks and ISDN Systems |
2004
| S. Fdida J. F. de Rezende O. Carlos M. B. Duarte | Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
2004
| A. Ziviani M. Crovella S. Fdida | Constraint-based Geolocation of Internet Hosts | IEEE/ACM Transactions on Networking |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Demographic placement for Internet host location | GLOBECOM |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Similarity models for Internet host location | ICON |
Feamster, N.
Year | Author(s) | Title | Publication |
2005
| M. Vutukuru N. Feamster H. Balakrishnan | Geographic Locality of IP Prefixes | Internet Measurement Conference (IMC) |
2003
| D. G. Andersen H. Balakrishnan M. F. Kaashoek | Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
2002
| N. Feamster S. Bauer H. Balakrishnan | Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
Feldman, D.
Year | Author(s) | Title | Publication |
2012
| Y. Shavitt N. Zilberman | A structural approach for PoP geo-location | Computer Networks |
Feldmann, A.
Year | Author(s) | Title | Publication |
2009
| A. Feldmann V. Paxson M. Allman | On Dominant Characteristics of Residential Broadband Internet Traffic | ACM SIGCOMM IMC |
2003
| A. Wichmann A. Feldmann | An Analysis of Internet Chat Systems | ACM SIGCOMM |
Fenner, B.
Year | Author(s) | Title | Publication |
1996
| E. Hoffman k. claffy B. Fenner | Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
Flores, M.
Year | Author(s) | Title | Publication |
2011
| D. Burgener M. Flores A. Kuzmanovic C. Huang | Towards Street-Level Client-Independent IP Geolocation | Usenix |
Floyd, S.
Year | Author(s) | Title | Publication |
2001
| S. Floyd | Identifying the TCP Behavior of Web Servers | ACM SIGCOMM |
Fomenkov, M.
Year | Author(s) | Title | Publication |
2011
| M. Fomenkov kc claffy | Geocompare: a comparison of public and commercial geolocation databases | CAIDA |
2004
| M. Fomenkov N. Brownlee k. claffy | Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
2003
| M. Fomenkov k. claffy | Wow, That's a lot of packets | Passive and Active Measurement Conference (PAM) |
2003
| K. Keys D. Moore k. claffy | Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites | CAIDA |
2003
| B. Huffaker M. Fomenkov k. claffy | On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
2002
| M. Fomenkov D. J. Plummer D. Moore k. claffy | Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
2001
| k. claffy B. Huffaker D. Moore | Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
2001
| M. Fomenkov D. Moore k. claffy | Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
Fomenkova, M.
Year | Author(s) | Title | Publication |
2007
| K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos | Comparison of Internet Traffic Classification Tools | IMRG WACI |
Ford, P.
Year | Author(s) | Title | Publication |
1993
| H.-W. Braun P. Ford | NSF implementation plan for interim NREN | Journal on High Speed Networking |
1993
| P. Ford Y. Rekhter | CIDR and the evolution of the Internet | International Networking Conference (INET) |
Fraleigh, C.
Year | Author(s) | Title | Publication |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
Franklin, J.
Year | Author(s) | Title | Publication |
2007
| A. Perrig V. Paxson S. Savage | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
Freedman, M. J.
Year | Author(s) | Title | Publication |
2005
| M. Vutukuru N. Feamster H. Balakrishnan | Geographic Locality of IP Prefixes | Internet Measurement Conference (IMC) |
Fukuda, K.
Year | Author(s) | Title | Publication |
2008
| K. Fukuda H. Esaki A. Kato | Observing Slow Crustal Movement in Residential User Traffic | ACM CoNEXT |
Fulton, R.
Year | Author(s) | Title | Publication |
2000
| R. Fulton | Kawaihiko and the third-quartile day [traffic management] | CAIDA |
Ganjali, Y.
Year | Author(s) | Title | Publication |
2010
| Y. Ganjali B. Wong | Dude, where's that IP? Circumventing measurement-based IP geolocation | Usenix Security Symposium |
Gao, L.
Year | Author(s) | Title | Publication |
2000
| On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium |
Gao, R.
Year | Author(s) | Title | Publication |
2004
| Y. Hyun R. Gao k. claffy | Their share: diversity and disparity in IP traffic | Passive and Active Measurement Conference (PAM) |
2004
| A. Broido k. claffy R. Gao Y. Hyun R. van der Pol | Beyond CIDR Aggregation | CAIDA |
Gefferth, A.
Year | Author(s) | Title | Publication |
2008
| T. Dang A. Gefferth S. Monlnar | Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer | Systems and Computers in Japan |
2006
| T. Dang A. Gefferth S. Monlnar | Identification and Analysis of Peer-to-Peer Traffic | Journal of Communications |
Gehrke, J.
Year | Author(s) | Title | Publication |
2006
| J. Gehrke D. Kifer M. Venkitasubramaniam | l-Diversity: Privacy Beyond k-Anonymity. | IEEE International Conference on Data Engineering (ICDE) |
Getoor, L.
Year | Author(s) | Title | Publication |
2007
| L. Getoor | Preserving the Privacy of Sensitive Relationships in Graph Data | ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD) |
Gill, P.
Year | Author(s) | Title | Publication |
2010
| Y. Ganjali B. Wong | Dude, where's that IP? Circumventing measurement-based IP geolocation | Usenix Security Symposium |
Giovannetti, E.
Year | Author(s) | Title | Publication |
2003
| C. A. Ristuccia | Estimating Market Power in the Internet Backbone Using Band-X data | Cambridge Working Papers in Economics |
Goodwin, T.
Year | Author(s) | Title | Publication |
1996
| P. Vixie T. Goodwin I. Dickinson | A Means for Expressing Location Information in the Domain Name System | RFC Editor |
Govindan, R.
Year | Author(s) | Title | Publication |
2002
| R. Govindan G. Varghese R. H. Katz | Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
2001
| R. Govindan J. Heidemann | An Empirical Study of Router Response to Large BGP Routing Table Load | USC/Information Sciences Institute |
Greenstein, B.
Year | Author(s) | Title | Publication |
2007
| B. Greenstein R. Gummadi S. Seshan D. Wetherall | 802.11 user fingerprinting | ACM MobiCom |
Griffin, T.
Year | Author(s) | Title | Publication |
2002
| G. Wilfong | Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
2002
| G. Wilfong | On the Correctness of IBGP Configuration | ACM SIGCOMM |
Griffin, T. G.
Year | Author(s) | Title | Publication |
2002
| What is the Sound of One Route Flapping? | Dartmouth Summer Workshop |
Gringoli, F.
Year | Author(s) | Title | Publication |
2008
| M. Crotti F. Gringoli L. Salgarelli | Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting | Computer Networks |
2008
| F. Gringoli L. Salgarelli | A Preliminary Look at the Privacy of SSH Tunnels | IEEE International Conference on Communications (ICC) |
2007
| M. Dusi F. Gringoli L. Salgarelli | Traffic Classification through Simple Statistical Fingerprinting | ACM SIGCOMM |
Groschwitz, N.
Year | Author(s) | Title | Publication |
1994
| G. Polyzos | A Time-Series Model of Long-Term Traffic on the NSFNET Backbone | IEEE International Conference on Communications (ICC) |
Gross, A
Year | Author(s) | Title | Publication |
1995
| A Gross H.-W. Braun | Measured interference of security mechanisms with network performance | International Networking Conference (INET) |
Grunwald, D.
Year | Author(s) | Title | Publication |
2007
| P. Ohm D. Grunwald | Legal issues surrounding monitoring during network research | ACM SIGCOMM IMC |
Gruteser, M.
Year | Author(s) | Title | Publication |
2007
| M. Gruteser H. Xiong A. Alrabady | Preserving privacy in gps traces via uncertainty-aware path cloaking | ACM Conference on Computer and Communications Security (CCS) |
Gueye, B.
Year | Author(s) | Title | Publication |
2011
| S. Uhlig M.A. Kaafar B. Donnet B. Gueye | IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
2008
| B. Gueye S. Uhlig | Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts | Passive and Active Network Measurement Workshop (PAM) |
2007
| S. Uhlig S. Fdida | Investigating the Imprecision of IP Block-based Geolocation | Passive and Active Network Measurement Workshop (PAM) |
2006
| S. Uhlig A. Ziviani S. Fdida | Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts | International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference |
2004
| A. Ziviani M. Crovella S. Fdida | Constraint-based Geolocation of Internet Hosts | IEEE/ACM Transactions on Networking |
Gummadi, R.
Year | Author(s) | Title | Publication |
2007
| B. Greenstein R. Gummadi S. Seshan D. Wetherall | 802.11 user fingerprinting | ACM MobiCom |
Gun Sirer, E.
Year | Author(s) | Title | Publication |
2007
| I. Stoyanov E. Gun Sirer | Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts | Symposium on Networked System Design and Implementation (NSDI) |
Gunatilaka, A.
Year | Author(s) | Title | Publication |
2010
| S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic | Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
Guo, C.
Year | Author(s) | Title | Publication |
2009
| Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang | Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
Guttag, J.
Year | Author(s) | Title | Publication |
2003
| M. Poletto J. Guttag F. Kaashoek | Role Classification of Hosts within Enterprise Networks based on Connection Patterns | USENIX |
Haffner, P.
Year | Author(s) | Title | Publication |
2005
| S. Sen O. Spatscheck D. Wang | Acas: Automated Construction of Application Signatures | ACM SIGCOMM |
Haga, P.
Year | Author(s) | Title | Publication |
2011
| P. Matray P. Haga T. Sebok I. Csabai G. Vattay | Spotter: A Model Based Active Geolocation Service | INFOCOM |
2010
| P. Matray P. Haga I. Csabai G. Vattay | A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
Halak, J.
Year | Author(s) | Title | Publication |
2007
| P. Zejdl J. Halak | Real-time anonymization in passive network monitoring | International Conference on Networking and Services (ICNS) |
Hall, M.
Year | Author(s) | Title | Publication |
2004
| M. Hall Brunskill J. Lorier P. | Flow Clustering Using Machine Learning Techniques | Passive and Active Measurement Conference (PAM) |
Hansen, M.
Year | Author(s) | Title | Publication |
2008
| M. Hansen | Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology | Tech Report |
Har-Peled, S.
Year | Author(s) | Title | Publication |
1999
| A. Bremler-Barr S. Har-Peled | Routing with a Clue | ACM SIGCOMM |
Harvan, M.
Year | Author(s) | Title | Publication |
2006
| J. Schonwalder | Prefix- and Lexicographical-order-preserving IP Address Anonymization | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
Heidemann, J.
Year | Author(s) | Title | Publication |
2012
| J. Heidemann Y. Pradkin | Towards geolocation of millions of IP addresses | Proc. ACM Internet measurement conference (IMC) |
2007
| J. Heidemann C. Papadopoulos J. Pepin | Estimating P2P Traffic Volume at USC | USC/Information Sciences Institute |
2007
| J. Heidemann C. Papadopoulos | Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing | IEEE Global Internet Symposium |
2005
| G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister | Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
2001
| R. Govindan J. Heidemann | An Empirical Study of Router Response to Large BGP Routing Table Load | USC/Information Sciences Institute |
Hellings, G.
Year | Author(s) | Title | Publication |
2007
| C. Woolam G. Hellings L. Khan B. Thuraisingham | Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
Hoffman, E.
Year | Author(s) | Title | Publication |
1996
| k. claffy | Geographic addressing reconsidered | Coordination and Administration of the Internet Workshop |
1996
| E. Hoffman k. claffy B. Fenner | Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
1996
| k. claffy | Address administration in IPv6 | IEEE Symposium on Information Visualization |
Hoh, B.
Year | Author(s) | Title | Publication |
2007
| M. Gruteser H. Xiong A. Alrabady | Preserving privacy in gps traces via uncertainty-aware path cloaking | ACM Conference on Computer and Communications Security (CCS) |
Holzhauer, F.
Year | Author(s) | Title | Publication |
2007
| IP Geolocation | Internet Measurement seminar |
Hu, Z.
Year | Author(s) | Title | Publication |
2012
| J. Heidemann Y. Pradkin | Towards geolocation of millions of IP addresses | Proc. ACM Internet measurement conference (IMC) |
Huang, C.
Year | Author(s) | Title | Publication |
2011
| D. Burgener M. Flores A. Kuzmanovic C. Huang | Towards Street-Level Client-Independent IP Geolocation | Usenix |
Huffaker, B.
Year | Author(s) | Title | Publication |
2011
| M. Fomenkov kc claffy | Geocompare: a comparison of public and commercial geolocation databases | CAIDA |
2004
| M. Luckie B. Huffaker | Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
2003
| B. Huffaker M. Fomenkov k. claffy | On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
2002
| M. Fomenkov D. J. Plummer D. Moore k. claffy | Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
2002
| D. Plummer D. Moore k. claffy | Topology discovery by active probing | Symposium on Applications and the Internet (SAINT) |
2001
| k. claffy B. Huffaker D. Moore | Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
2001
| M. Fomenkov D. Moore k. claffy | Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
1999
| E. Nemeth k. claffy | Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
| k. claffy E. Nemeth | Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
1999
| E. Nemeth k. claffy | Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
| k. claffy E. Nemeth | Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
1998
| J. Jung E. Nemeth D. Wessels k. claffy | Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
Huntoon, G.
Year | Author(s) | Title | Publication |
2001
| G. Huntoon k. claffy | Traffic dynamics testbed | Large Scale Networking (LSN) Workshop |
Hussain, A.
Year | Author(s) | Title | Publication |
2005
| G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister | Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
Huston, G.
Year | Author(s) | Title | Publication |
2001
| Commentary on Inter-Domain Routing in the Internet, RFC 3221 | The Internet Society | |
2001
| Analyzing the Internet's BGP Routing Table | The Internet Protocol Journal |
Hyun, Y.
Year | Author(s) | Title | Publication |
2004
| Y. Hyun R. Gao k. claffy | Their share: diversity and disparity in IP traffic | Passive and Active Measurement Conference (PAM) |
2004
| A. Broido k. claffy R. Gao Y. Hyun R. van der Pol | Beyond CIDR Aggregation | CAIDA |
2003
| A. Broido k. claffy | On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
2003
| A. Broido k. claffy | Traceroute and BGP AS Path Incongruities | CAIDA |
Iannaccone, G.
Year | Author(s) | Title | Publication |
2002
| C. Chuah R. Mortier S. Bhattacharyya C. Diot | Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
Iliofotou, M.
Year | Author(s) | Title | Publication |
2008
| P. Pappu M. Faloutsos | Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs | Tech Report |
2007
| P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese | Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
isp-bgpdnswg@nicwg.org
Year | Author(s) | Title | Publication |
2002
| Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG |
J., Brunskill
Year | Author(s) | Title | Publication |
2004
| M. Hall Brunskill J. Lorier P. | Flow Clustering Using Machine Learning Techniques | Passive and Active Measurement Conference (PAM) |
J., Walpole
Year | Author(s) | Title | Publication |
2005
| Chang F. Chi Feng W. Walpole J. | A Traffic Characterization of Popular on-line Games | IEEE/ACM Transactions on Networking |
Jahanian, F.
Year | Author(s) | Title | Publication |
2000
| A. Ahuja A. Bose F. Jahanian | An Experimental Study of Internet Routing Convergence | Microsoft Research |
1999
| G. R. Malan F. Jahanian | Origins of Internet Routing Instability | IEEE INFOCOM |
1998
| A. Ahuja F. Jahanian | Experimental Study of Internet Stability and Wide-Area Backbone Failures | University of Michigan |
1998
| G. R. Malan F. Jahanian | Internet Routing Instability | IEEE/ACM Transactions on Networking |
Jamin, S.
Year | Author(s) | Title | Publication |
2003
| S. Jamin W. Willinger | Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
Jeannin, M.
Year | Author(s) | Title | Publication |
2005
| A. Soule M. Jeannin K. Salamatian | Blind Application Recognition Through Behavioral Classification | Paris |
Johari, R.
Year | Author(s) | Title | Publication |
2003
| J. Tsitsiklis | Routing and Peering in a Competitive Internet | MIT |
John, J. P.
Year | Author(s) | Title | Publication |
2006
| J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe | Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
John, W.
Year | Author(s) | Title | Publication |
2008
| S. Tafvelin | Heuristics to Classify Internet Backbone Traffic based on Connection Patterns | International Conference on Information Networking (ICOIN) |
2008
| S. Tafvelin T. Olovsson | Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic | Passive and Active Measurement Conference (PAM) |
2007
| S. Tafvelin | Analysis of Internet Backbone Traffic and Header Anomalies Observed | ACM SIGCOMM IMC |
Johnson, D.
Year | Author(s) | Title | Publication |
2004
| D. Johnson J. Rexford J. Wang R. Katz | Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
Jung, J.
Year | Author(s) | Title | Publication |
1998
| J. Jung E. Nemeth D. Wessels k. claffy | Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
1998
| J. Jung D. Wessels k. claffy | Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |
Kaafar, M.A.
Year | Author(s) | Title | Publication |
2011
| S. Uhlig M.A. Kaafar B. Donnet B. Gueye | IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
2009
| M.A. Kaafar P. Manils D. Perito | Geolocalization of proxied services and its application to fast-flux hidden servers | IMC |
Kaashoek, F.
Year | Author(s) | Title | Publication |
2004
| R. Cox F. Kaashoek R. Morris | Vivaldi: A Decentralized Network Coordinate System | SIGCOMM |
2003
| M. Poletto J. Guttag F. Kaashoek | Role Classification of Hosts within Enterprise Networks based on Connection Patterns | USENIX |
Kaashoek, M. F.
Year | Author(s) | Title | Publication |
2003
| D. G. Andersen H. Balakrishnan M. F. Kaashoek | Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
Kalmanek, C.
Year | Author(s) | Title | Publication |
2002
| S. Sen C. Kalmanek | Streaming Video Traffic: Characterization and Network Impact | WCW |
Karagiannis, T.
Year | Author(s) | Title | Publication |
2007
| K. Papgiannaki N. Taft M. Faloutso | Profiling the End Host | Passive and Active Measurement Conference (PAM) |
2005
| K. Papagiannaki M. Faloutsos | BLINC Multilevel Traffic Classification in the Dark | ACM SIGCOMM |
2004
| A. Broido N. Brownless K. Claffy M. Faloutsos | Is P2P Dying or Just Hiding | IEEE GLOBECOM |
2004
| A. Broido M. Faloutsos K. Claffy | Transport Layer Identification of P2p Traffic | ACM SIGCOMM |
2004
| M. Molle M. Faloutsos A. Broido | A Nonstationary Poisson View of Internet Traffic | IEEE INFOCOM |
Karunasekera, S.
Year | Author(s) | Title | Publication |
2010
| S. Karunasekera S. Kulkarni | GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements | Australasian Conference on Computer Science (ASCS) |
2010
| S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic | Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
Kato, A.
Year | Author(s) | Title | Publication |
2008
| K. Fukuda H. Esaki A. Kato | Observing Slow Crustal Movement in Residential User Traffic | ACM CoNEXT |
Katz, R.
Year | Author(s) | Title | Publication |
2004
| D. Johnson J. Rexford J. Wang R. Katz | Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
2002
| S. Agarwal J. Rexford R. Katz | Characterizing the Internet Hierarchy from Multiple Vantage Points | IEEE INFOCOM |
Katz, R. H.
Year | Author(s) | Title | Publication |
2003
| J. Rexford J. Wang R. H. Katz | Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
2002
| R. Govindan G. Varghese R. H. Katz | Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
Katz-Bassett, E.
Year | Author(s) | Title | Publication |
2009
| E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani | iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
2006
| J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe | Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
Keromytis, A.
Year | Author(s) | Title | Publication |
2008
| C. Wright F. Monrose A. Keromytis M. Reiter | Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
Keys, K.
Year | Author(s) | Title | Publication |
2004
| K. Keys D. Moore G. Varghese | Building a Better NetFlow | ACM SIGCOMM |
2003
| K. Keys D. Moore k. claffy | Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites | CAIDA |
2001
| K. Keys R. Koga E. Lagache k. claffy | CoralReef software suite as a tool for system and network administrators | USENIX LISA |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
Khan, L.
Year | Author(s) | Title | Publication |
2007
| C. Woolam G. Hellings L. Khan B. Thuraisingham | Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
Khan, M.
Year | Author(s) | Title | Publication |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
Kifer, D.
Year | Author(s) | Title | Publication |
2006
| J. Gehrke D. Kifer M. Venkitasubramaniam | l-Diversity: Privacy Beyond k-Anonymity. | IEEE International Conference on Data Engineering (ICDE) |
Kim, H.
Year | Author(s) | Title | Publication |
2007
| K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos | Comparison of Internet Traffic Classification Tools | IMRG WACI |
Kim, M. Hong, J.
Year | Author(s) | Title | Publication |
2008
| Y. Won M. Hong, J. Kim | Towards Automated Application Signature Generation | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
King, R.
Year | Author(s) | Title | Publication |
2003
| R. King E. Nemeth k. claffy | Radon Spectroscopy of Inter-Packet Delay | IEEE High-Speeding Networking Workshop (HSN) |
Koga, R.
Year | Author(s) | Title | Publication |
2001
| K. Keys R. Koga E. Lagache k. claffy | CoralReef software suite as a tool for system and network administrators | USENIX LISA |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
Koukis, D.
Year | Author(s) | Title | Publication |
2006
| S. Antonatos K.G. Anagnostakis | On the Privacy Risks of Publishing Anonymized IP Network Traces. | Communications and Multimedia Security |
2006
| S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios | A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
Kreibich, C.
Year | Author(s) | Title | Publication |
2006
| K. Levchenko C. Kreibich S. Savage G. Voelker | Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
Krishnamurthy, A.
Year | Author(s) | Title | Publication |
2009
| E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani | iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
2006
| J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe | Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
Kulkarni, S.
Year | Author(s) | Title | Publication |
2010
| S. Karunasekera S. Kulkarni | GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements | Australasian Conference on Computer Science (ASCS) |
2010
| S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic | Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
Kumar, V.
Year | Author(s) | Title | Publication |
2003
| L. Ertoz V. Kumar A. Ozgur J. Srirvastava | A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
Kuzmanovic, A.
Year | Author(s) | Title | Publication |
2011
| D. Burgener M. Flores A. Kuzmanovic C. Huang | Towards Street-Level Client-Independent IP Geolocation | Usenix |
Labovitz, C.
Year | Author(s) | Title | Publication |
2001
| A. Ahuja R. Wattenhofer V. Srinivasan | The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
2000
| A. Ahuja A. Bose F. Jahanian | An Experimental Study of Internet Routing Convergence | Microsoft Research |
1999
| G. R. Malan F. Jahanian | Origins of Internet Routing Instability | IEEE INFOCOM |
1998
| A. Ahuja F. Jahanian | Experimental Study of Internet Stability and Wide-Area Backbone Failures | University of Michigan |
1998
| G. R. Malan F. Jahanian | Internet Routing Instability | IEEE/ACM Transactions on Networking |
Lagache, E.
Year | Author(s) | Title | Publication |
2001
| K. Keys R. Koga E. Lagache k. claffy | CoralReef software suite as a tool for system and network administrators | USENIX LISA |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
Lakhina, A.
Year | Author(s) | Title | Publication |
2005
| M. Crovella C. Diot | Mining Anomalies Using Traffic Feature Distributions | ACM SIGCOMM |
2003
| J.W. Byers M. Crovella I. Matta | On the geographic location of Internet resources | Selected Areas in Communications, Volume 21 |
Laki, S.
Year | Author(s) | Title | Publication |
2011
| P. Matray P. Haga T. Sebok I. Csabai G. Vattay | Spotter: A Model Based Active Geolocation Service | INFOCOM |
2010
| P. Matray P. Haga I. Csabai G. Vattay | A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
Lakkaraju, K.
Year | Author(s) | Title | Publication |
2006
| K. Lakkaraju K. Luo | FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | USENIX LISA |
Lazarevic, A.
Year | Author(s) | Title | Publication |
2003
| L. Ertoz V. Kumar A. Ozgur J. Srirvastava | A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
Lee, J.
Year | Author(s) | Title | Publication |
2006
| M. Allman V. Paxson J. Lee | The devil and packet trace anonymization | ACM SIGCOMM Computer Communication Review |
Lee, T.
Year | Author(s) | Title | Publication |
2003
| B. Huffaker M. Fomenkov k. claffy | On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
Levchenko, K.
Year | Author(s) | Title | Publication |
2006
| K. Levchenko C. Kreibich S. Savage G. Voelker | Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
Levitt, K.
Year | Author(s) | Title | Publication |
2007
| M. Bishop B. Bhumiratana L. Clark K. Levitt | Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
2006
| R. Crawford B. Bhumiratana L. Clark K. Levitt | Some Problems in Sanitizing Network Data | IEEE WETICE |
Li, N.
Year | Author(s) | Title | Publication |
2007
| T. Li S. Venkatasubramanian | t-Closeness: Privacy Beyond k-Anonymity and l-Diversity | IEEE International Conference on Data Engineering (ICDE) |
Li, T.
Year | Author(s) | Title | Publication |
2007
| T. Li S. Venkatasubramanian | t-Closeness: Privacy Beyond k-Anonymity and l-Diversity | IEEE International Conference on Data Engineering (ICDE) |
Li, Xing
Year | Author(s) | Title | Publication |
2006
| Xing Li | An IP Address Anonymization Scheme with Multiple Access Levels | ICOIN |
Li, Y.
Year | Author(s) | Title | Publication |
2006
| Y. Li C. Ermopoulos W. Yurcik A. Slagell | Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
2005
| Adam Slagell K. Luo W. Yurcik | CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security | International Conference on Telecommunication Systems, Modeling and Analysis |
2005
| Y. Li A. Slagell W. Yurcik | CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing | FLOCON - Network Flow Analysis Workshop |
Lincoln, P.
Year | Author(s) | Title | Publication |
2004
| P. Porras V. Shmatikov | Privacy-Preserving Sharing and Correlation of Security Alerts | USENIX Security Symposium |
Lindh, T.
Year | Author(s) | Title | Publication |
2003
| N. Brownlee | Integrating Active Methods and Flow Meters - an implementation using NeTraMet | Passive and Active Measurement Conference (PAM) |
Liu, Y.
Year | Author(s) | Title | Publication |
2013
| R. Dey Y. Liu K.W. Ross | Topology mapping and geolocating for China's Internet | IEEE Trans. On Parallel and Distributed Systems |
2009
| Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang | Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
Lorch, J.R.
Year | Author(s) | Title | Publication |
2009
| J.R. Lorch | Matchmaking for online games and other latency-sensitive P2P systems | Computer Communication Review |
Luckie, M.
Year | Author(s) | Title | Publication |
2004
| M. Luckie B. Huffaker | Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
Luo, K.
Year | Author(s) | Title | Publication |
2006
| K. Lakkaraju K. Luo | FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | USENIX LISA |
2006
| Y. Li C. Ermopoulos W. Yurcik A. Slagell | Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
2005
| Adam Slagell K. Luo W. Yurcik | CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security | International Conference on Telecommunication Systems, Modeling and Analysis |
2005
| Y. Li A. Slagell W. Yurcik | CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing | FLOCON - Network Flow Analysis Workshop |
Lyles, B.
Year | Author(s) | Title | Publication |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
Ma, J.
Year | Author(s) | Title | Publication |
2006
| K. Levchenko C. Kreibich S. Savage G. Voelker | Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
Machanavajjhala, A.
Year | Author(s) | Title | Publication |
2006
| J. Gehrke D. Kifer M. Venkitasubramaniam | l-Diversity: Privacy Beyond k-Anonymity. | IEEE International Conference on Data Engineering (ICDE) |
Madhukar, A.
Year | Author(s) | Title | Publication |
2006
| C. Williamson | A Longitudinal Study of P2P Traffic Classification | MASCOTS |
Madhyasth, H.V.
Year | Author(s) | Title | Publication |
2009
| E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani | iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
Maggs, B.
Year | Author(s) | Title | Publication |
2012
| P. Barford B. Maggs R. Nowak | Posit: a lightweight approach for IP geolocation | ACM SIGMETRICS Performance Evaluation Review |
Magharei, N.
Year | Author(s) | Title | Publication |
2010
| N. Magharei R. Rejaie W. Willinger | Eyeball ASes: From Geography to Conectivity | Internet Measurement Conference (IMC) |
Mahajan, R.
Year | Author(s) | Title | Publication |
2002
| D. Wetherall T. Anderson | Understanding BGP Misconfiguration | ACM SIGCOMM |
2002
| R. Mahajan D. Wetherall | Measuring ISP Topologies with Rocketfuel | ACM SIGCOMM |
Mahanti, A.
Year | Author(s) | Title | Publication |
2006
| A. Mahanti M. Arlitt | Internet Traffic Identification using Machine Learning | IEEE GLOBECOM |
2006
| M. Arlitt A. Mahanti | Traffic Classification Using Clustering Algorithms | ACM SIGCOMM |
Maier, G.
Year | Author(s) | Title | Publication |
2009
| A. Feldmann V. Paxson M. Allman | On Dominant Characteristics of Residential Broadband Internet Traffic | ACM SIGCOMM IMC |
Malan, G. R.
Year | Author(s) | Title | Publication |
1999
| G. R. Malan F. Jahanian | Origins of Internet Routing Instability | IEEE INFOCOM |
1998
| G. R. Malan F. Jahanian | Internet Routing Instability | IEEE/ACM Transactions on Networking |
Malomsoky, S.
Year | Author(s) | Title | Publication |
2008
| D. Orincasy S. Malomsoky I. Szabo | On the Validation of Traffic Classification Algorithms | Passive and Active Measurement Conference (PAM) |
Manhanti, A.
Year | Author(s) | Title | Publication |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
Manils, P.
Year | Author(s) | Title | Publication |
2009
| M.A. Kaafar P. Manils D. Perito | Geolocalization of proxied services and its application to fast-flux hidden servers | IMC |
Mankin, A.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
| X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang | Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
Mao, Z.
Year | Author(s) | Title | Publication |
2004
| D. Johnson J. Rexford J. Wang R. Katz | Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
2003
| J. Rexford J. Wang R. H. Katz | Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
2002
| R. Govindan G. Varghese R. H. Katz | Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
Mark, B. L.
Year | Author(s) | Title | Publication |
2009
| B. L. Mark D. Richards | Statistical geolocation of Internet hosts | International Conference on Computer Communications and Networks (ICCCN) |
Markatos, E.
Year | Author(s) | Title | Publication |
2006
| M. Polychronakis S. Antonatos E. Markatos S. Ubik | Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
Markatos, E.P.
Year | Author(s) | Title | Publication |
2006
| S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios | A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
Massey, D.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
| X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang | Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
Masson, G.
Year | Author(s) | Title | Publication |
2006
| F. Monrose G. Masson | On Inferring Application Protocol Behaviors in Encrypted Network Traffic | Journal of Machine Learning Research |
Mathis, M.
Year | Author(s) | Title | Publication |
2001
| G. Huntoon k. claffy | Traffic dynamics testbed | Large Scale Networking (LSN) Workshop |
Matray, P.
Year | Author(s) | Title | Publication |
2011
| P. Matray P. Haga T. Sebok I. Csabai G. Vattay | Spotter: A Model Based Active Geolocation Service | INFOCOM |
2010
| P. Matray P. Haga I. Csabai G. Vattay | A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
Matta, I.
Year | Author(s) | Title | Publication |
2003
| J.W. Byers M. Crovella I. Matta | On the geographic location of Internet resources | Selected Areas in Communications, Volume 21 |
Mavrommatiss, P.
Year | Author(s) | Title | Publication |
2006
| P. Mavrommatiss | Identifying Known and Unknown Peer-to-Peer Traffic | IEEE NCA |
Maziku, H.
Year | Author(s) | Title | Publication |
2012
| S. Han, K. Shetty T. Rogers | Enhancing the classification accuracy of IP geolocation | Military Communications Conf. (MILCOM) |
McCreary, S.
Year | Author(s) | Title | Publication |
2000
| k. claffy | Trends in wide area IP traffic patterns - A view from Ames Internet Exchange | ITC Specialist Seminar |
1999
| S. McCreary | Internet measurement and data analysis: passive and active measurement | American Statistical Association |
McGregor, A.
Year | Author(s) | Title | Publication |
2004
| M. Hall Brunskill J. Lorier P. | Flow Clustering Using Machine Learning Techniques | Passive and Active Measurement Conference (PAM) |
McRobb, D.
Year | Author(s) | Title | Publication |
1999
| T. Monk D. McRobb | Internet Tomography | CAIDA |
Mellia, M.
Year | Author(s) | Title | Publication |
2007
| M. Mellia M. Meo D. Rossi P. Tofanelli | Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
Meo, M.
Year | Author(s) | Title | Publication |
2007
| M. Mellia M. Meo D. Rossi P. Tofanelli | Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
Merwe, J.
Year | Author(s) | Title | Publication |
2002
| S. Sen C. Kalmanek | Streaming Video Traffic: Characterization and Network Impact | WCW |
Miklau, G.
Year | Author(s) | Title | Publication |
2007
| W. Chen G. Miklau D. Towsley | Analyzing Privacy in Enterprise Packet Trace Anonymization | UMass Amherst |
Miller, G.
Year | Author(s) | Title | Publication |
1998
| G. Miller K. Thompson | The nature of the beast: Recent traffic measurements from an Internet backbone | International Networking Conference (INET) |
Minshall, G.
Year | Author(s) | Title | Publication |
2005
| TCPdPriv | Tech Report |
Mitchell, D.
Year | Author(s) | Title | Publication |
1996
| S. Bradner k. claffy | In whose domain: name service in adolescence | Coordination and Administration of the Internet Workshop |
Mitzenmacher, M.
Year | Author(s) | Title | Publication |
2007
| P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese | Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
Mogul, J.
Year | Author(s) | Title | Publication |
2006
| M. Arlitt | SC2D: an alternative to trace anonymization | ACM SIGCOMM MineNet |
Moll, D.
Year | Author(s) | Title | Publication |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
Molle, M.
Year | Author(s) | Title | Publication |
2004
| M. Molle M. Faloutsos A. Broido | A Nonstationary Poisson View of Internet Traffic | IEEE INFOCOM |
Monk, T.
Year | Author(s) | Title | Publication |
1999
| T. Monk D. McRobb | Internet Tomography | CAIDA |
1997
| T. Monk | What's next for Internet data analysis? Status and challenges facing the community | CAIDA |
1997
| k. claffy | Internet data acquisition and analysis: Status and next steps | CAIDA |
1996
| k. claffy | Cooperation in Internet data acquisition and analysis | Coordination and Administration of the Internet Workshop |
1996
| k. claffy | A survey of Internet statistics / metrics activities | CAIDA |
Monlnar, S.
Year | Author(s) | Title | Publication |
2008
| T. Dang A. Gefferth S. Monlnar | Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer | Systems and Computers in Japan |
2006
| T. Dang A. Gefferth S. Monlnar | Identification and Analysis of Peer-to-Peer Traffic | Journal of Communications |
Monrose, F.
Year | Author(s) | Title | Publication |
2008
| C. Wright F. Monrose A. Keromytis M. Reiter | Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
2007
| C. Wright F. Monrose M. Collins M. Reiter | Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
2006
| F. Monrose G. Masson | On Inferring Application Protocol Behaviors in Encrypted Network Traffic | Journal of Machine Learning Research |
Moon, S.
Year | Author(s) | Title | Publication |
2004
| J. Xu M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | Computer Networks |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
2002
| J. Fan M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | IEEE International Conference on Network Protocols (ICNP) |
2001
| J. Fan M. Ammar S. Moon | On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization | ACM SIGCOMM IMC |
Moore, A.
Year | Author(s) | Title | Publication |
2005
| D. Zuev M. Crogan | Discriminators for Use in Flow-based Classification | Intel Research, Cambridge |
2005
| Zuev D. | Internet Traffic Classification Using Bayesian Analysis Techniques | ACM SIGMETRICS |
2001
| K Papagiannaki | Toward the Accurate Identification of Network Applications | Passive and Active Measurement Conference (PAM) |
Moore, D.
Year | Author(s) | Title | Publication |
2004
| K. Keys D. Moore G. Varghese | Building a Better NetFlow | ACM SIGCOMM |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | Inside the Slammer Worm | IEEE Security and Privacy journal |
2003
| C. Shannon G. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2003
| C. Shannon G. M. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2003
| K. Keys D. Moore k. claffy | Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites | CAIDA |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | The Spread of the Sapphire/Slammer Worm | CAIDA |
2002
| D. Moore k. claffy | Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
2002
| D. Moore k. claffy | Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
2002
| C. Shannon J. Brown | Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
2002
| C. Shannon J. Brown | Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
2002
| M. Fomenkov D. J. Plummer D. Moore k. claffy | Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
2002
| D. Plummer D. Moore k. claffy | Topology discovery by active probing | Symposium on Applications and the Internet (SAINT) |
2001
| K. Keys R. Koga E. Lagache k. claffy | CoralReef software suite as a tool for system and network administrators | USENIX LISA |
2001
| k. claffy B. Huffaker D. Moore | Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
2001
| D. Moore k. claffy | Characteristics of Fragmented Traffic on Internet Links | ACM SIGCOMM Internet Measurement Workshop |
2001
| G. M. Voelker S. Savage | Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
2001
| G. Voelker S. Savage | Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
2001
| P. Ramanathan D. Moore | Packet Dispersion Techniques and Capacity Estimation | CAIDA |
2001
| D. Moore k. claffy | Characteristics of fragmented IP traffic on Internet links | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| M. Fomenkov D. Moore k. claffy | Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
2001
| P. Ramanathan D. Moore | What do packet dispersion techniques measure? | IEEE INFOCOM |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
Morris, R.
Year | Author(s) | Title | Publication |
2004
| R. Cox F. Kaashoek R. Morris | Vivaldi: A Decentralized Network Coordinate System | SIGCOMM |
Mortier, R.
Year | Author(s) | Title | Publication |
2002
| C. Chuah R. Mortier S. Bhattacharyya C. Diot | Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
Muir, J.
Year | Author(s) | Title | Publication |
2009
| P. C. van Oorschot | Internet Geolocation: Evasion and Counterevasion | ACM Computing Surveys |
Munzner, T.
Year | Author(s) | Title | Publication |
1996
| E. Hoffman k. claffy B. Fenner | Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
Murai, J.
Year | Author(s) | Title | Publication |
1992
| k. claffy O. Nakamura J. Murai | An analysis of international academic research network traffic between Japan and other nations | International Networking Conference (INET) |
Murray, M.
Year | Author(s) | Title | Publication |
2003
| R. Prasad M. Murray k. claffy | Bandwidth estimation: metrics, measurement techniques, and tools | IEEE Network |
2001
| k. claffy | Measuring the Immeasurable: Global Internet Measurement Infrastructure | Passive and Active Measurement Conference (PAM) |
2001
| M. Murray | Streams, Flows and Torrents | Passive and Active Measurement Conference (PAM) |
2001
| k. claffy M. Murray E. Nemeth | Methodology for passive analysis of a university Internet link | Passive and Active Measurement Conference (PAM) |
Nakamura, O.
Year | Author(s) | Title | Publication |
1992
| k. claffy O. Nakamura J. Murai | An analysis of international academic research network traffic between Japan and other nations | International Networking Conference (INET) |
Nemeth, E.
Year | Author(s) | Title | Publication |
2003
| E. Nemeth k. claffy | Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
2003
| E. Nemeth k. claffy | Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
2003
| R. King E. Nemeth k. claffy | Radon Spectroscopy of Inter-Packet Delay | IEEE High-Speeding Networking Workshop (HSN) |
2002
| k. claffy E. Nemeth | Internet Expansion, Refinement, and Churn | European Transactions on Telecommunications |
2001
| k. claffy E. Nemeth | DNS Root/gTLD Performance Measurements | USENIX LISA |
2001
| k. claffy E. Nemeth | DNS Measurements at a Root Server | IEEE GLOBECOM |
2001
| k. claffy M. Murray E. Nemeth | Methodology for passive analysis of a university Internet link | Passive and Active Measurement Conference (PAM) |
2000
| T. Ott K. Thompson k. claffy | The Internet Engineering Curriculum Repository | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
2000
| M. Fomenkov D. Moore E. Nemeth k. claffy | Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
1999
| E. Nemeth | GTrace - A Graphical Traceroute Tool | Usenix LISA |
1999
| E. Nemeth | GTrace - A Graphical Traceroute Tool | USENIX LISA |
1999
| E. Nemeth k. claffy | Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
| k. claffy E. Nemeth | Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
1999
| E. Nemeth k. claffy | Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
| k. claffy E. Nemeth | Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
1998
| J. Jung E. Nemeth D. Wessels k. claffy | Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
Neudorfer, L.
Year | Author(s) | Title | Publication |
2013
| Y. Shavitt N. Zilberman | Improving AS relationship inference using PoPs | Traffic Monitoring and Analysis Workshop (TMA) |
Newman, D.
Year | Author(s) | Title | Publication |
2001
| Internet Core Router Test | Light Reading |
Ng, T. S. E.
Year | Author(s) | Title | Publication |
2001
| H. Zhang | Predicting Internet Network Distance with Coordinates-Based Approaches | IEEE Conference on Computer Communications (INFOCOM) |
Nguyen, T.
Year | Author(s) | Title | Publication |
2005
| T. Nguyen G. Armitage | Self-learning IP Traffic Classification based on Statistical Flow Characteristics | Passive and Active Measurement Conference (PAM) |
Nicol, D. M.
Year | Author(s) | Title | Publication |
2003
| S. W. Smith M. Zhao | Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
Ning, P.
Year | Author(s) | Title | Publication |
2006
| P. Ning | A Flexible Approach to Intrusion Alert Anonymization and Correlation | Securecomm and Workshops |
NLANR
Year | Author(s) | Title | Publication |
1992
| Redesign and extension of multi-agency interconnection point | CAIDA |
Norton, W. B.
Year | Author(s) | Title | Publication |
2004
| The Evolution of the U.S. Internet Peering Ecosystem | Equinix White Papers | |
2001
| Internet Service Providers and Peering | Equinix White Papers |
Nowak, R.
Year | Author(s) | Title | Publication |
2012
| P. Barford B. Maggs R. Nowak | Posit: a lightweight approach for IP geolocation | ACM SIGMETRICS Performance Evaluation Review |
2010
| P. Barford J. Sommers R. Nowak | A Learning-Based Approach for IP Geolocation | PAM, LNCS Volume |
O'Dell, M.
Year | Author(s) | Title | Publication |
1997
| GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT |
Ohm, P.
Year | Author(s) | Title | Publication |
2007
| P. Ohm D. Grunwald | Legal issues surrounding monitoring during network research | ACM SIGCOMM IMC |
Olovsson, T.
Year | Author(s) | Title | Publication |
2008
| S. Tafvelin T. Olovsson | Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic | Passive and Active Measurement Conference (PAM) |
Orincasy, D.
Year | Author(s) | Title | Publication |
2008
| D. Orincasy S. Malomsoky I. Szabo | On the Validation of Traffic Classification Algorithms | Passive and Active Measurement Conference (PAM) |
2007
| I. Szabo D. Orincasy | Accurate Traffic Classification | WoWMoM |
Orucevic, F.
Year | Author(s) | Title | Publication |
2013
| F. Orucevic A. Tanovic | Using Whois based geolocation and Google maps API for support cybercrime investigations | Recent Advances in Telecommunications and Circuits |
Oslebo, A.
Year | Author(s) | Title | Publication |
2005
| A. Arnes A. Oslebo | Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. | Privacy Enhancing Technologies |
Ott, T.
Year | Author(s) | Title | Publication |
2000
| T. Ott K. Thompson k. claffy | The Internet Engineering Curriculum Repository | International Networking Conference (INET) |
Overlier, L.
Year | Author(s) | Title | Publication |
2005
| T. Brekne A. Arnes | Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. | CANS |
Ozgur, A.
Year | Author(s) | Title | Publication |
2003
| L. Ertoz V. Kumar A. Ozgur J. Srirvastava | A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
P., Lorier
Year | Author(s) | Title | Publication |
2004
| M. Hall Brunskill J. Lorier P. | Flow Clustering Using Machine Learning Techniques | Passive and Active Measurement Conference (PAM) |
Padhye, J.
Year | Author(s) | Title | Publication |
2001
| S. Floyd | Identifying the TCP Behavior of Web Servers | ACM SIGCOMM |
Padmanabhan, V. N.
Year | Author(s) | Title | Publication |
2001
| L. Subramanian | An Investigation of Geographic Mapping Techniques for Internet Hosts | SIGCOMM |
Pang, J.
Year | Author(s) | Title | Publication |
2007
| B. Greenstein R. Gummadi S. Seshan D. Wetherall | 802.11 user fingerprinting | ACM MobiCom |
Pang, R.
Year | Author(s) | Title | Publication |
2006
| M. Allman V. Paxson J. Lee | The devil and packet trace anonymization | ACM SIGCOMM Computer Communication Review |
2003
| V. Paxson | A high-level programming environment for packet trace anonymization and transformation | ACM SIGCOMM |
Papadopoulos, C.
Year | Author(s) | Title | Publication |
2007
| J. Heidemann C. Papadopoulos J. Pepin | Estimating P2P Traffic Volume at USC | USC/Information Sciences Institute |
2007
| J. Heidemann C. Papadopoulos | Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing | IEEE Global Internet Symposium |
2005
| G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister | Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
Papagiannaki, K
Year | Author(s) | Title | Publication |
2005
| K. Papagiannaki M. Faloutsos | BLINC Multilevel Traffic Classification in the Dark | ACM SIGCOMM |
2004
| K. Salamatian N. Taft R. Emilion K. Papagiannaki | Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
Papagiannaki, K.
Year | Author(s) | Title | Publication |
2005
| K. Papagiannaki M. Faloutsos | BLINC Multilevel Traffic Classification in the Dark | ACM SIGCOMM |
2004
| K. Salamatian N. Taft R. Emilion K. Papagiannaki | Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
Papgiannaki, K.
Year | Author(s) | Title | Publication |
2007
| K. Papgiannaki N. Taft M. Faloutso | Profiling the End Host | Passive and Active Measurement Conference (PAM) |
Pappu, P.
Year | Author(s) | Title | Publication |
2008
| P. Pappu M. Faloutsos | Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs | Tech Report |
2007
| P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese | Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
Park, B.
Year | Author(s) | Title | Publication |
2008
| Y. Won M. Hong, J. Kim | Towards Automated Application Signature Generation | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
Paxson, V.
Year | Author(s) | Title | Publication |
2009
| A. Feldmann V. Paxson M. Allman | On Dominant Characteristics of Residential Broadband Internet Traffic | ACM SIGCOMM IMC |
2007
| A. Perrig V. Paxson S. Savage | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
2007
| V. Paxson | Issues and etiquette concerning use of shared measurement data | ACM SIGCOMM IMC |
2006
| M. Allman V. Paxson J. Lee | The devil and packet trace anonymization | ACM SIGCOMM Computer Communication Review |
2003
| V. Paxson | A high-level programming environment for packet trace anonymization and transformation | ACM SIGCOMM |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | Inside the Slammer Worm | IEEE Security and Privacy journal |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | The Spread of the Sapphire/Slammer Worm | CAIDA |
1997
| End-to-end routing behavior in the Internet | IEEE/ACM Transactions on Networking |
Pei, D.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
| X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang | Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
Pepin, J.
Year | Author(s) | Title | Publication |
2007
| J. Heidemann C. Papadopoulos J. Pepin | Estimating P2P Traffic Volume at USC | USC/Information Sciences Institute |
Percacci, R.
Year | Author(s) | Title | Publication |
2003
| A. Vespignani | Scale-free behavior of the Internet global performance | European Physical Journal B |
Perenyi, M.
Year | Author(s) | Title | Publication |
2008
| T. Dang A. Gefferth S. Monlnar | Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer | Systems and Computers in Japan |
2006
| T. Dang A. Gefferth S. Monlnar | Identification and Analysis of Peer-to-Peer Traffic | Journal of Communications |
Perera, R.D.W.
Year | Author(s) | Title | Publication |
2012
| R.D.W. Perera R. Chandramouli K.P. Subbalakshmi | Network measurement based modeling and optimization for IP geolocation | Computer Networks |
Periakaruppan, R.
Year | Author(s) | Title | Publication |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
2000
| R. Periakaruppan J. Donohoe k. claffy | Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
1999
| E. Nemeth | GTrace - A Graphical Traceroute Tool | Usenix LISA |
1999
| E. Nemeth | GTrace - A Graphical Traceroute Tool | USENIX LISA |
Perito, D.
Year | Author(s) | Title | Publication |
2009
| M.A. Kaafar P. Manils D. Perito | Geolocalization of proxied services and its application to fast-flux hidden servers | IMC |
Perrig, A.
Year | Author(s) | Title | Publication |
2007
| A. Perrig V. Paxson S. Savage | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
Pescape, A.
Year | Author(s) | Title | Publication |
2009
| W. de Donato A. Pescape G. Ventre | TIE: a Community-oriented Traffic Classification Platform | International Workshop on Traffic Monitoring and Analysis (TMA) |
2008
| W. de Donato A. Pescape P. Salvo Rossi | Classification of Network Traffic via Packet-Level Hidden Markov Models | IEEE GLOBECOM |
Petrovic, S.
Year | Author(s) | Title | Publication |
2007
| S. Petrovic | A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking | ARES |
Pfitzmann, A.
Year | Author(s) | Title | Publication |
2008
| M. Hansen | Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology | Tech Report |
Pietrzyk, M.
Year | Author(s) | Title | Publication |
2009
| J.-L. Costeux G. Urvoy-Keller T. En-Najjary | Challenging Statistical Classification for Operational Usage: the ADSL Case | ACM SIGCOMM IMC |
Plissonneau, L.
Year | Author(s) | Title | Publication |
2005
| J. Costeux P. Brown | Analysis of Peer-to-Peer Traffic on ADSL | Passive and Active Measurement Conference (PAM) |
Plummer, D.
Year | Author(s) | Title | Publication |
2002
| D. Plummer D. Moore k. claffy | Topology discovery by active probing | Symposium on Applications and the Internet (SAINT) |
Plummer, D. J.
Year | Author(s) | Title | Publication |
2002
| M. Fomenkov D. J. Plummer D. Moore k. claffy | Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
Poese, I.
Year | Author(s) | Title | Publication |
2011
| S. Uhlig M.A. Kaafar B. Donnet B. Gueye | IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
Poletto, M.
Year | Author(s) | Title | Publication |
2003
| M. Poletto J. Guttag F. Kaashoek | Role Classification of Hosts within Enterprise Networks based on Connection Patterns | USENIX |
Polychronakis, M.
Year | Author(s) | Title | Publication |
2006
| M. Polychronakis S. Antonatos E. Markatos S. Ubik | Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
Polyzos, G.
Porras, P.
Year | Author(s) | Title | Publication |
2006
| V. Shmatikov | Large-scale collection and sanitization of network security data: risks and challenges | New Security Paradigms Workshop (NSPW) |
2004
| P. Porras V. Shmatikov | Privacy-Preserving Sharing and Correlation of Security Alerts | USENIX Security Symposium |
Pradkin, Y.
Year | Author(s) | Title | Publication |
2012
| J. Heidemann Y. Pradkin | Towards geolocation of millions of IP addresses | Proc. ACM Internet measurement conference (IMC) |
Prasad, R.
Year | Author(s) | Title | Publication |
2003
| R. Prasad M. Murray k. claffy | Bandwidth estimation: metrics, measurement techniques, and tools | IEEE Network |
Preneel, B.
Year | Author(s) | Title | Publication |
2002
| B. Seys J. Claessenss B. Preneel | Towards Measuring Anonymity | Privacy Enhancing Technologies |
Pryadkin, Y.
Year | Author(s) | Title | Publication |
2005
| G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister | Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
Rajvaidya, P.
Year | Author(s) | Title | Publication |
2000
| K. Almeroth k. claffy | A scalable architecture for monitoring and visualizing multicast statistics | Distributed Systems: Operations and Management |
Ramanathan, P.
Year | Author(s) | Title | Publication |
2001
| P. Ramanathan D. Moore | Packet Dispersion Techniques and Capacity Estimation | CAIDA |
2001
| P. Ramanathan D. Moore | What do packet dispersion techniques measure? | IEEE INFOCOM |
Ramaswamy, R.
Year | Author(s) | Title | Publication |
2007
| T. Wolf | High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems | IEEE/ACM Transactions on Networking |
Rasti, A.
Year | Author(s) | Title | Publication |
2010
| N. Magharei R. Rejaie W. Willinger | Eyeball ASes: From Geography to Conectivity | Internet Measurement Conference (IMC) |
Reiter, M.
Year | Author(s) | Title | Publication |
2008
| C. Wright F. Monrose A. Keromytis M. Reiter | Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
2007
| M. Reiter | Hit-list worm detection and bot identification in large networks using protocol graphs | RAID |
2007
| C. Wright F. Monrose M. Collins M. Reiter | Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
Rejaie, R.
Year | Author(s) | Title | Publication |
2010
| N. Magharei R. Rejaie W. Willinger | Eyeball ASes: From Geography to Conectivity | Internet Measurement Conference (IMC) |
Rekhter, Y.
Year | Author(s) | Title | Publication |
1993
| P. Ford Y. Rekhter | CIDR and the evolution of the Internet | International Networking Conference (INET) |
1992
| B. Chinoy | Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis | CAIDA |
Rexford, J.
Year | Author(s) | Title | Publication |
2004
| D. Johnson J. Rexford J. Wang R. Katz | Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
2003
| J. Rexford J. Wang R. H. Katz | Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
2002
| J. Wang Z. Xiao Y. Zhang | BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
2002
| S. Agarwal J. Rexford R. Katz | Characterizing the Internet Hierarchy from Multiple Vantage Points | IEEE INFOCOM |
Ribeiro, B.
Year | Author(s) | Title | Publication |
2007
| W. Chen G. Miklau D. Towsley | Analyzing Privacy in Enterprise Packet Trace Anonymization | UMass Amherst |
Richards, D.
Year | Author(s) | Title | Publication |
2009
| B. L. Mark D. Richards | Statistical geolocation of Internet hosts | International Conference on Computer Communications and Networks (ICCCN) |
Ristic, B.
Year | Author(s) | Title | Publication |
2010
| S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic | Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
Ristuccia, C. A.
Year | Author(s) | Title | Publication |
2003
| C. A. Ristuccia | Estimating Market Power in the Internet Backbone Using Band-X data | Cambridge Working Papers in Economics |
Rockell, R.
Year | Author(s) | Title | Publication |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
Roesch, M.
Year | Author(s) | Title | Publication |
1999
| Snort Lightweight Intrusion Detection for Networks | USENIX LISA |
Rogers, T.
Year | Author(s) | Title | Publication |
2012
| S. Han, K. Shetty T. Rogers | Enhancing the classification accuracy of IP geolocation | Military Communications Conf. (MILCOM) |
Ross, K.W.
Year | Author(s) | Title | Publication |
2013
| R. Dey Y. Liu K.W. Ross | Topology mapping and geolocating for China's Internet | IEEE Trans. On Parallel and Distributed Systems |
Rossi, D.
Year | Author(s) | Title | Publication |
2007
| M. Mellia M. Meo D. Rossi P. Tofanelli | Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
Roughan, S.
Year | Author(s) | Title | Publication |
2004
| O. Sen N. Duffield | Class-of-service Mapping for QoS | ACM SIGCOMM IMC |
Sadok, D.
Year | Author(s) | Title | Publication |
2010
| D. Sadok | Whois based geolocation: A strategy to geolocate Internet hosts | Advanced Information Networking and Applications (AINA) |
Salamatian, K.
Year | Author(s) | Title | Publication |
2006
| R. Teixeira . Akodjenou A. Soule K. Salamatian | Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
2006
| R. Teixeira K. Salamatian | Early Application Identification | ACM CoNEXT |
2005
| A. Soule M. Jeannin K. Salamatian | Blind Application Recognition Through Behavioral Classification | Paris |
2004
| K. Salamatian N. Taft R. Emilion K. Papagiannaki | Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
Salgarelli, L.
Year | Author(s) | Title | Publication |
2008
| M. Crotti F. Gringoli L. Salgarelli | Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting | Computer Networks |
2008
| F. Gringoli L. Salgarelli | A Preliminary Look at the Privacy of SSH Tunnels | IEEE International Conference on Communications (ICC) |
2007
| M. Dusi F. Gringoli L. Salgarelli | Traffic Classification through Simple Statistical Fingerprinting | ACM SIGCOMM |
Salo, T.
Year | Author(s) | Title | Publication |
1996
| T. Salo | Internet Exchanges: Policy-Driven Evolution | Coordination and Administration of the Internet Workshop |
Salvo Rossi, P.
Year | Author(s) | Title | Publication |
2008
| W. de Donato A. Pescape P. Salvo Rossi | Classification of Network Traffic via Packet-Level Hidden Markov Models | IEEE GLOBECOM |
Samarati, P.
Year | Author(s) | Title | Publication |
1998
| L. Sweeney | Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression | Tech Report |
Savage, S.
Year | Author(s) | Title | Publication |
2007
| A. Perrig V. Paxson S. Savage | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
2006
| K. Levchenko C. Kreibich S. Savage G. Voelker | Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | Inside the Slammer Worm | IEEE Security and Privacy journal |
2003
| S. Savage G. Vargheses | Automatically Inferring Patterns of Resources Consumption in Network Traffic | ACM SIGCOMM |
2003
| C. Shannon G. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2003
| C. Shannon G. M. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | The Spread of the Sapphire/Slammer Worm | CAIDA |
2001
| G. M. Voelker S. Savage | Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
2001
| G. Voelker S. Savage | Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
Schonwalder, J.
Year | Author(s) | Title | Publication |
2006
| J. Schonwalder | Prefix- and Lexicographical-order-preserving IP Address Anonymization | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
Sebok, T.
Year | Author(s) | Title | Publication |
2011
| P. Matray P. Haga T. Sebok I. Csabai G. Vattay | Spotter: A Model Based Active Geolocation Service | INFOCOM |
Seeberg, V.
Year | Author(s) | Title | Publication |
2007
| S. Petrovic | A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking | ARES |
Seely, T.
Year | Author(s) | Title | Publication |
2003
| S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely | Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
Sen, O.
Year | Author(s) | Title | Publication |
2004
| O. Sen N. Duffield | Class-of-service Mapping for QoS | ACM SIGCOMM IMC |
Sen, S.
Year | Author(s) | Title | Publication |
2005
| S. Sen O. Spatscheck D. Wang | Acas: Automated Construction of Application Signatures | ACM SIGCOMM |
2004
| J. Wang | Analyzing Peer-to-Peer Traffic across Large Networks | IEEE/ACM Transactions on Networking |
2004
| O. Spatscheck D. Wang | Accurate Scalable In-Network Identification of P2P Traffic | World Wide Web (WWW) Conference |
2002
| S. Sen C. Kalmanek | Streaming Video Traffic: Characterization and Network Impact | WCW |
Serjantov, A.
Year | Author(s) | Title | Publication |
2002
| G. Danezis | Towards an Information Theoretic Metric for Anonymity | Privacy Enhancing Technologies |
Seshan, S.
Year | Author(s) | Title | Publication |
2007
| B. Greenstein R. Gummadi S. Seshan D. Wetherall | 802.11 user fingerprinting | ACM MobiCom |
Seys, B.
Year | Author(s) | Title | Publication |
2002
| B. Seys J. Claessenss B. Preneel | Towards Measuring Anonymity | Privacy Enhancing Technologies |
Shannon, C.
Year | Author(s) | Title | Publication |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | Inside the Slammer Worm | IEEE Security and Privacy journal |
2003
| C. Shannon G. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2003
| C. Shannon G. M. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | The Spread of the Sapphire/Slammer Worm | CAIDA |
2002
| D. Moore k. claffy | Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
2002
| D. Moore k. claffy | Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
2002
| C. Shannon J. Brown | Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
2002
| C. Shannon J. Brown | Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
2001
| D. Moore k. claffy | Characteristics of Fragmented Traffic on Internet Links | ACM SIGCOMM Internet Measurement Workshop |
2001
| D. Moore k. claffy | Characteristics of fragmented IP traffic on Internet links | Passive and Active Measurement Conference (PAM) |
Shavitt, Y.
Year | Author(s) | Title | Publication |
2013
| Y. Shavitt N. Zilberman | Improving AS relationship inference using PoPs | Traffic Monitoring and Analysis Workshop (TMA) |
2012
| Y. Shavitt N. Zilberman | A structural approach for PoP geo-location | Computer Networks |
2010
| N. Zilberman | A Study of Geolocation Databases | arXiv cs.NI/.5674v3 |
Shen, W.
Year | Author(s) | Title | Publication |
2009
| Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang | Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
Shetty, S. Han, K.
Year | Author(s) | Title | Publication |
2012
| S. Han, K. Shetty T. Rogers | Enhancing the classification accuracy of IP geolocation | Military Communications Conf. (MILCOM) |
Shmatikov, V.
Year | Author(s) | Title | Publication |
2006
| V. Shmatikov | Large-scale collection and sanitization of network security data: risks and challenges | New Security Paradigms Workshop (NSPW) |
2004
| P. Porras V. Shmatikov | Privacy-Preserving Sharing and Correlation of Security Alerts | USENIX Security Symposium |
Sicker, D.
Year | Author(s) | Title | Publication |
2007
| P. Ohm D. Grunwald | Legal issues surrounding monitoring during network research | ACM SIGCOMM IMC |
Siganos, G.
Year | Author(s) | Title | Publication |
2004
| M. Faloutsos | Analyzing BGP Policies: Methodology and Tool | IEEE INFOCOM |
Singh, S.
Year | Author(s) | Title | Publication |
2007
| P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese | Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
Siwpersad, S. S.
Year | Author(s) | Title | Publication |
2008
| B. Gueye S. Uhlig | Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts | Passive and Active Network Measurement Workshop (PAM) |
Slagell, A.
Year | Author(s) | Title | Publication |
2006
| K. Lakkaraju K. Luo | FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | USENIX LISA |
2006
| Y. Li C. Ermopoulos W. Yurcik A. Slagell | Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
2005
| W. Yurcik | Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization | Security and Privacy for Emerging Areas in Communication Networks |
2005
| Y. Li A. Slagell W. Yurcik | CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing | FLOCON - Network Flow Analysis Workshop |
Slagell, Adam
Year | Author(s) | Title | Publication |
2005
| Adam Slagell K. Luo W. Yurcik | CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security | International Conference on Telecommunication Systems, Modeling and Analysis |
Smith, S. W.
Year | Author(s) | Title | Publication |
2003
| S. W. Smith M. Zhao | Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
Sommers, J.
Year | Author(s) | Title | Publication |
2010
| P. Barford J. Sommers R. Nowak | A Learning-Based Approach for IP Geolocation | PAM, LNCS Volume |
Soule, A.
Year | Author(s) | Title | Publication |
2006
| R. Teixeira . Akodjenou A. Soule K. Salamatian | Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
2005
| A. Soule M. Jeannin K. Salamatian | Blind Application Recognition Through Behavioral Classification | Paris |
2004
| K. Salamatian N. Taft R. Emilion K. Papagiannaki | Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
Spatscheck, O.
Year | Author(s) | Title | Publication |
2005
| S. Sen O. Spatscheck D. Wang | Acas: Automated Construction of Application Signatures | ACM SIGCOMM |
2004
| O. Spatscheck D. Wang | Accurate Scalable In-Network Identification of P2P Traffic | World Wide Web (WWW) Conference |
Spring, D.
Year | Author(s) | Title | Publication |
2002
| R. Mahajan D. Wetherall | Measuring ISP Topologies with Rocketfuel | ACM SIGCOMM |
Srinivasan, V.
Year | Author(s) | Title | Publication |
2001
| A. Ahuja R. Wattenhofer V. Srinivasan | The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
Srirvastava, J.
Year | Author(s) | Title | Publication |
2003
| L. Ertoz V. Kumar A. Ozgur J. Srirvastava | A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
Staniford, S.
Year | Author(s) | Title | Publication |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | Inside the Slammer Worm | IEEE Security and Privacy journal |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | The Spread of the Sapphire/Slammer Worm | CAIDA |
Stoyanov, I.
Year | Author(s) | Title | Publication |
2007
| I. Stoyanov E. Gun Sirer | Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts | Symposium on Networked System Design and Implementation (NSDI) |
Subbalakshmi, K.P.
Year | Author(s) | Title | Publication |
2012
| R.D.W. Perera R. Chandramouli K.P. Subbalakshmi | Network measurement based modeling and optimization for IP geolocation | Computer Networks |
Subramanian, L.
Year | Author(s) | Title | Publication |
2002
| S. Agarwal J. Rexford R. Katz | Characterizing the Internet Hierarchy from Multiple Vantage Points | IEEE INFOCOM |
2001
| L. Subramanian | An Investigation of Geographic Mapping Techniques for Internet Hosts | SIGCOMM |
Sweeney, L.
Year | Author(s) | Title | Publication |
1998
| L. Sweeney | Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression | Tech Report |
Szabo, G.
Year | Author(s) | Title | Publication |
2008
| D. Orincasy S. Malomsoky I. Szabo | On the Validation of Traffic Classification Algorithms | Passive and Active Measurement Conference (PAM) |
2007
| I. Szabo D. Orincasy | Accurate Traffic Classification | WoWMoM |
Szabo, I.
Year | Author(s) | Title | Publication |
2008
| D. Orincasy S. Malomsoky I. Szabo | On the Validation of Traffic Classification Algorithms | Passive and Active Measurement Conference (PAM) |
2007
| I. Szabo D. Orincasy | Accurate Traffic Classification | WoWMoM |
T., Nguyen
Year | Author(s) | Title | Publication |
2008
| G. Armitage | A Survey of Techniques for Internet Traffic Classification Using Machine Learning | IEEE Communications Surveys and Tutorials |
Taft, N.
Year | Author(s) | Title | Publication |
2007
| K. Papgiannaki N. Taft M. Faloutso | Profiling the End Host | Passive and Active Measurement Conference (PAM) |
2004
| K. Salamatian N. Taft R. Emilion K. Papagiannaki | Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
Tafvelin, S.
Year | Author(s) | Title | Publication |
2008
| S. Tafvelin | Heuristics to Classify Internet Backbone Traffic based on Connection Patterns | International Conference on Information Networking (ICOIN) |
2008
| S. Tafvelin T. Olovsson | Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic | Passive and Active Measurement Conference (PAM) |
2007
| S. Tafvelin | Analysis of Internet Backbone Traffic and Header Anomalies Observed | ACM SIGCOMM IMC |
Tan, G.
Year | Author(s) | Title | Publication |
2003
| M. Poletto J. Guttag F. Kaashoek | Role Classification of Hosts within Enterprise Networks based on Connection Patterns | USENIX |
Tang, L.
Year | Author(s) | Title | Publication |
2003
| M. Crovella | Virtual Landmarks for the Internet | Internet Measurement Conference (IMC) |
Tanovic, A.
Year | Author(s) | Title | Publication |
2013
| F. Orucevic A. Tanovic | Using Whois based geolocation and Google maps API for support cybercrime investigations | Recent Advances in Telecommunications and Circuits |
Teixeira, R.
Year | Author(s) | Title | Publication |
2007
| R. Teixeira | Early Recognition of Encrypted Application | Passive and Active Measurement Conference (PAM) |
2006
| R. Teixeira . Akodjenou A. Soule K. Salamatian | Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
2006
| R. Teixeira K. Salamatian | Early Application Identification | ACM CoNEXT |
Tesch, M.
Year | Author(s) | Title | Publication |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
| D. Moore R. Koga E. Lagache M. Tesch k. claffy | The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
Thompson, K.
Year | Author(s) | Title | Publication |
2000
| T. Ott K. Thompson k. claffy | The Internet Engineering Curriculum Repository | International Networking Conference (INET) |
1998
| G. Miller K. Thompson | The nature of the beast: Recent traffic measurements from an Internet backbone | International Networking Conference (INET) |
Thuraisingham, B.
Year | Author(s) | Title | Publication |
2007
| C. Woolam G. Hellings L. Khan B. Thuraisingham | Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
Tian, Y.
Year | Author(s) | Title | Publication |
2013
| R. Dey Y. Liu K.W. Ross | Topology mapping and geolocating for China's Internet | IEEE Trans. On Parallel and Distributed Systems |
Tofanelli, P.
Year | Author(s) | Title | Publication |
2007
| M. Mellia M. Meo D. Rossi P. Tofanelli | Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
Towsley, D.
Year | Author(s) | Title | Publication |
2007
| W. Chen G. Miklau D. Towsley | Analyzing Privacy in Enterprise Packet Trace Anonymization | UMass Amherst |
Trimintzios, P.
Year | Author(s) | Title | Publication |
2006
| S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios | A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
Tsitsiklis, J.
Year | Author(s) | Title | Publication |
2003
| J. Tsitsiklis | Routing and Peering in a Competitive Internet | MIT |
Ubik, S.
Year | Author(s) | Title | Publication |
2007
| P. Zejdl J. Halak | Real-time anonymization in passive network monitoring | International Conference on Networking and Services (ICNS) |
2006
| M. Polychronakis S. Antonatos E. Markatos S. Ubik | Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
Uhlig, S.
Year | Author(s) | Title | Publication |
2011
| S. Uhlig M.A. Kaafar B. Donnet B. Gueye | IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
2008
| B. Gueye S. Uhlig | Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts | Passive and Active Network Measurement Workshop (PAM) |
2007
| S. Uhlig S. Fdida | Investigating the Imprecision of IP Block-based Geolocation | Passive and Active Network Measurement Workshop (PAM) |
2006
| S. Uhlig A. Ziviani S. Fdida | Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts | International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference |
Uijterwaal, H.
Year | Author(s) | Title | Publication |
2002
| First analysis of the Beacon data | IEPG meeting, Atlanta, GA |
Urvoy-Keller, G.
Year | Author(s) | Title | Publication |
2009
| J.-L. Costeux G. Urvoy-Keller T. En-Najjary | Challenging Statistical Classification for Operational Usage: the ADSL Case | ACM SIGCOMM IMC |
van der Pol, R.
Year | Author(s) | Title | Publication |
2004
| A. Broido k. claffy R. Gao Y. Hyun R. van der Pol | Beyond CIDR Aggregation | CAIDA |
van Oorschot, P. C.
Year | Author(s) | Title | Publication |
2009
| P. C. van Oorschot | Internet Geolocation: Evasion and Counterevasion | ACM Computing Surveys |
Varghese, G.
Year | Author(s) | Title | Publication |
2007
| P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese | Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
2004
| K. Keys D. Moore G. Varghese | Building a Better NetFlow | ACM SIGCOMM |
2002
| R. Govindan G. Varghese R. H. Katz | Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
Vargheses, G.
Year | Author(s) | Title | Publication |
2003
| S. Savage G. Vargheses | Automatically Inferring Patterns of Resources Consumption in Network Traffic | ACM SIGCOMM |
Vattay, G.
Year | Author(s) | Title | Publication |
2011
| P. Matray P. Haga T. Sebok I. Csabai G. Vattay | Spotter: A Model Based Active Geolocation Service | INFOCOM |
2010
| P. Matray P. Haga I. Csabai G. Vattay | A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
Venkataramani, A.
Year | Author(s) | Title | Publication |
2009
| E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani | iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
Venkatasubramanian, S.
Year | Author(s) | Title | Publication |
2007
| T. Li S. Venkatasubramanian | t-Closeness: Privacy Beyond k-Anonymity and l-Diversity | IEEE International Conference on Data Engineering (ICDE) |
Venkitasubramaniam, M.
Year | Author(s) | Title | Publication |
2006
| J. Gehrke D. Kifer M. Venkitasubramaniam | l-Diversity: Privacy Beyond k-Anonymity. | IEEE International Conference on Data Engineering (ICDE) |
Ventre, G.
Year | Author(s) | Title | Publication |
2009
| W. de Donato A. Pescape G. Ventre | TIE: a Community-oriented Traffic Classification Platform | International Workshop on Traffic Monitoring and Analysis (TMA) |
Verkaik, P.
Year | Author(s) | Title | Publication |
2004
| A. Broido k. claffy R. Gao Y. Hyun R. van der Pol | Beyond CIDR Aggregation | CAIDA |
Vespignani, A.
Year | Author(s) | Title | Publication |
2003
| A. Vespignani | Scale-free behavior of the Internet global performance | European Physical Journal B |
Vixie, P.
Year | Author(s) | Title | Publication |
1996
| P. Vixie T. Goodwin I. Dickinson | A Means for Expressing Location Information in the Domain Name System | RFC Editor |
Voelker, G.
Year | Author(s) | Title | Publication |
2006
| K. Levchenko C. Kreibich S. Savage G. Voelker | Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
2003
| C. Shannon G. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2001
| G. Voelker S. Savage | Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
Voelker, G. M.
Year | Author(s) | Title | Publication |
2003
| C. Shannon G. M. Voelker S. Savage | Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2001
| G. M. Voelker S. Savage | Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
Vutukuru, M.
Year | Author(s) | Title | Publication |
2005
| M. Vutukuru N. Feamster H. Balakrishnan | Geographic Locality of IP Prefixes | Internet Measurement Conference (IMC) |
W., Chang Feng
Year | Author(s) | Title | Publication |
2005
| Chang F. Chi Feng W. Walpole J. | A Traffic Characterization of Popular on-line Games | IEEE/ACM Transactions on Networking |
W., Chi Feng
Year | Author(s) | Title | Publication |
2005
| Chang F. Chi Feng W. Walpole J. | A Traffic Characterization of Popular on-line Games | IEEE/ACM Transactions on Networking |
Wang, D.
Year | Author(s) | Title | Publication |
2005
| S. Sen O. Spatscheck D. Wang | Acas: Automated Construction of Application Signatures | ACM SIGCOMM |
2004
| O. Spatscheck D. Wang | Accurate Scalable In-Network Identification of P2P Traffic | World Wide Web (WWW) Conference |
Wang, H.J.
Year | Author(s) | Title | Publication |
2009
| Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang | Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
Wang, J.
Year | Author(s) | Title | Publication |
2004
| J. Wang | Analyzing Peer-to-Peer Traffic across Large Networks | IEEE/ACM Transactions on Networking |
2004
| D. Johnson J. Rexford J. Wang R. Katz | Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
2003
| J. Rexford J. Wang R. H. Katz | Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
2002
| J. Wang Z. Xiao Y. Zhang | BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
Wang, L.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
| X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang | Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
Wang, Y.
Year | Author(s) | Title | Publication |
2011
| D. Burgener M. Flores A. Kuzmanovic C. Huang | Towards Street-Level Client-Independent IP Geolocation | Usenix |
Wattenhofer, R.
Year | Author(s) | Title | Publication |
2001
| A. Ahuja R. Wattenhofer V. Srinivasan | The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
Weaver, N.
Year | Author(s) | Title | Publication |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | Inside the Slammer Worm | IEEE Security and Privacy journal |
2003
| V. Paxson S. Savage C. Shannon S. Staniford N. Weaver | The Spread of the Sapphire/Slammer Worm | CAIDA |
Wessels, D.
Year | Author(s) | Title | Publication |
2004
| M. Fomenkov N. Brownlee k. claffy | Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
2003
| M. Fomenkov k. claffy | Wow, That's a lot of packets | Passive and Active Measurement Conference (PAM) |
1998
| J. Jung E. Nemeth D. Wessels k. claffy | Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
1998
| J. Jung D. Wessels k. claffy | Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |
1998
| k. claffy | ICP and the Squid web cache | CAIDA |
1997
| k. claffy | RFC 2187: Application of Internet Cache Protocol (ICP), version 2 | CAIDA |
1997
| k. claffy | RFC 2186: Internet Cache Protocol (ICP), version 2 | CAIDA |
1996
| k. claffy | Evolution of the NLANR cache hierarchy: Global configuration challenges | CAIDA |
1996
| k. claffy | Can WWW caches help to save the Internet? | Coordination and Administration of the Internet Workshop |
Wetherall, D.
Year | Author(s) | Title | Publication |
2007
| B. Greenstein R. Gummadi S. Seshan D. Wetherall | 802.11 user fingerprinting | ACM MobiCom |
2006
| J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe | Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
2002
| D. Wetherall T. Anderson | Understanding BGP Misconfiguration | ACM SIGCOMM |
2002
| R. Mahajan D. Wetherall | Measuring ISP Topologies with Rocketfuel | ACM SIGCOMM |
Wichmann, A.
Year | Author(s) | Title | Publication |
2003
| A. Wichmann A. Feldmann | An Analysis of Internet Chat Systems | ACM SIGCOMM |
Wilfong, G.
Year | Author(s) | Title | Publication |
2002
| G. Wilfong | Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
2002
| G. Wilfong | On the Correctness of IBGP Configuration | ACM SIGCOMM |
Williams, N.
Year | Author(s) | Title | Publication |
2006
| S. Zander G. Armitage | A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification | ACM SIGCOMM |
Williamson, C.
Year | Author(s) | Title | Publication |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
2007
| A. Manhanti M. Arlitt I. Cohen C. Williamson | Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
2006
| C. Williamson | A Longitudinal Study of P2P Traffic Classification | MASCOTS |
Willinger, W.
Year | Author(s) | Title | Publication |
2010
| N. Magharei R. Rejaie W. Willinger | Eyeball ASes: From Geography to Conectivity | Internet Measurement Conference (IMC) |
2003
| S. Jamin W. Willinger | Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
Wolf, T.
Year | Author(s) | Title | Publication |
2007
| T. Wolf | High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems | IEEE/ACM Transactions on Networking |
Wolff, S.
Year | Author(s) | Title | Publication |
1994
| H.-W. Braun k. claffy S. Wolff | Mitigating the coming Internet crunch: multiple service levels via Precedence | CAIDA |
Won, Y.
Year | Author(s) | Title | Publication |
2008
| Y. Won M. Hong, J. Kim | Towards Automated Application Signature Generation | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
Wong, B.
Year | Author(s) | Title | Publication |
2010
| Y. Ganjali B. Wong | Dude, where's that IP? Circumventing measurement-based IP geolocation | Usenix Security Symposium |
2007
| I. Stoyanov E. Gun Sirer | Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts | Symposium on Networked System Design and Implementation (NSDI) |
Woolam, C.
Year | Author(s) | Title | Publication |
2007
| C. Woolam G. Hellings L. Khan B. Thuraisingham | Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
Workshop, NSF
Year | Author(s) | Title | Publication |
2002
| Report of NSF Workshop on Network Research Testbeds | NSF Workshop |
Wright, C.
Year | Author(s) | Title | Publication |
2008
| C. Wright F. Monrose A. Keromytis M. Reiter | Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
2007
| C. Wright F. Monrose M. Collins M. Reiter | Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
2006
| F. Monrose G. Masson | On Inferring Application Protocol Behaviors in Encrypted Network Traffic | Journal of Machine Learning Research |
Wu, S.
Year | Author(s) | Title | Publication |
2002
| X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang | Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
Wu, S. F.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
Xiao, Z.
Year | Author(s) | Title | Publication |
2002
| J. Wang Z. Xiao Y. Zhang | BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
Xiong, H.
Year | Author(s) | Title | Publication |
2007
| M. Gruteser H. Xiong A. Alrabady | Preserving privacy in gps traces via uncertainty-aware path cloaking | ACM Conference on Computer and Communications Security (CCS) |
Xu, D.
Year | Author(s) | Title | Publication |
2006
| P. Ning | A Flexible Approach to Intrusion Alert Anonymization and Correlation | Securecomm and Workshops |
Xu, J.
Year | Author(s) | Title | Publication |
2004
| J. Xu M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | Computer Networks |
2002
| J. Fan M. Ammar S. Moon | Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | IEEE International Conference on Network Protocols (ICNP) |
2001
| J. Fan M. Ammar S. Moon | On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization | ACM SIGCOMM IMC |
Xu, K.
Year | Author(s) | Title | Publication |
2004
| Z. Zhang S. Bhattacharyya | Profiling Internet Backbone Traffic: Behavior Models and Applications | ACM SIGCOMM |
Ylonen, T.
Year | Author(s) | Title | Publication |
2005
| Thoughts on how to mount an attack on tcpdpriv's '-a50' option | Tech Report |
Youn, I.
Year | Author(s) | Title | Publication |
2009
| B. L. Mark D. Richards | Statistical geolocation of Internet hosts | International Conference on Computer Communications and Networks (ICCCN) |
Yu, P.S.
Year | Author(s) | Title | Publication |
2007
| P.S. Yu | On Anonymization of String Data | SDM |
Yu, Q.
Year | Author(s) | Title | Publication |
2009
| Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang | Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
Yurcik, W.
Year | Author(s) | Title | Publication |
2007
| C. Woolam G. Hellings L. Khan B. Thuraisingham | Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
2006
| N. Borisov W. Yurcik | Outsourcing Security Analysis with Anonymized Logs | Securecomm and Workshops |
2006
| Y. Li C. Ermopoulos W. Yurcik A. Slagell | Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
2005
| Adam Slagell K. Luo W. Yurcik | CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security | International Conference on Telecommunication Systems, Modeling and Analysis |
2005
| W. Yurcik | Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization | Security and Privacy for Emerging Areas in Communication Networks |
2005
| Y. Li A. Slagell W. Yurcik | CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing | FLOCON - Network Flow Analysis Workshop |
Zander, S.
Year | Author(s) | Title | Publication |
2006
| S. Zander G. Armitage | A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification | ACM SIGCOMM |
2005
| T. Nguyen G. Armitage | Self-learning IP Traffic Classification based on Statistical Flow Characteristics | Passive and Active Measurement Conference (PAM) |
Zejdl, P.
Year | Author(s) | Title | Publication |
2007
| P. Zejdl J. Halak | Real-time anonymization in passive network monitoring | International Conference on Networking and Services (ICNS) |
Zhang, H.
Year | Author(s) | Title | Publication |
2001
| H. Zhang | Predicting Internet Network Distance with Coordinates-Based Approaches | IEEE Conference on Computer Communications (INFOCOM) |
Zhang, J.
Year | Author(s) | Title | Publication |
2006
| N. Borisov W. Yurcik | Outsourcing Security Analysis with Anonymized Logs | Securecomm and Workshops |
Zhang, L.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
| X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang | Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
Zhang, Qianli
Year | Author(s) | Title | Publication |
2006
| Xing Li | An IP Address Anonymization Scheme with Multiple Access Levels | ICOIN |
Zhang, Y.
Year | Author(s) | Title | Publication |
2009
| Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang | Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
2002
| J. Wang Z. Xiao Y. Zhang | BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
Zhang, Z.
Year | Author(s) | Title | Publication |
2004
| Z. Zhang S. Bhattacharyya | Profiling Internet Backbone Traffic: Behavior Models and Applications | ACM SIGCOMM |
Zhao, M.
Year | Author(s) | Title | Publication |
2003
| S. W. Smith M. Zhao | Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
Zhao, X.
Year | Author(s) | Title | Publication |
2002
| X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang | Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
| X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang | Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
Zheleva, E.
Year | Author(s) | Title | Publication |
2007
| L. Getoor | Preserving the Privacy of Sensitive Relationships in Graph Data | ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD) |
Ziedins, I.
Year | Author(s) | Title | Publication |
2002
| I. Ziedins | Response time distributions for global name servers | Passive and Active Measurement Conference (PAM) |
Zilberman, N.
Year | Author(s) | Title | Publication |
2013
| Y. Shavitt N. Zilberman | Improving AS relationship inference using PoPs | Traffic Monitoring and Analysis Workshop (TMA) |
2012
| Y. Shavitt N. Zilberman | A structural approach for PoP geo-location | Computer Networks |
2010
| N. Zilberman | A Study of Geolocation Databases | arXiv cs.NI/.5674v3 |
Ziviani, A.
Year | Author(s) | Title | Publication |
2006
| S. Uhlig A. Ziviani S. Fdida | Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts | International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference |
2005
| S. Fdida J. F. de Rezende O. C. M. B. Duarte | Improving the accuracy of measurement-based geographic location of internet hosts | Computer Networks and ISDN Systems |
2004
| S. Fdida J. F. de Rezende O. Carlos M. B. Duarte | Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
2004
| A. Ziviani M. Crovella S. Fdida | Constraint-based Geolocation of Internet Hosts | IEEE/ACM Transactions on Networking |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Demographic placement for Internet host location | GLOBECOM |
2003
| S. Fdida J.F. de Rezende O.C.M.B. Duarte | Similarity models for Internet host location | ICON |
Zuev, D.
Year | Author(s) | Title | Publication |
2005
| D. Zuev M. Crogan | Discriminators for Use in Flow-based Classification | Intel Research, Cambridge |