Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > publications : bib : networking : bypublication
Annotated Bibliography of Networking Papers

An annotated bibliography of papers and presentations in the wide-area networking literature.

This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers.

Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.

|   View By:    date    author    topic    publication   |
|   Citation Format:    abbreviated    complete   |

ACM Computing Research Repository (CoRR)

YearAuthor(s)TitlePublication
2007
W. Yurcik
C. Woolam
G. Hellings
L. Khan
B. Thuraisingham
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis TradeoffsACM Computing Research Repository (CoRR)

ACM Computing Surveys

YearAuthor(s)TitlePublication
2009
J. Muir
P. C. van Oorschot
Internet Geolocation: Evasion and CounterevasionACM Computing Surveys

ACM CoNEXT

YearAuthor(s)TitlePublication
2008
K. Cho
K. Fukuda
H. Esaki
A. Kato
Observing Slow Crustal Movement in Residential User TrafficACM CoNEXT
2006
L. Bernaille
R. Teixeira
K. Salamatian
Early Application IdentificationACM CoNEXT

ACM Conference on Computer and Communications Security (CCS)

YearAuthor(s)TitlePublication
2007
B. Hoh
M. Gruteser
H. Xiong
A. Alrabady
Preserving privacy in gps traces via uncertainty-aware path cloakingACM Conference on Computer and Communications Security (CCS)
2007
J. Franklin
A. Perrig
V. Paxson
S. Savage
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsACM Conference on Computer and Communications Security (CCS)

ACM MobiCom

YearAuthor(s)TitlePublication
2007
J. Pang
B. Greenstein
R. Gummadi
S. Seshan
D. Wetherall
802.11 user fingerprintingACM MobiCom

ACM SIGCOMM

YearAuthor(s)TitlePublication
2007
M. Crotti
M. Dusi
F. Gringoli
L. Salgarelli
Traffic Classification through Simple Statistical FingerprintingACM SIGCOMM
2007
D. Bonfiglio
M. Mellia
M. Meo
D. Rossi
P. Tofanelli
Revealing Skype Traffic: when randomness plays with youACM SIGCOMM
2006
N. Williams
S. Zander
G. Armitage
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow ClassificationACM SIGCOMM
2006
J. Erman
M. Arlitt
A. Mahanti
Traffic Classification Using Clustering AlgorithmsACM SIGCOMM
2005
A. Lakhina
M. Crovella
C. Diot
Mining Anomalies Using Traffic Feature DistributionsACM SIGCOMM
2005
T. Karagiannis
K. Papagiannaki
M. Faloutsos
BLINC Multilevel Traffic Classification in the DarkACM SIGCOMM
2005
P. Haffner
S. Sen
O. Spatscheck
D. Wang
Acas: Automated Construction of Application SignaturesACM SIGCOMM
2004
C. Estan
K. Keys
D. Moore
G. Varghese
Building a Better NetFlowACM SIGCOMM
2004
K. Xu
Z. Zhang
S. Bhattacharyya
Profiling Internet Backbone Traffic: Behavior Models and ApplicationsACM SIGCOMM
2004
T. Karagiannis
A. Broido
M. Faloutsos
K. Claffy
Transport Layer Identification of P2p TrafficACM SIGCOMM
2004
K. Cho
M. Luckie
B. Huffaker
Identifying IPv6 Network Problems in the Dual-Stack WorldACM SIGCOMM
2003
R. Pang
V. Paxson
A high-level programming environment for packet trace anonymization and transformationACM SIGCOMM
2003
Z. Mao
J. Rexford
J. Wang
R. H. Katz
Towards an Accurate AS-Level Traceroute ToolACM SIGCOMM
2003
C. Estan
S. Savage
G. Vargheses
Automatically Inferring Patterns of Resources Consumption in Network TrafficACM SIGCOMM
2003
C. Dewes
A. Wichmann
A. Feldmann
An Analysis of Internet Chat SystemsACM SIGCOMM
2002
R. Mahajan
D. Wetherall
T. Anderson
Understanding BGP MisconfigurationACM SIGCOMM
2002
T. Griffin
G. Wilfong
On the Correctness of IBGP ConfigurationACM SIGCOMM
2002
D. Spring
R. Mahajan
D. Wetherall
Measuring ISP Topologies with RocketfuelACM SIGCOMM
2002
Z. Mao
R. Govindan
G. Varghese
R. H. Katz
Route Flap Damping Exacerbates Internet Routing ConvergenceACM SIGCOMM
2001
J. Padhye
S. Floyd
Identifying the TCP Behavior of Web ServersACM SIGCOMM
1999
Y. Afek
A. Bremler-Barr
S. Har-Peled
Routing with a ClueACM SIGCOMM
1993
k. claffy
H.-W. Braun
G. Polyzos
Application of sampling methodologies to wide-area network traffic characterizationACM SIGCOMM

ACM SIGCOMM Computer Communication Review

YearAuthor(s)TitlePublication
2011
I. Poese
S. Uhlig
M.A. Kaafar
B. Donnet
B. Gueye
IP geolocation databases: unreliable?ACM SIGCOMM Computer Communication Review
2006
R. Pang
M. Allman
V. Paxson
J. Lee
The devil and packet trace anonymizationACM SIGCOMM Computer Communication Review
2006
L. Bernaille
R. Teixeira
. Akodjenou
A. Soule
K. Salamatian
Traffic Classification on the flyACM SIGCOMM Computer Communication Review

ACM SIGCOMM IMC

YearAuthor(s)TitlePublication
2009
M. Pietrzyk
J.-L. Costeux
G. Urvoy-Keller
T. En-Najjary
Challenging Statistical Classification for Operational Usage: the ADSL CaseACM SIGCOMM IMC
2009
G. Maier
A. Feldmann
V. Paxson
M. Allman
On Dominant Characteristics of Residential Broadband Internet TrafficACM SIGCOMM IMC
2007
D. Sicker
P. Ohm
D. Grunwald
Legal issues surrounding monitoring during network researchACM SIGCOMM IMC
2007
M. Allman
V. Paxson
Issues and etiquette concerning use of shared measurement dataACM SIGCOMM IMC
2007
W. John
S. Tafvelin
Analysis of Internet Backbone Traffic and Header Anomalies ObservedACM SIGCOMM IMC
2006
J. Ma
K. Levchenko
C. Kreibich
S. Savage
G. Voelker
Unexpected Means of Protocol InferenceACM SIGCOMM IMC
2004
S. Roughan
O. Sen
N. Duffield
Class-of-service Mapping for QoSACM SIGCOMM IMC
2001
J. Xu
J. Fan
M. Ammar
S. Moon
On the Design and Performance of Prefix-Preserving IP Traffic Trace AnonymizationACM SIGCOMM IMC

ACM SIGCOMM Internet Measurement Workshop

YearAuthor(s)TitlePublication
2002
L. Wang
X. Zhao
D. Pei
R. Bush
D. Massey
A. Mankin
S. F. Wu
L. Zhang
Observation and Analysis of BGP Behavior Under StressACM SIGCOMM Internet Measurement Workshop
2002
J. Rexford
J. Wang
Z. Xiao
Y. Zhang
BGP Routing Stability of Popular DestinationsACM SIGCOMM Internet Measurement Workshop
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop
2002
D. Moore
C. Shannon
J. Brown
Code-Red: a case study on the spread and victims of an Internet wormACM SIGCOMM Internet Measurement Workshop
2002
G. Iannaccone
C. Chuah
R. Mortier
S. Bhattacharyya
C. Diot
Analysis of link failures in an IP backboneACM SIGCOMM Internet Measurement Workshop
2002
D.G. Andersen
N. Feamster
S. Bauer
H. Balakrishnan
Topology Inference from BGP Routing DynamicsACM SIGCOMM Internet Measurement Workshop
2002
Y. Afek
O. Ben-Shalom
A. Bremler-Barr
On the Structure and Application of BGP Policy AtomsACM SIGCOMM Internet Measurement Workshop
2001
C. Shannon
D. Moore
k. claffy
Characteristics of Fragmented Traffic on Internet LinksACM SIGCOMM Internet Measurement Workshop

ACM SIGCOMM MineNet

YearAuthor(s)TitlePublication
2006
J. Mogul
M. Arlitt
SC2D: an alternative to trace anonymizationACM SIGCOMM MineNet
2005
A. Hussain
G. Bartlett
Y. Pryadkin
J. Heidemann
C. Papadopoulos
J. Bannister
Experiences with a continuous network tracing infrastructureACM SIGCOMM MineNet

ACM SIGCOMM Workshop on MoMeTools

YearAuthor(s)TitlePublication
2003
H. Chang
S. Jamin
W. Willinger
Internet Connectivity at the AS-level: An Optimization-Driven Modeling ApproachACM SIGCOMM Workshop on MoMeTools

ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD)

YearAuthor(s)TitlePublication
2007
E. Zheleva
L. Getoor
Preserving the Privacy of Sensitive Relationships in Graph DataACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD)

ACM SIGMETRICS

YearAuthor(s)TitlePublication
2005
A. Moore
Zuev D.
Internet Traffic Classification Using Bayesian Analysis TechniquesACM SIGMETRICS
2004
A. Soule
K. Salamatian
N. Taft
R. Emilion
K. Papagiannaki
Flow Classification by Histograms or How to Go on Safari in the InternetACM SIGMETRICS
2003
N. Feamster
D. G. Andersen
H. Balakrishnan
M. F. Kaashoek
Measuring the Effects of Internet Path Faults on Reactive RoutingACM SIGMETRICS
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of DNS Update TrafficACM SIGMETRICS

ACM SIGMETRICS Performance Evaluation Review

YearAuthor(s)TitlePublication
2012
B. Eriksson
P. Barford
B. Maggs
R. Nowak
Posit: a lightweight approach for IP geolocationACM SIGMETRICS Performance Evaluation Review

Advanced Information Networking and Applications (AINA)

YearAuthor(s)TitlePublication
2010
P.T. Endo
D. Sadok
Whois based geolocation: A strategy to geolocate Internet hostsAdvanced Information Networking and Applications (AINA)

American Statistical Association

YearAuthor(s)TitlePublication
1999
k. claffy
S. McCreary
Internet measurement and data analysis: passive and active measurementAmerican Statistical Association

ARES

YearAuthor(s)TitlePublication
2007
V. Seeberg
S. Petrovic
A New Classification Scheme for Anonymization of Real Data Used in IDS BenchmarkingARES

arXiv cs.NI/.5674v3

YearAuthor(s)TitlePublication
2010
Y. Shavitt
N. Zilberman
A Study of Geolocation DatabasesarXiv cs.NI/.5674v3

Australasian Conference on Computer Science (ASCS)

YearAuthor(s)TitlePublication
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency MeasurementsAustralasian Conference on Computer Science (ASCS)

BroadBand Europe

YearAuthor(s)TitlePublication
2006
D. Antoniades
M. Polychronakis
S. Antonatos
E. Markatos
S. Ubik
Appmon: An Application for Accurate per Application Network Traffic CharacterizationBroadBand Europe

CAIDA

YearAuthor(s)TitlePublication
2011
B. Huffaker
M. Fomenkov
kc claffy
Geocompare: a comparison of public and commercial geolocation databasesCAIDA
2004
P. Verkaik
A. Broido
k. claffy
R. Gao
Y. Hyun
R. van der Pol
Beyond CIDR AggregationCAIDA
2003
M. Fomenkov
K. Keys
D. Moore
k. claffy
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sitesCAIDA
2003
Y. Hyun
A. Broido
k. claffy
Traceroute and BGP AS Path IncongruitiesCAIDA
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
The Spread of the Sapphire/Slammer WormCAIDA
2002
N. Brownlee
k. claffy
Understanding Internet Traffic Streams: Dragonflies and TortoisesCAIDA
2001
C. Dovrolis
P. Ramanathan
D. Moore
Packet Dispersion Techniques and Capacity EstimationCAIDA
2001
A. Broido
k. claffy
Complexity of global routing policiesCAIDA
2001
k. claffy CAIDA: Visualizing the InternetCAIDA
2000
N. Brownlee
R. Fulton
Kawaihiko and the third-quartile day [traffic management]CAIDA
2000
k. claffy Measuring the InternetCAIDA
1999
k. claffy
T. Monk
D. McRobb
Internet TomographyCAIDA
1998
CAIDA Comments by CAIDA concerning the FCC's review of the acquisition of MCI Communications Corp. by Worldcom, Inc.CAIDA
1998
D. Wessels
k. claffy
ICP and the Squid web cacheCAIDA
1997
k. claffy
T. Monk
What's next for Internet data analysis? Status and challenges facing the communityCAIDA
1997
D. Wessels
k. claffy
RFC 2187: Application of Internet Cache Protocol (ICP), version 2CAIDA
1997
D. Wessels
k. claffy
RFC 2186: Internet Cache Protocol (ICP), version 2CAIDA
1997
T. Monk
k. claffy
Internet data acquisition and analysis: Status and next stepsCAIDA
1996
D. Wessels
k. claffy
Evolution of the NLANR cache hierarchy: Global configuration challengesCAIDA
1996
CAIDA Cooperative Association for Internet Data AnalysisCAIDA
1996
k. claffy 'But some data is worse than others': Measurement of the global InternetCAIDA
1996
T. Monk
k. claffy
A survey of Internet statistics / metrics activitiesCAIDA
1995
k. claffy
H.-W. Braun
G. Polyzos
A parameterizable methodology for Internet traffic flow profilingCAIDA
1994
R. Bohn
H.-W. Braun
k. claffy
S. Wolff
Mitigating the coming Internet crunch: multiple service levels via PrecedenceCAIDA
1994
H.-W. Braun
B. Chinoy
k. claffy
Applied Network Research: 1994 annual status reportCAIDA
1994
k. claffy
H.-W. Braun
G. Polyzos
Tracking long-term growth of the NSFNETCAIDA
1994
k. claffy
H.-W. Braun
G. Polyzos
Internet traffic flow profilingCAIDA
1993
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1993
k. claffy
H.-W. Braun
G. Polyzos
Measurement considerations for assessing unidirectional latenciesCAIDA
1992
H.-W. Braun
B. Chinoy
k. claffy
G. Polyzos
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSCCAIDA
1992
B. Chinoy Dynamics of Internet routing informationCAIDA
1992
B. Chinoy
H.-W. Braun
The National Science Foundation NetworkCAIDA
1992
NLANR Redesign and extension of multi-agency interconnection pointCAIDA
1992
Y. Rekhter
B. Chinoy
Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysisCAIDA

Cambridge Working Papers in Economics

YearAuthor(s)TitlePublication
2003
E. Giovannetti
C. A. Ristuccia
Estimating Market Power in the Internet Backbone Using Band-X dataCambridge Working Papers in Economics

CANS

YearAuthor(s)TitlePublication
2005
L. Overlier
T. Brekne
A. Arnes
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.CANS

Communications and Multimedia Security

YearAuthor(s)TitlePublication
2006
D. Koukis
S. Antonatos
K.G. Anagnostakis
On the Privacy Risks of Publishing Anonymized IP Network Traces.Communications and Multimedia Security

Computer Communication Review

YearAuthor(s)TitlePublication
2009
S. Agarwal
J.R. Lorch
Matchmaking for online games and other latency-sensitive P2P systemsComputer Communication Review

Computer Networks

YearAuthor(s)TitlePublication
2012
D. Feldman
Y. Shavitt
N. Zilberman
A structural approach for PoP geo-locationComputer Networks
2012
Z. Dong
R.D.W. Perera
R. Chandramouli
K.P. Subbalakshmi
Network measurement based modeling and optimization for IP geolocationComputer Networks
2008
M. Dusi
M. Crotti
F. Gringoli
L. Salgarelli
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical FingerprintingComputer Networks
2004
J. Fan
J. Xu
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeComputer Networks

Computer Networks and ISDN Systems

YearAuthor(s)TitlePublication
2005
A. Ziviani
S. Fdida
J. F. de Rezende
O. C. M. B. Duarte
Improving the accuracy of measurement-based geographic location of internet hostsComputer Networks and ISDN Systems

Computer Networks: The International Journal of Computer and Telecommunications Networking

YearAuthor(s)TitlePublication
2010
S. Laki
P. Matray
P. Haga
I. Csabai
G. Vattay
A Model Based Approach for Improving Router GeolocationComputer Networks: The International Journal of Computer and Telecommunications Networking

Coordination and Administration of the Internet Workshop

YearAuthor(s)TitlePublication
1996
E. Hoffman
k. claffy
Geographic addressing reconsideredCoordination and Administration of the Internet Workshop
1996
D. Wessels
k. claffy
Can WWW caches help to save the Internet?Coordination and Administration of the Internet Workshop
1996
T. Monk
k. claffy
Cooperation in Internet data acquisition and analysisCoordination and Administration of the Internet Workshop
1996
D. Mitchell
S. Bradner
k. claffy
In whose domain: name service in adolescenceCoordination and Administration of the Internet Workshop
1996
B. Chinoy
T. Salo
Internet Exchanges: Policy-Driven EvolutionCoordination and Administration of the Internet Workshop

Dartmouth College, Computer Science

YearAuthor(s)TitlePublication
2003
D. M. Nicol
S. W. Smith
M. Zhao
Efficient Security for BGP Route AnnouncementsDartmouth College, Computer Science

Dartmouth Summer Workshop

YearAuthor(s)TitlePublication
2002
T. G. Griffin What is the Sound of One Route Flapping?Dartmouth Summer Workshop

Distributed Systems: Operations and Management

YearAuthor(s)TitlePublication
2000
P. Rajvaidya
K. Almeroth
k. claffy
A scalable architecture for monitoring and visualizing multicast statisticsDistributed Systems: Operations and Management

Equinix White Papers

YearAuthor(s)TitlePublication
2004
W. B. Norton The Evolution of the U.S. Internet Peering EcosystemEquinix White Papers
2001
W. B. Norton Internet Service Providers and PeeringEquinix White Papers

European Physical Journal B

YearAuthor(s)TitlePublication
2003
R. Percacci
A. Vespignani
Scale-free behavior of the Internet global performanceEuropean Physical Journal B

European Transactions on Telecommunications

YearAuthor(s)TitlePublication
2002
A. Broido
k. claffy
E. Nemeth
Internet Expansion, Refinement, and ChurnEuropean Transactions on Telecommunications

FLOCON - Network Flow Analysis Workshop

YearAuthor(s)TitlePublication
2005
K. Luo
Y. Li
A. Slagell
W. Yurcik
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure SharingFLOCON - Network Flow Analysis Workshop

GLOBECOM

YearAuthor(s)TitlePublication
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Demographic placement for Internet host locationGLOBECOM

ICOIN

YearAuthor(s)TitlePublication
2006
Qianli Zhang
Xing Li
An IP Address Anonymization Scheme with Multiple Access LevelsICOIN

ICON

YearAuthor(s)TitlePublication
2003
A. Ziviani
S. Fdida
J.F. de Rezende
O.C.M.B. Duarte
Similarity models for Internet host locationICON

IEEE Communications Surveys and Tutorials

YearAuthor(s)TitlePublication
2008
Nguyen T.
G. Armitage
A Survey of Techniques for Internet Traffic Classification Using Machine LearningIEEE Communications Surveys and Tutorials

IEEE Conference on Computer Communications (INFOCOM)

YearAuthor(s)TitlePublication
2009
C. Guo
Y. Liu
W. Shen
H.J. Wang
Q. Yu
Y. Zhang
Mining the Web and the Internet for Accurate IP Address GeolocationsIEEE Conference on Computer Communications (INFOCOM)
2001
T. S. E. Ng
H. Zhang
Predicting Internet Network Distance with Coordinates-Based ApproachesIEEE Conference on Computer Communications (INFOCOM)

IEEE Global Internet Symposium

YearAuthor(s)TitlePublication
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
Inherent Behaviors for On-Line Detection of Peer-to-Peer SharingIEEE Global Internet Symposium
2000
L. Gao On inferring autonomous system relationships in the InternetIEEE Global Internet Symposium

IEEE GLOBECOM

YearAuthor(s)TitlePublication
2008
A. Dainotti
W. de Donato
A. Pescape
P. Salvo Rossi
Classification of Network Traffic via Packet-Level Hidden Markov ModelsIEEE GLOBECOM
2006
J. Erman
A. Mahanti
M. Arlitt
Internet Traffic Identification using Machine LearningIEEE GLOBECOM
2004
T. Karagiannis
A. Broido
N. Brownless
K. Claffy
M. Faloutsos
Is P2P Dying or Just HidingIEEE GLOBECOM
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Measurements at a Root ServerIEEE GLOBECOM

IEEE High-Speeding Networking Workshop (HSN)

YearAuthor(s)TitlePublication
2003
A. Broido
R. King
E. Nemeth
k. claffy
Radon Spectroscopy of Inter-Packet DelayIEEE High-Speeding Networking Workshop (HSN)

IEEE INFOCOM

YearAuthor(s)TitlePublication
2004
G. Siganos
M. Faloutsos
Analyzing BGP Policies: Methodology and ToolIEEE INFOCOM
2004
Z. Mao
D. Johnson
J. Rexford
J. Wang
R. Katz
Scalable and Accurate Identification of AS-level Forwarding PathsIEEE INFOCOM
2004
T. Karagiannis
M. Molle
M. Faloutsos
A. Broido
A Nonstationary Poisson View of Internet TrafficIEEE INFOCOM
2003
D. Moore
C. Shannon
G. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2003
D. Moore
C. Shannon
G. M. Voelker
S. Savage
Internet Quarantine: Requirements for Containing Self-Propagating CodeIEEE INFOCOM
2002
L. Subramanian
S. Agarwal
J. Rexford
R. Katz
Characterizing the Internet Hierarchy from Multiple Vantage PointsIEEE INFOCOM
2002
D. Pei
X. Zhao
L. Wang
D. Massey
A. Mankin
S. Wu
L. Zhang
Improving BGP Convergence Through Consistency AssertionsIEEE INFOCOM
2001
C. Labovitz
A. Ahuja
R. Wattenhofer
V. Srinivasan
The Impact of Internet Policy and Topology on Delayed Routing ConvergenceIEEE INFOCOM
2001
C. Dovrolis
P. Ramanathan
D. Moore
What do packet dispersion techniques measure?IEEE INFOCOM
1999
C. Labovitz
G. R. Malan
F. Jahanian
Origins of Internet Routing InstabilityIEEE INFOCOM
1993
k. claffy
H.-W. Braun
G. Polyzos
Traffic characteristics of the T1 NSFNET backboneIEEE INFOCOM

IEEE International Conference on Advanced Information Networking and Applications (AINA)

YearAuthor(s)TitlePublication
2010
M.J. Arif
S. Karunasekera
S. Kulkarni
A. Gunatilaka
B. Ristic
Internet Host Geolocation Using Maximum Likelihood Estimation TechniqueIEEE International Conference on Advanced Information Networking and Applications (AINA)

IEEE International Conference on Communications (ICC)

YearAuthor(s)TitlePublication
2008
M. Dusi
F. Gringoli
L. Salgarelli
A Preliminary Look at the Privacy of SSH TunnelsIEEE International Conference on Communications (ICC)
2006
D. Koukis
S. Antonatos
D. Antoniades
E.P. Markatos
P. Trimintzios
A Generic Anonymization Framework for Network TrafficIEEE International Conference on Communications (ICC)
1994
N. Groschwitz
G. Polyzos
A Time-Series Model of Long-Term Traffic on the NSFNET BackboneIEEE International Conference on Communications (ICC)

IEEE International Conference on Data Engineering (ICDE)

YearAuthor(s)TitlePublication
2007
N. Li
T. Li
S. Venkatasubramanian
t-Closeness: Privacy Beyond k-Anonymity and l-DiversityIEEE International Conference on Data Engineering (ICDE)
2006
A. Machanavajjhala
J. Gehrke
D. Kifer
M. Venkitasubramaniam
l-Diversity: Privacy Beyond k-Anonymity.IEEE International Conference on Data Engineering (ICDE)

IEEE International Conference on Network Protocols (ICNP)

YearAuthor(s)TitlePublication
2002
T. Griffin
G. Wilfong
Analysis of the MED Oscillation Problem in BGPIEEE International Conference on Network Protocols (ICNP)
2002
J. Xu
J. Fan
M. Ammar
S. Moon
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based schemeIEEE International Conference on Network Protocols (ICNP)

IEEE International Telecommunications Symposium

YearAuthor(s)TitlePublication
2002
B. Huffaker
M. Fomenkov
D. J. Plummer
D. Moore
k. claffy
Distance Metrics in the InternetIEEE International Telecommunications Symposium

IEEE NCA

YearAuthor(s)TitlePublication
2006
F. Constantinou
P. Mavrommatiss
Identifying Known and Unknown Peer-to-Peer TrafficIEEE NCA

IEEE Network

YearAuthor(s)TitlePublication
2003
C. Dovrolis
R. Prasad
M. Murray
k. claffy
Bandwidth estimation: metrics, measurement techniques, and toolsIEEE Network
2003
C. Fraleigh
S. Moon
B. Lyles
C. Cotton
M. Khan
D. Moll
R. Rockell
T. Seely
Packet-level Traffic Measurements from the Sprint IP BackboneIEEE Network
2003
R. Beverly
k. claffy
Wide-Area IP Multicast Traffic CharacterizationIEEE Network

IEEE Security and Privacy journal

YearAuthor(s)TitlePublication
2003
D. Moore
V. Paxson
S. Savage
C. Shannon
S. Staniford
N. Weaver
Inside the Slammer WormIEEE Security and Privacy journal

IEEE Singapore International Conference on Networks (SICON'93)

YearAuthor(s)TitlePublication
1993
H.-W. Braun
k. claffy
G. Polyzos
A framework for flow-based accounting on the InternetIEEE Singapore International Conference on Networks (SICON'93)

IEEE Symposium on Information Visualization

YearAuthor(s)TitlePublication
1996
T. Munzner
E. Hoffman
k. claffy
B. Fenner
Visualizing the global topology of the MBoneIEEE Symposium on Information Visualization
1996
E. Hoffman
k. claffy
Address administration in IPv6IEEE Symposium on Information Visualization

IEEE Trans. On Parallel and Distributed Systems

YearAuthor(s)TitlePublication
2013
Y. Tian
R. Dey
Y. Liu
K.W. Ross
Topology mapping and geolocating for China's InternetIEEE Trans. On Parallel and Distributed Systems

IEEE WETICE

YearAuthor(s)TitlePublication
2006
M. Bishop
R. Crawford
B. Bhumiratana
L. Clark
K. Levitt
Some Problems in Sanitizing Network DataIEEE WETICE

IEEE Workshop on Internet Applications (WIAPP)

YearAuthor(s)TitlePublication
2003
A. Broido
E. Nemeth
k. claffy
Spectroscopy of Private DNS Update SourcesIEEE Workshop on Internet Applications (WIAPP)

IEEE/ACM Transactions on Networking

YearAuthor(s)TitlePublication
2007
R. Ramaswamy
T. Wolf
High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement SystemsIEEE/ACM Transactions on Networking
2005
Chang Feng W.
Chang F.
Chi Feng W.
Walpole J.
A Traffic Characterization of Popular on-line GamesIEEE/ACM Transactions on Networking
2004
B. Gueye
A. Ziviani
M. Crovella
S. Fdida
Constraint-based Geolocation of Internet HostsIEEE/ACM Transactions on Networking
2004
S. Sen
J. Wang
Analyzing Peer-to-Peer Traffic across Large NetworksIEEE/ACM Transactions on Networking
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
2002
C. Shannon
D. Moore
k. claffy
Beyond Folklore: Observations on Fragmented TrafficIEEE/ACM Transactions on Networking
1998
C. Labovitz
G. R. Malan
F. Jahanian
Internet Routing InstabilityIEEE/ACM Transactions on Networking
1997
V. Paxson End-to-end routing behavior in the InternetIEEE/ACM Transactions on Networking

IEEE/IFIP Network Operations and Management Symposium (NOMS)

YearAuthor(s)TitlePublication
2008
B. Park
Y. Won
M. Hong, J. Kim
Towards Automated Application Signature GenerationIEEE/IFIP Network Operations and Management Symposium (NOMS)
2006
M. Harvan
J. Schonwalder
Prefix- and Lexicographical-order-preserving IP Address AnonymizationIEEE/IFIP Network Operations and Management Symposium (NOMS)

IEPG meeting, Atlanta, GA

YearAuthor(s)TitlePublication
2002
H. Uijterwaal First analysis of the Beacon dataIEPG meeting, Atlanta, GA

IMC

YearAuthor(s)TitlePublication
2009
C. Castelluccia
M.A. Kaafar
P. Manils
D. Perito
Geolocalization of proxied services and its application to fast-flux hidden serversIMC

IMRG WACI

YearAuthor(s)TitlePublication
2007
H. Kim
K. Claffy
M. Fomenkova
N. Browlee
D. Barman
M. Faloutsos
Comparison of Internet Traffic Classification ToolsIMRG WACI

INFOCOM

YearAuthor(s)TitlePublication
2011
S. Laki
P. Matray
P. Haga
T. Sebok
I. Csabai
G. Vattay
Spotter: A Model Based Active Geolocation ServiceINFOCOM

Integrated Management Strategies for the New Millenium

YearAuthor(s)TitlePublication
2001
N. Brownlee Using NeTraMet for Production Traffic MeasurementIntegrated Management Strategies for the New Millenium

Intel Research, Cambridge

YearAuthor(s)TitlePublication
2005
A. Moore
D. Zuev
M. Crogan
Discriminators for Use in Flow-based ClassificationIntel Research, Cambridge

International Conference on Computer Communications and Networks (ICCCN)

YearAuthor(s)TitlePublication
2009
I. Youn
B. L. Mark
D. Richards
Statistical geolocation of Internet hostsInternational Conference on Computer Communications and Networks (ICCCN)

International Conference on Information Networking (ICOIN)

YearAuthor(s)TitlePublication
2008
W. John
S. Tafvelin
Heuristics to Classify Internet Backbone Traffic based on Connection PatternsInternational Conference on Information Networking (ICOIN)

International Conference on Networking and Services (ICNS)

YearAuthor(s)TitlePublication
2007
S. Ubik
P. Zejdl
J. Halak
Real-time anonymization in passive network monitoringInternational Conference on Networking and Services (ICNS)

International Conference on Telecommunication Systems, Modeling and Analysis

YearAuthor(s)TitlePublication
2005
Y. Li
Adam Slagell
K. Luo
W. Yurcik
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for SecurityInternational Conference on Telecommunication Systems, Modeling and Analysis

International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference

YearAuthor(s)TitlePublication
2006
B. Gueye
S. Uhlig
A. Ziviani
S. Fdida
Leveraging Buffering Delay Estimation for Geolocation of Internet HostsInternational Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference

International Networking Conference (INET)

YearAuthor(s)TitlePublication
2000
E. Nemeth
T. Ott
K. Thompson
k. claffy
The Internet Engineering Curriculum RepositoryInternational Networking Conference (INET)
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
B. Huffaker
M. Fomenkov
D. Moore
E. Nemeth
k. claffy
Measurements of the Internet topology in the Asia-Pacific RegionInternational Networking Conference (INET)
2000
D. Moore
R. Periakaruppan
J. Donohoe
k. claffy
Where in the world is netgeo.caida.org?International Networking Conference (INET)
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to visualize the Internet multicast backboneInternational Networking Conference (INET)
1999
B. Huffaker
E. Nemeth
k. claffy
Otter: A general-purpose network visualization toolInternational Networking Conference (INET)
1999
B. Huffaker
k. claffy
E. Nemeth
Tools to Visualize the Internet Multicast BackboneInternational Networking Conference (INET)
1998
k. claffy
G. Miller
K. Thompson
The nature of the beast: Recent traffic measurements from an Internet backboneInternational Networking Conference (INET)
1995
k. claffy
A Gross
H.-W. Braun
Measured interference of security mechanisms with network performanceInternational Networking Conference (INET)
1995
k. claffy
H.-W. Braun
Post-NSFNET statistics collectionInternational Networking Conference (INET)
1993
k. claffy
H.-W. Braun
G. Polyzos
Long-term traffic aspects of the NSFNETInternational Networking Conference (INET)
1993
H.-W. Braun
k. claffy
Network analysis in support of Internet policy requirementsInternational Networking Conference (INET)
1993
H.-W. Braun
P. Ford
Y. Rekhter
CIDR and the evolution of the InternetInternational Networking Conference (INET)
1992
T. Asaba
k. claffy
O. Nakamura
J. Murai
An analysis of international academic research network traffic between Japan and other nationsInternational Networking Conference (INET)

International Workshop on Traffic Monitoring and Analysis (TMA)

YearAuthor(s)TitlePublication
2009
A. Dainotti
W. de Donato
A. Pescape
G. Ventre
TIE: a Community-oriented Traffic Classification PlatformInternational Workshop on Traffic Monitoring and Analysis (TMA)

International WWW Caching Workshop

YearAuthor(s)TitlePublication
1998
B. Huffaker
J. Jung
E. Nemeth
D. Wessels
k. claffy
Visualization of the growth and topology of the NLANR caching hierarchyInternational WWW Caching Workshop
1998
Huffaker B.
J. Jung
D. Wessels
k. claffy
Visualization of the Growth and Topology of the NLANR Caching HierarchyInternational WWW Caching Workshop

INTERNET DRAFT

YearAuthor(s)TitlePublication
1997
M. O'Dell GSE - An Alternate Addressing Architecture for IPv6INTERNET DRAFT

Internet Measurement Conference (IMC)

YearAuthor(s)TitlePublication
2010
A. Rasti
N. Magharei
R. Rejaie
W. Willinger
Eyeball ASes: From Geography to ConectivityInternet Measurement Conference (IMC)
2006
E. Katz-Bassett
J. P. John
A. Krishnamurthy
D. Wetherall
T. Anderson
Y. Chawathe
Towards IP geolocation using delay and topology measurementsInternet Measurement Conference (IMC)
2005
M. J. Freedman
M. Vutukuru
N. Feamster
H. Balakrishnan
Geographic Locality of IP PrefixesInternet Measurement Conference (IMC)
2003
L. Tang
M. Crovella
Virtual Landmarks for the InternetInternet Measurement Conference (IMC)

Internet Measurement seminar

YearAuthor(s)TitlePublication
2007
F. Holzhauer IP GeolocationInternet Measurement seminar

Internet Statistics and Metrics Analysis (ISMA)

YearAuthor(s)TitlePublication
2000
CAIDA ISMA Winter 2000 Workshop - Final ReportInternet Statistics and Metrics Analysis (ISMA)
1999
CAIDA Report from the ISMA Network Visualization WorkshopInternet Statistics and Metrics Analysis (ISMA)
1999
CAIDA ISMA passive measurement data and analysis, workshop reportInternet Statistics and Metrics Analysis (ISMA)

ISP BGPDNS WG

YearAuthor(s)TitlePublication
2002
isp-bgpdnswg@nicwg.org Enhancing the Security of Name Resolution and Inter-Domain Internet RoutingISP BGPDNS WG

ITC Specialist Seminar

YearAuthor(s)TitlePublication
2000
S. McCreary
k. claffy
Trends in wide area IP traffic patterns - A view from Ames Internet ExchangeITC Specialist Seminar

Journal of Communications

YearAuthor(s)TitlePublication
2006
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Identification and Analysis of Peer-to-Peer TrafficJournal of Communications

Journal of Machine Learning Research

YearAuthor(s)TitlePublication
2006
C. Wright
F. Monrose
G. Masson
On Inferring Application Protocol Behaviors in Encrypted Network TrafficJournal of Machine Learning Research

Journal on High Speed Networking

YearAuthor(s)TitlePublication
1993
B. Aiken
H.-W. Braun
P. Ford
NSF implementation plan for interim NRENJournal on High Speed Networking

Large Scale Networking (LSN) Workshop

YearAuthor(s)TitlePublication
2001
M. Mathis
G. Huntoon
k. claffy
Traffic dynamics testbedLarge Scale Networking (LSN) Workshop

LEET

YearAuthor(s)TitlePublication
2008
A. Burstein Conducting Cybersecurity Research Legally and EthicallyLEET

Light Reading

YearAuthor(s)TitlePublication
2001
D. Newman Internet Core Router TestLight Reading

MASCOTS

YearAuthor(s)TitlePublication
2006
A. Madhukar
C. Williamson
A Longitudinal Study of P2P Traffic ClassificationMASCOTS

Microsoft Research

YearAuthor(s)TitlePublication
2000
C. Labovitz
A. Ahuja
A. Bose
F. Jahanian
An Experimental Study of Internet Routing ConvergenceMicrosoft Research

Military Communications Conf. (MILCOM)

YearAuthor(s)TitlePublication
2012
H. Maziku
S. Han, K. Shetty
T. Rogers
Enhancing the classification accuracy of IP geolocationMilitary Communications Conf. (MILCOM)

MIT

YearAuthor(s)TitlePublication
2003
R. Johari
J. Tsitsiklis
Routing and Peering in a Competitive InternetMIT

NAE Workshop

YearAuthor(s)TitlePublication
1999
k. claffy Internet measurement and data analysis: topology, workload, performance and routing statisticsNAE Workshop

NDSS

YearAuthor(s)TitlePublication
2008
S. Coull
C. Wright
F. Monrose
A. Keromytis
M. Reiter
Taming the Devil: Techniques for Evaluating Anonymized Network DataNDSS
2007
S. Coull
C. Wright
F. Monrose
M. Collins
M. Reiter
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network TracesNDSS

Network Resource Data Management Workshop

YearAuthor(s)TitlePublication
2001
A. Broido
k. claffy
Analysis of RouteViews BGP data: policy atomsNetwork Resource Data Management Workshop

New Journal of Physics

YearAuthor(s)TitlePublication
2008
M. Beiro
J. Alvarez-Hamelin
J. Busch
A low complexity visualization tool that helps to perform complex systems analysisNew Journal of Physics

New Security Paradigms Workshop (NSPW)

YearAuthor(s)TitlePublication
2007
R. Crawford
M. Bishop
B. Bhumiratana
L. Clark
K. Levitt
Sanitization models and their limitationsNew Security Paradigms Workshop (NSPW)
2006
P. Porras
V. Shmatikov
Large-scale collection and sanitization of network security data: risks and challengesNew Security Paradigms Workshop (NSPW)
2006
G. Conti Googling Considering HarmfulNew Security Paradigms Workshop (NSPW)

NSF Workshop

YearAuthor(s)TitlePublication
2002
NSF Workshop Report of NSF Workshop on Network Research TestbedsNSF Workshop

PAM, LNCS Volume

YearAuthor(s)TitlePublication
2010
B. Eriksson
P. Barford
J. Sommers
R. Nowak
A Learning-Based Approach for IP GeolocationPAM, LNCS Volume

Paris

YearAuthor(s)TitlePublication
2005
L. Bernaille
A. Soule
M. Jeannin
K. Salamatian
Blind Application Recognition Through Behavioral ClassificationParis

Passive and Active Measurement Conference (PAM)

YearAuthor(s)TitlePublication
2008
G. Szabo
D. Orincasy
S. Malomsoky
I. Szabo
On the Validation of Traffic Classification AlgorithmsPassive and Active Measurement Conference (PAM)
2008
W. John
S. Tafvelin
T. Olovsson
Trends and Differneces in Connections Behavior within Classes of Internet Backbone TrafficPassive and Active Measurement Conference (PAM)
2007
T. Karagiannis
K. Papgiannaki
N. Taft
M. Faloutso
Profiling the End HostPassive and Active Measurement Conference (PAM)
2007
L. Bernaille
R. Teixeira
Early Recognition of Encrypted ApplicationPassive and Active Measurement Conference (PAM)
2005
S. Zander
T. Nguyen
G. Armitage
Self-learning IP Traffic Classification based on Statistical Flow CharacteristicsPassive and Active Measurement Conference (PAM)
2005
L. Plissonneau
J. Costeux
P. Brown
Analysis of Peer-to-Peer Traffic on ADSLPassive and Active Measurement Conference (PAM)
2005
Zuev D.
Moore A.
Traffic Classification using a Statistical ApproachPassive and Active Measurement Conference (PAM)
2004
D. Wessels
M. Fomenkov
N. Brownlee
k. claffy
Measurements and Laboratory Simulations of the Upper DNS HierarchyPassive and Active Measurement Conference (PAM)
2004
A. McGregor
M. Hall
Brunskill J.
Lorier P.
Flow Clustering Using Machine Learning TechniquesPassive and Active Measurement Conference (PAM)
2004
A. Broido
Y. Hyun
R. Gao
k. claffy
Their share: diversity and disparity in IP trafficPassive and Active Measurement Conference (PAM)
2003
D. Wessels
M. Fomenkov
k. claffy
Wow, That's a lot of packetsPassive and Active Measurement Conference (PAM)
2003
T. Lindh
N. Brownlee
Integrating Active Methods and Flow Meters - an implementation using NeTraMetPassive and Active Measurement Conference (PAM)
2003
Y. Hyun
A. Broido
k. claffy
On Third-party Addresses in Traceroute PathsPassive and Active Measurement Conference (PAM)
2003
T. Lee
B. Huffaker
M. Fomenkov
k. claffy
On the problem of optimization of DNS root servers' placementPassive and Active Measurement Conference (PAM)
2002
N. Brownlee
I. Ziedins
Response time distributions for global name serversPassive and Active Measurement Conference (PAM)
2001
C. Shannon
D. Moore
k. claffy
Characteristics of fragmented IP traffic on Internet linksPassive and Active Measurement Conference (PAM)
2001
M. Murray
k. claffy
Measuring the Immeasurable: Global Internet Measurement InfrastructurePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
K. Keys
D. Moore
R. Koga
E. Lagache
M. Tesch
k. claffy
The Architecture of CoralReef: an Internet Traffic Monitoring Software SuitePassive and Active Measurement Conference (PAM)
2001
B. Huffaker
M. Fomenkov
D. Moore
k. claffy
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performancePassive and Active Measurement Conference (PAM)
2001
N. Brownlee
M. Murray
Streams, Flows and TorrentsPassive and Active Measurement Conference (PAM)
2001
N. Brownlee
k. claffy
M. Murray
E. Nemeth
Methodology for passive analysis of a university Internet linkPassive and Active Measurement Conference (PAM)
2001
A. Moore
K Papagiannaki
Toward the Accurate Identification of Network ApplicationsPassive and Active Measurement Conference (PAM)

Passive and Active Network Measurement Workshop (PAM)

YearAuthor(s)TitlePublication
2008
S. S. Siwpersad
B. Gueye
S. Uhlig
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hostsPassive and Active Network Measurement Workshop (PAM)
2007
B. Gueye
S. Uhlig
S. Fdida
Investigating the Imprecision of IP Block-based GeolocationPassive and Active Network Measurement Workshop (PAM)
2004
A. Ziviani
S. Fdida
J. F. de Rezende
O. Carlos
M. B. Duarte
Toward a measurement-based geographic location servicePassive and Active Network Measurement Workshop (PAM)

Perform Eval

YearAuthor(s)TitlePublication
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Offline/realitme Traffic Classification Using Semi-supervised LearningPerform Eval

Privacy Enhancing Technologies

YearAuthor(s)TitlePublication
2005
T. Brekne
A. Arnes
A. Oslebo
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.Privacy Enhancing Technologies
2002
A. Serjantov
G. Danezis
Towards an Information Theoretic Metric for AnonymityPrivacy Enhancing Technologies
2002
C. Diaz
B. Seys
J. Claessenss
B. Preneel
Towards Measuring AnonymityPrivacy Enhancing Technologies

Proc. ACM Internet measurement conference (IMC)

YearAuthor(s)TitlePublication
2012
Z. Hu
J. Heidemann
Y. Pradkin
Towards geolocation of millions of IP addressesProc. ACM Internet measurement conference (IMC)

Proc. USENIX symp. on Networked systems design and implementation (NSDI)

YearAuthor(s)TitlePublication
2009
H.V. Madhyasth
E. Katz-Bassett
T. Anderson
A. Krishnamurthy
A. Venkataramani
iPlane Nano: path prediction for peer-to-peer applicationsProc. USENIX symp. on Networked systems design and implementation (NSDI)

Public Access to the Internet, A Harvard JFK School Workshop

YearAuthor(s)TitlePublication
1993
H.-W. Braun
k. claffy
Network analysis issues for a public InternetPublic Access to the Internet, A Harvard JFK School Workshop

RAID

YearAuthor(s)TitlePublication
2007
M. Collins
M. Reiter
Hit-list worm detection and bot identification in large networks using protocol graphsRAID

Recent Advances in Telecommunications and Circuits

YearAuthor(s)TitlePublication
2013
A. Butkovic
F. Orucevic
A. Tanovic
Using Whois based geolocation and Google maps API for support cybercrime investigationsRecent Advances in Telecommunications and Circuits

RFC Editor

YearAuthor(s)TitlePublication
1996
C. Davis
P. Vixie
T. Goodwin
I. Dickinson
A Means for Expressing Location Information in the Domain Name SystemRFC Editor

SDM

YearAuthor(s)TitlePublication
2007
C.C. Aggarwal
P.S. Yu
On Anonymization of String DataSDM

Securecomm and Workshops

YearAuthor(s)TitlePublication
2006
J. Zhang
N. Borisov
W. Yurcik
Outsourcing Security Analysis with Anonymized LogsSecurecomm and Workshops
2006
D. Xu
P. Ning
A Flexible Approach to Intrusion Alert Anonymization and CorrelationSecurecomm and Workshops

Security and Privacy for Emerging Areas in Communication Networks

YearAuthor(s)TitlePublication
2005
A. Slagell
W. Yurcik
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymizationSecurity and Privacy for Emerging Areas in Communication Networks

Selected Areas in Communications, Volume 21

YearAuthor(s)TitlePublication
2003
A. Lakhina
J.W. Byers
M. Crovella
I. Matta
On the geographic location of Internet resourcesSelected Areas in Communications, Volume 21

SIAM

YearAuthor(s)TitlePublication
2003
A. Lazarevic
L. Ertoz
V. Kumar
A. Ozgur
J. Srirvastava
A Comparative Study of Anomaly Detection Schemes in Network Intrusion DetectionSIAM

SIGCOMM

YearAuthor(s)TitlePublication
2004
F. Dabek
R. Cox
F. Kaashoek
R. Morris
Vivaldi: A Decentralized Network Coordinate SystemSIGCOMM
2001
V. N. Padmanabhan
L. Subramanian
An Investigation of Geographic Mapping Techniques for Internet HostsSIGCOMM

SPIE International symposium on Convergence of IT and Communication

YearAuthor(s)TitlePublication
2001
A. Broido
k. claffy
Internet topology: connectivity of IP graphsSPIE International symposium on Convergence of IT and Communication

Symposium on Applications and the Internet (SAINT)

YearAuthor(s)TitlePublication
2002
B. Huffaker
D. Plummer
D. Moore
k. claffy
Topology discovery by active probingSymposium on Applications and the Internet (SAINT)

Symposium on Networked System Design and Implementation (NSDI)

YearAuthor(s)TitlePublication
2007
B. Wong
I. Stoyanov
E. Gun Sirer
Octant: A Comprehensive Framework for the Geolocalization of Internet HostsSymposium on Networked System Design and Implementation (NSDI)

Systems and Computers in Japan

YearAuthor(s)TitlePublication
2008
M. Perenyi
T. Dang
A. Gefferth
S. Monlnar
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-PeerSystems and Computers in Japan

Tech Report

YearAuthor(s)TitlePublication
2008
M. Iliofotou
P. Pappu
M. Faloutsos
Graption: Automated Detection of P2P Applications Using Traffic Dispersion GraphsTech Report
2008
A. Pfitzmann
M. Hansen
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for TerminologyTech Report
2006
K. Luo
Y. Li
C. Ermopoulos
W. Yurcik
A. Slagell
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process AccountingTech Report
2005
T. Ylonen Thoughts on how to mount an attack on tcpdpriv's '-a50' optionTech Report
2005
G. Minshall TCPdPrivTech Report
1998
P. Samarati
L. Sweeney
Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and SuppressionTech Report

The Internet Protocol Journal

YearAuthor(s)TitlePublication
2001
G. Huston Analyzing the Internet's BGP Routing TableThe Internet Protocol Journal

The Internet Society

YearAuthor(s)TitlePublication
2001
G. Huston Commentary on Inter-Domain Routing in the Internet, RFC 3221The Internet Society

Traffic Monitoring and Analysis Workshop (TMA)

YearAuthor(s)TitlePublication
2013
L. Neudorfer
Y. Shavitt
N. Zilberman
Improving AS relationship inference using PoPsTraffic Monitoring and Analysis Workshop (TMA)

UMass Amherst

YearAuthor(s)TitlePublication
2007
B. Ribeiro
W. Chen
G. Miklau
D. Towsley
Analyzing Privacy in Enterprise Packet Trace AnonymizationUMass Amherst

University of California, Berkeley

YearAuthor(s)TitlePublication
2008
A. Burstein Toward a Culture of Cybersecurity ResearchUniversity of California, Berkeley

University of California, Riverside

YearAuthor(s)TitlePublication
2007
M. Iliofotou
P. Pappu
M. Faloutsos
M. Mitzenmacher
S. Singh
G. Varghese
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware ImplementationUniversity of California, Riverside

University of California, San Diego

YearAuthor(s)TitlePublication
1994
k. claffy Internet traffic characterization.University of California, San Diego

University of Michigan

YearAuthor(s)TitlePublication
1998
C. Labovitz
A. Ahuja
F. Jahanian
Experimental Study of Internet Stability and Wide-Area Backbone FailuresUniversity of Michigan

USC/Information Sciences Institute

YearAuthor(s)TitlePublication
2007
G. Bartlett
J. Heidemann
C. Papadopoulos
J. Pepin
Estimating P2P Traffic Volume at USCUSC/Information Sciences Institute
2001
D. Chang
R. Govindan
J. Heidemann
An Empirical Study of Router Response to Large BGP Routing Table LoadUSC/Information Sciences Institute

USENIX

YearAuthor(s)TitlePublication
2003
G. Tan
M. Poletto
J. Guttag
F. Kaashoek
Role Classification of Hosts within Enterprise Networks based on Connection PatternsUSENIX

Usenix

YearAuthor(s)TitlePublication
2011
Y. Wang
D. Burgener
M. Flores
A. Kuzmanovic
C. Huang
Towards Street-Level Client-Independent IP GeolocationUsenix

Usenix LISA

YearAuthor(s)TitlePublication
1999
R. Periakaruppan
E. Nemeth
GTrace - A Graphical Traceroute ToolUsenix LISA

USENIX LISA

YearAuthor(s)TitlePublication
2006
A. Slagell
K. Lakkaraju
K. Luo
FLAIM: A Multi-level Anonymization Framework for Computer and Network LogsUSENIX LISA
2001
D. Moore
K. Keys
R. Koga
E. Lagache
k. claffy
CoralReef software suite as a tool for system and network administratorsUSENIX LISA
2001
M. Fomenkov
k. claffy
B. Huffaker
D. Moore
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name ServersUSENIX LISA
2001
N. Brownlee
k. claffy
E. Nemeth
DNS Root/gTLD Performance MeasurementsUSENIX LISA
1999
M. Roesch Snort Lightweight Intrusion Detection for NetworksUSENIX LISA
1999
R. Periakaruppan
E. Nemeth
GTrace - A Graphical Traceroute ToolUSENIX LISA

Usenix Security Symposium

YearAuthor(s)TitlePublication
2010
P. Gill
Y. Ganjali
B. Wong
Dude, where's that IP? Circumventing measurement-based IP geolocationUsenix Security Symposium

USENIX Security Symposium

YearAuthor(s)TitlePublication
2004
P. Lincoln
P. Porras
V. Shmatikov
Privacy-Preserving Sharing and Correlation of Security AlertsUSENIX Security Symposium
2001
D. Moore
G. M. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium
2001
D. Moore
G. Voelker
S. Savage
Inferring Internet Denial-of-Service ActivityUSENIX Security Symposium

WCW

YearAuthor(s)TitlePublication
2002
J. Merwe
S. Sen
C. Kalmanek
Streaming Video Traffic: Characterization and Network ImpactWCW

World Wide Web (WWW) Conference

YearAuthor(s)TitlePublication
2007
J. Erman
A. Manhanti
M. Arlitt
I. Cohen
C. Williamson
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network CoreWorld Wide Web (WWW) Conference
2004
S. Sen
O. Spatscheck
D. Wang
Accurate Scalable In-Network Identification of P2P TrafficWorld Wide Web (WWW) Conference
1994
H.-W. Braun
k. claffy
Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web serverWorld Wide Web (WWW) Conference

WoWMoM

YearAuthor(s)TitlePublication
2007
G. Szabo
I. Szabo
D. Orincasy
Accurate Traffic ClassificationWoWMoM

  Last Modified: Wed Jun-13-2018 11:38:21 PDT
  Page URL: http://www.caida.org/publications/bib/networking/bypublication/index.xml