The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.
Publications - Networking Bibliography
An annotated bibliography of papers and presentations in the wide-area
networking literature.
Note: This effort ended in 2013, but remains for historical purposes.
Four main views of the the bibliography are available. Each view
groups the entries according to a different attribute, such as
date or author. Additionally, each view may be displayed with
either abbreviated or complete citations.
Please select a view below:
Examples of topics covered are:
interdomain routing (specifically, BGP)
Internet topology analysis, modeling, and simulation
traffic characterization
active and passive measurement
Examples of topics not covered are:
local-area networks
design, implementation, or operation of networking equipment
software engineering of protocol stacks in operating systems
An annotated bibliography of papers and presentations in the wide-area networking literature. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for recent papers. Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.
An annotated bibliography of papers and presentations in the wide-area networking literature. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for recent papers. Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.
Y. Afek, O. Ben-Shalom, and A. Bremler-Barr, "On the Structure and Application of BGP Policy Atoms", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
S. Agarwal and J.R. Lorch, "Matchmaking for online games and other latency-sensitive P2P systems", Computer Communication Review, vol. 39, no. 4, pp. 315-326, Oct 2009.
D.G. Andersen, N. Feamster, S. Bauer, and H. Balakrishnan, "Topology Inference from BGP Routing Dynamics", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.
M.J. Arif, S. Karunasekera, and S. Kulkarni, "GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements", in Australasian Conference on Computer Science (ASCS), Darlinghurst, Australia, Australia, 2010, pp. 89-98, Australian Computer Society, Inc.
M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, “Internet Host Geolocation Using Maximum Likelihood Estimation Technique”, in IEEE International Conference on Advanced Information Networking and Applications, Washington, DC, USA, 2010, pp. 422-429.
T. Asaba, k. claffy, O. Nakamura, and J. Murai, "An analysis of international academic research network traffic between Japan and other nations", in International Networking Conference (INET) ‘92, Jan 1992.
M. Beiro, J. Alvarez-Hamelin, and J. Busch, "A low complexity visualization tool that helps to perform complex systems analysis", New Journal of Physics, vol. 10, no. 12, pp. 125003, Dec 2008.
G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, "Estimating P2P Traffic Volume at USC", Tech. rep., USC/Information Sciences Institute, 2007.
G. Bartlett, J. Heidemann, and C. Papadopoulos, "Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing", in IEEE Global Internet Symposium 2007, May 2007.
L. Bernaille, A. Soule, M. Jeannin, and K. Salamatian, "Blind Application Recognition Through Behavioral Classification", Tech. rep., Paris 2005, 2005.
L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.
B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.
Huffaker B., J. Jung, D. Wessels, and k. claffy, "Visualization of the Growth and Topology of the NLANR Caching Hierarchy", in International WWW Caching Workshop 1998, June 1998.
M. Fomenkov, k. claffy, B. Huffaker, and D. Moore, "Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers", in USENIX LISA, Dec 2001.
B. Huffaker, M. Fomenkov, D. Moore, and k. claffy, "Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance", in Passive and Active Measurement Conference (PAM), Apr 2001.
B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.
T. Lee, B. Huffaker, M. Fomenkov, and k. claffy, "On the problem of optimization of DNS root servers’ placement", in Passive and Active Measurement Conference (PAM), Mar 2003.
B. Huffaker, k. claffy, and E. Nemeth, "Tools to Visualize the Internet Multicast Backbone", in International Networking Conference (INET) 1999, June 1999.
B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) 1999, June 1999.
R. Bohn, H.-W. Braun, k. claffy, and S. Wolff, "Mitigating the coming Internet crunch: multiple service levels via Precedence", Tech. rep., CAIDA, Nov 1994.
H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1992.
H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1993.
H.-W. Braun, k. claffy, and G. Polyzos, "A framework for flow-based accounting on the Internet", in IEEE Singapore International Conference on Networks'93 (SICON'93), Sep 1993.
H.-W. Braun and k. claffy, "Web traffic characterization: an assessment of the impact of caching documents from the NCSA’s web server", in World Wide Web (WWW) Conference, Oct 1994.
T. Brekne, A. Arnes, and A. Oslebo, "Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.", in Privacy Enhancing Technologies, 2005.
A. Broido and k. claffy, "Internet topology: connectivity of IP graphs", in SPIE International symposium on Convergence of IT and Communication, Aug 2001.
A. Broido, Y. Hyun, R. Gao, and k. claffy, "Their share: diversity and disparity in IP traffic", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).
N. Brownlee, k. claffy, M. Murray, and E. Nemeth, "Methodology for passive analysis of a university Internet link", in Passive and Active Measurement Conference (PAM), Apr 2001.
A. Butkovic, F. Orucevic, and A. Tanovic, "Using Whois based geolocation and Google maps API for support cybercrime investigations", pp. 194-200, Jun 2013.
C. Castelluccia, M.A. Kaafar, P. Manils, and D. Perito, "Geolocalization of proxied services and its application to fast-flux hidden servers", in IMC, 2009.
R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.
D. Chang, R. Govindan, and J. Heidemann, "An Empirical Study of Router Response to Large BGP Routing Table Load", Tech. Rep. ISI-TR-2001-552, USC/Information Sciences Institute, December 2001.
H. Chang, S. Jamin, and W. Willinger, "Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach", in ACM SIGCOMM Workshop on MoMeTools, August 2003.
ChangFeng W., Chang F., ChiFeng W., and Walpole J., "A Traffic Characterization of Popular on-line Games", in IEEE/ACM Transactions on Networking 2005, Oct 2005.
k. claffy, H.-W. Braun, and G. Polyzos, "Application of sampling methodologies to wide-area network traffic characterization", in ACM SIGCOMM ‘93, May 1993.
k. claffy, A Gross, and H.-W. Braun, "Measured interference of security mechanisms with network performance", in International Networking Conference (INET) ‘95, Jun 1995.
k. claffy, G. Miller, and K. Thompson, "The nature of the beast: Recent traffic measurements from an Internet backbone", in International Networking Conference (INET) ‘98, Jul 1998.
S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.
S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.
A. Dainotti, W. de Donato, A. Pescape, and P. Salvo~Rossi, "Classification of Network Traffic via Packet-Level Hidden Markov Models", in IEEE GLOBECOM, 2008.
A. Dainotti, W. de Donato, A. Pescape, and G. Ventre, "TIE: a Community-oriented Traffic Classification Platform", in International Workshop on Traffic Monitoring and Analysis (TMA), 2009.
Z. Dong, R.D.W. Perera, R. Chandramouli, and K.P. Subbalakshmi, "Network measurement based modeling and optimization for IP geolocation", Computer Networks, vol. 56, no. 1, pp. 85-98, Jan 2012.
M. Dusi, F. Gringoli, and L. Salgarelli, "A Preliminary Look at the Privacy of SSH Tunnels", in IEEE International Conference on Communications (ICC) 2008, May 2008.
M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, "Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting", in Computer Networks 2008, Sep 2008.
B. Eriksson, P. Barford, B. Maggs, and R. Nowak, "Posit: a lightweight approach for IP geolocation", ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 2, pp. 2-11, Sep 2012.
J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.
J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.
J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", Computer Networks, 2004.
N. Feamster, D.~G. Andersen, H. Balakrishnan, and M.~F. Kaashoek, "Measuring the Effects of Internet Path Faults on Reactive Routing", in ACM SIGMETRICS, Jun 2003.
M. Fomenkov, K. Keys, D. Moore, and k. claffy, "Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites", Tech. rep., CAIDA, Apr 2003.
C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.
J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", in ACM Conference on Computer and Communications Security (CCS), 2007.
M.~J. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic Locality of IP Prefixes", in Internet Measurement Conference (IMC), Berkeley, CA, USA, 2005, p. 13, USENIX Association.
N. Groschwitz and G. Polyzos, "A Time-Series Model of Long-Term Traffic on the NSFNET Backbone", in IEEE International Conference on Communications (ICC), May 1994.
B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based Geolocation of Internet Hosts", IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 288-293, 2004.
B. Gueye, S. Uhlig, and S. Fdida, "Investigating the Imprecision of IP Block-based Geolocation", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2007, pp. 237-240, Springer-Verlag.
C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.
M. Harvan and J. Schonwalder, "Prefix- and Lexicographical-order-preserving IP Address Anonymization", IEEE/IFIP Network Operations and Management Symposium (NOMS), 2006.
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking", in ACM Conference on Computer and Communications Security (CCS), 2007.
B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) ‘00, July 2000.
B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing", in Symposium on Applications and the Internet (SAINT), Jan 2002.
B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.
B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) ‘99, Jun 1999.
B. Huffaker, k. claffy, and E. Nemeth, "Tools to visualize the Internet multicast backbone", in International Networking Conference (INET) ‘99, Jun 1999.
A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.
G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.
M. Iliofotou, P. Pappu, and M. Faloutsos, "Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs", in Tech Report 2008, Jun 2008.
W. John and S. Tafvelin, "Heuristics to Classify Internet Backbone Traffic based on Connection Patterns", in International Conference on Information Networking (ICOIN), Sept 2008.
W. John, S. Tafvelin, and T. Olovsson, "Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic", in Passive and Active Measurement Conference (PAM), Mar 2008.
E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.
K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.
K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.
H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.
D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.
D. Koukis, S. Antonatos, and K.G. Anagnostakis, "On the Privacy Risks of Publishing Anonymized IP Network Traces.", in Communications and Multimedia Security, 2006.
C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "An Experimental Study of Internet Routing Convergence", Tech. Rep. MSR-TR-2000-08, Microsoft Research, 2000.
C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence", in IEEE INFOCOM, Apr 2001, pp. 537-546.
C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Wide-Area Backbone Failures", Tech. Rep. CSE-TR-382-98, University of Michigan, 1998.
A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, "On the geographic location of Internet resources", in Selected Areas in Communications, Volume 21, Aug 2003, pp. 934-948.
S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.
Y. Li, Adam Slagell, K. Luo, and W. Yurcik, "CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security", in International Conference on Telecommunication Systems, Modeling and Analysis, nov 2005.
N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity", in IEEE International Conference on Data Engineering (ICDE), 2007.
T. Lindh and N. Brownlee, "Integrating Active Methods and Flow Meters - an implementation using NeTraMet", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.
K. Luo, Y. Li, A. Slagell, and W. Yurcik, "CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing", in FLOCON - Network Flow Analysis Workshop, sep 2005.
K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity.", in IEEE International Conference on Data Engineering (ICDE), 2006.
H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.
G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On Dominant Characteristics of Residential Broadband Internet Traffic", in ACM SIGCOMM IMC, Nov 2009.
Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.
A. McGregor, M. Hall, Brunskill J., and Lorier P., "Flow Clustering Using Machine Learning Techniques", in Passive and Active Measurement Conference (PAM), Apr 2004.
D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET) ‘00, Jul 2000.
D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.
A. Moore and K Papagiannaki, "Toward the Accurate Identification of Network Applications", in Passive and Active Measurement Conference (PAM), Mar 2001.
D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop 2002, Nov 2002.
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.
D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET), Yokohama, Japan, 18-21 Jul 2000, The Internet Society.
D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov 2002, ACM SIGCOMM/USENIX Internet Measurement Workshop.
D. Moore, C. Shannon, G.~M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, San Francisco, CA, April 2003, IEEE INFOCOM.
T. Munzner, E. Hoffman, k. claffy, and B. Fenner, "Visualizing the global topology of the MBone", in IEEE Symposium on Information Visualization, Oct 1996.
M. Murray and k. claffy, "Measuring the Immeasurable: Global Internet Measurement Infrastructure", in Passive and Active Measurement Conference (PAM), Apr 2001.
E. Nemeth, T. Ott, K. Thompson, and k. claffy, "The Internet Engineering Curriculum Repository", in International Networking Conference (INET) ‘00, Jul 2000.
T.~S.~E. Ng and H. Zhang, "Predicting Internet Network Distance with Coordinates-Based Approaches", in IEEE Conference on Computer Communications (INFOCOM), 2001, pp. 170-179.
Nguyen T. and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning", in IEEE Communications Surveys and Tutorials 2008, Oct 2008.
V.~N. Padmanabhan and L. Subramanian, "An Investigation of Geographic Mapping Techniques for Internet Hosts", in SIGCOMM, New York, NY, USA, 2001, pp. 173-185, ACM.
B. Park, Y. Won, and J. Kim, M.~Hong, "Towards Automated Application Signature Generation", in IEEE/IFIP Network Operations and Management Symposium (NOMS), Apr 2008.
D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.
M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer", in Systems and Computers in Japan 2008, Mar 2008.
M. Pietrzyk, J.-L. Costeux, G. Urvoy-Keller, and T. En-Najjary, "Challenging Statistical Classification for Operational Usage: the ADSL Case", in ACM SIGCOMM IMC, Nov 2009.
I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.
P. Porras and V. Shmatikov, "Large-scale collection and sanitization of network security data: risks and challenges", in New Security Paradigms Workshop (NSPW), 2006.
P. Rajvaidya, K. Almeroth, and k. claffy, "A scalable architecture for monitoring and visualizing multicast statistics", in Distributed Systems: Operations and Management, Dec 2000.
R. Ramaswamy and T. Wolf, "High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems", IEEE/ACM Transactions on Networking, jan 2007.
A. Rasti, N. Magharei, R. Rejaie, and W. Willinger, "Eyeball ASes: From Geography to Conectivity", in Internet Measurement Conference (IMC), Nov 2010, pp. 192-198.
B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.
P. Samarati and L. Sweeney, "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Tech. rep., Computer Science Laboratory, (SRI) International, 1998.
S.~S. Siwpersad, B. Gueye, and S. Uhlig, "Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2008, pp. 11-20, Springer-Verlag.
A. Slagell and W. Yurcik, "Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization", Security and Privacy for Emerging Areas in Communication Networks, sep 2005.
C. Shannon, D. Moore, and k. claffy, "Characteristics of fragmented IP traffic on Internet links", in Passive and Active Measurement Conference (PAM), Amsterdam, Netherlands, Apr 2001, RIPE NCC.
C. Shannon, D. Moore, and k. claffy, "Characteristics of Fragmented Traffic on Internet Links", in ACM SIGCOMM Internet Measurement Workshop 2001. Nov 2001, ACM SIGCOMM.
A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.
G. Szabo, D. Orincasy, S. Malomsoky, and I. Szabo, "On the Validation of Traffic Classification Algorithms", in Passive and Active Measurement Conference (PAM), Apr 2008.
G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks based on Connection Patterns", in USENIX 2003, Jun 2003.
Y. Tian, R. Dey, Y. Liu, and K.W. Ross, "Topology mapping and geolocating for China’s Internet", IEEE Trans. On Parallel and Distributed Systems, vol. 24, no. 9, pp. 1908-1917, Sep 2013.
S. Ubik, P. Zejdl, and J. Halak, "Real-time anonymization in passive network monitoring", in International Conference on Networking and Services (ICNS), 2007.
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
D. Wessels, M. Fomenkov, N. Brownlee, and k. claffy, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).
N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification", in ACM SIGCOMM 2006, Aug 2006.
B. Wong, I. Stoyanov, and E. Gun~Sirer, "Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts", in Symposium on Networked System Design and Implementation (NSDI), Cambridge, MA, USA, Apr 2007.
C. Wright, F. Monrose, and G. Masson, "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", in Journal of Machine Learning Research 2006, Dec 2006.
J. Xu, J. Fan, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", IEEE International Conference on Network Protocols (ICNP), nov 2002.
I. Youn, B.~L. Mark, and D. Richards, "Statistical geolocation of Internet hosts", International Conference on Computer Communications and Networks (ICCCN), vol. 0, pp. 1-6, 2009.
W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.
S. Zander, T. Nguyen, and G. Armitage, "Self-learning IP Traffic Classification based on Statistical Flow Characteristics", in Passive and Active Measurement Conference (PAM), Mar 2005.
E. Zheleva and L. Getoor, "Preserving the Privacy of Sensitive Relationships in Graph Data", in ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD), 2007.
A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.
A. Ziviani, S. Fdida, J.~F. de Rezende, and O.~C. M.~B. Duarte, "Improving the accuracy of measurement-based geographic location of internet hosts", Computer Networks and ISDN Systems, vol. 47, no. 4, pp. 503-523, 2005.