Annotated Bibliography of Networking Papers
An annotated bibliography of papers and presentations in the wide-area networking literature.
This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers.
Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.
2013
Y. Tian, R. Dey, Y. Liu, and K.W. Ross, "Topology mapping and geolocating for China's Internet", IEEE Trans. On Parallel and Distributed Systems, vol. 24, no. 9, pp. 1908-1917, Sep 2013.
A. Butkovic, F. Orucevic, and A. Tanovic, "Using Whois based geolocation and Google maps API for support cybercrime investigations", pp. 194-200, Jun 2013.
L. Neudorfer, Y. Shavitt, and N. Zilberman, "Improving AS relationship inference using PoPs", pp. 459-464, Apr 2013.
2012
Z. Hu, J. Heidemann, and Y. Pradkin, "Towards geolocation of millions of IP addresses", pp. 123-130, Nov 2012.
H. Maziku, K. Shetty, S.~Han, and T. Rogers, "Enhancing the classification accuracy of IP geolocation", pp. 1-6, Oct 2012.
B. Eriksson, P. Barford, B. Maggs, and R. Nowak, "Posit: a lightweight approach for IP geolocation", ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 2, pp. 2-11, Sep 2012.
D. Feldman, Y. Shavitt, and N. Zilberman, "A structural approach for PoP geo-location", Computer Networks, vol. 56, no. 3, pp. 1029-1040, Feb 2012.
Z. Dong, R.D.W. Perera, R. Chandramouli, and K.P. Subbalakshmi, "Network measurement based modeling and optimization for IP geolocation", Computer Networks, vol. 56, no. 1, pp. 85-98, Jan 2012.
2011
B. Huffaker, M. Fomenkov, and kc claffy, "Geocompare: a comparison of public and commercial geolocation databases", Tech. rep., CAIDA, May 2011.
I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.
S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.
Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards Street-Level Client-Independent IP Geolocation", in Usenix, Mar 2011.
2010
S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.
M.J. Arif, S. Karunasekera, and S. Kulkarni, "GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements", in Australasian Conference on Computer Science (ASCS), Darlinghurst, Australia, Australia, 2010, pp. 89-98, Australian Computer Society, Inc.
M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, "Internet Host Geolocation Using Maximum Likelihood Estimation Technique", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Washington, DC, USA, 2010, pp. 422-429, IEEE Computer Society.
A. Rasti, N. Magharei, R. Rejaie, and W. Willinger, "Eyeball ASes: From Geography to Conectivity", in Internet Measurement Conference (IMC), Nov 2010, pp. 192-198.
P. Gill, Y. Ganjali, and B. Wong, "Dude, where's that IP? Circumventing measurement-based IP geolocation", in Usenix Security Symposium, Aug 2010.
Y. Shavitt and N. Zilberman, "A Study of Geolocation Databases", arXiv cs.NI/1005.5674v3, May 2010.
B. Eriksson, P. Barford, J. Sommers, and R. Nowak, "A Learning-Based Approach for IP Geolocation", in PAM, LNCS Volume 6032, Apr 2010, pp. 171-180.
P.T. Endo and D. Sadok, "Whois based geolocation: A strategy to geolocate Internet hosts", pp. 408-413, Apr 2010.
2009
I. Youn, B.~L. Mark, and D. Richards, "Statistical geolocation of Internet hosts", International Conference on Computer Communications and Networks (ICCCN), vol. 0, pp. 1-6, 2009.
J. Muir and P.~C. van Oorschot, "Internet Geolocation: Evasion and Counterevasion", ACM Computing Surveys, vol. 42, no. 1, 2009.
C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.
A. Dainotti, W. de Donato, A. Pescape, and G. Ventre, "TIE: a Community-oriented Traffic Classification Platform", in International Workshop on Traffic Monitoring and Analysis (TMA), 2009.
C. Castelluccia, M.A. Kaafar, P. Manils, and D. Perito, "Geolocalization of proxied services and its application to fast-flux hidden servers", in IMC, 2009.
M. Pietrzyk, J.-L. Costeux, G. Urvoy-Keller, and T. En-Najjary, "Challenging Statistical Classification for Operational Usage: the ADSL Case", in ACM SIGCOMM IMC, Nov 2009.
G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On Dominant Characteristics of Residential Broadband Internet Traffic", in ACM SIGCOMM IMC, Nov 2009.
S. Agarwal and J.R. Lorch, "Matchmaking for online games and other latency-sensitive P2P systems", Computer Communication Review, vol. 39, no. 4, pp. 315-326, Oct 2009.
H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.
2008
S.~S. Siwpersad, B. Gueye, and S. Uhlig, "Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2008, pp. 11-20, Springer-Verlag.
A. Dainotti, W. de Donato, A. Pescape, and P. Salvo~Rossi, "Classification of Network Traffic via Packet-Level Hidden Markov Models", in IEEE GLOBECOM, 2008.
A. Burstein, "Conducting Cybersecurity Research Legally and Ethically", in LEET '08, 2008.
A. Burstein, "Toward a Culture of Cybersecurity Research", in University of California, Berkeley, 2008.
K. Cho, K. Fukuda, H. Esaki, and A. Kato, "Observing Slow Crustal Movement in Residential User Traffic", in ACM CoNEXT 2008, Dec 2008.
M. Beiro, J. Alvarez-Hamelin, and J. Busch, "A low complexity visualization tool that helps to perform complex systems analysis", New Journal of Physics, vol. 10, no. 12, pp. 125003, Dec 2008.
Nguyen T. and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning", in IEEE Communications Surveys and Tutorials 2008, Oct 2008.
W. John and S. Tafvelin, "Heuristics to Classify Internet Backbone Traffic based on Connection Patterns", in International Conference on Information Networking (ICOIN), Sept 2008.
M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, "Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting", in Computer Networks 2008, Sep 2008.
M. Iliofotou, P. Pappu, and M. Faloutsos, "Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs", in Tech Report 2008, Jun 2008.
M. Dusi, F. Gringoli, and L. Salgarelli, "A Preliminary Look at the Privacy of SSH Tunnels", in IEEE International Conference on Communications (ICC) 2008, May 2008.
G. Szabo, D. Orincasy, S. Malomsoky, and I. Szabo, "On the Validation of Traffic Classification Algorithms", in Passive and Active Measurement Conference (PAM), Apr 2008.
B. Park, Y. Won, and J. Kim, M.~Hong, "Towards Automated Application Signature Generation", in IEEE/IFIP Network Operations and Management Symposium (NOMS), Apr 2008.
M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer", in Systems and Computers in Japan 2008, Mar 2008.
W. John, S. Tafvelin, and T. Olovsson, "Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic", in Passive and Active Measurement Conference (PAM), Mar 2008.
A. Pfitzmann and M. Hansen, "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology" February 2008.
S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.
2007
E. Zheleva and L. Getoor, "Preserving the Privacy of Sensitive Relationships in Graph Data", in ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD), 2007.
W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.
S. Ubik, P. Zejdl, and J. Halak, "Real-time anonymization in passive network monitoring", in International Conference on Networking and Services (ICNS), 2007.
D. Sicker, P. Ohm, and D. Grunwald, "Legal issues surrounding monitoring during network research", in ACM SIGCOMM IMC, 2007.
V. Seeberg and S. Petrovic, "A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking", in ARES, 2007.
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting", in ACM MobiCom, 2007.
N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity", in IEEE International Conference on Data Engineering (ICDE), 2007.
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking", in ACM Conference on Computer and Communications Security (CCS), 2007.
B. Gueye, S. Uhlig, and S. Fdida, "Investigating the Imprecision of IP Block-based Geolocation", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2007, pp. 237-240, Springer-Verlag.
J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", in ACM Conference on Computer and Communications Security (CCS), 2007.
R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.
G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, "Estimating P2P Traffic Volume at USC", Tech. rep., USC/Information Sciences Institute, 2007.
M. Allman and V. Paxson, "Issues and etiquette concerning use of shared measurement data", in ACM SIGCOMM IMC, 2007.
C.C. Aggarwal and P.S. Yu, "On Anonymization of String Data", in SDM, 2007.
J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.
H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.
W. John and S. Tafvelin, "Analysis of Internet Backbone Traffic and Header Anomalies Observed", in ACM SIGCOMM IMC, Oct 2007.
B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.
M. Collins and M. Reiter, "Hit-list worm detection and bot identification in large networks using protocol graphs", in RAID 2007, Sep 2007.
M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting", in ACM SIGCOMM 2007, Aug 2007.
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: when randomness plays with you", in ACM SIGCOMM 2007, Aug 2007.
F. Holzhauer, "IP Geolocation", Internet Measurement seminar, Jul 2007.
G. Szabo, I. Szabo, and D. Orincasy, "Accurate Traffic Classification", in WoWMoM 2007, Jun 2007.
J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.
G. Bartlett, J. Heidemann, and C. Papadopoulos, "Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing", in IEEE Global Internet Symposium 2007, May 2007.
B. Wong, I. Stoyanov, and E. Gun~Sirer, "Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts", in Symposium on Networked System Design and Implementation (NSDI), Cambridge, MA, USA, Apr 2007.
T. Karagiannis, K. Papgiannaki, N. Taft, and M. Faloutso, "Profiling the End Host", in Passive and Active Measurement Conference (PAM), Apr 2007.
L. Bernaille and R. Teixeira, "Early Recognition of Encrypted Application", in Passive and Active Measurement Conference (PAM), Apr 2007.
S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.
R. Ramaswamy and T. Wolf, "High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems", IEEE/ACM Transactions on Networking, jan 2007.
2006
Qianli Zhang and Xing Li, "An IP Address Anonymization Scheme with Multiple Access Levels", in ICOIN, 2006.
P. Porras and V. Shmatikov, "Large-scale collection and sanitization of network security data: risks and challenges", in New Security Paradigms Workshop (NSPW), 2006.
R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization", ACM SIGCOMM Computer Communication Review, 2006.
J. Mogul and M. Arlitt, "SC2D: an alternative to trace anonymization", in ACM SIGCOMM MineNet, 2006.
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity.", in IEEE International Conference on Data Engineering (ICDE), 2006.
D. Koukis, S. Antonatos, and K.G. Anagnostakis, "On the Privacy Risks of Publishing Anonymized IP Network Traces.", in Communications and Multimedia Security, 2006.
E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.
M. Harvan and J. Schonwalder, "Prefix- and Lexicographical-order-preserving IP Address Anonymization", IEEE/IFIP Network Operations and Management Symposium (NOMS), 2006.
B. Gueye, S. Uhlig, A. Ziviani, and S. Fdida, "Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts" 2006.
G. Conti, "Googling Considering Harmful", in New Security Paradigms Workshop (NSPW), 2006.
M. Bishop, R. Crawford, B. Bhumiratana, L. Clark, and K. Levitt, "Some Problems in Sanitizing Network Data", in IEEE WETICE, 2006.
C. Wright, F. Monrose, and G. Masson, "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", in Journal of Machine Learning Research 2006, Dec 2006.
A. Slagell, K. Lakkaraju, and K. Luo, "FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs", in USENIX LISA, dec 2006.
D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.
J. Erman, A. Mahanti, and M. Arlitt, "Internet Traffic Identification using Machine Learning", in IEEE GLOBECOM 2006, Nov 2006.
J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. Voelker, "Unexpected Means of Protocol Inference", in ACM SIGCOMM IMC, Oct 2006.
L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.
A. Madhukar and C. Williamson, "A Longitudinal Study of P2P Traffic Classification", in MASCOTS 2006, Sep 2006.
J. Zhang, N. Borisov, and W. Yurcik, "Outsourcing Security Analysis with Anonymized Logs", Securecomm and Workshops, aug 2006.
D. Xu and P. Ning, "A Flexible Approach to Intrusion Alert Anonymization and Correlation", Securecomm and Workshops, aug 2006.
N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification", in ACM SIGCOMM 2006, Aug 2006.
J. Erman, M. Arlitt, and A. Mahanti, "Traffic Classification Using Clustering Algorithms", in ACM SIGCOMM 2006, Aug 2006.
F. Constantinou and P. Mavrommatiss, "Identifying Known and Unknown Peer-to-Peer Traffic", in IEEE NCA 2006, Aug 2006.
L. Bernaille, R. Teixeira, and K. Salamatian, "Early Application Identification", in ACM CoNEXT 2006, Jul 2006.
D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.
M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Identification and Analysis of Peer-to-Peer Traffic", in Journal of Communications 2006, Mar 2006.
K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.
2005
A. Ziviani, S. Fdida, J.~F. de Rezende, and O.~C. M.~B. Duarte, "Improving the accuracy of measurement-based geographic location of internet hosts", Computer Networks and ISDN Systems, vol. 47, no. 4, pp. 503-523, 2005.
T. Ylonen, "Thoughts on how to mount an attack on tcpdpriv's '-a50' option" 2005.
L. Overlier, T. Brekne, and A. Arnes, "Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.", in CANS, 2005.
A. Moore, D. Zuev, and M. Crogan, "Discriminators for Use in Flow-based Classification", Tech. rep., Intel Research, Cambridge, 2005.
G. Minshall, "TCPdPriv" 2005.
A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.
M.~J. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic Locality of IP Prefixes", in Internet Measurement Conference (IMC), Berkeley, CA, USA, 2005, p. 13, USENIX Association.
T. Brekne, A. Arnes, and A. Oslebo, "Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.", in Privacy Enhancing Technologies, 2005.
L. Bernaille, A. Soule, M. Jeannin, and K. Salamatian, "Blind Application Recognition Through Behavioral Classification", Tech. rep., Paris 2005, 2005.
Y. Li, Adam Slagell, K. Luo, and W. Yurcik, "CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security", in International Conference on Telecommunication Systems, Modeling and Analysis, nov 2005.
Chang~Feng W., Chang F., Chi~Feng W., and Walpole J., "A Traffic Characterization of Popular on-line Games", in IEEE/ACM Transactions on Networking 2005, Oct 2005.
A. Slagell and W. Yurcik, "Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization", Security and Privacy for Emerging Areas in Communication Networks, sep 2005.
K. Luo, Y. Li, A. Slagell, and W. Yurcik, "CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing", in FLOCON - Network Flow Analysis Workshop, sep 2005.
A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions", in ACM SIGCOMM 2005, Aug 2005.
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC Multilevel Traffic Classification in the Dark", in ACM SIGCOMM 2005, Aug 2005.
P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "Acas: Automated Construction of Application Signatures", in ACM SIGCOMM 2005, Aug 2005.
A. Moore and Zuev D., "Internet Traffic Classification Using Bayesian Analysis Techniques", in ACM SIGMETRICS 2005, Jun 2005.
S. Zander, T. Nguyen, and G. Armitage, "Self-learning IP Traffic Classification based on Statistical Flow Characteristics", in Passive and Active Measurement Conference (PAM), Mar 2005.
L. Plissonneau, J. Costeux, and P. Brown, "Analysis of Peer-to-Peer Traffic on ADSL", in Passive and Active Measurement Conference (PAM), Mar 2005.
Zuev D. and Moore A., "Traffic Classification using a Statistical Approach", in Passive and Active Measurement Conference (PAM), Mar 2005.
2004
A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.
W.~B. Norton, "The Evolution of the U.S. Internet Peering Ecosystem" 2004.
P. Lincoln, P. Porras, and V. Shmatikov, "Privacy-Preserving Sharing and Correlation of Security Alerts", in USENIX Security Symposium, 2004.
B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based Geolocation of Internet Hosts", IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 288-293, 2004.
J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", Computer Networks, 2004.
T. Karagiannis, A. Broido, N. Brownless, K. Claffy, and M. Faloutsos, "Is P2P Dying or Just Hiding", in IEEE GLOBECOM, Nov 2004.
S. Sen and J. Wang, "Analyzing Peer-to-Peer Traffic across Large Networks", in IEEE/ACM Transactions on Networking 2004, Oct 2004.
S. Roughan, O. Sen, and N. Duffield, "Class-of-service Mapping for QoS", in ACM SIGCOMM IMC, Oct 2004.
C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a Better NetFlow", in ACM SIGCOMM, Sept 2004.
K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications", in ACM SIGCOMM 2005, Aug 2004.
T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport Layer Identification of P2p Traffic", in ACM SIGCOMM 2004, Aug 2004.
F. Dabek, R. Cox, F. Kaashoek, and R. Morris, "Vivaldi: A Decentralized Network Coordinate System", in SIGCOMM, Portland, Oregon, Aug 2004.
K. Cho, M. Luckie, and B. Huffaker, "Identifying IPv6 Network Problems in the Dual-Stack World", in ACM SIGCOMM, Aug 2004.
A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.
S. Sen, O. Spatscheck, and D. Wang, "Accurate Scalable In-Network Identification of P2P Traffic", in World Wide Web (WWW) Conference, May 2004.
D. Wessels, M. Fomenkov, N. Brownlee, and k. claffy, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).
A. McGregor, M. Hall, Brunskill J., and Lorier P., "Flow Clustering Using Machine Learning Techniques", in Passive and Active Measurement Conference (PAM), Apr 2004.
A. Broido, Y. Hyun, R. Gao, and k. claffy, "Their share: diversity and disparity in IP traffic", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).
G. Siganos and M. Faloutsos, "Analyzing BGP Policies: Methodology and Tool", in IEEE INFOCOM, March 2004.
Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.
T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, "A Nonstationary Poisson View of Internet Traffic", in IEEE INFOCOM. March 2004, IEEE INFOCOM.
P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.
2003
R. Percacci and A. Vespignani, "Scale-free behavior of the Internet global performance", European Physical Journal B, vol. 32, pp. 411-414, 2003.
R. Pang and V. Paxson, "A high-level programming environment for packet trace anonymization and transformation", in ACM SIGCOMM, 2003.
A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Demographic placement for Internet host location", in GLOBECOM, Dec 2003.
C. Dovrolis, R. Prasad, M. Murray, and k. claffy, "Bandwidth estimation: metrics, measurement techniques, and tools", IEEE Network, Nov 2003.
L. Tang and M. Crovella, "Virtual Landmarks for the Internet", in Internet Measurement Conference (IMC), Oct 2003, pp. 143-152.
A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Similarity models for Internet host location", in ICON, Sep 2003.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.
Z. Mao, J. Rexford, J. Wang, and R.~H. Katz, "Towards an Accurate AS-Level Traceroute Tool", in ACM SIGCOMM, August 2003.
A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, "On the geographic location of Internet resources", in Selected Areas in Communications, Volume 21, Aug 2003, pp. 934-948.
C. Estan, S. Savage, and G. Vargheses, "Automatically Inferring Patterns of Resources Consumption in Network Traffic", in ACM SIGCOMM 2003, Aug 2003.
C. Dewes, A. Wichmann, and A. Feldmann, "An Analysis of Internet Chat Systems", in ACM SIGCOMM 2003, Aug 2003.
H. Chang, S. Jamin, and W. Willinger, "Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach", in ACM SIGCOMM Workshop on MoMeTools, August 2003.
G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks based on Connection Patterns", in USENIX 2003, Jun 2003.
E. Giovannetti and C.~A. Ristuccia, "Estimating Market Power in the Internet Backbone Using Band-X data" June 2003.
C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.
N. Feamster, D.~G. Andersen, H. Balakrishnan, and M.~F. Kaashoek, "Measuring the Effects of Internet Path Faults on Reactive Routing", in ACM SIGMETRICS, Jun 2003.
A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of DNS Update Traffic", in ACM SIGMETRICS 2003, June 2003.
A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of Private DNS Update Sources", in IEEE Workshop on Internet Applications (WIAPP), June 2003.
D.~M. Nicol, S.~W. Smith, and M. Zhao, "Efficient Security for BGP Route Announcements", Tech. Rep. TR2003-440, Dartmouth College, Computer Science, Hanover, NH, May 2003.
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.
D. Wessels, M. Fomenkov, and k. claffy, "Wow, That's a lot of packets", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.
D. Moore, C. Shannon, G.~M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, San Francisco, CA, April 2003, IEEE INFOCOM.
T. Lindh and N. Brownlee, "Integrating Active Methods and Flow Meters - an implementation using NeTraMet", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.
Y. Hyun, A. Broido, and k. claffy, "On Third-party Addresses in Traceroute Paths", in Passive and Active Measurement Conference (PAM), Apr 2003.
M. Fomenkov, K. Keys, D. Moore, and k. claffy, "Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites", Tech. rep., CAIDA, Apr 2003.
T. Lee, B. Huffaker, M. Fomenkov, and k. claffy, "On the problem of optimization of DNS root servers' placement", in Passive and Active Measurement Conference (PAM), Mar 2003.
Y. Hyun, A. Broido, and k. claffy, "Traceroute and BGP AS Path Incongruities", Tech. rep., CAIDA, Mar 2003.
A. Broido, R. King, E. Nemeth, and k. claffy, "Radon Spectroscopy of Inter-Packet Delay", in IEEE High-Speeding Networking Workshop (HSN), March 2003.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.
R. Johari and J. Tsitsiklis, "Routing and Peering in a Competitive Internet" January 2003.
R. Beverly and k. claffy, "Wide-Area IP Multicast Traffic Characterization", IEEE Network, Jan 2003.
2002
A. Serjantov and G. Danezis, "Towards an Information Theoretic Metric for Anonymity", in Privacy Enhancing Technologies, 2002.
R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP Misconfiguration", in ACM SIGCOMM, 2002.
T. Griffin and G. Wilfong, "On the Correctness of IBGP Configuration", in ACM SIGCOMM, 2002.
T. Griffin and G. Wilfong, "Analysis of the MED Oscillation Problem in BGP", in IEEE International Conference on Network Protocols (ICNP), 2002.
C. Diaz, B. Seys, J. Claessenss, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, 2002.
C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.
C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.
J. Xu, J. Fan, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", IEEE International Conference on Network Protocols (ICNP), nov 2002.
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
H. Uijterwaal, "First analysis of the Beacon data" Nov 2002.
J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP Routing Stability of Popular Destinations", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov 2002, ACM SIGCOMM/USENIX Internet Measurement Workshop.
D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop 2002, Nov 2002.
G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
D.G. Andersen, N. Feamster, S. Bauer, and H. Balakrishnan, "Topology Inference from BGP Routing Dynamics", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
Y. Afek, O. Ben-Shalom, and A. Bremler-Barr, "On the Structure and Application of BGP Policy Atoms", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.
NSF Workshop, "Report of NSF Workshop on Network Research Testbeds" Oct 2002.
B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.
D. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP Topologies with Rocketfuel", in ACM SIGCOMM, Aug 2002.
J. Merwe, S. Sen, and C. Kalmanek, "Streaming Video Traffic: Characterization and Network Impact", in WCW 2002, Aug 2002.
Z. Mao, R. Govindan, G. Varghese, and R.~H. Katz, "Route Flap Damping Exacerbates Internet Routing Convergence", in ACM SIGCOMM, Aug 2002.
T.~G. Griffin, "What is the Sound of One Route Flapping?" July 2002.
N. Brownlee and k. claffy, "Understanding Internet Traffic Streams: Dragonflies and Tortoises", Jul 2002.
L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet Hierarchy from Multiple Vantage Points", in IEEE INFOCOM, Jun 2002.
D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.
isp bgpdnswg@nicwg.org, "Enhancing the Security of Name Resolution and Inter-Domain Internet Routing" May 2002.
N. Brownlee and I. Ziedins, "Response time distributions for global name servers", in Passive and Active Measurement Conference (PAM) 2002, Mar 2002.
B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing", in Symposium on Applications and the Internet (SAINT), Jan 2002.
A. Broido, k. claffy, and E. Nemeth, "Internet Expansion, Refinement, and Churn", European Transactions on Telecommunications, Jan 2002.
2001
J. Xu, J. Fan, M. Ammar, and S. Moon, "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization", in ACM SIGCOMM IMC, 2001.
V.~N. Padmanabhan and L. Subramanian, "An Investigation of Geographic Mapping Techniques for Internet Hosts", in SIGCOMM, New York, NY, USA, 2001, pp. 173-185, ACM.
J. Padhye and S. Floyd, "Identifying the TCP Behavior of Web Servers", in ACM SIGCOMM, 2001.
W.~B. Norton, "Internet Service Providers and Peering" 2001.
T.~S.~E. Ng and H. Zhang, "Predicting Internet Network Distance with Coordinates-Based Approaches", in IEEE Conference on Computer Communications (INFOCOM), 2001, pp. 170-179.
D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.
G. Huston, "Commentary on Inter-Domain Routing in the Internet, RFC 3221" Dec 2001.
M. Fomenkov, k. claffy, B. Huffaker, and D. Moore, "Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers", in USENIX LISA, Dec 2001.
D. Chang, R. Govindan, and J. Heidemann, "An Empirical Study of Router Response to Large BGP Routing Table Load", Tech. Rep. ISI-TR-2001-552, USC/Information Sciences Institute, December 2001.
N. Brownlee, k. claffy, and E. Nemeth, "DNS Root/gTLD Performance Measurements", in USENIX LISA, Dec 2001.
C. Shannon, D. Moore, and k. claffy, "Characteristics of Fragmented Traffic on Internet Links", in ACM SIGCOMM Internet Measurement Workshop 2001. Nov 2001, ACM SIGCOMM.
N. Brownlee, k. claffy, and E. Nemeth, "DNS Measurements at a Root Server", in IEEE GLOBECOM. Nov 2001, IEEE GLOBECOM.
D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Aug 2001.
D. Moore, G.~M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Washington, D.C., Aug 2001.
A. Broido and k. claffy, "Internet topology: connectivity of IP graphs", in SPIE International symposium on Convergence of IT and Communication, Aug 2001.
C. Dovrolis, P. Ramanathan, and D. Moore, "Packet Dispersion Techniques and Capacity Estimation", July 2001.
A. Broido and k. claffy, "Complexity of global routing policies", Tech. rep., CAIDA, Jul 2001.
N. Brownlee, "Using NeTraMet for Production Traffic Measurement", in Integrated Management Strategies for the New Millenium, May 2001.
A. Broido and k. claffy, "Analysis of RouteViews BGP data: policy atoms", in Network Resource Data Management Workshop, May 2001.
C. Shannon, D. Moore, and k. claffy, "Characteristics of fragmented IP traffic on Internet links", in Passive and Active Measurement Conference (PAM), Amsterdam, Netherlands, Apr 2001, RIPE NCC.
M. Murray and k. claffy, "Measuring the Immeasurable: Global Internet Measurement Infrastructure", in Passive and Active Measurement Conference (PAM), Apr 2001.
C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence", in IEEE INFOCOM, Apr 2001, pp. 537-546.
K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.
K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.
B. Huffaker, M. Fomenkov, D. Moore, and k. claffy, "Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance", in Passive and Active Measurement Conference (PAM), Apr 2001.
N. Brownlee and M. Murray, "Streams, Flows and Torrents", in Passive and Active Measurement Conference (PAM), Apr 2001.
N. Brownlee, k. claffy, M. Murray, and E. Nemeth, "Methodology for passive analysis of a university Internet link", in Passive and Active Measurement Conference (PAM), Apr 2001.
D. Newman, "Internet Core Router Test" Mar 2001.
A. Moore and K Papagiannaki, "Toward the Accurate Identification of Network Applications", in Passive and Active Measurement Conference (PAM), Mar 2001.
M. Mathis, G. Huntoon, and k. claffy, "Traffic dynamics testbed", in Large Scale Networking (LSN) Workshop, Mar 2001.
G. Huston, "Analyzing the Internet's BGP Routing Table", The Internet Protocol Journal, vol. 4, no. 1, Mar 2001.
C. Dovrolis, P. Ramanathan, and D. Moore, "What do packet dispersion techniques measure?", in IEEE INFOCOM, Jan 2001.
k. claffy, "CAIDA: Visualizing the Internet", Jan 2001.
2000
C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "An Experimental Study of Internet Routing Convergence", Tech. Rep. MSR-TR-2000-08, Microsoft Research, 2000.
P. Rajvaidya, K. Almeroth, and k. claffy, "A scalable architecture for monitoring and visualizing multicast statistics", in Distributed Systems: Operations and Management, Dec 2000.
CAIDA, "ISMA Winter 2000 Workshop - Final Report", in Internet Statistics and Metrics Analysis (ISMA), Dec 2000.
L. Gao, "On inferring autonomous system relationships in the Internet", in IEEE Global Internet Symposium, nov 2000.
S. McCreary and k. claffy, "Trends in wide area IP traffic patterns - A view from Ames Internet Exchange", in ITC Specialist Seminar, Sep 2000.
N. Brownlee and R. Fulton, "Kawaihiko and the third-quartile day [traffic management]", Aug 2000.
E. Nemeth, T. Ott, K. Thompson, and k. claffy, "The Internet Engineering Curriculum Repository", in International Networking Conference (INET) '00, Jul 2000.
D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET) '00, Jul 2000.
B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) '00, July 2000.
B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.
D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET), Yokohama, Japan, 18-21 Jul 2000, The Internet Society.
k. claffy, "Measuring the Internet", Jan 2000.
1999
R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in Usenix LISA, Berkeley, CA, US, 1999, pp. 69-78, USENIX Association.
Y. Afek, A. Bremler-Barr, and S. Har-Peled, "Routing with a Clue", in ACM SIGCOMM, 1999.
M. Roesch, "Snort Lightweight Intrusion Detection for Networks", in USENIX LISA 1999, Nov 1999.
R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in USENIX LISA, Nov 1999.
k. claffy and S. McCreary, "Internet measurement and data analysis: passive and active measurement", in American Statistical Association, Aug 1999.
B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) 1999, June 1999.
B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) '99, Jun 1999.
B. Huffaker, k. claffy, and E. Nemeth, "Tools to visualize the Internet multicast backbone", in International Networking Conference (INET) '99, Jun 1999.
B. Huffaker, k. claffy, and E. Nemeth, "Tools to Visualize the Internet Multicast Backbone", in International Networking Conference (INET) 1999, June 1999.
CAIDA, "Report from the ISMA Network Visualization Workshop", in Internet Statistics and Metrics Analysis (ISMA), Apr 1999.
C. Labovitz, G.~R. Malan, and F. Jahanian, "Origins of Internet Routing Instability", in IEEE INFOCOM, Mar 1999.
k. claffy, "Internet measurement and data analysis: topology, workload, performance and routing statistics", in NAE '99 Workshop, Mar 1999.
k. claffy, T. Monk, and D. McRobb, "Internet Tomography", Jan 1999.
CAIDA, "ISMA passive measurement data and analysis, workshop report", in Internet Statistics and Metrics Analysis (ISMA), Jan 1999.
1998
P. Samarati and L. Sweeney, "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Tech. rep., Computer Science Laboratory, (SRI) International, 1998.
C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Wide-Area Backbone Failures", Tech. Rep. CSE-TR-382-98, University of Michigan, 1998.
C. Labovitz, G.~R. Malan, and F. Jahanian, "Internet Routing Instability", IEEE/ACM Transactions on Networking, vol. 6, no. 5, pp. 515-528, 1998.
k. claffy, G. Miller, and K. Thompson, "The nature of the beast: Recent traffic measurements from an Internet backbone", in International Networking Conference (INET) '98, Jul 1998.
B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.
Huffaker B., J. Jung, D. Wessels, and k. claffy, "Visualization of the Growth and Topology of the NLANR Caching Hierarchy", in International WWW Caching Workshop 1998, June 1998.
CAIDA, "Comments by CAIDA concerning the FCC's review of the acquisition of MCI Communications Corp. by Worldcom, Inc.", Tech. rep., CAIDA, Apr 1998.
D. Wessels and k. claffy, "ICP and the Squid web cache", Mar 1998.
1997
V. Paxson, "End-to-end routing behavior in the Internet", IEEE/ACM Transactions on Networking, vol. 5, no. 5, pp. 601-615, 1997.
M. O'Dell, "GSE - An Alternate Addressing Architecture for IPv6" 1997.
k. claffy and T. Monk, "What's next for Internet data analysis? Status and challenges facing the community", Oct 1997.
D. Wessels and k. claffy, "RFC 2187: Application of Internet Cache Protocol (ICP), version 2" Sept 1997.
D. Wessels and k. claffy, "RFC 2186: Internet Cache Protocol (ICP), version 2" Sept 1997.
T. Monk and k. claffy, "Internet data acquisition and analysis: Status and next steps", Tech. rep., CAIDA, Mar 1997.
1996
E. Hoffman and k. claffy, "Geographic addressing reconsidered", 1996.
C. Davis, P. Vixie, T. Goodwin, and I. Dickinson, "A Means for Expressing Location Information in the Domain Name System", RFC Editor, 1996.
D. Wessels and k. claffy, "Evolution of the NLANR cache hierarchy: Global configuration challenges", Tech. rep., CAIDA, Nov 1996.
T. Munzner, E. Hoffman, k. claffy, and B. Fenner, "Visualizing the global topology of the MBone", in IEEE Symposium on Information Visualization, Oct 1996.
E. Hoffman and k. claffy, "Address administration in IPv6", in 1996 IEEE Symposium on Information Visualization, Oct 1996.
CAIDA, "Cooperative Association for Internet Data Analysis", Tech. rep., CAIDA, Oct 1996.
D. Wessels and k. claffy, "Can WWW caches help to save the Internet?", in Coordination and Administration of the Internet Workshop, Sep 1996.
T. Monk and k. claffy, "Cooperation in Internet data acquisition and analysis", Sept 1996.
D. Mitchell, S. Bradner, and k. claffy, "In whose domain: name service in adolescence", Sept 1996.
B. Chinoy and T. Salo, "Internet Exchanges: Policy-Driven Evolution", in Coordination and Administration of the Internet Workshop, Sep 1996.
k. claffy, "'But some data is worse than others': Measurement of the global Internet", Tech. rep., CAIDA, Aug 1996.
T. Monk and k. claffy, "A survey of Internet statistics / metrics activities", Tech. rep., CAIDA, Jun 1996.
1995
k. claffy and H.-W. Braun, "Post-NSFNET statistics collection", in International Networking Conference (INET) '95, Jun 1995.
k. claffy, A Gross, and H.-W. Braun, "Measured interference of security mechanisms with network performance", in International Networking Conference (INET) '95, Jun 1995.
k. claffy, H.-W. Braun, and G. Polyzos, "A parameterizable methodology for Internet traffic flow profiling", Mar 1995.
1994
k. claffy, Internet traffic characterization., Ph.D. thesis, University of California, San Diego, 1994.
R. Bohn, H.-W. Braun, k. claffy, and S. Wolff, "Mitigating the coming Internet crunch: multiple service levels via Precedence", Tech. rep., CAIDA, Nov 1994.
H.-W. Braun and k. claffy, "Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server", in World Wide Web (WWW) Conference, Oct 1994.
N. Groschwitz and G. Polyzos, "A Time-Series Model of Long-Term Traffic on the NSFNET Backbone", in IEEE International Conference on Communications (ICC), May 1994.
H.-W. Braun, B. Chinoy, and k. claffy, "Applied Network Research: 1994 annual status report", Tech. rep., CAIDA, Apr 1994.
k. claffy, H.-W. Braun, and G. Polyzos, "Tracking long-term growth of the NSFNET", Mar 1994.
k. claffy, H.-W. Braun, and G. Polyzos, "Internet traffic flow profiling", Tech. rep., CAIDA, Mar 1994.
1993
B. Aiken, H.-W. Braun, and P. Ford, "NSF implementation plan for interim NREN", 1993.
H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1993.
k. claffy, H.-W. Braun, and G. Polyzos, "Measurement considerations for assessing unidirectional latencies", Sep 1993.
H.-W. Braun, k. claffy, and G. Polyzos, "A framework for flow-based accounting on the Internet", in IEEE Singapore International Conference on Networks'93 (SICON'93), Sep 1993.
k. claffy, H.-W. Braun, and G. Polyzos, "Long-term traffic aspects of the NSFNET", in International Networking Conference (INET) '93, May 1993.
k. claffy, H.-W. Braun, and G. Polyzos, "Application of sampling methodologies to wide-area network traffic characterization", in ACM SIGCOMM '93, May 1993.
H.-W. Braun, P. Ford, and Y. Rekhter, "CIDR and the evolution of the Internet", in International Networking Conference (INET) '93, May 1993.
H.-W. Braun and k. claffy, "Network analysis issues for a public Internet", in Public Access to the Internet, A Harvard JFK School Workshop, May 1993.
H.-W. Braun and k. claffy, "Network analysis in support of Internet policy requirements", in International Networking Conference (INET) '93, May 1993.
k. claffy, H.-W. Braun, and G. Polyzos, "Traffic characteristics of the T1 NSFNET backbone", in IEEE INFOCOM, Jan 1993.
1992
H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1992.
B. Chinoy, "Dynamics of Internet routing information", Oct 1992.
B. Chinoy and H.-W. Braun, "The National Science Foundation Network", Tech. rep., CAIDA, Sep 1992.
NLANR, "Redesign and extension of multi-agency interconnection point", Tech. rep., CAIDA, Jun 1992.
Y. Rekhter and B. Chinoy, "Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis", Jan 1992.
T. Asaba, k. claffy, O. Nakamura, and J. Murai, "An analysis of international academic research network traffic between Japan and other nations", in International Networking Conference (INET) '92, Jan 1992.