Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    dataset    location   |
|   Citation Format:    abbreviated    complete   |
YearAuthor(s)TitlePublicationDataset
2018
Basat, R.
Einziger, G.
Friedman, R.
Kassner, Y.
Optimal Elephant Flow Detectionarxiv.org Anonymized Internet Traces
2017
Xu, T.
Gao, D.
Dong, P.
Foh, C.
Zhang, H.
Mitigating the Table-Overflow Attack in Software-Defined NetworkingIEEE Trans. on Network and Service Management Anonymized Internet Traces
Topology with Archipelago
2017
Varela, J.
Ros, P.
Towards a NetFlow Implementation for OpenFlow Software-Defined NetworksIntl Teletraffic Congress Anonymized Internet Traces
2017
Phan, T.
Bao, N.
Park, M.
Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacksJ. of Network and Computer Applications Anonymized Internet Traces
Denial of Service Attacks
2017
Kim, Y.
Choi, D.
Van, T.
Long, M.
Park, M.
Multiple Machine Learning for Software Defined Networking Combination-based DDoS detection systemThe J. of Korean Institute of Communications and Information Sciences Anonymized Internet Traces
Denial of Service Attacks
2017
Huang, Q.
Lee, P.
Li, R.
Tang, L.
Chen, Y.
Zhang, G.
SketchVisor: Robust Network Measurement for Software Packet ProcessingACM SIGCOMM Anonymized Internet Traces
2017
Meng, J.
Ren, F.
Lin, C.
Modeling and understanding burst transmission for energy efficient ethernetComputer Networks Anonymized Internet Traces
2017
Kim, T.
Lim, J.
Kim, J.
Cho, W.
Chung, E.
Lee, H.
Scalable Bandwidth Shaping Scheme via Adaptively Managed Parallel Heaps in Manycore-Based Network ProcessorsACM Trans. on Design Automation of Electronic Systems Anonymized Internet Traces
2017
Wu, N.
Bi, Y.
Michael, N.
Tang, A.
Doyle, J.
Matni, N.
HFTraC: High-frequency traffic controlIntl Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2017
Vidal, J.
Orozco, A.
Villalba, L.
Adaptive artificial immune networks for mitigating DoS flooding attacksSwarm and Evolutionary Computation Anonymized Internet Traces
Denial of Service Attacks
2017
Muhammad, A.
Alameka, F.
Integrasi Metode Normalized Reelative Network Entropy dan Neural Network Backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoSJurnal Rekayasa Teknologi Informasi Anonymized Internet Traces
Denial of Service Attacks
2017
Mirkovic, J.
Bartlett, G.
Heidemann, J.
Shi, H.
Deng, X.
Do you see me now? Sparsity in passive observations of address livenessNetwork Traffic Measurement and Analysis Conf. Anonymized Internet Traces
2017
Maltinsky, A.
Giladi, R.
Shavitt, Y.
On network neutrality measurementsACM Trans. on Intelligent Systems and Technology (TIST) Anonymized Internet Traces
2017
Lu, J.
Wan, Y.
Li, Y.
Zhang, C.
Dai, H.
Wang, Y.
Zhang, G.
Liu, B.
Ultra-Fast Bloom Filters using SIMD techniquesIntl Symp. on Quality of Service (IWQoS) Anonymized Internet Traces
2017
Duan, H.
Yuan, X.
Wang, C.
LightBox: SGX-assisted Secure Network Functions at Near-native Speedarxiv.org Anonymized Internet Traces
2017
Deng, J.
Li, H.
Wang, K.
Ahn, G.
Zhao, Z.
Han, W.
On the Safety and Efficiency of Virtual Firewall Elasticity ControlACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2017
Chainourov, B.Log analysis using Splunk Hadoop ConnectNaval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2017
Albdair, M.
Addie, R.
Fatseas, D.
Social network behaviour inferred from O-D pair trafficAustralian J. of Telecommunications and the Digital Economy Anonymized Internet Traces
2017
Taghouti, M.
Lucani, D.
Fitzek, F.
Bouallegue, A.
Back to Results Random Linear Network Coding Schemes for Reduced Zero-Padding Overhead: Complexity and Overhead AnalysisEuropean Wireless Conf. Anonymized Internet Traces
2017
Lopez, E.
Navarro, L.
Tight bounds for sketches in traffic validationIntl Conf. on Networking, Sensing and Control Anonymized Internet Traces
2017
Anderson, D.
Bevan, P.
Lang, K.
Liberty, E.
Rhodes, L.
Thaler, J.
A High-Performance Algorithm for Identifying Frequent Items in Data Streamsarxiv.org Anonymized Internet Traces
2017
Alonso, S.
Perez, M.
Veiga, M.
Garcia, C.
Optimizing Dual-Mode EEE Interfaces: Deep-Sleep is HealthyIEEE Trans. on Communications Anonymized Internet Traces
2017
Sivaraman, V.
Narayana, S.
Rottenstreich, O.
Muthukrishnan, S.
Rexford, J.
Heavy-Hitter Detection Entirely in the Data PlaneSymp. on SDN Research Anonymized Internet Traces
2017
Rao, M.
Naidu, M.
A Model for Generating Synthetic Network Flows and Accuracy Index for Evaluation of Anomaly Network Intrusion Detection SystemsIndian J. Science and Technology Anonymized Internet Traces
2017
Oeldemann, A.
Wild, T.
Herkersdorf, H.
Reducing data center resource over-provisioning through dynamic load management for virtualized network functionsArchitecture of Computing Systems (ARCS) Anonymized Internet Traces
2017
Mitzenmacher, M.
Pontarelli, S.
Reviriego, P.
Adaptive cuckoo filtersarxiv.org Anonymized Internet Traces
2017
Lee, T.
Pappas, C.
Perrig, A.
Gligor, V.
Hu, Y.
The Case for In-Network Replay SuppressionAsia Conf. on Computer and Communications Security Anonymized Internet Traces
2017
Ghasemi, M.
Benson, T.
Rexford, J.
Dapper: Data Plane Performance Diagnosis of TCPSymp. on SDN Research Anonymized Internet Traces
2017
Duffield, N.
Xu, Y.
Xia, L.
Ahmed, N.
Yu, M.
Stream Aggregation Through Order Samplingarxiv.org Anonymized Internet Traces
2017
Cascone, C.
Bifulco, R.
Pontarelli, S.
Capone, A.
Relaxing state-access constraints in stateful programmable data planesarxiv.org Anonymized Internet Traces
2017
Boro, D.
Bhattacharyya, D.K
DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacksMicrosystem Technologies Anonymized Internet Traces
Denial of Service Attacks
2017
Bhaya, W.
Manaa, M.E.
DDoS attack detection approach using an efficient cluster analysis in large data scaleConf. on New Trends in Information and Communications Technology Applications (NTICT) Anonymized Internet Traces
Denial of Service Attacks
2017
Vasiliadis, G.
Koromilas, L.
Polychronakis, M.
Ioannidis, S.
Design and implementation of a stateful network packet processing framework for GPUsIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2017
Varela, J.
Ros, P.
Reinventing NetFlow for OpenFlow Software-Defined Networksarxiv.org Anonymized Internet Traces
2017
Engel, D.
Malone, W.
Integrated Information as a Metric for Group Interaction: Analyzing Human and Computer Groups Using a Technique Developed to Measure Consciousnessarxiv.org Anonymized Internet Traces
2017
Afek, Y.
Barr, A.
Feibish, S.
Schiff, L.
Detecting Heavy Flows in the SDN Match and Action Modelarxiv.org Anonymized Internet Traces
2017
Sharafaldin, I.
Gharib, A.
Lashkari, A.
Ghorbani, A.
Towards a Reliable Intrusion Detection Benchmark DatasetSoftware Networking Anonymized Internet Traces
Denial of Service Attacks
2017
Remedios, R.On Improving DREAM Framework with Estimations and ProgMEUniv. of Ottawa Anonymized Internet Traces
2017
Norige, E.Hardware Algorithms for High-Speed Packet ProcessingMichigan State Univ. Anonymized Internet Traces
2017
Luo, H.
Chen, Z.
Li, J.
Vasilakos, A.V.
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path IdentifiersIEEE Trans. on Information Forensics and Security Anonymized Internet Traces
Topology with Archipelago
2017
Lee, K.Towards precise network measurementsCornell University Anonymized Internet Traces
2017
Iordache, M.
Jouet, S.
Marnerides, A.
Pezaros, D.
Distributed, Multi-Level Network Anomaly Detection for Datacentre NetworksIEEE ICC Next Generation Networking and Internet Symp. Anonymized Internet Traces
2017
Huong, T.
Thanh, N.
Software defined networking-based one-packet DDoS mitigation architectureIntl Conf. on Ubiquitous Information Management and Communication Anonymized Internet Traces
2017
Halas, F.Performance Measurement of Stream Data Processing in Apache SparkMasaryk Univ. Anonymized Internet Traces
2017
Chen, S.
Chen, M.
Xiao, Q.
Per-Flow Cardinality MeasurementTraffic Measurement for Big Network Data Anonymized Internet Traces
2017
Cenedese, A.
Tramarin, F.
Vitturi, S.
An Energy Efficient Ethernet Strategy Based on Traffic Prediction and ShapingIEEE Trans. on Communications Anonymized Internet Traces
UCSD Network Telescope
2017
Birkner, R.
Gupta, A.
Feamster, N.
Vanbever, L.
SDX-Based Flexibility or Internet Correctness?: Pick Two!Symp. on SDN Research Anonymized Internet Traces
Topology with BGP
2016
Xia, Q.
Chen, T.
Xu, W.
CIDS: Adapting Legacy Intrusion Detection Systems to the Cloud with Hybrid SamplingIntl Conf. on Computer and Information Technology Anonymized Internet Traces
2016
Saldana, J.What to do With the Wi-Fi Wild WestHorizon Anonymized Internet Traces
2016
Lazarou, G.
Alam, M.
Picone, J.
Measuring the variability of CAIDA internet traffic tracesIntl Conf. on Computer and Information Technology Anonymized Internet Traces
2016
Hendawi, A.
Alali, F.
Wang, X.
Guan, Y.
Zhou, T.
Liu, X.
Basit, N.
Stankovic, J.
Hobbits: Hadoop and Hive based Internet traffic analysisIEEE Intl Conf. on Big Data Anonymized Internet Traces
2016
Gharib, A.
Sharafaldin, I.
Lashkari, A.
Ghorbani, A.
An Evaluation Framework for Intrusion Detection DatasetIntl Conf. on Information Science and Security Anonymized Internet Traces
Denial of Service Attacks
2016
Bayati, A.
Asghari, V.
Nguyen, K.
Cheriet, M.
Gaussian Process Regression Based Traffic Modeling and Prediction in High-Speed NetworksGlobal Communications Conf. Anonymized Internet Traces
2016
Basat, R.
Einziger, G.
Friedman, R.
Kassner, Y.
Randomized Admission Policy for Efficient Top-k and Frequency Estimationarxiv.org Anonymized Internet Traces
2016
Albdair, M.
Addie, R.
Fatseas, D.
Inference of social network behavior from Internet traffic tracesIntl Conf. on Telecommunication Networks and Applications Anonymized Internet Traces
2016
Narayana, S.
Sivaraman, A.
Nathan, V.
Alizadeh, M.
Walker, D.
Rexford, J.
Jeyakumar, V.
Kim, C.
Hardware-Software Co-Design for Network Performance MeasurementACM Workshop on Hot Topics in Networks Pages Anonymized Internet Traces
2016
Moraney, J.
Raz, D.
Efficient detection of flow anomalies with limited monitoring resourcesConf. on Network and Service Management (CNSM) Anonymized Internet Traces
2016
Li, C.
Chen, Z.
Zheng, W.
Wu, Y.
Cao, J.
BAH: A Bitmap Index Compression Algorithm for Fast Data RetrievalConf. on Local Computer Networks Anonymized Internet Traces
2016
Lee, T.
Pappas, C.
Szalachowski, P.
Perrig, A.
Communication based on per-packet One-Time AddressesIntl Conf. on Network Protocols Anonymized Internet Traces
2016
Katta, N.Building efficient and reliable software-defined networksPrinceton University Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
A probabilistic sampling method for efficient flow-based analysisJ. of Communications and Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Huang, Q.
Lee, P.
Toward high-performance distributed stream processing via approximate fault toleranceProceedings of the Very Large Data Bases Endowment Anonymized Internet Traces
2016
Dey, P.
Yuksel, M.
CAR: Cloud-Assisted RoutingConf. on Network Function Virtualization and Software Defined Networks Anonymized Internet Traces
2016
Aral, A.Resource Mapping Optimization for Distributed Cloud ServicesIstanbul Technical University Anonymized Internet Traces
2016
Nguyen, H.
Begin, T.
Busson, A.
Lassous, I.
Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networksIntl Conf. on Network and Service Management Anonymized Internet Traces
2016
Namayanja, J.
Janeja, V.
Characterization of Evolving Networks for CybersecurityInformation Fusion for Cyber-Security Analytics Anonymized Internet Traces
2016
Abt, S.
Baier, H.
Correlating network events and transferring labels in the presence of IP address anonymisationIntl Conf. on Network and Service Management Anonymized Internet Traces
2016
Retnaswamy, B.
Ponniah, K.
A new ontology?based multi agent framework for intrusion detectionIntl J. of Communication Systems Anonymized Internet Traces
2016
Hintze, D
Rice, A.
Picky: efficient and reproducible sharing of large datasets using Merkle-treesSymp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2016
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
A Concise Forwarding Information Base for Scalable and Fast Flat Name Switchingarxiv.org Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Sketch-guided filtering support for detecting superspreaders in high-speed networksElectronics Letters Anonymized Internet Traces
2016
Song, T.
Jiang, Z.
Wei, Y.
Shi, X.
Ma, X.
Ormond, O.
Traffic Aware Energy Efficient Router: Architecture, Prototype and AlgorithmsIEEE J. on Selected Areas in Communications Anonymized Internet Traces
2016
Mokgolodi, K.Traffic prediction in cloud computing using time series modelsUniv. of Botswana Anonymized Internet Traces
2016
Meitei, I.
Singh, K.
De, T.
Detection of DDoS DNS Amplification Attack Using Classification AlgorithmIntl Conf. on Informatics and Analytics Anonymized Internet Traces
2016
Liu, Z.
Manousis, A.
Vorsanger, X.
Sekar, V.
Braverman, V.
One sketch to rule them all: Rethinking network flow monitoring with UnivMonACM SIGCOMM Anonymized Internet Traces
2016
Liu, P.
Li, Y.
Sang, Y.
Zhang, J.
Anonymity-Based Privacy Preserving Network Data PublicationIEEE Trustcom/BigDataSE/I?SPA Anonymized Internet Traces
2016
Dao, N.-N.
Kim, J.
Park, M.
Cho, S.
Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networksPLoS One Anonymized Internet Traces
2016
Phan, T.
Bao, N.
Park, M.
A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined NetworkingConf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Anonymized Internet Traces
Denial of Service Attacks
2016
Phan, T.
Toan, T.
Tuyen, D.
Huong, T.
Nguyen, T.
OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacksIntl Conf. on Communications and Electronics Anonymized Internet Traces
Denial of Service Attacks
2016
Foroushani, V.A.A security framework based on flow marking IP-traceback techniquesDalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
Topology with Skitter
2016
Cermak, M.
Tovarnak, D.
Lastovicka, M.
Caleda, P.
A performance benchmark for NetFlow data analysis on distributed stream processing systemsNetwork Operations and Management Symp. Anonymized Internet Traces
2016
Xu, X.
Zhang, J.
Li, Q.
Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone TracebackIntl Conf. on Data Science in Cyberspace Anonymized Internet Traces
2016
Xing, C
Ding, K.
Hu, C.
Chen, M.
Sample and Fetch-Based Large Flow Detection Mechanism in Software Defined NetworksIEEE Communications Letters Anonymized Internet Traces
2016
Sahri, N.
Okamura, K.
Adaptive Query Rate for Anomaly Detection with SDNIntl J. of Computer Science and Network Security Anonymized Internet Traces
2016
Huang, T.
Sethu, H.
Kandasamy, N.
A new approach to dimensionality reduction for anomaly detection in data trafficarxiv.org Anonymized Internet Traces
2016
Hofstede, R.Flow-based compromise detectionUniv. of Twente Anonymized Internet Traces
2016
Einziger, G.
Fellman, B.
Friedman, R.
Kassner, Y.
ICE buckets: improved counter estimation for network measurementarxiv.org Anonymized Internet Traces
2016
Cermak, M.
Celeda, P.
Detecting advanced network threats using a similarity searchIntl Conf. on Autonomous Infrastructure, Management, and Security Anonymized Internet Traces
2016
Abada, A.Resource optimization of TCAM-based SDN measurements via diminishing-points autodetectionEuropean Conf. on Networks and Communications Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Huang, C.-Y.
Chung, Y.-W.
Toward hardware support for a flexible sketch-based network traffic monitoring systemIEEE Region 10 Symp. (TENSYMP) Anonymized Internet Traces
2016
Fairbanks, J.Graph analysis combining numerical, statistical, and streaming techniquesGeorgia Inst. of Technology Anonymized Internet Traces
2016
Asoni, D.E.
Chen, C.
Barrera, D.
Perrig, A.
On building onion routing into future Internet architecturesIntl Workshop on Open Problems in Network Security (iNetSec) Anonymized Internet Traces
2016
Wu, Y.
Chen, Z.
Cao, J.
Li, H.
Li, C.
Wang, Y.
Zheng, W.
Chang, J.
Zhou, J.
Hu, Z.
Guo, J.
CAMP: A New Bitmap Index for Data Retrieval in Traffic ArchivalIEEE Communications Letters Anonymized Internet Traces
2016
Sahri, N.Research on Performance and Security Improvements by Software Defined NetworkKyushu University Anonymized Internet Traces
2016
Pan, T.
Huang, T.
Liu, J.
Zhang, J.
Yang, F.
Li, S.
Liu, Y.
Fast Content Store Lookup Using Locality-Aware Skip List in Content-Centric NetworksConf. on Computer Communications Workshops Anonymized Internet Traces
2016
Krishnan, D.
Quoc, D.
Bhatotia, P.
Fetzer, C.
Rodrigues, R.
IncApprox: A Data Analytics System for Incremental Approximate ComputingIntl Conf. on World Wide Web Anonymized Internet Traces
2016
Bozakov, Z.
Rizk, A.
Bhat, D.
Zink, M.
Measurement-based flow characterization in centrally controlled networksIntl Conf. on Computer Communications Anonymized Internet Traces
2016
Ben-Basat, R.
Einziger, G.
Friedman, R.
Heavy hitters in streams and sliding windowsIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2016
Zhao, T.
Li, T.
Han, B.
Sun, Z.
Huang, J.
Design and implementation of Software Defined Hardware Counters for SDNComputer Networks Anonymized Internet Traces
2016
Qian, S.
Wu, G.
Huang, J.
Das, T.
Benchmarking modern distributed streaming platformsIntl Conf. on Industrial Technology (ICIT) Anonymized Internet Traces
2016
Lim, H.
Sekar, V.
Abe, Y.
Anderson, D.G.
NetMemex: Providing full-fidelity traffic archivalarxiv.org Anonymized Internet Traces
2016
Lei, C.
Zhang, H.
Liu, Y.
Du, X.
Net-flow fingerprint model based on optimization theoryArabian J. for Science and Engineering Anonymized Internet Traces
2016
Katta, N.
Alipourfard, O.
Rexfor, J.
Walker, D.
CacheFlow: Dependency-Aware Rule-Caching for Software-Defined NetworksSymp. on SDN Research Anonymized Internet Traces
2016
Boro, D.
Basumatary, H.
Goswami, T.
Bhattacharyya, D.K.
UDP Flooding attack detection using information metric measureIntl Conf. on ICT for Sustainable Development Anonymized Internet Traces
2016
Zhou, Z.Per-flow cardinality estimation based on virtual LogLog sketchingUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2016
Xie, Y.
Wang, Y.
He, H.
Xiang, Y.
Yu, S.
Liu, X.
A General Collaborative Framework for Modeling and Perceiving Distributed Network BehaviorIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2016
Silva, J.M.C.A modular traffic sampling architecture for flexible network measurementsUniv. do Minho, Braga, PT Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Intelligent Sampling Using an Optimized Neural NetworkJ. of Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Garroppo, R.G.
Nencioni, G.
Procissi, G.
Tavanti, L.
The impact of the access point power model on the energy-efficient management of infrastructured wireless LANsJ. Computer Networks Anonymized Internet Traces
2016
Chen, Y.
Wang, S.
A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropyIntl Conf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government Anonymized Internet Traces
2016
Chen, C.
Perrig, A.
PHI: Path-Hidden Lightweight Anonymity Protocol at Network LayerPrivacy Enhancing Technologies Anonymized Internet Traces
Topology with BGP
2016
Abaci, H.
Parr, G.
McClean, S.
Moore, A.
Krug, L.
Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirementsSustainable Computing: Informatics and Systems Anonymized Internet Traces
2015
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
SCREAM: Sketch Resource Allocation for Software-defined MeasurementACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2015
Li, C.
Yang, J.
Wang, Z.
Li, F.
Yang, Y.
A lightweight DDoS flooding attack detection algorithm based on synchronous long flowsGlobal Communications Conf. (GLOBECOM) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Flow-based anomaly detection using semisupervised learningIntl Conf. on Signal Processing and Communication Systems (ICSPCS) Anonymized Internet Traces
Denial of Service Attacks
2015
Chen, Z.
Luo, H.
Zhang, M.
Li, J.
Improving network security by dynamically changing path identifiers in future InternetGlobal Communications Conf. (GLOBECOM) Anonymized Internet Traces
2015
Chen, X.-F.
Yu, S.-Z.
CIPA: A collaborative intrusion prevention architecture for programmable network and SDNComputers and Security Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Zhang, Z.
Guo, Z.
Yang, Y.
Bounded-reorder packet scheduling in optical cut-through switchIEEE Trans. on Parallel and Distributed Systems Anonymized Internet Traces
2015
Venkatesh, B.
Choudhury, S.H.
Nagajara, S.
Balakrishnan, N.
BotSpot: fast graph based identification of structured P2P botsJ. Computer Virology and Hacking Techniques Anonymized Internet Traces
2015
Righi, M.
Nunes, R.
Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas DinamicasSimposio Brasileiro em Seguranca da Informacao e Sistemas Anonymized Internet Traces
Denial of Service Attacks
2015
Liu, Z.
Vorsanger, G.
Braverman, V.
Sekar, V.
Enabling a 'RISC' approach for Software-Defined Monitoring using universal streamingACM Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Lei, C.
Zhang, H.
Li, M.
Liu, Y.
Network watermarking model based on optimization theoryIntl Conf. on Cloud Computing and Big Data (CCBD) Anonymized Internet Traces
2015
Huang, T.
Sethu, H.
Kandasamy, N.
A fast algorithm for detecting anomalous changes in network trafficIntl Conf. on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Alipourfard, O.
Moshref, M.
Yu, M.
Re-evaluating measurement algorithms in softwareWorkshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Deterministic flow marking for IPv6 traceback (DFM6)Intl Conf. on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Wu, H.Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity regionUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2015
Saldana, J.
Forcen, I.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Improving network efficiency with SimplemuxIntl Conf. on Computer and Information Technology (CIT) Anonymized Internet Traces
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A method to protect Bloom filters from soft errorsIntl Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) Anonymized Internet Traces
2015
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, M.
Frame coalescing in dual-mode EEEarxiv.org Anonymized Internet Traces
2015
Erazo, M.A.
Rong, R.
Liu, J.
Symbiotic network simulation and emulationACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2015
Chen, C.
Asoni, D.E.
Barrera, D.
Danezis, G.
Perrig, A.
HORNET: High-speed onion routing at the network layerConf. on Computer and Communications Security (CCS) Anonymized Internet Traces
Topology with BGP
2015
Basescu, C.
Reischuk, R.M.
Szalachowski, P.
Perrig, A.
Zhang, Y.
Hsiao, H.-C.
Kubota, A.
Urakawa, J.
SIBRA: Scalable Internet Bandwidth Reservation Architecturearxiv.org Anonymized Internet Traces
Topology with BGP
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Probabilistic flow marking for IP traceback (PFM)Intl Workshop on Reliable Networks Design and Modeling (RNDM) Anonymized Internet Traces
Denial of Service Attacks
2015
Rivetti, N.
Busnel, Y.
Mostefaoui, A.
Efficiently summarizing data streams over sliding windowsIntl Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Performance of Flow-based Anomaly Detection in Sampled TrafficJ. of Networks Anonymized Internet Traces
Denial of Service Attacks
2015
de Oliviera Schmidt, R.
Sadre, R.
Sperotto, A.
van den Berg, H.
Pras, A.
Impact of packet sampling on link dimensioningIEEE Trans. on Network and Service Management Anonymized Internet Traces
2015
Anceaume, E.
Busnel, Y.
Rivetti, N.
Sericola, B.
Identifying global icebergs in distributed streamsSymp. on Reliable Distributed Systems (SRDS) Anonymized Internet Traces
Denial of Service Attacks
2015
Moreno, V.
Ramos, J.
Santiado del Rio, P.M.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Commodity packet capture engines: tutorial, cookbook and applicabilityIEEE Communications Surveys and Tutorials Anonymized Internet Traces
2015
Moreno, V.
Leira, R.
Gonzalez, I.
Gomez-Arribas, F.J.
Towards high-performance network processing in virtualized environmentsIntl Symp. on High Performance Computing and Communications (HPCC) Anonymized Internet Traces
2015
Liu, Q.
Lui, J.C.S.
He, C.
Pan, L.
Fan, W.
Shi, Y.
SAND: A fault-tolerant streaming architecture for network traffic analyticsJ. Systems and Software Anonymized Internet Traces
2015
Li, X.
Qian, C.
Low-complexity multi-resource packet scheduling for network function virtualizationConf. on Computer Communications Anonymized Internet Traces
2015
Li, X.
Qian, C.
The virtual network function placement problemIntl Conf. on Computer Communications Student Workshops Anonymized Internet Traces
2015
Popescu, I.
Miyazaki, T.
Chino, M.
Wang, X.
Okamoto, S.
Gravey, A.
Gravey, P.
Veeraraghavan, M.
Brandt-Pearce, M.
Yamanaka, N.
Application-centric energy-efficient Ethernet with quality of service supportElectronics Letters Anonymized Internet Traces
2015
Ding, H.
Rabinovich, M.
TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2015
Osuna, R.Estudio De Captura y Almacenamiento De Trafico En Redes Fisicas y Virtuales Multi-GigabitUniv. Autonoma de Madrid Anonymized Internet Traces
2015
Addanki, R.
Maji, S.
Veeraraghavan, M.
Tracy, C.
A measurement-based study of big-data movementConf. on Networks and Communications (EuCNC) Anonymized Internet Traces
2015
Zhang, Z.
Wang, B.
Lan, J.
Identifying elephant flows in internet backbone traffic with bloom filters and LRUComputer Communications Anonymized Internet Traces
2015
Wellem, T.
Lai, Y.-K.
Chung, W.-Y.
A software defined sketch system for traffic monitoringSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2015
Sharma, S.Shuffling based mechanism for DDoS prevention on cloud environmentNational Institute of Technology, Rourkela Anonymized Internet Traces
Denial of Service Attacks
2015
Namayanja, J.M.
Janeja, V.P.
Change detection in evolving computer networks: Changes in densification and diameter over timeIntl Conf. on Intelligence and Security Informatics (ISI) Anonymized Internet Traces
2015
Mijumbi, R.
Serrat, J.
Gorricho, J.-L.
Self-managed resources in network virtualisation environmentsIntl Symp. on Integrated Network Management (IM) Anonymized Internet Traces
2015
Ayesta, U.
Bertaux, L.
Carvin, D.
Non-intrusive scheduling of TCP flowsIFIP Networking Conf. (IFIP Networking) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Investigating unique flow marking for tracing back DDoS attacksIntl Symp. on Integrated Network Management (IM) Anonymized Internet Traces
Denial of Service Attacks
2015
Steinert, R.
Hess, A.
Observing software-defined networks using a decentralized link monitoring approachConf. on Network Softwarization (NetSoft) Anonymized Internet Traces
2015
Saldana, J.
de Hoz, D.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Pascual, F.
Lopez, D.R.
Florez, D.
Castell, J.A.
Nunez, M.
Small-packet flows in Software Defined Networks: Traffic profile optimizationJ. of Networks Anonymized Internet Traces
2015
Balkanli, E.A comprehensive study on one-way backscatter traffic analysisDalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A synergetic use of Bloom filters for error detection and correctionIEEE Trans. on Very Large Scale Integration (VLSI) Systems Anonymized Internet Traces
2015
Papapetrou, O.
Garofalakis, M.
Deligiannakis, A.
Sketching distributed sliding-window data streamsVLDB J. Anonymized Internet Traces
2015
Fairbanks, J.
Kannan, R.
Park, H.
Bader, D.
Behavioral clusters in dynamic graphsParallel Computing Anonymized Internet Traces
2015
Chen, J.
Addie, R.G.
Zukerman, M.
Neame, T.D.
Performance evaluation of a queue fed by a Poisson Lomax burst processIEEE Communications Letters Anonymized Internet Traces
2015
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Shen, M.
Xu, K.
Yang, K.
A neuro-fuzzy approach to self-management of virtual network resourcesJ. Expert Systems with Applications Anonymized Internet Traces
2015
Singh, S.A.Techniques for online analysis of large distributed dataIowa State Univ., Ames, IO, US Anonymized Internet Traces
2015
Sahri, N.M.
Okamura, K.
Adaptive anomaly detection for SDNAsia-Pacific Advanced Network Anonymized Internet Traces
2015
Radan, M.
Keslassy, I.
Tapping into the Router's Unutilized Processing PowerIEEE Conf. on Computer Communications Anonymized Internet Traces
2015
Martin, J.Sistema de Deteccion de Ataques DDoS en TorUniv. Complutense de Madrid Anonymized Internet Traces
Denial of Service Attacks
2015
Kulbis, A.Paskirstyto prievadu skenavimo ataku aptikimas tinklo srautuoseKauno Technologijos Universitetas Anonymized Internet Traces
2015
Danelutto, M.
De Sensi, D.
Torquati, M.
Energy driven adaptivity in stream parallel computationsEuromicro Intl Conf. on Parallel, Distributed, and Network-Based Processing Anonymized Internet Traces
2014
Lu, R.
Wu, G.
Xie, B.
Hu, J.
StreamBench: Towards benchmarking modern distributed stream computing frameworksIntl Conf on Utility and Cloud Computing (UCC) Anonymized Internet Traces
2014
Barik, R.
Divakaran, D.M.
Development and experimentation of TCP initial window functionIntl Conf. on Network of the Future (NOF) Anonymized Internet Traces
2014
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
The CB tree: a practical concurrent self-adjusting search treeDistributed Computing Anonymized Internet Traces
2014
Wang, H.
Lee, K.S.
Li, E.
Lum, C.L.
Tang, A.
Weatherspoon, K.
Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networksInternet Measurement Conf. (IMC) Anonymized Internet Traces
2014
Lai, Y.
Wellem, T.
You, H.-P.
Hardware-assisted estimation of entropy norm for high-speed network trafficIET Electronics Lett. Anonymized Internet Traces
2014
Xiao, Q.
Qiao, Y.
Zhen, M.
Chen, S.
Estimating the persistent spreads in high-speed networksIEEE Intl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2014
Tuyen, D.V.
Truong, T.H.
Hung, N.T.
Puype, B.
Colle, D.
Steenhaut, K.
Thanh, N.H.
An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacksIntl Conf. on Advanced Technologies for Communications (ATC) Anonymized Internet Traces
2014
Song, T.
Shi, X.
Ma, X.
Fine-grained power scaling algorithms for energy efficient routersSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2014
Pontarelli, S.
Reviriego, P.
Maestro, J.A.
Efficient flow sampling with back-annotated cuckoo hashingIEEE Communications Letters Anonymized Internet Traces
2014
Namayanja, J.M.
Janeja, V.P.
Change detection in temporally evolving computer networks: A big data frameworkConf. on Big Data Anonymized Internet Traces
2014
Korosi, A.
Tapolcai, J.
Mihalka, B.
Meszaros, G.
Retvari, G.
Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneouslyIntl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2014
Gardiner, J.
Nagaraja, S.
On the reliability of network measurement techniques Used for malware traffic analysisCambridge Intl Workshop on Security Protocols Anonymized Internet Traces
2014
Ekiz, N.
Amer, P.D.
Transport layer renegingComputer Communications Anonymized Internet Traces
2014
Yu, Y.
Qian, C.
Li, X.
Distributed and collaborative traffic monitoring in software defined networksHot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2014
Tunc, C.
Akar, N.
Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networksPhotonic Network Communications Anonymized Internet Traces
2014
Privalov, A.Y.
Tsarev, A.
Analysis and simulation of WAN traffic by self-similar traffic model with OMNETWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Pecori, R
Veltri, L.
A statistical blind technique for recognition of internet traffic with dependence enforcementWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
DREAM: Dynamic Resource Allocation for Software-defined MeasurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2014
McHale, L.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for SDN data plane matchingICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN) Anonymized Internet Traces
2014
Luao, H.
Cui, J.
Chen, G.
Chen, Z.
Zhang, H.
On the applicability of software defined networking to large scale networksIntl Conf. on Computer Communication and Networks (ICCCN) Anonymized Internet Traces
2014
Barati, M.
Abdullah, A.
Udzir, N.I.
Mahmod, R.
Mustapha, N.
Distributed Denial of Service detection using hybrid machine learning techniqueIntl Symp. on Biometrics and Security Technologies (ISBAST) Anonymized Internet Traces
Denial of Service Attacks
2014
Schmidt, R.
Sadre, R.
A. Sperotto, A.
van den Berg, H.
Pras, A.
A hybrid procedure for efficient link dimensioningComputer Networks Anonymized Internet Traces
2014
Moreno, V.
Santiado del Rio, P.M.
Ramos, J.
Muelas, B.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systemsIntl J. Network Management Anonymized Internet Traces
2014
Frangoudis, P.A.
Hadjadj-Aoul, Y.
Ksentini, A.
Rubino, G.
Etame, T.
Brun, C.
PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top servicesIntl Conf. on Information, Intelligence, Systems and Applications (IISA) Anonymized Internet Traces
2014
Shahzad, M.
Liu, A.X.
Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stampingACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2014
Schmidt, R.
Sadre, R.
Melnikov, N.
Schonwalder, J.
Pras, A.
Linking network usage patterns to traffic GaussianityIFIP Networking Conf. Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
Famaey, J.
De Turck, F.
Neural network-based autonomous allocation of resources in virtual networksEuropean Conf. on Networks and Communications (EuCNC) Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Contributions to efficient resource management in virtual networksIFIP Intl Conf. on Autonomous Infrastructure, Management and Security (AIMS) Anonymized Internet Traces
2014
Hsiao, H.-C.Toward a highly available future InternetCarnegie Mellon Univ. Anonymized Internet Traces
Topology with BGP
Topology with Skitter
2014
Zhou, X.
Petrovic, M.
Eskridge, T.
Carvalho, M.
Tao, X.
Exploring Netflow data using HadoopASE BigData/SocialCom/Cybersecurity Conf. Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Energy efficient exact matching for flow identification with cuckoo affinity hashingIEEE Communications Letters Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
De Turck, F.
Latre, S.
Design and evaluation of learning algorithms for dynamic resource management in virtual networksIEEE/IFIP Network Operations and Management Symp. (NOMS) Anonymized Internet Traces
2014
Liu, B.
Lu, J.
Kai, Y.
Wang, Y.
Pan, T.
Power-proportional router: Architectural design and experimental evaluationQuality of Service (IWQoS) Symp. Anonymized Internet Traces
2014
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
TDFA: Traceback-based defense against DDoS flooding attacksIEEE Int Conf. on Advanced Information Networking and Applications (AINA) Anonymized Internet Traces
Denial of Service Attacks
2014
Wang, H.
Lee, K.S.
Weatherspoon, H.
PHY convert channels: Can you see the idles?Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Handigol, N.
Heller, B.
Jeyakumar, V.
Mazieres, D.
McKeown, N.
I know what your packet did last hop: Using packet histories to troubleshoot networksUsenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Masud, M.M.
Mustafa, U.
Trabelsi, Z.
A data driven firewall for faster packet filteringIntl Conf. on Communications and Networking (ComNet) Anonymized Internet Traces
2014
Kim, J.-S.
Ko, M.-C.
Nam, J.
Kim, J.
Bitmap-based prefix caching for fast IP lookupKSII Trans on Internet and Information Systems Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Efficient implementation of error correction codes in hash tablesMicroelectronics Reliability Anonymized Internet Traces
2014
Kudo, T.
Takin, T.
On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet samplingIntl J. of Network Management Anonymized Internet Traces
UCSD Network Telescope
2013
Zhang, Y.
Sun, Y.
Zhang, J.
Xu, J.
Wu, Y.
An efficient framework for parallel and continuous frequent item monitoringConcurrency Computation: Practice and Experience Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Socket overloading for fun and cache-poisoningAnnual Computer Security Applications Conf. (ACSAC) Anonymized Internet Traces
2013
Larsen, R.Slow port scanning with BroGjovik Univ. College, Gjovik, Norway Anonymized Internet Traces
2013
Chen, J.
Addie, R.G.
Zukerman, M.
Performance evaluation and service rate provisioning for a queue with fractional Brownian inputPerformance Evaluation Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
IP traceback through (authenticated) deterministic flow marking: an empirical evaluationEURASIP J. on Information Security Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Sperotto, A.
Pras, A.
Lightweight link dimensioning using sFlow samplingIntl Conf. on Network and Services Management (CNSM) Anonymized Internet Traces
2013
Retvari, G.
Tapolcai, J.
Korosi, A.
Majdan, A.
Heszberger, Z.
Compressing IP forwarding tables: towards entropy bounds and beyondACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2013
Lee, M.
Duffield, N.
Kompella, R.R.
High-fidelity per-flow delay measurements with reference latency interpolationIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2013
Iqbal, M.F.
Holt, J.
Ryoo, J.H.
John, L.K.
de Veciana, G.
Flow migration on multicore network processors: Load balancing while minimizing packet reorderingIntl Conf. on Parallel Processing (ICPP) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Shulman, H.
Off-path hacking: the illusion of challenge-response authenticationIEEE Security and Privacy Anonymized Internet Traces
2013
Casey, C.J.
Sutton, A.
Dos Reis, G.
Sprintson, A.
Eliminating network protocol vulnerabilities through abstraction and systems language designConf. on Network Protocols (ICNP) Anonymized Internet Traces
2013
Karpowicz, M.On the design of energy-efficient service rate control mechanisms: CPU frequency control for LinuxTyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC) Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Vulnerable delegation of DNS resolutionEuropean Symp. on Research in Computer Security (ESORICS) Anonymized Internet Traces
2013
Garfinkel, S.L.
Shick, M.
Passive TCP reconstruction and forensic analysis with tcpflowNaval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2013
Frangoudis, P.A.
Ksentini, A.
Hadjadj-Aoul, Y.
Boime, G.
PTPv2-based metwork load estimationIntl IEEE Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS) Anonymized Internet Traces
2013
Moshref, M.
Yu, M.
Govindan, R.
Resource/accuracy tradeoffs in software-defined measurementACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2013
Megyesi, P.
Molnar, S.
Analysis of elephant users in broadband network trafficEUNICE/IFIP WG 6.6 Intl Workshop: Advances in Communication Networking Anonymized Internet Traces
2013
Iqbal, M.F.Workload-aware network processors: improving performance while minimizing power consumptionUniv. Texas, Austin Anonymized Internet Traces
2013
Hu, Y.-H.A fluid-based approach for modeling network activitiesJ Electr Electron Syst Anonymized Internet Traces
2013
Coelho, N.
Salvador, P.
Nogueira, A.
Inter-operator traffic differentiation based on multiscale analysisThinkMind, Intl Conf. on Advances in Future Internet (AFIN) Anonymized Internet Traces
2013
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Reducing the cost of implementing error correction codes in content addressable memoriesIEEE Trans. on Circuits and Systems II: Express Briefs Anonymized Internet Traces
2013
Guo, Z.
Yang, Y.
High-speed multicast scheduling for all-optical packet switchesConf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2013
Ghoshal, P.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for Software Defined FirewallsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2013
Santiago, S.S.Latency estimation of IP flows using NetFlowUniv. Politecnica de Catalunya, Barcelona, Spain Anonymized Internet Traces
2013
Namayanja, J.M.
Janeja, V.P.
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networksIEEE Conf. on Intelligence and Security Informatics Anonymized Internet Traces
2013
Leira, R.
Gomez, P.
Gonzalez, I.
Lopez de Vergara, J.E.
Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardwareConf. on Smart Communications in Network Technologies (SaCoNeT) Anonymized Internet Traces
2013
Joslyn, C.
Choudhury, S.
Haglin, D.
Howe, B.
Nickless, B.
Olsen, B.
Massive scale cyber traffic analysis: A driver for graph database researchIntl Workshop on Graph Data Management Experiences and Systems (GRADES) Anonymized Internet Traces
Denial of Service Attacks
2013
Iacovazzi, A.
Baiocchi, A.
Investigating the trade-off between overhead and delay for full packet traffic privacyIntl Conf on Communications (ICC) Anonymized Internet Traces
2013
Handigol, N.A.Using packet histories to troubleshoot networksStanford Univ., Stanford, CA, US Anonymized Internet Traces
2013
Fokkema, J.A study of impacts of flow timeouts on link provisioningTwente Student Conf. on IT Anonymized Internet Traces
2013
Clegg, R.G.
Araujo, J.T.
Landa, R.
Mykoniati, E.
Griffin, D.
Rio, M.
On the relationship between fundamental measurements in TCP flowsIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2013
Zadnik, M.Optimization of network flow monitoringInformation Sciences and Technologies Bulletin of the ACM Slovakia Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Pras, A.
Gaussian traffic revisitedIFIP Networking Conf. Anonymized Internet Traces
2013
Santiago del Rio, P.M.Internet traffic classification for high-performance and off-the-shelf systemsUniv. Autonoma de Madrid Anonymized Internet Traces
2013
Petkov, V.
Rajagopal, R.
Obraczka, K.
Characterizing per-application network traffic using entropyACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2013
Liu, H.A collaborative defense framework against DDoS attacks in networksWashington State Univ., Pullman, WA, US Anonymized Internet Traces
Denial of Service Attacks
2013
Erazo, M.A.
Liu, J.
Leveraging symbiotic relationship between simulation and emulation for scalable network experimentationConf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS) Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
On evaluating IP traceback schemes: a practical perspectiveIEEE Security and Privacy Workshops Anonymized Internet Traces
2013
Yu, M.
Jose, L.
Miao, R.
Software defined traffic measurement with OpenSketchUsenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Fragmentation considered vulnerableACM Trans. on Information and System Security (TISSEC) Anonymized Internet Traces
2013
Ahmadzadeh, S.A.
Agnew, G.
Turbo covert channel: An iterative framework for covert communication over data networksIEEE INFOCOM Anonymized Internet Traces
2013
Hofstede, R.
Drago, I.
Sperotto, A.
Sadre, R.
Pras, A.
Measurement artifacts in NetFlow dataPassive and Active Measurement (PAM) Anonymized Internet Traces
2013
He, G.-F.
Yang, M.
Luo, J.-Z.
Zhang, L.
Online identification of Tor anonymous communication trafficJ. of Software Anonymized Internet Traces
2013
Gangam, S.
Chandrashekar, J.
Cunha, I.
Kurose, J.
Estimating TCP latency approximately with passive measurementsPassive and Active Measurement (PAM) Anonymized Internet Traces
2013
Dautrich Jr, J.L.
Ravishankar, C.V.
Inferential time-decaying Bloom filtersIntl Conf. on Extending Database Technology (EDBT) Anonymized Internet Traces
2013
De Sensi, D.DPI over commodity hardware: implementation of a scalable framework using FastFlowUniv. Pisa, Pisa, IT Anonymized Internet Traces
2013
Kim, S.
Nam, S.Y.
A long range dependent Internet traffic model using unbounded Johnson distributionIEICE Trans. on Communications Anonymized Internet Traces
2012
Liu, W.
Yan, Y.
Dong, T.
Run-hua, T.
Self-similarity and heavy-tail of ICMP trafficJ. Computers Anonymized Internet Traces
2012
Detal, G.
Paasch, C.
van der Linden, S.
Merindol, P.
Avoine, G.
Bonaventure, O.
Revisiting flow-based load balancing: Stateless path selection in data center networksComputer Networks Anonymized Internet Traces
2012
Coelho, N.M.M.Profiling de trafego inter-operador baseado em analise multi-escalarUniv. de Aveiro Anonymized Internet Traces
2012
Basaran, C.
Kang, K.-D.
Zhou, Y.
Suzer, M.H.
Adaptive load shedding via fuzzy control in data stream management systemsIntl Conf. on Service-Oriented Computing and Applications (SOCA) Anonymized Internet Traces
2012
Santiago del Rio, P.M.
Rossi, D.
Gringoli, F.
Nava, L.
Salgarelli, L.
Aracil, J.
Wire-speed statistical classification of network traffic on commodity hardwareInternet Measurement Conf. (IMC) Anonymized Internet Traces
2012
Moriyama, E.
Takahashi, T.
Miyamoto, D.
DNS-based defense against IP spoofing attacksConf. on Neural Information Processing Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
A GI/G/1 model for 10 Gb/s energy efficient ethernet linksIEEE Trans. on Communications Anonymized Internet Traces
2012
Ekiz, N.Transport layer renegingUniv. Delaware Anonymized Internet Traces
2012
Zhang, X.
Ding, W.
Comparative research on internet flows characteristicsConf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics Anonymized Internet Traces
2012
Weinberg, Z.
Wang, J.
Yegneswaran, V.
Briesemeister, L.
Cheung, S.
Wang, F.
Boneh, D.
StegoTorus: a camouflage proxy for the Tor anonymity systemACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2012
Moreno, V.
Santiago del Rio, P.M.
Ramos, J.
Garnica, J.
Garcia-Dorado, J.L.
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O enginesIEEE Communications Lett. Anonymized Internet Traces
2012
Kim, J.
Park, M.
Han, S.
Kim, J.
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookupIEICE Trans. on Communications Anonymized Internet Traces
2012
Kato, M.
Cho, K.
Honda, M.
Tokuda, H.
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregationWorkshop on Managing Systems Automatically and Dynamically Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Efficient traffic aware power management in multicore communications processorsACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Cao, Z.
Panwar, S.S.
Efficient buffering and scheduling for a single-chip crosspoint-queued switchACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
CBTree: A practical concurrent self-adjusting search treeDistributed Computing (DISC) Anonymized Internet Traces
2012
Xiaojuan, S.
Bin, L.
Stream data analysis for backbone network intrusion detection systemConf. on Oxide Materials for Electronic Engineering (OMEE) Anonymized Internet Traces
2012
Mogul, J.C.
Congdon, P.
Hey, you darned counters!: get off my ASIC!ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2012
Lin, Z
Hopper, N.
New attacks on timing-based network flow watermarksUsenix Security Conf. (SEC) Anonymized Internet Traces
2012
He, P.
Guan, H.
Xie, G.
Salamatian, K.
Evaluating and optimizing IP lookup on many core processorsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Gringoli, F.
Nava, L.
Este, A.
Salgarelli, L.
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardwareWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2012
Detti, A.
Pomposini, M.
Blefari-Melazzi, N.
Salsano, S.
Supporting the Web with an information centric network that routes by nameComputer Networks Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Multiadaptive sampling for lightweight network measurementsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Lin, Z.Toward building practical privacy enhancing technologiesUniv. Minnesota Anonymized Internet Traces
2012
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architecturesComputer Communications Anonymized Internet Traces
2012
Zhao, Y.
Yuan, R.
Wang, W.
Meng, D.
Zhang, S.
Li, J.
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone trafficConf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2012
Yang, T.
Duan, R.
Lu, J.
Zhang, S.
Dai, H.
Liu, B.
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancyConf. on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Optimizing network measurements through self-adaptive samplingConf. on High Performance Computing and Communication (HPCC) Anonymized Internet Traces
2012
Qardaji, W.
Li, N.
Anonymizing network traces with temporal pseudonym consistencyConf. on Distributed Computing Systems Workshops (ICDCSW) Anonymized Internet Traces
2012
Markman, M.A.J.
Tokheim, S.
Reliable broadcast contribution over the public InternetNorwegian Univ. of Science and Technology Anonymized Internet Traces
2012
Kuang, J.
Bhuyan, L.
Klefstad, R.
Traffic-aware power optimization for network applications on multicore serversAnnual Design Automation Conf. Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Bounded energy consumption with dynamic packet coalescingNetworks and Optical Communications (NOC) Anonymized Internet Traces
2012
Hanay, Y.S.
Li, W.
Tessier, R.
Wolf, T.
Saving energy and improving TCP throughput with rate adaptation in EthernetIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2012
Guo, Z.
Yang, Y.
High speed multicast scheduling in hybrid optical packet switches with guaranteed latencyIEEE Trans. on Computers Anonymized Internet Traces
2012
Fragni, C.
Costa, L.H.M.K.
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routersComputer Networks Anonymized Internet Traces
2012
Davy, A.
Jennings, B.
Botvich, D.
QoSPlan: A measurement based quality of service aware network planning frameworkJ. Network and Systems Management Anonymized Internet Traces
2012
Melazzi, N.B.
A. Detti, A.
Pomposini, M.
Scalability measurements in an information-centric networkMeasurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project Anonymized Internet Traces
2012
Korenfeld, B.CBTree: A practical concurrent self-adjusting search treeTel-Aviv Univ., Israel Anonymized Internet Traces
2012
Fan, J.
Hu, C.
He, K.
Jiang, J.
Liuy, B.
Reducing power of traffic manager in routers via dynamic on/off-chip schedulingIEEE INFOCOM Anonymized Internet Traces
2012
Zhang, H.
Lu, G.
Qassrawi, M.T.
Zhang, Y.
Yu, X.
Feature selection for optimizing traffic classificationComputer Communications Anonymized Internet Traces
2012
Verma, H.
Yadav, B.
Bansal, P.
Raj, S.
IPv4 to IPv6 shift: major challengesJ. Engineering and Innovative Technology (IJEIT) Anonymized Internet Traces
2012
Tawakol, A.Performance analysis of TCAMs in switchesUniv. Waterloo, Ontario, CA Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Power and performance analysis of network traffic prediction techniquesIEEE Intl Symp. on Performance Analysis of Systems and Software (ISPASS) Anonymized Internet Traces
2012
Zhang, W.
Bi, J.
Wu, J.
Zhang, B.
Catching popular prefixes at AS border routers with a prediction based methodComputer Networks Anonymized Internet Traces
2012
Tsidon, E.
Hanniel, I.
Keslassy, I.
Estimators also need shared values to grow togetherIEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter?IEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Kanizo, Y.
Keslassy, I.
The variable-increment counting Bloom filterIEEE INFOCOM Anonymized Internet Traces
2012
Pan, T.
Guo, X.
Zhang, C.
Jiang, J.
Wu, H.
Liu, B.
Tracking millions of flows in high speed networks for application identificationIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2012
Lee, C.
Lee, D.K.
Moon, S.
Unmasking the growing UDP traffic in a campus networkPassive and Active Measurement (PAM) Anonymized Internet Traces
2012
Houmansadr, A.
Kiyavash, N.
Borisov, N.
Non-blind watermarking of network flowsarxiv.org Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Optimal configuration of energy-efficient ethernetComputer Networks Anonymized Internet Traces
2012
Gilbert, J.Scalable wavelet-based active network stepping stone detectionAir Force Inst. of Technology, Air Univ, Anonymized Internet Traces
2012
Lee, M.
Duffield, N.
Kompella, R.R.
Opportunistic flow-level latency estimation using consistent NetFlowIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2012
Kanizo, Y.
Hay, D.
Keslassy, I.
Maximizing the throughput of cuckoo hashing in network devicesComNet, Technion, Israel Anonymized Internet Traces
2012
Shpiner, A.
Keslassy, I.
Cohen, R.
Reducing the reordering delay in multi-core network processorsComNet, Technion, Israel Anonymized Internet Traces
2012
Martinez, V.M.Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networksUniv. Autonoma de Madrid Anonymized Internet Traces
2012
Kim, M.
Jung, S.
Park, M.
A Distributed Self-Organizing Map for DoS Attack DetectionIntl Conf. on Ubiquitous and Future Networks Anonymized Internet Traces
Denial of Service Attacks
2012
Houmansadr, A.Design, analysis, and implementation of effective network flow watermarking schemesUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2012
Blefari-Melazzi, N.
Cancellieri, M.
Detti, A.
Pomposini, M.
Salsano, S.
The CONET solution for information centric networkingUniv. Rome Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Behavioral graph analysis of Internet applicationsIEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2011
Vishwanath, A.
Sivaraman, V.
Zhao, Z.
Russell, C.
Thottan, M.
Adapting router buffers for energy efficiencyACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2011
Moreno, S.D.B.Evaluacion de desempeno de diversas arquitecturas de commutadores opticosUniv. de los Andes, Facultad de Ingenieria, Bogota, Colombia Anonymized Internet Traces
2011
Matias, R.
Carvalho, A.M.M.
Teodoro, V.A.
Tes, D.
Araujo, L.B.
Performance comparison of forecasting models applied to LAN/MAN traffic predictionIEEE Workshop on Local and Metropolitan Area Networks (LANMAN) Anonymized Internet Traces
2011
Hua, N.
Norige, E.
Kumar, S
Lynch, B.
Non-crypto hardware hash functions for high performance networking ASICsSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2011
Houmansadr, A.
Nguyen, G.T.K.
Caesar, M.
Borisov, N.
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible DeniabilityACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2011
Guo, Z.
Yang, Y.
Pipelining multicast scheduling in all-optical packet switches with delay guaranteeIntl Teletraffic Congress (ITC) Anonymized Internet Traces
2011
Clegg, R.
Landa, R.
Rio, M.
Criticisms of modelling packet traffic using long-range dependence (extended version)J. Computer and System Sciences Anonymized Internet Traces
2011
Spinelli, L.P.Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatoriasUniv. Federal Do Rio de Janeiro, Brazil Anonymized Internet Traces
2011
Detti, A.
Melazzi, N.B.
Salsano, S.
Pomposini, M.
CONET: a content centric inter-networking architectureACM SIGCOMM Workshop on Information-Centric Networking (ICN) Anonymized Internet Traces
2011
Venkataramanan, R.
Jeong, M.-W.
Prabhakar, B.
A flow- and packet-level model of the InternetUniv. Michigan Anonymized Internet Traces
2011
Marsan, M.A.
Fernandez Anta, A.
Mancuso, V.
Rengarajan, B.
Vasallo, P.
Rizzo, G.
A simple analytical model for energy efficient ethernetIEEE Communications Lett. Anonymized Internet Traces
2011
Leiva, A.
Finochietto, J.M.
Huiszoon, B.
Lopez, V.
Tarifeno, M.
Aracil, J.
Beghelli, A.
Comparison in power consumption of static and dynamic WDM networksOptical Switching and Networking Anonymized Internet Traces
2011
Larrabeiti, D.
Reviriego, P.
Hernandez, J.A.
Maestro, J.A.
Uruena, M..
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viabilityOptical Switching and Networking Anonymized Internet Traces
2011
Valgenti, V.C.
Paul, R.R.
Kim, M.S.
Netshuffle: Improving traffic trace anonymization through graph distortionIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2011
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filterComNet, Technion, Israel Anonymized Internet Traces
2011
Grieco, L.A.
Barakat, C.
Marzulli, M.
Spectral models for bitrate measurement from packet sampled trafficIEEE Trans. on Network and Service Management Anonymized Internet Traces
2011
Mothersole, I.
Reed, M.J.
Optimising rule order for a packet filtering firewallConf. on Network and Information Systems Security (SAR-SSI) Anonymized Internet Traces
2011
He, F.
Xiang, F.
Yibo Xue, Y.
Jun Li, J.
Towards high-performance network application identification with aggregate-flow cachearxiv.org Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Gu, L.
Network-aware behavior clustering of Internet end hostsIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
UCSD Network Telescope
2011
Ekiz, N.
Rahman, A.H.
Amer, P.D.
Misbehaviors in TCP SACK generationACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2011
Dusi, M.
Gringoli, F.
Salgarelli, L.
Quantifying the accuracy of the ground truth associated with Internet traffic tracesComputer Networks Anonymized Internet Traces
2011
Reviriego, P.
Huiszoon, B.
Lopez, V.
Coenen, R.B.
Hernandez, J.A.
Maestro, J.A.
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical linksIEEE J. Selected Topics in Quantum Electronics Anonymized Internet Traces
2011
Jose, L.
Yu, M.
Rexford, J.
Online measurement of large traffic aggregates on commodity switchesUsenix Conf. Hot-ICE Anonymized Internet Traces
2011
Houmansadr, A.
Borisov, N.
SWIRL: A scalable watermark to detect correlated network flowsSymp. on Network and Distributed System Security (NDSS) Anonymized Internet Traces
2011
Schear, N.Preventing encrypted traffic analysisUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2011
Pouzols, F.M.
Lopez, D.R.
Barros, A.B.
Predictive models of network traffic loadStudies in Computational Intelligence Anonymized Internet Traces
2011
Liu, H.
Sun, Y.
Valgenti, V.C.
Kim, M.S.
TrustGuard: A flow-level reputation-based DDoS defense systemConf. on Consumer Communications and Networking (CCNC) Anonymized Internet Traces
Denial of Service Attacks
2010
He, K.
Hu, C.
Jiang, J.
Zhou, Y.
Liu, B.
A2C: Anti-attack counters for traffic measurementIEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2010
Haider, A.
Acharya, K.
Raja, M.Y.A.
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networksHigh-Capacity Optical Networks and Enabling Technologies (HONET) Anonymized Internet Traces
2010
Mouchos, C.
Tsokanos, A.
Kouvatsos, D.D.
Dynamic OBS offset allocation in WDM networksComputer Communications Anonymized Internet Traces
2010
Zadnik, M.
Canini, M.
Evolution of cache replacement policies to track heavy-hitter flowsSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2010
Saxena, M.
Kompella, R.
CLAMP: Efficient class-based sampling for flexible flow monitoringComputer Networks Anonymized Internet Traces
2010
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architecturesBoston Univ., CS Dept. Anonymized Internet Traces
2010
Kanizo, Y.
Hay, D.
Keslassy, I.
Hash tables with finite buckets are less resistant to deletionsAllerton Conf. on Communication, Control and Computing Anonymized Internet Traces
2010
Scappini, R.Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u OnditasFacultad de Informatica, Univ. Nacional de la Plata Anonymized Internet Traces
2010
Santiago del Rio, P.M.
Ramos, J.
Salvador, A.
de Vergara, J.E.L.
Aracil, J.
Cuadra, A.
Cutanda, M.
Application of Internet traffic characterization to all-optical networksConf. on. Transparent Optical Networks (ICTON) Anonymized Internet Traces
2010
Yuan, R.
Weibing, Y.
Mingyu, C.
Xiaofang, Z.
Jianping, F.
Robust TCP reassembly with a hardware-based solution for backbone trafficConf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2010
Woldeselassie, M.
Clegg, R.
Rio, M.
Forecasting full-path network congestion using one bit signallingIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2010
Reviriego, P.
Larrabeiti, D.
Maestro, J.A.
Would energy efficient ethernet be effective on 10Gbps optical links?OSA Photonics in Switching (PS) Anonymized Internet Traces
2010
Fenacci, D.
Franke, B.
Empirical evaluation of data transformations for network infrastructure applicationsConf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X) Anonymized Internet Traces
Topology with Archipelago
2010
Zhang, N.
Wang, F.
Gong, B.
Li, L.
Identifying heavy-hitter flows fast and accuratelyConf. on Future Computer and Communication (ICFCC) Anonymized Internet Traces
2010
Reviriego, P.
Sanchez-Macian, A.
Maestro, J.A.
Bleakley, C.J.
Increasing the MTU size for energy efficiency in ethernetIET Signals and Systems Conf. (ISSC) Anonymized Internet Traces
2010
Lee, D.
Carpenter, B.E.
Brownlee, N.
Observations of UDP to TCP ratio and port numbersConf. on Internet Monitoring and Protection (ICIMP) Anonymized Internet Traces
2010
Hansen, H.V.
Goebel, V.
Plagemann, T.
Siekkinen, M.
Resource adaptive distributed information sharingWorkshop on Networked Services and Applications - Engineering, Control and Management (EUNICE ) Anonymized Internet Traces
2010
Gremillet, O.
Goncalves, P.
Vicat-Blanc Primet, P.
Dupas, A.
Traffic classification techniques supporting semantic networksWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2010
Moon, D.Achieving flexibility and performance for packet forwarding and data center managementUC Berkeley Anonymized Internet Traces
2010
Lee, M.
Duffield, N.
Kompella, R.
Two samples are enough: Opportunistic flow-level latency estimation using NetFlowIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Parallelizing weighted frequency counting in high-speed network monitoringComputer Communications Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Identifying heavy hitters in high-speed network monitoringScience China Information Sciences Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processorsDynamically reconfigurable systems, architectures, design methods and applications, Ch. 17 Anonymized Internet Traces
2010
Albrecht, C.
Foag, J.
Koch, R.
Maehle, E.
Pionteck, T.
DynaCORE - dynamically reconfigurable coprocessor for network processorsDynamically reconfigurable systems, architectures, design methods and applications, Ch. 16 Anonymized Internet Traces
2010
John, W.Characterization and classification of internet backbone trafficChalmers Univ. of Technology, Gothenborg, Sweden Anonymized Internet Traces
2010
Rottenstreich, O.
Keslassy, I.
The variable-increment counting Bloom filterComNet, Technion, Israel Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
An application-aware load balancing strategy for network processorsConf. on High performance embedded architectures and compilers (HIPEAC) Anonymized Internet Traces
2010
Moon, D.
Naous, J.
Liu, J.
Zarifis, K.
Casado, M.
Koponen, T.
Shenker, S.
Breslau, L.
Bridging the software/hardware forwarding divideanon. Anonymized Internet Traces
2009
Sellke, H.
Wang, C.-C.
Bagchi, S.
Shroff, N.B.
Camouflaging timing channels in web trafficPurdue Univ. Anonymized Internet Traces
2009
Beheshti-Zavareh, N.Tiny buffers for electronic and optical routersStanford Univ., Stanford, CA, US Anonymized Internet Traces
2009
Schear, N.
Borisov, N.
Preventing SSL traffic analysis with realistic cover trafficACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2009
Jiang, W.
Prasanna, V.K.
Reducing dynamic power dissipation in pipelined forwarding enginesIEEE Conf. on Computer Design (ICCD) Anonymized Internet Traces
2009
Zhang, M.
Dusi, M.
John, W.
Chen, C.
Analysis of UDP traffic usage on internet backbone linksSymp. on Applications and the Internet (SAINT) Anonymized Internet Traces
2009
Este, A.
Gringoli, F.
Salgarelli, L.
Support Vector Machines for TCP traffic classificationComputer Networks Anonymized Internet Traces
2009
Andreou, M.S.Message traceback systems. Dancing with the devilUniv. Newcastle upon Tyne Anonymized Internet Traces
Topology with Skitter
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
Joint entropy analysis model for DDoS attack detectionConf. on Information Assurance and Security (IAS) Anonymized Internet Traces
UCSD Network Telescope
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
A traffic coherence analysis model for DDoS attack detectionConf. on Security and Cryptography (SECRYPT) Anonymized Internet Traces
UCSD Network Telescope
2009
Vishwanath, K.V.
Vahdat, A.
Swing: Realistic and responsive network traffic generationIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Ishakian, V.
Akinwumi, J.
Matta, I.
On the cost of supporting multihoming and mobilityBoston Univ., CS Dept. Anonymized Internet Traces
2009
Clegg, R.G.
Withall, M.S.
Moore, A.W.
Phillips, I.W.
Parish, D.J.
Rio, M.
Landa, R.
Haddadi, H.
Kyriakopoulos, K.
Auge, J.
Clayton, R.
Salmon, D.
Challenges in the capture and dissemination of measurements from high-speed networksIET Communications Anonymized Internet Traces
2009
Brugger, S.T.The quantitative comparison of computer networksUC Davis Anonymized Internet Traces
2009
Saxena, M.
Kompella, R.
A framework for efficient class-based samplingIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Does the internet still demonstrate fractal nature?IEEE Conf. on Networking (ICN) Anonymized Internet Traces
2009
Idzikowski, F.Search and analysis of backbone traffic measurements in the internetTechnische Univ. Berlin (TKN-09-004) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Levy flights and fractal modeling of internet trafficIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Maiolini, G.
Molina, G.
Baiocchi, A.
Rizzi, A.
On the fly application flows identification by exploiting K-means based classifiersJ. Information Assurance and Security Anonymized Internet Traces
2009
Kanizo, Y.
Hay, D.
Keslassy, I.
Optimal dynamic hash tablesComNet, Technion, Israel Anonymized Internet Traces
2009
Andreou, M.S.
van Moorsel, A.
COTraSE Connection Oriented Traceback in Switched EthernetJ. Information Assurance and Security Anonymized Internet Traces
2008
Casado, M.
Koponen, T.
Moon, D.
Shenker, S.
Rethinking packet forwarding hardwareACM SIGCOMM HotNets Workshop Anonymized Internet Traces
2008
Baiocchi, A.
Maiolini, G.
Molina, G.
Rizzi, A.
On-the-fly statistical classification of internet traffic at application layer based on cluster analysisWorkshop on Computational Intelligence in Security for Information Systems (CISIS) Anonymized Internet Traces
2008
Andreou, M.
Moorsel, A.
COTraSE: Connection Oriented Traceback in Switched EthernetIntl Conf. on Information Assurance and Security Anonymized Internet Traces
Topology with Skitter
2008
Dusi, M.
Gringoli, F.
Salgarelli, L.
IP traffic classification for QoS guarantees: the independence of packetsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2008
Pouzols, F.M.
Barriga, A.
Lopez, D.R.
Sanchez-Solano, S.
Linguistic summarization of network traffic flowsIEEE Conf. on Fuzzy Systems (FUZZ-IEEE) Anonymized Internet Traces
2008
Shevtekar, A.
Ansari, N.
A router-based technique to mitigate reduction of quality (RoQ) attacksComputer Networks Anonymized Internet Traces
2008
Clegg, R.
Landa, R.
Haddadi, H.
Rio, M.
Moore, A.W.
Techniques for flow inversion on sampled dataIEEE INFOCOM Workshop Global Internet Symp. Anonymized Internet Traces
2008
Meitinger, M.
Ohlendorf, R.
Wild, T.
Herkersdorf, A.
A hardware packet re-sequencer unit for network processorsArchitecture of Computing Systems (ARCS) Anonymized Internet Traces
2008
Raspall, F.
Sallent, S.
Adaptive shared-state samplingInternet Measurement Conf. (IMC) Anonymized Internet Traces
2008
Proebstel, E.Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled trafficUC Davis Anonymized Internet Traces
2008
Este, A.
Gringoli, F.
Salgarelli, L.
An SMV-based approach to traffic classificationUniv. Brescia Anonymized Internet Traces
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
Network performance analysis based on histogram workload modelsIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2007
Shevtekar, A.
Ansari, N.
A proactive test based differentiation to mitigate low rate DoS attacksIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2007
Whitehead, B.
Lung, C.-H.
Rabinovitch, P.
A TCP connection establishment filter: symmetric connection detectionIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementationUC Riverside Anonymized Internet Traces
Topology with Skitter
2007
Clegg, R.
Haddadi, H.
Landa, R.
Rio, M.
Towards informative statistical flow inversionarxiv.org Anonymized Internet Traces
2007
Haddadi, H.
Landa, R.
Rio, M.
Bhatti, S.
Revisiting the issues on netflow sample and export performancearxiv.org Anonymized Internet Traces
2007
Yuan, L.
Chuah, C.
Mohapatra, P.
ProgME: towards programmable network measurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Salgarelli, L.
Gringoli, F.
Karagiannis, T.
Comparing traffic classifiersACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network monitoring using traffic dispersion graphs (TDGs)Internet Measurement Conf. (IMC) Anonymized Internet Traces
Topology with Skitter
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
A histogram-based stochastic process for finite buffer occupancy analysisConf. on Performance Evaluation Methodologies and Tools (VALUETOOLS) Anonymized Internet Traces
2007
Clegg, R.Simulating internet traffic with Markov-modulated processesUK Performance Engineering Workshop Anonymized Internet Traces
2006
Park, J.
Tyan, H.-R.
Jay Kuo, C.-C.
GA-based internet traffic classification technique for QoS provisioningConf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Anonymized Internet Traces
2006
Okuno, M.
Nishimura, S.
Ishida, S.
Nishi, H.
Cache-based network processor architecture: evaluation with real network trafficIEICE Trans. on Electronics Anonymized Internet Traces
2006
Vishwanath, K.
Vahdat, A.
Realistic and responsive network traffic generationACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Varghese, G.
Fingerhut, J.
F. Bonomi, F.
Detecting evasion attacks at high speeds without reassemblyACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed linksIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2006
Clegg, R.Markov-modulated on/off processes for long-range dependent internet trafficarxiv.org Anonymized Internet Traces
2006
Constantinou, F.
Mavrommatis, P.
Identifying known and unknown peer-to-peer trafficIEEE Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
2006
Wang, H.
Lin, Y.
Jin, Y.
Cheng, S.
Easily-implemented adaptive packet sampling for high speed networks flow measurementConf. on Computational Science (ICCS) Anonymized Internet Traces
2006
Kumar, S.
Maschmeyer, J.
Crowley, P.
Exploiting locality to ameliorate packet queue contention and serializationACM Conf. on Computing Frontiers Anonymized Internet Traces
2006
Chen, Y.
Hwang, K.
Collaborative change detection of DDoS attacks on community and ISP networksIEEE Symp. on Collaborative Technologies and Systems (CTS) Anonymized Internet Traces
2006
Shriram, A.
Kaur, J.
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidthPassive and Active Measurement (PAM) Anonymized Internet Traces
2006
Hu, Y.
Chiu, D.-M.
Lui, J.
Entropy based flow aggregationIFIP-TC6 Networking Conf. (NETWORKING) Anonymized Internet Traces
2006
Clegg, R.Modelling internet traffic using Markov chainsImperial College, London, UK Anonymized Internet Traces
2005
Kompella, R.
Estan, C.
The power of slicing in internet flow measurementInternet Measurement Conf. (IMC) Anonymized Internet Traces
2005
Veitch, D.
Hohna, N.
Abry, P.
Multifractality in TCP/IP traffic: the case againstComputer Networks Anonymized Internet Traces
2005
Jiang, H.
Dovrolis, C.
Why is the internet traffic bursty in short (sub-RTT) timescales?ACM SIGMETRICS Performance Evaluation Review Anonymized Internet Traces
2005
Okuno, M.
Ishida, S.
Nishi, H.
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routeraIEICE Trans. on Electronics Anonymized Internet Traces
2004
Karagiannis, T.
Molle, M.
Faloutsos, M.
Long-range dependence: ten years of Internet traffic modelingIEEE Internet Computing Anonymized Internet Traces
2004
Okuno, M.
Nishi, H.
Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handlerIEICE technical report: Circuits and system Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed linksInternet Measurement Conf. (IMC) Anonymized Internet Traces
2003
Estan, C.
Savage, S.
Varghese, G.
Automatically inferring patterns of resource consumption in network trafficACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the miceACM Trans. on Computer Systems (TOCS) Anonymized Internet Traces
2002
Estan, C.
Varghese, G.
New directions in traffic measurement and accountingACM SIGCOMM Computer Communication Review Anonymized Internet Traces
1999
Fang, W.
Peterson, L.
Inter-AS traffic patterns and there implicationsIEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2017
Baishya, R.
Hoque, N.
Bhattacharya, D.
DDoS Attack Detection Using Unique Source IP DeviationIntl J. of Network Security Denial of Service Attacks
2017
Singh, K.
De, T.
MLP-GA based algorithm to detect application layer DDoS attackJ. of Information Security and Applications Denial of Service Attacks
2017
Hoque, N.
Kashyap, H.
Bhattacharyya, D.
Real-time DDoS attack detection using FPGAComputer Communications Denial of Service Attacks
2017
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
A Systematic Hands-On Approach to Generate Real-Life Intrusion DatasetsNetwork Traffic Anomaly Detection and Prevention Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Sachdeva, M.
Discriminating Flash Events from DDoS Attacks: A Comprehensive ReviewIntl J. of Network Security Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Wang, Y.
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic BehaviorIEEE Trustcom/BigDataSE/ICESS Denial of Service Attacks
2017
Fouladi, R.
Kayatas, C.
Anarim, E.
Statistical measures: Promising features for time series based DDoS attack detectionEuropean Signal Processing Conf. Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Sachdeva, M.
Characterizing DDoS attacks and flash events: Review, research gaps and future directionsComputer Science Review Denial of Service Attacks
2017
Alpos, O.Categorization of Network Attacks with Machine Learning methodsNational Technical Univ. of Athens Denial of Service Attacks
2017
Yuan, X.
Li, C.
Li, X.
DeepDefense: Identifying DDoS Attack via Deep LearningIEEE Intl Conf. on Smart Computing Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Lv, B.
A Behavior-Based Method for Distinction of Flooding DDoS and Flash CrowdsIntl Conf. on Knowledge Science, Engineering and Management Denial of Service Attacks
2017
Salman, T.
Bhamare, D.
Erbad, A.
Jain, R.
Samaka, M.
Machine Learning for Anomaly Detection and Categorization in Multi-Cloud EnvironmentsIntl Conf. on Cyber Security and Cloud Computing Denial of Service Attacks
2017
Mosharraf, N.
Jayasumana, A.
Ray, I.
A Distributed Mechanism to Protect Against DDoS AttacksIFIP Annual Conf. on Data and Applications Security and Privacy Denial of Service Attacks
2017
Nogueira, M.
Santos, A.
Moura, J.
Early Signals from Volumetric DDoS Attacks: An Empirical Studyarxiv.org Denial of Service Attacks
2017
Xylogiannopoulos, K.Data Structures, Algorithms and Applications for Big Data Analytics: Single, Multiple and All Repeated Patterns Detection in Discrete SequencesUniv. of Calgary Denial of Service Attacks
2017
Saravanan, R.
Loganathan, S.
Shunmuganathan, S.
Palanichamy, Y.
Suspicious Score Based Mechanism to Protect Web Servers against Application Layer Distributed Denial of Service AttacksIntl J. of Intelligent Engineering and Systems Denial of Service Attacks
2017
Rahmat, S.
Niyaz, Q.
Javaid, A.
Sun, W.
Normal and anomalous traffic flow pattern analysis for organizational networksCanadian Conf. on Electrical and Computer Engineering (CCECE) Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Computer Networks Detection of DDoS attacks and flash events using novel information theory metricsComputer Networks Denial of Service Attacks
2017
Singh, K.
De, T.
Mathematical modelling of DDoS attack and detection using correlationJ. Cyber Security Technology Denial of Service Attacks
2017
Liu, J.
Lai, Y.
Zhang, S.
FL-GUARD: A Detection and Defense System for DDoS Attack in SDNIntl Conf. on Cryptography, Security and Privacy Denial of Service Attacks
2017
Cheng, L.
Divakaran, D.
Ang, A.
Lim, W.
Thing, V.
FACT: A Framework for Authentication in Cloud-Based IP TracebackIEEE Trans. on Information Forensics and Security Denial of Service Attacks
2017
Al-mamory, S.
Algelal, S.
A modified DBSCAN clustering algorithm for proactive detection of DDoS attacksConf. on New Trends in Information and Communications Technology Applications Denial of Service Attacks
2017
AlEroud, A.
Alsmadi, I.
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approachJ. of Network and Computer Applications Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Wang, Y.
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian ForestWireless Algorithms, Systems, and Applications Denial of Service Attacks
2017
Semenets, V.
Alonso, A.
A novel rule generator for intrusion detection based on frequent subgraph miningRevista chilena de ingenieria Denial of Service Attacks
2017
Muhammad, A.
Riadi, I.
Sunardi, S.
Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average WindowJurnal Informatika Sunan Kalijaga Denial of Service Attacks
2017
Kotenko, I.
Chechulin, A.
Branitskiy, A.
Generation of Source Data for Experiments with Network Attack Detection SoftwareJ. of Physics: Conf. Series Denial of Service Attacks
2016
Bhatia, S.Ensemble-based model for DDoS attack detection and flash event separationFuture Technologies Conf. Denial of Service Attacks
2016
Deka, R.
Bhattacharya, D.
Self-similarity based DDoS attack detection using Hurst parameterSecurity and Communication Networks Denial of Service Attacks
2016
Zhang, H.
Su, W.
Quan, W.
Security technologies of SINETSmart Collaborative Identifier Network Denial of Service Attacks
2016
Kong, X.
Chen, Y.
Tian, H.
Wang, T.
Cai, Y.
Chen, X.
A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure ClusteringIntl Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery Denial of Service Attacks
2016
Osanaiye, O.
Choo, K.
Dlodlo, M.
Change-point cloud DDoS detection using packet inter-arrival timeComputer Science and Electronic Engineering Denial of Service Attacks
2016
Singh, N.
Singh, K.
De, T.
Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature SelectionIntl Conf. on Informatics and Analytics Denial of Service Attacks
2016
Singh, K.
Thongam, K.
De, T.
Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural NetworksEntropy Denial of Service Attacks
2016
Hubballi, N.
Tripathi, N.
An event based technique for detecting spoofed IP packetsJ. of Information Security and Applications Denial of Service Attacks
2016
Yusof, A.R.
Udzir, N.I.
Selamat, A.
An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS AttackLecture Notes in Computer Science Denial of Service Attacks
2016
Osanaiye, O.DDoS Defence for Service Availability in Cloud ComputingUniv. of Cape Town Denial of Service Attacks
2016
last name, initial
last name, initial
Identifying Anomalous Traffic using Dynamic Programing based Differential Analysisconference title Denial of Service Attacks
2016
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metricSecurity and Communication Networks Denial of Service Attacks
2016
Muharish, E.Y.M.PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKSCalifornia State Univ. San Bernardino Denial of Service Attacks
2016
Chen, Y.
Chen, X.
Tian, H.
Wang, T.
Cai, Y.
A blind detection method for tracing the real source of DDoS attack packets by cluster matchingIEEE Intl Conf. on Communication Software and Networks Denial of Service Attacks
2016
Behal, S.
Kumar, K.
Trends in Validation of DDoS ResearchProcedia Computer Science Denial of Service Attacks
2016
Karimi, A.
Niyaz, Q.
Sun, W.
Javaid, A.
Devabhaktuni, V.
Distributed network traffic feature extraction for a real-time IDSIEEE Intl Conf. on Electro Information Technology Denial of Service Attacks
2016
Giotis, K.
Apostolaki, M.
Maglaris, V.
A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domainsIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
Topology with BGP
2016
Dalmazo, B.L.
Vilela, J.P.
Simoes, P.
Curado, M.
Expedite feature extraction for enhanced cloud anomaly detectionIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
2016
Aleroud, A.
Alsmadi, I.
Identifying DoS attacks on software defined networks: A relation context approachIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
2016
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Autonomous system based flow marking scheme for IP-TracebackIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
2016
Hoque, N.
Bhattacharyya, D.
Kalita, J.
Denial of Service Attack Detection using Multivariate Correlation AnalysisIntl Conf. on Information and Communication Technology for Competitive Strategies Denial of Service Attacks
2016
Bhandari, A.
Sangal, A.L.
Kumar, K.
Characterizing flash events and distributed denial-of-service attacks: an empirical investigationSecurity and Communication Networks Denial of Service Attacks
2016
Hoque, N.
Bhattacharyya, D.K.
Kalita, J.K.
FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysisSecurity and Communication Networks Denial of Service Attacks
2016
Zheng, L.
Li, J.
Wang, H.
Zeng, X.
Improving accuracy and automation of anomaly detectors based on self-correlationJ. Internet Technology (JIT) Denial of Service Attacks
UCSD Network Telescope
2016
Raza, A.Anomaly Detection Systems for Distributed Denial of Service AttacksUniv. of Victoria Denial of Service Attacks
2016
Hoque, N.
Bhattacharyya, D.K.
Kalita, J.K.
A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysisIntl Conf. on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2016
Giotis, K.Virtual Network Services for the Monitoring and Security of Software-Defined NetworksNational Technical Univ. of Athens Denial of Service Attacks
Topology with BGP
2016
Ghahfarokhi, N.Cooperative Defense Mechanism for detection, identification, and filtering of DDos attacksColorado State Univ. Denial of Service Attacks
2015
Robinson, R.R.R.
Thomas, C.
Ranking of machine learning algorithms based on the performance in classifying DDoS attacksIEEE Recent Advances in Intelligent Computational Systems (RAICS) Denial of Service Attacks
UCSD Network Telescope
2015
Rastegari, S.Intelligent network intrusion detection using an evolutionary computation approachEdith Cowan Univ. Denial of Service Attacks
2015
Cheng, L.
Divakaran, D.M.
Lim, W.Y.
Thing, V.L.L.
Opportunistic Piggyback Marking for IP TracebackIEEE Trans. on Information Forensics and Security Denial of Service Attacks
2015
Purwanto, Y.
Kuspriyanto, Hendrawan
Rahardjo, B.
Statistical analysis on aggregate and flow based traffic features distributionIntl Conf. on Wireless and Telematics (ICWT) Denial of Service Attacks
2015
Poongodi, M.
Bose, S.
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANETCluster Computing Denial of Service Attacks
2015
Giotis, K.
Androulidakis, G.
Maglaris, V.
A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middleboxSecurity and Communication Networks Denial of Service Attacks
2015
Balkanli, E.
Zincir-Heywood, A.N.
Heywood, M.I.
Feature selection for robust backscatter DDoS detectionLocal Computer Networks Conf. Workshops (LCNW) Denial of Service Attacks
UCSD Network Telescope
2015
Zhou, L.
Liao, M.
Yuan, C.
Sheng, Z.
Zhang, H.
DDOS attack detection using packet size intervalIntl Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM ) Denial of Service Attacks
2015
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
Practical Tools for Attackers and DefendersNetwork Traffic Anomaly Detection and Prevention Denial of Service Attacks
2015
Wang, R.
Jia, Z.
Ju, L.
An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined NetworkingTrustcom/BigDataSE/ISPA, IEEE Denial of Service Attacks
2015
Rastegari, S.
Hingston, P.
Lam, C.P.
Evolving statistical rulesets for network intrusion detectionApplied Soft Computing Denial of Service Attacks
2015
Nurohman, H.
Purwanto, Y.
Hafidudin, X.
Traffic anomaly based detection: Anomaly detection by self-similar analysisIntl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC) Denial of Service Attacks
2015
Juturu, L.S.Applying big data analytics on integrated cybersecurity datasetsTexas Tech Univ., Lubbock, TX, US Denial of Service Attacks
2015
Dorbala, S.Y.
Hubballi, N.
An Experience Report on Scalable Implementation of DDoS Attack DetectionLecture Notes in Business Information Processing Denial of Service Attacks
2015
David, J.
Thomas, C.
DDoS Attack Detection Using Fast Entropy Approach on Flow- Based Network TrafficProcedia Computer Science Denial of Service Attacks
2015
Jiang, H.
Chen, S.
Hu, H.
Zhang, M.
Superpoint-based detection against distributed denial of service (DDoS) flooding attacksIntl Workshop on Local and Metropolitan Area Networks Denial of Service Attacks
2015
Bhuyan, M.H.
Kalwar, A.
Goswami, A.
Bhattacharyya, D.K.
Kalita, J.K.
Low-Rate and High-Rate Distributed DoS Attack Detection Using Partial Rank CorrelationIntl. Conf. on Communication Systems and Network Technologies (CSNT) Denial of Service Attacks
2015
Pimpalkar, A.S.
Patil, A.R.B.
Detection and defense mechanisms against DDoS attacks: A reviewIntl Conf. on Innovations in Information, Embedded and Communication Systems (ICIIECS) Denial of Service Attacks
2015
Wang, S.
Li, Y.
Zhao, X.
Wang, B.
Intrusion detection system design of cloud computing based on abnormal traffic identificationIntl J. of Reasoning-based Intelligent Systems Denial of Service Attacks
2015
Wang, R.
Zhang, Z.
Ju, L.
Jia, Z.
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined NetworkingIntl J. of Information Security and Privacy (IJISP) Denial of Service Attacks
2015
Shamshirband, S.
Daghighi, B.
Anuar, N.B.
Kiah, L.M.
Patel, A.
Abraham, A.
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in networkJ. Intelligent and Fuzzy Systems Denial of Service Attacks
2015
Lai, Y.
Chen, Y.
Liu, Z.
Yang, Z.
Li, X.
On monitoring and predicting mobile network traffic abnormalitySimulation Modelling Practice and Theory Denial of Service Attacks
UCSD Network Telescope
2015
Chen, W.
Guan, Y.
Distinct element counting in distributed dynamic data streamsIEEE Conference on Computer Communications (INFOCOM) Denial of Service Attacks
2015
Buragohain, C.
Kalita, M.J.
Singh, S.
Bhattacharyya, D.K.
Anomaly based DDoS Attack DetectionIntl J. of Computer Applications Denial of Service Attacks
2014
Shrestha, A.
Zhu, Y.
Manandhar, K.
NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysisAdvances in Visual Computing Denial of Service Attacks
2014
Shrestha, A.Visualizing Spatio-Temporal dataGeorgia State Univ. Denial of Service Attacks
2014
Kato, K.
Klyuev, V.
Large-scale network packet analysis for intelligent DDoS attack detection developmentIntl Conf. on Internet Technology and Secured Transactions (ICITST) Denial of Service Attacks
2014
Bhaya, W.
Manaa, M.E.
A proactive DDoS detection approach using data mining cluster analysisJ. of Next Generation Information Technology Denial of Service Attacks
2014
Ain, A.
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
Rank correlation for low-rate DDoS attack detection: An empirical evaluationIntl J. of Network Security Denial of Service Attacks
2014
Purwanto, Y.
Kuspriyanto, Hendrawan
Rahardjo, B.
Traffic anomaly detection in DDos flooding attackIntl conf. on Telecommunication Systems Services and Applications (TSSA) Denial of Service Attacks
2014
Srihari, V.
Anitha, R.
DDoS detection system using wavelet features and semi-supervised learningIntl Symp. on Security in Computing and Communications Denial of Service Attacks
2014
Kato, K.
Klyuev, V.
An intelligent DDoS attack detection system using packet analysis and support vector machineIntl J. of Intelligent Computing Research (IJICR) Denial of Service Attacks
2014
Giotis, K.
Androulidakis, G.
Maglaris, V.
Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy NetworksThird European Workshop on Software Defined Networks Denial of Service Attacks
2014
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
Information metrics for low-rate DDoS attack detection: A comparative evaluationIntl. Conf. on Contemporary Computing (IC3) Denial of Service Attacks
2014
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detectionPattern Recognition Letters Denial of Service Attacks
2014
Shamsolmoali, P.
Zareapoor, M.
Statistical-based filtering system against DDOS attacks in cloud computingIntl Conf. on Advances in Computing, Communications and Informatics (ICACCI) Denial of Service Attacks
2014
Bhatia, S.
Schmidt, D.
Mohay, G.
Tickle, A.
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and flash eventsComputers and Security Denial of Service Attacks
2014
Wang, J.
Paschalidis, I.C.
Botnet detection using social graph analysisCommunication, Control, and Computing (Allerton), Annual Allerton Conference on Denial of Service Attacks
2014
Wan, M.
Zhang, H.-K.
Wu, T.-Y.
Lo, C.-H.
Anomaly detection and response approach based on mapping requestsSecurity and Communication Networks Denial of Service Attacks
2014
Takahashi, R.Distributed denial of service (DDoS) attack detection system using burst detectionFuture Univ. Hakodate Denial of Service Attacks
2014
Fachkha, C.
Bou-Harb, E.
Debbabi, M.
Fingerprinting Internet DNS Amplification DDoS ActivitiesIntl Conf. on New Technologies, Mobility and Security (NTMS) Denial of Service Attacks
2013
Luo, H.
Lin, Y.
Zhang, H.
Zukerman, M.
Preventing DDoS attacks by identifier/locator separationIEEE Network Denial of Service Attacks
2013
Bhuyan, M.H.Applying data mining techniques in anomaly based network intrusion detectionTezpur Univ. Denial of Service Attacks
2013
Bhatia, S.Detecting Distributed Denial-of-Service attacks and flash eventsQueensland Univ. of Technology, Brisbane, Australia Denial of Service Attacks
2013
Dassouki, K.
Debar, H.
Safa, H.
Hijazi, A.
A TCP delay-based mechanism for detecting congestion in the InternetIntl Conf. on Communications and Information Technology (ICCIT) Denial of Service Attacks
2013
Chen, W.
Liu, Y.
Guan, Y.
Cardinality change-based early detection of large-scale cyber-attacksIEEE INFOCOM Denial of Service Attacks
UCSD Network Telescope
2013
Callau-Zori, M.
Jimenez-Peris, R.
Gulisano, V.
Papatriantafilou, M.
Fu, Z.
Patino-Martinez, M.
STONE: A stream-based DDoS defense frameworkACM Symp. on Applied Computing (SAC) Denial of Service Attacks
2013
Kumar, P.A.R.
Selvakumar, S.
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systemsComputer Communications Denial of Service Attacks
UCSD Network Telescope
2012
Bhatia, S.
Schmidt, D.
Mohay, G.
Ensemble-based DDoS detection and mitigation modelConf. on Security of Information and Networks (SIN) Denial of Service Attacks
2012
Fu, Z.Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigationChalmers Univ. of Technology, Gothenborg, Sweden Denial of Service Attacks
2012
Singh, J.
Kumar, K.
Sachdeva, M.
Sidhu, N.
DDoS attack's simulation using legitimate and attack real data setsJ. Scientific and Engineering Research Denial of Service Attacks
2012
Feitosa, E.
Souto, E.
Sadok, D.H.
An orchestration approach for unwanted Internet traffic identificationComputer Networks Denial of Service Attacks
2012
Anitha, R.
Karthik, R.
Pravin, V.
Thirugnanam, K.
A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference systemIntl Conf. on Computer Science, Engineering and Applications (ICCSEA) Denial of Service Attacks
2012
Rahmani, H.
Sahli, N.
Kamoun, F.
DDoS flooding attack detection scheme based on F-divergenceComputer Communications Denial of Service Attacks
2012
Zheng, L.
Zou, P.
Jia, Y
Han, W.
An online learning and unsupervised traffic anomaly detection systemAdvanced Science Lett. Denial of Service Attacks
2012
Karthick, R.R.
Hattiwale, V.P.
Ravindran, B.
Adaptive network intrusion detection system using a hybrid approachConf. on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2011
Takahashi, E.K.
Chen, Y.
Lall, A.
Divergence in network trafficMidstates Conf. on Undergraduate Research in Computer Science and Mathematics Denial of Service Attacks
2011
Le, D.Q.
Jeong, T.
Roman, H.E.
Hong, J.W.
Traffic dispersion graph based anomaly detectionSymp. on Information and Communication Technology (SolCT) Denial of Service Attacks
2011
Bhatia, S.
Mohay, G.
Tickle, A.
Ahmed, E.
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash eventConf. on Availability, Reliability and Security (ARES) Denial of Service Attacks
2011
Khan, F.M.Assuring network service with bandwidth and integrity based fairnessUniv. Illinois, Urbana-Champaign Denial of Service Attacks
2017
Liu, Z.
Liu, Y.
Winter, P.
Mittal, P.
Hu, Y.
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systemsarxiv.org DNS RTT
2017
Jeyasekar, A.
Kasmir Raja, S.
Annie Uthra, R.
Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networksJ. of Network and Computer Applications DNS RTT
2016
Krenc, T.
Feldmann, A.
BGP prefix delegations: A deep diveInternet Measurement Conf. (IMC) Paper Data Supplements
Topology with Archipelago
Topology with BGP
2015
Nithyanand, R.
Starov, O.
Zair, A.
Gill, P.
Schapira, M.
Measuring and mitigating AS-level adversaries against Torarxiv.org Paper Data Supplements
2017
Vanaubel, Y.
Merindol, P.
Pansiot, J.
Donnet, B.
Through the Wormhole: Tracking Invisible MPLS TunnelsACM Internet Measurement Conf. (IMC) Topology with Archipelago
2017
Lichtblau, F.
Streibeld, F.
Kruger, T.
Richter, P.
Feldmann, A.
Detection, Classification, and Analysis of Inter-Domain Traffic with Spoofed Source IP AddressesACM Internet Measurement Conf. (IMC) Topology with Archipelago
2017
Tilch, G.
Ermakova, T.
Fabian, B.
A Multilayer Graph Model of the Internet Topologyzenodo.org Topology with Archipelago
Topology with BGP
2017
Mayer, R.
Graser, L.
Gupta, H.
Saurez, E.
Ramachandran, U.
EmuFog: Extensible and Scalable Emulation of Large-Scale Fog Computing Infrastructuresarxiv.org Topology with Archipelago
2017
Ando, M.
Okada, M.
Kanaoka, A.
Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet TopologyAsia Joint Conf. on Information Security Topology with Archipelago
Topology with BGP
2017
Bronzino, F.
Mukherjee, S.
Raychaudhuri, D.
The Named-Object Abstraction for Realizing Advanced Mobility Services in the Future InternetProceedings of the Workshop on Mobility in the Evolving Internet Architecture Topology with Archipelago
2017
Scheitle, Q.
Gasser, O.
Sattler, P.
Carle, G.
HLOC: Hints-based geolocation leveraging multiple measurement frameworksNetwork Traffic Measurement and Analysis Conf. Topology with Archipelago
2017
Hu, G.
Chen, W.
Li, Q.
Jiang, Y.
Xu, K.
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity codeFuture Generation Computer Systems Topology with Archipelago
Topology with BGP
2017
Candela, M.
Bartolomeo, M.
Battista, G.
Squarcella, C.
Radian: Visual Exploration of TraceroutesIEEE Trans. Visualization and Computer Graphics Topology with Archipelago
2017
Fabian, B.
Baumann, A.
Ehlert, M.
Vasilis, V.
Ermakova, T.
CORIA - Analyzing internet connectivity risks using network graphsIntl Conf. on Communications Topology with Archipelago
2017
Ciavarella, S.
Bartolini, N.
Khamfroush, H.
La Porta, T.
Progressive damage assessment and network recovery after massive failuresIEEE Conf. on Computer Communications Topology with Archipelago
2017
Sun, Y.
Edmundson, A.
Feamster, N.
Chiang, M.
Mittal, P.
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacksarxiv.org Topology with Archipelago
2017
Kleineberg, K.
Helbing, D.
Collective navigation of complex networks: Participatory greedy routingScientific Reports Topology with Archipelago
2017
Zhang, X.
Xu, G.
Xia, Y.
Optimal defense resource allocation in scale-free networksPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2017
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Labeling and Encoding Hierarchical Addressing for Scalable Internet RoutingAdvances in Computer and Computational Sciences Topology with Archipelago
2017
Sermpezis, P.
Nomikos, G.
Dimitropoulos, X.
Re-mapping the Internet: Bring the IXPs into Playarxiv.org Topology with Archipelago
Topology with BGP
2017
Pearce, P.
Ensalfi, R.
Li, F.
Feamster, N.
Paxson, V.
Augur: Internet-Wide Detection of Connectivity DisruptionsIEEE Symp. on Security and Privacy Topology with Archipelago
2017
Nguyen, H.
Phung, C.
Secci, S.
Felix, B.
Nogueira, M.
Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks?arxiv.org Topology with Archipelago
2017
Mukherjee, S.
Sriram, S.
Raychaudhuri, D.
Edge-Aware Inter-Domain Routing for Realizing Next-Generation Mobility ServicesIEEE ICC Mobile and Wireless Networking Topology with Archipelago
2017
Mukherjee, S.
Sriram, S.
Vu, T.
Raychaudhuri, D.
EIR: Edge-aware inter-domain routing protocol for the future mobile internetComputer Networks Topology with Archipelago
2017
Kleineberg, K.Metric clusters in evolutionary games on scale-free networksarxiv.org Topology with Archipelago
2017
Jiang, Q.
Hu, H.
Hu, G.
Two-Type Information Fusion Based IP-to-AS Mapping Table RefiningJ. of Computer Science and Technology Topology with Archipelago
Topology with BGP
2017
Imani, M.
Barton, A.
Wright, M.
Forming Guard Sets using AS RelationshipsProceedings on Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2017
Gaston, E.W.High-frequency mapping of the IPv6 Internet using YarrpNaval Postgraduate School Topology with Archipelago
2017
Edeline, K.
Donnet, B.
A First Look at the Prevalence and Persistence of Middleboxes in the WildIntl Teletraffic Congress Topology with Archipelago
2017
Dong, W.
Gao, Y.
Wu, W.
Bu, J.
Chen, C.
Li, X.
Optimal Monitor Assignment for Preferential Link Tomography in Communication NetworksIEEE/ACM Trans. on Networking (TON) Topology with Archipelago
Topology with BGP
2017
Cho, S.
Nithyanand, R.
Razaghpanah, A.
Gill, P.
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomographyarxiv.org Topology with Archipelago
Topology with BGP
2017
Apostolaki, M.
Zohar, A.
Vanbever, L.
Hijacking Bitcoin: Routing Attacks on CryptocurrenciesSymp. on Security and Privacy Topology with Archipelago
Topology with BGP
2016
Richter, P.
Smaragdakis, G.
Plonka, D.
Berger, A.
Beyond counting: New perspectives on the active IPv4 address spaceInternet Measurement Conf. (IMC) Topology with Archipelago
2016
Marder, A.
Smith, J.M.
MAP-IT: Multipass accurate passive inferences from tracerouteInternet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2016
Liaskos, C.
Dimitropoulos, X.
Tassiulas, L.
Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approachIEEE Trans. on Network and Service Management Topology with Archipelago
Topology with BGP
2016
Beverly, R.Yarrp'ing the Internet: Randomized high-speed active topology discoveryInternet Measurement Conf. (IMC) Topology with Archipelago
2016
Lin, C.
Bi, Y.
Zhao, H.
Cai, W.
Research on bottleneck-delay in internet based on IP united mappingPeer-to-Peer Networking and Applications Topology with Archipelago
2016
Kleineberg, K.-K.
Boguna, M.
Serrano, A.
Papadopoulos, F.
Hidden geometric correlations in real multiplex networksNature Physics Topology with Archipelago
2016
Kim, T.H.
Kim, D.S.
Jung, H.Y.
Defending against DDoS Attacks under IP Spoofing Using Image Processing ApproachIEICE Trans. on Communications Topology with Archipelago
2016
Wang, Y.
Zhang, K.
Quantifying the flattening of Internet topologyIntl Conf. on Future Internet Technologies Topology with Archipelago
Topology with BGP
Topology with Skitter
2016
Tan, H.
Sherr, M.
Zhou, W.
Data-plane defenses against routing attacks on TorPrivacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2016
Shah, A.
Fontunge, R.
Papadopoulos, C.
Towards characterizing international routing detoursarxiv.org Topology with Archipelago
Topology with BGP
2016
Czyz, J.J.A brave new world: Studies on the deployment and security of the emerging IPv6 InternetUniv. of Michigan, Ann Arbor, MI, US Topology with Archipelago
2016
Rohrer, J.
LaFever, B.
Beverly, R.
Empirical Study of Router IPv6 Interface Address DistributionsIEEE Internet Computing Topology with Archipelago
2016
Nithyanand, R.
Singh, R.
Cho, S.
Gill, P.
Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client designarxiv.org Topology with Archipelago
2016
Baumann, A.
Fabian, B.
Vulnerability against Internet disruptions - A graph-based perspectiveLecture Notes in Computer Science Topology with Archipelago
Topology with BGP
2016
Rye, E.C.
Rohrer, J.P.
Beverly, R.
Revisiting AS-level graph reductionComputer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing resilience of inter-domain routing system under regional failuresKSII Trans. on Internet and Information Systems Topology with Archipelago
Topology with BGP
2016
Li, Q.Reducing short flows' latency in the internetUniv. Illinois, Urbana-Champaign Topology with Archipelago
Topology with BGP
2016
Li, F.
Yang, J.
Wang, X.
Pan, T.
An, C.
Wu, J.
Characteristics analysis at prefix granularity: A case study in an IPv6 networkJ. of Network and Computer Applications Topology with Archipelago
2016
Veitch, D.
Vijayalayan, K.
Network timing and the 2015 leap secondPassive and Active Measurement (PAM) Topology with Archipelago
2016
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
A brief history of MPLS usage in IPv6Passive and Active Measurement (PAM) Topology with Archipelago
Topology with BGP
2016
Nomikos, G.
Dimitropoulos, X.
traIXroute: Detecting IXPs in traceroute pathsLecture Notes in Computer Science (LNCS) Topology with Archipelago
Topology with BGP
2016
Marcisak, S.Correlating inferred data plane IPv6 reboot events with control plane BGP activityNaval Postgraduate School, Monterey, CA, US Topology with Archipelago
2016
Jiao, B.
Shi, J.-M.
Graph perturbations and corresponding spectral changes in Internet topologiesComputer Communications Topology with Archipelago
2016
Wang, Z.
Li, Q.
Jin, F.
Xiong, W.
Wu, Y.
Hyperbolic mapping of complex networks based on community informationPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2016
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Towards variable length addressing for scalable Internet routingIEEE Intl Performance Computing and Communications Conf. (IPCCC) Topology with Archipelago
2016
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type inference in Internet AS graphsComputer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
Topology with BGP
2016
Tan, Z.D.H.Network Level Attacks and Defenses Against Anonymity NetworksGeorgetown University Topology with Archipelago
Topology with BGP
2016
Singh, J.Using Looking Glasses to Understand the Internet's StructureSeminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM) Topology with Archipelago
2016
Schuchard, M.
Geddes, J.
Schliep, M.
Hopper, N.
The Cost of the Path Not TakenIEEE Global Communications Conf. (GLOBECOM) Topology with Archipelago
2016
Jacquemart, Q.Towards Uncovering BGP Hijacking AttacksParisTech Topology with Archipelago
2016
Gosain, D.
Agarwal, A.
Acharya, H.B.
Chakravarty, S.
Qi points : placing decoy routers in the internetIndraprastha Institute of Information Technology Delhi (IIITD) Topology with Archipelago
Topology with BGP
2016
Gao, Q.
Wang, F.
Gao, L.
Quantifying AS Path Inflation by Routing PoliciesIntl J. of Future Generation Communication and Networking Topology with Archipelago
2016
Chen, J.
Kumar, V.S.A.
Marathe, M.V.
Sundaram, R.
Thakur, M.
Thulasidasan, S.
A study of the structure and vulnerabilities of metropolitan area networksIntl. Conf. on Communication Systems and Networks (COMSNETS) Topology with Archipelago
Topology with Skitter
2016
Chandrasekaran, B.Head into the Cloud: An Analysis of the Emerging Cloud InfrastructureDuke University Topology with Archipelago
Topology with BGP
2016
Canbaz, M.A.Data-driven large scale network-layer Internet simulationIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2015
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
MPLS under the microscope: Revealing actual transit path diversityInternet Measurement Conf. (IMC) Topology with Archipelago
2015
Medeiros, J.P.S.
Motta Pires, P.S.
Borges Neto, J.B.
Loureiro, A.A.F.
Minimization and placement of sensors in structurally observable networksIntl Conf. on Computer and Information Technology (CIT) Topology with Archipelago
2015
Vijayalakshmi, M.
Shalinie, S.M.
Single Packet ICMP Traceback Technique Using Router InterfaceJ. of Information Science and Engineering Topology with Archipelago
2015
Gray, M.D.Discovery of IPv6 router interface addresses via heuristic methodsNaval Postgraduate School Topology with Archipelago
2015
Sha, Z.Decision-centric foundations for complex systems engineering and designPurdue Univ. Topology with Archipelago
Topology with BGP
Topology with Skitter
2015
Papadopoulos, F.
Aldecoa, R.
Krioukov, D.
Network geometry inference using common neighborsPhys. Rev. E Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet Autonomous SystemsEPJ Data Science Topology with Archipelago
2015
Zhou, X.
Calvert, K.L.
Lightweight privacy-preserving passive measurement for home networksIEEE Conf. on Communications (ICC) Topology with Archipelago
2015
Juen, J.
Johnson, A.
Das, A.
Borisov, N.
Caesar, M.
Defending Tor from network adversaries: A case study of network path predictionPrivacy Enhancing Technologies Topology with Archipelago
2015
Fabian, B.
Baumann, A.
Lackner, J.
Topological analysis of cloud service connectivityComputers and Industrial Engineering Topology with Archipelago
2015
Simoens, P.
Herzeele, L.V.
Vandeputte, F.
Vermoesen, L.
Challenges for orchestration and instance selection of composite services in distributed edge cloudsIntl. Symp. on Integrated Network Management (IM) Topology with Archipelago
2015
Motamedi, R.
Rejaie, R.
Willinger, W.
A Survey of Techniques for Internet Topology DiscoveryIEEE Communications Surveys and Tutorials Topology with Archipelago
Topology with Skitter
2015
Jaggard, A.D.
Johnson, A.
Cortes, S.
Syverson, P.
Feigenbaum, J.
20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea CablesPrivacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2015
Edeline, K.
Donnet, B.
Towards a middlebox policy taxonomy: Path impairmentsIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2015
Chavula, J.
Fearnster, N.
Bagula, A.
Suleman, H.
Quantifying the effects of circuitous routes on the latency of intra-Africa Internet traffic: A study of research and education networksLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Topology with Archipelago
2015
West, A.Toward a robust method of presenting a rich, interconnected deceptive network topologyNaval Postgraduate School Topology with Archipelago
2015
Siddiqui, M.S.
Montero, D.
Serral-Gracia, R.
Yannuzzi, M.
Self-reliant detection of route leaks in inter-domain routingComputer Networks Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet autonomous systemsarxiv.org Topology with Archipelago
2015
Mell, P.
Harang, R.
Gueye, A.
The resilience of the Internet to colluding country induced connectivity disruptionsNetwork and Distributed System Security Symp. (NDSS) Topology with Archipelago
2015
Jacquement, Q.Towards uncovering BGP hijacking attacksParisTech Topology with Archipelago
Topology with BGP
2015
Gao, Q.
Wang, F.
Gao, L.
Routing-policy aware peering for large content providersComputer Communications Topology with Archipelago
2015
Faggiani, A.
Gregori, E.
Lenzini, L.
Luconi, V.
Measuring the Internet topology with smartphonesC2B(1)D ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data Topology with Archipelago
2015
Chandrasekaran, B.
Bai, M.
Schoenfield, M.
Berger, A.
Caruso, N.
Economou, G.
Gilliss, S.
Maggs, B.
Moses, K.
Duff, D.
Ng, K.C.
Sirer, E.G.
Weber, R.
Wong, B.
Alidade: IP Geolocation without Active ProbingDuke University Topology with Archipelago
Topology with BGP
2014
Siddiqui, M.S.
Montero, D.
Yannuzzi, M.
Serral-Gracia, R.
Masip-Bruin, X.
Ramirez, W.
Route leak detection using real-time analytics on local BGP informationIEEE Global Communications Conf. Topology with Archipelago
2014
Hric, D.
Darst, R.K.
Fortunato, S.
Community detection in networks: Structural communities versus ground truthPhys. Rev. E Topology with Archipelago
Topology with BGP
2014
Fowler, J
Johnson, T
Simonetto, P
Lazos, P
Kobourov, S.
Schneider, M.
Aceda, C.
IMap: Visualizing network activity over Internet mapsVisualization for Cyber Security (VizSec) Topology with Archipelago
UCSD Network Telescope
2014
Durairajan, R.
Sommers, J.
Barford, P.
Layer 1-informed Internet topology measurementInternet Measurement Conf. (IMC) Topology with Archipelago
2014
Kiremire, A.R.
Brust, M.R.
Phoha, V.V.
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemesComputer Networks Topology with Archipelago
2014
Juen, J.
Das, A.
Johnson, A.
Borisov, N.
Caesar, M.
Defending Tor from network adversaries: A case study of network path predictionarxiv.org Topology with Archipelago
2014
Craven, R.
Beverly, R.
Allman, M.
A middlebox-cooperative TCP for a non end-to-end internetACM SIGCOMM Computer Communication Review Topology with Archipelago
2014
Reed, D.
Warbritton, D.
Sicker, D.
Current trends and controversies in Internet peering and transit: Implications for the future evolution of the InternetConf. on Communication, Information and Internet Policy (TPRC) Topology with Archipelago
2014
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
Comparative assessment of centrality indices and implications on the vulnerability of ISP networksIntl Teletraffic Congress (ITC) Topology with Archipelago
2014
Mosley, L.D.IPv6 network infrastructure and stability inferenceNaval Postgraduate School Topology with Archipelago
2014
Maggs, B.Mapping the whole InternetDuke Univ. Topology with Archipelago
Topology with BGP
2014
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoptionConf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) Topology with Archipelago
2014
Burnett, S.R.Empowering bystanders to facilitate Internet censorship measurement and circumventionGeorgia Tech Topology with Archipelago
UCSD Network Telescope
2014
Wright, J.E.Temporal comparisons of Internet topologyNaval Postgraduate School Topology with Archipelago
2014
Landry, B.Comparing internet probing methodologies through an analysis of large dynamic graphsNaval Postgraduate School Topology with Archipelago
2014
Jaggard, A.D.
Johnson, A.
Syverson, P.
Feigenbaum, J.
Representing network trust and using it to improve anonymous communicationarxiv.org Topology with Archipelago
Topology with BGP
2014
Kang, M.S.
Gligor, V.D.
Routing bottlenecks in the Internet - causes, exploits, and countermeasuresCarnegie Mellon Univ. Topology with Archipelago
Topology with BGP
2014
Tran, T.V.H.IPv6 geolocation using latency constraintsNaval Postgraduate School Topology with Archipelago
2014
Baltra, G.
Beverly, R.
Xie, G.G.
Ingress point spreading: A new primitive for adaptive active network mappingPassive and Active Measurement (PAM) Topology with Archipelago
2014
Xu, Y.
Ma, W.
Robustness analyses of Internet topology with power-law featuresIntl J. of Future Generation Communication and Networking Topology with Archipelago
2014
Orzen, S.-N.Domain relations in trees arborescence for interaction search on persistent routing availabilityIntl Symp. on Applied Machine Intelligence and Informatics (SAMI) Topology with Archipelago
2014
Motamedi, R.
Chandrasekaran, B.
Maggs, B.
Rejaie, R.
Willinger, W.
https://onrg.cs.uoregon.edu/pub/CIS-TR-2014-02.pdfUniv. of Oregon Topology with Archipelago
Topology with Skitter
2014
Kang, M.S.
Gligor, V.D.
Routing Bottlenecks in the Internet: Causes, Exploits, and CountermeasuresConf. on Computer and Communications Security Topology with Archipelago
Topology with BGP
2014
Gopika, S.
Jingle, I.D.J.
A system for Distributed Denial-of-Service attack detection based on multivariate correlation analysisCiiT Intl J. of Networking and Communication Engineering Topology with Archipelago
2014
Gersch, J.
Massey, D.
Papadopoulos, C.
Incremental Deployment Strategies for Effective Detection and Prevention of BGP Origin HijacksIntl Conf. on Distributed Computing Systems (ICDCS) Topology with Archipelago
Topology with BGP
2014
Gansner, E.R.
Krishnamurthy, B.
Willinger, W.
Bustamante, F.E.
Sanchez, M.A.
Demo abstract: towards extracting semantics by visualizing large traceroute datasetsComputing Topology with Archipelago
2014
Da Lozzo, G.
Di Battista, G.
Squarcella, C.
Visual discovery of the correlation between BGP routing and round-trip delay active measurementsComputing Topology with Archipelago
2013
Verigin, A.L.Evaluating the effectiveness of Sybil attacks against peer-to-peer botnetsUniv. of Victoria, Victoria, CA Topology with Archipelago
2013
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
The multiple instances of node centrality and their implications on the vulnerability of ISP networksarxiv.org Topology with Archipelago
2013
Johnson, A.
Wacek, C.
Jansen, R.
Sherr, M.
Syverson, P.
Users get routed: Traffic correlation on Tor by realistic adversariesACM SIGSAC Conf. on Computer and Communications Security (CCS) Topology with Archipelago
Topology with BGP
2013
Vanaubel, Y.
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Network fingerprinting: TTL-based router signaturesInternet Measurement Conf. (IMC) Topology with Archipelago
2013
Ma, L.
He, T.
Leung, K.K.
Swami, A.
Towsley, D.
Identifiability of link metrics based on end-to-end path measurementsInternet Measurement Conf. (IMC) Topology with Archipelago
2013
Khan, A.
Kwon, T.
Kim, H.
Choi, Y.
AS-level topology collection through looking glass serversInternet Measurement Conf. (IMC) Topology with Archipelago
2013
Sapegin, A.
Uhlig, S.
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing eventsComputer Communications Topology with Archipelago
2013
Daryl, L.H.A.Toward large-graph comparison measures to understand Internet topology dynamicsNaval Postgraduate School, Monterey, CA, US Topology with Archipelago
2013
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoptionIntl Computer Science Inst. (ICSI) Topology with Archipelago
2013
Chabarek, J.
Barford, P.
What's in a name?: decoding router interface namesACM workshop on HotPlanet Topology with Archipelago
2013
Lu, N.
Wang, Y.
Su, S.
Yang, F.
Han, R.
Filtering location optimization for the reactive packet filteringSecurity and Communication Networks Topology with Archipelago
2013
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
On the local approximations of node centrality in Internet router-level topologiesIntl Workshop on Self-Organizing Systems (IWSOS) Topology with Archipelago
2013
Chen, A.
Chan, E.W.W.
Luo, X.
Fok, W.W.T.
Chang, R.K.C.
An efficient approach to multi-level route analyticsIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with Archipelago
2013
Yang, B.
Zhao, H.
Zhang, J.
Ai, J.
Jia, S.
Ge, x.
Liu, W.
Analysis of interlayer connection catastrophe characteristics in Internet AS level topologyTelkomnika Topology with Archipelago
2013
Wacek, C.
Tan, H.
Bauer, K.
Sherr, M.
An empirical evaluation of relay selection in TorNetwork and Distributed System Security Symp. (NDSS) Topology with Archipelago
Topology with BGP
2013
Wang, Y.
Bi, J.
Wu, J.
Revisiting the rich club of the Internet AS-level topologyIEICE Trans. on Communications Topology with Archipelago
Topology with Skitter
2012
Yu, M.
Jiang, W.
Li, H.
Stoica, I.
Tradeoffs in CDN designs for throughput oriented trafficACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Archipelago
2012
Sherry, J.Future architectures for middlebox processing services on the Internet and in the CloudUC Berkeley Topology with Archipelago
Topology with BGP
2012
Ren, D.
Wong, W.
Gary Chan, S.-H.
Toward continuous push-based P2P live streamingIEEE Global Telecommunications Conf. (GLOBECOM) Topology with Archipelago
2012
Ahmad, M.Z.
Guha, R.
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computationJ. Supercomputing Topology with Archipelago
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Romano, D.
Enhancing the computation of distributed shortest paths on real dynamic networksMediterranean Conf. on Algorithms Topology with Archipelago
2012
Wachs, M.
Grothoff, C.
Thurimella, R.
Partitioning the InternetConf. on Risks and Security of Internet and Systems (CRiSIS) Topology with Archipelago
Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networksIEEE Conf. on Local Computer Networks (LCN) Topology with Archipelago
2012
Tyson, G.
Kaune, S.
Miles, S.
El-khatib, Y.
Mauthe, A.
Taweel, A.
A trace-driven analysis of caching in content-centric networksIEEE Conf. on Computer Communications and Networks (ICCCN) Topology with Archipelago
2012
Kambhampati, V.
Papadopolous, C.
Massey, D.
Epiphany: A location hiding architecture for protecting critical services from DDoS attacksIEEE/IFIP Conf. on Dependable Systems and Networks (DSN) Topology with Archipelago
2012
Fiorese, A.
Simoes, P.
Boavida, F.
Peer selection in P2P service overlays using geographical location criteriaComputational Science and Its Applications (ICCSA) Topology with Archipelago
2012
Xu, Y.
Zhang, X.
Analysis of Internet robustness in attacksConf. on Systems and Informatics (ICSAI) Topology with Archipelago
2012
Schlegel, R.
Wong, D.S.
Anonymous overlay network supporting authenticated routingInformation Sciences Topology with Archipelago
2012
Ren, D.
Chan, S.G.
Achieving high-bitrate overlay live streaming with proxy helpersPacket Video Workshop (PV) Topology with Archipelago
2012
Papadakis, H.
Fragopoulou, P.
Markatos, E.
Roussopoulos, M.
ITA: Innocuous topology awareness for unstructured P2P networksIEEE Trans. on Parallel and Distributed Systems Topology with Archipelago
Topology with BGP
2012
Faggiani, A.
Gregori, E.
Lenzini, L.
Mainardi, S.
Vecchio, A.
On the feasibility of measuring the internet through smartphone-based crowdsourcingSymp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) Topology with Archipelago
2012
Xu, Y.
Wang, Z.
Collapse by cascading failures in hybrid attacked regional InternetJ. Security and Its Applications Topology with Archipelago
2012
Jacquin, L.
Roca, V.
Kaafar, M.A.
Schuler, F.
Roch, J.-L.
IBTrack: an ICMP black holes trackerhal.archives-ouvertes.fr Topology with Archipelago
2012
Huang, H.
Zhang, B.
Chan, S.-H.G.
Cheung, G.
Frossard, P.
Coding and replication co-design for interactive multiview video streamingIEEE INFOCOM Topology with Archipelago
2012
Cicerone, S.
D'Angelo, G.
Di Stefano, G.
Frigioni, D.
Maurizio, V.
Engineering a new algorithm for distributed shortest paths on dynamic networksAlgorithmica Topology with Archipelago
2012
Wang, Y.
Su, S.
Yang, Y.
Ren, J.
A more efficient hybrid approach for single-packet IP tracebackEUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) Topology with Archipelago
Topology with Skitter
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Maurizio, V.
Engineering a new loop-free shortest paths routing algorithmSymp. on Experimental Algorithms (SEA) Topology with Archipelago
2011
Sommers, J.
Erikson, B.
Barford, P.
On the prevalence and characteristics of MPLS deployments in the open InternetInternet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2011
Zhang, Y.
Oliveira, R.
Wang, Y.
Su, S.
Zhang, B.
Bi, J.
Zhang, H.
Zhang, L.
A framework to quantify the pitfalls of using traceroute in AS-level topology measurementIEEE J. Selected Areas in Communications Topology with Archipelago
2011
Marchetta, P.
Merindol, P.
Donnet, B.
Pescape, A.
Pansiot, J.-J.
Topology discovery at the router level: a new hybrid tool targeting ISP networksIEEE J. Selected Areas in Communications Topology with Archipelago
Topology with Skitter
2011
Jesus, V.
Aguiar, R.L.
Steenkiste, P.
Topological implications of cascading interdomain bilateral traffic agreementsIEEE J. Selected Areas in Communications Topology with Archipelago
2011
Ahmad, M.Z.
Guha, R.
Internet exchange points and Internet routingConf. on Network Protocols (ICNP) Topology with Archipelago
2011
Moreira, M.D.D.
Laufer, R.
Fernandes, N.C.
Duarte, O.C.M.B.
A stateless traceback technique for identifying the origin of attacks from a single packetIEEE Conf. on Communications (ICC) Topology with Archipelago
2011
Gregori, E.
Lenzini, L.
Orsini, C.
k-clique communities in the Internet AS-level topology graphDistributed Computing Systems Workshops (ICDCSW) Topology with Archipelago
2011
Tomasik, J.
Weisser, M.-A.
Internet topology on as-level: Model, generation methods and toolIEEE Performance Computing and Communications Conf. (IPCC) Topology with Archipelago
Topology with BGP
2011
Gregori, E.
Lenzini, L
Orsini, C.
k-dense communities in the internet AS-level topologyConf. on Communication Systems and Networks (COMSNETS) Topology with Archipelago
2011
Gregori, E.
Improta, A.
Lenzini, L.
Orsini, C.
The impact of IXPs on the AS-level topology structure of the InternetComputer Communications Topology with Archipelago
2010
Fan, X.
Heidemann, J.
Selecting representative IP addresses for internet topology studiesInternet Measurement Conf. (IMC) Topology with Archipelago
2010
Beverly, R.
Berger, A.
Xie, G.G.
Primitives for active internet topology mapping: toward high-frequency characterizationInternet Measurement Conf. (IMC) Topology with Archipelago
2010
Ahmad, M.Z.
Guha, R.
Impact of Internet exchange points on Internet topology evolutionConf. on Local Computer Networks (LCN) Topology with Archipelago
Topology with Skitter
2010
Tomasik, J.
Weisser, M.-A.
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchyIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with Archipelago
2010
Knauf, A.
Hege, G.
Schmidt, T.C.
Wahlisch, M.
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIPPrinciples, Systems and Applications of IP Telecommunications (IPTComm) Topology with Archipelago
2010
Zhang, Y.
Oliveira, R.
Zhang, H.
Zhang, L.
Quantifying the pitfalls of traceroute in AS connectivity inferencePassive and Active Measurement (PAM) Topology with Archipelago
2010
Laki, S.
Matray, P.
Haga, P.
Sebok, T.
Csabai, I.
Vattay, G.
Spotter: a model based active geolocation serviceIEEE Conf. on Computer Communications (INFOCOM) Topology with Archipelago
2010
King, A.Efficient internet topology discovery techniquesUniv. Waikato, New Zealand Topology with Archipelago
2010
Ciceronea, S.
D'Angelo, G.
Di Stefanoa, G.
Frigioni, D.
Partially dynamic efficient algorithms for distributed shortest pathsTheoretical Computer Science Topology with Archipelago
2009
Zhang, G.-Q.
Zhang, G.-Q.
Cheng, S.-Q.
Zhou, T.
Symbiotic effect: A guideline for network modelingEPL (Europhysics Letters) Topology with Archipelago
2009
Germoglio, G.
Dias, B.
Sousa, P.
Automated and distributed network service monitoringAsia-Pacific Network Operations and Management Symp. (APNOMS) Topology with Archipelago
2009
Saucez, D.
Donnet, B.
Bonaventure, O.
On the impact of clustering on measurement reductionIFIP-TC6 Networking Conf. (NETWORKING) Topology with Archipelago
2009
Dai, L
Cao, Y.
Cui, Y.
Xue, Y.
On scalability of proximity-aware peer-to-peer streamingComputer Communications Topology with Archipelago
Topology with BGP
2008
Wu, M.-F.
Jiang, T.M.
Wu, A.
A virtual service framework for service composition QoS based on active measurementSymp. on Service-Oriented System Engineering (SOSE) Topology with Archipelago
2008
Dramburg, M.Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer InternettopologienHochschule fuer Angewandte Wissenschaften Hamburg, Germany Topology with Archipelago
Topology with Skitter
2008
Wahlisch, M.
Schmidt, T.C.
Spalt, W.
What is happening from behind?: Making the impact of internet topology visibleCampus-Wide Information Systems Topology with Archipelago
Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Ge, X.
Research on the distribution of network nodes based on multiple measurement pointsComputer Science Topology with Archipelago
2007
Li, C.
Zhao, H.
Zhang, X.
Yuan, S.
Analysis on traveling time of internetChina Institute of Communications Topology with Archipelago
2006
Chan, H.
Dash, D.
Perrig, A.
Zhang, H.
Modeling adoptability of secure BGP protocolsJoint Conf. on Measurement and Modeling of Computer Systems Topology with Archipelago
2005
Su, W.-J.
Zhao, H.
Xu, Y.
Zhang, W.-B.
Internet complex network separation degree analysis based on hopsJ. China Inst. of Communications Topology with Archipelago
2004
Panse, C.Visualizing Geo-Related Data Using CartogramsUniv. of Konstanz Topology with Archipelago
2017
Rula, J.
Bustamente, F.
Steiner, M.
Cell Spotting: Studying the Role of Cellular Networks in the InternetInternet Measurement Conf. (IMC) Topology with BGP
2017
Murdock, A.
Li, F.
Bramsen, P.
Durumeric, Z.
Paxson, V.
Target Generation for Internet-wide IPv6 ScanningACM Internet Measurement Conf. (IMC) Topology with BGP
2017
Goodchild, B.
Chiu, Y.
Hansen, R.
Lu, H.
Calder, M.
Luckie, M.
Lloyd, W.
Choffnes, D.
Katz-Bassett, E.
The Record Route Option is an Option!Internet Measurement Conf. (IMC) Topology with BGP
2017
Giotsas, V.
Smaragdakis, G.
Dietzel, C.
Richter, P.
Feldmann, A.
Berger, A.
Inferring BGP Blackholing Activity in the InternetInternet Measurement Conf. (IMC) Topology with BGP
2017
Nasr, M.
Zolfaghari, H.
Houmansadr, A.
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing AttacksConf. on Computer and Communications Security (SIGSAC) Topology with BGP
2017
Kotronis, V.
Nomikos, G.
Manassakis, L.
Mavrommatis, D.
Dimitropoulos, X.
Shortcuts through Colocation Facilitiesarxiv.org Topology with BGP
2017
Liu, Z.
Jin, H.
Hu, Y.
Bailey, M.
MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigationarxiv.org Topology with BGP
2017
Haghtalab, N.
Laszka, A.
Procaccia, A.
Vorobeychik, Y.
Koutsoukos, X.
Monitoring stealthy diffusionKnowledge and Information Systems Topology with BGP
2017
Canbaz, A.
Bakhshaliyev, K.
Gunes, M.
Analysis of path stability within autonomous systemsIntl Workshop on Measurement and Networking Topology with BGP
2017
Gregori, E.
Lenzini, L.
Luconi, V.
AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systemsComputer Communications Topology with BGP
2017
Burger, V.Wurzburger Beitrage zur Leistungsbewertung Verteilter SystemeUniv. Wurzburg Topology with BGP
2017
Antonakakis, M.
April, T.
Bailey, M.
Bernhard, M.
Bursztein, E.
Cochran, J.
Durumeric, Z.
Halderman, J.
Invernizzi, L.
Kallitsis, M.
Kumar, D.
Lever, C.
Ma, X.
Mason, J.
Menscher, D.
Seaman, C.
Sullivan, N.
Thomas, K.
Zhou, Y.
Understanding the Mirai BotnetUSENIX Security Symp. Topology with BGP
2017
Wachs, M.
Scheitle, Q.
Carle, G.
Push away your privacy: Precise user tracking based on TLS client certificate authenticationNetwork Traffic Measurement and Analysis Conf. Topology with BGP
2017
Reuter, A.
Bush, R.
Cunha, I.
Katz-Bassett, E.
Schmidt, T.
Wahlisch, M.
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filteringarxiv.org Topology with BGP
2017
Tang, B.
Xu, J.
He, H.
Man, H.
ADL: Active dictionary learning for sparse representationIntl Joint Conf. on Neural Networks Topology with BGP
2017
Tyson, G.
Huang, S.
Cuadrado, F.
Castro, T.
Perta, V.
Sathiaseelan, A.
Exploring HTTP Header Manipulation In-The-WildIntl Conf. on World Wide Web Topology with BGP
2017
Burger, V.Performance Evaluation and Optimization of Content Delivery NetworksJulius-Maximilians-Univ. Wurzburg Topology with BGP
2017
Yang, H.
Lam, S.S.
Scalable Verification of Networks With Packet Transformers Using Atomic PredicatesIEEE/ACM Trans. on Networking (TON) Topology with BGP
2017
Wang, Y.
Bi, J.
Zhang, K.
A SDN-Based Framework for Fine-Grained Inter-domain Routing DiversityMobile Networks and Applications Topology with BGP
2017
Tozal, M.E.Autonomous system ranking by topological characteristics: A comparative studyIEEE Intl Systems Conf. (SysCon) Topology with BGP
2017
Tozal, M.Policy-Preferred Paths in AS-level Internet Topology GraphsUniv. of Louisiana, Lafayette Topology with BGP
2017
Suen, J.Y.
Navlakha, S.
Using Inspiration from Synaptic Plasticity Rules to Optimize Traffic Flow in Distributed Engineered NetworksNeural Computation Topology with BGP
2017
Shin, K.
Rad, T.
Faloutsos, C.
Patterns and anomalies in k-cores of real-world graphs with applicationsKnowledge and Information Systems Topology with BGP
2017
Sermpezis, P.
Dimitropoulos, X.
Can SDN Accelerate BGP Convergence? A Performance Analysis of Inter-domain Routing Centralizationarxiv.org Topology with BGP
2017
Pacifici, V.
Dan, G.
Distributed Caching Algorithms for Interconnected Operator CDNsIEEE J. on Selected Areas in Communications Topology with BGP
2017
Nozaki, Y.
Golen, E.
Shenoy, N.
A modular architecture for scalable inter-domain routingIEEE Computing and Communication Workshop and Conf. (CCWC) Topology with BGP
2017
Muscoloni, A.
Cannistraci, C.V.
Local-ring network automata and the impact of hyperbolic geometry in complex network link-predictionarxiv.org Topology with BGP
2017
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.
Perrig, A.
Authentication Challenges in a Global EnvironmentACM Trans. on Privacy and Security (TOPS) Topology with BGP
2017
London, P.Distributed Optimization and Data Market DesignCalifornia Institute of Technology Topology with BGP
2017
Li, Z.
Levin, D.
Spring, N.
Bhattacharjee, B.
Longitudinal Analysis of Root Server Anycast InefficienciesUniv. of Maryland Topology with BGP
2017
Kuenzer, S.
Ivanov, A.
Manco, F.
Mendes, J.
Volchkov, Y.
Schmidt, F.
Yasukata, K.
Honda, M.
Huici, F.
Unikernels Everywhere: The Case for Elastic CDNsIntl Conf. on Virtual Execution Environments (SIGPLAN) Topology with BGP
2017
Jakub, J.Automatic classification of network entitiesCharles Univ. Topology with BGP
2017
Huth, M.
Fabian, B.
Inferring business relationships in the internet backboneIntl J. of Networking and Virtual Organisations Topology with BGP
2017
Hiran, R.
Carlsson, N.
Shahmehri, N.
Collaborative framework for protection against attacks targeting BGP and edge networksComputer Networks Topology with BGP
2017
Grailet, J.F.
Donnet, B.
Towards a Renewed Alias Resolution with Space Search Reduction and IP FingerprintingNetwork Traffic Measurement and Analysis Conf. (TMA) Topology with BGP
2017
Gasser, O.
Scheitle, Q.
Rudolph, B.
Denis, C.
Schriker, N.
Carle, G.
The Amplification Threat Posed by Publicly Reachable BACnet DevicesJ. of Cyber Security and Mobility Topology with BGP
2017
Fanou, R.
Francois, P.
Aben, E.
Mwangi, M.
Goburdhan, N.
Valera, F.
Four years tracking unrevealed topological changes in the african interdomainComputer Communications Topology with BGP
2017
Bublitz, S.Towards a BitTorrent Weather ForecastUniv. of Zurich Topology with BGP
2017
Bottger, T.
Cuadrado, F.
Uhlig, S.
Looking for Hypergiants in PeeringDBACM SIGCOMM Computer Communication Review Topology with BGP
2017
Bangera, P.
Gorinsky, S.
Ads versus Regular Contents: Dissecting the Web Hosting EcosystemIFIP Networking Conf. (NETWORKING) Topology with BGP
2017
Asharov, G.
Demmler, D.
Schapira, M.
Schneider, T.
Segev, G.
Shenker, S.
Zohner, M.
Privacy-Preserving Interdomain Routing at Internet ScaleProceedings on Privacy Enhancing Technologies Topology with BGP
2017
Almeida, R.
Fonseca, O.
Fazzion, E.
Guedes, D.
Meira, W.
Cunha, I.
A Characterization of Load Balancing on the IPv6 InternetIntl Conf. on Passive and Active Network Measurement Topology with BGP
2017
Al-Baghdadi, A.COMPUTING TOP-K CLOSENESS CENTRALITY IN UNWEIGHTED UNDIRECTED GRAPHS REVISITEDKent State University Topology with BGP
2016
Klick, J.
Lau, S.
Wahlisch, M.
Roth, V.
Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selectionInternet Measurement Conf. (IMC) Topology with BGP
2016
Jonker, M.
Sperotto, A.
van Rijswijk-Deij, R.
Sadre, R.
Pras, A.
Measuring the adoption of DDoS protection servicesInternet Measurement Conf. (IMC) Topology with BGP
2016
Comarela, G.
Terzi, E.
Crovella, M.
Detecting unusually-routed ASes: Methods and applicationsInternet Measurement Conf. (IMC) Topology with BGP
2016
Chung, T.
Liu, Y.
Choffnes, D.
Levin, D.
Maggs, B.M.
Mislove, A.
Wilson, C.
Measuring and applying invalid SSL certificates: The silent majorityInternet Measurement Conf. (IMC) Topology with BGP
2016
Chung, T.
Choffnes, D.
Mislove, A.
Tunneling for transparency: A large-scale analysis of end-to-end violations in the InternetInternet Measurement Conf. (IMC) Topology with BGP
2016
Liquori, L.
Sereno, M.
LogNet: Extending Internet with a network aware discovery serviceInria-French Inst. for Research in Computer Science Topology with BGP
2016
Ata, A.
Mustafa, M.
Tree-like structure in graphs and embedability to treesKent State Univ. Topology with BGP
2016
Bergamini, E.
Wegner, M.
Lukarski, D.
Meyerhenke, H.
Estimating current-flow closeness centrality with a multigrid Laplacian solverarxiv.org Topology with BGP
2016
Zhang, Y.
Wang, X.
Perrig, A.
Zheng, Z.
Tumbler: Adaptable link access in the bots-infested InternetComputer Networks Topology with BGP
2016
Sriram, K.
Montgomery, D.
McPherson, D.
Osterweil, E.
Dickson, B.
Problem Definition and Classification of BGP Route LeaksInternet Engineering Task Force Topology with BGP
2016
Singh, R.
Koo, H.
Miramirkhani, N.
Miraj F., Akoglu
L., Gill P.
The politics of routing: Investigating the relationship between AS connectivity and Internet freedomarxiv.org Topology with BGP
2016
Schuchard, M.
Hopper, N.
E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentivesarxiv.org Topology with BGP
2016
Hasan, S.A.U.The role of topology and contracts in Internet content deliveryUniv. of Carlos III de Madrid Topology with BGP
2016
Cardona, J.C.Inter-domain traffic management in an evolving Internet peering ecosystemUniv. Carlos III de Madrid Topology with BGP
2016
Li, S.
Duan, H.
Wang, Z.
Liang, J.
Li, X.
An accurate distributed scheme for detection of prefix interceptionScience China Information Sciences Topology with BGP
2016
Eppstein, D.
Goodrich, M.T.
Lam, J.
Mamano, N.
Mitzenmacher, M.
Torres, M.
Models and algorithms for graph watermarkingarxiv.org Topology with BGP
Topology with Skitter
2016
Zhao, M.
Zhou, W.
Gurney, A.J.T.
Haeberlen, A.
Sherr, M.
Loo, B.T.
Private and Verifiable Interdomain Routing DecisionsIEEE/ACM Trans. on Networking (TON) Topology with BGP
2016
Guo, C.
Karsten, M.
On the feasibility of core-rooted path addressingIEEE/IFIP Network Operations and Management Symp. (NOMS) Topology with BGP
2016
Sukrit, G.
Rami, P.
Konstantin, K.
Comparative network analysis using KronFitComplex Networks Topology with BGP
2016
Niemela, M.Estimating Internet-scale Quality of Service parameters for VoIPLinkoping Univ. Topology with BGP
2016
Frey, S.
Elkhatib, Y.
Rashid, A.
Follis, K.
Vidler, J.
Race, N.
Edwards, C.
It Bends But Would It Break? Topological Analysis of BGP Infrastructures in EuropeIEEE European Symp. on Security and Privacy (EuroSP) Topology with BGP
2016
Cardona, J.C.
Vissicchio, S.
Lucente, P.
Francois, P.
'I can't get no satisfaction': Helping autonomous systems identify their unsatisfied interdomain interestsIEEE Trans. on Network and Service Management Topology with BGP
2016
Agache, A.
Antichi, G.
Eberhardt, F.
Eggert, L.
Hasselmeyer, P.
Hohlfeld, O.
Honda, M.
Ivanov, A.
Kimmerlin, M.
Klauck, S.
Kommeri, J.
Lettieri, G.
Oechsner, S.
Plauth, M.
Raiciu, C.
Ripke, A.
Sarolahti, P.
Schulte, L.
Tsolakou, E.
Wojcik, M.
Initial design of cloud infrastructure and federation mechanismsSSICLOPS Topology with BGP
2016
Zhao, M.Accountability in distributed systems with incomplete informationUniv. of Pennsylvania Topology with BGP
2016
Zhang, X.
Moore, C.
Newman, M.E.J.
Random graph models for dynamic networksCornell University Topology with BGP
2016
Yuce, E.
Selcuk, A.A.
Server Notaries: A Complementary Approach to the Web PKI Trust ModelIACR Cryptology Topology with BGP
2016
Yang, Y.
Shi, X.
Yin, X.
Wang, Z.
The Power of Prefix Hijackings in the Internet HierarchyIEEE Trustcom/BigDataSE/ISPA Topology with BGP
2016
Wubbeling, M.
Meier, M.
Improved Calculation of aS Resilience against IP Prefix HijackingIEEE Conf. on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wassermann, S.
Casas, P.
Reverse Traceroute with DisNETPerf, a Distributed Internet Paths Performance AnalyzerIEEE Conf. on Local Computer Networks Topology with BGP
2016
Wassermann, S.
Casas, P.
Donnet, B.
Leduc, G.
Mellia, M.
On the Analysis of Internet Paths with DisNETPerf, a Distributed Paths Performance AnalyzerIEEE Conf. on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wang, Y.
Bi, J.
Zhang, K.
Wu, Y.
A framework for fine-grained inter-domain routing diversity via SDNIntl Conf. on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2016
Wang, C.
Li, Z.
Huang, X.
Zhang, P.
Inferring the average as path length of the InternetIEEE Intl Conf. on Network Infrastructure and Digital Content (IC-NIDC) Topology with BGP
2016
Varghese, J.S.
Ruan, L.
Computing Customer Cones of Peering NetworksApplied Networking Research Workshop Topology with BGP
2016
Tozal, M.E.Enumerating single destination, policy-preferred paths in AS-level Internet topology mapsIEEE Sarnoff Symp. Topology with BGP
2016
Tozal, M.E.The Internet: A system of interconnected autonomous systemsIEEE Systems Conf. (SysCon) Topology with BGP
2016
Teneva, N.
Mudrakarta, P.K.
Kondor, R.
Multiresolution Matrix CompressionIntl Conf. on Artificial Intelligence and Statistics Topology with BGP
2016
Syamkumar, M.
Durairajan, R.
Barford, P.
Bigfoot: A geo-based visualization methodology for detecting BGP threatsIEEE Symp. on Visualization for Cyber Security (VizSec) Topology with BGP
2016
Sobrinho, J.L.
Vanbever, L.
Le, F.
Sousa, A.
Rexford, J.
Scaling the Internet Routing System Through Distributed Route AggregationIEEE/ACM Trans. on Networking (TON) Topology with BGP
2016
Shao, X.
Wang, F.
Gao, L.
Fujikawa, K.
Harai, H.
Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the InternetIEEE Intl Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2016
Semertzidis, K.
Pitoura, E.
Terzi, E.
Tsaparas, P.
Best Friends Forever (BFF): Finding Lasting Dense Subgraphsarxiv.org Topology with BGP
2016
Schuchard, M.J.Adversarial Degradation of the Availability of Routing Infrastructures and Other Internet-Scale Distributed SystemsUniv. of Minnesota Topology with BGP
2016
Satake, K.
Arakawa, S.
Murata, M.
Analyses of core-periphery structure in Internet's AS-level topologiesGraduate School of Information Science and Technology, Osaka University Topology with BGP
2016
Revelo, D.
Ricci, M.A.
Donnet, B.
Alvarez-Hamlin, J.I.
Unveiling the MPLS Structure on Internet TopologyIntl Workshop on Traffic Monitoring and Analysis (TMA) Topology with BGP
2016
Pacifici, V.
Dan, G.
Coordinated selfish distributed caching for peering content-centric networksIEEE/ACM Trans. on Networking (TON) Topology with BGP
2016
Nasr, M.
Houmansadr, A.
GAME OF DECOYS: Optimal Decoy Routing Through Game TheoryConf. on Computer and Communications Security (SIGSAC) Topology with BGP
2016
Motamedi, R.Measurement-Based Characterization of Large-Scale Networked SystemsUniv. of Oregon Topology with BGP
2016
Machado, F.F.ANALYSIS OF THE DEGREE RANKING STABILITY IN SCALE-FREE NETWORKSFederal Univ. of Rio de Janeiro Topology with BGP
2016
Liu, Z.
Jin, H.
Hu, Y.C.
Bailey, M.
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the InternetConf. on Computer and Communications Security (SIGSAC) Topology with BGP
2016
Kriegel, P.DETERMINING THE LOCATION OF AUTONOMOUS SYSTEM RELATIONS AMONG TOP TIER INTERNET SERVICE PROVIDERS IN THE UNITED STATESUniv. of Oregon Topology with BGP
2016
Kotronis, V.
Kloti, R.
Rost, M.
Georgopoulos, P.
Ager, B.
Schmid, S.
Dimitropoulos, X.
Stitching Inter-Domain Paths over IXPsSymp. on SDN Research Topology with BGP
2016
Hoang, N.P.Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor NetworkGraduate School of Informatics, Kyoto University Topology with BGP
2016
Greunke, B.Distributed Emulation in Support of Large NetworksNaval Postgraduate School Topology with BGP
2016
Garcia-Robledo, A.
Diaz-Perez, A.
Morales-Luna, G.
Characterization and Coarsening of Autonomous System Networks: Measuring and Simplifying the InternetAdvanced Methods for Complex Network Analysis Topology with BGP
2016
Feng, Z.
Xu, M.
Yang, Y.
Revolutionizing the inter-domain business model by information-centric thinkingIEEE Intl Conf. on Communications (ICC) Topology with BGP
2016
Eberle, W.
Holder, L.
Identifying Anomalies in Graph Streams Using Change DetectionIntl Workshop on Mining and Learning with Graphs Topology with BGP
2016
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
Jumpstarting BGP Security with Path-End ValidationACM SIGCOMM Conf. Topology with BGP
2016
Chen, M.
Xu, M.
Li, Q.
Yang, Y.
Measurement of large-scale BGP events: Definition, detection, and analysisComputer Networks Topology with BGP
2016
Barton, A.
Wright, M.
DeNASA: Destination-Naive AS-Awareness in Anonymous CommunicationsProceedings on Privacy Enhancing Technologies Topology with BGP
2015
Wassermann, S.
Casas, P.
Donnet, B.
Towards DisNETPerf: a distributed Internet paths performance analyzerACM CoNEXT Student Workshop Topology with BGP
2015
Miyao, Y.Network operation system, network operation method and network operation programNec Corp. Topology with BGP
2015
Thai, M.Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving NetworksFlorida Univ. Topology with BGP
2015
Sosnovich, A.
Grumberg, O.
Nakibly, G.
Analyzing Internet routing security using model checkingLecture Notes in Computer Science Topology with BGP
2015
Miyao, Y.Network designing system, network designing method, data transfer path determination method and network designing program Nec Corp. Topology with BGP
2015
Meiling, S.
Schmidt, T.C.
Steinbach, T.
On performance and robustness of Internet-based smart grid communication: A case study for GermanyIntl Conf. on Smart Grid Communications (SmartGridComm) Topology with BGP
2015
Konte, M.Understanding and defending against internet infrastructures supporting cybecrime operationsGeorgia Institute of Technology Topology with BGP
2015
Johnson, A.
Jansen, R.
Jaggard, A.D.
Feigenbaum, J.
Syverson, P.
Avoiding the Man on the Wire: Improving Tor's security with trust-aware path selectionarxiv.org Topology with BGP
2015
Hirayama, T.
Toyoda, K.
Sasase, I.
Fast target link flooding attack detection scheme by analyzing traceroute packets flowIntl Workshop on Information Forensics and Security (WIFS) Topology with BGP
2015
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
One hop for RPKI, one giant leap for BGP securityWorkshop on Hot Topics in Networks Topology with BGP
2015
Chen, Z.
Bi, J.
Fu, Y.
Wang, Y.
Xu, A.
MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDNIntl Conf. on Network Protocols (ICNP) Topology with BGP
2015
Szabo, D.
Korosi, A.
Biro, J.
Gulyas, A.
Deductive way of reasoning about the Internet AS level topologyChin. Phys. B Topology with BGP
2015
Meslmawy, M.A.S.Efficient resources management in a ditributed computer system, modeled as a dynamic complex systemUniv. du Havre Topology with BGP
2015
Li, S.
Duan, H.
Wang, Z.
Li, X.
Route leaks identification by detecting routing loopsIntl Conf. on Security and Privacy in Communication Systems (SecureComm) Topology with BGP
2015
Lareida, A.
Petropoulos, G.
Burger, V.
Seufert, M.
Soursos, S.
Stiller, B.
Augmenting home routers for socially-aware traffic managementConf. on Local Computer Networks (LCN) Topology with BGP
2015
Konte, M.
Perdisci, R.
Feamster, N.
ASwatch: An AS reputation system to expose bulletproof hosting ASesACM SIGCOMM Computer Communication Review Topology with BGP
2015
Feng, Z.
Xu, M.
Yang, Y.
Li, Q.
Wang, Y.
Li, Q.
Ohlman, B.
Chen, M.
Joint optimization of content replication and Traffic Engineering in ICNConf. on Local Computer Networks (LCN) Topology with BGP
2015
Chiu, Y.-C.
Schlinker, B.
Radhakrishnan, A.B.
Katz-Bassett, E.
Govindan, R.
Are we one hop away from a better Internet?Internet Measurement Conf. (IMC) Topology with BGP
2015
Anwar, R.
Niaz, H.
Choffnes, D.
Cunha, I.
Gill, P.
Katz-Bassett, E.
Investigating interdomain routing policies in the wildInternet Measurement Conf. (IMC) Topology with BGP
2015
Ahmed, N.
Sarac, K.
An experimental study on inter-domain routing dynamics using IP-level path tracesConf. on Local Computer Networks (LCN) Topology with BGP
2015
Liu, B.
Bi, J.
DISCS: A DIStributed Collaboration System for Inter-AS Spoofing DefenseIntl Conf. on Parallel Processing (ICPP) Topology with BGP
2015
Yang, H.
Lam, S.S.
Scalable verification of networks with packet transformers using atomic predicatesUniv. Texas, Austin Topology with BGP
2015
Lee, T.
Szalachowski, P.
Barrera, D.
Perrig, A.
Lee, H.
Watrin, D.
Bootstrapping real-world deployment of future Internet architecturesarxiv.org Topology with BGP
2015
Kurar, B.
Tahboub, R.
Internet scale DoS attacksIntl J. of Applied Mathematics, Electronics and Computers Topology with BGP
2015
Heilman, E.
Kendler, A.
Zohar, A.
Goldberg, S.
Eclipse attacks on bitcoin's peer-to-peer networkUsenix Security Symp. Topology with BGP
2015
Cohen, N.
Coudert, D.
Lancin, A.
On Computing the Gromov HyperbolicityJ. of Experimental Algorithmics Topology with BGP
2015
Abu-Ata, M.
Dragan, F.F.
Metric tree-like structures in real-world networks: an empirical studyNetworks Topology with BGP
Topology with Skitter
2015
Yin, X.
Wu, D.
Wang, Z.
Shi, X.
Wu, J.
DIMR: Disjoint Interdomain Multipath RoutingComputer Networks Topology with BGP
2015
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type prediction in Internet AS graphsIowa State Univ. Topology with BGP
2015
Hoang, N.P.
Asano, Y.
Yoshikawa, M.
Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable TorIntl Conf. on Advanced Communication Technology (ICACT) Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Brief announcement: Routing the Internet with very few entriesSymp. on Principles of Distributed Computing (PODC) Topology with BGP
2015
Rye, E.C.Evaluating the limits of network topology inference via virtualized network emulationNaval Postgraduate School Topology with BGP
2015
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.-J.
Perrig, A.
Designing a global authentication infrastructurearxiv.org Topology with BGP
2015
Kamiyama, N.Analyzing Impact of Introducing CCN on Profit of ISPsIEEE Trans. on Network and Service Management Topology with BGP
2015
Dinh, T.N.
Thai, M.T.
Network under joint node and link attacks: Vulnerability assessment methods and analysisIEEE/ACM Trans. on Networking (TON) Topology with BGP
2015
Chen, C.
Matsumoto, S.
Perrig, A.
ECO-DNS: Expected consistency optimization for DNSIntl. Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2015
Tao, N.
Chen, X.
Fu, X.
AS path inference: From complex network perspectiveNetworking Conf. (IFIP) Topology with BGP
2015
Lee, J.Y.
Oh, J.C.
A node-centric reputation computation algorithm on online social networksApplications of Social Media and Social Network Analysis Topology with BGP
2015
Fonseca, O.
Fazzion, E.
Cunha, I.
Las-Casas, P.
Guedes, D.
Meira, W.
Hoepers, C.
Steding-Jessen, K.
Chaves, M.H.P.C.
A spam traffic cost analysis for network operatorsSymp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2015
D'Ignazio, A.
Giovannetti, E.
Predicting internet commercial connectivity wars: The impact of trust and operators' asymmetryIntl J. of Forecasting Topology with BGP
2015
Fanou, R.
Francois, P.
Aben, E.
On the diversity of interdomain routing in AfricaLecture Notes in Computer Science (LNCS) Topology with BGP
2015
Erunika, O.
Kaneko, K.
Taraoka, F.
Performance evaluation of host-based mobility management schemes in the InternetIntl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU) Topology with BGP
2015
Wang, H.
Cui, W.
Xiao, Y.
Tong, H.
Robust network construction against intentional attacksIntl Conf. on Big Data and Smart Computing (BIGCOMP) Topology with BGP
2015
Ascigil, M.O.Design of a Scalable Path Service for the InternetUniv. of Kentucky Topology with BGP
2015
Wang, M.
Zhou, H.
Chen, J.
OpenISMA: An Approach of Achieving a Scalable OpenFlow Network by Identifiers Separating and MappingIntl Symp. on Parallel Architectures, Algorithms and Programming (PAAP) Topology with BGP
2015
Shah, A.
Papadopoulos, C.
Characterizing International BGP DetoursColorado State University Technical Report Topology with BGP
2015
Nakata, Y.
Arakawa, S.
Murata, M.
A provider and peer selection policy for the future sustainable internetIntl J. of Management and Network Economics Topology with BGP
2015
Masatoshi, E.
Hayama, H.
Tsuyoshi, O.
Yamaguchi, Y.
A Proposal of Estimation Method of Consumed Memory Amount by Regression Analysis for Constructing AS Emulation Environment by Virtual ComputerNara Institute of Science and Technology Topology with BGP
2015
Leskovec, J.
Lang, K.J.
Dasgupta, A.
Mahoney, M.W.
Large-scale community structure in social and information networksCarnegie Mellon, Univ. Topology with BGP
2015
Kloti, R.
Kotronis, V.
Ager, B.
Dimitropoulos, X.
Policy-compliant path diversity and bisection bandwidthIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2015
Hu, X.Y.
Gong, J.
Multipath inter-domain routing for named data networkingJ. on Communications Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Router in Internet with fifteen entriesFrancophone Meeting on Algorithmic Aspects of Telecommunications Topology with BGP
2015
Eikema, B.BGP Routing Security and Deployment StrategiesUniv. of Amsterdam Topology with BGP
2015
Eberle, W.
Holder, L.
Scalable anomaly detection in graphsIntelligent Data Analysis Topology with BGP
2015
Acedo, J.C.Evolution of the Internet topology from a regional perspectiveUniv. of Arizona Topology with BGP
2014
Palacin, M.
Bikfalvi, A.
Oliver, M.
Mercury: Revealing hidden interconnections between access ISPs and content providersEUNICE Topology with BGP
2014
Johnson, T.
Lazos, L.
Network anomaly detection using autonomous system flow aggregatesIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2014
Ahmed, N.
Kamil, Sarac
Measuring path divergence in the InternetIntl Conf. on Performance Computing and Communications (IPCCC) Topology with BGP
2014
Lodhi, A.H.The economics of internet peering interconnectionsGeorgia Inst. of Technology Topology with BGP
2014
Kamiyama, N.CCN economics: Can ISPs profit by introducing CCN?Intl Conf. on Network and Service Management (CNSM) and Workshop Topology with BGP
2014
Yang, H.
Lam, S.S.
Collaborative verification of forward and reverse reachability in the Internet data planeIEEE Intl Conf. on Network Protocol (ICNP) Topology with BGP
2014
Sousa, A.C.M.Scaling the Internet routing system through route aggregationTecnico Lisboa Topology with BGP
2014
Sha, Z.
Panchal, J.
Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice modeIntl Conf. on Systems, Man, and Cybernetics (SMC) Topology with BGP
2014
Retvari, G.
Szabo, D.
Gulyas, A.
Korosi, A.
Tapolcai, J.
An information-theoretic approach to routing scalabilityWorkshop on Hot Topics in Networks (HotNets) Topology with BGP
2014
Gamperli, A.
Kotronis, V.
Dimitropoulos, X.
Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation frameworkSIGCOMM Computer Communication Review Topology with BGP
2014
Eberle, W.
Holder, L.
A partitioning approach to scaling anomaly detection in graph streamsIntl. Conf. on Big Data Topology with BGP
2014
Antikainen, M.
Aura, T.
Sarela, M.
Denial-of-service attacks in bloom-filter-based forwardingIEEE/ACM Trans. on Networking (TON) Topology with BGP
2014
Wang, J.M.
Dai, X.
Bensaou, B.
Content peering in content centric networksIEEE Conf. on Local Computer Networks Topology with BGP
2014
Wu, X.
Griffioen, J.
Supporting application-based route selectionIntl Conf. on Computer Communication and Networks (ICCCN) Topology with BGP
2014
Nozaki, Y.Tiered Based Addressing in Internetwork Routing Protocols for the Future InternetRochester Institute of Technology Topology with BGP
2014
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing the Impact of Cascading Failures on the Interdomain Routing System of the InternetNew Generation Computing Topology with BGP
2014
Sankey, J.
Wright, M.
Dovetail: stronger anonymity in next-generation Internet routingIntl Symp. on Privacy Enhancing Technologies (PETS) Topology with BGP
2014
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols?Computer Networks Topology with BGP
2014
Bangera, P.
Gorinsky, G.
Economics of traffic attraction by transit providersIFIP Networking Conf. Topology with BGP
2014
Ascigil, O.
Calvert, K.L.
Griffioen, J.N.
On the scalability of interdomain path computationsNetworking Conf. (IFIP) Topology with BGP
2014
Amaral, P.
Bernardo, L.
Pinto, P.F.
Multipath policy routing for the inter-domain scenarioIntl Conf. on Communications (ICC) Topology with BGP
2014
Zhu, M.
Li, J.
Liu, Y.
Li, D.
Wu, J.
TED: Inter-domain traffic engineering via deflectionIntl Symp. of Quality of Service (IWQoS) Topology with BGP
2014
Zhu, M.
Liu, Y.
Li, J.
Wu, J.
CCOF: Congestion control on the fly for inter-domain routingIntl Workshop on Local and Metropolitan Area Networks (LANMAN) Topology with BGP
2014
Qazi, S.
Moors, T.
Disjoint-path selection in Internet: What traceroutes tell us?arxiv.org Topology with BGP
2014
Li, M.
Wang, H.
Yang, J.
Li, C.
A value based framework for provider selection of regional ISPsSymp. on Network Operations and Management (NOMS) Topology with BGP
Topology with Skitter
2014
Borici, A.
Thomo, A.
Semantic graph compression with hypergraphsIntl Conf. on Advanced Information Networking and Applications Topology with BGP
2014
Visala, K.
Keating, A.
Khan, R.H.
Models and tools for the high-level simulation of a name-based interdomain routing architectureComputer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2014
Sha, Z.
Panchal, J.H.
Estimating local decision-making behavior in complex evolutionary systemsJ. of Mechanical Design Topology with BGP
2014
Sahhaf, S.
Tavernier, W.
Colle, D.
Pickavet, M.
Demeester, P.
Availability analysis of resilient geometric routing on Internet topologyIntl Conf. on Design of Reliable Communication Networks (DRCN) Topology with BGP
2014
Hasan, S.
Gorinsky, S.
Dovrolis, C.
Sitaraman, R.K.
Trade-offs in optimizing the cache deployments of CDNsIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2014
Chen, K.
Fhoffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P usersIEEE Trans. on Computers Topology with BGP
2014
Mazloum, R.
Buob, M.-O.
Auge, J.
Baynat, B.
Ross, D.
Friedman, T.
Violation of interdomain routing assumptionsPassive and Active Measurement (PAM) Topology with BGP
2014
Laszka, A.
Johnson, B.
Grossklags, J.
Felegyhazi, M.
Estimating systematic risk in real-world networksConf. on Financial Cryptography and Data Security Topology with BGP
2014
Shi, J.
Zhang, B.
Making inter-domain routing power-aware?Intl conf. on Computing, Networking and Communications (ICNC) Topology with BGP
2014
Houmansadr, A.
Wong, E.L.
Shmatikov, V.
No direction home: The true cost of routing around decoysNetwork and Distributed System Security Symp. (NDSS) Topology with BGP
2014
Tan, F
Wu, J.
Xia, Y.
Tse, C.K.
Traffic congestion in interconnected complex networksarxiv.org Topology with BGP
2014
Hiran, R.
Carlsson, N.
Shahmehri, N.
PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based securityACM Workshop on Information Sharing and Collaborative Security Topology with BGP
2014
Geva, M.
Herzberg, A.
Gev, Y.
Bandwidth Distributed Denial of Service: Attacks and defensesIEEE Security and Privacy Topology with BGP
2013
Lee, S.B.
Kang, M.S.
Gligor, V.D.
CoDef: Collaborative defense against large-scale link-flooding attacksACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eriksson, B
Durairajan, R.
Barford, P.
RiskRoute: A framework for mitigating network outage threatsACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eberle, W.
Holder, L.
Incremental anomaly detection in graphsIntl Conf. on Data Mining Workshops Topology with BGP
2013
Gersch, J.
Massey, D.
Characterizing vulnerability to IP hijack attemptsIEEE Intl Conf. on Technologies for Homeland Security (HST) Topology with BGP
2013
Zhao, M.
Aditya, P.
Chen, A.
Lin, Y.
Haeberlen, A.
Druschel, P.
Maggs, B.
Wishon, B.
Ponec, M.
Peer-assisted content distribution in Akamai NetSessionInternet Measurement Conf. (IMC) Topology with BGP
2013
Papadopoulos, S.
Theodoridis, G.
Tzovaras, D.
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomaliesVisualization for Cyber Security (VizSec) Topology with BGP
2013
Karaarslan, E.
Perez, A.G.
Siaterlis, C.
Recreating a large-scale BGP incident in a realistic environmentInformation Sciences and Systems , Proc Intl Symp. on Computer and Information Sciences Topology with BGP
2013
Bangera, P.
Gorinsky, S.
An economic perspective on traffic attraction by Internet transit providersIEEE Intl Conf. on Network Protocols (ICNP) Topology with BGP
2013
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attackHong Kong Univ. of Science and Technology Topology with BGP
UCSD Network Telescope
2013
Meirom, E.A.
Mannor, S.
Orda, A.
Network formation games and the Internet structurearxiv.org Topology with BGP
2013
Lian, W.
Rescorla, E.
Shacham, H.
Savage, S.
Measuring the practical impact of DNSSEC deploymenUsenix Security Conf. (SEC) Topology with BGP
2013
Lee, J.Y.
Oh, J.C.
A model for recursive propagations of reputations in social networksIEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2013
Wang, Y.
Wang, Z.
Zhang, L.
An epidemic-dynamics-based model for CXPST spreading in inter-domain routing systemIntl Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA) Topology with BGP
2013
Nappa, A.
Rafique, M.Z.
Caballero1, J.
Driving in the cloud: An analysis of drive-by download operations and abuse reportingIntl Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing survivability of inter-domain routing system under cascading failuresFrontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC) Topology with BGP
2013
Kaur, B.
Kahlon, K.S.
Sharma, S.
Inter-domain routing with shielded infrastructure and buzzer techniqueIntl J. of Computer Applications Topology with BGP
2013
Pacifici, V.
Dan, G.
Stable content-peering of autonomous systems in a content-centric networkSwedish National Computer Networking Workshop (SNCNW) Topology with BGP
2013
Misseri, X.
Gojmerac, I.
Rougier, J.-L.
IDRD: Enabling inter-domain route diversityIEEE Intl Conf. on Communications (ICC) Topology with BGP
2013
Lehrieder, F.Performance evaluation and optimization of content distribution using overlay networksJulius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE Topology with BGP
2013
Sankey, J.MDovetail: stronger anonymity in next-generation Internet routingUniv. Texas, Arlington, TX, US Topology with BGP
2013
Jiang, J.
Luo, J.
Li, W.
Lu, Y.
Constraint conditions to eliminate AS incentive of lying in interdomain routingSymp. on Integrated Network Management (IM) Topology with BGP
2013
Hsiao, H.-C.
Kim, T.H.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.
Perrig, A.
STRIDE: Sanctuary Trail - Refuge from Internet DDoS EntrapmentACM SIGSAC Symp. on Information, computer and communications security (ASIACSS) Topology with BGP
2013
Pacifici, V.
Dan, G.
Content-peering dynamics of autonomous caches in a content-centric networkIEEE INFOCOM Topology with BGP
2013
Neudorfer, L.
Shavitt, Y.
Zilberman, N.
Improving AS relationship inference using PoPsIEEE INFOCOM Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
Taenaka, Y.
Hazeyama, H.
PhishCage: reproduction of fraudulent websites in the emulated InternetIntl ICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
COSMO - Emulation of Internet traffic (poster abstract)Intl ICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyachi, T.
Miwa, S.
Design and implementation of XBurnerIntl ICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Marchetta, P.
de Donato, W.
Pescape, A.
Detecting third-party addresses in traceroute traces with IP timestamp optionPassive and Active Measurement (PAM) Topology with BGP
2013
Camacho, J.M.
Garcia-Martinez, A.
Bagnulo, M.
Valera, F.
BGP-XM: BGP eXtended multipath for transit Autonomous SystemsComputer Networks Topology with BGP
2013
Matsuda, K.
Hasegawa, G.
Kamei, S.
Murata, M.
A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurementIEICE Trans. on Information and Systems Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
A study of IP prefix hijacking in cloud computing networksSecurity Comm. Networks Topology with BGP
2013
Qin, D.
Yang, J.
Wang, H.
Experimental study on diversity and novelty of interdomain pathsChinese J. of Electronics Topology with BGP
2013
Palacin, M.
Oliver, M.
Infante, J.
Oechsner, S.
Bikfalvi, A.
The impact of content delivery networks on the Internet ecosystemJ. of Information Policy Topology with BGP
2013
Moses, K.V.Improving IP-based geo-location through Internet topology and geospatial datasetsDuke Univ., Durham, NC, US Topology with BGP
2013
Mislove, A.
Koppula, H.S.
Gummadi, K.P.
Druschel, P.
Bhattacharjee, B.
An empirical validation of growth models for complex networksDynamics On and Of Complex Networks Topology with BGP
2013
Erola, P.
Gomez, S.
Arenas, A.
On the routability of the InternetDynamics On and Of Complex Networks Topology with BGP
2013
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-Betweenness vertices from heterogeneous networksThe Influence of Technology on Social Network Analysis and Mining, Ch. 11 Topology with BGP
2012
Vasilakos, X.
Katsaros, K.
Xylomenos, G.
Cloud computing for global name-resolution in information-centric networksIEEE Symp. on Network Cloud Computing and Applications (NCCA) Topology with BGP
2012
Meyer, S.
Wahlisch, M.
Schmidt, T.C.
Exploring reachability via settlement-free peeringACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2012
Ekbatani, H.R.Investigating the mutual impact of the P2P overlay and the AS-level underlayUniv. Oregon, Eugene, OR, US Topology with BGP
2012
Schuchard, M.
Geddes, J.
Thompson, C.
Hopper, N.
Routing around decoysACM Conf. on Computer and Communications Security (CCS) Topology with BGP
2012
Dinh, T.N.
Shen, Y.
Thai, M.T.
An efficient spectral bound for link vulnerability assessment in large-scale networksIEEE Military Communications Conf. (MILCOM) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
A tale of nine Internet exchange points: studying path latencies through major regional IXPsIEEE Conf. on Local Computer Networks (LCN) Topology with BGP
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the Internet evolutionNetwork Operations and Management Symp. (APNOMS) Topology with BGP
2012
Juen, J.Protecting anonymity in the presence of autonomous system and internet exchange level adversariesUniv. Illinois, Urbana-Champaign Topology with BGP
2012
Cohen, N.
Couderty, D.
Lancin, A.
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphsProject-Team MASCOTTE, INRIA Topology with BGP
2012
Burger, V.
Lehrieder, F.
Hossfeld, T.
Seedorf, J.
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarmsTeletraffic Congress (ITC) Topology with BGP
2012
Rajahalma, J.Inter-domain incentives and Internet architectureAalto Univ., FI Topology with BGP
2012
Orman, G.K.
Labatut, V.
Cherifi, H.
Comparative evaluation of community detection algorithms: a topological approachJ. Stat. Mechanics: Theory and Experiment Topology with BGP
2012
Gjoka, M.
Kurant, M.
Markopoulou, A.
2.5K-graphs: from sampling to generationarxiv.org Topology with BGP
2012
Beben, A.
Batalla, J.M.
Chai, W.K.
Sliwinski, J.
Multi-criteria decision algorithms for efficient content delivery in content networksAnn. Telecommunications Topology with BGP
2012
Ager, B.
Chatzis, N.
Feldmann, A.
Sarrar, N.
Uhlig, S.
Willinger, W.
Anatomy of a large European IXPACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2012
Sherry, J.
Kim, D.
Mahalingam, S.
Tang, A.
Wang, S.
Ratnasamy, S.
Netcalls: End host function calls to network traffic processing servicesUC Berkeley Topology with BGP
2012
Fujikawa, K.
Tazaki, H.
Harai, H.
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS networkSymp. on Applications and the Internet (SAINT) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Evaluating end-user network benefits of peering with path latenciesIEEE Conf. on Computer Communications and Networks (ICCCN) Topology with BGP
2012
Tomasik, J.
Weisser, M.-A.
The inter-domain hierarchy in measured and randomly generated AS-level topologiesIEEE Conf. on Communications (ICC) Topology with BGP
2012
Sobrinho, J.L.
Tiago Quelhas, T.
A theory for the connectivity discovered by routing protocolsIEEE/ACM Trans. on Networking (TON) Topology with BGP
2012
Keating, A.Models for the simulation of a name-based interdomain routing architectureAalto Univ., FI Topology with BGP
2012
Hsiao, H.-C.
Kim, T.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.D.
Perrig, A.
Sanctuary trail: refuge from Internet DDoS entrapmentCarnegie Mellon Univ. Topology with BGP
2012
Deng, W.
Muhlbauer, W.
Yang, Y.
Zhu, P.
Lu, X.
Plattner, B.
Shedding light on the use of AS relationships for path inferenceJ. Communications and Networks Topology with BGP
2012
Cesareo, J.
Karlin, J.
Schapira, M.
Rexford, J.
Optimizing the placement of implicit proxiesPrinceton Univ. Topology with BGP
2012
Cesareo, J.Optimizing implicit proxy placement to evade traffic filtersPrinceton Univ. Topology with BGP
2012
Tozal, M.E.
Sarac, K.
Estimating network layer subnet characteristics via statistical samplingIntl IFIP TC 6 Networking Conf., Part I Topology with BGP
2012
Seibert, J.Security and economic implications of localizing traffic in overlay networksPurdue Univ. Topology with BGP
2012
Saucez, D.
Donnet, B.
On the dynamics of locators in LISPNetworking Topology with BGP
2012
Nozaki, Y.
Tuncer, H.
Shenoy, N.
ISP tiered model based architecture for routing scalabilityIEEE Conf. on Communications (ICC) Topology with BGP
2012
Liu, Y.
Su, J.
Chang, R.K.C.
LDC: Detecting BGP prefix hijacking by load distribution changeParallel and Distributed Processing Symp. Workshops (IPDPSW) Topology with BGP
2012
Hasan, S.
Gorinsky, S.
Obscure giants: detecting the provider-free ASesNetworking Topology with BGP
2012
Chaudhury, A.
Basuchowdhuri, P.
Majumder, S.
Spread of information in a social network using influential nodesAdvances in Knowledge Discovery and Data Mining Topology with BGP
2012
Chai, W.K.
He, D.
Psaras, I.
Pavlou, G.
Cache 'less for more' in information-centric networksNetworking Topology with BGP
2012
Pasquini, R.
Verdi, F.L.
Magalhaes, M.F.
Towards local routing state in the future internetWPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2012
Liu, H.
Hu, X.
Zhao, D.
Lu, X.
Failure isolation based defense against Internet CXPST-like attackJ. Hybrid Information Technology Topology with BGP
2012
Strowes, S.D.
Perkins, C.
Harnessing Internet topological stability in Thorup-Zwick compact routingIEEE INFOCOM Topology with BGP
2012
Sobrinho, J.L.
Le, F.
A fresh look at inter-domain route aggregationIEEE INFOCOM Topology with BGP
2012
Ribeiro, B.
Basu, P.
Towsley, D.
Multiple random walks to uncover short paths in power law networksIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Qin, D.
Yang, J.
Liu, Z.
Wang, H.
Zhang, B.
Zhang, W.
AMIR: Another multipath interdomain routingIEEE Conf. on Advanced Information Networking and Applications (AINA) Topology with BGP
2012
Lutu, A.
Bagnulo, M.
Stanojevic, R.
An economic side-effect for prefix deaggregationIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Grey, M.
Rossberg, M.
Schaefer, G.
Automatic creation of VPN backup paths for improved resilience against BGP-attackersACM Symp. on Applied Computing (SAC) Topology with BGP
2012
Qin, D.
Yang, J.
Wang, H.
Zhang, B.
Gao, L.
Liu, Z.
Multipath interdomain routing via deviation from primary pathConf. on Information Networking (ICOIN) Topology with BGP
2012
Edwards, B.
Hofmeyr, S.
Stelle, G.
Forrest, S.
Internet topology over timearxiv.org Topology with BGP
2012
Wei, W.
Yingjie, X.
Yabo, D.
ASTVA: DDoS-limiting architecture for Next Generation InternetAdv. Materials Research Topology with BGP
2012
Chen, Y.
Le Merrer, E.
Li, Z.
Yaning Liu, Y.
Simon, G.
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTVComputer Networks Topology with BGP
2011
Drivere, A.A.Can we study the topology of the Internet from the vantage points of large and small content providers?Youngstown State Univ. Topology with BGP
2011
Liu, Y.
Peng, W.
Su, J.
Study on IP prefix hijacking in cloud computing networks based on attack planningConf. on Trust, Security and Privacy in Computing and Communications (TrustCom) Topology with BGP
2011
Chen, M.
Yu, L.
Bai, H.
Two propositions about geographical distributions of BitTorrent file resourcesConf. on Informatics, Cybernetics, and Computer Engineering (ICCE) Topology with BGP
2011
Takahashi, Y.
Ishibashi, K.
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted trafficConf. on Network Games, Control and Optimization (NetGCooP) Topology with BGP
2011
Kurant, M.
Markopoulou, A.
Towards unbiased BFS samplingIEEE J. Selected Areas in Communications Topology with BGP
2011
Gjoka, M.
Kurant, M.
Butts, C.T.
Markopoulou, A.
Practical recommendations on crawling online social networksIEEE J. Selected Areas in Communications Topology with BGP
2011
Zhang, B.-F.
Li, Y.
Liu, Y.-J.
Su, J.-S.
Analysis of prefix hijacking based on AS hierarchical modelConf. on Network and System Security (NSS) Topology with BGP
2011
Szekeres, A.Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failuresUniv. Politehnica of Bucharest and Vrije Univ. Amsterdam Topology with BGP
2011
Alvarez-Hamelin, J.I.
Anunziata, D.
Beiro, M.G.
Barrat, A.
Dall'Asta, L.
Vespignani, A.
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool)Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires Topology with BGP
2011
Wong, E.L.
Shmatikov, V.
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routingConf. on Dependable Systems and Networks (DSN) Topology with BGP
2011
Strowes, S.D.
Mooney, G.
Perkins, C.
Compact routing on the Internet AS-graphIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2011
Liu, Y.
Dai, B.
Zhu, P.
Su, J.
Whom to convince? It really matters in BGP prefix hijacking attack and defenseFuture Information Technology Topology with BGP
2011
Karaoglu, H.T.
Yuksel, M.
Gunes, M.H.
On the scalability of path exploration using opportunistic path-vector routingIEEE Conf. on Communications (ICC) Topology with BGP
2011
Helminger, M.Interactive visualization of global routing dynamicsTechnische Univ. Muenchen, Faculty of Informatics Topology with BGP
2011
Amaral, P.
Silva, E.
Bernardo, L.
Pinto, P.
Inter-domain traffic engineering using an AS-level multipath routing architectureIEEE Conf. on Communications (ICC) Topology with BGP
2011
Siritana, H.
Kitisin, S.
Gertphol, S.
A study of autonomous system relationships within ThailandConf. on Computer Science and Software Engineering (JCSSE) Topology with BGP
2011
Akashi, O.Analysis of cooperative management strategies against route-hijackingIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
Topology with Skitter
2011
Scholz, J.
Greiner, M.
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metricsEPL (Europhysics Letters) Topology with BGP
Topology with Skitter
2011
Deng, W.
Zhu, P.
Xiong, N.
Xiao, Y.
Xiaofeng, H.
How resilient are individual ASes against AS-level link failures?IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2011
Deng, W.
Karaliopoulos, M.
Muehlbauer, W.
Zhu, P.
Lu, X.
Plattner, B.
k-Fault tolerance of the Internet AS graphComputer Networks Topology with BGP
2011
Wu, H.
Kvizhinadze, G.
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequenciesStatistics and Probability Letters Topology with BGP
2011
Melnik, S.
Hackett, A.
Porter, M.A.
Mucha, P.J.
Gleeson, J.P.
The unreasonable effectiveness of tree-based theory for networks with clusteringPhys. Rev. E Topology with BGP
Topology with Skitter
2011
Bangera, P.
Gorinsky, S.
Impact of prefix hijacking on payments of providersConf. on Communication Systems and Networks (COMSNETS) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing systemJ. of Next Generation Information Technology Topology with BGP
2010
Rasti, A.H.
Magharei, N.
Rejaie, R.
Willinger, W.
Eyeball ASes: from geography to connectivityInternet Measurement Conf. (IMC) Topology with BGP
2010
Huang, D.
Zhao, J.
Wang, X.
Trading bandwidth for playback lag: Can active peers help?Multi-media Conf. Topology with BGP
2010
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols?ACM SIGCOMM Computer Communication Review Topology with BGP
2010
Asai, H.
Esaki, H.
Towards interdomain transit traffic reduction in peer-assisted content delivery networksSymp. on Telecommunications Network Strategy and Planning (NETWORKS) Topology with BGP
2010
Asai, H.
Esaki, H.
Estimating AS relationships for application-layer traffic optimizationWorkshop on Incentives, Overlays, and Economic Traffic Control (ETM) Topology with BGP
2010
Hanif, S.Impact of topology on BGP convergenceDept. Computer Science, VU Univ. Amsterdam Topology with BGP
2010
Guo, T.
Wang, N.
Tafazolli, R.
Moessner, K.
Policy-aware virtual relay placement for inter-domain path diversityIEEE Symp. on Computers and Communications (ISCC) Topology with BGP
2010
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-betweenness verticesConf. on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2010
Elena, E.
Rougier, J.
Secci, S.
Characterisation of AS-level path deviations and multipath in Internet routingEURO-NF Conf. on Next Generation Internet (NGI) Topology with BGP
2010
Vilhar, A.
Novak, R.
Kandus, G.
The impact of network topology on the performance of MAP selection algorithmsComputer Networks Topology with BGP
2010
Tarkoma, S.
Antikainen, M.
Canopy: publish/subscribe with upgraph combinationIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Rajahalme, J.Incentive-informed inter-domain multicastIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Hu, C.
Chen, K.
Chen, Y.
Liu, B.
Evaluating potential routing diversity for internet failure recoveryIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Dou, B-L
Wang, X-G
Zhang, S-Y
Robustness of networks against cascading failuresPhysica A: Statistical Mechanics and its Applications Topology with BGP
2010
Xuan, Q.
Du, F.
Wu, T-J
Partially ordered sets in complex networksJ. Phys. A: Math. Theor. Topology with BGP
2010
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Bonaventura, O.
Extracting intra-domain topology from mrinfo probingPassive and Active Measurement (PAM) Topology with BGP
2010
DiBenedetto, S.
Stone, A.
Strout, M.
Massey, D.
Simulating internet scale topologies with metaroutingColorado State Univ. Topology with BGP
2010
Chen, K.
Hu, C.
Zhang, W.
Chen, Y.
Liu, B.
On the eyeshots of BGP vantage pointsIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2010
Amaral, P.
Ganhao, F.
Assuncao, C.
Bernardo, L.
Pinto, P.
Scalable multi-region routing at inter-domain levelIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
A study of hinge-transmit property of BGP routing systemForum on Computer Science-Technology and Applications (IFCSTA) Topology with BGP
2009
Strowes, S.D.
Perkins, C.
Deterministic, reduced-visibility inter-domain forwardingACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Rajahalme, J.
Sarela, M.
Visala, K.
Riihijarvi, J.
Inter-domain rendezvous service architecturePSIRP (TR09-003) Topology with BGP
2009
Miller, K.
Eliassi-Rad, T.
Continuous time group discovery in dynamic graphsWorkshop on Analyzing Networks and Learning with Graphs (NIPS) Topology with BGP
2009
Chen, K.
Choffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P usersACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Merindol, P.
Van den Schrieck, V.
Donnet, B.
Bonaventure, O.
Pansiot, J.-J.
Quantifying ASes multiconnectivity using multicast informationInternet Measurement Conf. (IMC) Topology with BGP
2009
Studer, A.
Perrig, A.
The coremelt attackSymp. on Research in Computer Security (ESORICS) Topology with BGP
2009
Shu, W.
Changjia, C.
Backup routing for BGP: Virtual ring routing schemeIEEE Conf. on Computer Science and Information Technology (ICCSIT) Topology with BGP
2009
Avramopoulos, I.
Suchara, M.
Protecting DNS from routing attacks: a comparison of two alternative anycast implementationsIEEE Security and Privacy Topology with BGP
2009
Yang, G.
Dou, W.
An efficient algorithm for AS path inferringConf. on Hybrid Information Technology Topology with BGP
2009
Miwa, S.
Suzuki, M.
Hazeyama, H.
Uda, S.
Miyachi, T.
Kadobayashi, Y.
Shinoda, Y.
Experiences in emulating 10K AS topology with massive VM multiplexingACM workshop on Virtualized infrastructure systems and architectures Topology with BGP
2009
Cittadini, L.
Rimondini, M.
Corea, M.
Di Battista, G.
On the feasibility of static analysis for BGP convergenceIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
2009
Asai, H.
Esaki, H.
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNsAsia Future Internet summer school, Jeju, Korea Topology with BGP
2009
Amaral, P.
Bernardo, L.
Pinto, P.
DTIA: An Architecture for Inter-Domain RoutingIEEE Conf. on Communications (ICC) Topology with BGP
2009
Bui, Q.D.
Jennings, A.
Relay node selection in large-scale VoIP overlay networksConf. on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2009
Xu, Y.
Zhang, W.
A power-law approach on router-level internet macroscopic topology modelingFuzzy Information and Engineering, Volume 2 Topology with BGP
2009
Shavitt, Y.
Shir, E.
Weinsberg, U.
Near-deterministic inference of AS relationshipsConf. on Telecommunications (ConTEL) Topology with BGP
2009
Asai, H.
Esaki, H.
A methodology for magnitude-based inter-AS distance estimationWIT, Hokkaido, Japan Topology with BGP
2009
Di Menna, A.
Refice, T.
Cittadini, L.
Di Battista, G.
Measuring route diversity in the internet from remote vantage pointsIEEE Conf. on Networking (ICN) Topology with BGP
2009
D'Ignazio, A.
Giovannetti, E.
Asymmetry and discrimination in Internet peering: evidence from the LINXJ. Industrial Organization Topology with BGP
2009
Weinsberg, U.
Shavitt, Y.
Shir, E.
Near-deterministic inference of AS relationshipsIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2009
Liu, B.
Cui, Y.
Lu, Y.
Xue, Y.
Locality-awareness in BitTorrent-like P2P applicationsIEEE Trans. on Multimedia Topology with BGP
2009
Hasegawa, G.
Hiraoka, Y.
Murata, M.
Evaluation of free-riding traffic problem in overlay routing and its mitigation methodConf. on Networking and Services (ICNS) Topology with BGP
2009
Haeberlen, A.
Avramopoulos, I.
Rexford, J.
Druschel, P.
NetReview: detecting when interdomain routing goes wrongUsenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2009
Eberle, W.
Holder, L.
Cook, D.
Identifying threats using graph-based anomaly detectionMachine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4 Topology with BGP
2009
Zhang, G.Measuring the impacts of sampling bias on internet AS-level topology inferenceWRI Conf. on Communications and Mobile Computing (CMC) Topology with BGP
2009
Lumezanu, C.
Baden, R.
Spring, N.
Bhattacharjee, B.
Triangle inequality and routing policy violations in the internetPassive and Active Measurement (PAM) Topology with BGP
2009
Puzis, R.
Yagil, D.
Elovici, Y.
Braha, D.
Collaborative attack on internet users' anonymityInternet Research Topology with BGP
2008
Kang, U.
Tsourakakis, C.
Appel, A.P.
Faloutsos, C.
Leskovec, J.
HADI: Fast diameter estimation and mining in massive graphs with HadoopCarnegie Mellon Univ. Topology with BGP
2008
Hei, Y.
Nakao, A.
Hasegawa, T.
Ogishi, T.
Yamamoto, S.
AS alliance: cooperatively improving resilience of intra-alliance communicationACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2008
Serrano, M.A.
De Los Rios, P.
Structural efficiency of percolated landscapes in flow networksPlos One Topology with BGP
2008
MacArthur, B.D.
Sanchez-Garcia, R.J.
Anderson, J.W.
Symmetry in complex networksDiscrete Applied Mathematics Topology with BGP
2008
Vilhar, A.
Novak, R.
Policy relationship annotations of predefined AS-level topologiesComputer Networks Topology with BGP
2008
Wojciechowski, M.Border Gateway modeling and simulationDep. Computer Science, VU Univ. Amsterdam Topology with BGP
2008
Raghavan, V.
Riley, G.
Jaafar, T.
Realistic topology modeling for the internet BGP infrastructureIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with BGP
2008
Katz, G.J.
Kider, J.T.
All-pairs shortest-paths for large graphs on the GPUACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware Topology with BGP
2008
Li, L.
Chen, C.
Exploring possible strategies for competitions between Autonomous SystemsIEEE Conf. on Communications (ICC) Topology with BGP
2008
Xiao, Y.
MacArthur, B.D.
Wang, H.
Xiong, M.
Wang, W.
Network quotients: structural skeletons of complex systemsPhys. Rev. E Topology with BGP
2008
John, J.P.
Katz-Bassett, E.
Krishnamurthy, A.
Anderson, T.
Venkataramani, A.
Consensus routing: the internet as a distributed systemUsenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2008
Hazeyama, H.
Suzuki, M.
Miwa, S.
Miyamoto, D.
Kadobayashi, Y.
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasuresConf. on Cyber Security Experimentation and Test Topology with BGP
2007
Qazi, S.
Moors, T.
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networksIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2007
Muehlbauer, W.
Uhlig, S.
Fu, B.
Meulle, M.
Maennel, O.
In search for an appropriate granularity to model routing policiesACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Ballani, H.
Francis, P.
Zhang, X.
A study of prefix hijacking and interception in the internetACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Wu, J.
Zhang, Y.
Mao, Z.M.
Shin, K.G.
Internet routing resilience to failures: analysis and implicationsACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2007
Huang, C.
Li, J.
Ross, K.W.
Can internet video-on-demand be profitable?ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2006
Restrepo, J.G.
Ott, E.
Hunt, B.R.
Characterizing the dynamical importance of network nodes and linksPhys. Rev. Lett. Topology with BGP
2006
D'Ignazio, A.
Giovannetti, E.
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approachJ. Competition Law and Economics Topology with BGP
2003
Fayed, M.
Krapivsky, P.
Byers, J.W.
Crovella, M.
Finkel, D.
Redner, S.
On the emergence of highly variable distributions in the autonomous system topologyACM SIGCOMM Computer Communication Review Topology with BGP
2016
Fadel, M.M.
El-Desoky, A.I.
Haikel, A.Y.
Labib, L.M.
A Low-Storage Precise IP Traceback Technique Based on Packet Marking and LoggingThe Computer J. Topology with Skitter
2016
Bhardwaj, O.
Anschelevich, E.
Kar, K.
Coalitionally stable pricing schemes for inter-domain forwardingComputer Networks Topology with Skitter
2015
Kloster, K.
Gleich, D.F.
Seeded PageRank solution pathsarxiv.org Topology with Skitter
2015
Francois, G.
Festor, O.
Anomaly traceback using software defined networkingIntl. Workshop on Information Forensics and Security (WIFS) Topology with Skitter
2015
Staudt, C.L.
Sazonovs, A.
Meyerhenke, H.
NetworKit: A tool suite for large-scale complex network analysisarxiv.org Topology with Skitter
2015
Saha, S.Efficient methods on reducing data redundancy in the InternetAalto Univ., FI Topology with Skitter
2015
Huang, T.T.
Sun, B.Q.
The impact of the Internet on global industry: New evidence of Internet measurementResearch in Intl Business and Finance Topology with Skitter
2015
Li, D.
Sha, W.
Dynamic ring for seamless mobility in identity centric networksComputers and Communication (ISCC) Topology with Skitter
2015
Liu, X.
Sun, Y.
Fang, L.
Liu, J.
Yu, L.
A Survey of Network Traffic Visualization in Detecting Network Security ThreatsCommunications in Computer and Information Science Topology with Skitter
2014
Vijayalakshmi, M.
Nithya, N.
Shalinie, S.M.
A novel algorithm on IP traceback to find the real source of spoofed IP packetsAdv. in Intelligent Systems and Computing Topology with Skitter
2014
Yang, M.H.Storage-efficient 16-bit hybrid IP traceback with single packetThe Scientific World J. Topology with Skitter
2014
Yang, M.H.
Yang, M.C.
Luo, J.-N.
Hsu, W.C.
High accuracy and low storage hybrid IP tracebackIntl Conf. on Computer, Information and Telecommunication Systems (CITS) Topology with Skitter
2014
Medrano-Chavez, A.G.
Perez-Cortes, E.
Lopez-Guerrero, M.
A performance comparison of Chord and Kademlia DHTs in high churn scenariosPeer-to-Peer Networking and Applications Topology with Skitter
2014
Zhang, J.Statistical inference on network dataUniv. Illinois, Urbana-Champaign Topology with Skitter
2014
Arora, D.
Verigin, A.
Godkin, T.
Neville, S.W.
Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnetsIntl Conf. on Advanced Information Networking and Applications (AINA)) Topology with Skitter
2014
Fallah, M.S.
Kahani, N.
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacksSecurity and Communication Networks Topology with Skitter
2014
Dundjerski, D.
Tomasevic, M.
Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocolsConcurrency Computation: Practice and Experience Topology with Skitter
2014
Mohanraj, P.
Mummoorthy, A.
Detecting Denail of Services attacks in wireless network under the Distributed Jammer NetworkIntl J. of Computer Applications Topology with Skitter
2013
Freno, A.
Keller, M.
Tommasi, M.
Probability estimation over large-scale random networks via the Fiedler delta statisticJ. of Machine Learning Research Topology with Skitter
2013
Seo, D.
Lee, H.
Perrig, A.
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacksComputers and Security Topology with Skitter
2013
Preciado, V.M.
Jadbabaie, A.
Moment-based spectral analysis of large-scale networks using local structural informationIEEE/ACM Trans. on Networking (TON) Topology with Skitter
2013
Godkin, T.Statistical assessment of peer-to-peer botnet featuresUniv. of Victoria, Victoria, CA Topology with Skitter
2013
Fu, A.W.
Wu, H.
Cheng, J.
Wong, R.C.
IS-Label: an independent-set based labeling scheme for point-to-point distance queryingVLDB Endowment Topology with Skitter
2013
Nikolaevskiy, I.
Lukyanenko, A.
Polishchuk, T.
Polishchuk, V.
Gurtov, A.
isBF: scalable in-packet Bloom filter based multicastACM Symp. on Applied Computing (SAC) Topology with Skitter
2013
Chen, Y.
Kawadia, V.
Urgaonkar, R.
Detecting overlapping temporal community structure in time-evolving networksarxiv.org Topology with Skitter
2013
Tang, M.
Zhang, G.
Lin, T.
Liu, J.
HDLBR: A name-independent compact routing scheme for power-law networksComputer Communications Topology with Skitter
2013
Ni, C.
Jin, G.
CTFPi: A new method for packet filtering of firewallIntl Conf. on Information Technology and Software Engineering, Ch. 48 Topology with Skitter
2012
Karasawa, T.
Soshi, M.
Miyaji, A.
A novel hybrid IP traceback scheme with packet countersConf. on Internet and Distributed Computing Systems (IDCS) Topology with Skitter
2012
Parno, B.
Zhou, Z.
Perrig, A.
Using trustworthy host-based information in the networkWorkshop on Scalable trusted computing (STC) Topology with Skitter
2012
Preciado, V.M.
Draief, M.
Jadbabaie, A.
Structural analysis of viral spreading processes in social and communication networks using egonetsarxiv.org Topology with Skitter
2012
Goltsev, A.V.
Dorogovtsev, S.N.
Oliveira, J.G.
Mendes, J.F.F.
Localization and spreading of diseases in complex networksPhys. Rev. Lett. Topology with Skitter
2012
Yang, M.-H.
Yang, M.-C.
RIHT: A novel hybrid IP traceback schemeIEEE Trans. on Information Forensics and Security Topology with Skitter
2012
Wehmuth, K.
Ziviani, A.
Distributed assessment of the closeness centrality ranking in complex networksWorkshop on Simplifying Complex Networks for Practitioners (SIMPLEX) Topology with Skitter
2011
Mukaddam, A.
ELHajj, I.
Hop count variabilityConf. for Internet Technology and Secured Transactions (ICITST) Topology with Skitter
2011
Wehmuth, K.
Ziviani, A.
Distributed location of the critical nodes to network robustness based on spectral analysisLatin American Network Operations and Management Symp. (LANOMS) Topology with Skitter
2011
Bell, C.Examining change in Internet topology in terms of external events, April 2001 - April 2002Univ. Nebraska at Omaha Topology with Skitter
2011
Youssef, M.
Kooij, R.
Scoglio, C.
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemicsJ. Computational Science Topology with Skitter
2011
Alvarez-Hamelin, J.I.
Beiro, M.G.
Busch, J.R.
Understanding edge connectivity in the Internet through core decompositionInternet Mathematics Topology with Skitter
2010
Song, J.
Zhao, H.
Yang, B.
Sun, H.
AS-level Internet macroscopic topology centralization evolvement analysisJ. Software Engineering and Applications Topology with Skitter
2010
de Montgolfier, F.
Soto, M.
Viennot, L.
Autour du caractere arborescent d'InternetMajecSTIC Topology with Skitter
2010
Xu, Y.
Wang, Z.
On an IBA topology model for internet topology structureConf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Topology with Skitter
2010
Yan, G.
Eidenbenz, S.
Thulasidasan, S.
Datta, P.
Ramaswamy, V.
Criticality analysis of Internet infrastructureComputer Networks Topology with Skitter
2009
Augustin, B.
Krishnamurthy, B.
Willinger, W.
IXP's: mapped?Internet Measurement Conf. (IMC) Topology with Skitter
2009
Jin, G.
Zhang, F.
Li, Y.
Zhang, H.
Qian, J.
A Hash-Based Path Identification Scheme for DDoS Attacks DefenseIntl Conf. on Computer and Information Technology Topology with Skitter
2009
Haddadi, H.
Fay, D.
Jamakovic, A.
Maennel, O.
Moore, A.
Mortier, R.
Uhlig, S.
Analysis of the Internet's structural evolutionUniv. of Cambridge Topology with Skitter
2009
Haddadi, H.
Fay, D.
Jamakovic, A.
Maennel, O.
Moore, A.
Mortier, R.
Uhlig, S.
On the importance of local connectivity for Internet topology modelsIntl Teletraffic Congress Topology with Skitter
2009
Erlebach, T.
Moonen, L.S.
Spieksma, F.C.R.
Vukadinovic, D.
Connectivity measures for internet topologies on the level of autonomous systemsOperations Research Topology with Skitter
2009
Korn, A.
Schubert, A.
Telcs, A.
Lobby index in networksPhysica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Xu, Y.
Zhao, H.
An improved BA model for router-level internet macroscopic topologyIAENG J. Computer Science Topology with Skitter
2009
Madhyastha, H.V.
Katz-Bassett, E.
Anderson, T.
Krishnamurthy, A.
Venkataramani, A.
iPlane Nano: path prediction for peer-to-peer applicationsUSENIX Symp. on Networked Systems Design and Implementation (NSDI) Topology with Skitter
2009
Gunes, M.H.
Sarac, K.
Analyzing router responsiveness to active measurement probesPassive and Active Measurement (PAM) Topology with Skitter
2009
Durresi, A.
Paruchuri, V.
Barolli, L.
Fast autonomous system tracebackJ. Network and Computer Applications Topology with Skitter
2009
Xiao, B.
Liu, L.
Guo, X.
Xu, K.
Modeling the IPv6 internet AS-level topologyPhysica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Kaune, S.
Pussep, K.
Leng, C.
Kovacevic, A.
Tyson, G.
Steinmetz, R.
Modelling the internet delay space based on geographical locationsConf. on Parallel, Distributed and Network-based Processing Topology with Skitter
2008
Zhang, X.
Zhao, H.
Wang, L.
Li, C.
On the internet AS-level topology evolution basing on hierarchy characteristicChinese Control and Decision Conf. Topology with Skitter
2008
Sung, M.
Xu, J.
Li, J.
Li, L.
Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundationIEEE/ACM Trans. on Networking (TON) Topology with Skitter
2008
Qu, Z.
Huang, C.
Liu, N.
A Novel Two-Step Traceback Scheme for DDoS AttacksIntl. Symp. on Intelligent Information Technology Application Topology with Skitter
2008
Paruchuri, V.
Durresi, A.
Chellappan, S.
TTL Based Packet Marking for IP TracebackGlobal Telecommunications Conf. Topology with Skitter
2008
Liu, L.
Xu, K.
Time series of Internet AS-level topology graphs: four patterns and one modelarxiv.org Topology with Skitter
2008
Beiro, M.G.
Alvarez-Hamelin, J.I.
Busch, J.R.
A low complexity visualization tool that helps to perform complex systems analysisNew J. Physics Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Wang, L.
Correctness of sampling bias on Internet router-level topologyIntl Conf. on Wireless Communications, Networking and Mobile Computing Topology with Skitter
2008
Bi, X.
Tan, W.
Xiao, R.
A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous SystemsSymp. on Computer and Computational Sciences (IMSCSS) Topology with Skitter
2008
Wei, W.
Dong, Y.
Lu, D.
Jin, G.
Optimal control of DDoS defense with multi-resource max-min fairnessConf. on Cybernetics and Intelligent Systems Topology with Skitter
2008
Kahani, N.
Shiry, S.
Bagherzadeh, M.
Detecting Denial of Service Attacks Utilizing Machine Learning MethodsIEEE Intl Conf. on the Applications of Digital Information and Web Technologies Topology with Skitter
2008
Jin, G.
Li, Y.
Zhang, H.
Qian, J.
A Pi2HC mechanism against DDoS attacksIntl Conf. on Communications and Networking in China Topology with Skitter
2008
Eriksson, B.
Barford, P.
Nowak, R.
Network discovery from passive measurementsACM SIGCOMM Conf. on Data communication Topology with Skitter
2008
Zhang, J.
Zhao, H.
Zhou, Y.
The study on characteristics of the coreness of router-level internet nodesChinese Control and Decision Conf. (CCDC) Topology with Skitter
2008
Haddadi, H.
Fay, D.
Jamakovic, A.
Maennel, O.
Moore, A.
Mortier, R.
Rui, M.
Uhlig, S.
Beyond Node Degree: Evaluating AS Topology Modelsarxiv.org Topology with Skitter
2008
Muthuprasanna, M.
Manimaran, G.
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack DefensesIntl Conf. on Distributed Computing Systems Topology with Skitter
2008
Haddadi, H.
Fay, D.
Uhlig, S.
Moore, A.
Mortier, R.
Jamakovic, A.
Rio, M.
Tuning Topology Generators Using Spectral DistributionsPerformance Evaluation: Metrics, Models and Benchmarks Topology with Skitter
2008
Latapy, M.
Magnien, C.
Complex network measurements: estimating the relevance of observed propertiesIEEE Conf. on Computer Communications (INFOCOM) Topology with Skitter
2008
Fraigniaud, P.
Febhar, E.
Viennot, F.
The inframetric model for the internetIEEE Conf. on Computer Communications (INFOCOM) Topology with Skitter
2008
Scholtes, I.
Botev, J.
Esch, M.
Hohfeld, A.
Schloss, H.
Zech, B.
TopGen - internet router-level topology generation based on technology constraintsConf. on Simulation Tools and Techniques for Communications, Networks and Systems Topology with Skitter
2008
Kooij, R.
Jamakovic, A.
Van Kesteren, F.
De Koning, T.
Theisler, I.
Veldhoven, P.
Het Nederlands elftal als complex netwerkDelft Univ. Topology with Skitter
2008
Cheng, L.
Hutchinson, N.
Ito, M.
RealNet: A Topology Generator Based on Real Internet TopologyIntl Conf. on Advanced Information Networking and Applications Workshops Topology with Skitter
2008
Amr, S.
El-Beltagy, M.
Helmy, M.
Analyzing Internet Connectivity Data Using Modified k-shell AnalysisCairo Univ. Topology with Skitter
2008
Allman, M.
Martin, L.
Rabinovich, M.
On Community-Oriented Internet MeasurementPassive and Active Network Measurement Topology with Skitter
2007
Flaxman, A.
Vera, J.
Bias Reduction in Traceroute Sampling - Towards a More Accurate Map of the InternetAlgorithms and Models for the Web-Graph Topology with Skitter
2007
Abdelhafez, M.Modeling and Simulations of Worms and Mitigation TechniquesGeorgia Institute of Technology Topology with Skitter
2007
Paruchuri, V.
Durresi, A.
Jain, R.
On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS AttacksGlobal Telecommunications Conf. Topology with Skitter
2007
Narasimha, R.Application of Information Theory and Learning to Network and Biological TomographyGeorgia Tech Topology with Skitter
2007
Eriksson, B.
Barford, P.
Nowak, R.
Crovella, M.
Learning network structure from passive measurementsACM SIGCOMM Conf. on Internet measurement Topology with Skitter
2007
Akashi, O
Fukuda, K.
Hirotsu, T.
Sugawara, T.
Analysis of Diagnostic Capability for Hijacked Route ProblemIP Operations and Management Topology with Skitter
2007
Jamakovic, A.
Uhlig, S.
Theisler, I.
On the relationships between topological measures in real-world networksNetworks and Heterogeneous Media Topology with Skitter
2007
Oliveira, R.
Zhang, B.
Zhang, L.
Observing the evolution of internet as topologyConf. on Applications, technologies, architectures, and protocols for computer communications Topology with Skitter
2007
Bush, R.
Hiebert, J.
Maennel, O.
Roughan, M.
Uhlig, S.
Testing the reachability of (new) address spaceSIGCOMM workshop on Internet network management Topology with Skitter
2007
Choi, B.
Moon, S.
Cruz, R.
Zhang, Z.
Diot, C.
Quantile sampling for practical delay monitoring in Internet backbone networksComputer Networks Topology with Skitter
2007
Leguay, J.
Latapy, M.
Friedman, T.
Salamatiana, K.
Describing and simulating internet routesComputer Networks Topology with Skitter
2007
Jackson, A.
Milliken, W.
Santivanez, C.
Condell, M.
Strayer, T.
A Topological Analysis of Monitor PlacementIEEE Int. Symp. on Network Computing and Applications Topology with Skitter
2007
Viger, F.
Barrat, A.
Dallasta, L.
Zhang, C.
Kolaczyk, E.
What is the real size of a sampled network? The case of the InternetPhysical Review Topology with Skitter
2007
Ha, D.
Ngo, H.
On the trade-off between the expected number of infected nodes and expected propagation time of malcodesState Univ. of New York at Buffalo Topology with Skitter
2007
Zhou, S.
Zhang, G.-Q.
Chinese Internet AS-level topologyIET Communications Topology with Skitter
2007
Schmidt, T.C.
Wahlisch, M.
Zhang, Y.
On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routingIEEE Conf. on Networking (ICN) Topology with Skitter
2007
Kunzmann, G.
Nagel, R.
Hossfeld, T.
Binzenhofer, A.
Eger, K.
Efficient simulation of large-scale P2P networks: modeling network transmission timesEUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) Topology with Skitter
2007
Gao, Z.
Ansari, N.
A practical and robust inter-domain marking scheme for IP tracebackComputer Networks Topology with Skitter
2007
Mahadevan, P.Mechanisms for Generating Realistic Annotated Internet TopologiesUniv. of California, San Diego Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Deployment of an algorithm for large-scale topology discoveryIEEE J. Selected Areas in Communications Topology with Skitter
2006
Donnet, B.
Bayant, B.
Friedman, T.
Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negativesACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Skitter
2006
Li, Z.
Xiang, Y.
Mathematical Analysis of Active DDoS Defense SystemsIntl Conf. on Computational Intelligence and Security Topology with Skitter
2006
Guillaume, J.-L.
Latapy, M.
Magoni, D.
Relevance of massively distributed explorations of the internet topology: qualitative resultsComputer Networks Topology with Skitter
2006
Yaar, A.
Perrig, A.
Song, D.
StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defenseIEEE J. Selected Areas in Communications Topology with Skitter
2006
Latapy, M.
Magnien, C.
Measuring fundamental properties of real-world complex networksarxiv.org Topology with Skitter
2006
Farhat, H.Protecting TCP services from denial of service attacksSIGCOMM workshop on Large-Scale Attack Defense (LSAD) Topology with Skitter
2006
Dallasta, L.Dynamical Phenomena on Complex Networksarxiv.org Topology with Skitter
2006
Zhang, L.
Guan, Y.
TOPO: a topology-aware single packet attack traceback schemeSecurecomm and Workshops Topology with Skitter
2006
Zhou, S.Characterising and modelling the internet topology - The rich-club phenomenon and the PFP modelBT Technology J. Topology with Skitter
2006
Donnet, B.
Friedman, T.
Topology discovery using an address prefix based stopping ruleUNICE : Networks and Applications Towards a Ubiquitously Connected World Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Efficient route tracing from a single sourcearxiv.org Topology with Skitter
2006
Jin, S.
Bestavros, A.
Small-world characteristics of internet topologies and implications on multicast scalingComputer Networks Topology with Skitter
2006
Faloutsos, M.Public Real Data Repositories and Measurement ToolsACM SIGCOMM Computer Communication Review Topology with Skitter
2006
Brennan, M.
Morley, L.
Wilson, B.
Measuring and Understanding ConnectivityWorcester Polytechnic Institute Topology with Skitter
2006
Yan, P.
Lee, M.
Towards an adaptive packet marking scheme for IP tracebacke-Business and Telecommunication Networks Topology with Skitter
2006
Sung, M.
Chiang, J.
Xu, J.
Scalable Hash-based IP Traceback Using Rate-limited Probabilistic Packet MarkingGeorgia Institute of Technology Topology with Skitter
2006
Srinivasan, S.
Zegura, E.
RouteSeer: Topological Placement of Nodes in Service OverlaysGeorgia Institute of Technology Topology with Skitter
2006
Li, Z.
Xiang, Y.
He, D.
Simulation and Analysis of DDoS in Active Defense EnvironmentIntl Conf. on Computational and Information Science Topology with Skitter
2006
Khanmohammadi, K.
Fallah, M.
Distributed Packet Filtering Based on IP TracebackIntl Computer Engineering Conf. Topology with Skitter
2006
He, Y.
Siganos, G.
Faloutsos, M.
Krishnamurthy, S.
Putting the Links Together: Measurements and ImpactUniv. of California, Riverside Topology with Skitter
2006
Dhamdhere, A.
Dovrolis, C.
ISP and Egress Path Selection for Multihomed NetworksIntl Conf. on Computer Communications Topology with Skitter
2006
Chen, G.
Fan, Z.
Li, X.
Modelling the Complex Internet TopologyComplex Dynamics in Communication Networks Topology with Skitter
2005
Zhu, X.
Wang, S.
Hong, F.
Liao, J.
Safeguard Information Infrastructure Against DDos Attacks: Experiments and ModelingCryptology and Network Security Topology with Skitter
2005
Tariq, U.
Hong, M.
Lhee, K.
PMS an expeditious marking scheme to combat with the DDoS attackIntl Multitopic Conf. Topology with Skitter
2005
Erlebach, T.
Moonen, L.S.
Spieksma, F.
Vukadinovic, D.
Connectivity measures for internet topologiesK.U. Leuven Topology with Skitter
2005
Alderson, D.
Li, L.
Willinger, W.
Doyle, J.
Understanding Internet Topology: Principles, Models, and ValidationIEEE/ACM Trans. on Networking (TON) Topology with Skitter
2005
Xiang, Y.
Zhou, W.
Mark-aided distributed filtering by using neural network for DDoS defenseIEEE Global Telecommunications Conf. (GLOBECOM) Topology with Skitter
2005
Janic, M.
Van Mieghem, P.
On properties of multicast routing treesJ. Communication Systems Topology with Skitter
2005
Hobfeld, T.
Binzenhofer, A.
Schlosser, D.
Eger, K.
Oberender, J.
Dedinski, I.
Kunzmann, G.
Towards Efficient Simulation of Large Scale P2P NetworksUniv. of Wurzburg Topology with Skitter
2005
Chen, R.
Park, J.-M.
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sourcesIEEE Conf. on Computer Communications and Networks (ICCCN) Topology with Skitter
2005
Pezaros, D.Network Traffic Measurement for the Next Generation InternetLancaster Univ. Topology with Skitter
2005
Kim, M.Building and Maintaining Overlay Networks for Bandwidth-Demanding ApplicationsUniv. of Texas at Austin Topology with Skitter
2005
Martins, O.A.Affecting IP traceback with recent Internet topology mapsIowa State Univ. Topology with Skitter
2005
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Efficient algorithms for large-scale topology discoveryACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2005
Donnet, B.
Friedman, T.
A CIDR stopping rule for topology discoveryAlgotel Topology with Skitter
2005
Andreopoulos, B.
Aijun, A.
Wang, X.
Multi-Layer Increasing Coherence Clustering of Autonomous Systems with MULICsoftYork Univ. Topology with Skitter
2005
Yaar, A.
Perrig, A.
Song, D.
FIT: Fast Internet TracebackIEEE Conf. on Computer Communications (INFOCOM) Topology with Skitter
2005
Donnet, B.
Friedman, T.
Crovella, M.
Improved algorithms for network topology discoveryPassive and Active Measurement (PAM) Topology with Skitter
2005
Yip, B.
Goyette, S.
Madden, C.
Visualising internet traffic data with three-dimensional spherical displayAsia-Pacific symposium on Information visualisation Topology with Skitter
2005
Choi, B.
Moon, S.
Cruz, R.
Zhang, Z.
Diot, C.
Practical delay monitoring for ISPsACM Conf. on Emerging network experiment and technology Topology with Skitter
2004
Prince, C.
Wyatt, D.
Confidence-weighted marginal utility analyses for improved internet mappingUniv. Washington, CSE Dept. Topology with Skitter
2004
Dube, R.Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet MarkingTexas A and M Univ. Topology with Skitter
2004
Yaar, A.
Perrig, A.
Song, D.
SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacksIEEE Symp. on Security and Privacy Topology with Skitter
2004
Tang, L.
Crovella, M.
Geometric exploration of the landmark selection problemPassive and Active Measurement (PAM) Topology with Skitter
2004
Jin, S.
Bestavros, A.
Small-world characteristics of the Internet and multicast scalingModeling, Analysis and Simulation of Computer Telecommunications Systems Topology with Skitter
2004
Xu, K.
Duan, Z.
Zhang, Z.-L.
Chandrashekar, J.
On properties of Internet Exchange Points and their impact on AS topology and relationshipIFIP-TC6 Networking Conf. (NETWORKING) Topology with Skitter
2004
Leguay, J.An Analysis on the Internet TopologyLinkoping Univ. Topology with Skitter
2004
Zhou, S.
Mondragon, R.J.
Redundancy and robustness of AS-level Internet topology and its modelsElectronics Letters Topology with Skitter
2004
Wang, X.
Reiter, M.
Mitigating bandwidth-exhaustion attacks using congestion puzzlesACM Conf. on Computer and Communications Security (CCS) Topology with Skitter
2004
Veitch, D.
Babu, S.
Pasztor, A.
Robust synchronization of software clocks across the internetACM SIGCOMM Conf. on Internet Measurement (IMC) Topology with Skitter
2004
Reitsma, R.
Thabane, L.
MacLeod, J.
Spatialization of Web sites using a weighted frequency model of navigation dataJ. of the Association for Information Science and Technology Topology with Skitter
2004
Oe, M.
Kadobayashi, Y.
Yamaguchi, S.
An implementation of a hierarchical IP traceback architectureSymp. on Applications and the Internet Workshops Topology with Skitter
2004
Lee, G.
Lim, H.
Hong, M.
Lee, D.
A Dynamic Path Identification Mechanism to Defend Against DDoS AttacksInformation Networking Convergence in Broadband and Mobile Networking Topology with Skitter
2004
Kim, S.
Hong, M.
Kim, D.
A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End HostIntl Conf. on Computational Science and Its Applications Topology with Skitter
2004
Kettner, S.
Madden, C.
Ziegler, R.
Direct rotational interaction with a spherical projectionTUM, Muenchen Topology with Skitter
2004
Collins, M.
Reiter, M.
An Empirical Analysis of Target-Resident DoS FiltersIEEE Symp. on Security and Privacy Topology with Skitter
2004
Amini, L.
Shaikh, A.
Schulzrinne, H.
Effective peering for multi-provider content delivery servicesConf. of the IEEE Computer and Communications Societies (INFOCOM) Topology with Skitter
2004
Akella, A.
Seshan, S.
Shaikh, A.
Toward Representative Internet MeasurementsCarnegie Mellon Univ. Topology with Skitter
2003
Tang, L.
Crovella, M.
Virtual landmarks for the internetInternet Measurement Conf. (IMC) Topology with Skitter
2003
Sung, M.
Xu, J.
IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacksIEEE Trans. on Parallel and Distributed Systems Topology with Skitter
2003
Mao, Z.
Rexford, J.
Wang, J.
Katz, R.
Towards an accurate AS-level traceroute toolACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications Topology with Skitter
2003
Lakhina, A.
Byers, J.W.
Crovella, M.
Matta, I.
On the geographic location of internet resourcesJ. on Selected Areas in Communications Topology with Skitter
2003
Gummadi, K.
Gummadi, R.
Gribble, S.
Ratnasamy, S.
Shenker, S.
Stoica, I.
The impact of DHT routing geometry on resilience and proximityACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications Topology with Skitter
2003
Zhou, S.
Mondragon, R.
Analyzing and modelling the AS-level Internet topologyarxiv.org Topology with Skitter
2003
Teixeira, T.
Marzullo, K.
Savage, S.
Voelker, G.M.
Characterizing and measuring path diversity of internet topologiesACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2003
Feamster, N.
Anderson, D.
Balakrishnan, H.
Kaashoek, M.
Measuring the effects of internet path faults on reactive routingACM SIGMETRICS Intl Conf. on Measurement and modeling of computer systems Topology with Skitter
2003
Yaar, A.
Perrig, A.
Song, D.
Pi: a path identification mechanism to defend against DDoS attacksIEEE Symp. on Security and Privacy Topology with Skitter
2003
Motamedi, R.
Chandrasekaran, B.
Maggs, B.
Rejaie, R.
Willinger, W.
StackPi : a new defense mechanism against IP spoofing and DDoS attacksCarnegie Mellon Univ. Topology with Skitter
2002
Mahajan, R.
Wetherall, D.
Anderson, T.
Understanding BGP misconfigurationACM SIGCOMM Computer Communication Review Topology with Skitter
2017
Blenn, N.
Ghiette, V.
Doerr, C.
Quantifying the Spectrum of Denial-of-Service Attacks through Internet BackscatterConf. on Availability, Reliability and Security UCSD Network Telescope
2017
Iglesias, F.
Zseby, T.
Pattern discovery in Internet background radiationIEEE Trans. on Big Data UCSD Network Telescope
2017
Bou-Harb, E.
Husak, M.
Debbabi, M.
Assi, C.
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope PerspectiveIEEE Trans. on Big Data UCSD Network Telescope
2017
Haddadi, F.
Heywood, A.
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?Intl J. of Network Management UCSD Network Telescope
2017
Ochieng, N.
Ismail, A.
Waweru, M.
Orero, J.
Detecting scanning computer worms using machine learning and darkspace network trafficPan African Conf. on Science, Computing and Telecommunications UCSD Network Telescope
2017
Dauxois, J.
Nucit, A.
Some estimation problems in epidemic modelingCommunications in Statistics - Simulation and Computation UCSD Network Telescope
2017
Polat, H.
Mehr, H.
Cetin, A.
Diagnosis of Chronic Kidney Disease Based on Support Vector Machine by Feature Selection MethodsJ. of Medical Systems UCSD Network Telescope
2016
Xu, M.
Hua, L.
Xu, S.
A vine copula model for predicting the effectiveness of cyber defense early-warningTechnometrics UCSD Network Telescope
2016
Chen, P.
Xu, M.
Xu, S.
Hu, T.
Modeling and predicting extreme cyber attack rates via marked point processesJ. Applied Statistics UCSD Network Telescope
2016
Lin, C.
Wu, C.
Huang, M.
Wen, Z.
Cheng, Q.
Adaptive IP mutation: A proactive approach for defending against worm propagationIEEE Symp. onReliable Distributed Systems Workshops (SRDSW) UCSD Network Telescope
2016
Hirakawa, T.
Ogura, K.
Bista, B.
Takata, T.
A Defense Method against Distributed Slow HTTP DoS AttackIntl Conf. on Network-Based Information Systems UCSD Network Telescope
2016
Haddadi, F.Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithmsDalhousie Univ. UCSD Network Telescope
2016
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attackManagement Information Systems Quarterly UCSD Network Telescope
2016
Fachkha, C.
Debbabi, M.
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterizationIEEE Communications Surveys and Tutorials UCSD Network Telescope
2016
Marnerides, A.
Mauthe, A.
Analysis and characterisation of botnet scan trafficIntl Conf. on Computing, Networking and Communications (ICNC) UCSD Network Telescope
2016
Kolesnichenko, A.
Haverkort, B.
Remke, A.
de Boer, P.
Fitting a code-red virus spread model: An account of putting theory into practiceIntl Conf. on the Design of Reliable Communication Networks (DRCN) UCSD Network Telescope
2016
Kirubavathi, G.
Anitha, R.
Botnet detection via mining of traffic flow characteristicsComputers and Electrical Engineering UCSD Network Telescope
2016
Chen, Z.
Chen, C.
Characterising heterogeneity in vulnerable hosts on worm propagationIntl J. Security and Networks UCSD Network Telescope
2015
Haga, Y.
Saso, A.
Mori, T.
Goto, S.
Increasing the darkness of darknet trafficGlobal Communications Conf. (GLOBECOM) UCSD Network Telescope
2015
Fachkha, C.Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacksConcordia Univ. UCSD Network Telescope
2015
Donoghue, N.
Hahn, B.
Xu, H.
Kroeger, T.
Zage, D.
Johnson, R.
Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Databasearxiv.org UCSD Network Telescope
2015
Gupta, S.
Gupta, B.B.
Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-artIntl J. System Assurance Engineering and Management UCSD Network Telescope
2015
Zhan, Z.
Xu, M.
Xu, S.
Predicting cyber attack rates with extreme valuesIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2015
Vaidya, T.2001-2013: Survey and analysis of major cyberattacksarxiv.org UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Chain, B.
Hybrid epidemics - A case study on computer worm ConfickerPlos One UCSD Network Telescope
2015
Haddadi, F.
Le Cong, D.
Porter, L.
Zincir-Heywood, A.
On the effectiveness of different botnet detection approachesInformation Security Practice and Experience (ISPE) UCSD Network Telescope
2015
Balkanli, E.
Zincir-Heywood, A.N.
Highlights on analyzing one-way traffic using different toolsIEEE Symp. on Computational Intelligence for Security and Defense Applications (CISDA) UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Miller, J.
Cox, I.
Chain, B.
Optimizing hybrid spreading in metapopulationsNature Scientific Reports UCSD Network Telescope
2015
Yao, G.
Bi, J.
Vasilakos, A.V.
Passive IP Traceback: disclosing the locations of IP spoofers from path backscatterIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2014
Zhan, Z.
Xu, M.
Xu, S.
A characterization of cybersecurity posture from Network Telescope dataIntl Conf. on Trustworthy Systems (InTrust) UCSD Network Telescope
2014
Kolesnichenko, A.Model-checking mean-field models: algorithms and applicationsUniv. of Twente UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Entropy-based characterization of Internet background radiationEntropy UCSD Network Telescope
2014
Balkanli, E.
Alves, J.
Zincir-Heywood, A.N.
Supervised learning to detect DDoS attacksIEEE Computational Intelligence in Cyber Security (CICS) UCSD Network Telescope
2014
Yang, S.
Du, H.
Holsopple, J.
Sudit, M.
Attack ProjectionAdvances in Information Security UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Modelling IP darkspace traffic by means of clustering techniquesCommunications and Network Security (CNS) UCSD Network Telescope
2014
Garcia, S.
Grill, M.
Stiborek, J.
Zunino, A.
An empirical comparison of botnet detection methodsComputers and Security UCSD Network Telescope
2014
Balkanli, E.
Zincir-Heywood, A.N.
On the analysis of backscatter trafficIEEE Local Computer Networks Workshops (LCN Workshops) UCSD Network Telescope
2014
Du, H.Probabilistic modeling and inference for obfuscated network attack sequencesRochester Inst. of Technology UCSD Network Telescope
2014
Kale, M.
Choudhari, D.M.
DDOS attack detection based on an ensemble of neural classifierIntl J. Computer Science and Network Security (IJCSNS) UCSD Network Telescope
2014
Gonzalez, C.Information theoretic measures for the detection of anomalies in IP darkspace trafficBarcelona Tech UCSD Network Telescope
2014
Du, H.
Yang, S.J.
Probabilistic Inference for Obfuscated Network Attack SequencesIntl Conf. on Dependable Systems and Networks UCSD Network Telescope
2014
Zhan, Z.A statistical framework for analyzing cyber attacksUniv. Texas, San Antonio, TX, US UCSD Network Telescope
2014
Wang, P.
Guan, X.
Zhao, J.
Tao, J.
Qin, T.
A new sketch method for measuring host connection degree distributionIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2014
Strapp, S.
Yang, S.
Segmenting large-scale cyber attacks for online behavior model generationSocial Computing, Behavioral-Cultural Modeling and Prediction (SBP) UCSD Network Telescope
2014
Khan, F.
Hosein, N.
Ghiasi, S.
Chuah, C.
Sharma, P.
Streaming solutions for fine-grained network traffic measurements and analysisIEEE/ACM Trans. on Networking (TON) UCSD Network Telescope
2014
Singh, K.
Guntuku, S.C.
Thakur, A.
Hota, C.
Big data analytics framework for peer-to-peer botnet detection using random forestsInformation Sciences UCSD Network Telescope
2014
Ko, S.
Kim, K.
Lee, Y.
Song, J.
A classification method of darknet traffic for advanced security monitoring and responseLecture Notes in Computer Science UCSD Network Telescope
2014
Chatziadam, P.
Askoxylakis, I.G.
Fragkiadakis, A.
A Network Telescope for Early Warning Intrusion DetectionLecture Notes in Computer Science UCSD Network Telescope
2013
Huang S.Y., Huang Y.Network forensic analysis using growing hierarchical SOMIEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov) UCSD Network Telescope
2013
Tidy, L.J.
Woodhead, S.
Wetherall, J.
Simulation of zero-day worm epidemiology in the dynamic, heterogeneous InternetJ. Defense Modeling and Simulation: Applications, Methodology, Technology UCSD Network Telescope
2013
Strapp, S.Segmentation and model generation for large-scale cyber attacksRochester Inst. of Technology UCSD Network Telescope
2013
Guntuku, S.
Narang, P.
Hota, C.
Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural networkarxiv.org UCSD Network Telescope
2013
Irwin, B.A source analysis of the Conficker outbreak from a Network TelescopeSAIEE Africa Research J. UCSD Network Telescope
2013
Ma, C.
Yang, Y.
Guo, X.
Improved SEIR viruses propagation model and the patch's impact on the propagation of the virusJ. of Computational Information Systems UCSD Network Telescope
2013
Tidy, L.
Woodhead, S.
Wetherall, J.
A large-scale zero-day worm simulator for cyber-epidemiological analysisIntl Conf. on Advances in Computer Science and Electronics Engineering (CSEE) UCSD Network Telescope
2013
Wang, F.
Zhang, Y.
Guo, H.
Wang, C.
Combating good point set scanning-based self-learning worms by using predatorsJ. Network Security UCSD Network Telescope
2013
Du, H.
Yang, S.J.
Temporal and spatial analyses for large-scale cyber attacksHandbook of Computational Approaches to Counterterrorism UCSD Network Telescope
2013
Andrysiak, T.
Saganowski, L.
Choras, M.
DDoS attacks detection by means of greedy algorithmsImage Processing and Communications Challenges 4 UCSD Network Telescope
2012
Xu, E.
Hsu, W.
Lee, M.L.
Patel, D.
Top-k maximal influential paths in network dataDatabase and Expert Systems Applications UCSD Network Telescope
2012
Martin, S.
Chiarello, L.
Leduc, G.
DISco: A distributed information store for network challenges and their outcomeIEEE Network Operations and Management Symp. (NOMS) UCSD Network Telescope
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection improvement based on spatial-temporal characteristicsAdvanced Science Lett. UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Characterizing transition behaviors in Internet attack sequencesIEEE Conf. on Computer Communications and Networks (ICCCN) UCSD Network Telescope
2011
Suresh, M.
Anitha, R.
Evaluating machine learning algorithms for detecting DDoS attacksAdvances in Network Security and Applications (CNSA) UCSD Network Telescope
2011
Abouzakhar, N.S.
Chen, H.
Christianson, B.
An enhanced fuzzy ARM approach for intrusion detectionJ. Digital Crime and Forensics UCSD Network Telescope
2011
Narita, M.
Katoh, T.
Bista, B.B.
Takata, T.
Evaluation of a distributed detecting method for SYN flood attacks using a real Internet traceAdvanced Information Networking and Applications (WAINA) UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Discovering collaborative cyber attack patterns using social network analysisConf. on Social computing, behavioral-cultural modeling and prediction (SBP) UCSD Network Telescope
2011
Saganowski, L.
Andrysiak, T.
Choras, M.
Renk, R.
Expansion of matching pursuit methodology for anomaly detection in computer networksAdvances in Intelligent and Soft Computing UCSD Network Telescope
2011
Choras, M.
Saganowski, L.
Renk, R.
Holubowicz, W.
Statistical and signal-based network traffic recognition for anomaly detectionExpert Systems UCSD Network Telescope
2010
Yao, G.
Bi, J.
Zhou, Z.
Passive IP traceback: capturing the origin of anonymous traffic through network telescopesACM SIGCOMM Computer Communication Review UCSD Network Telescope
2010
Abouzakhar, N.S.
Bakar, A.
A chi-square testing-based intrusion detection modelConf. on Cybercrime Forensics Education and Training (CFET ) UCSD Network Telescope
2010
Fadlullah, Z.M.
Taleb, T.
Vasilakos, A.V.
Guizani, M.
Kato, N.
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysisIEEE/ACM Trans. on Networking (TON) UCSD Network Telescope
2010
Bi, J.
Hu, P.
Li, P.
Study on classification and characteristics of source address spoofing attacks in the InternetIEEE Conf. on Networking (ICN) UCSD Network Telescope
2010
Gupta, R.
Ramamritham, K.
Mohania, M.
Ratio threshold queries over distributed data sourcesIntl Conf. on Data Engineering (ICDE) UCSD Network Telescope
2009
Kyriakopoulos, K.G.
Parish, D.J.
Using wavelets for compression and detecting events in anomalous network trafficConf. on Systems and Networks Communication UCSD Network Telescope
2009
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Measuring complexity and predictability in networks with multiscale entropy analysisIEEE Conf. on Computer Communications (INFOCOM) UCSD Network Telescope
2008
He, X.
Parameswaran, S.
MCAD: Multiple connection based anomaly detectionIEEE Conf. on Communication Systems (ICCS) UCSD Network Telescope
2008
Choi, H.
Lee, H.
Kim, H.
Fast detection and visualization of network attacks on parallel coordinatesComputers and Security UCSD Network Telescope
2008
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Metrics for characterizing complexity of network trafficConf. on Telecommunications (ICT) UCSD Network Telescope
2008
Irwin, B.
Pilkington, N.
High level internet scale traffic visualization using Hilbert curve mappingVisualization for Computer Security (VizSec) UCSD Network Telescope
2008
Wei, S.
Mirkovic, J.
Correcting congestion-based error in network telescope's observations of worm dynamicsInternet Measurement Conf. (IMC) UCSD Network Telescope
2008
Li, P.
Bi, J.
Zhou, Z.
A backscatter technology based study on source address spoofingPeriodical of Ocean Univ. of China UCSD Network Telescope
2008
Francois, J.
State, R.
Festor, O.
Activity monitoring for large honeynets and network telescopesJ. Advances in Systems and Measurements UCSD Network Telescope
2007
Dainotti, A.
Pescape, A.
Ventre, G.
Worm traffic analysis and characterizationIEEE Conf. on Communications (ICC) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Measuring network-aware worm spreading abilityIEEE Conf. on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Vojnovic, M.
Gupta, V.
Karagiannis, T.
Gkantsidis, C.
Sampling strategies for epidemic-style information disseminationIEEE Conf. on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Optimal worm-scanning method using vulnerable-host distributionsJ. Security and Networks UCSD Network Telescope
2006
Rajab, M.
Monrose, F.
Terzis, A.
Fast and evasive attacks: highlighting the challenges aheadSymp. on Recent Advances in Intrusion Detection (RAID) UCSD Network Telescope
2006
Francois, J.
State, R.
Festor, O.
Tracking global wide configuration errorsIEEE Workshop on Monitoring, Attack Detection and Mitigation UCSD Network Telescope
2006
Hamadeh, I.
Kesidis, G.
Toward a framework for forensic analysis of scanning wormsEmerging Trends in Information and Communication Security (ETRICS) UCSD Network Telescope
2006
Peng, Y.
Gong, J.
Yang, W.
Liu, W.
Disclosing the element distribution of Bloom filterConf. on Computational Science (ICCS) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
Worm evolution tracking via timing analysisACM workshop on Rapid Malcode (WORM) UCSD Network Telescope
2005
Chen, Z.
Lin, C.
Ni, J.
Ruan, D.-H.
Zheng, B.
Jiang, Y.-X.
Peng, X.
Wang, Y.
Luo, A.
Zhu, B.
Yue, Y.
Ren, F.-Y.
Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LANIEEE Conf. on Local Computer Networks (LCN) UCSD Network Telescope
2005
Chen, Z.
Ji, C.
Importance-scanning worm using vulnerable-host distributionIEEE Global Telecommunications Conf. (GLOBECOM) UCSD Network Telescope
2005
Kumar, A.
Paxson, V.
Weaver, N.
Exploiting underlying structure for detailed reconstruction of an internet-scale eventInternet Measurement Conf. (IMC) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
On the effectiveness of distributed worm monitoringUsenix Security Conf. (SEC) UCSD Network Telescope
2005
Chhabra, P.
John, A.
Saran, H.
PISA: Automatic extraction of traffic signaturesIFIP-TC6 Networking Conf. (NETWORKING) UCSD Network Telescope

  Last Modified: Wed Jun-13-2018 11:38:19 PDT
  Page URL: http://www.caida.org/data/publications/index.xml