Gaborone, BW | Traffic prediction in cloud computing using time series mode ... | Mokgolodi, K. | Anonymized Internet Traces | 2016-08 |
Pittsburgh, PA, US | SIFF: a Stateless Internet Flow Filter to mitigate DDoS floo ... | Yaar, A., Perrig, A., et al. | Topology with Skitter | 2004-05 |
San Diego, CA, US | Characterizing and measuring path diversity of internet topo ... | Teixeira, T., Marzullo, K., et al. | Topology with Skitter | 2003-06 |
Monterey, CA, US | Distributed Emulation in Support of Large Networks | Greunke, B. | Topology with BGP | 2016 |
Hawthorne, NY, US | Effective peering for multi-provider content delivery servic ... | Amini, L., Shaikh, A., et al. | Topology with Skitter | 2004 |
Ankara, TR | Server Notaries: A Complementary Approach to the Web PKI Tru ... | Yuce, E., Selcuk, A.A. | Topology with BGP | 2016 |
Aalto, FI | Inter-domain incentives and Internet architecture | Rajahalma, J. | Topology with BGP | 2012-08 |
Washington, DC, US | Network Level Attacks and Defenses Against Anonymity Network ... | Tan, Z.D.H. | Topology with Archipelago, Topology with BGP | 2016 |
Delft, NL | On the relationships between topological measures in real-wo ... | Jamakovic, A., Uhlig, S., et al. | Topology with Skitter | 2007-09 |
San Diego, CA, US | A distributed mechanism to protect against DDoS attacks | Mosharraf, N., Jayasumana, A., et al. | Denial of Service Attacks | 2017-06 |
Vigo, ES | Frame coalescing in dual-mode EEE | Herreria-Alonso, S., Rodriguez-Perez, M., et al. | Anonymized Internet Traces | 2015-10 |
Enschede, NL | Impact of packet sampling on link dimensioning | de Oliviera Schmidt, R., Sadre, R., et al. | Anonymized Internet Traces | 2015-09 |
College Park, MD, US | Longitudinal analysis of root server anycast inefficiencies | Li, Z., Levin, D., et al. | Topology with BGP | 2017-00 |
Waterloo, CA | Turbo covert channel: An iterative framework for covert comm ... | Ahmadzadeh, S.A., Agnew, G. | Anonymized Internet Traces | 2013-04 |
Enschede, NL | Lightweight link dimensioning using sFlow sampling | Schmidt, R., Sadre, R., et al. | Anonymized Internet Traces | 2013-10 |
Bradford, UK | Dynamic OBS offset allocation in WDM networks | Mouchos, C., Tsokanos, A., et al. | Anonymized Internet Traces | 2010-11 |
Atlanta, GA, US | Exploiting underlying structure for detailed reconstruction ... | Kumar, A., Paxson, V., et al. | UCSD Network Telescope | 2005-10 |
Irvine, CA, US | 2.5K-graphs: from sampling to generation | Gjoka, M., Kurant, M., et al. | Topology with BGP | 2012-08 |
Beijing, CN | Flow-level traffic engineering in conventional networks with ... | Geng, N., Yang, Y., et al. | Anonymized Internet Traces | 2018-01 |
West Lafayette, IN, US | Opportunistic flow-level latency estimation using consistent ... | Lee, M., Duffield, N., et al. | Anonymized Internet Traces | 2012-02 |
Haifa, IL | Maximizing the throughput of cuckoo hashing in network devic ... | Kanizo, Y., Hay, D., et al. | Anonymized Internet Traces | 2012-02 |
Chania, GR | Sketching distributed sliding-window data streams | Papapetrou, O., Garofalakis, M., et al. | Anonymized Internet Traces | 2015-03 |
Brooklyn, NY, US | Efficient buffering and scheduling for a single-chip crosspo ... | Cao, Z., Panwar, S.S. | Anonymized Internet Traces | 2012-10 |
Nathan, AU | Intelligent Sampling Using an Optimized Neural Network | Jadidi, Z., Muthukkumarasamy, V., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2016-01 |
Seoul, KR | APFS: Adaptive Probabilistic Filter Scheduling against distr ... | Seo, D., Lee, H., et al. | Topology with Skitter | 2013-11 |
Lubbock, TX, US | Applying big data analytics on integrated cybersecurity data ... | Juturu, L.S. | Denial of Service Attacks | 2015-05 |
Shenyang, CN | Research on bottleneck-delay in internet based on IP united ... | Lin, C., Bi, Y., et al. | Topology with Archipelago | 2016-07 |
Eugene, OR, US | Eyeball ASes: from geography to connectivity | Rasti, A.H., Magharei, N., et al. | Topology with BGP | 2010-11 |
Princeton, NJ, US | Optimizing the placement of implicit proxies | Cesareo, J., Karlin, J., et al. | Topology with BGP | 2012-06 |
Barcelona, ES | The impact of content delivery networks on the Internet ecos ... | Palacin, M., Oliver, M., et al. | Topology with BGP | 2013-00 |
Buenos Aires, AR | Understanding edge connectivity in the Internet through core ... | Alvarez-Hamelin, J.I., Beiro, M.G., et al. | Topology with Skitter | 2011-03 |
Budapest, HU | Compressing IP forwarding tables: Realizing information-theo ... | Korosi, A., Tapolcai, J., et al. | Anonymized Internet Traces | 2014-10 |
Tempe, AZ, US | Network-aware behavior clustering of Internet end hosts | Xu, K., Wang, F., et al. | UCSD Network Telescope, Anonymized Internet Traces | 2011-04 |
Xiamen, CN | A novel network flow watermark embedding model for efficient ... | Chen, Y., Wang, S. | Anonymized Internet Traces | 2016-00 |
Granville, OH, US | Divergence in network traffic | Takahashi, E.K., Chen, Y., et al. | Denial of Service Attacks | 2011-11 |
Hong Kong, CN | An efficient approach to multi-level route analytics | Chen, A., Chan, E.W.W., et al. | Topology with Archipelago | 2013-05 |
Lubeck, DE | DynaCORE - dynamically reconfigurable coprocessor for networ ... | Albrecht, C., Foag, J., et al. | Anonymized Internet Traces | 2010-03 |
Ann Arbor, MI, US | Measuring IPv6 adoption | Czyz, J., Allman, M., et al. | Topology with Archipelago | 2013-08 |
Zhengzhou, CN | An epidemic-dynamics-based model for CXPST spreading in inte ... | Wang, Y., Wang, Z., et al. | Topology with BGP | 2013-07 |
Trivandrum, IN | Ranking of machine learning algorithms based on the performa ... | Robinson, R.R.R., Thomas, C. | UCSD Network Telescope, Denial of Service Attacks | 2015-12 |
Karlsruhe, DE | Estimating current-flow closeness centrality with a multigri ... | Bergamini, E., Wegner, M., et al. | Topology with BGP | 2016-07 |
Melbourne, AU | Robust synchronization of software clocks across the Interne ... | Veitch, D., Babu, S., et al. | Topology with Skitter | 2004-00 |
Guangzhou, CN | Self-similarity and heavy-tail of ICMP traffic | Liu, W., Yan, Y., et al. | Anonymized Internet Traces | 2012-12 |
Belgrade, RS | Graphical processing unit-based parallelization of the Open ... | Dundjerski, D., Tomasevic, M. | Topology with Skitter | 2014-02 |
Ljubljana, SI | The impact of network topology on the performance of MAP sel ... | Vilhar, A., Novak, R., et al. | Topology with BGP | 2010-05 |
Beijing, CN | Tumbler: Adaptable link access in the bots-infested Internet | Zhang, Y., Wang, X., et al. | Topology with BGP | 2016-06 |
Buenos Aires, AR | An empirical comparison of botnet detection methods | Garcia, S., Grill, M., et al. | UCSD Network Telescope | 2014-09 |
Aachen, DE | Measuring complexity and predictability in networks with mul ... | Riihijarvi, J., Mahonen, P., et al. | UCSD Network Telescope | 2009-04 |
Liege, BE | A brief history of MPLS usage in IPv6 | Vanaubel, Y., Merindol, P., et al. | Topology with Archipelago, Topology with BGP | 2016-03 |
Delft, NL | On properties of multicast routing trees | Janic, M., Van Mieghem, P. | Topology with Skitter | 2005-11 |
Durham, NC, US | Improving IP-based geo-location through Internet topology an ... | Moses, K.V. | Topology with BGP | 2013-00 |
Beijing, CN | Analysis of UDP traffic usage on internet backbone links | Zhang, M., Dusi, M., et al. | Anonymized Internet Traces | 2009-09 |
Shenyang, CN | Analysis of Internet robustness in attacks | Xu, Y., Zhang, X. | Topology with Archipelago | 2012-05 |
Minneapolis, MN, US | On properties of Internet Exchange Points and their impact o ... | Xu, K., Duan, Z., et al. | Topology with Skitter | 2004-04 |
Leuven, BE | Retouched Bloom filters: allowing networked applications to ... | Donnet, B., Bayant, B., et al. | Topology with Skitter | 2006-12 |
Stonybrook, NY, US | The politics of routing: Investigating the relationship betw ... | Singh, R., Koo, H., et al. | Topology with BGP | 2016-06 |
Brest, FR | Application-centric energy-efficient Ethernet with quality o ... | Popescu, I.; Miyazaki, T.; Chino, M.; Wang, et al. | Anonymized Internet Traces | 2015-07 |
Hebron, PS | Internet scale DoS attacks | Kurar, B., Tahboub, R. | Topology with BGP | 2015-08 |
Rennes, FR | PTPv2-based network load estimation and its application to Q ... | Frangoudis, P.A., Hadjadj-Aoul, Y., et al. | Anonymized Internet Traces | 2014-07 |
Redmond, WA, US | Sampling strategies for epidemic-style information dissemina ... | Vojnovic, M., Gupta, V., et al. | UCSD Network Telescope | 2007-04 |
Seoul, KR | A Distributed Self-Organizing Map for DoS Attack Detection | Kim, M., Jung, S., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2012-00 |
Hong Kong, CN | Performance evaluation and service rate provisioning for a q ... | Chen, J., Addie, R.G., et al. | Anonymized Internet Traces | 2013-11 |
San Diego, CA, US | Detecting evasion attacks at high speeds without reassembly | Varghese, G., Fingerhut, J., et al. | Anonymized Internet Traces | 2006-10 |
Ithaca, NY, US | A study of prefix hijacking and interception in the internet | Ballani, H., Francis, P., et al. | Topology with BGP | 2007-10 |
Washington DC, US | An empirical evaluation of relay selection in Tor | Wacek, C., Tan, H., et al. | Topology with Archipelago, Topology with BGP | 2013-02 |
New York City, NY, US | Ensemble-based model for DDoS attack detection and flash eve ... | Bhatia, S. | Denial of Service Attacks | 2016-12 |
Burlington, MA, US | Inter-domain rendezvous service architecture | Rajahalme, J., Sarela, M., et al. | Topology with BGP | 2009-12 |
Minneapolis, MN, US | Forming Guard Sets using AS Relationships | Imani, M., Barton, A., et al. | Topology with Archipelago, Topology with BGP | 2017 |
Cambridge, MA, US | A new approach to dimensionality reduction for anomaly detec ... | Huang, T., Sethu, H., et al. | Anonymized Internet Traces | 2016-06 |
Aachen, DE | Metrics for characterizing complexity of network traffic | Riihijarvi, J., Mahonen, P., et al. | UCSD Network Telescope | 2008-06 |
Philadelphia, PA, US | Moment-based spectral analysis of large-scale networks using ... | Preciado, V.M., Jadbabaie, A. | Topology with Skitter | 2013-04 |
Hanoi, VN | OpenFlowSIA: An optimized protection scheme for software-def ... | Phan, T., Toan, T., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2016-07 |
Champaign, IL, US | Reducing short flows' latency in the internet | Li, Q. | Topology with Archipelago, Topology with BGP | 2016-04 |
Rochester, NY, US | Segmentation and model generation for large-scale cyber atta ... | Strapp, S. | UCSD Network Telescope | 2013-08 |
Rio de Janeiro, BR | Caracterizacao e identificacao de papeis e vertices em redes ... | Spinelli, L.P. | Anonymized Internet Traces | 2011-08 |
New York, NY, US | A SDN-Based Framework for Fine-Grained Inter-domain Routing ... | Wang, Y., Bi, J., et al. | Topology with BGP | 2017 |
Glasgow, UK | Compact routing on the Internet AS-graph | Strowes, S.D., Mooney, G., et al. | Topology with BGP | 2011-06 |
Haifa, IL | Optimal elephant flow detection | Basat, R., Einziger, G., et al. | Anonymized Internet Traces | 2017-15 |
Ithaca, NY, US | Timing is everything: Accurate, minumum overhead, available ... | Wang, H., Lee, K.S., et al. | Anonymized Internet Traces | 2014-11 |
Princeton, NJ, US | Online measurement of large traffic aggregates on commodity ... | Jose, L., Yu, M., et al. | Anonymized Internet Traces | 2011-03 |
Los Angeles, CA, US | The record route option is an option! | Goodchild, B., Chiu, Y., et al. | Topology with BGP | 2017-11 |
Marina Del Rey, CA, US | Selecting representative IP addresses for internet topology ... | Fan, X., Heidemann, J. | Topology with Archipelago | 2010-11 |
Urbana, IL, US | Defending Tor from network adversaries: A case study of netw ... | Juen, J., Das, A., et al. | Topology with Archipelago | 2014-10 |
Beijing, CN | Preventing DDoS attacks by identifier/locator separation | |