Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications : bypublication : bypublication_full.xml
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    date    dataset    publication   |
|   Citation Format:    abbreviated    complete   |

Aalto Univ., FI

S. Saha, Efficient methods on reducing data redundancy in the Internet, Ph.D. thesis, Aalto Univ., FI, October 2015.

J. Rajahalma, Inter-domain incentives and Internet architecture, Ph.D. thesis, Aalto Univ., FI, August 2012.

A. Keating, ``Models for the simulation of a name-based interdomain routing architecture'', M.S. thesis, Aalto Univ., FI, June 2012.

Academy Proceeding in Engineering Sciences

C. Modi and D. Patel, ``A feasible approach to intrusion detection in virtual network layer of Cloud computing'', Academy Proceeding in Engineering Sciences, p. (16 pages), January 2018.

ACM Computing Surveys (CSUR)

P.~A.~A. Resende and A.~C. Drummond, ``A Survey of Random Forest Based Methods for Intrusion Detection Systems'', ACM Computing Surveys (CSUR), vol. 51, pp. (36 pages), January 2018.

ACM CoNEXT Student Workshop

S. Wassermann, P. Casas, and B. Donnet, ``Towards DisNETPerf: a distributed Internet paths performance analyzer'', in ACM CoNEXT Student Workshop, December 2015, p. (3 pages).

ACM Conf. on Computer and Communications Security (CCS)

Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh, ``StegoTorus: a camouflage proxy for the Tor anonymity system'', in ACM Conf. on Computer and Communications Security (CCS), October 2012, pp. 109--120.

M. Schuchard, J. Geddes, C. Thompson, and N. Hopper, ``Routing around decoys'', in ACM Conf. on Computer and Communications Security (CCS), October 2012, pp. 85--96.

A. Houmansadr, G.T.K. Nguyen, M. Caesar, and N. Borisov, ``Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability'', in ACM Conf. on Computer and Communications Security (CCS), October 2011, pp. 187--199.

N. Schear and N. Borisov, ``Preventing SSL traffic analysis with realistic cover traffic'', in ACM Conf. on Computer and Communications Security (CCS), November 2009.

X. Wang and M. Reiter, ``Mitigating bandwidth-exhaustion attacks using congestion puzzles'', in ACM Conf. on Computer and Communications Security (CCS), October 2004, pp. 257--267.

ACM Conf. on Computing Frontiers

S. Kumar, J. Maschmeyer, and P. Crowley, ``Exploiting locality to ameliorate packet queue contention and serialization'', in ACM Conf. on Computing Frontiers, May 2006, pp. 279--290.

ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT)

M. Moshref, M. Yu, R. Govindan, and A. Vahdat, ``SCREAM: Sketch Resource Allocation for Software-defined Measurement'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2015.

S.B. Lee, M.S. Kang, and V.D. Gligor, ``CoDef: Collaborative defense against large-scale link-flooding attacks'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2013, pp. 417--428.

B Eriksson, R. Durairajan, and P. Barford, ``RiskRoute: A framework for mitigating network outage threats'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2013, pp. 405--416.

M. Yu, W. Jiang, H. Li, and I. Stoica, ``Tradeoffs in CDN designs for throughput oriented traffic'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2012, pp. 145--156.

S. Meyer, M. Wahlisch, and T.C. Schmidt, ``Exploring reachability via settlement-free peering'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2012, p. 49.

A. Vishwanath, V. Sivaraman, Z. Zhao, C. Russell, and M. Thottan, ``Adapting router buffers for energy efficiency'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2011, p. (12 pages).

S.D. Strowes and C. Perkins, ``Deterministic, reduced-visibility inter-domain forwarding'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2009, pp. 9--10.

K. Chen, D.R. Choffnes, R. Potharaju, Y. Chen, F.E. Bustamante, D. Pei, and Y. Zhao, ``Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2009.

Y. Hei, A. Nakao, T. Hasegawa, T. Ogishi, and S. Yamamoto, ``AS alliance: cooperatively improving resilience of intra-alliance communication'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2008, p. (6 pages).

J. Wu, Y. Zhang, Z.M. Mao, and K.G. Shin, ``Internet routing resilience to failures: analysis and implications'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), January 2007, p. 25.

B. Donnet, B. Bayant, and T. Friedman, ``Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2006, p. 13.

ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS)

M. Shahzad and A.X. Liu, ``Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2014, pp. 207--219.

B. Donnet, P. Raoult, T. Friedman, and M. Crovella, ``Efficient algorithms for large-scale topology discovery'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2005, pp. 327--338.

T. Teixeira, K. Marzullo, S. Savage, and G.M. Voelker, ``Characterizing and measuring path diversity of internet topologies'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2003, vol. 31 (1) of ACM SIGMETRICS Performance Evaluation Review, pp. 304--305.

ACM Conf. on Security and Privacy in Wireless and Mobile Networks

R. Sridharan, R.~R. Maiti, and N.~O. Tippenhauer, ``WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic'', in ACM Conf. on Security and Privacy in Wireless and Mobile Networks, January 2018, vol. 11, p. (12 pages).

ACM Intl Symp. on Mobile Ad Hoc Networking and Computing (Mobihoc)

L. Jiao, X. Lin, R. Zhou, and X. Chen, ``Online Scheduling of Traffic Diversion and Cloud Scrubbing with Uncertainty in Current Inputs'', in ACM Intl Symp. on Mobile Ad Hoc Networking and Computing (Mobihoc), January 2019, vol. 20, p. (10 pages).

ACM J. Exp. Algorithms

M. Mitzenmacher, S. Pontarelli, and P. Reviriego, ``Adaptive cuckoo filters'', ACM J. Exp. Algorithms, vol. 25, no. 1, March 2020.

ACM on Measurement and Analysis of Computing Systems

P. Sermpezis and V. Kotronis, ``Inferring Catchment in Internet Routing'', in ACM on Measurement and Analysis of Computing Systems, January 2019, vol. 3, p. (31 pages).

ACM SIGCAS Conf. on Computing and Sustainable Societies

K.~G. Leyba, B. Edwards, C. Freeman, J.~R. Crandall, and S. Forrest, ``Borders and gateways: measuring and analyzing national as chokepoints'', in ACM SIGCAS Conf. on Computing and Sustainable Societies, January 2019, vol. 2, p. (11 pages).

ACM SIGCOMM

N. Spring, Z. Li, D. Levin, and B. Bhattacharjee, ``Internet anycast: performance, problems, and potential'', in ACM SIGCOMM, August 2018, pp. 59--73.

Q. Huang, P. Lee, R. Li, L. Tang, Y. Chen, and G. Zhang, ``SketchVisor: Robust network measurement for software packet processing'', in ACM SIGCOMM, August 2017, pp. 113--126.

Z. Liu, A. Manousis, X. Vorsanger, V. Sekar, and V. Braverman, ``One sketch to rule them all: Rethinking network flow monitoring with UnivMon'', in ACM SIGCOMM, August 2016, pp. 101--114.

A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira, ``Jumpstarting BGP security with path-end validation'', in ACM SIGCOMM, August 2016, pp. 342--355.

ACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications

K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica, ``The impact of DHT routing geometry on resilience and proximity'', in ACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications, August 2003, pp. 381--394.

ACM SIGCOMM Computer Communication Review

M. Li, B. Zong, C. Lumezanu, and H. Chen, ``Learning IP network representations'', ACM SIGCOMM Computer Communication Review, vol. 48, pp. (6 pages), January 2019.

T. Bottger, F. Cuadrado, and S. Uhlig, ``Looking for hypergiants in PeeringDB'', in ACM SIGCOMM Computer Communication Review, July 2018, vol. 48 (3), pp. 13--19.

D. Cicalese and D. Rossi, ``A longitudinal study of IP Anycast'', ACM SIGCOMM Computer Communication Review, vol. 48, pp. (9 pages), January 2018.

M. Konte, R. Perdisci, and N. Feamster, ``ASwatch: An AS reputation system to expose bulletproof hosting ASes'', ACM SIGCOMM Computer Communication Review, vol. 45, no. 4, pp. 625--638, October 2015.

H. Ding and M. Rabinovich, ``TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurement'', ACM SIGCOMM Computer Communication Review, vol. 45, no. 3, pp. 20--27, July 2015.

R. Craven, R. Beverly, and M. Allman, ``A middlebox-cooperative TCP for a non end-to-end internet'', ACM SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 151--162, October 2014.

M. Moshref, M. Yu, R. Govindan, and A. Vahdat, ``DREAM: Dynamic Resource Allocation for Software-defined Measurement'', ACM SIGCOMM Computer Communication Review, vol. 44, pp. 419--430, August 2014.

G. Retvari, J. Tapolcai, A. Korosi, A. Majdan, and Z. Heszberger, ``Compressing IP forwarding tables: towards entropy bounds and beyond'', ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 111--122, October 2013.

N. Ekiz, A.H. Rahman, and P.D. Amer, ``Misbehaviors in TCP SACK generation'', ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 17--23, April 2011.

G. Yao, J. Bi, and Z. Zhou, ``Passive IP traceback: capturing the origin of anonymous traffic through network telescopes'', ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 413--414, October 2010.

S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, ``How secure are secure interdomain routing protocols?'', ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 87--98, October 2010.

L. Yuan, C. Chuah, and P. Mohapatra, ``ProgME: towards programmable network measurement'', ACM SIGCOMM Computer Communication Review, vol. 37, no. 4, pp. 97--108, January 2007.

L. Salgarelli, F. Gringoli, and T. Karagiannis, ``Comparing traffic classifiers'', ACM SIGCOMM Computer Communication Review, vol. 37, no. 3, pp. 65--68, January 2007.

K. Vishwanath and A. Vahdat, ``Realistic and responsive network traffic generation'', ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 111--122, October 2006.

G. Varghese, J. Fingerhut, and F. F.~Bonomi, ``Detecting evasion attacks at high speeds without reassembly'', ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 327--338, October 2006.

M. Fayed, P. Krapivsky, J.W. Byers, M. Crovella, D. Finkel, and S. Redner, ``On the emergence of highly variable distributions in the autonomous system topology'', ACM SIGCOMM Computer Communication Review, vol. 33, no. 2, pp. 41--49, April 2003.

C. Estan and G. Varghese, ``New directions in traffic measurement and accounting'', ACM SIGCOMM Computer Communication Review, vol. 32, no. 4, pp. 323--336, October 2002.

ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications

B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger, ``Anatomy of a large European IXP'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2012, pp. 163--174.

W. Muehlbauer, S. Uhlig, B. Fu, M. Meulle, and O. Maennel, ``In search for an appropriate granularity to model routing policies'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, October 2007, vol. 37 (4), pp. 145--156.

H. Ballani, P. Francis, and X. Zhang, ``A study of prefix hijacking and interception in the internet'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, October 2007, vol. 37 (4).

C. Huang, J. Li, and K.W. Ross, ``Can internet video-on-demand be profitable?'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, January 2007, pp. 133--144.

C. Estan, S. Savage, and G. Varghese, ``Automatically inferring patterns of resource consumption in network traffic'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2003, pp. 137--148.

ACM SIGCOMM HotNets Workshop

M. Casado, T. Koponen, D. Moon, and S. Shenker, ``Rethinking packet forwarding hardware'', in ACM SIGCOMM HotNets Workshop, November 2008, p. (6 pages).

ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN)

M. Moshref, M. Yu, and R. Govindan, ``Resource/accuracy tradeoffs in software-defined measurement'', in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), August 2013.

J.C. Mogul and P. Congdon, ``Hey, you darned counters!: get off my ASIC!'', in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), August 2012, pp. 25--30.

ACM SIGCOMM Workshop on Information-Centric Networking (ICN)

A. Detti, N.B. Melazzi, S. Salsano, and M. Pomposini, ``CONET: a content centric inter-networking architecture'', in ACM SIGCOMM Workshop on Information-Centric Networking (ICN), August 2011, pp. 50--55.

ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware

G.J. Katz and J.T. Kider, ``All-pairs shortest-paths for large graphs on the GPU'', in ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware, June 2008, pp. 47--55.

ACM SIGKDD Intl Conf. on Knowledge Discovery and Data Mining

T. Yang, J. Gong, H. Zhang, L. Zou, L. Shi, and X. Li, ``HeavyGuardian: Separate and guard hot items in data streams'', in ACM SIGKDD Intl Conf. on Knowledge Discovery and Data Mining, August 2018, pp. 2584--2593.

ACM SIGMETRICS Performance Evaluation Review

D.~Z. Tootaghaj, T. He, and T. La~Porta, ``Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring'', ACM SIGMETRICS Performance Evaluation Review, vol. 45, pp. (13 pages), January 2017.

H. Jiang and C. Dovrolis, ``Why is the internet traffic bursty in short (sub-RTT) timescales?'', ACM SIGMETRICS Performance Evaluation Review, vol. 33, no. 1, pp. 241--252, June 2005.

ACM SIGMOD-SIGACT-SIGAI Symp. on Principles of Database Systems

D. Eppstein, M.T. Goodrich, M. Mitzenmacher, and M.R. Torres, ``2-3 Cuckoo filters for faster triangle listing and set intersection'', in ACM SIGMOD-SIGACT-SIGAI Symp. on Principles of Database Systems, May 2017, pp. 247--260.

ACM SIGSAC Conf. on Computer and Communications Security

M. Brandt, T. Dai, A. Klein, H. Shulman, and M. Waidner, ``Domain validation++ for MitM-resilient PKI'', in ACM SIGSAC Conf. on Computer and Communications Security, October 2018, pp. 2060--2076.

M. Nasr, A. Bahramali, and A. Houmansadr, ``DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2018, p. (15 pages).

H. Li, H. Hu, G. Gu, G.~J. Ahn, and F. Zhang, ``vNIDS: Towards elastic security with safe and efficient virtualization of Network Intrusion Detection Systems'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2018, p. (18 pages).

M. Nasr, A. Houmansadr, and A. Mazumdar, ``Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2017, p. (16 pages).

J. Holland and M. Schuchard, ``POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2017, p. (2 pages).

F. Cangialosi, T. Chung, D. Choffnes, D. Levin, B. Maggs, A. Mislove, and C. Wilson, ``Measurement and analysis of private key sharing in the HTTPS ecosystem'', in ACM SIGSAC Conf. on Computer and Communications Security, October 2016, pp. 628--640.

ACM SIGSAC Conf. on Computer and Communications Security (CCS)

A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson, ``Users get routed: Traffic correlation on Tor by realistic adversaries'', in ACM SIGSAC Conf. on Computer and Communications Security (CCS), November 2013, pp. 337--348.

ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS)

H.-C. Hsiao, T.H. Kim, S. Yoo, X. Zhang, S.B. Lee, V. Gligor, and A. Perrig, ``STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapment'', in ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS), May 2013, pp. 415--426.

ACM Special Interest Group on Data Communication

T. Yang, J. Jiang, P. Liu, Q. Huang, J. Gong, Y. Zhou, R. Miao, X. Li, and S. Uhlig, ``Elastic sketch: adaptive and fast network-wide measurements'', in ACM Special Interest Group on Data Communication, January 2018, p. (15 pages).

Q. Huang, P.~P.~C. Lee, and Y. Bao, ``Sketchlearn: relieving user burdens in approximate measurement with automated statistical inference'', in ACM Special Interest Group on Data Communication, January 2018, p. (15 pages).

ACM Special Interest Group on Data Communication (SIGCOMM)

R.B. Ben-Basat, G. Einziger, R. Friedman, M.C. Luizelli, and E. Waisbard, ``Constant time updates in hierarchical heavy hitters'', in ACM Special Interest Group on Data Communication (SIGCOMM), August 2017, pp. (127--140).

ACM Symp. on Applied Computing

J.R. Mendoza, R. Ocampo, I. Montes, and C.A. Festin, ``Efficient feature extraction for Internet data analysis using AS2Vec'', in ACM Symp. on Applied Computing, April 2018, pp. 1006--1013.

ACM Symp. on Applied Computing (SAC)

I. Nikolaevskiy, A. Lukyanenko, T. Polishchuk, V. Polishchuk, and A. Gurtov, ``isBF: scalable in-packet Bloom filter based multicast'', in ACM Symp. on Applied Computing (SAC), March 2013, pp. 646--648.

M. Callau-Zori, R. Jimenez-Peris, V. Gulisano, M. Papatriantafilou, Z. Fu, and M. Patino-Martinez, ``STONE: A stream-based DDoS defense framework'', in ACM Symp. on Applied Computing (SAC), March 2013, pp. 807--812.

M. Grey, M. Rossberg, and G. Schaefer, ``Automatic creation of VPN backup paths for improved resilience against BGP-attackers'', in ACM Symp. on Applied Computing (SAC), March 2012, pp. 613--620.

ACM Symp. on Cloud Computing

D.~L. Quoc, I.~E. Akkus, P. Bhatotia, S. Blanas, R. Chen, C. Fetzer, and T. Strufe, ``ApproxJoin: Approximate Distributed Joins'', in ACM Symp. on Cloud Computing, January 2018, p. (13 pages).

ACM Symp. on QoS and Security for Wireless and Mobile Networks

D.S.F. Alves and K. Obraczka, ``An empirical characterization of Internet round-trip times'', in ACM Symp. on QoS and Security for Wireless and Mobile Networks, January 2017, vol. 13, p. (7 pages).

ACM Symp. on SDN Research

S. Wang, J. Bi, C. Sun, and Y. Zhou, ``Prophet: Real-time Queue Length Inference in Programmable Switches'', in ACM Symp. on SDN Research, January 2019, p. (2 pages).

ACM Trans, on Database Systems (TODS)

J.L.J. Dautrich and C.V. Ravishankar, ``Inferring insertion times and optimizing error penalties in time-decaying Bloom filters'', ACM Trans, on Database Systems (TODS), vol. 44, no. 2, pp. (32 pages), April 2019.

ACM Trans. on Computer Systems (TOCS)

C. Estan and G. Varghese, ``New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice'', ACM Trans. on Computer Systems (TOCS), vol. 21, no. 3, pp. 270--313, August 2003.

ACM Trans. on Design Automation of Electronic Systems

T. Kim, J. Lim, J. Kim, W. Cho, E. Chung, and H. Lee, ``Scalable bandwidth shaping scheme via adaptively managed parallel heaps in manycore-based network processors'', ACM Trans. on Design Automation of Electronic Systems, vol. 22, no. 4, pp. (26 pages), July 2017.

ACM Trans. on Information and System Security (TISSEC)

Y. Gilad and A. Herzberg, ``Fragmentation considered vulnerable'', ACM Trans. on Information and System Security (TISSEC), vol. 15, no. 4, pp. (31 pages), April 2013.

ACM Trans. on Intelligent Systems and Technology (TIST)

A. Maltinsky, R. Giladi, and Y. Shavitt, ``On network neutrality measurements'', ACM Trans. on Intelligent Systems and Technology (TIST), vol. 8, no. 4, June 2017.

ACM Trans. on Modeling and Computer Simulation (TOMACS)

M.A. Erazo, R. Rong, and J. Liu, ``Symbiotic network simulation and emulation'', ACM Trans. on Modeling and Computer Simulation (TOMACS), vol. 26, no. 1, pp. (25 pages), October 2015.

V. Petkov, R. Rajagopal, and K. Obraczka, ``Characterizing per-application network traffic using entropy'', ACM Trans. on Modeling and Computer Simulation (TOMACS), vol. 23, no. 2, pp. (25 pages), May 2013.

ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)

J.S. Gilmore and H.A. Engelbrecht, ``Pithos: Distributed storage for nassive nulti-user virtual environments'', ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM), vol. 13, no. 3, pp. (33 pages), July 2017.

ACM Trans. on Privacy and Security (TOPS)

R. Jansen, M. Traudt, J. Geddes, C. Wacek, M. Sherr, and P. Syverson, ``KIST: Kernel-informed socket transport for Tor'', ACM Trans. on Privacy and Security (TOPS), vol. 22, no. 1, pp. (37 pages), December 2018.

S. Matsumoto, R.M. Reischuk, P. Szalachowski, T.H. Kim, and A. Perrig, ``Authentication challenges in a global environment'', ACM Trans. on Privacy and Security (TOPS), vol. 20, no. 1, pp. 1--34, February 2017.

ACM Transactions on Management Information Systems (TMIS)

A. Mangino, M.S. Pour, and E. Bou-Harb, ``Internet-scale insecurity of consumer Internet of Things: An empirical measurements perspective'', in ACM Transactions on Management Information Systems (TMIS), April 2020, vol. 0 of Trans. on Management Information Systems (TMIS), pp. 1--1.

ACM Transactions on Spatial Algorithms and Systems (TSAS)

A.~Y. Nur and M.~E. Tozal, ``Geography and Routing in the Internet'', ACM Transactions on Spatial Algorithms and Systems (TSAS), vol. 4, pp. (16 pages), January 2018.

ACM Workshop on Hot Topics in Networks

Y. Gilad, T. Hlavacek, A. Herzberg, M. Schapira, and H. Shulman, ``Perfect is the enemy of good: Setting realistic goals for interdomain routing security'', in ACM Workshop on Hot Topics in Networks, November 2018, p. (9 pages).

M. Brandt, H. Shulman, and M. Waidner, ``Internet as a source of randomness'', in ACM Workshop on Hot Topics in Networks, November 2018, pp. 64--70.

ACM Workshop on Hot Topics in Networks (HotNets)

Z. Liu, G. Vorsanger, V. Braverman, and V. Sekar, ``Enabling a 'RISC' approach for Software-Defined Monitoring using universal streaming'', in ACM Workshop on Hot Topics in Networks (HotNets), November 2015, p. (7 pages).

ACM Workshop on Hot Topics in Networks Pages

S. Narayana, A. Sivaraman, V. Nathan, M. Alizadeh, D. Walker, J. Rexford, V. Jeyakumar, and C. Kim, ``Hardware-software co-design for network performance measurement'', in ACM Workshop on Hot Topics in Networks Pages, November 2016, vol. 15, pp. 190--196.

ACM workshop on HotPlanet

J. Chabarek and P. Barford, ``What's in a name?: decoding router interface names'', in ACM workshop on HotPlanet, August 2013, pp. 3--8.

ACM Workshop on Information Sharing and Collaborative Security

R. Hiran, N. Carlsson, and N. Shahmehri, ``PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based security'', in ACM Workshop on Information Sharing and Collaborative Security, November 2014, pp. 3--12.

ACM workshop on Rapid Malcode (WORM)

M. Rajab, F. Monrose, and A. Terzis, ``Worm evolution tracking via timing analysis'', in ACM workshop on Rapid Malcode (WORM), November 2005, pp. 52--59.

ACM workshop on Virtualized infrastructure systems and architectures

S. Miwa, M. Suzuki, H. Hazeyama, S. Uda, T. Miyachi, Y. Kadobayashi, and Y. Shinoda, ``Experiences in emulating 10K AS topology with massive VM multiplexing'', in ACM workshop on Virtualized infrastructure systems and architectures, August 2009, pp. 97--104.

ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS)

M.F. Iqbal and L.K. John, ``Efficient traffic aware power management in multicore communications processors'', in ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS), October 2012, pp. 123--134.

Z. Cao and S.S. Panwar, ``Efficient buffering and scheduling for a single-chip crosspoint-queued switch'', in ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS), October 2012, pp. 111--122.

ACM/IFIP/USENIX Middleware Conf.

D.~L. Quoc, R. Chen, P. Bhatotia, C. Fetzer, V. Hilt, and T. Strufe, ``StreamApprox: approximate computing for stream analytics'', in ACM/IFIP/USENIX Middleware Conf., January 2017, vol. 18, p. (12 pages).

ACM/SIGAPP Symp. on Applied Computing

D. Tolpin, ``Population anomaly detection through deep gaussianization'', in ACM/SIGAPP Symp. on Applied Computing, January 2019, p. (6 pages).

Acta Technica CSAV

G. Jing, ``Research on application of DDos attack detection technology based on software defined network'', Acta Technica CSAV, vol. 62, no. 1B, pp. 489--498, July 2017.

Adv. in Computer and Computational Sciences

F. Wang, X. Shao, L. Gao, H. Hirai, and K. Fujikawa, ``Labelling and encoding hierarchical addressing for scalable Internet routing'', in Adv. in Computer and Computational Sciences, September 2017, vol. 554 of Adv. in Intelligent Systems and Computing (AISC), pp. 287--292.

Adv. Materials Research

W. Wei, X. Yingjie, and D. Yabo, ``ASTVA: DDoS-limiting architecture for Next Generation Internet'', Adv. Materials Research, vol. 542-543, pp. 1275--1281, January 2012.

Advanced Information Networking and Applications (WAINA)

M. Narita, T. Katoh, B.B. Bista, and T. Takata, ``Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace'', in Advanced Information Networking and Applications (WAINA), March 2011, pp. 341--348.

Advanced Methods for Complex Network Analysis

A. Garcia-Robledo, A. Diaz-Perez, and G. Morales-Luna, ``Characterization and coarsening of Autonomous System networks: Measuring and simplifying the Internet'', in Advanced Methods for Complex Network Analysis, N. Meghanathan, Ed., January 2016, pp. 148--179.

Advanced Science Lett.

L. Zheng, P. Zou, Y. Jia, and W. Han, ``Traffic anomaly detection improvement based on spatial-temporal characteristics'', Advanced Science Lett., vol. 7, pp. 456--462, March 2012.

L. Zheng, P. Zou, Y Jia, and W. Han, ``An online learning and unsupervised traffic anomaly detection system'', Advanced Science Lett., vol. 7, pp. 449--455, March 2012.

Advances in Information Security

J. Jiang, S. Wen, B. Liu, S. Yu, Y. Xiang, and W. Zhou, ``Malicious Attack Propagation and Source Identification'', Advances in Information Security, vol. 73, pp. (192 pages), January 2019.

S. Yang, H. Du, J. Holsopple, and M. Sudit, ``Attack Projection'', Advances in Information Security, vol. 62, pp. 239--261, October 2014.

Advances in Intelligent and Soft Computing

L. Saganowski, T. Andrysiak, M. Choras, and R. Renk, ``Expansion of matching pursuit methodology for anomaly detection in computer networks'', Advances in Intelligent and Soft Computing, vol. 95, pp. 727--736, January 2011.

Advances in Knowledge Discovery and Data Mining

A. Chaudhury, P. Basuchowdhuri, and S. Majumder, ``Spread of information in a social network using influential nodes'', in Advances in Knowledge Discovery and Data Mining, May 2012, vol. 7302 of Lecture Notes in Computer Science, pp. 121--132.

Advances in Network Security and Applications (CNSA)

M. Suresh and R. Anitha, ``Evaluating machine learning algorithms for detecting DDoS attacks'', in Advances in Network Security and Applications (CNSA), D.C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, and D. Nagamalai, Eds., June 2011, vol. 196 of Communications in Computer and Information Science, pp. 441--452.

Advances in Visual Computing

A. Shrestha, Y. Zhu, and K. Manandhar, ``NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysis'', in Advances in Visual Computing, December 2014, vol. 8887 of Lecture Notes in Computer Science, pp. 357--366.

Air Force Inst. of Technology, Air Univ,

J. Gilbert, ``Scalable wavelet-based active network stepping stone detection'', M.S. thesis, Air Force Inst. of Technology, Air Univ,, March 2012.

AIR FORCE RESEARCH LABORATORY

J.~D. Matyjas, ``Supporting Research and Development of Security Technologies through Network and Security Data Collection'', Tech. rep., AIR FORCE RESEARCH LABORATORY, January 2018.

Algorithmica

S. Cicerone, G. D'Angelo, G. Di~Stefano, D. Frigioni, and V. Maurizio, ``Engineering a new algorithm for distributed shortest paths on dynamic networks'', Algorithmica, vol. online, pp. (36 pages), March 2012.

Algorithms and Models for the Web-Graph

A. Flaxman and J. Vera, ``Bias reduction in traceroute sampling - Towards a more accurate map of the Internet'', in Algorithms and Models for the Web-Graph, December 2007, vol. 4863 of Lecture Notes in Computer Science (LNCS), pp. 1--15.

Algotel

B. Donnet and T. Friedman, ``A CIDR stopping rule for topology discovery'', in Algotel, May 2005.

Allerton Conf. on Communication, Control and Computing

Y. Kanizo, D. Hay, and I. Keslassy, ``Hash tables with finite buckets are less resistant to deletions'', in Allerton Conf. on Communication, Control and Computing, September 2010, pp. 678--685.

Allerton Conf. on Communication, Control, and Computing

N. Wu, S. Tseng, and A. Tang, ``Accurate rate-aware flow-level traffic splitting'', in Allerton Conf. on Communication, Control, and Computing, October 2018, pp. 774--783.

J. Wang and I.C. Paschalidis, ``Botnet detection using social graph analysis'', in Allerton Conf. on Communication, Control, and Computing, September 2014, pp. 393--400.

Anglia Ruskin University

S. Sigloch, Mobile Internet connectivity, exploring structural bottlenecks in Tamil Nadu using active Internet periphery measurements, Ph.D. thesis, Anglia Ruskin University, October 2018.

Ann. Telecommunications

A. Beben, J.M. Batalla, W.K. Chai, and J. Sliwinski, ``Multi-criteria decision algorithms for efficient content delivery in content networks'', Ann. Telecommunications, p. (13 pages), August 2012.

Annual ACM Symp. on Applied Computing

G. Julian-Moreno, R. Leira, J.E. Lopez~de Vergara, F.J. Gomez-Arribas, and I. Gonzalez, ``On the feasibility of 40 gbps network data capture and retention with general purpose hardware'', in Annual ACM Symp. on Applied Computing, January 2018, vol. 33, p. (9 pages).

Annual Computer Security Applications Conf.

A. Mani, D. Dworken, T. Vaidya, and M. Sherr, ``An extensive evaluation of the Internet's open proxies'', in Annual Computer Security Applications Conf., December 2018, pp. 252--265.

J. Mirkovic, E. Kline, and P. Reiher, ``RESECT: Self-Learning Traffic Filters for IP Spoofing Defense'', in Annual Computer Security Applications Conf., January 2017, vol. 33, p. (9 pages).

Applications of Social Media and Social Network Analysis

J.Y. Lee and J.C. Oh, ``A node-centric reputation computation algorithm on online social networks'', in Applications of Social Media and Social Network Analysis, May 2015, Lecture Notes in Social Networks, pp. 1--22.

Applied Computing and Informatics

I. Sreeram and V.~P.~K. Vuppala, ``HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm'', Applied Computing and Informatics, vol. 15, pp. (7 pages), January 2017.

Applied Networking Research Workshop

J.S. Varghese and L. Ruan, ``Computing customer cones of peering networks'', in Applied Networking Research Workshop, July 2016, pp. 35--37.

Arabian J. for Science and Engineering

C. Lei, H. Zhang, Y. Liu, and X. Du, ``Net-flow fingerprint model based on optimization theory'', Arabian J. for Science and Engineering, vol. 41, pp. 3081--3088, March 2016.

M. Poongodi and S. Bose, ``A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS attack in MANET'', Arabian J. for Science and Engineering, vol. 40, no. 12, pp. 3583--3594, September 2015.

Architecture of Computing Systems (ARCS)

A. Oeldemann, T. Wild, and H. Herkersdorf, ``Reducing data center resource over-provisioning through dynamic load management for virtualized network functions'', in Architecture of Computing Systems (ARCS), April 2017, vol. 10172 of Lecture Notes in Computer Science (LNCS), pp. 234--247.

M. Meitinger, R. Ohlendorf, T. Wild, and A. Herkersdorf, ``A hardware packet re-sequencer unit for network processors'', in Architecture of Computing Systems (ARCS). February 2008, vol. 4934 of Lecture Notes in Computer Science, pp. 85--97, Springer.

arxiv.org

M.D. Iannacone and R.A. Bridges, ``Quantifiable and comparable evaluations of cyber defensive capabilities: A survey and novel, unified approach'', Tech. rep., arxiv.org, October 2019.

J. Xu, ``READ: a three-communicating-stage distributed super points detections algorithm'', Tech. rep., arxiv.org, July 2019.

A.A. Niaki, S. Cho, Z. Weinberg, N.P. Hoang, A. Razaghpanah, N. Christin, and P. Gill, ``ICLab: A global, longitudinal Internet censorship measurement platform'', Tech. rep., arxiv.org, July 2019.

T. Bottger, G. Antichi, E.L. Fernandes, R. di Lallo, M. Bruyere, S. Uhlig, G. Tyson, and C. Ignacio, ``Shaping the Internet: 10 years of IXP growth'', Tech. rep., arxiv.org, July 2019.

I. Sfirakis and V. Kotronis, ``Validating IP prefixes and AS-paths with Blockchains'', Tech. rep., arxiv.org, June 2019.

N. Ivkin, E. Liberty, K. Lang, Z. Karnin, and V. Braverman, ``Streaming quantiles algorithms with small space and update time'', Tech. rep., arxiv.org, June 2019.

J. Cheng, J. Li, X. Tang, V.S. Sheng, C. Zhang, and M. Li, ``A novel DDoS attack detection method using Optimized Generalized Multiple Kernel Learning'', Tech. rep., arxiv.org, June 2019.

A. Berg and D. Forsberg, ``Identifying DNS-tunneled traffic with predictive models'', Tech. rep., arxiv.org, June 2019.

A.M. Rehman, S. Goldberg, and D. Choffnes, ``Passport: Enabling accurate country-level router geolocation using inaccurate sources'', Tech. rep., arxiv.org, May 2019.

T. McDaniel, J.M. Smith, and M. Schuchard, ``The Maestro attack: Orchestrating malicious flows with BGP'', Tech. rep., arxiv.org, May 2019.

J. Holland, J. Smith, and M. Schuchard, ``Measuring irregular geographic exposure on the Internet'', Tech. rep., arxiv.org, May 2019.

B.Z.H. Zhao, M. Ikram, H.J. Asghar, M.A. Kaafar, A. Chaabane, and K. Thilakarathna, ``A decade of mal-activity reporting: A retrospective analysis of Internet malicious activity blacklists'', Tech. rep., arxiv.org, April 2019.

R. Cohen and Y. Nezri, ``Cardinality estimation in a virtualized network device using online machine learning'', Tech. rep., arxiv.org, March 2019.

J. Chen, X. Tang, J. Cheng, F. Wang, and R. Xu, ``DDoS attack detection method based on network abnormal behavior in Big Data Environment'', Tech. rep., arxiv.org, March 2019.

B. Turkovic, J. Oostenbrink, and F. Kuipers, ``Detecting heavy hitters in the data-plane'', Tech. rep., arxiv.org, February 2019.

E.C. Rye, J. Martin, and R. Beverly, ``EUI-64 considered harmful'', Tech. rep., arxiv.org, February 2019.

A. Funel, ``The graph structure of the Internet at the Autonomous Systems level during ten years'', Tech. rep., arxiv.org, February 2019.

M. Nawrocki, T.C. Schmidt, and M. Wahlisch, ``Uncovering vulnerable industrial control systems from the Internet core'', Tech. rep., arxiv.org, January 2019.

D. Gong, M. Tran, S. Shinde, H. Jin, V. Sekar, P. Saxena, and M.S. Kang, ``Practical verifiable in-network filtering for DDoS defense'', Tech. rep., arxiv.org, January 2019.

Z. Zhao, X. Shi, X. Yin, and Z. Wang, ``HashFlow for better flow record collection'', Tech. rep., arxiv.org, December 2018.

J. Xu, W. Ding, and X. Hu, ``VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time window'', Tech. rep., arxiv.org, December 2018.

J.M. Smith, K. Birkeland, T. McDaniel, and M. Schuchard, ``Withdrawing the BGP re-routing curtain: Understanding the security impact of BGP poisoning via real-world measurements'', Tech. rep., arxiv.org, November 2018.

S. Barbhuiya, Z. Papazachos, P. Kilpatrick, and D.S. Nikolopoulos, ``RADS: Real-time anomaly detection system for cloud data centres'', Tech. rep., arxiv.org, November 2018.

P. Liu, A. Benson, and M. Charikar, ``A sampling framework for counting temporal motifs'', Tech. rep., arxiv.org, October 2018.

S. Yan and A. Khan, ``Composite hashing for data stream sketches'', Tech. rep., arxiv.org, August 2018.

Z. Cheng, Q. Huang, and P.P.C. Lee, ``On the performance and convergence of distributed stream processing via approximate fault tolerance'', Tech. rep., arxiv.org, August 2018.

M. Apostolaki, G. Marti, J. Muller, and L. Vanbever, ``SABRE: Protecting bitcoin against routing attacks'', Tech. rep., arxiv.org, August 2018.

H. Wu, H.C. Hsiao, D.E. Asoni, S. Scherrer, A. Perrig, and Y.C. Hu, ``CLEF: Limiting the damage caused by large flows in the Internet core (technical report)'', Tech. rep., arxiv.org, July 2018.

R. Dahlberg, T. Pulls, J. Vestin, T. Hoiland-Jorgensen, and A. Kassler, ``Aggregation-based certificate transparency gossip'', Tech. rep., arxiv.org, June 2018.

J. Kucera, D.A. Popescu, G. Antichi, J. Korenek, and A.W. Moore, ``Seek and Push: Detecting large traffic aggregates in the dataplane'', Tech. rep., arxiv.org, May 2018.

T.R. Glass-Vanderlan, M.E. Iannacone, M.S. Vincent, Q. Chen, and R.A. Bridges, ``A survey of Intrusion Detection Systems leveraging host data'', Tech. rep., arxiv.org, May 2018.

P. Ekparinya, V. Gramoli, and G. Jourjon, ``Double-spending risk quantification in private, consortium and public Ethereum blockchains'', Tech. rep., arxiv.org, May 2018.

S. Mastorakis, T. Ahmed, and J. Pisharath, ``ISA-based trusted network functions and server applications in the untrusted cloud'', Tech. rep., arxiv.org, February 2018.

P. Goyal, A. Narayan, F. Cangialosi, D. Raghavan, S. Narayana, M. Alizadeh, and H. Balakrishnan, ``Elasticity detection: A building block for Internet congestion control'', Tech. rep., arxiv.org, February 2018.

C. Chen, D. Asoni, A. Perrig, D. Barrera, G. Danezis, and C. Troncoso, ``TARANET: Traffic-analysis resistant anonymity at the NETwork layer'', Tech. rep., arxiv.org, February 2018.

R. Wails, Y. Sun, A. Johnson, M. Chiang, and P. Mittal, ``Tempest: Temporal dynamics in anonymity systems'', Tech. rep., arxiv.org, January 2018.

J.Y. Shin, D. Kirovski, and D.T. Harper, ``Computing units using directional wireless communication'' January 2018.

O.~E. Elejla, M. Anbar, B. Belaton, and S. Hamouda, ``Labeled flow-based dataset of ICMPv6-based DDoS attacks'', Tech. rep., arxiv.org, January 2018.

T. Bottger, F. Cuadrado, G. Tyson, I. Castro, and S. Uhlig, ``Open connect everywhere: A glimpse at the Internet ecosystem through the lens of the Netflix CDN'', Tech. rep., arxiv.org, January 2018.

Z. Zhang, L. Ma, K.~K. Leung, F. Le, S. Kompella, and L. Tassiulas, ``How better is distributed SDN? An analytical approach'', Tech. rep., arxiv.org, December 2017.

Z. Liu, Y. Liu, P. Winter, P. Mittal, and Y. Hu, ``TorPolice: Towards enforcing service-defined access policies in anonymous systems'', Tech. rep., arxiv.org, December 2017.

Y. Yu, D. Belazzougui, C. Qian, and Q. Zhang, ``Memory-efficient and ultra-fast network lookup and forwarding using Othello hashing'', Tech. rep., arxiv.org, November 2017.

N.N. Dao, T.V. Phan, U. Saad, J. Kim, T. Bauschert, and S. Cho, ``Securing heterogeneous IoT with intelligent DDoS attack behavior learning'', Tech. rep., arxiv.org, November 2017.

V. Kotronis, G. Nomikos, L. Manassakis, D. Mavrommatis, and X. Dimitropoulos, ``Shortcuts through colocation facilities'', Tech. rep., arxiv.org, October 2017.

D.L. Quoc, R. Chen, P. Bhatotia, C. Fetzer, V. Hilt, and T. Strufe, ``Approximate stream analytics in Apache Flink and Apache Spark streaming'', Tech. rep., arxiv.org, September 2017.

R. Mayer, L. Graser, H. Gupta, E. Saurez, and U. Ramachandran, ``EmuFog: Extensible and scalable emulation of large-scale fog computing infrastructures'', Tech. rep., arxiv.org, September 2017.

Z. Liu, H. Jin, Y. Hu, and M. Bailey, ``MiddlePolice: Fine-grained endpoint-driven in-network traffic control for proactive DDoS attack mitigation'', Tech. rep., arxiv.org, September 2017.

A. Muscoloni and C.V. Cannistraci, ``Local-ring network automata and the impact of hyperbolic geometry in complex network link-prediction'', Tech. rep., arxiv.org, July 2017.

P. Sermpezis, G. Nomikos, and X. Dimitropoulos, ``Re-mapping the Internet: Bring the IXPs into play'', Tech. rep., arxiv.org, June 2017.

A. Reuter, R. Bush, I. Cunha, E. Katz-Bassett, T. Schmidt, and M. Wahlisch, ``Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering'', Tech. rep., arxiv.org, June 2017.

H. Duan, C. Wang, X. Yuan, Y. Zhou, Q. Wang, and K. Ren, ``LightBox: SGX-assisted secure network functions at near-native speed'', Tech. rep., arxiv.org, June 2017.

S. Cho, R. Nithyanand, A. Razaghpanah, and P. Gill, ``A churn for the better: Localizing censorship using network-level path churn and network tomography'', Tech. rep., arxiv.org, June 2017.

D.~A. Vega-Oliveros, L.~d.~F. Costa, and F.~A. Rodrigues, ``Influence maximization on correlated networks through community identification'', Tech. rep., arxiv.org, May 2017.

M. Nogueira, A. Santos, and J. Moura, ``Early signals from volumetric DDoS attacks: An empirical study'', Tech. rep., arxiv.org, May 2017.

D. Anderson, P. Bevan, K. Lang, E. Liberty, L. Rhodes, and J. Thaler, ``A high-performance algorithm for identifying frequent items in data streams'', Tech. rep., arxiv.org, May 2017.

Y. Sun, A. Edmundson, N. Feamster, M. Chiang, and P. Mittal, ``Counter-RAPTOR: Safeguarding Tor against active routing attacks'', Tech. rep., arxiv.org, April 2017.

N. Duffield, Y. Xu, L. Xia, N. Ahmed, and M. Yu, ``Stream aggregation through order sampling'', Tech. rep., arxiv.org, March 2017.

C. Cascone, R. Bifulco, S. Pontarelli, and A. Capone, ``Relaxing state-access constraints in stateful programmable data planes'', Tech. rep., arxiv.org, March 2017.

J. Suarez-Varela and P. Barlet-Ros, ``Reinventing NetFlow for OpenFlow Software-Defined Networks'', Tech. rep., arxiv.org, February 2017.

P. Sermpezis and X. Dimitropoulos, ``Can SDN accelerate BGP convergence? A performance analysis of inter-domain routing centralization'', Tech. rep., arxiv.org, February 2017.

D. Engel and W. Malone, ``Integrated information as a metric for group interaction: Analyzing human and computer groups using a technique developed to measure consciousness'', Tech. rep., arxiv.org, February 2017.

Y. Afek, A. Barr, S. Feibish, and L. Schiff, ``Detecting heavy flows in the SDN match and action model'', Tech. rep., arxiv.org, February 2017.

K.~S. Tai, V. Sharan, P. Bailis, and G. Valiant, ``Finding Heavily-Weighted Features in Data Streams'', Tech. rep., arxiv.org, January 2017.

A. Kolesnikov, ``Load modelling and generation in IP-based networks'', Tech. rep., arxiv.org, January 2017.

S. Fernandes, ``Performance evaluation for network services, systems and protocols '', Tech. rep., arxiv.org, January 2017.

K. Semertzidis, E. Pitoura, E. Terzi, and P. Tsaparas, ``Best friends forever (BFF): Finding lasting dense subgraphs'', Tech. rep., arxiv.org, December 2016.

Y. Yu, D. Belazzougui, C. Qian, and Q. Zhang, ``A concise forwarding information base for scalable and fast flat name switching'', Tech. rep., arxiv.org, August 2016.

E. Bergamini, M. Wegner, D. Lukarski, and H. Meyerhenke, ``Estimating current-flow closeness centrality with a multigrid Laplacian solver'', Tech. rep., arxiv.org, July 2016.

R. Singh, H. Koo, N. Miramirkhani, Akoglu Miraj~F., and Gill~P. L., ``The politics of routing: Investigating the relationship between AS connectivity and Internet freedom'', Tech. rep., arxiv.org, June 2016.

A. Shah, R. Fontunge, and C. Papadopoulos, ``Towards characterizing international routing detours'', Tech. rep., arxiv.org, June 2016.

M. Schuchard and N. Hopper, ``E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentives'', Tech. rep., arxiv.org, June 2016.

T. Huang, H. Sethu, and N. Kandasamy, ``A new approach to dimensionality reduction for anomaly detection in data traffic'', Tech. rep., arxiv.org, June 2016.

G. Einziger, B. Fellman, R. Friedman, and Y. Kassner, ``ICE buckets: improved counter estimation for network measurement'', Tech. rep., arxiv.org, June 2016.

R. Nithyanand, R. Singh, S. Cho, and P. Gill, ``Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client design'', Tech. rep., arxiv.org, May 2016.

D. Eppstein, M.T. Goodrich, J. Lam, N. Mamano, M. Mitzenmacher, and M. Torres, ``Models and algorithms for graph watermarking'', Tech. rep., arxiv.org, May 2016.

H. Lim, V. Sekar, Y. Abe, and D.G. Anderson, ``NetMemex: Providing full-fidelity traffic archival'', Tech. rep., arxiv.org, March 2016.

K. Kleineberg, M. Boguna, M. Serrano, and F. Papadopoulos, ``Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigation'', Tech. rep., arxiv.org, January 2016.

R. Nithyanand, O. Starov, A. Zair, P. Gill, and M. Schapira, ``Measuring and mitigating AS-level adversaries against Tor'', Tech. rep., arxiv.org, December 2015.

W. Liu, Q. Jiang, G. Fei, M. Yuan, and G. Hu, ``A novel methodology of router-to-AS mapping inspired by community discovery'', Tech. rep., arxiv.org, December 2015.

K. Kloster and D.F. Gleich, ``Seeded PageRank solution paths'', Tech. rep., arxiv.org, December 2015.

C.L. Staudt, A. Sazonovs, and H. Meyerhenke, ``NetworKit: A tool suite for large-scale complex network analysis'', Tech. rep., arxiv.org, November 2015.

A. Johnson, R. Jansen, A.D. Jaggard, J. Feigenbaum, and P. Syverson, ``Avoiding the Man on the Wire: Improving Tor's security with trust-aware path selection'', Tech. rep., arxiv.org, November 2015.

N. Donoghue, B. Hahn, H. Xu, T. Kroeger, D. Zage, and R. Johnson, ``Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Database'', Tech. rep., arxiv.org, November 2015.

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and M. Lopez-Garcia, ``Frame coalescing in dual-mode EEE'', Tech. rep., arxiv.org, October 2015.

C. Basescu, R.M. Reischuk, P. Szalachowski, A. Perrig, Y. Zhang, H.-C. Hsiao, A. Kubota, and J. Urakawa, ``SIBRA: Scalable Internet Bandwidth Reservation Architecture'', Tech. rep., arxiv.org, October 2015.

T. Lee, P. Szalachowski, D. Barrera, A. Perrig, H. Lee, and D. Watrin, ``Bootstrapping real-world deployment of future Internet architectures'', Tech. rep., arxiv.org, August 2015.

T. Vaidya, ``2001-2013: Survey and analysis of major cyberattacks'', Tech. rep., arxiv.org, July 2015.

S. Matsumoto, R.M. Reischuk, P. Szalachowski, T.H.-J. Kim, and A. Perrig, ``Designing a global authentication infrastructure'', Tech. rep., arxiv.org, June 2015.

A.D. Jaggard, A. Johnson, P. Syverson, and J. Feigenbaum, ``Representing network trust and using it to improve anonymous communication'', Tech. rep., arxiv.org, June 2014.

S. Qazi and T. Moors, ``Disjoint-path selection in Internet: What traceroutes tell us?'', Tech. rep., arxiv.org, May 2014.

F Tan, J. Wu, Y. Xia, and C.K. Tse, ``Traffic congestion in interconnected complex networks'', Tech. rep., arxiv.org, January 2014.

G. Nomikos, P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``The multiple instances of node centrality and their implications on the vulnerability of ISP networks'', Tech. rep., arxiv.org, December 2013.

E.A. Meirom, S. Mannor, and A. Orda, ``Network formation games and the Internet structure'', Tech. rep., arxiv.org, August 2013.

S. Guntuku, P. Narang, and C. Hota, ``Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural network'', Tech. rep., arxiv.org, July 2013.

Y. Chen, V. Kawadia, and R. Urgaonkar, ``Detecting overlapping temporal community structure in time-evolving networks'', Tech. rep., arxiv.org, March 2013.

V.M. Preciado, M. Draief, and A. Jadbabaie, ``Structural analysis of viral spreading processes in social and communication networks using egonets'', Tech. rep., arxiv.org, September 2012.

M. Gjoka, M. Kurant, and A. Markopoulou, ``2.5K-graphs: from sampling to generation'', Tech. rep., arxiv.org, August 2012.

A. Houmansadr, N. Kiyavash, and N. Borisov, ``Non-blind watermarking of network flows'', Tech. rep., arxiv.org, March 2012.

B. Edwards, S. Hofmeyr, G. Stelle, and S. Forrest, ``Internet topology over time'', Tech. rep., arxiv.org, February 2012.

F. He, F. Xiang, Y. Yibo~Xue, and J. Jun~Li, ``Towards high-performance network application identification with aggregate-flow cache'', Tech. rep., arxiv.org, May 2011.

L. Liu and K. Xu, ``Time series of Internet AS-level topology graphs: four patterns and one model'', Tech. rep., arxiv.org, December 2008.

H. Haddadi, D. Fay, A. Jamakovic, O. Maennel, A. Moore, R. Mortier, M. Rio, and S. Uhlig, ``Beyond node degree: Evaluating AS topology models'', Tech. rep., arxiv.org, July 2008.

R. Clegg, H. Haddadi, R. Landa, and M. Rio, ``Towards informative statistical flow inversion'', Tech. rep., arxiv.org, May 2007.

H. Haddadi, R. Landa, M. Rio, and S. Bhatti, ``Revisiting the issues on netflow sample and export performance'', Tech. rep., arxiv.org, April 2007.

R. Clegg, ``Markov-modulated on/off processes for long-range dependent internet traffic'', Tech. rep., arxiv.org, October 2006.

M. Latapy and C. Magnien, ``Measuring fundamental properties of real-world complex networks'', Tech. rep., arxiv.org, September 2006.

B. Donnet, P. Raoult, and T. Friedman, ``Efficient route tracing from a single source'', Tech. rep., arxiv.org, May 2006.

S. Zhou and R. Mondragon, ``Analyzing and modelling the AS-level Internet topology'', Tech. rep., arxiv.org, June 2003.

ASE BigData/SocialCom/Cybersecurity Conf.

X. Zhou, M. Petrovic, T. Eskridge, M. Carvalho, and X. Tao, ``Exploring Netflow data using Hadoop'', in ASE BigData/SocialCom/Cybersecurity Conf., May 2014, p. (10 pages).

Asia Conf. on Computer and Communications Security

T. Lee, C. Pappas, A. Perrig, V. Gligor, and Y. Hu, ``The case for in-network replay suppression'', in Asia Conf. on Computer and Communications Security, April 2017, pp. 862--873.

Asia Future Internet summer school, Jeju, Korea

H. Asai and H. Esaki, ``AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs'', in Asia Future Internet summer school, Jeju, Korea, August 2009.

Asia Joint Conf. on Information Security

M. Ando, M. Okada, and A. Kanaoka, ``Simulation study of BGP origin validation effect against mis-origination with Internet topology'', in Asia Joint Conf. on Information Security, September 2017, pp. 75--82.

Asia-Pacific Advanced Network

N.M. Sahri and K. Okamura, ``Adaptive anomaly detection for SDN'', Asia-Pacific Advanced Network, vol. 40, pp. 57--63, January 2015.

Asia-Pacific Conference on Communications (APCC)

K. Sakuma, H. Asahina, S. Haruta, and I. Sasase, ``Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination'', in 2017 23rd Asia-Pacific Conference on Communications (APCC), January 2017, vol. 23, p. (6 pages).

Asia-Pacific Network Operations and Management Symp. (APNOMS)

D. Sun, K. Yang, B. Lv, and Z. Shi, ``Could we beat a new mimicking attack?'', in Asia-Pacific Network Operations and Management Symp. (APNOMS), January 2017, vol. 19, p. (4 pages).

G. Germoglio, B. Dias, and P. Sousa, ``Automated and distributed network service monitoring'', in Asia-Pacific Network Operations and Management Symp. (APNOMS), September 2009, vol. 5787 of Lecture Notes in Computer Science (LNCS), pp. 143--150.

Asia-Pacific Symp. on Information visualisation (APVis)

B. Yip, S. Goyette, and C. Madden, ``Visualising Internet traffic data with three-dimensional spherical display'', in Asia-Pacific Symp. on Information visualisation (APVis), January 2005, vol. 45, pp. 153--158.

Asia-Pacific Workshop on Networking

A. Dethise, M. Chiesa, and M. Canini, ``Prelude: Ensuring inter-domain loop-freedom in SDN-enabled networks'', in Asia-Pacific Workshop on Networking, August 2018, pp. 50--56.

Asian Conf. on Defense Technology (ACDT)

T.~M. Thang, C.~Q. Nguyen, and K.~V. Nguyen., ``Synflood Spoofed Source DDoS Attack Defense Based on Packet ID Anomaly Detection with Bloom Filter'', in Asian Conf. on Defense Technology (ACDT), January 2018, vol. 5.

Australian J. of Telecommunications and the Digital Economy

M. Albdair, R. Addie, and D. Fatseas, ``Social network behaviour inferred from O-D pair traffic'', Australian J. of Telecommunications and the Digital Economy, vol. 5, no. 2, pp. 131--150, June 2017.

Barcelona Tech

C. Gonzalez, ``Information theoretic measures for the detection of anomalies in IP darkspace traffic'', M.S. thesis, Barcelona Tech, June 2014.

Binghamton Univ.

H. Chen, Toward hardware-oriented defensive network infrastructure, Ph.D. thesis, Binghamton Univ., January 2015.

Boston Univ., CS Dept.

V. Ishakian, J. Akinwumi, and I. Matta, ``On the cost of supporting multihoming and mobility'', Tech. rep., Boston Univ., CS Dept., June 2009.

Brazilian Symp. on Computer Networks and Distributed Systems (SBRC)

O. Fonseca, E. Fazzion, I. Cunha, P. Las-Casas, D. Guedes, W. Meira, C. Hoepers, K. Steding-Jessen, and M.H.P.C. Chaves, ``A spam traffic cost analysis for network operators'', in Brazilian Symp. on Computer Networks and Distributed Systems (SBRC), May 2015, pp. 41--49.

Brazilian Symp. on Information Systems

C.~O. Camargo, E.~R. Faria, B.~B. Zarpelao, and R.~S. Miani, ``Qualitative evaluation of denial of service datasets'', in Brazilian Symp. on Information Systems, January 2018, p. (8 pages).

BT Technology J.

S. Zhou, ``Characterising and modelling the internet topology - The rich-club phenomenon and the PFP model'', BT Technology J., vol. 24, no. 3, pp. 108--115, July 2006.

Cairo Univ.

K. Khanmohammadi and M. Fallah, ``Distributed packet filtering based on IP traceback'', Tech. rep., Cairo Univ., December 2006.

California Inst. of Technology

P. London, ``Distributed optimization and data market design'', M.S. thesis, California Inst. of Technology, June 2017.

California State Univ. San Bernardino

E.Y.M. Muharish, ``Packet filter approach to detect Denial of Service attacks'', M.S. thesis, California State Univ. San Bernardino, June 2016.

Cambridge Intl Workshop on Security Protocols

J. Gardiner and S. Nagaraja, ``On the reliability of network measurement techniques Used for malware traffic analysis'', in Cambridge Intl Workshop on Security Protocols, October 2014, vol. 8809 of Lecture Notes in Computer Science, pp. 321--333.

Campus-Wide Information Systems

M. Wahlisch, T.C. Schmidt, and W. Spalt, ``What is happening from behind?: Making the impact of internet topology visible'', Campus-Wide Information Systems, vol. 25, no. 5, pp. 392--406, January 2008.

Canadian Conf. on Electrical and Computer Engineering (CCECE)

S. Rahmat, Q. Niyaz, A. Javaid, and W. Sun, ``Normal and anomalous traffic flow pattern analysis for organizational networks'', in Canadian Conf. on Electrical and Computer Engineering (CCECE), April 2017, vol. 30, p. (4 pages).

Carnegie Mellon Univ

C. Chen, Infrastructure-based anonymous communication protocols in future internet architectures, Ph.D. thesis, Carnegie Mellon Univ, August 2018.

Carnegie Mellon Univ.

Z. Weinberg, Toward automated worldwide monitoring of network-level censorship, Ph.D. thesis, Carnegie Mellon Univ., December 2018.

H.-C. Hsiao, Toward a highly available future Internet, Ph.D. thesis, Carnegie Mellon Univ., June 2014.

M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet - causes, exploits, and countermeasures'', Tech. rep., Carnegie Mellon Univ., May 2014.

H.-C. Hsiao, T. Kim, S. Yoo, X. Zhang, S.B. Lee, V.D. Gligor, and A. Perrig, ``Sanctuary trail: refuge from Internet DDoS entrapment'', Tech. rep., Carnegie Mellon Univ., June 2012.

J. Leskovec, K.J. Lang, A. Dasgupta, and M.W. Mahoney, ``Large-scale community structure in social and information networks'', Tech. rep., Carnegie Mellon Univ., March 2009.

U. Kang, C. Tsourakakis, A.P. Appel, C. Faloutsos, and J. Leskovec, ``HADI: Fast diameter estimation and mining in massive graphs with Hadoop'', Tech. rep., Carnegie Mellon Univ., December 2008.

Chalmers Univ. of Technology, Gothenborg, Sweden

Z. Fu, Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation, Ph.D. thesis, Chalmers Univ. of Technology, Gothenborg, Sweden, August 2012.

W. John, Characterization and classification of internet backbone traffic, Ph.D. thesis, Chalmers Univ. of Technology, Gothenborg, Sweden, February 2010.

Charles Univ.

J. Jancicka, ``Automatic classification of network entities'', Tech. rep., Charles Univ., May 2017.

Chin. Phys. B

D. Szabo, A. Korosi, J. Biro, and A. Gulyas, ``Deductive way of reasoning about the Internet AS level topology'', Chin. Phys. B, vol. 24, no. 11, October 2015.

China Comm.

S. Yanbin, Z. Yu, S. Shen, Z. Hongli, and F. Binxing, ``Geometric name routing for ICN in dynamic world'', China Comm., vol. 12, no. 7, pp. 47--59, July 2015.

China Institute of Communications

C. Li, H. Zhao, X. Zhang, and S. Yuan, ``Analysis on traveling time of internet'', China Institute of Communications, vol. 28, no. 7, pp. 54--60, January 2007.

Chinese Control and Decision Conf.

X. Zhang, H. Zhao, L. Wang, and C. Li, ``On the Internet AS-level topology evolution basing on hierarchy characteristic'', in Chinese Control and Decision Conf., July 2008, p. (6 pages).

Chinese Control and Decision Conf. (CCDC)

J. Zhang, H. Zhao, and Y. Zhou, ``The study on characteristics of the coreness of router-level internet nodes'', in Chinese Control and Decision Conf. (CCDC), July 2008, pp. 4803--4808.

Chinese Control Conf. (CCC)

Q. Shi, X. Wang, and W. Lin, ``Placement Strategy for Replicated Servers in CDN'', in Chinese Control Conf. (CCC), January 2018, vol. 37, p. (7 pages).

Chinese J. of Electronics

D. Qin, J. Yang, and H. Wang, ``Experimental study on diversity and novelty of interdomain paths'', Chinese J. of Electronics, vol. 22, no. 1, pp. 160--166, January 2013.

Chinese Journal of Electronics

A. Zhou, L. Liu, H. Zhu, C. Zhu, and L. Chen, ``Parallel Sketch Based Super Node Detection with Traceability'', Chinese Journal of Electronics, vol. 27, pp. (8 pages), January 2018.

Cluster Computing

K.~M. Prasad, A.~R.~M. Reddy, and K.~V. Rao, ``DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment'', Cluster Computing, vol. 21, pp. 1765--1783, May 2018.

M. Poongodi and S. Bose, ``Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET'', Cluster Computing, vol. 18, no. 4, pp. 1549--1559, December 2015.

CMC: Computers, Materials and Continua

J. Cheng, R. Xu, X. Tang, V. Sheng, and C. Cai, ``An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment'', CMC: Computers, Materials and Continua, vol. 55, no. 1, pp. 95--119, May 2018.

Colombian Conf. on Computing

F.G. Guerrero, ``Stochastic traffic analysis of contemporary Internet high-speed links'', in Colombian Conf. on Computing, August 2017, vol. 735 of Communications in Computer and Information Science, pp. 44--58.

Colorado State Univ.

A. Shah, Systems for characterizing Internet routing, Ph.D. thesis, Colorado State Univ., April 2018.

N.M. Ghahfarokhi, Cooperative defense mechanism for detection, identification, and filtering of DDos attacks, Ph.D. thesis, Colorado State Univ., August 2016.

S. DiBenedetto, A. Stone, M. Strout, and D. Massey, ``Simulating internet scale topologies with metarouting'', Tech. rep., Colorado State Univ., March 2010.

Colorado State Univ. Technical Report

A. Shah and C. Papadopoulos, ``Characterizing international BGP detours'', Tech. rep., Colorado State Univ. Technical Report, November 2015.

Columbia Univ.

G. Kontaxis, Reducing third parties in the network through client-side intelligence, Ph.D. thesis, Columbia Univ., January 2018.

Comm. Surveys and Tutorials

N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, ``Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations'', Comm. Surveys and Tutorials, vol. 21, no. 3, pp. 2702--2733, April 2019.

Communications and Network Security (CNS)

F. Iglesias and T. Zseby, ``Modelling IP darkspace traffic by means of clustering techniques'', in Communications and Network Security (CNS), October 2014, pp. 166--174.

Communications in Statistics - Simulation and Computation

J. Dauxois and A. Nucit, ``Some estimation problems in epidemic modeling'', Communications in Statistics - Simulation and Computation, vol. 47, no. 4, pp. 1066--1087, March 2017.

ComNet, Technion, Israel

Y. Kanizo, D. Hay, and I. Keslassy, ``Maximizing the throughput of cuckoo hashing in network devices'', Tech. rep., ComNet, Technion, Israel, February 2012.

A. Shpiner, I. Keslassy, and R. Cohen, ``Reducing the reordering delay in multi-core network processors'', Tech. rep., ComNet, Technion, Israel, January 2012.

O. Rottenstreich and I. Keslassy, ``The Bloom paradox: When not to use a Bloom filter'', Tech. rep., ComNet, Technion, Israel, June 2011.

Y. Kanizo, D. Hay, and I. Keslassy, ``Optimal dynamic hash tables'', Tech. rep., ComNet, Technion, Israel, January 2009.

Complex Dynamics in Communication Networks

G. Chen, Z. Fan, and X. Li, ``Modelling the complex Internet topology'', in Complex Dynamics in Communication Networks, January 2006, vol. 5 of Understanding Complex Systems (UCS), pp. 213--234.

Complex Networks

G. Sukrit, P. Rami, and K. Konstantin, ``Comparative network analysis using KronFit'', in Complex Networks, March 2016, vol. 644 of Studies in Computational Intelligence, pp. 363--375.

Computational Science and Its Applications (ICCSA)

A. Fiorese, P. Simoes, and F. Boavida, ``Peer selection in P2P service overlays using geographical location criteria'', in Computational Science and Its Applications (ICCSA), June 2012, vol. 7334 of Lecture Notes in Computer Science, pp. 234--248.

Computational Science and Technology

O.~E. Elejla, M. Anbar, B. Belaton, B. Alabsi, and A.~K. Al-Ani, ``Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection'', Computational Science and Technology, p. (10 pages), January 2019.

Computer Comm.

S. Berenguer and F. Pintor, ``Radiography of Internet autonomous systems interconnection in Latin America and the Caribbean'', Computer Comm., vol. 119, pp. 15--28, April 2018.

R.~K. Deka, D.~K. Bhattacharya, and J.~K. Kalita, ``Active Learning to Detect DDoS Attack Using Ranked Features'', Computer Comm., p. (28 pages), January 2018.

N. Hoque, H. Kashyap, and D. Bhattacharyya, ``Real-time DDoS attack detection using FPGA'', Computer Comm., vol. 110, pp. 48--55, September 2017.

Q. Gao, F. Wang, and L. Gao, ``Routing-policy aware peering for large content providers'', Computer Comm., vol. 67, pp. 23--33, August 2015.

Computer Comm.s Workshops (INFOCOM WKSHPS)

J.S. Varghese and L. Ruan, ``A machine learning approach to edge type inference in Internet AS graphs'', in Computer Comm.s Workshops (INFOCOM WKSHPS), April 2016, p. (6 pages).

Computer Communications

L. Gupta, R. Jain, A. Erbad, and D. Bhamare, ``The P-ART framework for placement of virtual network services in a multi-cloud environment'', Computer Communications, vol. 139, pp. (19 pages), January 2019.

E. Gregori, L. Lenzini, and V. Luconi, ``AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systems'', Computer Communications, vol. 112, pp. 47--57, August 2017.

R. Fanou, P. Francois, E. Aben, M. Mwangi, N. Goburdhan, and F. Valera, ``Four years tracking unrevealed topological changes in the African interdomain'', Computer Communications, vol. 106, pp. 117--135, July 2017.

S. Ciavarella, N. Bartolini, H. Khamfroush, and T. La~Porta, ``Progressive damage assessment and network recovery after massive failures'', in Computer Communications, May 2017, p. (9 pages).

Y. Sun, Y. Zhang, B. Fang, and H. Zhang, ``Succinct and practical greedy embedding for geometric routing'', Computer Communications, p. (11 pages), January 2017.

S. Behal and K. Kumar, ``Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation'', Computer Communications, vol. 103, pp. (10 pages), January 2017.

B. Jiao and J.-M. Shi, ``Graph perturbations and corresponding spectral changes in Internet topologies'', Computer Communications, vol. 76, pp. 77--86, February 2016.

Z. Zhang, B. Wang, and J. Lan, ``Identifying elephant flows in internet backbone traffic with bloom filters and LRU'', Computer Communications, vol. 61, pp. 70--78, May 2015.

N. Ekiz and P.D. Amer, ``Transport layer reneging'', Computer Communications, vol. 52, no. 1, pp. 82--88, October 2014.

A. Sapegin and S. Uhlig, ``On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events'', Computer Communications, vol. 36, no. 15-16, pp. 1592--1605, September 2013.

M. Tang, G. Zhang, T. Lin, and J. Liu, ``HDLBR: A name-independent compact routing scheme for power-law networks'', Computer Communications, vol. 36, no. 3, pp. 351--359, February 2013.

P.A.R. Kumar and S. Selvakumar, ``Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems'', Computer Communications, vol. 36, no. 3, pp. 303--319, February 2013.

V. Ishakian, J. Akinwumi, F. Esposito, and I. Matta, ``On supporting mobility and multihoming in recursive internet architectures'', Computer Communications, vol. 35, no. 13, pp. 1561--1573, July 2012.

H. Zhang, G. Lu, M.T. Qassrawi, Y. Zhang, and X. Yu, ``Feature selection for optimizing traffic classification'', Computer Communications, vol. 35, no. 12, pp. 1457--1471, April 2012.

H. Rahmani, N. Sahli, and F. Kamoun, ``DDoS flooding attack detection scheme based on F-divergence'', Computer Communications, vol. 35, pp. 1380--1391, April 2012.

E. Gregori, A. Improta, L. Lenzini, and C. Orsini, ``The impact of IXPs on the AS-level topology structure of the Internet'', Computer Communications, vol. 34, pp. 68--82, January 2011.

C. Mouchos, A. Tsokanos, and D.D. Kouvatsos, ``Dynamic OBS offset allocation in WDM networks'', Computer Communications, vol. 33, no. Suppl 1, pp. S130--S145, November 2010.

Y. Zhang, B.X. Fang, and Y.Z. Zhang, ``Parallelizing weighted frequency counting in high-speed network monitoring'', Computer Communications, vol. 34, no. 4, pp. 536--547, April 2010.

L Dai, Y. Cao, Y. Cui, and Y. Xue, ``On scalability of proximity-aware peer-to-peer streaming'', Computer Communications, vol. 32, no. 1, pp. 144--153, January 2009.

Computer Communications Student Workshops

X. Li and C. Qian, ``The virtual network function placement problem'', in Computer Communications Student Workshops, August 2015, pp. 69--70.

Computer Communications Workshops (INFOCOM WKSHPS)

E.C. Rye, J.P. Rohrer, and R. Beverly, ``Revisiting AS-level graph reduction'', in Computer Communications Workshops (INFOCOM WKSHPS), April 2016, p. (6 pages).

K. Visala, A. Keating, and R.H. Khan, ``Models and tools for the high-level simulation of a name-based interdomain routing architecture'', in Computer Communications Workshops (INFOCOM WKSHPS), April 2014, pp. 55--60.

Computer J.

J. Cheng, J. Zhou, Q. Liu, X. Tang, and Y. Guo, ``A DDoS detection method for socially aware networking based on forecasting fusion feature sequence'', Computer J., vol. 61, no. 7, pp. 959--970, July 2018.

Computer Networks

Y. Yang, X. Yin, X. Shi, Z. Wang, J. He, T.~Z.~J. Fu, and M. Winslett, ``Inter-domain routing bottlenecks and their aggravation'', Computer Networks, vol. 162, January 2019.

R. Leira, G. Julian-Moreno, I. Gonzalez, F.~J. Gomez-Arribas, and J.~E. Lopez~de Vergara, ``Performance assessment of 40 Gbit/s off-the-shelf network cards for virtual network probes in 5G networks'', Computer Networks, vol. 152, pp. (13 pages), January 2019.

N. Krohnke, J. Jansen, and H. Vranken, ``Resilience of the Domain Name System: A case study of the .nl-domain'', Computer Networks, vol. 139, pp. 136--150, July 2018.

J. Suarez-Varela and P. Barlet-Ros, ``Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs'', Computer Networks, vol. 135, pp. 289--301, April 2018.

A.K. Marnerides, D.P. Pezaros, and D. Hutchison, ``Internet traffic characterisation: Third-order statistics and higher-order spectra for precise traffic modelling'', Computer Networks, vol. 134, pp. 183--201, April 2018.

J.H. Wang and C. An, ``A study on geographic properties of Internet routing'', Computer Networks, vol. 133, pp. 183--194, March 2018.

A.Y. Nur and M.E. Tozal, ``Cross-AS (X-AS) Internet topology mapping'', Computer Networks, vol. 132, pp. 53--67, February 2018.

V. Murugesan, M.~S. Selvaraj, and M.~H. Yang, ``HPSIPT: A high-precision single-packet IP traceback scheme'', Computer Networks, vol. 143, pp. (14 pages), January 2018.

S. Mukherjee, S. Sriram, T. Vu, and D. Raychaudhuri, ``EIR: Edge-aware inter-domain routing protocol for the future mobile internet'', Computer Networks, vol. 127, pp. 13--30, November 2017.

J. Meng, F. Ren, and C. Lin, ``Modeling and understanding burst transmission for energy efficient ethernet'', Computer Networks, vol. 122, pp. 217--230, July 2017.

R. Hiran, N. Carlsson, and N. Shahmehri, ``Collaborative framework for protection against attacks targeting BGP and edge networks'', Computer Networks, vol. 122, pp. 120--137, July 2017.

S. Behal and K. Kumar, ``Computer networks detection of DDoS attacks and flash events using novel information theory metrics'', Computer Networks, vol. 116, pp. 96--110, April 2017.

M. Chen, M. Xu, Q. Li, and Y. Yang, ``Measurement of large-scale BGP events: Definition, detection, and analysis'', Computer Networks, vol. 110, no. C, pp. 31--45, December 2016.

Y. Zhang, X. Wang, A. Perrig, and Z. Zheng, ``Tumbler: Adaptable link access in the bots-infested Internet'', Computer Networks, vol. 105, pp. 180--193, June 2016.

O. Bhardwaj, E. Anschelevich, and K. Kar, ``Coalitionally stable pricing schemes for inter-domain forwarding'', Computer Networks, vol. 97, pp. 128--146, April 2016.

T. Zhao, T. Li, B. Han, Z. Sun, and J. Huang, ``Design and implementation of Software Defined Hardware Counters for SDN'', Computer Networks, vol. 102, pp. 129--144, March 2016.

X. Yin, D. Wu, Z. Wang, X. Shi, and J. Wu, ``DIMR: Disjoint Interdomain Multipath Routing'', Computer Networks, vol. 91, no. C, pp. 356--375, November 2015.

V. Kotronis, A. Gamperli, and X. Dimitropoulos, ``Routing centralization across domains via SDN: A model and emulation framework for BGP evolution'', Computer Networks, vol. 92, no. 2, pp. 227--239, July 2015.

M.S. Siddiqui, D. Montero, R. Serral-Gracia, and M. Yannuzzi, ``Self-reliant detection of route leaks in inter-domain routing'', Computer Networks, vol. 82, pp. 135--155, May 2015.

A.R. Kiremire, M.R. Brust, and V.V. Phoha, ``Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes'', Computer Networks, vol. 72, pp. 14--32, October 2014.

R. Schmidt, R. Sadre, A. A.~Sperotto, H. van~den Berg, and A. Pras, ``A hybrid procedure for efficient link dimensioning'', Computer Networks, vol. 67, pp. 252--269, July 2014.

S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, ``How secure are secure interdomain routing protocols?'', Computer Networks, vol. 70, pp. 260--287, June 2014.

J.M. Camacho, A. Garcia-Martinez, M. Bagnulo, and F. Valera, ``BGP-XM: BGP eXtended multipath for transit Autonomous Systems'', Computer Networks, vol. 57, pp. 954--975, March 2013.

G. Detal, C. Paasch, S. van~der Linden, P. Merindol, G. Avoine, and O. Bonaventure, ``Revisiting flow-based load balancing: Stateless path selection in data center networks'', Computer Networks, vol. 57, pp. 1204--1216, December 2012.

A. Detti, M. Pomposini, N. Blefari-Melazzi, and S. Salsano, ``Supporting the Web with an information centric network that routes by name'', Computer Networks, vol. 56, pp. 3705--3722, August 2012.

C. Fragni and L.H.M.K. Costa, ``ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers'', Computer Networks, vol. 56, no. 9, pp. 2249--2261, June 2012.

E. Feitosa, E. Souto, and D.H. Sadok, ``An orchestration approach for unwanted Internet traffic identification'', Computer Networks, vol. 56, pp. 2805--2831, May 2012.

W. Zhang, J. Bi, J. Wu, and B. Zhang, ``Catching popular prefixes at AS border routers with a prediction based method'', Computer Networks, vol. 56, pp. 1486--1502, March 2012.

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Optimal configuration of energy-efficient ethernet'', Computer Networks, pp. 2456--2467, March 2012.

Y. Chen, E. Le~Merrer, Z. Li, Y. Yaning~Liu, and G. Simon, ``OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV'', Computer Networks, vol. 56, no. 1, pp. 365--377, January 2012.

M. Dusi, F. Gringoli, and L. Salgarelli, ``Quantifying the accuracy of the ground truth associated with Internet traffic traces'', Computer Networks, vol. 55, no. 5, pp. 1158--1167, April 2011.

W. Deng, M. Karaliopoulos, W. Muehlbauer, P. Zhu, X. Lu, and B. Plattner, ``k-Fault tolerance of the Internet AS graph'', Computer Networks, vol. 55, no. 10, pp. 2492--2503, April 2011.

M. Saxena and R. Kompella, ``CLAMP: Efficient class-based sampling for flexible flow monitoring'', Computer Networks, vol. 54, no. 14, pp. 2345--2356, October 2010.

G. Yan, S. Eidenbenz, S. Thulasidasan, P. Datta, and V. Ramaswamy, ``Criticality analysis of Internet infrastructure'', Computer Networks, vol. 54, pp. 1169--1182, May 2010.

A. Vilhar, R. Novak, and G. Kandus, ``The impact of network topology on the performance of MAP selection algorithms'', Computer Networks, vol. 54, no. 7, pp. 1197--1209, May 2010.

A. Este, F. Gringoli, and L. Salgarelli, ``Support Vector Machines for TCP traffic classification'', Computer Networks, vol. 53, no. 14, pp. 2476--2490, September 2009.

A. Vilhar and R. Novak, ``Policy relationship annotations of predefined AS-level topologies'', Computer Networks, vol. 52, no. 15, pp. 2859--2871, October 2008.

A. Shevtekar and N. Ansari, ``A router-based technique to mitigate reduction of quality (RoQ) attacks'', Computer Networks, vol. 52, no. 5, pp. 957--970, April 2008.

B. Choi, S. Moon, R. Cruz, Z. Zhang, and C. Diot, ``Quantile sampling for practical delay monitoring in Internet backbone networks'', Computer Networks, vol. 51, no. 10, pp. 2701--2716, July 2007.

J. Leguay, M. Latapy, T. Friedman, and K. Salamatiana, ``Describing and simulating internet routes'', Computer Networks, vol. 51, no. 8, pp. 2067--2085, June 2007.

Z. Gao and N. Ansari, ``A practical and robust inter-domain marking scheme for IP traceback'', Computer Networks, vol. 51, no. 3, pp. 732--750, February 2007.

J.-L. Guillaume, M. Latapy, and D. Magoni, ``Relevance of massively distributed explorations of the internet topology: qualitative results'', Computer Networks, vol. 50, no. 16, pp. 3197--3224, November 2006.

S. Jin and A. Bestavros, ``Small-world characteristics of internet topologies and implications on multicast scaling'', Computer Networks, vol. 50, no. 5, pp. 648--666, April 2006.

D. Veitch, N. Hohna, and P. Abry, ``Multifractality in TCP/IP traffic: the case against'', Computer Networks, vol. 48, no. 3, pp. 293--313, June 2005.

Computer Science

C. Li, H. Zhao, X. Zhang, and X. Ge, ``Research on the distribution of network nodes based on multiple measurement points'', Computer Science, vol. 35, no. 10, pp. 98--137, January 2008.

Computer Science and Electronic Engineering

O. Osanaiye, K. Choo, and M. Dlodlo, ``Change-point cloud DDoS detection using packet inter-arrival time'', in Computer Science and Electronic Engineering, September 2016, pp. 204--209.

Computer Science and Information Systems

M. Petkovic, I. Basicevic, D. Kukolj, and M. Popovic, ``Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks'', Computer Science and Information Systems, vol. 15, no. 1, pp. 139--162, January 2018.

N.~I. Mowla, I. Doh, and K. Chae, ``CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word'', Computer Science and Information Systems, vol. 15, pp. (24 pages), January 2018.

Computer Science Journal

M. Czekaj and E. Jamro, ``Flow caching effectiveness in packet forwarding applications'', Computer Science Journal, vol. 20, pp. (19 pages), January 2019.

Computer Science Review

S. Behal, K. Kumar, and M. Sachdeva, ``Characterizing DDoS attacks and flash events: Review, research gaps and future directions'', Computer Science Review, vol. 25, pp. 101--114, August 2017.

Computer Security Applications Conf.

D. Gosain, A. Agarwal, S. Chakravarty, and H.B. Acharya, ``The devil's in the details: Placing decoy routers in the Internet'', in Computer Security Applications Conf., December 2017, pp. 577--589.

Computer Security Applications Conf. (ACSAC)

A. Herzberg and H. Shulman, ``Socket overloading for fun and cache-poisoning'', in Computer Security Applications Conf. (ACSAC), December 2013, pp. 189--198.

Computer Security Applications Conf. (CSAC)

S. Ramanathan, J. Mirkovic, M. Yu, and Y. Zhang, ``SENSS against volumetric DDoS attacks'', in Computer Security Applications Conf. (CSAC), December 2018, pp. 266--277.

Computers and Communication (ISCC)

D. Li and W. Sha, ``Dynamic ring for seamless mobility in identity centric networks'', in Computers and Communication (ISCC), July 2015, pp. 930--935.

Computers and Electrical Engineering

P.~D. Bojovic, I. Basicevic, S. Ocovaj, and M. Popovic, ``A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method'', Computers and Electrical Engineering, p. (13 pages), January 2019.

G. Kirubavathi and R. Anitha, ``Botnet detection via mining of traffic flow characteristics'', Computers and Electrical Engineering, vol. 50, pp. 91--101, February 2016.

Computers and Industrial Engineering

B. Fabian, A. Baumann, and J. Lackner, ``Topological analysis of cloud service connectivity'', Computers and Industrial Engineering, vol. 88, pp. 151--165, October 2015.

Computers and Operations Research

F. Nasirian, F.~M. Pajouh, and J. Namayanja, ``Exact algorithms for the minimum cost vertex blocker clique problem'', Computers and Operations Research, vol. 103, pp. (13 pages), January 2019.

Computers and Security

M.S. Pour, A. Mangino, K. Friday, M. Rathbun, E. Bou-Harb, F. Iqbal, S. Samtani, J. Crichigno, and N. Ghani, ``On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild'', Computers and Security, vol. 91, April 2020.

P. Moriano, S. Achar, and L.~J. Camp, ``Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies'', Computers and Security, p. (15 pages), January 2017.

X.-F. Chen and S.-Z. Yu, ``CIPA: A collaborative intrusion prevention architecture for programmable network and SDN'', Computers and Security, vol. 58, pp. 1--19, December 2015.

S. Garcia, M. Grill, J. Stiborek, and A. Zunino, ``An empirical comparison of botnet detection methods'', Computers and Security, vol. 45, pp. 100--123, September 2014.

S. Bhatia, D. Schmidt, G. Mohay, and A. Tickle, ``A framework for generating realistic traffic for Distributed Denial-of-Service attacks and flash events'', Computers and Security, vol. 40, pp. 95--107, February 2014.

D. Seo, H. Lee, and A. Perrig, ``APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks'', Computers and Security, vol. 39, no. Part B, pp. 366--385, November 2013.

H. Choi, H. Lee, and H. Kim, ``Fast detection and visualization of network attacks on parallel coordinates'', Computers and Security, vol. 28, no. 5, pp. 276--288, July 2008.

Computing

E.R. Gansner, B. Krishnamurthy, W. Willinger, F.E. Bustamante, and M.A. Sanchez, ``Demo abstract: towards extracting semantics by visualizing large traceroute datasets'', Computing, vol. 96, no. 1, pp. 81--83, January 2014.

Computing and Network Sustainability

K.~M. Prasad, V.~S. Siva, K. Kishore, and M. Sreenivasulu, ``DITFEC: Drift Identification in Traffic-Flow Streams for DDoS Attack Defense Through Ensemble Classifier'', Computing and Network Sustainability, vol. 75, pp. (8 pages), January 2019.

Concordia Univ.

C. Fachkha, Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacks, Ph.D. thesis, Concordia Univ., November 2015.

Concurrency and Computation Practice and Experience

J. Cai, J.~Z. Luo, Y. Liu, W. Wei, and F. Lei, ``A network community restructuring mechanism for transport efficiency improvement in scale-free complex networks'', Concurrency and Computation Practice and Experience, vol. 30, pp. (11 pages), January 2018.

Concurrency Computation: Practice and Experience

D. Dundjerski and M. Tomasevic, ``Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols'', Concurrency Computation: Practice and Experience, vol. XX, no. X, pp. X, February 2014.

Y. Zhang, Y. Sun, J. Zhang, J. Xu, and Y. Wu, ``An efficient framework for parallel and continuous frequent item monitoring'', Concurrency Computation: Practice and Experience, vol. 0, pp. (24 pages), December 2013.

CoNEXT

S. Cho, R. Nithyanand, P. Gill, and A. Razaghpanah, ``A Churn for the Better'', in CoNEXT 2017, January 2017, p. (7 pages).

Conf. for Internet Technology and Secured Transactions (ICITST)

A. Mukaddam and I. ELHajj, ``Hop count variability'', in Conf. for Internet Technology and Secured Transactions (ICITST), December 2011, pp. 240--244.

Conf. of the ACM Special Interest Group on Data Communication

A. Narayan, F. Cangialosi, D. Raghavan, P. Goyal, S. Narayana, R. Mittal, M. Alizadeh, and H. Malakrishnan, ``Restructuring endpoint congestion control'', in Conf. of the ACM Special Interest Group on Data Communication, January 2018, p. (14 pages).

Conf. of the IEEE Computer and Communications Societies (INFOCOM)

L. Amini, A. Shaikh, and H. Schulzrinne, ``Effective peering for multi-provider content delivery services'', in Conf. of the IEEE Computer and Communications Societies (INFOCOM), March 2004, pp. 850--861.

Conf. on Advanced Communication Technology (ICACT)

N.P. Hoang, Y. Asano, and M. Yoshikawa, ``Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable Tor'', in Conf. on Advanced Communication Technology (ICACT), July 2015, pp. 147--154.

Conf. on Advanced Information Networking and Applications (AINA)

A. Borici and A. Thomo, ``Semantic graph compression with hypergraphs'', in Conf. on Advanced Information Networking and Applications (AINA), May 2014, pp. 1097--1104.

D. Arora, A. Verigin, T. Godkin, and S.W. Neville, ``Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnets'', in Conf. on Advanced Information Networking and Applications (AINA), May 2014, p. (8 pages).

Conf. on Advanced Information Networking and Applications Workshops (AINA)

L. Cheng, N. Hutchinson, and M. Ito, ``RealNet: A topology generator based on real Internet topology'', in Conf. on Advanced Information Networking and Applications Workshops (AINA), March 2008, pp. 526--532.

Conf. on Advanced Technologies for Communications (ATC)

D.V. Tuyen, T.H. Truong, N.T. Hung, B. Puype, D. Colle, K. Steenhaut, and N.H. Thanh, ``An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacks'', in Conf. on Advanced Technologies for Communications (ATC), October 2014, pp. 446--451.

Conf. on Advances in Computer Science and Electronics Engineering (CSEE)

L. Tidy, S. Woodhead, and J. Wetherall, ``A large-scale zero-day worm simulator for cyber-epidemiological analysis'', in Conf. on Advances in Computer Science and Electronics Engineering (CSEE), February 2013, pp. 230--234.

Conf. on Advances in Computing, Communications and Informatics (ICACCI)

P. Shamsolmoali and M. Zareapoor, ``Statistical-based filtering system against DDOS attacks in cloud computing'', in Conf. on Advances in Computing, Communications and Informatics (ICACCI), September 2014, pp. 1234--1239.

Conf. on Advances in Social Networks Analysis and Mining (ASONAM)

W.H. Chong, W.S.B. Toh, and L.N. Teow, ``Efficient extraction of high-betweenness vertices'', in Conf. on Advances in Social Networks Analysis and Mining (ASONAM), August 2010, pp. 286--290.

Conf. on Applications, technologies, architectures, and protocols for computer communications

R. Oliveira, B. Zhang, and L. Zhang, ``Observing the evolution of internet as topology'', in Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2007, vol. 37 (4) of ACM SIGCOMM Computer Communication Review, pp. 313--324.

Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)

J. Czyz, M. Allman, J. Zhang, S. Iekel-Johnson, E. Osterweil, and M. Bailey, ``Measuring IPv6 adoption'', in Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), August 2014, pp. 87--98.

Conf. on Artificial Intelligence and Statistics

N. Teneva, P.K. Mudrakarta, and R. Kondor, ``Multiresolution matrix compression'', in Conf. on Artificial Intelligence and Statistics, May 2016, vol. 51 of Proc. Machine Learning Research (PMLR), pp. 1441--1449.

Conf. on Autonomous Infrastructure, Management, and Security

M. Cermak and P. Celeda, ``Detecting advanced network threats using a similarity search'', in Conf. on Autonomous Infrastructure, Management, and Security, June 2016, vol. 9701 of Lecture Notes in Computer Science, pp. 137--141.

Conf. on Availability, Reliability and Security (ARES)

S. Bhatia, G. Mohay, A. Tickle, and E. Ahmed, ``Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event'', in Conf. on Availability, Reliability and Security (ARES), August 2011, pp. 210--217.

Conf. on Big Data

J.M. Namayanja and V.P. Janeja, ``Change detection in temporally evolving computer networks: A big data framework'', in Conf. on Big Data, October 2014, pp. 54--61.

Conf. on Big Data and Smart Computing (BIGCOMP)

H. Wang, W. Cui, Y. Xiao, and H. Tong, ``Robust network construction against intentional attacks'', in Conf. on Big Data and Smart Computing (BIGCOMP), February 2015, pp. 279--286.

Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA)

Y. Wang, Z. Wang, and L. Zhang, ``An epidemic-dynamics-based model for CXPST spreading in inter-domain routing system'', in Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA), July 2013, vol. 212 of Advances in Intelligent Systems and Computing, pp. 485--493.

Conf. on Cloud Computing and Big Data (CCBD)

C. Lei, H. Zhang, M. Li, and Y. Liu, ``Network watermarking model based on optimization theory'', in Conf. on Cloud Computing and Big Data (CCBD), November 2015, pp. 101--104.

Conf. on Communication Systems and Networks (COMSNETS)

N. Hoque, D.K. Bhattacharyya, and J.K. Kalita, ``A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis'', in Conf. on Communication Systems and Networks (COMSNETS), January 2016, p. (2 pages).

R.R. Karthick, V.P. Hattiwale, and B. Ravindran, ``Adaptive network intrusion detection system using a hybrid approach'', in Conf. on Communication Systems and Networks (COMSNETS), January 2012, pp. 1--7.

E. Gregori, L Lenzini, and C. Orsini, ``k-dense communities in the internet AS-level topology'', in Conf. on Communication Systems and Networks (COMSNETS), January 2011, p. (10 pages).

P. Bangera and S. Gorinsky, ``Impact of prefix hijacking on payments of providers'', in Conf. on Communication Systems and Networks (COMSNETS), January 2011, p. (10 pages).

Conf. on Communication, Information and Internet Policy (TPRC)

D. Reed, D. Warbritton, and D. Sicker, ``Current trends and controversies in Internet peering and transit: Implications for the future evolution of the Internet'', in Conf. on Communication, Information and Internet Policy (TPRC), September 2014, p. (25 pages).

Conf. on Communications and Electronics

T. Phan, T. Toan, D. Tuyen, T. Huong, and T. Nguyen, ``OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks'', in Conf. on Communications and Electronics, July 2016, pp. 13--18.

Conf. on Communications and Information Technology (ICCIT)

K. Dassouki, H. Debar, H. Safa, and A. Hijazi, ``A TCP delay-based mechanism for detecting congestion in the Internet'', in Conf. on Communications and Information Technology (ICCIT), June 2013, pp. 141--145.

Conf. on Communications and Networking (ComNet)

M.M. Masud, U. Mustafa, and Z. Trabelsi, ``A data driven firewall for faster packet filtering'', in Conf. on Communications and Networking (ComNet), March 2014, p. (5 pages).

Conf. on Communications and Networking in China

G. Jin, Y. Li, H. Zhang, and J. Qian, ``A Pi2HC mechanism against DDoS attacks'', in Conf. on Communications and Networking in China, November 2008, p. (5 pages).

Conf. on Computational and Information Science

Z. Li, Y. Xiang, and D. He, ``Simulation and analysis of DDoS in Active Defense Environment'', in Conf. on Computational and Information Science, November 2006, vol. 4456 of Lecture Notes in Computer Science book series (LNCS), pp. 878--886.

Conf. on Computational Intelligence and Security

Z. Li and Y. Xiang, ``Mathematical analysis of active DDoS defense systems'', in Conf. on Computational Intelligence and Security, November 2006, pp. 1563--1566.

Conf. on Computational Science (ICCS)

H. Wang, Y. Lin, Y. Jin, and S. Cheng, ``Easily-implemented adaptive packet sampling for high speed networks flow measurement'', in Conf. on Computational Science (ICCS), May 2006, vol. 3994 of Lecture Notes in Computer Science (LNCS), pp. 128--135.

Y. Peng, J. Gong, W. Yang, and W. Liu, ``Disclosing the element distribution of Bloom filter'', in Conf. on Computational Science (ICCS). May 2006, vol. 3991 of Lecture Notes in Computer Science (LNCS), pp. 1022--1025, Springer.

Conf. on Computational Science and Its Applications

S. Kim, M. Hong, and D. Kim, ``A study on marking bit size for path identification method: Deploying the Pi filter at the end host'', in Conf. on Computational Science and Its Applications, May 2004, vol. 3046 of Lecture Notes in Computer Science (LNCS), pp. 611--616.

Conf. on Computer and Communications Security

M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet: Causes, exploits, and countermeasures'', in Conf. on Computer and Communications Security, November 2014, pp. 321--333.

Conf. on Computer and Communications Security (CCS)

C. Chen, D.E. Asoni, D. Barrera, G. Danezis, and A. Perrig, ``HORNET: High-speed onion routing at the network layer'', in Conf. on Computer and Communications Security (CCS), October 2015, pp. 1441--1454.

Conf. on Computer and Communications Security (SIGSAC)

M. Nasr, H. Zolfaghari, and A. Houmansadr, ``The waterfall of liberty: Decoy routing circumvention that resists routing attacks'', in Conf. on Computer and Communications Security (SIGSAC), October 2017, p. (16 pages).

M. Nasr and A. Houmansadr, ``Game of decoys: Optimal decoy routing through game theory'', in Conf. on Computer and Communications Security (SIGSAC), October 2016, pp. 1727--1738.

Z. Liu, H. Jin, Y.C. Hu, and M. Bailey, ``MiddlePolice: Toward enforcing destination-defined policies in the middle of the Internet'', in Conf. on Computer and Communications Security (SIGSAC), October 2016, pp. 1268--1279.

Conf. on Computer and Information Technology

G. Lazarou, M. Alam, and J. Picone, ``Measuring the variability of CAIDA internet traffic traces'', in Conf. on Computer and Information Technology, February 2017, p. (6 pages).

G. Jin, F. Zhang, Y. Li, H. Zhang, and J. Qian, ``A hash-based path identification scheme for DDoS attacks defense'', in Conf. on Computer and Information Technology, October 2009, pp. 219--224.

Conf. on Computer and Information Technology (CIT)

J. Saldana, I. Forcen, J. Fernandez-Navajas, and J. Ruiz-Mas, ``Improving network efficiency with Simplemux'', in Conf. on Computer and Information Technology (CIT), October 2015, pp. 446--453.

J.P.S. Medeiros, P.S. Motta~Pires, J.B. Borges~Neto, and A.A.F. Loureiro, ``Minimization and placement of sensors in structurally observable networks'', in Conf. on Computer and Information Technology (CIT), October 2015, pp. 75--82.

Conf. on Computer Comm. Workshops

T. Pan, T. Huang, J. Liu, J. Zhang, F. Yang, S. Li, and Y. Liu, ``Fast content store lookup using locality-aware skip list in Content-Centric Networks'', in Conf. on Computer Comm. Workshops, April 2016, p. (6 pages).

Conf. on Computer Communication and Networks (ICCCN)

X. Wu and J. Griffioen, ``Supporting application-based route selection'', in Conf. on Computer Communication and Networks (ICCCN), August 2014, p. (8 pages).

H. Luao, J. Cui, G. Chen, Z. Chen, and H. Zhang, ``On the applicability of software defined networking to large scale networks'', in Conf. on Computer Communication and Networks (ICCCN), August 2014, p. (6 pages).

Conf. on Computer Communications

F. Michelinakis, H. Doroud, A. Razaghpanah, A. Lutu, N. Vallina-Rodriguez, P. Gill, and J. Widmer, ``The cloud that runs the mobile Internet: A measurement study of mobile cloud services'', in Conf. on Computer Communications, January 2018, vol. 37, p. (9 pages).

Z. Bozakov, A. Rizk, D. Bhat, and M. Zink, ``Measurement-based flow characterization in centrally controlled networks'', in Conf. on Computer Communications, April 2016, p. (9 pages).

X. Li and C. Qian, ``Low-complexity multi-resource packet scheduling for network function virtualization'', in Conf. on Computer Communications, August 2015, pp. 1400--1408.

A. Dhamdhere and C. Dovrolis, ``ISP and egress path selection for multihomed networks'', in Conf. on Computer Communications, April 2006, p. (12 pages).

Conf. on Computer Communications (INFOCOM)

H. Dai, M. Li, and A. Liu, ``Finding persistent items in distributed datasets'', in Conf. on Computer Communications (INFOCOM), October 2018, pp. 1403--1411.

R.B. Basat, G. Einziger, R. Friedman, and Y. Kassner, ``Randomized admission policy for efficient top-k and frequency estimation'', in Conf. on Computer Communications (INFOCOM), May 2017, p. (9 pages).

W. Chen and Y. Guan, ``Distinct element counting in distributed dynamic data streams'', in Conf. on Computer Communications (INFOCOM), May 2015, pp. 2371--2379.

M. Radan and I. Keslassy, ``Tapping into the router's unutilized processing power'', in Conf. on Computer Communications (INFOCOM), April 2015, pp. 2569--2577.

G. Einziger, B. Fellman, and Y. Kassner, ``Independent counter estimation buckets'', in Conf. on Computer Communications (INFOCOM), April 2015, pp. 2560--2568.

Conf. on Computer Communications Workshops (INFOCOM WKSHPS)

M.~A. Canbaz, J. Thom, and M.~H. Gunes, ``Comparative analysis of internet topology data sets'', in Conf. on Computer Communications Workshops (INFOCOM WKSHPS), January 2017, p. (6 pages).

Conf. on Computer Science and Software Engineering (JCSSE)

H. Siritana, S. Kitisin, and S. Gertphol, ``A study of autonomous system relationships within Thailand'', in Conf. on Computer Science and Software Engineering (JCSSE), May 2011, pp. 7--11.

Conf. on Computer Science, Engineering and Applications (ICCSEA)

R. Anitha, R. Karthik, V. Pravin, and K. Thirugnanam, ``A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference system'', in Conf. on Computer Science, Engineering and Applications (ICCSEA), May 2012, vol. 167 of Advances in Intelligent Systems and Computing, pp. 773--782.

Conf. on Computer, Information and Telecommunication Systems (CITS)

M.H. Yang, M.C. Yang, J.-N. Luo, and W.C. Hsu, ``High accuracy and low storage hybrid IP traceback'', in Conf. on Computer, Information and Telecommunication Systems (CITS), July 2014, p. (5 pages).

Conf. on Computing, Networking and Communications (ICNC)

A. Marnerides and A. Mauthe, ``Analysis and characterisation of botnet scan traffic'', in Conf. on Computing, Networking and Communications (ICNC), March 2016.

J. Shi and B. Zhang, ``Making inter-domain routing power-aware?'', in Conf. on Computing, Networking and Communications (ICNC), February 2014, pp. 932--938.

Conf. on Consumer Communications and Networking (CCNC)

H. Liu, Y. Sun, V.C. Valgenti, and M.S. Kim, ``TrustGuard: A flow-level reputation-based DDoS defense system'', in Conf. on Consumer Communications and Networking (CCNC), January 2011, pp. 287--291.

Conf. on Cryptography, Security and Privacy

J. Liu, Y. Lai, and S. Zhang, ``FL-GUARD: A detection and defense system for DDoS attack in SDN'', in Conf. on Cryptography, Security and Privacy, March 2017, pp. 107--111.

Conf. on Cyber Security and Cloud Computing

T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, ``Machine learning for anomaly detection and categorization in multi-cloud environments'', in Conf. on Cyber Security and Cloud Computing, June 2017, pp. 97--103.

Conf. on Cyber Security Experimentation and Test

H. Hazeyama, M. Suzuki, S. Miwa, D. Miyamoto, and Y. Kadobayashi, ``Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures'', in Conf. on Cyber Security Experimentation and Test, July 2008.

Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery

X. Kong, Y. Chen, H. Tian, T. Wang, Y. Cai, and X. Chen, ``A novel botnet detection method based on preprocessing data packet by graph structure clustering'', in Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery, October 2016, pp. 42--45.

Conf. on Cybercrime Forensics Education and Training (CFET )

N.S. Abouzakhar and A. Bakar, ``A chi-square testing-based intrusion detection model'', in Conf. on Cybercrime Forensics Education and Training (CFET 2010), September 2010.

Conf. on Cybernetics and Intelligent Systems

W. Wei, Y. Dong, D. Lu, and G. Jin, ``Optimal control of DDoS defense with multi-resource max-min fairness'', in Conf. on Cybernetics and Intelligent Systems, September 2008, pp. 1285--1293.

Conf. on Data Engineering (ICDE)

R. Gupta, K. Ramamritham, and M. Mohania, ``Ratio threshold queries over distributed data sources'', Conf. on Data Engineering (ICDE), pp. 581--584, March 2010.

Conf. on Data Mining Workshops

W. Eberle and L. Holder, ``Incremental anomaly detection in graphs'', in Conf. on Data Mining Workshops, December 2013, pp. 521--528.

Conf. on Data Science in Cyberspace

X. Xu, J. Zhang, and Q. Li, ``Equalized interval centroid based watermarking scheme for stepping stone traceback'', in Conf. on Data Science in Cyberspace, June 2016, pp. 109--117.

Conf. on Dependable Systems and Networks

D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Yada, T. Mori, and S. Goto, ``DomainProfiler: Discovering domain names abused in future'', in Conf. on Dependable Systems and Networks, June 2016, pp. 491--502.

H. Du and S.J. Yang, ``Probabilistic Inference for Obfuscated Network Attack Sequences'', in Conf. on Dependable Systems and Networks, June 2014, pp. 57--67.

Conf. on Dependable Systems and Networks (DSN)

E.L. Wong and V. Shmatikov, ``Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing'', in Conf. on Dependable Systems and Networks (DSN), June 2011, pp. 233--244.

Conf. on Design of Reliable Communication Networks (DRCN)

S. Sahhaf, W. Tavernier, D. Colle, M. Pickavet, and P. Demeester, ``Availability analysis of resilient geometric routing on Internet topology'', in Conf. on Design of Reliable Communication Networks (DRCN), April 2014, p. (8 pages).

Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)

A. Nappa, M.Z. Rafique, and J. Caballero1, ``Driving in the cloud: An analysis of drive-by download operations and abuse reporting'', in Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), July 2013, vol. 7967 of Lecture Notes in Computer Science, pp. 1--20.

Conf. on Distributed Computing Systems

M. Muthuprasanna and G. Manimaran, ``Distributed divide-and-conquer techniques for effective DDoS attack defenses'', in Conf. on Distributed Computing Systems, June 2008, p. (10 pages).

Conf. on Distributed Computing Systems (ICDCS)

M. Goehring, H. Shulman, and M. Waidner, ``Path MTU discovery considered harmful'', in Conf. on Distributed Computing Systems (ICDCS), July 2018.

J. Gersch, D. Massey, and C. Papadopoulos, ``Incremental deployment strategies for effective detection and prevention of BGP origin hijacks'', in Conf. on Distributed Computing Systems (ICDCS), June 2014, pp. 670--679.

T. Yang, R. Duan, J. Lu, S. Zhang, H. Dai, and B. Liu, ``CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy'', in Conf. on Distributed Computing Systems (ICDCS), June 2012, pp. 678--687.

Conf. on Distributed Computing Systems Workshops (ICDCSW)

W. Qardaji and N. Li, ``Anonymizing network traces with temporal pseudonym consistency'', in Conf. on Distributed Computing Systems Workshops (ICDCSW), June 2012, pp. 622--633.

Conf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government

Y. Chen and S. Wang, ``A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropy'', in Conf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government, July 2016, pp. 150--155.

Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X)

D. Fenacci and B. Franke, ``Empirical evaluation of data transformations for network infrastructure applications'', in Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X), July 2010, pp. 55--62.

Conf. on Extending Database Technology (EDBT)

J.L. Dautrich~Jr and C.V. Ravishankar, ``Inferential time-decaying Bloom filters'', in Conf. on Extending Database Technology (EDBT), March 2013, pp. 239--250.

Conf. on Financial Cryptography and Data Security

A. Laszka, B. Johnson, J. Grossklags, and M. Felegyhazi, ``Estimating systematic risk in real-world networks'', in Conf. on Financial Cryptography and Data Security, March 2014, p. (18 pages).

Conf. on Future Computer and Communication (ICFCC)

N. Zhang, F. Wang, B. Gong, and L. Li, ``Identifying heavy-hitter flows fast and accurately'', in Conf. on Future Computer and Communication (ICFCC), June 2010, vol. 3, pp. 26--29.

Conf. on Future Internet Technologies

Y. Wang and K. Zhang, ``Quantifying the flattening of Internet topology'', in Conf. on Future Internet Technologies, June 2016, pp. 113--117.

Conf. on High Performance Computing and Communication (HPCC)

J.M.C. Silva and S.R. Lima, ``Optimizing network measurements through self-adaptive sampling'', in Conf. on High Performance Computing and Communication (HPCC), June 2012, pp. 794--801.

Conf. on High performance embedded architectures and compilers (HIPEAC)

R. Ohlendorf, M. Meitinger, T. Wild, and A. Herkersdorf, ``An application-aware load balancing strategy for network processors'', in Conf. on High performance embedded architectures and compilers (HIPEAC). January 2010, vol. 5952 of Lecture Notes in Computer Science (LNCS), pp. 156--170, Springer.

Conf. on Hybrid Information Technology

Y. Guoqiang and D. Wenhua, ``An efficient algorithm for AS path inferring'', in Conf. on Hybrid Information Technology, August 2009, vol. 321, pp. 151--154.

Conf. on ICT for Sustainable Development

D. Boro, H. Basumatary, T. Goswami, and D.K. Bhattacharyya, ``UDP Flooding attack detection using information metric measure'', in Conf. on ICT for Sustainable Development, February 2016, vol. 408 of Advances in Intelligent Systems and Computing, pp. 143--153.

Conf. on Industrial Technology (ICIT)

S. Qian, G. Wu, J. Huang, and T. Das, ``Benchmarking modern distributed streaming platforms'', in Conf. on Industrial Technology (ICIT), March 2016, pp. 592--598.

Conf. on Informatics and Analytics

N. Singh, K. Singh, and T. De, ``Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection'', in Conf. on Informatics and Analytics, August 2016, p. (9 pages).

I. Meitei, K. Singh, and T. De, ``Detection of DDoS DNS amplification attack using classification algorithm'', in Conf. on Informatics and Analytics, August 2016, p. (6 pages).

Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE)

M. Chen, L. Yu, and H. Bai, ``Two propositions about geographical distributions of BitTorrent file resources'', in Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE). November 2011, vol. 110 of Advances in Intelligent and Soft Computing, pp. 361--368, Springer.

Conf. on Information and Communication Technology for Competitive Strategies

N. Hoque, D. Bhattacharyya, and J. Kalita, ``Denial of Service attack detection using multivariate correlation analysis'', in Conf. on Information and Communication Technology for Competitive Strategies, March 2016, p. (6 pages).

Conf. on Information Assurance and Security

M. Andreou and A. Moorsel, ``COTraSE: Connection Oriented Traceback in Switched Ethernet'', in Conf. on Information Assurance and Security, September 2008, pp. 198--204.

Conf. on Information Assurance and Security (IAS)

H. Rahmani, N. Sahli, and F. Kamoun, ``Joint entropy analysis model for DDoS attack detection'', in Conf. on Information Assurance and Security (IAS), August 2009, pp. 267--271.

Conf. on Information Networking (ICOIN)

D. Qin, J. Yang, H. Wang, B. Zhang, L. Gao, and Z. Liu, ``Multipath interdomain routing via deviation from primary path'', in Conf. on Information Networking (ICOIN), February 2012, pp. 222--227.

Conf. on Information Science and Security

A. Gharib, I. Sharafaldin, A. Lashkari, and A. Ghorbani, ``An evaluation framework for Intrusion Detection dataset'', in Conf. on Information Science and Security, December 2016, p. (5 pages).

Conf. on Information Technology and Software Engineering, Ch. 48

C. Ni and G. Jin, ``CTFPi: A new method for packet filtering of firewall'', in Conf. on Information Technology and Software Engineering, Ch. 48, January 2013, vol. 210 of Lecture Notes in Electrical Engineering, pp. 465--475.

Conf. on Information, Intelligence, Systems and Applications (IISA)

P.A. Frangoudis, Y. Hadjadj-Aoul, A. Ksentini, G. Rubino, T. Etame, and C. Brun, ``PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top services'', in Conf. on Information, Intelligence, Systems and Applications (IISA), July 2014, pp. 176--181.

Conf. on Intelligence and Security Informatics (ISI)

J.M. Namayanja and V.P. Janeja, ``Change detection in evolving computer networks: Changes in densification and diameter over time'', in Conf. on Intelligence and Security Informatics (ISI), May 2015, pp. 185--187.

Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)

J. Park, H.-R. Tyan, and C.-C. Jay~Kuo, ``GA-based internet traffic classification technique for QoS provisioning'', in Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), December 2006.

Conf. on Internet and Distributed Computing Systems (IDCS)

T. Karasawa, M. Soshi, and A. Miyaji, ``A novel hybrid IP traceback scheme with packet counters'', in Conf. on Internet and Distributed Computing Systems (IDCS). November 2012, vol. 7646 of Lecture Notes in Computer Science, pp. 71--84, Springer.

Conf. on Internet Monitoring and Protection (ICIMP)

D. Lee, B.E. Carpenter, and N. Brownlee, ``Observations of UDP to TCP ratio and port numbers'', in Conf. on Internet Monitoring and Protection (ICIMP), June 2010, pp. 99--104.

Conf. on Internet Technology and Secured Transactions (ICITST)

K. Kato and V. Klyuev, ``Large-scale network packet analysis for intelligent DDoS attack detection development'', in Conf. on Internet Technology and Secured Transactions (ICITST), December 2014, pp. 360--365.

Conf. on Knowledge Discovery and Data Mining (SIGKDD)

D. Ting, ``Count-Min: Optimal estimation and tight error bounds using empirical error distributions'', in Conf. on Knowledge Discovery and Data Mining (SIGKDD), August 2018, pp. 2319--2328.

Conf. on Knowledge Science, Engineering and Management

D. Sun, K. Yang, Z. Shi, and B. Lv, ``A behavior-based method for distinction of flooding DDoS and flash crowds'', in Conf. on Knowledge Science, Engineering and Management, June 2017, pp. 129--136.

Conf. on Local Computer Networks (LCN)

H.B. Acharya, S. Chakravarty, and D. Gosain, ``Few throats to choke: On the current structure of the Internet'', in Conf. on Local Computer Networks (LCN), October 2017, p. (8 pages).

C. Li, Z. Chen, W. Zheng, Y. Wu, and J. Cao, ``BAH: A bitmap index compression algorithm for fast data retrieval'', in Conf. on Local Computer Networks (LCN), November 2016, pp. 697--705.

A. Lareida, G. Petropoulos, V. Burger, M. Seufert, S. Soursos, and B. Stiller, ``Augmenting home routers for socially-aware traffic management'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 347--355.

Z. Feng, M. Xu, Y. Yang, Q. Li, Y. Wang, Q. Li, B. Ohlman, and M. Chen, ``Joint optimization of content replication and traffic engineering in ICN'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 55--63.

N. Ahmed and K. Sarac, ``An experimental study on inter-domain routing dynamics using IP-level path traces'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 510--517.

M.Z. Ahmad and R. Guha, ``Impact of Internet exchange points on Internet topology evolution'', in Conf. on Local Computer Networks (LCN), October 2010, pp. 332--335.

Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS)

N. Wu, Y. Bi, N. Michael, A. Tang, J. Doyle, and N. Matni, ``HFTraC: High-frequency traffic control'', in Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2017, pp. 43--44.

Conf. on Network and Information Systems Security (SAR-SSI)

I. Mothersole and M.J. Reed, ``Optimising rule order for a packet filtering firewall'', in Conf. on Network and Information Systems Security (SAR-SSI), May 2011, p. (6 pages).

Conf. on Network and Service Management

H. Nguyen, T. Begin, A. Busson, and I. Lassous, ``Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networks'', in Conf. on Network and Service Management, October 2016, vol. 12, pp. 336--341.

Conf. on Network and Service Management (CNSM)

J. Moraney and D. Raz, ``Efficient detection of flow anomalies with limited monitoring resources'', in Conf. on Network and Service Management (CNSM), November 2016, pp. 55--63.

T. Huang, H. Sethu, and N. Kandasamy, ``A fast algorithm for detecting anomalous changes in network traffic'', in Conf. on Network and Service Management (CNSM), November 2015, pp. 251--255.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Deterministic flow marking for IPv6 traceback (DFM6)'', in Conf. on Network and Service Management (CNSM), November 2015, pp. 270--273.

Conf. on Network and Service Management (CNSM) and Workshop

N. Kamiyama, ``CCN economics: Can ISPs profit by introducing CCN?'', in Conf. on Network and Service Management (CNSM) and Workshop, November 2014, pp. 242--247.

Conf. on Network and Services Management (CNSM)

R. Schmidt, R. Sadre, A. Sperotto, and A. Pras, ``Lightweight link dimensioning using sFlow sampling'', in Conf. on Network and Services Management (CNSM), October 2013, pp. 152--155.

Conf. on Network and System Security (NSS)

B.-F. Zhang, Y. Li, Y.-J. Liu, and J.-S. Su, ``Analysis of prefix hijacking based on AS hierarchical model'', in Conf. on Network and System Security (NSS), September 2011, pp. 322--326.

Conf. on Network Function Virtualization and Software Defined Networks

P. Dey and M. Yuksel, ``CAR: Cloud-assisted routing'', in Conf. on Network Function Virtualization and Software Defined Networks, November 2016, p. (7 pages).

Conf. on Network Function Virtualization and Software Defined Networks (NFV-SDN)

M. Conti and A. Gangwal, ``Blocking intrusions at border using software defined-internet exchange point (SD-IXP)'', in Conf. on Network Function Virtualization and Software Defined Networks (NFV-SDN), January 2017, p. (6 pages).

Conf. on Network Games, Control and Optimization (NetGCooP)

Y. Takahashi and K. Ishibashi, ``Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic'', in Conf. on Network Games, Control and Optimization (NetGCooP), October 2011, p. (6 pages).

Conf. on Network of the Future (NOF)

R. Barik and D.M. Divakaran, ``Development and experimentation of TCP initial window function'', in Conf. on Network of the Future (NOF), December 2014, p. (8 pages.

Conf. on Network Protocols (ICNP)

T. Lee, C. Pappas, P. Szalachowski, and A. Perrig, ``Communication based on per-packet one-time addresses'', in Conf. on Network Protocols (ICNP), November 2016, p. (10 pages).

Z. Chen, J. Bi, Y. Fu, Y. Wang, and A. Xu, ``MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDN'', in Conf. on Network Protocols (ICNP), November 2015, pp. 438--445.

A. Korosi, J. Tapolcai, B. Mihalka, G. Meszaros, and G. Retvari, ``Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneously'', in Conf. on Network Protocols (ICNP), October 2014, pp. 332--343.

C.J. Casey, A. Sutton, G. Dos~Reis, and A. Sprintson, ``Eliminating network protocol vulnerabilities through abstraction and systems language design'', in Conf. on Network Protocols (ICNP), October 2013, p. (6 pages).

M.Z. Ahmad and R. Guha, ``Internet exchange points and Internet routing'', in Conf. on Network Protocols (ICNP), October 2011, pp. 292--294.

Conf. on Network Softwarization (NetSoft)

R. Steinert and A. Hess, ``Observing software-defined networks using a decentralized link monitoring approach'', in Conf. on Network Softwarization (NetSoft), April 2015, p. (5 pages).

Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics

X. Zhang and W. Ding, ``Comparative research on internet flows characteristics'', in Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics, October 2012, pp. 114--118.

Conf. on Networking and Services (ICNS)

G. Hasegawa, Y. Hiraoka, and M. Murata, ``Evaluation of free-riding traffic problem in overlay routing and its mitigation method'', in Conf. on Networking and Services (ICNS), April 2009, pp. 210--215.

Conf. on Networking, Architecture and Storage (NAS)

Z. Guo and Y. Yang, ``High-speed multicast scheduling for all-optical packet switches'', in Conf. on Networking, Architecture and Storage (NAS), July 2013, pp. 156--165.

Y. Zhao, R. Yuan, W. Wang, D. Meng, S. Zhang, and J. Li, ``A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic'', in Conf. on Networking, Architecture and Storage (NAS), June 2012, pp. 154--163.

R. Yuan, Y. Weibing, C. Mingyu, Z. Xiaofang, and F. Jianping, ``Robust TCP reassembly with a hardware-based solution for backbone traffic'', in Conf. on Networking, Architecture and Storage (NAS), July 2010, pp. 439--447.

Conf. on Networking, Sensing and Control

E. Lopez and L. Navarro, ``Tight bounds for sketches in traffic validation'', in Conf. on Networking, Sensing and Control, May 2017, p. (6 pages).

Conf. on Networks and Communications (EuCNC)

R. Addanki, S. Maji, M. Veeraraghavan, and C. Tracy, ``A measurement-based study of big-data movement'', in Conf. on Networks and Communications (EuCNC), June 2015, pp. 445--449.

Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC)

Y. Xu and Z. Wang, ``On an IBA topology model for internet topology structure'', in Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), June 2010, vol. 2, pp. 114--117.

Conf. on Neural Information Processing

E. Moriyama, T. Takahashi, and D. Miyamoto, ``DNS-based defense against IP spoofing attacks'', in Conf. on Neural Information Processing, November 2012, vol. 7667 of Lecture Notes in Computer Science, pp. 599--609.

Conf. on New Technologies, Mobility and Security (NTMS)

A. Alsirhani, S. Sampalli, and P. Bodorik, ``DDoS attack detection system: Utilizing classification algorithms with Apache Spark'', in Conf. on New Technologies, Mobility and Security (NTMS), April 2018, p. (7 pages).

Conf. on New Trends in Information and Communications Technology Applications (NTICT)

W. Bhaya and M.E. Manaa, ``DDoS attack detection approach using an efficient cluster analysis in large data scale'', in Conf. on New Trends in Information and Communications Technology Applications (NTICT), March 2017, pp. 168--173.

S. Al-mamory and S. Algelal, ``A modified DBSCAN clustering algorithm for proactive detection of DDoS attacks'', in Conf. on New Trends in Information and Communications Technology Applications (NTICT), March 2017, pp. 304--309.

Conf. on Oxide Materials for Electronic Engineering (OMEE)

S. Xiaojuan and L. Bin, ``Stream data analysis for backbone network intrusion detection system'', in Conf. on Oxide Materials for Electronic Engineering (OMEE), September 2012, pp. 321--323.

Conf. on Parallel Processing (ICPP)

M.F. Iqbal, J. Holt, J.H. Ryoo, L.K. John, and G. de Veciana, ``Flow migration on multicore network processors: Load balancing while minimizing packet reordering'', in Conf. on Parallel Processing (ICPP), October 2013, pp. 150--159.

Conf. on Parallel, Distributed and Network-based Processing

S. Kaune, K. Pussep, C. Leng, A. Kovacevic, G. Tyson, and R. Steinmetz, ``Modelling the internet delay space based on geographical locations'', in Conf. on Parallel, Distributed and Network-based Processing, February 2009, pp. 301--310.

Conf. on Passive and Active Network Measurement

R. Almeida, O. Fonseca, E. Fazzion, D. Guedes, W. Meira, and I. Cunha, ``A characterization of load balancing on the IPv6 Internet'', in Conf. on Passive and Active Network Measurement, February 2017, vol. 10176 of Lecture Notes in Computer Science (LNCS), pp. 242--254.

Conf. on Performance Computing and Communications (IPCCC)

N. Ahmed and Sarac Kamil, ``Measuring path divergence in the Internet'', in Conf. on Performance Computing and Communications (IPCCC), December 2014, pp. 1--8.

Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS)

E. Hernandez-Orallo and J. Vila-Carbo, ``A histogram-based stochastic process for finite buffer occupancy analysis'', in Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS), January 2007, vol. 321 (44) of ValueTools.

Conf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS)

M.A. Erazo and J. Liu, ``Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation'', in Conf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS), May 2013, pp. 79--90.

Conf. on Risks and Security of Internet and Systems (CRiSIS)

M. Wachs, C. Grothoff, and R. Thurimella, ``Partitioning the Internet'', in Conf. on Risks and Security of Internet and Systems (CRiSIS), October 2012, p. (8 pages).

Conf. on Security and Cryptography (SECRYPT)

H. Rahmani, N. Sahli, and F. Kamoun, ``A traffic coherence analysis model for DDoS attack detection'', in Conf. on Security and Cryptography (SECRYPT), E. Fernandez-Medina, M. Malek, and J. Hernando, Eds. July 2009, pp. 148--154, INSTICC Press.

Conf. on Security and Privacy in Communication Systems (SecureComm)

S. Li, H. Duan, Z. Wang, and X. Li, ``Route leaks identification by detecting routing loops'', in Conf. on Security and Privacy in Communication Systems (SecureComm), October 2015, vol. 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 313--329.

Conf. on Security of Information and Networks (SIN)

S. Bhatia, D. Schmidt, and G. Mohay, ``Ensemble-based DDoS detection and mitigation model'', in Conf. on Security of Information and Networks (SIN), October 2012, pp. 79--86.

Conf. on Service-Oriented Computing and Applications (SOCA)

C. Basaran, K.-D. Kang, Y. Zhou, and M.H. Suzer, ``Adaptive load shedding via fuzzy control in data stream management systems'', in Conf. on Service-Oriented Computing and Applications (SOCA), December 2012, p. (8 pages).

Conf. on Signal Processing and Communication Systems (ICSPCS)

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Flow-based anomaly detection using semisupervised learning'', in Conf. on Signal Processing and Communication Systems (ICSPCS), December 2015, p. (5 pages).

Conf. on Simulation Tools and Techniques for Communications, Networks and Systems

I. Scholtes, J. Botev, M. Esch, A. Hohfeld, H. Schloss, and B. Zech, ``TopGen - internet router-level topology generation based on technology constraints'', in Conf. on Simulation Tools and Techniques for Communications, Networks and Systems, May 2010, p. (10 pages).

Conf. on Smart Communications in Network Technologies (SaCoNeT)

R. Leira, P. Gomez, I. Gonzalez, and J.E. Lopez~de Vergara, ``Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardware'', in Conf. on Smart Communications in Network Technologies (SaCoNeT), June 2013, p. (5 pages).

Conf. on Smart Grid Communications (SmartGridComm)

S. Meiling, T.C. Schmidt, and T. Steinbach, ``On performance and robustness of Internet-based smart grid communication: A case study for Germany'', in Conf. on Smart Grid Communications (SmartGridComm), November 2015, pp. 295--300.

Conf. on Social computing, behavioral-cultural modeling and prediction (SBP)

H. Du and S.J. Yang, ``Discovering collaborative cyber attack patterns using social network analysis'', in Conf. on Social computing, behavioral-cultural modeling and prediction (SBP), March 2011, vol. 6589 of Lecture Notes in Computer Science, pp. 129--136.

Conf. on Software Defined Systems (SDS)

P. Fondo-Ferreiro, M. Rodriguez-Perez, and M. Fernandez-Veiga, ``Implementing energy saving algorithms for ethernet link aggregates with ONOS'', in Conf. on Software Defined Systems (SDS), June 2018, p. (8 pages).

Conf. on Special Interest Group on Data Communication

A. Gupta, R. Harrison, M. Canini, N. Feamster, J. Rexford, and W. Willinger, ``Sonata: query-driven streaming network telemetry'', in Conf. on Special Interest Group on Data Communication, August 2018, pp. 357--371.

Conf. on Systems and Informatics (ICSAI)

Y. Xu and X. Zhang, ``Analysis of Internet robustness in attacks'', in Conf. on Systems and Informatics (ICSAI), May 2012, pp. 1494--1497.

Conf. on Systems and Networks Communication

K.G. Kyriakopoulos and D.J. Parish, ``Using wavelets for compression and detecting events in anomalous network traffic'', in Conf. on Systems and Networks Communication, September 2009, pp. 195--200.

Conf. on Systems, Man, and Cybernetics (SMC)

Z. Sha and J. Panchal, ``Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice mode'', in Conf. on Systems, Man, and Cybernetics (SMC), October 2014, p. (7 pages).

Conf. on Telecommunication Networks and Applications (ITNAC)

M. Albdair, R. Addie, and D. Fatseas, ``Inference of social network behavior from Internet traffic traces'', in Conf. on Telecommunication Networks and Applications (ITNAC), December 2016, p. (6 pages).

Conf. on Telecommunication Systems Services and Applications (TSSA)

Y. Purwanto, Hendrawan Kuspriyanto, and B. Rahardjo, ``Traffic anomaly detection in DDos flooding attack'', in Conf. on Telecommunication Systems Services and Applications (TSSA), October 2014, p. (6 pages).

Conf. on Telecommunications (ConTEL)

Y. Shavitt, E. Shir, and U. Weinsberg, ``Near-deterministic inference of AS relationships'', in Conf. on Telecommunications (ConTEL), June 2009, pp. 191--198.

Conf. on Telecommunications (ICT)

J. Riihijarvi, P. Mahonen, and M. Wellens, ``Metrics for characterizing complexity of network traffic'', in Conf. on Telecommunications (ICT), June 2008, pp. 1--6.

Conf. on the Applications of Digital Information and Web Technologies

N. Kahani, S. Shiry, and M. Bagherzadeh, ``Detecting Denial of Service attacks utilizing machine learning methods'', in Conf. on the Applications of Digital Information and Web Technologies, August 2008, p. (7 pages).

Conf. on the Design of Reliable Communication Networks (DRCN)

A. Kolesnichenko, B. Haverkort, A. Remke, and P. de Boer, ``Fitting a code-red virus spread model: An account of putting theory into practice'', in Conf. on the Design of Reliable Communication Networks (DRCN), March 2016, pp. 39--46.

Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom)

Y. Liu, W. Peng, and J. Su, ``Study on IP prefix hijacking in cloud computing networks based on attack planning'', in Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), November 2011, pp. 922--926.

Conf. on Trust, Security And Privacy In Computing And Communications/Big Data Science And Engineering (TrustCom/BigDataSE)

P. Mell, A. Gueye, and C. Schanzle, ``Quantifying information exposure in Internet routing'', in Conf. on Trust, Security And Privacy In Computing And Communications/Big Data Science And Engineering (TrustCom/BigDataSE), April 2018.

Conf. on Trustworthy Systems (InTrust)

Z. Zhan, M. Xu, and S. Xu, ``A characterization of cybersecurity posture from Network Telescope data'', in Conf. on Trustworthy Systems (InTrust), December 2014, vol. 9473 of Lecture Notes in Computer Science (LNCS), pp. 105--126.

Conf. on Ubiquitous and Future Networks

M. Kim, S. Jung, and M. Park, ``A distributed self-organizing map for DoS attack detection'', in Conf. on Ubiquitous and Future Networks, August 2015, pp. 19--22.

Conf. on Ubiquitous and Future Networks (ICUFN)

Y. Wang, J. Bi, K. Zhang, and Y. Wu, ``A framework for fine-grained inter-domain routing diversity via SDN'', in Conf. on Ubiquitous and Future Networks (ICUFN), July 2016, pp. 751--756.

Q.D. Bui and A. Jennings, ``Relay node selection in large-scale VoIP overlay networks'', in Conf. on Ubiquitous and Future Networks (ICUFN), July 2009, pp. 56--61.

Conf. on Ubiquitous Information Management and Communication (IMCOM)

T. Huong and N. Thanh, ``Software defined networking-based one-packet DDoS mitigation architecture'', in Conf. on Ubiquitous Information Management and Communication (IMCOM), January 2017, vol. 11 (110), p. (7 pages).

Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress

T. Phan, N. Bao, and M. Park, ``A novel hybrid flow-based handler with DDoS attacks in Software-Defined Networking'', in Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress, July 2016, pp. 350--357.

Conf. on Utility and Cloud Computing (UCC)

R. Lu, G. Wu, B. Xie, and J. Hu, ``StreamBench: Towards benchmarking modern distributed stream computing frameworks'', in Conf. on Utility and Cloud Computing (UCC), December 2014, pp. 69--78.

Conf. on Wireless and Telematics (ICWT)

Y. Purwanto, Hendrawan Kuspriyanto, and B. Rahardjo, ``Statistical analysis on aggregate and flow based traffic features distribution'', in Conf. on Wireless and Telematics (ICWT), November 2015, p. (6 pages).

Conf. on Wireless Communications, Networking and Mobile Computing

C. Li, H. Zhao, X. Zhang, and L. Wang, ``Correctness of sampling bias on Internet router-level topology'', in Conf. on Wireless Communications, Networking and Mobile Computing, October 2008, p. (4 pages).

Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM )

L. Zhou, M. Liao, C. Yuan, Z. Sheng, and H. Zhang, ``DDOS attack detection using packet size interval'', in Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), September 2015, p. (7 pages).

Conf. on World Wide Web

G. Tyson, S. Huang, F. Cuadrado, T. Castro, V. Perta, A. Sathiaseelan, and S. Uhlig, ``Exploring HTTP header manipulation in-the-wild'', in Conf. on World Wide Web, April 2017, vol. 26, pp. 451--458.

D. Krishnan, D. Quoc, P. Bhatotia, C. Fetzer, and R. Rodrigues, ``IncApprox: A data analytics system for incremental approximate computing'', in Conf. on World Wide Web, April 2016, pp. 1133--1144.

Conf. on. Transparent Optical Networks (ICTON)

P.M. Santiago~del Rio, J. Ramos, A. Salvador, J.E.L. de Vergara, J. Aracil, A. Cuadra, and M. Cutanda, ``Application of Internet traffic characterization to all-optical networks'', in Conf. on. Transparent Optical Networks (ICTON), August 2010.

Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)

R. Leira, L. Gifre, I. Gonzalez, J.~E. Lopez~de Vergara, and J. Aracil, ``Wormhole: a novel big data platform for 100 Gbit/s network monitoring and beyond'', in 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), January 2019, vol. 22, p. (5 pages).

Cornell Univ.

K. Lee, Towards precise network measurements, Ph.D. thesis, Cornell Univ., January 2017.

dais-ita.org

Z. Zhang, Q. Qin, L. Ma, K. Poularakis, F. Le, K.K. Leung, S. Kompella, and L. Tassiulas, ``Routing performance in distributed SDN under synchronization constraint'', Tech. rep., dais-ita.org, September 2018.

Dalhousie Univ.

F. Haddadi, Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithms, Ph.D. thesis, Dalhousie Univ., September 2016.

Dalhousie Univ., Halifax, CA

V.A. Foroushani, A security framework based on flow marking IP-traceback techniques, Ph.D. thesis, Dalhousie Univ., Halifax, CA, July 2016.

E. Balkanli, ``A comprehensive study on one-way backscatter traffic analysis'', M.S. thesis, Dalhousie Univ., Halifax, CA, April 2015.

Data Mining and Knowledge Discovery

K. Semertzidis, E. Pitoura, E. Terzi, and P. Tsaparas, ``Finding lasting dense subgraphs'', Data Mining and Knowledge Discovery, vol. 33, no. 5, pp. 1417--1445, November 2018.

Database and Expert Systems Applications

E. Xu, W. Hsu, M.L. Lee, and D. Patel, ``Top-k maximal influential paths in network data'', in Database and Expert Systems Applications, September 2012, vol. 7446 of Lecture Notes in Computer Science, pp. 369--383.

Delft Univ.

R. Kooij, A. Jamakovic, F. Van~Kesteren, T. De~Koning, I. Theisler, and P. Veldhoven, ``Het Nederlands elftal als complex netwerk'', Tech. rep., Delft Univ., March 2008.

Dep. Computer Science, VU Univ. Amsterdam

M. Wojciechowski, ``Border Gateway modeling and simulation'', M.S. thesis, Dep. Computer Science, VU Univ. Amsterdam, September 2008.

Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires

J.I. Alvarez-Hamelin, D. Anunziata, M.G. Beiro, A. Barrat, L. Dall'Asta, and A. Vespignani, ``http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool)'', Tech. rep., Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires, July 2011.

Dept. Computer Science, VU Univ. Amsterdam

S. Hanif, ``Impact of topology on BGP convergence'', M.S. thesis, Dept. Computer Science, VU Univ. Amsterdam, August 2010.

Design Automation Conf.

J. Kuang, L. Bhuyan, and R. Klefstad, ``Traffic-aware power optimization for network applications on multicore servers'', in Design Automation Conf., June 2012, pp. 1006--1011.

Digital Investigation

M.~S. Pour, E. Bou-Harb, K. Varma, N. Neshenko, D.~A. Pados, and K.~K.~R. Choo, ``Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns'', Digital Investigation, vol. 28, pp. (9 pages), January 2019.

Discrete Applied Mathematics

B.D. MacArthur, R.J. Sanchez-Garcia, and J.W. Anderson, ``Symmetry in complex networks'', Discrete Applied Mathematics, vol. 156, no. 18, pp. 3525--3531, November 2008.

Distributed Computing

Y. Afek, H. Kaplan, B. Korenfeld, A. Morrison, and R.E. Tarjan, ``The CB tree: a practical concurrent self-adjusting search tree'', Distributed Computing, vol. 27, no. 6, pp. 393--417, December 2014.

Distributed Computing (DISC)

Y. Afek, H. Kaplan, B. Korenfeld, A. Morrison, and R.E. Tarjan, ``CBTree: A practical concurrent self-adjusting search tree'', in Distributed Computing (DISC), October 2012, vol. 7611 of Lecture Notes in Computer Science, pp. 1--15.

Distributed Computing Systems Workshops (ICDCSW)

E. Gregori, L. Lenzini, and C. Orsini, ``k-clique communities in the Internet AS-level topology graph'', in Distributed Computing Systems Workshops (ICDCSW), June 2011, pp. 134--139.

Drexel Univ.

T. Huang, Adaptive sampling and statistical inference for anomaly detection, Ph.D. thesis, Drexel Univ., December 2015.

Duke Univ.

B. Chandrasekaran, Head into the cloud: An analysis of the emerging cloud infrastructure, Ph.D. thesis, Duke Univ., September 2016.

B. Chandrasekaran, M. Bai, M. Schoenfield, A. Berger, N. Caruso, G. Economou, S. Gilliss, B. Maggs, K. Moses, D. Duff, K.C. Ng, E.G. Sirer, R. Weber, and B. Wong, ``Alidade: IP geolocation without active probing'', Tech. rep., Duke Univ., January 2015.

B. Maggs, ``Mapping the whole Internet'', Tech. rep., Duke Univ., August 2014.

Duke Univ., Durham, NC, US

K.V. Moses, ``Improving IP-based geo-location through Internet topology and geospatial datasets'', M.S. thesis, Duke Univ., Durham, NC, US, January 2013.

Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16

C. Albrecht, J. Foag, R. Koch, E. Maehle, and T. Pionteck, ``DynaCORE - dynamically reconfigurable coprocessor for network processors'', in Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16, M. Platzner, J. Teich, and N. Wehn, Eds. March 2010, pp. 335--354, Springer.

Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17

R. Ohlendorf, M. Meitinger, T. Wild, and A. Herkersdorf, ``FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors'', in Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17, M. Platzner, J. Teich, and N. Wehn, Eds. March 2010, pp. 355--374, Springer.

Dynamics On and Of Complex Networks

A. Mislove, H.S. Koppula, K.P. Gummadi, P. Druschel, and B. Bhattacharjee, ``An empirical validation of growth models for complex networks'', in Dynamics On and Of Complex Networks, January 2013, vol. 2, pp. 19--40.

P. Erola, S. Gomez, and A. Arenas, ``On the routability of the Internet'', in Dynamics On and Of Complex Networks, January 2013, vol. 2, pp. 41--54.

e-Business and Telecommunication Networks

P. Yan and M. Lee, ``Towards an adaptive packet marking scheme for IP traceback'', in e-Business and Telecommunication Networks, January 2006, pp. 141--148.

EAI Conf. on e-Infrastructure and e-Services for developing countries

A. Gueye, P. Mell, D. Banse, and F. Congo, ``On the Internet connectivity in Africa'', in EAI Conf. on e-Infrastructure and e-Services for developing countries, October 2016, vol. 171 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pp. 70--77.

Edith Cowan Univ.

S. Rastegari, Intelligent network intrusion detection using an evolutionary computation approach, Ph.D. thesis, Edith Cowan Univ., December 2015.

Electrical Power and Energy Conf. (EPEC)

M. Ghanbari, W. Kinsner, and K. Ferens, ``Detecting a distributed denial of service attack using a pre-processed convolutional neural network'', in Electrical Power and Energy Conf. (EPEC), January 2017, p. (15 pages).

Electronics Letters

T. Wellem and Y.-K. Lai, ``Sketch-guided filtering support for detecting superspreaders in high-speed networks'', Electronics Letters, vol. 52, no. 17, pp. 1459--1461, August 2016.

I. Popescu, T. Miyazaki, M. Chino, X. Wang, S. Okamoto, A. Gravey, P. Gravey, M. Veeraraghavan, M. Brandt-Pearce, and N. Yamanaka, ``Application-centric energy-efficient Ethernet with quality of service support'', Electronics Letters, vol. 51, no. 15, pp. 1165--1167, July 2015.

S. Zhou and R.J. Mondragon, ``Redundancy and robustness of AS-level Internet topology and its models'', Electronics Letters, vol. 40, no. 2, pp. 151--152, February 2004.

Emerging Trends in Information and Communication Security (ETRICS)

I. Hamadeh and G. Kesidis, ``Toward a framework for forensic analysis of scanning worms'', in Emerging Trends in Information and Communication Security (ETRICS), June 2006, vol. 3995 of Lecture Notes in Computer Science (LNCS), pp. 282--297.

Engineering, Technology and Applied Science Research

A. Siahmarzkooh, J. Karimpour, and S. Lotfi, ``A cluster-based approach towards detecting and modeling network dictionary attacks'', Engineering, Technology and Applied Science Research, vol. 6, no. 6, pp. 1227--1234, December 2016.

Entropy

K. Singh, K. Thongam, and T. De, ``Entropy-based application layer DDoS attack detection using artificial neural networks'', Entropy, vol. 18, no. 10, pp. (17 pages), August 2016.

F. Iglesias and T. Zseby, ``Entropy-based characterization of Internet background radiation'', Entropy, vol. 17, no. 1, pp. 74--101, December 2014.

EPJ Data Science

M.G. Beiro, S.P. Grynberg, and J.I. Alvarez-Hamelin, ``Router-level community structure of the Internet Autonomous Systems'', EPJ Data Science, vol. 4, no. 12, pp. (22 pages), August 2015.

EPL (Europhysics Letters)

J. Scholz and M. Greiner, ``Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics'', EPL (Europhysics Letters), vol. 94, no. 2, pp. 28008, April 2011.

G.-Q. Zhang, G.-Q. Zhang, S.-Q. Cheng, and T. Zhou, ``Symbiotic effect: A guideline for network modeling'', EPL (Europhysics Letters), vol. 87, pp. 68002 (5--pages), September 2009.

ETH Zurich

T.H. Lee, ``Towards an accountable and private Internet'', M.S. thesis, ETH Zurich, December 2017.

V. Kotronis, Centralizing routing control across domains: Architectural approach and prominent use cases, Ph.D. thesis, ETH Zurich, January 2015.

EUNICE

M. Palacin, A. Bikfalvi, and M. Oliver, ``Mercury: Revealing hidden interconnections between access ISPs and content providers'', in EUNICE, December 2014, vol. 8846 of Lecture Notes in Computer Science (LNCS), pp. 147--159.

EUNICE/IFIP WG 6.6 Workshop: Advances in Communication Networking

P. Megyesi and S. Molnar, ``Analysis of elephant users in broadband network traffic'', in EUNICE/IFIP WG 6.6 Workshop: Advances in Communication Networking, August 2013, vol. 8115 of Lecture Notes in Computer Science, pp. 37--45.

Eur. Physical J.

X. Zhang, C. Moore, and M.E.J. Newman, ``Random graph models for dynamic networks'', Eur. Physical J., vol. 90, pp. (15 pages), October 2017.

EURASIP J. on Information Security

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``IP traceback through (authenticated) deterministic flow marking: an empirical evaluation'', EURASIP J. on Information Security, November 2013.

E. Elena, J. Rougier, and S. Secci, ``Characterisation of AS-level path deviations and multipath in Internet routing'', in EURO-NF Conf. on Next Generation Internet (NGI), July 2010, pp. 1--7.

EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP)

Y. Wang, S. Su, Y. Yang, and J. Ren, ``A more efficient hybrid approach for single-packet IP traceback'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2012, pp. 275--282.

G. Kunzmann, R. Nagel, T. Hossfeld, A. Binzenhofer, and K. Eger, ``Efficient simulation of large-scale P2P networks: modeling network transmission times'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2007, pp. 475--481.

Euromicro Conf. on Parallel, Distributed, and Network-Based Processing

M. Danelutto, D. De~Sensi, and M. Torquati, ``Energy driven adaptivity in stream parallel computations'', in Euromicro Conf. on Parallel, Distributed, and Network-Based Processing, April 2015, pp. 103--110.

Euromicro Intl Conf. on Parallel, Distributed and Network-Based Processing (PDP)

A. Oeldemann, F. Biersack, T. Wild, and A. Herkersdorf, ``Inter-server RSS: Extending receive side scaling for inter-server workload distribution'', in Euromicro Intl Conf. on Parallel, Distributed and Network-Based Processing (PDP), March 2020, pp. 1--1.

European Conf. on Networks and Communications

A. Abada, ``Resource optimization of TCAM-based SDN measurements via diminishing-points autodetection'', in European Conf. on Networks and Communications, June 2016, p. (6 pages).

European Conf. on Networks and Communications (EuCNC)

R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, J. Famaey, and F. De~Turck, ``Neural network-based autonomous allocation of resources in virtual networks'', in European Conf. on Networks and Communications (EuCNC), June 2014, p. (6 pages).

European Symp. on Research in Computer Security (ESORICS)

A. Herzberg and H. Shulman, ``Vulnerable delegation of DNS resolution'', in European Symp. on Research in Computer Security (ESORICS), September 2013, vol. 8134 of Lecture Notes in Computer Science, pp. 219--236.

European Wireless Conf.

M. Taghouti, D. Lucani, F. Fitzek, and A. Bouallegue, ``Random linear network coding schemes for reduced zero-padding overhead: Complexity and overhead analysis'', in European Wireless Conf., May 2017, pp. 321--327.

European Workshop on Software Defined Networks

K. Giotis, G. Androulidakis, and V. Maglaris, ``Leveraging SDN for efficient anomaly detection and mitigation on legacy networks'', in European Workshop on Software Defined Networks, September 2014, pp. 85--90.

EuroSys Conf.

John. Sonchack, A. Aviv, E. Keller, and J. Smith, ``Turboflow: information rich flow record generation on commodity switches'', in EuroSys Conf., April 2018, p. (16 pages).

Expert Systems

M. Choras, L. Saganowski, R. Renk, and W. Holubowicz, ``Statistical and signal-based network traffic recognition for anomaly detection'', Expert Systems, p. (14 pages), January 2011.

Facultad de Informatica, Univ. Nacional de la Plata

R. Scappini, ``Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas'', M.S. thesis, Facultad de Informatica, Univ. Nacional de la Plata, August 2010.

Fed. Univ. of Espirito Santo

F.A.F. Silveira, ``Minimizing the number of observers required for traffic matrix generation'', M.S. thesis, Fed. Univ. of Espirito Santo, August 2017.

Fed. Univ. of Parana

M. Pelloso, ``Distributed Denial of Service attack prediction system'', M.S. thesis, Fed. Univ. of Parana, October 2018.

Fed. Univ. of Santa Maria

M.A Righi, ``DDoS detection through recurrence quantification analysis based on dynamic feature extraction and adaptive clustering'', M.S. thesis, Fed. Univ. of Santa Maria, March 2017.

Federal Univ. of Rio de Janeiro

F.F. Machado, ``Analysis of the degree ranking stability in scale-free networks'', M.S. thesis, Federal Univ. of Rio de Janeiro, January 2016.

Florida Atlantic Univ.

N. Neshenko, ``A Network Telescope approach for inferring and characterizing IoT exploitations'', M.S. thesis, Florida Atlantic Univ., August 2018.

Florida Univ.

T.N. Dhin, Complex networks under attacks: Vulnerability assessment and optimization, Ph.D. thesis, Florida Univ., January 2013.

Forensic Sci. Int.: Digital Investigation

S. Torabi, E. Bou-Harb, C. Assi, and M. Debbabi, ``A scalable platform for investigating exploited IoT devices and fingerprinting unsolicited activities'', Forensic Sci. Int.: Digital Investigation, vol. 32, no. suppl, April 2020.

Forum on Computer Science-Technology and Applications (IFCSTA)

L. Yujing, Z. Bofeng, W. Fei, and S. Jinshu, ``A study of hinge-transmit property of BGP routing system'', in Forum on Computer Science-Technology and Applications (IFCSTA), January 2010, vol. 1, pp. 462--465.

Frontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC)

Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing survivability of inter-domain routing system under cascading failures'', in Frontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC), July 2013, vol. 401 of Communications in Computer and Information Science, pp. 97--108.

Future Generation Computer Sysems

L.J.G. Villalba, A.L.S. Orozco, and J.M. Vidal, ``Advanced payload analyzer preprocessor'', Future Generation Computer Sysems, vol. 76, pp. (9 pages), January 2017.

Future Generation Computer Systems

Z. Tian, S. Su, W. Shi, X. Du, M. Guizani, and X. Yu, ``A data-driven method for future Internet route decision modeling'', Future Generation Computer Systems, vol. 95, pp. (8 pages), January 2019.

J. Cui, M. Wang, Y. Luo, and H. Zhong, ``DDoS detection and defense mechanism based on cognitive-inspired computing in SDN'', Future Generation Computer Systems, p. (8 pages), January 2019.

M. Cafaro, I. Epicoco, and M. Pulimeno, ``CMSS: Sketching based reliable tracking of large network flows'', Future Generation Computer Systems, vol. 101, pp. (14 pages), January 2019.

A. Singh, S. Garg, S. Batra, N. Kumar, and J.~J. Rodrigues, ``Bloom filter based optimization scheme for massive data handling in IoT environment'', Future Generation Computer Systems, vol. 82, pp. 440--449, May 2018.

G. Hu, W. Chen, Q. Li, Y. Jiang, and K. Xu, ``TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code'', Future Generation Computer Systems, vol. 72, pp. 219--226, July 2017.

Future Information Technology

Y. Liu, B. Dai, P. Zhu, and J. Su, ``Whom to convince? It really matters in BGP prefix hijacking attack and defense'', in Future Information Technology, June 2011, vol. 184 (1) of Communications in Computer and Information Science, pp. 1--10.

Future Technologies Conf.

S. Bhatia, ``Ensemble-based model for DDoS attack detection and flash event separation'', in Future Technologies Conf., December 2016, pp. 958--967.

Future Univ. Hakodate

R. Takahashi, ``Distributed denial of service (DDoS) attack detection system using burst detection'' January 2014.

Fuzzy Information and Engineering, Volume 2

Y. Xu and W. Zhang, ``A power-law approach on router-level internet macroscopic topology modeling'', in Fuzzy Information and Engineering, Volume 2, B. Cao, T.-F. Li, and C.-Y. Zhang, Eds., June 2009, vol. 62 of Advances in Soft Computing (ASC), pp. 1471--1479.

Georgetown Univ.

Z.D.H. Tan, Network level attacks and defenses against anonymity networks, Ph.D. thesis, Georgetown Univ., April 2016.

Georgia Inst. of Technology

J. Fairbanks, Graph analysis combining numerical, statistical, and streaming techniques, Ph.D. thesis, Georgia Inst. of Technology, May 2016.

M. Konte, Understanding and defending against internet infrastructures supporting cybecrime operations, Ph.D. thesis, Georgia Inst. of Technology, December 2015.

A.H. Lodhi, The economics of internet peering interconnections, Ph.D. thesis, Georgia Inst. of Technology, November 2014.

M. Abdelhafez, Modeling and simulations of worms and mitigation techniques, Ph.D. thesis, Georgia Inst. of Technology, December 2007.

M. Sung, J. Chiang, and J. Xu, ``Scalable hash-based IP traceback using rate-limited Probabilistic Packet Marking'', Tech. rep., Georgia Inst. of Technology, May 2007.

S. Srinivasan and E. Zegura, ``RouteSeer: Topological placement of nodes in service overlays'', Tech. rep., Georgia Inst. of Technology, April 2006.

Georgia State Univ.

A. Shrestha, Visualizing spatio-temporal data, Ph.D. thesis, Georgia State Univ., December 2014.

Georgia Tech

S.R. Burnett, Empowering bystanders to facilitate Internet censorship measurement and circumvention, Ph.D. thesis, Georgia Tech, July 2014.

Gjovik Univ. College, Gjovik, Norway

R. Larsen, ``Slow port scanning with Bro'', M.S. thesis, Gjovik Univ. College, Gjovik, Norway, November 2013.

Global Comm. Conf. (GLOBECOM)

A. Bayati, V. Asghari, K. Nguyen, and M. Cheriet, ``Gaussian process regression based traffic modeling and prediction in high-speed networks'', in Global Comm. Conf. (GLOBECOM), December 2016, p. (7 pages).

Global Communications Conf. (GLOBECOM)

C. Li, J. Yang, Z. Wang, F. Li, and Y. Yang, ``A lightweight DDoS flooding attack detection algorithm based on synchronous long flows'', in Global Communications Conf. (GLOBECOM), December 2015, p. (6 pages).

Y. Haga, A. Saso, T. Mori, and S. Goto, ``Increasing the darkness of darknet traffic'', in Global Communications Conf. (GLOBECOM), December 2015, pp. 1--7.

Z. Chen, H. Luo, M. Zhang, and J. Li, ``Improving network security by dynamically changing path identifiers in future Internet'', in Global Communications Conf. (GLOBECOM), December 2015, p. (7 pages).

Global Conf. on Wireless Computing and Networking (GCWCN)

G. Iliev and J.~R. Shaikh, ``Blockchain based Confidentiality and Integrity Preserving Scheme for Enhancing E-commerce Security'', in Global Conf. on Wireless Computing and Networking (GCWCN), January 2018, p. (4 pages).

Global Telecommunications Conf.

V. Paruchuri, A. Durresi, and S. Chellappan, ``TTL based Packet Marking for IP traceback'', in Global Telecommunications Conf., December 2008, p. (5 pages).

V. Paruchuri, A. Durresi, and R. Jain, ``On the (in)effectiveness of probabilistic marking for IP traceback under DDoS attacks'', in Global Telecommunications Conf., November 2007, pp. 1965--1970.

Google Patents

G.~F. Ciocarlie, A. Stavrou, S.~J. Stolfo, and A.~D. Keromytis, ``Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models'', Tech. rep., Google Patents, January 2019.

Griffith Univ.

Z. Jadidi, Flow-based anomaly detection in high-speed networks, Ph.D. thesis, Griffith Univ., November 2015.

hal.archives-ouvertes.fr

L. Jacquin, V. Roca, M.A. Kaafar, F. Schuler, and J.-L. Roch, ``IBTrack: an ICMP black holes tracker'', Tech. rep., hal.archives-ouvertes.fr, March 2012.

Handbook of Computational Approaches to Counterterrorism

H. Du and S.J. Yang, ``Temporal and spatial analyses for large-scale cyber attacks'', in Handbook of Computational Approaches to Counterterrorism, November 2013, pp. 559--578.

High-Capacity Optical Networks and Enabling Technologies (HONET)

A. Haider, K. Acharya, and M.Y.A. Raja, ``Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks'', in High-Capacity Optical Networks and Enabling Technologies (HONET), December 2010, pp. 67--72.

Hindawi Scientific Programming

S. Ullah, M.~D. Awan, and M.~S.~H. Khiyal, ``Big Data in Cloud Computing: A Resource Management Perspective'', Hindawi Scientific Programming, vol. 2018, pp. (18 pages), January 2018.

Hindawi Security and Communication Networks

M. Idhammad, K. Afdel, and M. Belouch, ``Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest'', Hindawi Security and Communication Networks, p. (14 pages), January 2018.

Hochschule fuer Angewandte Wissenschaften Hamburg, Germany

M. Dramburg, ``Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien'', M.S. thesis, Hochschule fuer Angewandte Wissenschaften Hamburg, Germany, August 2008.

Hong Kong Univ. of Science and Technology

K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack'', Tech. rep., Hong Kong Univ. of Science and Technology, September 2013.

Horizon

J. Saldana, ``What to do with the Wi-Fi wild west'', Tech. rep., Horizon 2020, December 2016.

Hot Topics in Software Defined Networking (HotSDN)

Y. Yu, C. Qian, and X. Li, ``Distributed and collaborative traffic monitoring in software defined networks'', in Hot Topics in Software Defined Networking (HotSDN), August 2014, pp. 85--90.

Humboldt Univ. of Berlin

A. Baumann, Network Science - Applications in technology, business and social media, Ph.D. thesis, Humboldt Univ. of Berlin, June 2018.

IAENG J. Computer Science

Y. Xu and H. Zhao, ``An improved BA model for router-level internet macroscopic topology'', IAENG J. Computer Science, vol. 36, no. 2, pp. 122--128, May 2009.

ICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN)

L. McHale, C.J. Casey, P.V. Gratz, and A. Sprintson, ``Stochastic pre-classification for SDN data plane matching'', in ICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN), August 2014.

ICST Conf. on Simulation Tools and Techniques (SimuTools)

D. Miyamoto, T. Miyachi, Y. Taenaka, and H. Hazeyama, ``PhishCage: reproduction of fraudulent websites in the emulated Internet'', in ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 242--247.

D. Miyamoto and T. Miyachi, ``COSMO - Emulation of Internet traffic (poster abstract)'', in ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 274--276.

T. Miyachi and S. Miwa, ``Design and implementation of XBurner'', in ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 227--234.

IEEE

Y. Vanaubel, J.R. Luttringer, P. Merindol, J.J. Pansiot, and B. Donnet, ``TNT, watch me explode: A light in the dark for revealing MPLS tunnels'', Tech. rep., IEEE, June 2019.

IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC)

X. Wu, X. Gong, Q. Wu, X. Que, and Y. Tian, ``Hierarchical Forwarding Bit Index Explicit Replication (HF-BIER) in Multicast'', in IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), January 2019, vol. 8, p. (5 pages).

IEEE Access

S. Zhang, Y. Zhang, L. Yin, T. Yuan, Z. Wu, and H. Luo, ``Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things'', IEEE Access, vol. 7, pp. (9 pages), January 2019.

M. Park and T.~V. Phan, ``Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud'', IEEE Access, vol. 7, pp. (14 pages), January 2019.

Z. Lin and C. Wang, ``An Efficient Approximation of Betweenness Centrality for Uncertain Graphs'', IEEE Access, vol. 7, January 2019.

B.~A. Khalaf, S.~A. Mostafa, A. Mustapha, M.~A. Mohammed, and W.~M. Abduallah, ``Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods'', IEEE Access, vol. 7, pp. (23 pages), January 2019.

M. Iodice, M. Candela, and G. Di~Battista, ``Periodic Path Changes in RIPE Atlas'', IEEE Access, vol. 7, pp. (9 pages), January 2019.

Y. Gu, K. Li, Z. Guo, and Y. Wang, ``Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm'', IEEE Access, vol. 7, pp. (15 pages), January 2019.

M. Siddula, L. Li, and Y. Li, ``An empirical study on the privacy preservation of online social networks'', IEEE Access, vol. 6, pp. 19912--19922, April 2018.

Y. Yu, L. Guo, Y. Liu, J. Zheng, and Y. Zong, ``An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks'', IEEE Access, vol. 6, pp. (10 pages), January 2018.

M. Wang, H. Zhou, and J. Chen, ``PoTiA: A Popularity and Timeout Analysis Based SDN Controller Protection Approach'', IEEE Access, vol. 6, pp. (15 pages), January 2018.

P. Vickers and M. Debashi, ``Sonification of Network Traffic for Detecting and Learning About Botnet Behavior'', IEEE Access, vol. 6, pp. (14 pages), January 2018.

C. Zhang, G. Hu, G. Chen, A.~K. Sangaiah, P. Zhang, X. Yan, and W. Jiang, ``Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack'', IEEE Access, vol. 6, pp. (14 pages), January 2017.

IEEE Advanced Information Technology, Electronic and Automation Control Conf. (IAEAC)

J. Liu, B. Yang, J. Liu, Y. Lu, and K. Zhu, ``Forwarding degree-based AS relationship recognition algorithm'', in IEEE Advanced Information Technology, Electronic and Automation Control Conf. (IAEAC), January 2017, vol. 2, p. (5 pages).

IEEE Canadian Conf. on Electrical and Computer Engineering (CCECE)

A. Alsirhani, S. Sampalli, and P. Bodorik, ``DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache Spark'', in IEEE Canadian Conf. on Electrical and Computer Engineering (CCECE), January 2018, p. (6 pages).

IEEE Comm. Lett.

P. Reviriego, J. Martinez, and S. Pontarelli, ``Improving packet flow counting with fingerprint counting'', IEEE Comm. Lett., vol. 24, no. 1, pp. 76--80, January 2020.

A. Bayati, K.~K. Nguyen, and M. Cheriet, ``Multiple-step-ahead traffic prediction in high-speed networks'', IEEE Comm. Lett., vol. 22, no. 12, pp. 2447--2450, December 2018.

IEEE Comm. Letters

C Xing, K. Ding, C. Hu, and M. Chen, ``Sample and fetch-based large flow detection mechanism in Software Defined Networks'', IEEE Comm. Letters, vol. 20, no. 9, pp. 1764--1767, June 2016.

Y. Wu, Z. Chen, J. Cao, H. Li, C. Li, Y. Wang, W. Zheng, J. Chang, J. Zhou, Z. Hu, and J. Guo, ``CAMP: A new bitmap index for data retrieval in traffic archival'', IEEE Comm. Letters, vol. 20, no. 6, pp. 1128--1131, June 2016.

IEEE Comm. Surveys and Tutorials

F. Pacheco, E. Exposito, M. Gineste, C. Baudoin, and J. Aguilar, ``Towards the deployment of machine learning solutions in network traffic classification: A systematic survey'', IEEE Comm. Surveys and Tutorials, vol. 21, no. 2, pp. 1988--2014, November 2018.

IEEE Communications Lett.

M. Rodriguez-Perez, S. Herreria-Alonso, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Delay properties of energy efficient ethernet networks'', IEEE Communications Lett., vol. 21, no. 10, pp. 2194--2197, October 2017.

V. Moreno, P.M. Santiago~del Rio, J. Ramos, J. Garnica, and J.L. Garcia-Dorado, ``Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines'', IEEE Communications Lett., vol. 99, pp. 1--4, October 2012.

M.A. Marsan, A. Fernandez~Anta, V. Mancuso, B. Rengarajan, P. Vasallo, and G. Rizzo, ``A simple analytical model for energy efficient ethernet'', IEEE Communications Lett., vol. 15, no. 7, pp. 773--775, July 2011.

IEEE Communications Letters

L. Zhou, K. Sood, and Y. Xiang, ``ERM: An Accurate Approach to Detect DDoS Attacks using Entropy Rate Measurement'', IEEE Communications Letters, p. (4 pages), January 2019.

J. Chen, R.G. Addie, M. Zukerman, and T.D. Neame, ``Performance evaluation of a queue fed by a Poisson Lomax burst process'', IEEE Communications Letters, vol. 19, no. 3, pp. 367--370, March 2015.

S. Pontarelli, P. Reviriego, and J.A. Maestro, ``Efficient flow sampling with back-annotated cuckoo hashing'', IEEE Communications Letters, vol. 18, no. 10, pp. 1695,1698, October 2014.

P. Reviriego, S. Pontarelli, and J.A. Maestro, ``Energy efficient exact matching for flow identification with cuckoo affinity hashing'', IEEE Communications Letters, vol. 18, no. 5, pp. 885--888, May 2014.

IEEE Communications Magazine

T.V. Doan, L. Pajevic, V. Bajpai, and J. Ott, ``Tracing the path to YouTube: A quantification of path lengths and latencies toward content caches'', IEEE Communications Magazine, vol. 57, no. 1, pp. 80--86, November 2018.

F. Shaikh, E. Bou-Harb, N. Neshenko, A.~P. Wright, and N. Ghani, ``Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices'', IEEE Communications Magazine, vol. 56, pp. (8 pages), January 2018.

IEEE Communications Surveys and Tutorials

M. Husak, J. Komarkova, E. Bou-Harb, and P. Celeda, ``Survey of attack projection, prediction, and forecasting in cyber security'', IEEE Communications Surveys and Tutorials, vol. 21, no. 1, pp. 640--660, September 2018.

A. Nisioti, A. Mylonas, P.~D. Yoo, and V. Katos, ``From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods'', IEEE Communications Surveys and Tutorials, vol. 20, pp. (20 pages), January 2018.

C. Fachkha and M. Debbabi, ``Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization'', IEEE Communications Surveys and Tutorials, vol. 18, pp. 1197--1227, May 2016.

V. Moreno, J. Ramos, P.M. Santiado~del Rio, J.L. Garcia-Dorado, F.J. Gomez-Arribas, and J. Aracil, ``Commodity packet capture engines: tutorial, cookbook and applicability'', IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1364--1390, August 2015.

IEEE Computational Intelligence in Cyber Security (CICS)

E. Balkanli, J. Alves, and A.N. Zincir-Heywood, ``Supervised learning to detect DDoS attacks'', in IEEE Computational Intelligence in Cyber Security (CICS), December 2014.

IEEE Computer Architecture Letters

C. Kim and H. Lee, ``A High-Bandwidth PCM-Based Memory System for Highly Available IP Routing Table Lookup'', IEEE Computer Architecture Letters, vol. 17, January 2018.

IEEE Computing and Communication Workshop and Conf. (CCWC)

Y. Nozaki, E. Golen, and N. Shenoy, ``A modular architecture for scalable inter-domain routing'', in IEEE Computing and Communication Workshop and Conf. (CCWC), January 2017, p. (6 pages).

IEEE Conf. on Advanced Information Networking and Applications (AINA)

D. Qin, J. Yang, Z. Liu, H. Wang, B. Zhang, and W. Zhang, ``AMIR: Another multipath interdomain routing'', in IEEE Conf. on Advanced Information Networking and Applications (AINA), March 2012, pp. 581--588.

IEEE Conf. on Application, Information and Network Security (AINS)

S. Wiedenmann, T. Mundt, and J. Goltz, ``Designing and Implementing a Benchmark Collection for Attack Simulation in Field bus Systems'', in IEEE Conf. on Application, Information and Network Security (AINS), January 2018, p. (9 pages).

IEEE Conf. on Big Data

A. Hendawi, F. Alali, X. Wang, Y. Guan, T. Zhou, X. Liu, N. Basit, and J. Stankovic, ``Hobbits: Hadoop and Hive based Internet traffic analysis'', in IEEE Conf. on Big Data, December 2016, pp. 2590--2599.

IEEE Conf. on Communication Software and Networks

Y. Chen, X. Chen, H. Tian, T. Wang, and Y. Cai, ``A blind detection method for tracing the real source of DDoS attack packets by cluster matching'', in IEEE Conf. on Communication Software and Networks, June 2016, pp. 551--555.

IEEE Conf. on Communication Systems (ICCS)

X. He and S. Parameswaran, ``MCAD: Multiple connection based anomaly detection'', in IEEE Conf. on Communication Systems (ICCS), November 2008, pp. 999--1004.

IEEE Conf. on Communications (ICC)

S. Mukherjee, S. Sriram, and D. Raychaudhuri, ``Edge-aware inter-domain routing for realizing next-generation mobility services'', in IEEE Conf. on Communications (ICC), July 2017, p. (6 pages).

B. Fabian, A. Baumann, M. Ehlert, V. Vasilis, and T. Ermakova, ``CORIA - Analyzing Internet connectivity risks using network graphs'', in IEEE Conf. on Communications (ICC), May 2017, p. (6 pages).

Z. Feng, M. Xu, and Y. Yang, ``Revolutionizing the inter-domain business model by information-centric thinking'', in IEEE Conf. on Communications (ICC), May 2016, p. (6 pages).

X. Misseri, I. Gojmerac, and J.-L. Rougier, ``IDRD: Enabling inter-domain route diversity'', in IEEE Conf. on Communications (ICC), June 2013, pp. 3536--3541.

A. Iacovazzi and A. Baiocchi, ``Investigating the trade-off between overhead and delay for full packet traffic privacy'', in IEEE Conf. on Communications (ICC), June 2013, pp. 1345--1350.

R.G. Clegg, J.T. Araujo, R. Landa, E. Mykoniati, D. Griffin, and M. Rio, ``On the relationship between fundamental measurements in TCP flows'', in IEEE Conf. on Communications (ICC), June 2013, pp. 2502--2506.

J. Tomasik and M.-A. Weisser, ``The inter-domain hierarchy in measured and randomly generated AS-level topologies'', in IEEE Conf. on Communications (ICC), June 2012, pp. 1448--1453.

Y.S. Hanay, W. Li, R. Tessier, and T. Wolf, ``Saving energy and improving TCP throughput with rate adaptation in Ethernet'', in IEEE Conf. on Communications (ICC), June 2012, pp. 1249--1254.

Y. Nozaki, H. Tuncer, and N. Shenoy, ``ISP tiered model based architecture for routing scalability'', in IEEE Conf. on Communications (ICC), May 2012, pp. 5817--5821.

V.C. Valgenti, R.R. Paul, and M.S. Kim, ``Netshuffle: Improving traffic trace anonymization through graph distortion'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).

M.D.D. Moreira, R. Laufer, N.C. Fernandes, and O.C.M.B. Duarte, ``A stateless traceback technique for identifying the origin of attacks from a single packet'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).

H.T. Karaoglu, M. Yuksel, and M.H. Gunes, ``On the scalability of path exploration using opportunistic path-vector routing'', in IEEE Conf. on Communications (ICC), June 2011, p. (5 pages).

P. Amaral, E. Silva, L. Bernardo, and P. Pinto, ``Inter-domain traffic engineering using an AS-level multipath routing architecture'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).

M. Woldeselassie, R. Clegg, and M. Rio, ``Forecasting full-path network congestion using one bit signalling'', in IEEE Conf. on Communications (ICC), July 2010, pp. 1--5.

P. Amaral, L. Bernardo, and P. Pinto, ``DTIA: An Architecture for Inter-Domain Routing'', in IEEE Conf. on Communications (ICC), August 2009, pp. 1--7.

L. Li and C. Chen, ``Exploring possible strategies for competitions between Autonomous Systems'', in IEEE Conf. on Communications (ICC), May 2008, pp. 5919--5923.

B. Whitehead, C.-H. Lung, and P. Rabinovitch, ``A TCP connection establishment filter: symmetric connection detection'', in IEEE Conf. on Communications (ICC), June 2007, pp. 247--253.

A. Dainotti, A. Pescape, and G. Ventre, ``Worm traffic analysis and characterization'', in IEEE Conf. on Communications (ICC), June 2007, pp. 1435--1442.

IEEE Conf. on Computer Comm. (INFOCOM)

H. Huang, Y.~E. Sun, S. Chen, S. Tang, K. Han, J. Yuan, and W. Yang, ``You can drop but you can't hide: K-persistent spread estimation in high-speed networks'', in IEEE Conf. on Computer Comm. (INFOCOM), January 2018, p. (9 pages).

IEEE Conf. on Computer Communications

F. Wang, L. Gao, S. Xiaozhe, H. Hirai, and K. Fujikawa, ``Efficient handling of excessive locators in hierarchical addressing'', in IEEE Conf. on Computer Communications, July 2018, p. (6 pages).

R. Basat, G. Einziger, R. Friedman, and Y. Kassner, ``Optimal elephant flow detection'', in IEEE Conf. on Computer Communications, May 2017, p. (9 pages).

IEEE Conf. on Computer Communications (INFOCOM)

R. Ben-Basat, G. Einziger, and R. Friedman, ``Heavy hitters in streams and sliding windows'', in IEEE Conf. on Computer Communications (INFOCOM), April 2016, p. (9 pages).

R. Kloti, V. Kotronis, B. Ager, and X. Dimitropoulos, ``Policy-compliant path diversity and bisection bandwidth'', in IEEE Conf. on Computer Communications (INFOCOM), August 2015, p. (9 pages).

S. Hasan, S. Gorinsky, C. Dovrolis, and R.K. Sitaraman, ``Trade-offs in optimizing the cache deployments of CDNs'', in IEEE Conf. on Computer Communications (INFOCOM), April 2014, p. (9 pages).

T. Pan, X. Guo, C. Zhang, J. Jiang, H. Wu, and B. Liu, ``Tracking millions of flows in high speed networks for application identification'', in IEEE Conf. on Computer Communications (INFOCOM), March 2012, pp. 1647--1655.

S.D. Strowes, G. Mooney, and C. Perkins, ``Compact routing on the Internet AS-graph'', in IEEE Conf. on Computer Communications (INFOCOM), June 2011, pp. 852--857.

K. Xu, F. Wang, and L. Gu, ``Network-aware behavior clustering of Internet end hosts'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 2078--2086.

W. Deng, P. Zhu, N. Xiong, Y. Xiao, and H. Xiaofeng, ``How resilient are individual ASes against AS-level link failures?'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 982--987.

S. Tarkoma and M. Antikainen, ``Canopy: publish/subscribe with upgraph combination'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, pp. 1--6.

J. Rajahalme, ``Incentive-informed inter-domain multicast'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 6 pp.

M. Lee, N. Duffield, and R. Kompella, ``Two samples are enough: Opportunistic flow-level latency estimation using NetFlow'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 9 pp.

C. Hu, K. Chen, Y. Chen, and B. Liu, ``Evaluating potential routing diversity for internet failure recovery'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 5 pp.

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, ``Spotter: a model based active geolocation service'', in IEEE Conf. on Computer Communications (INFOCOM), April 2010, p. (9).

U. Weinsberg, Y. Shavitt, and E. Shir, ``Near-deterministic inference of AS relationships'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009, pp. 1--2.

M. Saxena and R. Kompella, ``A framework for efficient class-based sampling'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009.

J. Riihijarvi, P. Mahonen, and M. Wellens, ``Measuring complexity and predictability in networks with multiscale entropy analysis'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009.

M. Latapy and C. Magnien, ``Complex network measurements: estimating the relevance of observed properties'', in IEEE Conf. on Computer Communications (INFOCOM), April 2008, pp. 1660--1668.

P. Fraigniaud, E. Febhar, and F. Viennot, ``The inframetric model for the internet'', in IEEE Conf. on Computer Communications (INFOCOM), April 2008, pp. 1085--1093.

Z. Chen and C. Ji, ``Measuring network-aware worm spreading ability'', in IEEE Conf. on Computer Communications (INFOCOM), May 2007, pp. 116--124.

M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis, ``Sampling strategies for epidemic-style information dissemination'', in IEEE Conf. on Computer Communications (INFOCOM), April 2007, pp. 1678--1686.

A. Yaar, A. Perrig, and D. Song, ``FIT: Fast Internet Traceback'', in IEEE Conf. on Computer Communications (INFOCOM), March 2005, vol. 2 of IEEE INFOCOM 2005, pp. 1395--1406.

IEEE Conf. on Computer Communications and Networks (ICCCN)

P. Ghoshal, C.J. Casey, P.V. Gratz, and A. Sprintson, ``Stochastic pre-classification for Software Defined Firewalls'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2013.

G. Tyson, S. Kaune, S. Miles, Y. El-khatib, A. Mauthe, and A. Taweel, ``A trace-driven analysis of caching in content-centric networks'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2012, pp. 1--7.

P. He, H. Guan, G. Xie, and K. Salamatian, ``Evaluating and optimizing IP lookup on many core processors'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2012, pp. 1--7.

J.M.C. Silva and S.R. Lima, ``Multiadaptive sampling for lightweight network measurements'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2012, pp. 1--7.

M.Z. Ahmad and R. Guha, ``Evaluating end-user network benefits of peering with path latencies'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2012, pp. 1--7.

H. Du and S.J. Yang, ``Characterizing transition behaviors in Internet attack sequences'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2011, p. (6 pages).

M. Dusi, F. Gringoli, and L. Salgarelli, ``IP traffic classification for QoS guarantees: the independence of packets'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2008, pp. 914--921.

A. Shevtekar and N. Ansari, ``A proactive test based differentiation to mitigate low rate DoS attacks'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2007, pp. 639--644.

R. Chen and J.-M. Park, ``Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources'', in IEEE Conf. on Computer Communications and Networks (ICCCN), October 2005, pp. 275--280.

IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS)

M.A. Canbaz, ``Data-driven large scale network-layer Internet simulation'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), April 2016, p. (2 pages).

K. Edeline and B. Donnet, ``Towards a middlebox policy taxonomy: Path impairments'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), April 2015.

B. Ribeiro, P. Basu, and D. Towsley, ``Multiple random walks to uncover short paths in power law networks'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), March 2012, pp. 250--255.

A. Lutu, M. Bagnulo, and R. Stanojevic, ``An economic side-effect for prefix deaggregation'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), March 2012, pp. 190--195.

IEEE Conf. on Computer Design (ICCD)

W. Jiang and V.K. Prasanna, ``Reducing dynamic power dissipation in pipelined forwarding engines'', in IEEE Conf. on Computer Design (ICCD), October 2009.

IEEE Conf. on Computer Science and Information Technology (ICCSIT)

W. Shu and C. Changjia, ``Backup routing for BGP: Virtual ring routing scheme'', in IEEE Conf. on Computer Science and Information Technology (ICCSIT), September 2009, pp. 603--607.

IEEE Conf. on Distributed Computing Systems (ICDCS)

X. Shao, F. Wang, L. Gao, K. Fujikawa, and H. Harai, ``Distributed encoding for multiple-inherited locators to accommodate billions of objects in the Internet'', in IEEE Conf. on Distributed Computing Systems (ICDCS), June 2016, pp. 751--752.

IEEE Conf. on Electro Information Technology

A. Karimi, Q. Niyaz, W. Sun, A. Javaid, and V. Devabhaktuni, ``Distributed network traffic feature extraction for a real-time IDS'', in IEEE Conf. on Electro Information Technology, May 2016, pp. 522--526.

IEEE Conf. on Fuzzy Systems (FUZZ-IEEE)

F.M. Pouzols, A. Barriga, D.R. Lopez, and S. Sanchez-Solano, ``Linguistic summarization of network traffic flows'', in IEEE Conf. on Fuzzy Systems (FUZZ-IEEE), June 2008, pp. 619--624.

IEEE Conf. on Intelligence and Security Informatics

J.M. Namayanja and V.P. Janeja, ``Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks'', in IEEE Conf. on Intelligence and Security Informatics, June 2013, pp. 191--196.

IEEE Conf. on Local Computer Networks

J.M. Wang, X. Dai, and B. Bensaou, ``Content peering in content centric networks'', in IEEE Conf. on Local Computer Networks, September 2014, pp. 10--18.

IEEE Conf. on Local Computer Networks (LCN)

S. Wassermann and P. Casas, ``Reverse traceroute with DisNETPerf, a distributed Internet paths performance analyzer'', in IEEE Conf. on Local Computer Networks (LCN), November 2016, p. (3 pages).

M.Z. Ahmad and R. Guha, ``A tale of nine Internet exchange points: studying path latencies through major regional IXPs'', in IEEE Conf. on Local Computer Networks (LCN), October 2012, p. (8 pages).

M.Z. Ahmad and R. Guha, ``Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks'', in IEEE Conf. on Local Computer Networks (LCN), October 2012, p. (8 pages).

Z. Chen, C. Lin, J. Ni, D.-H. Ruan, B. Zheng, Y.-X. Jiang, X. Peng, Y. Wang, A. Luo, B. Zhu, Y. Yue, and F.-Y. Ren, ``Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN'', in IEEE Conf. on Local Computer Networks (LCN), November 2005, pp. 748--755.

IEEE Conf. on Local Computer Networks Workshops (LCN Workshops)

M. Wuebbeling and M. Meier, ``Improved calculation of AS resilience against IP prefix hijacking'', in IEEE Conf. on Local Computer Networks Workshops (LCN Workshops), November 2016, pp. 121--128.

S. Wassermann, P. Casas, B. Donnet, G. Leduc, and M. Mellia, ``On the analysis of Internet paths with DisNETPerf, a distributed paths performance analyzer'', in IEEE Conf. on Local Computer Networks Workshops (LCN Workshops), November 2016, pp. 72--79.

IEEE Conf. on Network Infrastructure and Digital Content (IC-NIDC)

C. Wang, Z. Li, X. Huang, and P. Zhang, ``Inferring the average as path length of the Internet'', in IEEE Conf. on Network Infrastructure and Digital Content (IC-NIDC), September 2016, pp. 391--395.

IEEE Conf. on Network Protocol (ICNP)

H. Yang and S.S. Lam, ``Collaborative verification of forward and reverse reachability in the Internet data plane'', in IEEE Conf. on Network Protocol (ICNP), October 2014, p. (12 pages).

IEEE Conf. on Network Protocols (ICNP)

Q. Xiao, Y. Qiao, M. Zhen, and S. Chen, ``Estimating the persistent spreads in high-speed networks'', in IEEE Conf. on Network Protocols (ICNP), October 2014, pp. 131--142.

P. Bangera and S. Gorinsky, ``An economic perspective on traffic attraction by Internet transit providers'', in IEEE Conf. on Network Protocols (ICNP), October 2013, p. (2 pages).

IEEE Conf. on Network Softwarization and Workshops (NetSoft)

S. Gao, S. Shrivastava, K. Ogan, Y. Xin, and I. Baldin, ``Evaluating path query mechanisms as a foundation for SDN network control'', in IEEE Conf. on Network Softwarization and Workshops (NetSoft), June 2018, p. (9 pages).

IEEE Conf. on Networking (ICN)

J. Bi, P. Hu, and P. Li, ``Study on classification and characteristics of source address spoofing attacks in the Internet'', in IEEE Conf. on Networking (ICN), April 2010, pp. 226--230.

A. Di~Menna, T. Refice, L. Cittadini, and G. Di~Battista, ``Measuring route diversity in the internet from remote vantage points'', in IEEE Conf. on Networking (ICN), May 2009, pp. 24--29.

G. Terdik and T. Gyires, ``Does the internet still demonstrate fractal nature?'', in IEEE Conf. on Networking (ICN), March 2009, pp. 30--34.

T.C. Schmidt, M. Wahlisch, and Y. Zhang, ``On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing'', in IEEE Conf. on Networking (ICN), April 2007, pp. 94--94.

IEEE Conf. on Technologies for Homeland Security (HST)

J. Gersch and D. Massey, ``Characterizing vulnerability to IP hijack attempts'', in IEEE Conf. on Technologies for Homeland Security (HST), November 2013, pp. 328--333.

IEEE European Symp. on Security and Privacy (EuroSP)

S. Frey, Y. Elkhatib, A. Rashid, K. Follis, J. Vidler, N. Race, and C. Edwards, ``It bends but would it break? Topological analysis of BGP infrastructures in Europe'', in IEEE European Symp. on Security and Privacy (EuroSP), March 2016, pp. 423--438.

IEEE Global Comm. Conf. (GLOBECOM)

C.A. Gomez, X. Wang, and A. Shami, ``Intelligent active queue management using explicit congestion notification'', in IEEE Global Comm. Conf. (GLOBECOM), December 2019, p. (6 pages).

J. Wu, Y. Chen, and H. Zheng, ``Approximation algorithms for dependency-aware rule-caching in Software-Defined Networks'', in IEEE Global Comm. Conf. (GLOBECOM), January 2018, p. (6 pages).

R.~H. Remedios and A. Nayak, ``On improving measurement accuracy of DREAM framework with estimation filters'', in IEEE Global Comm. Conf. (GLOBECOM), January 2018, p. (7 pages).

H.~P. Joshi and R. Dutta, ``GADFly: A fast and robust algorithm to detect P2P botnets in communication graphs'', in IEEE Global Comm. Conf. (GLOBECOM), January 2018, p. (6 pages).

IEEE Global Comm. Conference

Y. Sun, Y. Zhang, H. Zhang, B. Fang, and X. Du, ``Geometric Routing on Flat Names for ICN'', in IEEE Global Comm. Conference, December 2015, p. (6 pages).

IEEE Global Communications Conf.

M.S. Siddiqui, D. Montero, M. Yannuzzi, R. Serral-Gracia, X. Masip-Bruin, and W. Ramirez, ``Route leak detection using real-time analytics on local BGP information'', in IEEE Global Communications Conf., December 2014, pp. 1942--1948.

IEEE Global Communications Conf. (GLOBECOM)

Z. Peng, H. Li, and C. Hu, ``DIAL: Distributed Elephant Flow Counting on SDN'', in IEEE Global Communications Conf. (GLOBECOM), January 2018, p. (6 pages).

M. Schuchard, J. Geddes, M. Schliep, and N. Hopper, ``The cost of the path not taken'', in IEEE Global Communications Conf. (GLOBECOM), February 2017, p. (6 pages).

IEEE Global Telecommunications Conf. (GLOBECOM)

T. Johnson and L. Lazos, ``Network anomaly detection using autonomous system flow aggregates'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2014, p. (8 pages).

D. Ren, W. Wong, and S.-H. Gary~Chan, ``Toward continuous push-based P2P live streaming'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2012, pp. 1969--1974.

K. Xu and F. Wang, ``Behavioral graph analysis of Internet applications'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2011, p. (5 pages).

K. He, C. Hu, J. Jiang, Y. Zhou, and B. Liu, ``A2C: Anti-attack counters for traffic measurement'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2010, p. (5 pages).

K. Chen, C. Hu, W. Zhang, Y. Chen, and B. Liu, ``On the eyeshots of BGP vantage points'', in IEEE Global Telecommunications Conf. (GLOBECOM), March 2010, p. 6 pp.

P. Amaral, F. Ganhao, C. Assuncao, L. Bernardo, and P. Pinto, ``Scalable multi-region routing at inter-domain level'', in IEEE Global Telecommunications Conf. (GLOBECOM), March 2010, p. 8 pp.

S. Qazi and T. Moors, ``Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2007, pp. 2602--2606.

Y. Xiang and W. Zhou, ``Mark-aided distributed filtering by using neural network for DDoS defense'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2005, p. (5 pages).

Z. Chen and C. Ji, ``Importance-scanning worm using vulnerable-host distribution'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2005, p. (6 pages).

W. Fang and L. Peterson, ``Inter-AS traffic patterns and there implications'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 1999, vol. 3, pp. 1859--1868.

IEEE Globecom Workshops (GC Wkshps)

N. Neshenko, M. Husak, E. Bou-Harb, P. Celeda, S. Al-Mulla, and C. Fachkha, ``Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations'', in 2018 IEEE Globecom Workshops (GC Wkshps), January 2018, p. (6 pages).

M. Iordache, S. Jouet, A. Marnerides, and D. Pezaros, ``Distributed, multi-level network anomaly detection for datacentre networks'', in IEEE ICC Next Generation Networking and Internet Symp., July 2017, p. (6 pages).

IEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov)

Huang~Y. Huang~S.Y., ``Network forensic analysis using growing hierarchical SOM'', in IEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov), December 2013, pp. 536--543.

IEEE INFOCOM

V. Pacifici and G. Dan, ``Content-peering dynamics of autonomous caches in a content-centric network'', in IEEE INFOCOM, April 2013, pp. 1079--1087.

L. Neudorfer, Y. Shavitt, and N. Zilberman, ``Improving AS relationship inference using PoPs'', in IEEE INFOCOM, April 2013, pp. 3483--3488.

W. Chen, Y. Liu, and Y. Guan, ``Cardinality change-based early detection of large-scale cyber-attacks'', in IEEE INFOCOM, April 2013, pp. 1788--1796.

S.A. Ahmadzadeh and G. Agnew, ``Turbo covert channel: An iterative framework for covert communication over data networks'', in IEEE INFOCOM, April 2013, pp. 2031--2039.

J. Fan, C. Hu, K. He, J. Jiang, and B. Liuy, ``Reducing power of traffic manager in routers via dynamic on/off-chip scheduling'', in IEEE INFOCOM, May 2012, pp. 1925--1933.

E. Tsidon, I. Hanniel, and I. Keslassy, ``Estimators also need shared values to grow together'', in IEEE INFOCOM, March 2012, pp. 1889--1897.

S.D. Strowes and C. Perkins, ``Harnessing Internet topological stability in Thorup-Zwick compact routing'', in IEEE INFOCOM, March 2012, pp. 2551--2555.

J.L. Sobrinho and F. Le, ``A fresh look at inter-domain route aggregation'', in IEEE INFOCOM, March 2012, pp. 2556--2560.

O. Rottenstreich and I. Keslassy, ``The Bloom paradox: When not to use a Bloom filter?'', in IEEE INFOCOM, March 2012, pp. 1638--1646.

O. Rottenstreich, Y. Kanizo, and I. Keslassy, ``The variable-increment counting Bloom filter'', in IEEE INFOCOM, March 2012, pp. 1880--1888.

H. Huang, B. Zhang, S.-H.G. Chan, G. Cheung, and P. Frossard, ``Coding and replication co-design for interactive multiview video streaming'', in IEEE INFOCOM, March 2012, pp. 2791--2795.

IEEE INFOCOM - IEEE Conference on Computer Communications

T. Yang, J. Xu, X. Liu, P. Liu, L. Wang, J. Bi, and X. Li, ``A Generic Technique for Sketches to Adapt to Different Counting Ranges'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).

L. Tang, Q. Huang, and P.~P.~C. Lee, ``MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data Streams'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).

A. Milolidakis, R. Fontugne, and X. Dimitropoulos, ``Detecting Network Disruptions At Colocation Facilities'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).

M. Alasmar, G. Parisis, R. Clegg, and N. Zakhleniu, ``On the Distribution of Traffic Volumes in the Internet and its Implications'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).

IEEE INFOCOM Workshop Global Internet Symp.

R. Clegg, R. Landa, H. Haddadi, M. Rio, and A.W. Moore, ``Techniques for flow inversion on sampled data'', in IEEE INFOCOM Workshop Global Internet Symp., April 2008, p. (6 pages).

IEEE Int Conf. on Advanced Information Networking and Applications (AINA)

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``TDFA: Traceback-based defense against DDoS flooding attacks'', in IEEE Int Conf. on Advanced Information Networking and Applications (AINA), May 2014, pp. 597--604.

IEEE International Conference on Communications (ICC)

M.~S. Pour and E. Bou-Harb, ``Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation'', in 2018 IEEE International Conference on Communications (ICC), January 2018, p. (8 pages).

IEEE International Conference on Systems, Man, and Cybernetics (SMC)

J.~L.~G. Gomez, R. Wang, M.~H. Chen, and C.~F. Chou, ``ETMP-BGP: Effective tunnel-based multi-path BGP routing using software-defined networking'', in 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), January 2017, p. (6 pages).

IEEE Internet Computing

J. Rohrer, B. LaFever, and R. Beverly, ``Empirical study of router IPv6 interface address distributions'', IEEE Internet Computing, vol. 20, no. 4, pp. 36--45, July 2016.

S. Pontarelli and P. Reviriego, ``Cuckoo Cache: A Technique to Improve Flow Monitoring Throughput'', IEEE Internet Computing, vol. 20, no. 4, pp. 46--53, July 2016.

T. Karagiannis, M. Molle, and M. Faloutsos, ``Long-range dependence: ten years of Internet traffic modeling'', IEEE Internet Computing, vol. 8, no. 5, pp. 57--64, September 2004.

IEEE Intl Conf on Big Data Analysis (ICBDA)

A. Zhou, H. Zhu, L. Liu, and C. Zhu, ``Detection of super nodes based on connection metrics for network data streams'', in IEEE Intl Conf on Big Data Analysis (ICBDA), January 2018, vol. 3, p. (6 pages).

IEEE Intl Conf. on Cognitive Informatics and Cognitive Computing (ICCI*CC)

M. Ghanbari and W. Kinsner, ``Extracting features from both the input and the output of a convolutional neural network to detect Distributed Denial of Service attacks'', IEEE Intl Conf. on Cognitive Informatics and Cognitive Computing (ICCI*CC), vol. 17, pp. (7 pages), January 2018.

IEEE Intl Conf. on Computer and Communications

P.A. Abu, M.Z. Saavedra, A.H. Medalla, and W.E. Yu, ``Adapting block-sized captures for faster network flow analysis on the Hadoop ecosystem'', in IEEE Intl Conf. on Computer and Communications, January 2018, vol. 4, p. (8 pages).

IEEE Intl Conf. on Distributed Computing Systems (ICDCS)

E. Ciftcioglu, R. Hardy, K. Chan, L. Scott, D. Oliveira, and G. Verma, ``Chaff allocation and performance for network traffic obfuscation'', in IEEE Intl Conf. on Distributed Computing Systems (ICDCS), January 2018, vol. 38, p. (4 pages).

IEEE Intl Conf. on Electronics and Communication and Aerospace Technology

S. Behal and P. Singh, ``LeCAM: A novel metric for detecting DDoS attacks '', in IEEE Intl Conf. on Electronics and Communication and Aerospace Technology, June 2019, p. (7 pages).

IEEE Intl Conf. on Machine Learning and Applications (ICMLA)

M.~H. Bhuyan and E. Elmroth, ``Multi-scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric'', in IEEE Intl Conf. on Machine Learning and Applications (ICMLA), January 2018, vol. 17, p. (8 pages).

IEEE Intl Conf. on Network Protocols (ICNP)

Y. Li, H. Xie, and J.~C.~S. Lui, ``Quantifying Deployability and Evolvability of Future Internet Architectures via Economic Models'', in IEEE Intl Conf. on Network Protocols (ICNP), January 2018, vol. 26, p. (11 pages).

IEEE Intl Conf. On Trust, Security And Privacy In Computing And Communications/On Big Data Science And Engineering (TrustCom/BigDataSE)

J. Mao, W. Deng, and F. Shen, ``DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features'', in IEEE Intl Conf. On Trust, Security And Privacy In Computing And Communications/On Big Data Science And Engineering (TrustCom/BigDataSE), January 2018, vol. 17th and 12th, p. (7 pages).

IEEE J. on Selected Areas in Communications

L. Zhu, X. Tang, M. Shen, X. Du, and M. Guizani, ``Privacy-preserving DDoS attack detection using cross-domain traffic in Software Defined Networks'', IEEE J. on Selected Areas in Communications, vol. 36, no. 3, pp. 628--643, March 2018.

V. Pacifici and G. Dan, ``Distributed caching algorithms for interconnected operator CDNs'', IEEE J. on Selected Areas in Communications, vol. 35, no. 2, pp. 380--391, February 2017.

T. Song, Z. Jiang, Y. Wei, X. Shi, X. Ma, and O. Ormond, ``Traffic aware energy efficient router: Architecture, prototype and algorithms'', IEEE J. on Selected Areas in Communications, vol. 34, no. 12, pp. 3814--3827, August 2016.

IEEE J. Selected Areas in Communications

Y. Zhang, R. Oliveira, Y. Wang, S. Su, B. Zhang, J. Bi, H. Zhang, and L. Zhang, ``A framework to quantify the pitfalls of using traceroute in AS-level topology measurement'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1822--1836, October 2011.

P. Marchetta, P. Merindol, B. Donnet, A. Pescape, and J.-J. Pansiot, ``Topology discovery at the router level: a new hybrid tool targeting ISP networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 6, pp. 1776--1787, October 2011.

M. Kurant and A. Markopoulou, ``Towards unbiased BFS sampling'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1799--1809, October 2011.

V. Jesus, R.L. Aguiar, and P. Steenkiste, ``Topological implications of cascading interdomain bilateral traffic agreements'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1848--1862, October 2011.

M. Gjoka, M. Kurant, C.T. Butts, and A. Markopoulou, ``Practical recommendations on crawling online social networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1872--1892, October 2011.

B. Donnet, P. Raoult, T. Friedman, and M. Crovella, ``Deployment of an algorithm for large-scale topology discovery'', IEEE J. Selected Areas in Communications, vol. 24, no. 12, pp. 2210--2220, December 2006.

A. Yaar, A. Perrig, and D. Song, ``StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense'', IEEE J. Selected Areas in Communications, vol. 24, no. 10, pp. 1853--1863, October 2006.

IEEE J. Selected Topics in Quantum Electronics

P. Reviriego, B. Huiszoon, V. Lopez, R.B. Coenen, J.A. Hernandez, and J.A. Maestro, ``Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links'', IEEE J. Selected Topics in Quantum Electronics, vol. 17, no. 2, pp. 419--427, March 2011.

IEEE Journal on Selected Areas in Communications

Q. Xiang, J.~J. Zhang, X.~T. Wang, Y.~J. Liu, C. Guok, F. Le, H. Newman, Y.~R. Yang, and J. MacAuley, ``Toward Fine-Grained, Privacy-Preserving, Efficient Multi-Domain Network Resource Discovery'', IEEE Journal on Selected Areas in Communications, vol. 37, pp. (16 pages), January 2019.

IEEE Local Computer Networks Workshops (LCN Workshops)

E. Balkanli and A.N. Zincir-Heywood, ``On the analysis of backscatter traffic'', in IEEE Local Computer Networks Workshops (LCN Workshops), September 2014.

IEEE Military Communications Conf. (MILCOM)

T.N. Dinh, Y. Shen, and M.T. Thai, ``An efficient spectral bound for link vulnerability assessment in large-scale networks'', in IEEE Military Communications Conf. (MILCOM), October 2012.

IEEE Network

H. Luo, Y. Lin, H. Zhang, and M. Zukerman, ``Preventing DDoS attacks by identifier/locator separation'', IEEE Network, vol. 27, no. 6, pp. 60--65, November 2013.

IEEE Network Operations and Management Symp. (NOMS)

S. Martin, L. Chiarello, and G. Leduc, ``DISco: A distributed information store for network challenges and their outcome'', in IEEE Network Operations and Management Symp. (NOMS), May 2012, pp. 1221--1226.

IEEE Performance Computing and Communications Conf. (IPCC)

J. Tomasik and M.-A. Weisser, ``Internet topology on as-level: Model, generation methods and tool'', in IEEE Performance Computing and Communications Conf. (IPCC), January 2011, pp. 263--270.

IEEE Performance Computing and Communications Conf. (IPCCC)

F. Wang, X. Shao, L. Gao, H. Harai, and K. Fujikawa, ``Towards variable length addressing for scalable Internet routing'', in IEEE Performance Computing and Communications Conf. (IPCCC), December 2016, p. (9 pages).

IEEE Recent Advances in Intelligent Computational Systems (RAICS)

R.R.R. Robinson and C. Thomas, ``Ranking of machine learning algorithms based on the performance in classifying DDoS attacks'', in 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), December 2015, pp. 185--190.

IEEE Region 10 Symp. (TENSYMP)

T. Wellem, Y.-K. Lai, C.-Y. Huang, and Y.-W. Chung, ``Toward hardware support for a flexible sketch-based network traffic monitoring system'', in IEEE Region 10 Symp. (TENSYMP), May 2016, pp. 7--12.

IEEE Sarnoff Symp.

M.E. Tozal, ``Enumerating single destination, policy-preferred paths in AS-level Internet topology maps'', in IEEE Sarnoff Symp., September 2016, p. (6 pages).

IEEE Security and Privacy

M. Geva, A. Herzberg, and Y. Gev, ``Bandwidth Distributed Denial of Service: Attacks and defenses'', IEEE Security and Privacy, vol. 12, no. 1, pp. 54--61, January 2014.

Y. Gilad, A. Herzberg, and H. Shulman, ``Off-path hacking: the illusion of challenge-response authentication'', IEEE Security and Privacy, vol. PP, no. 99, pp. (8 pages), October 2013.

I. Avramopoulos and M. Suchara, ``Protecting DNS from routing attacks: a comparison of two alternative anycast implementations'', IEEE Security and Privacy, vol. 7, no. 5, pp. 14--20, September 2009.

IEEE Security and Privacy Workshops

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``On evaluating IP traceback schemes: a practical perspective'', in IEEE Security and Privacy Workshops, May 2013, pp. 127--134.

IEEE Security and Privacy Workshops (SPW)

C.~Y. Tseung and K.~P. Chow, ``Forensic-Aware Anti-DDoS Device'', in 2018 IEEE Security and Privacy Workshops (SPW), January 2018, p. (12 pages).

IEEE Symp. on Collaborative Technologies and Systems (CTS)

Y. Chen and K. Hwang, ``Collaborative change detection of DDoS attacks on community and ISP networks'', in IEEE Symp. on Collaborative Technologies and Systems (CTS), May 2006, pp. 401--410.

IEEE Symp. on Computational Intelligence for Security and Defense Applications (CISDA)

E. Balkanli and A.N. Zincir-Heywood, ``Highlights on analyzing one-way traffic using different tools'', in IEEE Symp. on Computational Intelligence for Security and Defense Applications (CISDA), May 2015, pp. 1--8.

IEEE Symp. on Computers and Communications (ISCC)

A. Marzano, D. Alexander, E. Fontesca, C. Hoepers, K. Steeding-Jessen, M.~H. P.~c. Chaves, I. Cunha, and D. Guedes, ``The Evolution of Bashlite and Mirai IoT Botnets'', IEEE Symp. on Computers and Communications (ISCC), p. (6 pages), January 2018.

T. Guo, N. Wang, R. Tafazolli, and K. Moessner, ``Policy-aware virtual relay placement for inter-domain path diversity'', in IEEE Symp. on Computers and Communications (ISCC), August 2010, pp. 38--43.

IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)

J. Tomasik and M.-A. Weisser, ``aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2010, pp. 388--390.

V. Raghavan, G. Riley, and T. Jaafar, ``Realistic topology modeling for the internet BGP infrastructure'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2008, pp. 1--8.

E. Hernandez-Orallo and J. Vila-Carbo, ``Network performance analysis based on histogram workload models'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), October 2007, pp. 209--216.

IEEE Symp. on Network Cloud Computing and Applications (NCCA)

X. Vasilakos, K. Katsaros, and G. Xylomenos, ``Cloud computing for global name-resolution in information-centric networks'', in IEEE Symp. on Network Cloud Computing and Applications (NCCA), December 2012, p. (7 pages).

IEEE Symp. on Network Computing and Applications (NCA)

F. Constantinou and P. Mavrommatis, ``Identifying known and unknown peer-to-peer traffic'', in IEEE Symp. on Network Computing and Applications (NCA), July 2006, pp. 93--102.

IEEE Symp. on Performance Analysis of Systems and Software (ISPASS)

M.F. Iqbal and L.K. John, ``Power and performance analysis of network traffic prediction techniques'', in IEEE Symp. on Performance Analysis of Systems and Software (ISPASS), April 2012, pp. 112--113.

IEEE Symp. on Security and Privacy

M. Tran, M.~S. Kang, H.~C. Hsiao, W.~H. Chiang, S.~P. Tung, and Y.~S. Wang, ``On the Feasibility of Rerouting-based DDoS Defenses'', in IEEE Symp. on Security and Privacy, January 2019, p. (16 pages).

J. Smith and M. Schuchard, ``Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing'', in IEEE Symp. on Security and Privacy, July 2018, p. (19 pages).

P. Pearce, R. Ensalfi, F. Li, N. Feamster, and V. Paxson, ``Augur: Internet-wide detection of connectivity disruptions'', in IEEE Symp. on Security and Privacy, January 2017, pp. 427--443.

A. Yaar, A. Perrig, and D. Song, ``SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacks'', in IEEE Symp. on Security and Privacy, May 2004, pp. 130--143.

M. Collins and M. Reiter, ``An empirical analysis of target-resident DoS filters'', in IEEE Symp. on Security and Privacy, May 2004, p. (12 pages).

A. Yaar, A. Perrig, and D. Song, ``Pi: a path identification mechanism to defend against DDoS attacks'', in IEEE Symp. on Security and Privacy, May 2003, pp. 93--107.

IEEE Symp. on Visualization for Cyber Security (VizSec)

M. Syamkumar, R. Durairajan, and P. Barford, ``Bigfoot: A geo-based visualization methodology for detecting BGP threats'', in IEEE Symp. on Visualization for Cyber Security (VizSec), October 2016, p. (8 pages).

IEEE Symp. onReliable Distributed Systems Workshops (SRDSW)

C. Lin, C. Wu, M. Huang, Z. Wen, and Q. Cheng, ``Adaptive IP mutation: A proactive approach for defending against worm propagation'', in IEEE Symp. onReliable Distributed Systems Workshops (SRDSW), September 2016, pp. 61--66.

IEEE Systems Conf. (SysCon)

M.E. Tozal, ``Autonomous system ranking by topological characteristics: A comparative study'', in IEEE Systems Conf. (SysCon), April 2017, p. (8 pages).

M.E. Tozal, ``The Internet: A system of interconnected autonomous systems'', in IEEE Systems Conf. (SysCon), April 2016, p. (8 pages).

IEEE Systems J.

Z. Zhuang, J. Wang, Q. Qi, H. Sun, and J. Liao, ``Toward Greater Intelligence in Route Planning: A Graph-Aware Deep Learning Approach'', IEEE Systems J., p. (12 pages), January 2019.

IEEE Trans. on Parallel and Distributed Systems

H. Papadakis, P. Fragopoulou, E. Markatos, and M. Roussopoulos, ``ITA: Innocuous topology awareness for unstructured P2P networks'', IEEE Trans. on Parallel and Distributed Systems, vol. PP, no. 99, May 2012.

IEEE Trans. on Big Data

F. Iglesias and T. Zseby, ``Pattern discovery in Internet background radiation'', IEEE Trans. on Big Data, vol. PP, no. 99, pp. (14 pages), July 2017.

E. Bou-Harb, M. Husak, M. Debbabi, and C. Assi, ``Big data sanitization and cyber situational awareness: A Network Telescope perspective'', IEEE Trans. on Big Data, vol. 99, pp. (16 pages), July 2017.

IEEE Trans. on Circuits and Systems

J. Wu, J. Zhong, Z. Chen, and B. Chen, ``Optimal coupling patterns in interconnected communication networks'', IEEE Trans. on Circuits and Systems, vol. 65, no. 8, pp. 1109--1113, February 2018.

IEEE Trans. on Circuits and Systems II: Express Briefs

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``Reducing the cost of implementing error correction codes in content addressable memories'', IEEE Trans. on Circuits and Systems II: Express Briefs, vol. 60, no. 7, pp. 432--436, July 2013.

IEEE Trans. on Cloud Computing

D. Griffin, T. Phan, E. Maini, M. Rio, and P. Simoens, ``On the feasibility of using current data centre infrastructure for latency-sensitive applications'', IEEE Trans. on Cloud Computing, p. (14 pages), April 2018.

IEEE Trans. on Communications

S. Alonso, M. Perez, M. Veiga, and C. Garcia, ``Optimizing dual-mode EEE interfaces: Deep-sleep is healthy'', IEEE Trans. on Communications, vol. 65, no. 8, pp. 3374--3385, May 2017.

A. Cenedese, F. Tramarin, and S. Vitturi, ``An energy efficient ethernet strategy based on traffic prediction and shaping'', IEEE Trans. on Communications, vol. 65, no. 1, pp. 270--282, January 2017.

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``A GI/G/1 model for 10 Gb/s energy efficient ethernet links'', IEEE Trans. on Communications, vol. 60, no. 11, pp. 3386--3395, November 2012.

IEEE Trans. on Computers

K. Chen, D.R. Fhoffnes, R. Potharaju, Y. Chen, F.E. Bustamante, D. Pei, and Y. Zhao, ``Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users'', IEEE Trans. on Computers, vol. 63, no. 4, pp. 1021--1036, April 2014.

Z. Guo and Y. Yang, ``High speed multicast scheduling in hybrid optical packet switches with guaranteed latency'', IEEE Trans. on Computers, vol. 62, no. 10, pp. 1972--1987, June 2012.

IEEE Trans. on Information Forensics and Security

L. Xue, X. Ma, X. Luo, E.W.W. Chang, T.T.N. Miu, and G. Gu, ``LinkScope: Toward detecting target link flooding attacks'', IEEE Trans. on Information Forensics and Security, vol. 13, pp. (16 pages), January 2018.

H. Luo, Z. Chen, J. Li, and A.V. Vasilakos, ``Preventing distributed Denial-of-Service flooding attacks with dynamic path identifiers'', IEEE Trans. on Information Forensics and Security, vol. 12, no. 8, pp. 1801--1815, August 2017.

L. Cheng, D. Divakaran, A. Ang, W. Lim, and V. Thing, ``FACT: A framework for authentication in cloud-based IP traceback'', IEEE Trans. on Information Forensics and Security, vol. 12, no. 3, pp. 604--616, March 2017.

L. Cheng, D.M. Divakaran, W.Y. Lim, and V.L.L. Thing, ``Opportunistic piggyback marking for IP traceback'', IEEE Trans. on Information Forensics and Security, vol. 11, no. 2, pp. 273--288, February 2016.

Z. Zhan, M. Xu, and S. Xu, ``Predicting cyber attack rates with extreme values'', IEEE Trans. on Information Forensics and Security, vol. 10, no. 8, pp. 1666--1677, August 2015.

G. Yao, J. Bi, and A.V. Vasilakos, ``Passive IP Traceback: disclosing the locations of IP spoofers from path backscatter'', IEEE Trans. on Information Forensics and Security, vol. 10, pp. 471--484, January 2015.

P. Wang, X. Guan, J. Zhao, J. Tao, and T. Qin, ``A new sketch method for measuring host connection degree distribution'', IEEE Trans. on Information Forensics and Security, vol. 9, pp. 948--960, April 2014.

M.-H. Yang and M.-C. Yang, ``RIHT: A novel hybrid IP traceback scheme'', IEEE Trans. on Information Forensics and Security, vol. 7, no. 2, pp. 789--797, April 2012.

IEEE Trans. on Knowledge and Data Engineering

E.G. Tajeuna, M. Bouguessa, and S. Wang, ``Modeling and predicting community structure changes in time-evolving social networks'', IEEE Trans. on Knowledge and Data Engineering, vol. 31, no. 6, pp. 1166--1180, June 2019.

L. Luo, D. Guo, X. Zhao, J. Wu, O. Rottenstreich, and X. Luo, ``Near-accurate multiset reconciliation'', IEEE Trans. on Knowledge and Data Engineering, vol. 31, pp. (13 pages), January 2019.

IEEE Trans. on Multimedia

B. Liu, Y. Cui, Y. Lu, and Y. Xue, ``Locality-awareness in BitTorrent-like P2P applications'', IEEE Trans. on Multimedia, vol. 11, no. 3, pp. 361--371, April 2009.

IEEE Trans. on Network and Service Management

A. Alsirhani, S. Sampalli, and P. Bodorik, ``DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in Apache Spark'', IEEE Trans. on Network and Service Management, p. (14 pages), January 2019.

T. Xu, D. Gao, P. Dong, C. Foh, and H. Zhang, ``Mitigating the table-overflow attack in Software-Defined Networking'', IEEE Trans. on Network and Service Management, vol. 14, no. 4, pp. 1086--1097, December 2017.

C. Liaskos, X. Dimitropoulos, and L. Tassiulas, ``Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach'', IEEE Trans. on Network and Service Management, vol. 0, no. 0, pp. (15 pages), November 2016.

J.C. Cardona, S. Vissicchio, P. Lucente, and P. Francois, ``'I can't get no satisfaction': Helping autonomous systems identify their unsatisfied interdomain interests'', IEEE Trans. on Network and Service Management, vol. 13, no. 1, pp. 43--57, March 2016.

R. de Oliviera~Schmidt, R. Sadre, A. Sperotto, H. van~den Berg, and A. Pras, ``Impact of packet sampling on link dimensioning'', IEEE Trans. on Network and Service Management, vol. 12, no. 3, pp. 392--405, September 2015.

N. Kamiyama, ``Analyzing impact of introducing CCN on profit of ISPs'', IEEE Trans. on Network and Service Management, vol. 12, no. 2, pp. 176--187, June 2015.

L.A. Grieco, C. Barakat, and M. Marzulli, ``Spectral models for bitrate measurement from packet sampled traffic'', IEEE Trans. on Network and Service Management, vol. 8, no. 2, pp. 141--152, June 2011.

IEEE Trans. on Network Science and Engineering

X. Shao, H. Asaeda, M. Dong, and Z Ma, ``Cooperative inter-domain cache sharing for information-centric networking via a bargaining game approach'', IEEE Trans. on Network Science and Engineering, vol. 6, no. 4, pp. 698--710, September 2018.

IEEE Trans. on Parallel and Distributed Systems

T. Liu, J. Lui, D. Lin, and D. Hui, ``On the feasibility of inter-domain routing via a small broker set'', IEEE Trans. on Parallel and Distributed Systems, vol. 30, no. 2, pp. 415--427, February 2019.

Z. Zhang, Z. Guo, and Y. Yang, ``Bounded-reorder packet scheduling in optical cut-through switch'', IEEE Trans. on Parallel and Distributed Systems, vol. 26, no. 11, pp. 2927--2941, November 2015.

M. Sung and J. Xu, ``IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks'', IEEE Trans. on Parallel and Distributed Systems, vol. 14, no. 9, pp. 861--872, September 2003.

IEEE Trans. on Very Large Scale Integration (VLSI) Systems

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``A synergetic use of Bloom filters for error detection and correction'', IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 23, no. 3, pp. 584--587, March 2015.

IEEE Trans. Visualization and Computer Graphics

M. Candela, M. Bartolomeo, G. Battista, and C. Squarcella, ``Radian: Visual exploration of traceroutes'', in IEEE Trans. Visualization and Computer Graphics, July 2017.

IEEE Transactions on Industrial Informatics

Y.~B. Lin, C.~C. Huang, and S.~C. Tsai, ``A SDN Soft Computing Application for Detecting Heavy Hitters'', IEEE Transactions on Industrial Informatics, p. (9 pages), January 2019.

IEEE Transactions on Information Forensics and Security

M.~E. Ahmed, S. Ullah, and H. Kim, ``Statistical Application Fingerprinting for DDoS Attack Mitigation'', IEEE Transactions on Information Forensics and Security, vol. 14, pp. (14 pages), January 2018.

IEEE Trustcom/BigDataSE/ICESS

D. Sun, K. Yang, Z. Shi, and Y. Wang, ``A distinction method of flooding DDoS and flash crowds based on user traffic behavior'', in IEEE Trustcom/BigDataSE/ICESS, August 2017, pp. 65--72.

IEEE Trustcom/BigDataSE/ISPA

Y. Yang, X. Shi, X. Yin, and Z. Wang, ``The power of prefix hijackings in the Internet hierarchy'', in IEEE Trustcom/BigDataSE/ISPA, August 2016, pp. 228--235.

IEEE Workshop on Local and Metropolitan Area Networks (LANMAN)

R. Matias, A.M.M. Carvalho, V.A. Teodoro, D. Tes, and L.B. Araujo, ``Performance comparison of forecasting models applied to LAN/MAN traffic prediction'', in IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), October 2011, p. (6 pages).

IEEE Workshop on Monitoring, Attack Detection and Mitigation

J. Francois, R. State, and O. Festor, ``Tracking global wide configuration errors'', in IEEE Workshop on Monitoring, Attack Detection and Mitigation, September 2006.

IEEE/ACM Conf. on Advances in Social Networks Analysis and Mining (ASONAM)

J.Y. Lee and J.C. Oh, ``A model for recursive propagations of reputations in social networks'', in IEEE/ACM Conf. on Advances in Social Networks Analysis and Mining (ASONAM), August 2013, pp. 666--670.

IEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining

Y. Tanaka and A. Goto, ``Suspicious FQDN evaluation based on variations in malware download URLs'', in IEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining, January 2017, p. (7 pages).

IEEE/ACM Intl Symp. on Quality of Service (IWQoS)

C. Zhang, Y. Feng, H. Song, Y. Wan, W. Xu, Y. Wang, H. Dai, Y. Li, and B. Lin, ``OBMA: Minimizing Bitmap Data Structure with Fast and Uninterrupted Update Processing'', in IEEE/ACM Intl Symp. on Quality of Service (IWQoS), January 2018, vol. 26, p. (6 pages).

IEEE/ACM Trans. on Networking

T. Yang, H. Zhang, H. Li, J. Gong, S. Uhlig, S. Chen, L. Uden, and X. Li, ``HeavyKeeper: An accurate algorithm for finding top-k elephant flows'', IEEE/ACM Trans. on Networking, vol. 27, no. 5, pp. (14 pages), October 2019.

Y. Pi, S. Jamin, P. Danzig, and J. Shaha, ``AP-atoms: A high-accuracy data-driven client aggregation for global load balancing'', IEEE/ACM Trans. on Networking, vol. 26, no. 6, pp. 2748--2761, December 2018.

Z. Liu, H. Jin, Y.~C. Hu, and M. Bailey, ``Practical proactive DDoS-attack mitigation via endpoint-driven in-network traffic control'', IEEE/ACM Trans. on Networking, vol. 26, no. 4, pp. 1948--1961, August 2018.

N. Wu, Y. Bi, N. Michael, A. Tang, J.C. Doyle, and N. Matni, ``A Control-Theoretic Approach to In-Network Congestion Management'', IEEE/ACM Trans. on Networking, vol. 26, pp. (14 pages), January 2018.

Q. Xiao, S. Chen, Y. Zhou, M. Chen, J. Luo, T. Li, and Y. Ling, ``Cardinality estimation for elephant flows: A compact solution based on virtual register sharing'', IEEE/ACM Trans. on Networking, vol. 25, pp. (15 pages), January 2017.

D. Fay, H. Haddadi, A. Thomason, A.W. Moore, R. Mortier, A. Jamakovic, S. Uhlig, and M. Rio, ``Weighted spectral distribution for Internet topology analysis: Theory and applications'', IEEE/ACM Trans. on Networking, vol. 18, no. 1, pp. 164--176, February 2010.

IEEE/ACM Trans. on Networking (TON)

S.~C. Kao, D.~Y. Lee, T.~Y. Chen, and A.~Y. Wu, ``Dynamically updatable ternary segmented aging Bloom filter for OpenFlow-compliant low-power packet processing'', IEEE/ACM Trans. on Networking (TON), vol. 26, pp. (14 pages), January 2018.

H. Yang and S.S. Lam, ``Scalable verification of networks with packet transformers using atomic predicates'', IEEE/ACM Trans. on Networking (TON), vol. 25, no. 5, pp. 2900--2915, October 2017.

G. Vasiliadis, L. Koromilas, M. Polychronakis, and S. Ioannidis, ``Design and implementation of a stateful network packet processing framework for GPUs'', IEEE/ACM Trans. on Networking (TON), vol. 25, no. 1, pp. 610--623, February 2017.

W. Dong, Y. Gao, W. Wu, J. Bu, C. Chen, and X. Li, ``Optimal monitor assignment for preferential link tomography in communication networks'', IEEE/ACM Trans. on Networking (TON), vol. 25, no. 1, pp. 210--223, February 2017.

J.L. Sobrinho, L. Vanbever, F. Le, A. Sousa, and J. Rexford, ``Scaling the Internet routing system through distributed route aggregation'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 6, pp. 3462--3476, December 2016.

M. Zhao, W. Zhou, A.J.T. Gurney, A. Haeberlen, M. Sherr, and B.T. Loo, ``Private and verifiable interdomain routing decisions'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 2, pp. 1011--1024, April 2016.

Y. Xie, Y. Wang, H. He, Y. Xiang, S. Yu, and X. Liu, ``A general collaborative framework for modeling and perceiving distributed network behavior'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 5, pp. 3162--3176, January 2016.

T.N. Dinh and M.T. Thai, ``Network under joint node and link attacks: Vulnerability assessment methods and analysis'', IEEE/ACM Trans. on Networking (TON), vol. 23, no. 3, pp. 1001--1011, June 2015.

M. Antikainen, T. Aura, and M. Sarela, ``Denial-of-service attacks in bloom-filter-based forwarding'', IEEE/ACM Trans. on Networking (TON), vol. 22, pp. 1463--1476, October 2014.

F. Khan, N. Hosein, S. Ghiasi, C. Chuah, and P. Sharma, ``Streaming solutions for fine-grained network traffic measurements and analysis'', in IEEE/ACM Trans. on Networking (TON), April 2014, vol. 22 (2), pp. 377--390.

M. Lee, N. Duffield, and R.R. Kompella, ``High-fidelity per-flow delay measurements with reference latency interpolation'', IEEE/ACM Trans. on Networking (TON), vol. 21, no. 5, pp. 1567--1580, October 2013.

V.M. Preciado and A. Jadbabaie, ``Moment-based spectral analysis of large-scale networks using local structural information'', IEEE/ACM Trans. on Networking (TON), vol. 21, no. 2, pp. 373--382, April 2013.

J.L. Sobrinho and T. Tiago~Quelhas, ``A theory for the connectivity discovered by routing protocols'', IEEE/ACM Trans. on Networking (TON), vol. 20, no. 3, pp. 677--689, June 2012.

M. Lee, N. Duffield, and R.R. Kompella, ``Opportunistic flow-level latency estimation using consistent NetFlow'', IEEE/ACM Trans. on Networking (TON), vol. 20, no. 1, pp. 139--152, February 2012.

Z.M. Fadlullah, T. Taleb, A.V. Vasilakos, M. Guizani, and N. Kato, ``DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis'', IEEE/ACM Trans. on Networking (TON), vol. 18, no. 4, pp. 1234--1247, August 2010.

K.V. Vishwanath and A. Vahdat, ``Swing: Realistic and responsive network traffic generation'', IEEE/ACM Trans. on Networking (TON), vol. 17, no. 3, pp. 712--725, June 2009.

G. Terdik and T. Gyires, ``Levy flights and fractal modeling of internet traffic'', IEEE/ACM Trans. on Networking (TON), vol. 17, no. 1, pp. 120--129, February 2009.

M. Sung, J. Xu, J. Li, and L. Li, ``Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation'', IEEE/ACM Trans. on Networking (TON), vol. 16, no. 6, pp. 1253--1266, December 2008.

C. Estan, G. Varghese, and M. Fisk, ``Bitmap algorithms for counting active flows on high speed links'', IEEE/ACM Trans. on Networking (TON), vol. 14, no. 5, pp. 925--937, October 2006.

IEEE/ACM Transactions on Networking

R.~B. Basat, X. Chen, G. Einziger, R. Friedman, and Y. Kassner, ``Randomized Admission Policy for Efficient Top-k, Frequency, and Volume Estimation'', IEEE/ACM Transactions on Networking, p. (14 pages), January 2019.

H. Dai, M. Shahzad, A.~X. Liu, M. Li, Y. Zhong, and G. Chen, ``Identifying and Estimating Persistent Items in Data Streams'', IEEE/ACM Transactions on Networking, vol. 26, pp. (14 pages), January 2018.

IEEE/ACM Transactions on Networking (TON)

J. Lu, T. Yang, Y. Wang, H. Dai, X. Chen, L. Jin, H. Song, and B. Liu, ``Low Computational Cost Bloom Filters'', IEEE/ACM Transactions on Networking (TON), vol. 26, pp. (14 pages), January 2018.

IEEE/IFIP Conf. on Dependable Systems and Networks (DSN)

V. Kambhampati, C. Papadopolous, and D. Massey, ``Epiphany: A location hiding architecture for protecting critical services from DDoS attacks'', in IEEE/IFIP Conf. on Dependable Systems and Networks (DSN), June 2012, p. (12 pages).

IEEE/IFIP Intl Workshop on Analytics for Network and Service Management (AnNet)

T. Shapira and Y. Shavitt, ``Unveiling the type of relationship between Autonomous Systems using deep learning'', in IEEE/IFIP Intl Workshop on Analytics for Network and Service Management (AnNet), April 2020.

IEEE/IFIP Network Operations and Management Symp. (NOMS)

C. Guo and M. Karsten, ``On the feasibility of core-rooted path addressing'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 306--314.

K. Giotis, M. Apostolaki, and V. Maglaris, ``A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 495--501.

B.L. Dalmazo, J.P. Vilela, P. Simoes, and M. Curado, ``Expedite feature extraction for enhanced cloud anomaly detection'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 1215--1220.

A. Aleroud and I. Alsmadi, ``Identifying DoS attacks on software defined networks: A relation context approach'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 853--857.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Autonomous system based flow marking scheme for IP-Traceback'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 121--128.

R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, F. De~Turck, and S. Latre, ``Design and evaluation of learning algorithms for dynamic resource management in virtual networks'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), May 2014, p. (9 pages).

IEICE technical report: Circuits and system

M. Okuno and H. Nishi, ``Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler'', IEICE technical report: Circuits and system, vol. 103, no. 716, pp. 61--66, March 2004.

IEICE Trans. on Communications

T.H. Kim, D.S. Kim, and H.Y. Jung, ``Defending against DDoS attacks under IP spoofing using image processing approach'', IEICE Trans. on Communications, vol. E99-B, no. 7, pp. 1511--1522, July 2016.

Y. Wang, J. Bi, and J. Wu, ``Revisiting the rich club of the Internet AS-level topology'', IEICE Trans. on Communications, vol. E96-B, no. 3, pp. 900--904, January 2013.

S. Kim and S.Y. Nam, ``A long range dependent Internet traffic model using unbounded Johnson distribution'', IEICE Trans. on Communications, vol. E96-B, no. 1, pp. 301--304, January 2013.

J. Kim, M. Park, S. Han, and J. Kim, ``An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup'', IEICE Trans. on Communications, vol. E95-B, no. 10, pp. 3298--3301, October 2012.

IEICE Trans. on Electronics

M. Okuno, S. Nishimura, S. Ishida, and H. Nishi, ``Cache-based network processor architecture: evaluation with real network traffic'', IEICE Trans. on Electronics, vol. E89-C, no. 11, pp. 1620--1628, November 2006.

M. Okuno, S. Ishida, and H. Nishi, ``Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera'', IEICE Trans. on Electronics, vol. E88-C, no. 4, pp. 536--543, April 2005.

IEICE Trans. on Information and Systems

K. Matsuda, G. Hasegawa, S. Kamei, and M. Murata, ``A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurement'', IEICE Trans. on Information and Systems, vol. E96-D, no. 2, pp. 289--302, February 2013.

IET Communications

R.G. Clegg, M.S. Withall, A.W. Moore, I.W. Phillips, D.J. Parish, M. Rio, R. Landa, H. Haddadi, K. Kyriakopoulos, J. Auge, R. Clayton, and D. Salmon, ``Challenges in the capture and dissemination of measurements from high-speed networks'', IET Communications, vol. 3, no. 6, pp. 957--966, June 2009.

S. Zhou and G.-Q. Zhang, ``Chinese Internet AS-level topology'', IET Communications, vol. 1, no. 2, pp. 209--214, April 2007.

IET Electronics Lett.

Y. Lai, T. Wellem, and H.-P. You, ``Hardware-assisted estimation of entropy norm for high-speed network traffic'', IET Electronics Lett., vol. 50, no. 24, pp. 1845--1847, November 2014.

IET Information Security

E. Yuce and A.A. Selcuk, ``Server notaries: A complementary approach to the Web PKI trust model'', IET Information Security, vol. 12, no. 5, pp. 455--461, August 2018.

K. Johnson and T. De, ``Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation'', IET Information Security, p. (14 pages), January 2018.

IET Networks

V. Murugesan, M. Shalini, and M.H. Yang, ``Design and analysis of hybrid single packet IP traceback scheme'', IET Networks, vol. 7, no. 3, pp. 141--151, May 2018.

IET Signals and Systems Conf. (ISSC)

P. Reviriego, A. Sanchez-Macian, J.A. Maestro, and C.J. Bleakley, ``Increasing the MTU size for energy efficiency in ethernet'', in IET Signals and Systems Conf. (ISSC), June 2010, pp. 124--128.

IETE Journal of Research

R.~C. Baishya and D.~K. Bhattacharyya, ``A Complete Detection and Mitigation Framework to Protect a Network from DDoS Attacks'', IETE Journal of Research, p. (19 pages), January 2019.

IFIP Annual Conf. on Data and Applications Security and Privacy

A. Boukhtouta, M. Pourzandi, R. Brunner, and S. Dault, ``Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology'', in IFIP Annual Conf. on Data and Applications Security and Privacy, January 2018, p. (18 pages).

IFIP Conf. on Autonomous Infrastructure, Management and Security (AIMS)

R. Mijumbi, J.-L. Gorricho, and J. Serrat, ``Contributions to efficient resource management in virtual networks'', in IFIP Conf. on Autonomous Infrastructure, Management and Security (AIMS), June 2014, p. (5 pages).

IFIP Conf. on Data and Applications Security and Privacy

N. Mosharraf, A. Jayasumana, and I. Ray, ``A distributed mechanism to protect against DDoS attacks'', in IFIP Conf. on Data and Applications Security and Privacy, June 2017, vol. 10359 of Lecture Notes in Computer Science (LNCS), pp. 529--540.

IFIP Networking

B. Turkovic, J. Oostenbrink, F.A. Kuipers, I. Keslassy, and A. Orda, ``Sequential zeroing: Online heavy-hitter detection on programmable hardware'', in IFIP Networking, June 2020.

IFIP Networking Conf.

P. Bangera and S. Gorinsky, ``Ads versus regular contents: Dissecting the web hosting ecosystem'', in IFIP Networking Conf., June 2017, p. (9 pages).

K. Katsaros, X. Vasilakos, T. Okwii, G. Xylomenos, G. Pavlou, and G. Polyzos, ``On the inter-domain scalability of route-by-name information-centric network architectures'', in IFIP Networking Conf., July 2015, p. (9 pages).

U. Ayesta, L. Bertaux, and D. Carvin, ``Non-intrusive scheduling of TCP flows'', in IFIP Networking Conf., May 2015, p. (9 pages).

R. Schmidt, R. Sadre, N. Melnikov, J. Schonwalder, and A. Pras, ``Linking network usage patterns to traffic Gaussianity fit'', in IFIP Networking Conf., June 2014, p. (9 pages).

P. Bangera and G. Gorinsky, ``Economics of traffic attraction by transit providers'', in IFIP Networking Conf., June 2014, p. (9 pages).

R. Schmidt, R. Sadre, and A. Pras, ``Gaussian traffic revisited'', in IFIP Networking Conf., May 2013.

D. Saucez, B. Donnet, and O. Bonaventure, ``On the impact of clustering on measurement reduction'', in IFIP Networking Conf. May 2009, vol. 5550 of Lecture Notes in Computer Science (LNCS), pp. 835--846, Springer.

Y. Hu, D.-M. Chiu, and J. Lui, ``Entropy based flow aggregation'', in IFIP Networking Conf., April 2006, vol. 3976 of Lecture Notes in Computer Science (LNCS), pp. 1204--1209.

P. Chhabra, A. John, and H. Saran, ``PISA: Automatic extraction of traffic signatures'', in IFIP Networking Conf. May 2005, vol. 3462 of Lecture Notes in Computer Science (LNCS), pp. 730--742, Springer.

IFIP Networking Conf. (IFIP Networking) and Workshops

T. Braud, M. Heusse, and A. Duda, ``The virtue of gentleness: Improving connection response times with SYN priority active queue Management'', in IFIP Networking Conf. (IFIP Networking) and Workshops, January 2018, p. (9 pages).

IFIP Networking Conf. (NETWORKING)

V. Kirilin and S. Gorinsky, ``A protocol-ignorance perspective on incremental deployability of routing protocols'', in IFIP Networking Conf. (NETWORKING), May 2018, p. (9 pages).

IFIP Networking Conference (IFIP Networking) and Workshops

M. Syamkumar, S.~K. Mani, R. Durairajan, P. Barford, and J. Sommers, ``Wrinkles in Time: Detecting Internet-wide Events via NTP'', in 2018 IFIP Networking Conference (IFIP Networking) and Workshops, January 2018, p. (9 pages).

IFIP TC 6 Networking Conf.

M.E. Tozal and K. Sarac, ``Estimating network layer subnet characteristics via statistical sampling'', in IFIP TC 6 Networking Conf., May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 274--288.

IFIP-TC6 Networking Conf. (NETWORKING)

K. Xu, Z. Duan, Z.-L. Zhang, and J. Chandrashekar, ``On properties of Internet Exchange Points and their impact on AS topology and relationship'', in IFIP-TC6 Networking Conf. (NETWORKING), April 2004, vol. 3042 of Lecture Notes in Computer Science (LNCS), pp. 284--295.

IFIP/IEEE Symp. on Integrated Network and Service Management (IM)

A. Lazaris and V.~K. Prasanna, ``An LSTM Framework For Modeling Network Traffic'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), May 2019, p. (6 pages).

J. Bakker, B. Ng, W.K.~G. Seah, and A. Pekar, ``Traffic Classification with Machine Learning in a Live Network'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), May 2019, p. (6 pages).

M. Zhang, L. Shi, D. Sisodia, J. Li, and P. Reiher, ``On multi-point, in-network filtering of Distributed Denial-of-Service traffic'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), January 2019, p. (9 pages).

A.~C. Lapolli, J.~A. Marques, and L.~P. Gaspary, ``Offloading Real-time DDoS Attack Detection to Programmable Data Planes'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), January 2019, p. (9 pages).

IFIP/IEEE Symp. on Integrated Network Management (IM)

A. Chen, E.W.W. Chan, X. Luo, W.W.T. Fok, and R.K.C. Chang, ``An efficient approach to multi-level route analytics'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2013, pp. 101--108.

O. Akashi, ``Analysis of cooperative management strategies against route-hijacking'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2011, pp. 1164--1171.

L. Cittadini, M. Rimondini, M. Corea, and G. Di~Battista, ``On the feasibility of static analysis for BGP convergence'', in IFIP/IEEE Symp. on Integrated Network Management (IM), August 2009, pp. 521--528.

Image Processing and Communications Challenges 4

T. Andrysiak, L. Saganowski, and M. Choras, ``DDoS attacks detection by means of greedy algorithms'', in Image Processing and Communications Challenges 4, R.S. Choras, Ed., January 2013, vol. 184 of Advances in Intelligent Systems and Computing, pp. 303--310.

Imperial College, London, UK

R. Clegg, ``Modelling internet traffic using Markov chains'' January 2006.

Indian J. Science and Technology

M. Rao and M. Naidu, ``A model for generating synthetic network flows and accuracy index for evaluation of anomaly network Intrusion Detection Systems'', Indian J. Science and Technology, vol. 10, no. 14, pp. (16 pages), April 2017.

Indraprastha Inst. of Information Technology Delhi (IIITD)

D. Gosain, A. Agarwal, H.B. Acharya, and S. Chakravarty, ``Qi points: placing decoy routers in the internet'', Tech. rep., Indraprastha Inst. of Information Technology Delhi (IIITD), September 2016.

Information

W.J.A. Silva, ``An architecture to manage incoming traffic of inter-domain routing using OpenFlow networks'', Information, vol. 9, no. 4, pp. (23 pages), April 2018.

Information and Communications Technology

H. Hu, W. Liu, G. Fei, S. Yang, and G. Hu, ``A Novel Method for Router-to-AS Mapping Based on Graph Community Discovery'', Information and Communications Technology, p. (15 pages), January 2018.

Information Fusion for Cyber-Security Analytics, Ch. 5

J. Namayanja and V. Janeja, ``Characterization of evolving networks for cybersecurity'', in Information Fusion for Cyber-Security Analytics, Ch. 5, October 2016, vol. 691 of Studies in Computational Intelligence, pp. 111--127.

Information Sciences

X. Ma, J. Li, Y. Tang, B. An, and X. Guan, ``Protecting internet infrastructure against link flooding attacks: A techno-economic perspective'', Information Sciences, vol. 479, pp. 486--502, April 2018.

K. Singh, S.C. Guntuku, A. Thakur, and C. Hota, ``Big data analytics framework for peer-to-peer botnet detection using random forests'', Information Sciences, vol. 278, pp. 488--497, March 2014.

R. Schlegel and D.S. Wong, ``Anonymous overlay network supporting authenticated routing'', Information Sciences, vol. 210, pp. 99--117, May 2012.

Information Sciences and Systems , Proc Symp. on Computer and Information Sciences

E. Karaarslan, A.G. Perez, and C. Siaterlis, ``Recreating a large-scale BGP incident in a realistic environment'', in Information Sciences and Systems 2013, Proc Symp. on Computer and Information Sciences, October 2013, vol. 264 of Lecture Notes in Electrical Engineering, pp. 349--357.

Information Sciences and Technologies Bulletin of the ACM Slovakia

M. Zadnik, ``Optimization of network flow monitoring'', Information Sciences and Technologies Bulletin of the ACM Slovakia, vol. 5, no. 1, pp. (6 pages), May 2013.

Information Security Practice and Experience (ISPE)

F. Haddadi, D. Le~Cong, L. Porter, and A. Zincir-Heywood, ``On the effectiveness of different botnet detection approaches'', in Information Security Practice and Experience (ISPE), May 2015, vol. 9065 of Lecture Notes in Computer Science, pp. 121--135.

Innovations and Interdisciplinary Solutions for Underserved Areas (InterSol)

A. Gueye and B. Mbaye, ``On the prevalence of boomerang routing in Africa: Analysis and potential solutions'', in Innovations and Interdisciplinary Solutions for Underserved Areas (InterSol), March 2018, pp. 3--12.

Inria-French Inst. for Research in Computer Science

L. Liquori and M. Sereno, ``LogNet: Extending Internet with a network aware discovery service'', Tech. rep., Inria-French Inst. for Research in Computer Science, September 2016.

Int. Conf. on Dependable Systems and Networks (DSN)

S. Torabi, E. Bou-Harb, C. Assi, M. Galluscio, A. Boukhtouta, and M. Debbabi, ``Inferring, characterizing, and investigating Internet-scale malicious IoT device activities: A Network Telescope perspective'', in Int. Conf. on Dependable Systems and Networks (DSN), June 2018, p. (13 pages).

Int. Symp. on Network Computing and Applications (NCA)

A. Jackson, W. Milliken, C. Santivanez, M. Condell, and T. Strayer, ``A topological analysis of monitor placement'', in Int. Symp. on Network Computing and Applications (NCA), July 2007, p. (11 pages).

Intelligent Data Analysis

W. Eberle and L. Holder, ``Scalable anomaly detection in graphs'', Intelligent Data Analysis, vol. 19, no. 1, pp. 57--74, January 2015.

International Computer Science and Applications Conference (ICSAC )

J. Cao, X. Yang, and Y. Wang, ``A Hybrid Privacy Preserving against Multi-attacks for Network Data Publication'', in International Computer Science and Applications Conference (ICSAC 2019), January 2019, p. (5 pages).

International Conference on Artificial Intelligence and Security

W. Guo, X. Tang, J. Cheng, J. Xu, C. Cai, and Y. Guo, ``DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory'', in International Conference on Artificial Intelligence and Security, January 2019, p. (11 pages).

International Conference on Cloud Computing and Security

H. Hu, X. Zhai, M. Wang, and G. Hu, ``Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs)'', in International Conference on Cloud Computing and Security, January 2018, p. (11 pages).

International Conference on Computational Science and Its Applications

M. D'Emidio and D. Frigioni, ``Distributed Shortest Paths on Power Law Networks in the Generalized Linear Preference Model: An Experimental Study'', in International Conference on Computational Science and Its Applications, January 2019, p. (9 pages).

International Conference on Computing, Networking and Communications (ICNC)

X. Liang and T. Znati, ``An empirical study of intelligent approaches to DDoS detection in large scale networks'', in 2019 International Conference on Computing, Networking and Communications (ICNC), January 2019, p. (7 pages).

A. Dwaraki, R. Freedman, S. Zilberstein, and T. Wolf, ``Using Natural Language Constructs and Concepts to Aid Network Management'', in 2019 International Conference on Computing, Networking and Communications (ICNC), January 2019.

International Conference on Network Protocols

Q. Xu, X. Zhang, J. Zhao, X. Wang, and T. Wolf, ``Fast shortest-path queries on large-scale graphs'', in International Conference on Network Protocols, November 2016, vol. 24, p. (10 pages).

International Conference on Passive and Active Network Measurement

E. Rye and R. Beverly, ``Discovering the IPv6 Network Periphery'', in International Conference on Passive and Active Network Measurement, March 2020, vol. 12048 of Lecture Notes in Computer Science, p. (15 pages).

International Journal of Communication Systems

J. Xue, J. Wang, S. Liu, X. Ma, and H. Wang, ``Dissecting persistent instability of web service: A joint perspective of server schedule dynamics and path latency'', International Journal of Communication Systems, p. (11 pages), January 2018.

G.~S. Chhabra, V. Singh, and M. Singh, ``Hadoop-based analytic framework for cyber forensics'', International Journal of Communication Systems, vol. 31, pp. (17 pages), January 2018.

International Journal of Information Security

M. Aamir and S.~M.~A. Zaidi, ``DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation'', International Journal of Information Security, p. (25 pages), January 2019.

International Journal of Information Security ()

D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Mori, and S. Goto, ``DomainProfiler: toward accurate and early discovery of domain names abused in future'', International Journal of Information Security (2018), p. (20 pages), January 2018.

International Journal of Pure and Applied Mathematics

M. Chinnusamy and N. Raju, ``Effective Method to Detect Distributed Denial of Service Attacks'', International Journal of Pure and Applied Mathematics, vol. 119, pp. (7 pages), January 2018.

International Journal on Future Revolution in Computer Science and Communication Engineering

S. Malliga, C.~S. Kanimozhiselvi, and S.~V. Kogilavani, ``A Logarithmic and Exponentiation Based IP Traceback Scheme with Zero Logging and Storage Overhead'', International Journal on Future Revolution in Computer Science and Communication Engineering, vol. 4, pp. (8 pages)", January 2018.

Internet Engineering Task Force (IETF)

K. Moriarty and A. Morton, ``Effects of Pervasive Encryption on Operators'', Tech. rep., Internet Engineering Task Force (IETF), January 2018.

Internet Mathematics

J.I. Alvarez-Hamelin, M.G. Beiro, and J.R. Busch, ``Understanding edge connectivity in the Internet through core decomposition'', Internet Mathematics, vol. 7, no. 1, pp. 45--66, March 2011.

Internet Measurement Conf. (IMC)

F. Streibelt, F. Lichtblau, R. Beverly, A.~F. Max, C. Pelsser, G. Smaragdakis, and R. Bush, ``BGP communities: Even more worms in the routing can'', in Internet Measurement Conf. (IMC), October 2018, pp. 279--292.

K. Nomikos, G. Nomikos, V. Kotronis, P. Sermpezise, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos, and V. Giotsas, ``O peer, where art thou?: Uncovering remote peering interconnections at IXPs'', in Internet Measurement Conf. (IMC), October 2018, pp. 265--278.

A. Mani, T. Wilson-Brown, R. Jansen, A. Johnson, and M. Sherr, ``Understanding Tor Usage with Privacy-Preserving Measurement'', in Internet Measurement Conf. (IMC), January 2018, p. (13 pages).

K. Fukuda and J. Heidemann, ``Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning'', in Internet Measurement Conf. (IMC), January 2018, p. (7 pages).

R. Beverly, R. Duraiajan, D. Plonka, and J.~P. Roherer, ``In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery'', in Internet Measurement Conf. (IMC), January 2018, p. (14 pages).

Y. Vanaubel, P. Merindol, J. Pansiot, and B. Donnet, ``Through the wormhole: Tracking invisible MPLS tunnels'', in Internet Measurement Conf. (IMC), November 2017, pp. 29--42.

J. Rula, F. Bustamente, and M. Steiner, ``Cell spotting: Studying the role of cellular networks in the Internet'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).

A. Murdock, F. Li, P. Bramsen, Z. Durumeric, and V. Paxson, ``Target generation for Internet-wide IPv6 scanning'', in Internet Measurement Conf. (IMC), November 2017, p. (12 pages).

F. Lichtblau, F. Streibeld, T. Kruger, P. Richter, and A. Feldmann, ``Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).

B. Goodchild, Y. Chiu, R. Hansen, H. Lu, M. Calder, M. Luckie, W. Lloyd, D. Choffnes, and E. Katz-Bassett, ``The record route option is an option!'', in Internet Measurement Conf. (IMC), November 2017, pp. 311--317.

V. Giotsas, G. Smaragdakis, C. Dietzel, P. Richter, A. Feldmann, and A. Berger, ``Inferring BGP blackholing activity in the Internet'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).

P. Richter, G. Smaragdakis, D. Plonka, and A. Berger, ``Beyond counting: New perspectives on the active IPv4 address space'', in Internet Measurement Conf. (IMC), November 2016, pp. 135--149.

A. Marder and J.M. Smith, ``MAP-IT: Multipass accurate passive inferences from traceroute'', in Internet Measurement Conf. (IMC), November 2016, pp. 397--411.

T. Krenc and A. Feldmann, ``BGP prefix delegations: A deep dive'', in Internet Measurement Conf. (IMC), November 2016, pp. 469--475.

J. Klick, S. Lau, M. Wahlisch, and V. Roth, ``Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selection'', in Internet Measurement Conf. (IMC), November 2016, pp. 421--427.

M. Jonker, A. Sperotto, R. van Rijswijk-Deij, R. Sadre, and A. Pras, ``Measuring the adoption of DDoS protection services'', in Internet Measurement Conf. (IMC), November 2016, pp. 279--285.

G. Comarela, E. Terzi, and M. Crovella, ``Detecting unusually-routed ASes: Methods and applications'', in Internet Measurement Conf. (IMC), November 2016, pp. 445--459.

T. Chung, D. Choffnes, and A. Mislove, ``Tunneling for transparency: A large-scale analysis of end-to-end violations in the Internet'', in Internet Measurement Conf. (IMC), November 2016, pp. 199--213.

T. Chung, Y. Liu, D. Choffnes, D. Levin, B.M. Maggs, A. Mislove, and C. Wilson, ``Measuring and applying invalid SSL certificates: The silent majority'', in Internet Measurement Conf. (IMC), November 2016, pp. 527--541.

R. Beverly, ``Yarrp'ing the Internet: Randomized high-speed active topology discovery'', in Internet Measurement Conf. (IMC), November 2016, pp. 413--420.

Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``MPLS under the microscope: Revealing actual transit path diversity'', in Internet Measurement Conf. (IMC), October 2015, pp. 49--62.

Y.-C. Chiu, B. Schlinker, A.B. Radhakrishnan, E. Katz-Bassett, and R. Govindan, ``Are we one hop away from a better Internet?'', in Internet Measurement Conf. (IMC), October 2015, pp. 523--529.

R. Anwar, H. Niaz, D. Choffnes, I. Cunha, P. Gill, and E. Katz-Bassett, ``Investigating interdomain routing policies in the wild'', in Internet Measurement Conf. (IMC), October 2015, pp. 71--77.

H. Wang, K.S. Lee, E. Li, C.L. Lum, A. Tang, and K. Weatherspoon, ``Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networks'', in Internet Measurement Conf. (IMC), November 2014, p. (14 pages).

R. Durairajan, J. Sommers, and P. Barford, ``Layer 1-informed Internet topology measurement'', in Internet Measurement Conf. (IMC), November 2014, p. (14 pages).

M. Zhao, P. Aditya, A. Chen, Y. Lin, A. Haeberlen, P. Druschel, B. Maggs, B. Wishon, and M. Ponec, ``Peer-assisted content distribution in Akamai NetSession'', in Internet Measurement Conf. (IMC), October 2013, pp. 31--42.

Y. Vanaubel, J.-J. Pansiot, P. Merindol, and B. Donnet, ``Network fingerprinting: TTL-based router signatures'', in Internet Measurement Conf. (IMC), October 2013, pp. 369--376.

L. Ma, T. He, K.K. Leung, A. Swami, and D. Towsley, ``Identifiability of link metrics based on end-to-end path measurements'', in Internet Measurement Conf. (IMC), October 2013, pp. 391--404.

A. Khan, T. Kwon, H. Kim, and Y. Choi, ``AS-level topology collection through looking glass servers'', in Internet Measurement Conf. (IMC), October 2013, pp. 245--242.

P.M. Santiago~del Rio, D. Rossi, F. Gringoli, L. Nava, L. Salgarelli, and J. Aracil, ``Wire-speed statistical classification of network traffic on commodity hardware'', in Internet Measurement Conf. (IMC), November 2012, pp. 65--72.

J. Sommers, B. Erikson, and P. Barford, ``On the prevalence and characteristics of MPLS deployments in the open Internet'', in Internet Measurement Conf. (IMC), November 2011, pp. 445--458.

A.H. Rasti, N. Magharei, R. Rejaie, and W. Willinger, ``Eyeball ASes: from geography to connectivity'', in Internet Measurement Conf. (IMC), November 2010, pp. 192--198.

X. Fan and J. Heidemann, ``Selecting representative IP addresses for internet topology studies'', in Internet Measurement Conf. (IMC), November 2010, pp. 411--423.

R. Beverly, A. Berger, and G.G. Xie, ``Primitives for active internet topology mapping: toward high-frequency characterization'', in Internet Measurement Conf. (IMC), November 2010, pp. 165--171.

P. Merindol, V. Van~den Schrieck, B. Donnet, O. Bonaventure, and J.-J. Pansiot, ``Quantifying ASes multiconnectivity using multicast information'', in Internet Measurement Conf. (IMC), November 2009, pp. 370--376.

B. Augustin, B. Krishnamurthy, and W. Willinger, ``IXP's: mapped?'', in Internet Measurement Conf. (IMC), November 2009, pp. 336--349.

S. Wei and J. Mirkovic, ``Correcting congestion-based error in network telescope's observations of worm dynamics'', in Internet Measurement Conf. (IMC), January 2008, pp. 125--130.

F. Raspall and S. Sallent, ``Adaptive shared-state sampling'', in Internet Measurement Conf. (IMC), January 2008, pp. 271--284.

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network monitoring using traffic dispersion graphs (TDGs)'', in Internet Measurement Conf. (IMC), January 2007, pp. 315--320.

A. Kumar, V. Paxson, and N. Weaver, ``Exploiting underlying structure for detailed reconstruction of an internet-scale event'', in Internet Measurement Conf. (IMC), October 2005, pp. 33--33.

R. Kompella and C. Estan, ``The power of slicing in internet flow measurement'', in Internet Measurement Conf. (IMC), October 2005, pp. 9--9.

D. Veitch, S. Babu, and A. Pasztor, ``Robust synchronization of software clocks across the Internet'', in Internet Measurement Conf. (IMC), October 2004, pp. 219--232.

L. Tang and M. Crovella, ``Virtual landmarks for the internet'', in Internet Measurement Conf. (IMC), October 2003, pp. 143--152.

C. Estan, G. Varghese, and M. Fisk, ``Bitmap algorithms for counting active flows on high speed links'', in Internet Measurement Conf. (IMC), October 2003, p. (14 pages).

Internet Measurement Conference (IMC)

R. Singh, A. Dunna, and P. Gill, ``Characterizing the deployment and performance of multi-CDNs'', in Internet Measurement Conference (IMC), October 2018, p. (7 pages).

Internet Research

R. Puzis, D. Yagil, Y. Elovici, and D. Braha, ``Collaborative attack on internet users' anonymity'', Internet Research, vol. 19, no. 1, pp. 60--77, January 2009.

Intl Association for Computer Information Systems

K.~S. Hartzel and W.~E. Spangler, ``Managing IT Implementation Risk: A Model from High Reliability Organizations'', in Intl Association for Computer Information Systems, January 2018, vol. 58, p. (60 pages).

Intl Conf on Software, Telecommunications and Computer Networks (SoftCOM)

P. Fondo-Ferreiro, M. Rodriguez-Perez, and M. Fernandez-Veiga, ``QoS-aware energye efficient algorithms for ethernet link aggregates in Software-Defined Networks'', in Intl Conf on Software, Telecommunications and Computer Networks (SoftCOM), January 2018, p. (5 pages).

Intl Conf. for High Performance Computing, Networking, Storage and Analysis

Q. Xiang, J.J. Zhang, X.T. Wang, Y.J. Liu, C. Guok, F. Le, J. MacAuley, H. Newman, and Y.R. Yang, ``Fine-grained, multi-domain network resource abstraction as a fundamental primitive to enable high-performance, collaborative data sciences'', in Intl Conf. for High Performance Computing, Networking, Storage and Analysis, November 2018, p. (13 pages).

Intl Conf. on Advanced Networks and Telecommunications Systems

A. Chatterjee, A. Chakraborty, S. Pal, A. Mukherjee, and M. Naskar, ``Non-autonomous dynamic network model involving growth and decay'', in Intl Conf. on Advanced Networks and Telecommunications Systems, November 2016, p. (6 pages).

Intl Conf. On Advances In Computing, Control And Networking

P. Velarde-Alvarado, R. Martinez-Pelaez, L. Mena-Camare, A. Ochoa-Brust, and A. Iriarte-Solis, ``Design of a Traffic Generation Platform for Offline Evaluation of NIDS'', in Intl Conf. On Advances In Computing, Control And Networking, January 2018, vol. 8, p. (6 pages).

Intl Conf. on Applied and Theoretical Computing and Communication Technology (iCATccT)

G. Kaur, S. Behal, and K. Shifali, ``An information divergence based approach to detect flooding DDoS attacks and Flash Crowds'', in Intl Conf. on Applied and Theoretical Computing and Communication Technology (iCATccT), January 2017, vol. 3, p. (8 pages).

Intl Conf. on Availability, Reliability and Security

M.S. Pour, A. Mangino, K. Friday, M. Rathbun, E. Bou-Harb, F. Iqbal, K. Shaban, and A. Erradi, ``Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild'', in Intl Conf. on Availability, Reliability and Security, August 2019, pp. 1--10.

M. Husak, N. Neshenko, E. Bou-Harb, and P. Celeda, ``Assessing Internet-wide Cyber Situational Awareness of Critical Sectors'', in Intl Conf. on Availability, Reliability and Security, January 2018, vol. 13, p. (6 pages.

Intl Conf. on Cloud Computing and Security

R. Zhang, J. Cheng, X. Tang, Q. Liu, and X. He, ``DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm'', in Intl Conf. on Cloud Computing and Security, January 2018, p. (17 pages).

Z. Wang, C. Zhou, Y. Yu, S. Xingang, X. Yin, and J. Yao, ``Fast detection of heavy hitters in Software Defined Networking using an adaptive and learning method'', in Intl Conf. on Cloud Computing and Security, January 2018, p. (12 pages).

Intl Conf. on Communication Systems and Networks (COMSNETS)

A. Kumari, J. Chandra, and A. Sairam, ``Optimizing flow setup time in software defined network'', in Intl Conf. on Communication Systems and Networks (COMSNETS), January 2018, p. (3 pages).

Intl Conf. on Communications (ICC)

P.K. Dey, M.A. Canbaz, M. Yuksel, and M.H. Gunes, ``On correlating ISP topologies to their businesses'', in Intl Conf. on Communications (ICC), July 2018, p. (7 pages).

P. Amaral, L. Bernardo, and P.F. Pinto, ``Multipath policy routing for the inter-domain scenario'', in Intl Conf. on Communications (ICC), June 2014, pp. 2215--3221.

Intl Conf. on Computational Science

Y. Sun, L. Yin, Z. Wang, Y. Guo, and B. Fang, ``Identifying the propagation sources of stealth worms'', in Intl Conf. on Computational Science, June 2018, vol. 10862 of Lecture Notes in Computer Science (LNCS), pp. 811--817.

Intl Conf. on Computer and Communications (ICCC)

H. Qiu, H. Zhu, Y. Li, and Z. Zeng, ``FD-SP: A Method for Predicting Cascading Failures of Inter-domain Routing System'', in Intl Conf. on Computer and Communications (ICCC), January 2018, vol. 4, p. (6 pages).

Intl Conf. on Computer and Information Technology

Q. Xia, T. Chen, and W. Xu, ``CIDS: Adapting legacy Intrusion Detection Systems to the cloud with hybrid sampling'', in Intl Conf. on Computer and Information Technology, December 2016, pp. 508--515.

Intl Conf. on Computer Science and Artificial Intelligence

W. Mao, Z. Shen, and X. Huang, ``Facilitating network functions virtualization by exploring locality in network traffic: A proposal'', in Intl Conf. on Computer Science and Artificial Intelligence, January 2018, p. (5 pages).

Intl Conf. on Computer Science and Technology (CST)

L.F. Ren, Z. Wang, X. Liu, Q. Li, and Z. Chen, ``The design and implementation of a covering MDN-complete-life-cycle malicious domain detection framework'', in Intl Conf. on Computer Science and Technology (CST), May 2017, p. (15 pages).

Intl Conf. on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)

L. Basheir, ``Power-law degree distribution consistency in the AS-level Internet topology'', in Intl Conf. on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), November 2018, p. (5 pages).

Intl Conf. on Computing and Communication Systems

N. Hoque and D. Bhattacharyya, ``HLR_DDoS: A low-rate and high-rate DDoS attack detection method using a -divergence'', in Intl Conf. on Computing and Communication Systems, March 2018, vol. 24 of Lecture Notes in Networks and Systems (LNNS), pp. 655--662.

Intl Conf. on Computing Communication and Automation (ICCCA)

R. Maheshwari, A. Rajput, and A.~K. Gupta, ``Private Virtual Cloud Infrastructure Modelling using 'VCPHCF-RTT' Security Agent'', in Intl Conf. on Computing Communication and Automation (ICCCA), January 2018, vol. 4, p. (5 pages).

Intl Conf. on Cryptology and Network Security

H. Wu, H.C. Hsiao, D.E. Asoni, S. Scherrer, A. Perrig, and Y.C. Hu, ``CLEF: Limiting the Damage Caused by Large Flows in the Internet Core'', in Intl Conf. on Cryptology and Network Security, January 2018, p. (20 pages).

Y. Xiang and W. Zhou, ``Safeguard information infrastructure against DDos attacks: Experiments and modeling'', in Intl Conf. on Cryptology and Network Security, January 2005, vol. 3810 of Lecture Notes in Computer Science, pp. 320--333.

Intl Conf. on Distributed Computing and Networking (ICDN)

G. Einziger and R. Friedman, ``Counting with TinyTable: Every Bit Counts!'', in Intl Conf. on Distributed Computing and Networking (ICDN), January 2016, p. 10 pages.

Intl Conf. on E-Business and Telecommunications

N. Mosharraf, A.P. Jayasumana, I. Ray, and B. Bezawada, ``History-based throttling of Distributed Denial-of-Service attacks'', in Intl Conf. on E-Business and Telecommunications, January 2017, p. (24 pages).

Intl Conf. on Emerging eLearning Technologies and Applications (ICETA)

J. Uramova, P. Sege, M. Moravik, J. Papan, M. Kontsek, and J. Hrabovsky, ``Infrastructure for Generating New IDS Dataset'', in Intl Conf. on Emerging eLearning Technologies and Applications (ICETA), January 2018, vol. 16, p. (8 pages).

Intl Conf. on emerging Networking EXperiments and Technologies

Y. Lee and N. Spring, ``Identifying and Analyzing Broadband Internet Reverse DNS Names'', in Intl Conf. on emerging Networking EXperiments and Technologies, January 2017, p. (5 pages).

Intl Conf. on Green and Human Information Technology

A. Ahmad, Y. Jaradat, and M.~Z. Maoud, ``Machine Learning Approach for Categorizing Internet Autonomous Systems' Links'', in Intl Conf. on Green and Human Information Technology 2017, January 2017, p. (5 pages).

Intl Conf. on Human Interface and the Management of Information

K. Arthur-Durett, T.~E. Carroll, and S. Chikkagoudar, ``Discovering significant co-occurrences to characterize network behaviors'', in Intl Conf. on Human Interface and the Management of Information, June 2018, vol. 10904 of Lecture Notes in Computer Science, pp. 609--623.

Intl Conf. on Informatics and Systems (INFOS)

S. Amr, M. El-Beltagy, and M. Helmy, ``Analyzing Internet connectivity data using modified k-shell analysis'', in Intl Conf. on Informatics and Systems (INFOS), January 2008, pp. 40--45.

Intl Conf. on Information Networking (ICOIN)

N. Vichaidis, H. Tsunoda, and G.~M. Keeni, ``Analyzing darknet TCP traffic stability at different timescales'', in Intl Conf. on Information Networking (ICOIN), January 2018, p. (6 pages).

T. Nam, P. Phong, T. Khoa, T. Huong, P. Nam, N. Thanh, L. Thang, P. Tran, Le. Dung, and V. Loi, ``Self-organizing map-based approaches in DDoS flooding detection using SDN'', in Intl Conf. on Information Networking (ICOIN), January 2018, pp. 249--254.

G. Lee, H. Lim, M. Hong, and D. Lee, ``A dynamic path identification mechanism to defend against DDoS attacks'', in Intl Conf. on Information Networking (ICOIN), January 2005, vol. 3391 of Lecture Notes in Computer Science (LNCS), pp. 806--813.

Intl Conf. on Information Systems Security and Privacy

I. Sharafaldin, A.H. Lashkari, and A.A. Ghorbani, ``A detailed analysis of the CICIDS2017 data set'', in Intl Conf. on Information Systems Security and Privacy, July 2018, pp. 172--188.

Intl Conf. on Information Systems Security and Privacy (ICISSP)

I. Sharafaldin, A.H. Lashkari, and A.A. Ghorbani, ``Toward generating a new intrusion detection dataset and intrusion traffic characterization.'', in Intl Conf. on Information Systems Security and Privacy (ICISSP), January 2018, vol. 1, pp. 108--116.

Intl Conf. on Innovations for Community Services

J. Hrabovsky, P. Segec, M. Moravcik, and J. Papan, ``Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems'', in Intl Conf. on Innovations for Community Services, January 2018, vol. 18, p. (10 pages).

Intl Conf. on Internet of Things as a Service

J.N. Luo and M.H. Yang, ``Improved single packet traceback scheme with Bloom filters'', in Intl Conf. on Internet of Things as a Service, January 2017, p. (7 pages).

Intl Conf. on IT Convergence and Security

S. Rastegari, C. Lam, and P. Hingston, ``A statistical rule learning approach to network intrusion detection'', in Intl Conf. on IT Convergence and Security, October 2015, p. (5 pages).

Intl Conf. on Knowledge Science, Engineering and Management

L. Sikos, M. Stumptner, W. Mayer, C. Howard, S. Voigt, and D. Philp, ``Automated reasoning over provenance-aware communication network knowledge in support of cyber-situational awareness'', in Intl Conf. on Knowledge Science, Engineering and Management, August 2018, vol. 11062 of Lecture Notes in Computer Science (LNCS), pp. 132--143.

Intl Conf. on Learning Representations

C.-Y. Hsu, P. Indyk, D. Katabi, and A. Vakilian, ``Learning-based frequency estimation algorithms'', in Intl Conf. on Learning Representations, May 2019, p. (20 pages).

Intl Conf. on Measurement and Modeling of Computer Systems

Q. Xiao, S. Chen, M. Chen, and Y. Ling, ``Hyper-compact virtual estimators for Big Network Data based on register sharing'', in Intl Conf. on Measurement and Modeling of Computer Systems, June 2015, vol. 43 (1) of Performance Evaluation Review, pp. 417--428.

Intl Conf. on Network Protocols (ICNP)

Y. Zhou, J. Bi, T. Yang, K. Gao, C. Zhang, J. Cao, and J. Wang, ``KeySight: Troubleshooting programmable switches via scalable high-coverage behavior tracking'', in Intl Conf. on Network Protocols (ICNP), January 2018, vol. 26, p. (11 pages).

R. Ben-Basat, X. Chen, G. Einziger, and O. Rottenstreich, ``Efficient Measurement on Programmable Switches Using Probabilistic Recirculation'', in Intl Conf. on Network Protocols (ICNP), January 2018, vol. 26, p. (11 pages).

Y. Yu, D. Belazzougui, C. Qian, and Q. Zhang, ``A concise forwarding information base for scalable and fast name lookups'', in Intl Conf. on Network Protocols (ICNP), January 2017, vol. 25, p. (10 pages).

Intl Conf. on Parallel and Distributed Systems (ICPADS)

J. Fu and K. Zhang, ``Practical Concurrent Self-Organizing Lists'', in Intl Conf. on Parallel and Distributed Systems (ICPADS), January 2017.

Intl Conf. on Parallel Processing

K. Qiu, Y. Zhu, J. Yuan, J. Zhao, X. Wang, and T. Wolf, ``ParaPLL: Fast parallel shortest-path distance query on large-scale weighted graphs'', in Intl Conf. on Parallel Processing, August 2018, p. (10 pages).

Intl Conf. on Parallel Processing (ICPP)

B. Liu and J. Bi, ``DISCS: A DIStributed Collaboration System for inter-AS spoofing defense'', in Intl Conf. on Parallel Processing (ICPP), September 2015, pp. 160--169.

Intl Conf. on Parallel Processing Article No. 69

X. Li, W. Cheng, T. Zhang, J. Xie, F. Ren, and B. Yang, ``Power efficient high performance packet I/O'', in Intl Conf. on Parallel Processing Article No. 69, January 2018, vol. 69, p. (10 pages).

Intl Conf. on Passive and Active Network Measurement

A. Finamore, M. Varvello, and K. Papagiannaki, ``Mind the Gap Between HTTP and HTTPS in Mobile Networks'', in Intl Conf. on Passive and Active Network Measurement, January 2017, p. (11 pages).

R. Padmanabhan, Z. Li, D. Levin, and N. Spring, ``UAv6: Alias Resolution in IPv6 Using Unused Addresses'', in Intl Conf. on Passive and Active Network Measurement, March 2015, vol. 8995 of Lecture Notes in Computer Science book series (LNCS), pp. 136--148.

Intl Conf. on Recent Advances in Information Technology (RAIT)

S. Kirti, N. Agrawal, S. Kumar, and D.~K. Sah, ``Prevention of DDoS attack through harmonic homogeneity difference mechanism on traffic flow'', in Intl Conf. on Recent Advances in Information Technology (RAIT), January 2018, vol. 4, p. (6 pages).

Intl Conf. on ReConFigurable Computing and FPGAs (ReConFig)

J.F. Zazo, S. Lopez-Buedo, M. Ruiz, and G. Sutter, ``A single-FPGA architecture for detecting heavy hitters in 100 Gbit/s ethernet links'', in Intl Conf. on ReConFigurable Computing and FPGAs (ReConFig), January 2017, p. (6 pages).

Intl Conf. on Security and Privacy in Communication Systems

T. Chin, K. Xiong, and M. Rahouti, ``SDN-based kernel modular countermeasure for intrusion detection'', in Intl Conf. on Security and Privacy in Communication Systems, January 2017, p. (20 pages).

Intl Conf. on Software Engineering and Information Management

A. Meryem, D. Samira, and E.~O. Bouabid, ``Enhancing Cloud Security using advanced MapReduce k-means on log files'', in Intl Conf. on Software Engineering and Information Management, January 2018, p. (5 pages).

Intl Conf. on Software Engineering and Service Science (ICSESS)

Z. Cao, X. Chen, Y. Sheng, and H. Ni, ``Catching the flow with locality sensitive hashing in programmable data planes'', in Intl Conf. on Software Engineering and Service Science (ICSESS), January 2018, p. (5 pages).

Intl Conf. on Software, Telecommunications and Computer Networks (SoftCOM)

D.R. Teixeira, J.M.C. Silva, and S.R. Lima, ``Deploying Time-based Sampling Techniques in Software-Defined Networking'', in Intl Conf. on Software, Telecommunications and Computer Networks (SoftCOM), January 2018, vol. 26.

Intl Conf. on Tools with Artificial Intelligence

D. Sun, K. Yang, B. Lv, and Z. Shi, ``A new mimicking attack by LSGAN'', in Intl Conf. on Tools with Artificial Intelligence, January 2017, p. (7 pages).

Intl Conf. on Virtual Execution Environments (SIGPLAN)

S. Kuenzer, A. Ivanov, F. Manco, J. Mendes, Y. Volchkov, F. Schmidt, K. Yasukata, M. Honda, and F. Huici, ``Unikernels everywhere: The case for elastic CDNs'', in Intl Conf. on Virtual Execution Environments (SIGPLAN), July 2017, vol. 52 (7) of ACM SIGPLAN Notices - VEE '17, pp. 15--29.

Intl Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob)

M. Conti, A. Gangwal, and M.~S. Gaur, ``A comprehensive and effective mechanism for DDoS detection in SDN'', in Intl Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob), January 2017, vol. 13, p. (8 pages).

Intl Confe. on Computer Networks

T. Atmaca, A. Kamli, and A. Rataj, ``Adaptation of the N-GREEN architecture for a bursty traffic'', in Intl Confe. on Computer Networks, January 2018, p. (13 pages).

Intl Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)

G. Cakmak and M.~N. Aydin, ``A country-specific analysis on internet interconnection ecosystems'', in Intl Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), January 2017, vol. 9, p. (6 pages).

Intl J. Computer Science and Network Security (IJCSNS)

M. Kale and D.M. Choudhari, ``DDOS attack detection based on an ensemble of neural classifier'', Intl J. Computer Science and Network Security (IJCSNS), vol. 14, no. 7, pp. 122--129, July 2014.

Intl J. Network Management

V. Moreno, P.M. Santiado~del Rio, J. Ramos, B. Muelas, J.L. Garcia-Dorado, F.J. Gomez-Arribas, and J. Aracil, ``Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems'', Intl J. Network Management, vol. 24, no. 4, pp. 221--234, July 2014.

Intl J. of Advanced Computer Science and Applications

I. Riadi, A.W. Muhammad, and S. Sunardi, ``Network packet classification using neural network based on training function and hidden layer neuron number variation'', Intl J. of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 248--252, January 2017.

Intl J. of Applied Engineering Research

Y.I. Joo and M. Park, ``An efficient DDoS attack detection mechanism based on distributed self organizing map'', Intl J. of Applied Engineering Research, vol. 12, no. 13, pp. 3609--3615, January 2017.

Intl J. of Applied Mathematics, Electronics and Computers

B. Kurar and R. Tahboub, ``Internet scale DoS attacks'', Intl J. of Applied Mathematics, Electronics and Computers, vol. 3, no. 2, pp. 83--89, August 2015.

Intl J. of Communication Systems

B. Retnaswamy and K. Ponniah, ``A new ontology?based multi agent framework for intrusion detection'', Intl J. of Communication Systems, vol. 29, no. 17, pp. 2490--2502, September 2016.

Intl J. of Computer Applications

C. Buragohain, M.J. Kalita, S. Singh, and D.K. Bhattacharyya, ``Anomaly based DDoS attack detection'', Intl J. of Computer Applications, vol. 123, no. 17, pp. 35--40, August 2015.

B. Kaur, K.S. Kahlon, and S. Sharma, ``Inter-domain routing with shielded infrastructure and buzzer technique'', Intl J. of Computer Applications, vol. 74, no. 15, pp. 29--32, July 2013.

Intl J. of Computer Science and Network Security

N. Sahri and K. Okamura, ``Adaptive query rate for anomaly detection with SDN'', Intl J. of Computer Science and Network Security, vol. 16, no. 6, pp. 43--51, June 2016.

Intl J. of Distributed Sensor Networks

J.~H. Huh, ``Implementation of lightweight intrusion detection model for security of smart green house and vertical farm'', Intl J. of Distributed Sensor Networks, vol. 14, pp. (11 pages), January 2018.

Intl J. of Engineering and Technology

C. Thangamalar and K. Ravikumar, ``Rating association for short degree DDoS attack recognition'', Intl J. of Engineering and Technology, vol. 9, no. 5, pp. 3640--3647, October 2017.

Intl J. of Forecasting

A. D'Ignazio and E. Giovannetti, ``Predicting internet commercial connectivity wars: The impact of trust and operators' asymmetry'', Intl J. of Forecasting, vol. 31, pp. 1127--1137, May 2015.

Intl J. of Future Generation Communication and Networking

Q. Gao, F. Wang, and L. Gao, ``Quantifying AS path inflation by routing policies'', Intl J. of Future Generation Communication and Networking, vol. 9, no. 1, pp. 167--186, January 2016.

Y. Xu and W. Ma, ``Robustness analyses of Internet topology with power-law features'', Intl J. of Future Generation Communication and Networking, vol. 7, no. 1, pp. 19--28, January 2014.

Intl J. of Information Security and Privacy (IJISP)

R. Wang, Z. Zhang, L. Ju, and Z. Jia, ``A novel OpenFlow-based DDoS flooding attack detection and response mechanism in Software-Defined Networking'', Intl J. of Information Security and Privacy (IJISP), vol. 9, no. 3, pp. 21--40, July 2015.

Intl J. of Intelligent Computing Research (IJICR)

K. Kato and V. Klyuev, ``An intelligent DDoS attack detection system using packet analysis and support vector machine'', Intl J. of Intelligent Computing Research (IJICR), vol. 5, no. 3, pp. 464--471, September 2014.

Intl J. of Intelligent Engineering and Systems

R. Saravanan, S. Loganathan, S. Shunmuganathan, and Y. Palanichamy, ``Suspicious score based mechanism to protect web servers against application layer Distributed Denial of Service attacks'', Intl J. of Intelligent Engineering and Systems, vol. 10, no. 4, pp. 147--156, April 2017.

Intl J. of Management and Network Economics

Y. Nakata, S. Arakawa, and M. Murata, ``A provider and peer selection policy for the future sustainable internet'', Intl J. of Management and Network Economics, vol. 3, no. 3, pp. 238--256, January 2015.

Intl J. of Modern Physics C

Z. Fan and W. Tang, ``Interplay of ICP and IXP over the Internet with power-law features'', Intl J. of Modern Physics C, vol. 29, no. 1, pp. (17 pages), January 2018.

Intl J. of Network Management

F. Haddadi and A. Heywood, ``Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?'', Intl J. of Network Management, vol. 27, no. 4, pp. (19 pages), May 2017.

T. Kudo and T. Takin, ``On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling'', Intl J. of Network Management, vol. 24, no. 1, pp. 28--47, January 2014.

Intl J. of Network Security

Y. Hamid, R. Balasaraswathi, L. Journaux, and M. Sugumaran, ``Benchmark datasets for Network Intrusion Detection: A review'', Intl J. of Network Security, vol. 20, no. 4, pp. 645--654, July 2018.

R. Deka, D. Bhattacharyya, and J. Kalita, ``Granger causality in TCP flooding attack'', Intl J. of Network Security, vol. 21, no. 1, pp. 30--39, March 2018.

R. Baishya, N. Hoque, and D. Bhattacharya, ``DDoS attack detection using unique source IP deviation'', Intl J. of Network Security, vol. 19, no. 6, pp. 929--939, November 2017.

S. Behal, K. Kumar, and M. Sachdeva, ``Discriminating flash events from DDoS Attacks: A comprehensive review'', Intl J. of Network Security, vol. 19, no. 5, September 2017.

A. Ain, M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``Rank correlation for low-rate DDoS attack detection: An empirical evaluation'', Intl J. of Network Security, vol. 18, no. 3, pp. 474--480, May 2016.

Intl J. of Networking and Virtual Organisations

M. Huth and B. Fabian, ``Inferring business relationships in the internet backbone'', Intl J. of Networking and Virtual Organisations, vol. 16, no. 4, pp. 315--345, January 2017.

Intl J. of Reasoning-based Intelligent Systems

S. Wang, Y. Li, X. Zhao, and B. Wang, ``Intrusion detection system design of cloud computing based on abnormal traffic identification'', Intl J. of Reasoning-based Intelligent Systems, vol. 7, no. 3/4, pp. 186--192, November 2015.

Intl J. of Scientific Research in Computer Science, Engineering and Information Technology

A. Ali and M.~A.~U. Rahman, ``A Efficient Privacy Based Multi User Computation Using Inter Domain Routing Decision'', Intl J. of Scientific Research in Computer Science, Engineering and Information Technology, vol. 2, pp. (8 pages), January 2017.

Intl J. On Advances in Security

L. Axon, J.R.C. Nurse, M. Goldsmith, and S. Creese, ``A formalised approach to designing sonification systems for network-security monitoring'', Intl J. On Advances in Security, vol. 10, no. 1-2, pp. 26--47, July 2017.

Intl J. Security and Networks

Z. Chen and C. Chen, ``Characterising heterogeneity in vulnerable hosts on worm propagation'', Intl J. Security and Networks, vol. 11, no. 4, January 2016.

Intl J. System Assurance Engineering and Management

S. Gupta and B.B. Gupta, ``Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art'', Intl J. System Assurance Engineering and Management, pp. 1--19, September 2015.

Intl Performance Evaluation Workshop (SPEC)

H. Haddadi, D. Fay, S. Uhlig, A. Moore, R. Mortier, A. Jamakovic, and M. Rio, ``Tuning topology generators using spectral distributions'', in Intl Performance Evaluation Workshop (SPEC), June 2008, vol. 5119 of Lecture Notes in Computer Science (LNCS), pp. 154--173.

Intl Symp. on Computing and Networking Workshops (CANDARW)

M.~Z. Saavedra and W.~E. Yu, ``Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop'', in Intl Symp. on Computing and Networking Workshops (CANDARW), January 2018, p. (4 pages).

Intl Symp. on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS)

S. Jin and A. Bestavros, ``Small-world characteristics of the Internet and multicast scaling'', in Intl Symp. on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS), October 2003, p. (9 pages).

Intl Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)

R.~B. Basat, G. Einziger, R. Friedman, M.~C. Luizelli, and E. Waisbard, ``Volumetric hierarchical heavy hitters'', in Intl Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), January 2018, vol. 26, p. (12 pages).

Intl Symp. on Personal, Indoor, and Mobile Radio Communications (PIMRC)

M. Galluscio, N. Neshenko, E. Bou-Harb, Y. Huang, N. Ghani, J. Crichigno, and G. Kaddoum, ``A first empirical look on internet-scale exploitations of IoT devices'', in Intl Symp. on Personal, Indoor, and Mobile Radio Communications (PIMRC), February 2018, pp. 1--7.

Intl Symp. on Quality of Service (IWQoS)

J. Lu, Y. Wan, Y. Li, C. Zhang, H. Dai, Y. Wang, G. Zhang, and B. Liu, ``Ultra-fast Bloom filters using SIMD techniques'', in Intl Symp. on Quality of Service (IWQoS), June 2017, p. (6 pages).

Intl Teletraffic Congress

R. Barik, M. Welzl, A.~M. Elmokashfi, T. Dreibholz, and S. Gjessing, ``Can WebRTC QoS Work? A DSCP measurement study'', Intl Teletraffic Congress, vol. 30, pp. (9 pages), October 2018.

J. Varela and P. Ros, ``Towards a NetFlow implementation for OpenFlow software-Defined Networks'', in Intl Teletraffic Congress, September 2017, vol. 29, pp. 187--195.

K. Edeline and B. Donnet, ``A first look at the prevalence and persistence of middleboxes in the wild'', in Intl Teletraffic Congress, September 2017, pp. 161--168.

H. Haddadi, D. Fay, A. Jamakovic, O. Maennel, A. Moore, R. Mortier, and S. Uhlig, ``On the importance of local connectivity for Internet topology models'', in Intl Teletraffic Congress, September 2009, p. (8 pages).

Intl Teletraffic Congress (ITC)

G. Nomikos, P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``Comparative assessment of centrality indices and implications on the vulnerability of ISP networks'', in Intl Teletraffic Congress (ITC), September 2014, p. (9 pages).

Z. Guo and Y. Yang, ``Pipelining multicast scheduling in all-optical packet switches with delay guarantee'', in Intl Teletraffic Congress (ITC), September 2011, pp. 174--181.

Intl Wireless Comm. and Mobile Computing Conf. (IWCMC)

Q. Ezzahra, B. Khaled, E. Bou-Harb, C. Fachkha, and B. Zouari, ``On the collaborative inference of DDoS: An information-theoretic distributed approach'', in Intl Wireless Comm. and Mobile Computing Conf. (IWCMC), June 2018, pp. 518--523.

F. Shaikh, E. Bou-Harb, J. Crichigno, and N. Ghani, ``A machine learning model for classifying unsolicited IoT devices by observing Network Telescopes'', in Intl Wireless Comm. and Mobile Computing Conf. (IWCMC), January 2018, vol. 14, p. (6 pages).

Intl Wireless Communications and Mobile Computing Conf. (IWCMC)

A. Atifi and E. Bou-Harb, ``On correlating network traffic for cyber threat intelligence: A Bloom filter approach'', in Intl Wireless Communications and Mobile Computing Conf. (IWCMC), January 2017, vol. 13, p. (6 pages).

Intl Workshop on Complex Networks

H. Alrasheed, ``On the Eccentricity Function in Graphs'', in Intl Workshop on Complex Networks, January 2018, p. (11 pages).

Intl Workshop on IP Operations and Management

O Akashi, K. Fukuda, T. Hirotsu, and T. Sugawara, ``Analysis of diagnostic capability for hijacked route problem'', in Intl Workshop on IP Operations and Management, October 2007, vol. 4786 of Lecture Notes in Computer Science (LCNS), pp. 37--48.

Intl Workshops on Foundations and Applications of Self* Systems (FAS*W)

F. Mohamed, B. AlBelooshi, K. Salah, C.Y. Yeun, and E. Damiani, ``A scattering technique for protecting cryptographic keys in the cloud'', in Intl Workshops on Foundations and Applications of Self* Systems (FAS*W), January 2017, vol. 2, p. (6 pages).

Intl. Conf. on Big Data

W. Eberle and L. Holder, ``A partitioning approach to scaling anomaly detection in graph streams'', in Intl. Conf. on Big Data, October 2014.

Intl. Conf. on Communication Systems and Network Technologies (CSNT)

M.H. Bhuyan, A. Kalwar, A. Goswami, D.K. Bhattacharyya, and J.K. Kalita, ``Low-rate and high-rate Distributed DoS attack detection using partial rank correlation'', in Intl. Conf. on Communication Systems and Network Technologies (CSNT), April 2015, pp. 706--710.

Intl. Conf. on Communication Systems and Networks (COMSNETS)

J. Chen, V.S.A. Kumar, M.V. Marathe, R. Sundaram, M. Thakur, and S. Thulasidasan, ``A study of the structure and vulnerabilities of metropolitan area networks'', in Intl. Conf. on Communication Systems and Networks (COMSNETS), January 2016.

Intl. Conf. on Contemporary Computing (IC3)

M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``Information metrics for low-rate DDoS attack detection: A comparative evaluation'', in Intl. Conf. on Contemporary Computing (IC3), August 2014, pp. 80--84.

Intl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC)

H. Nurohman, Y. Purwanto, and X. Hafidudin, ``Traffic anomaly based detection: Anomaly detection by self-similar analysis'', in Intl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC), August 2015, p. (6 pages).

Intl. Conf. on Distributed Computing Systems (ICDCS)

C. Chen, S. Matsumoto, and A. Perrig, ``ECO-DNS: Expected consistency optimization for DNS'', in Intl. Conf. on Distributed Computing Systems (ICDCS), June 2015, pp. 256--267.

Intl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU)

O. Erunika, K. Kaneko, and F. Taraoka, ``Performance evaluation of host-based mobility management schemes in the Internet'', in Intl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU), March 2015, pp. 173--178.

Intl. Symp. on Integrated Network Management (IM)

P. Simoens, L.V. Herzeele, F. Vandeputte, and L. Vermoesen, ``Challenges for orchestration and instance selection of composite services in distributed edge clouds'', in Intl. Symp. on Integrated Network Management (IM), May 2015, pp. 1196--1201.

Intl. Symp. on Intelligent Information Technology Application

Z. Qu, C. Huang, and N. Liu, ``A novel two-step traceback scheme for DDoS attacks'', in Intl. Symp. on Intelligent Information Technology Application, December 2008, pp. 879--883.

Intl. Workshop on Information Forensics and Security (WIFS)

G. Francois and O. Festor, ``Anomaly traceback using software defined networking'', in Intl. Workshop on Information Forensics and Security (WIFS), December 2015, pp. 203--208.

Iowa State Univ.

W. Chen, Distributed data streaming algorithms for network anomaly detection, Ph.D. thesis, Iowa State Univ., January 2017.

J.S. Varghese and L. Ruan, ``A machine learning approach to edge type prediction in Internet AS graphs'', Tech. rep., Iowa State Univ., July 2015.

O.A. Martins, ``Affecting IP traceback with recent Internet topology maps'', M.S. thesis, Iowa State Univ., June 2005.

Iowa State Univ., Ames, IO, US

S.A. Singh, Techniques for online analysis of large distributed data, Ph.D. thesis, Iowa State Univ., Ames, IO, US, January 2015.

Islamic Univ. of Gaza

H. Albiltaje, ``Detecting DDoS attack using a multilayer data mining techniques'', M.S. thesis, Islamic Univ. of Gaza, August 2015.

Issues in Information System

A. Girma and P. Wang, ``An Efficient Hybrid Model for Detecting Distributed Denial of Service (DDOS) Attacks in Cloud Computing using Multivariate Correlation and Data Mining Clustering Techniques'', Issues in Information System, vol. 19, pp. (12 pages), January 2018.

Istanbul Technical Univ.

A. Aral, Resource mapping optimization for distributed cloud services, Ph.D. thesis, Istanbul Technical Univ., December 2016.

J Electr Electron Syst

Y.-H. Hu, ``A fluid-based approach for modeling network activities'', J Electr Electron Syst, vol. 2, no. 2, pp. (8 pages), August 2013.

J. Advances in Systems and Measurements

J. Francois, R. State, and O. Festor, ``Activity monitoring for large honeynets and network telescopes'', J. Advances in Systems and Measurements, vol. 1, pp. 1--13, January 2008.

J. Applied Soft Computing

S. Rastegari, P. Hingston, and C.P. Lam, ``Evolving statistical rulesets for network intrusion detection'', J. Applied Soft Computing, vol. 33, no. C, pp. 348--359, August 2015.

J. Applied Statistics

P. Chen, M. Xu, S. Xu, and T. Hu, ``Modeling and predicting extreme cyber attack rates via marked point processes'', J. Applied Statistics, vol. 0, pp. 0, November 2016.

J. China Inst. of Communications

W.-J. Su, H. Zhao, Y. Xu, and W.-B. Zhang, ``Internet complex network separation degree analysis based on hops'', J. China Inst. of Communications, vol. 26, no. 9, pp. 1--8, September 2005.

J. Communication Systems

M. Janic and P. Van~Mieghem, ``On properties of multicast routing trees'', J. Communication Systems, vol. 19, no. 1, pp. 95--114, November 2005.

J. Communications and Networks

W. Deng, W. Muhlbauer, Y. Yang, P. Zhu, X. Lu, and B. Plattner, ``Shedding light on the use of AS relationships for path inference'', J. Communications and Networks, vol. 14, no. 3, pp. 336--345, June 2012.

J. Competition Law and Economics

A. D'Ignazio and E. Giovannetti, ``Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach'', J. Competition Law and Economics, vol. 2, no. 1, pp. 43--69, February 2006.

J. Computational Science

M. Youssef, R. Kooij, and C. Scoglio, ``Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics'', J. Computational Science, vol. 61, pp. (13 pages), March 2011.

J. Computer and System Sciences

R. Clegg, R. Landa, and M. Rio, ``Criticisms of modelling packet traffic using long-range dependence (extended version)'', J. Computer and System Sciences, vol. 77, no. 5, pp. 861--868, September 2011.

J. Computer Networks

R.G. Garroppo, G. Nencioni, G. Procissi, and L. Tavanti, ``The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs'', J. Computer Networks, vol. 94, no. C, pp. 99--111, January 2016.

J. Computer Virology and Hacking Techniques

B. Venkatesh, S.H. Choudhury, S. Nagajara, and N. Balakrishnan, ``BotSpot: fast graph based identification of structured P2P bots'', J. Computer Virology and Hacking Techniques, vol. 11, pp. 247--261, November 2015.

J. Computers

W. Liu, Y. Yan, T. Dong, and T. Run-hua, ``Self-similarity and heavy-tail of ICMP traffic'', J. Computers, vol. 7, no. 12, pp. 2948--2954, December 2012.

J. Cyber Security Technology

K.J. Singh and T. De, ``Mathematical modelling of DDoS attack and detection using correlation'', J. Cyber Security Technology, vol. 1, no. 3-4, pp. 175--186, September 2017.

J. Defense Modeling and Simulation: Applications, Methodology, Technology

L.J. Tidy, S. Woodhead, and J. Wetherall, ``Simulation of zero-day worm epidemiology in the dynamic, heterogeneous Internet'', J. Defense Modeling and Simulation: Applications, Methodology, Technology, p. (17 pages), October 2013.

J. Digital Crime and Forensics

N.S. Abouzakhar, H. Chen, and B. Christianson, ``An enhanced fuzzy ARM approach for intrusion detection'', J. Digital Crime and Forensics, vol. 3, no. 2, pp. 41--61, April 2011.

J. Engineering and Innovative Technology (IJEIT)

H. Verma, B. Yadav, P. Bansal, and S. Raj, ``IPv4 to IPv6 shift: major challenges'', J. Engineering and Innovative Technology (IJEIT), vol. 1, no. 4, pp. 38--44, April 2012.

J. Experimental Algorithmics

A. D'Andrea, M. D'Emidio, D. Frigioni, S. Leucci, and G. Proietti, ``Dynamic maintenance of a shortest-path tree on homogeneous batches of updates: New algorithms and experiments'', J. Experimental Algorithmics, vol. 20, no. 1, pp. (33 pages), July 2015.

J. Expert System with Applications

V. Gulisano, M. Zori, Z Fu, R. Peris, M. Paptriantafilou, and M. Martinez, ``STONE: A streaming DDoS defense framework'', J. Expert System with Applications, vol. 42, no. 24, pp. 9620--9633, December 2015.

J. Expert Systems with Applications

R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Shen, K. Xu, and K. Yang, ``A neuro-fuzzy approach to self-management of virtual network resources'', J. Expert Systems with Applications, vol. 42, no. 3, pp. 1376--1390, February 2015.

J. Hybrid Information Technology

H. Liu, X. Hu, D. Zhao, and X. Lu, ``Failure isolation based defense against Internet CXPST-like attack'', J. Hybrid Information Technology, vol. 5, no. 2, pp. 175--180, April 2012.

J. Industrial Organization

A. D'Ignazio and E. Giovannetti, ``Asymmetry and discrimination in Internet peering: evidence from the LINX'', J. Industrial Organization, vol. 27, no. 3, pp. 441--448, May 2009.

J. Informatika Sunan Kalijaga

A. Muhammad, I. Riadi, and S. Sunardi, ``Deteksi serangan DDoS menggunakan neural network dengan fungsi fixed moving average window'', J. Informatika Sunan Kalijaga, vol. 1, no. 3, pp. 115--122, January 2017.

J. Information Assurance and Security

G. Maiolini, G. Molina, A. Baiocchi, and A. Rizzi, ``On the fly application flows identification by exploiting K-means based classifiers'', J. Information Assurance and Security, vol. 4, no. 2, pp. 142--150, January 2009.

M.S. Andreou and A. van Moorsel, ``COTraSE Connection Oriented Traceback in Switched Ethernet'', J. Information Assurance and Security, vol. 4, no. 2, pp. 91--105, January 2009.

J. Intelligent and Fuzzy Systems

S. Shamshirband, B. Daghighi, N.B. Anuar, L.M. Kiah, A. Patel, and A. Abraham, ``Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network'', J. Intelligent and Fuzzy Systems, vol. 28, no. 3, pp. 1345--1357, January 2015.

J. Internet Technology (JIT)

L. Zheng, J. Li, H. Wang, and X. Zeng, ``Improving accuracy and automation of anomaly detectors based on self-correlation'', J. Internet Technology (JIT), vol. 17, no. 1, pp. 39--51, January 2016.

J. Network and Computer Applications

A. Durresi, V. Paruchuri, and L. Barolli, ``Fast autonomous system traceback'', J. Network and Computer Applications, vol. 32, no. 2, pp. 448--454,, March 2009.

J. Network and Systems Management

A. Davy, B. Jennings, and D. Botvich, ``QoSPlan: A measurement based quality of service aware network planning framework'', J. Network and Systems Management, p. (36 pages), June 2012.

J. Network Security

F. Wang, Y. Zhang, H. Guo, and C. Wang, ``Combating good point set scanning-based self-learning worms by using predators'', J. Network Security, vol. 15, no. 3, pp. 171--178, January 2013.

J. of Advances in Computer Networks

M.Z.N.L. Saavedra and W.E.S. Yu, ``A comparison between text, Parquet, and PCAP formats for use in distributed network flow analysis on Hadoop'', J. of Advances in Computer Networks, vol. 5, no. 2, pp. 59--64, December 2017.

J. of Cloud Computing: Advances, Systems and Applications

A. Abusitta, B. Martine, and M. Dagenais, ``An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment'', J. of Cloud Computing: Advances, Systems and Applications, vol. 7, no. 9, pp. (18 pages), April 2018.

J. of Communications and Networks

H. An, H. Lee, and A. Perrig, ``Coordination of anti-spoofing mechanisms in partial deployments'', J. of Communications and Networks, vol. 18, no. 6, pp. 948--961, December 2016.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``A probabilistic sampling method for efficient flow-based analysis'', J. of Communications and Networks, vol. 18, no. 5, pp. 818--825, November 2016.

J. of Complex Networks

H.V. Lierde, T.W.S. Chow, and J.C. Delvenne, ``Spectral clustering algorithms for the detection of clusters in block-cyclic and block-acyclic graphs'', J. of Complex Networks, vol. 7, no. 1, pp. 1--53, May 2018.

J. of Computational Information Systems

C. Ma, Y. Yang, and X. Guo, ``Improved SEIR viruses propagation model and the patch's impact on the propagation of the virus'', J. of Computational Information Systems, vol. 9, no. 8, pp. 3243--3251, April 2013.

J. of Computer Science and Technology

Q. Jiang, H. Hu, and G. Hu, ``Two-type information fusion based IP-to-AS mapping table refining'', J. of Computer Science and Technology, vol. 32, no. 3, pp. 571--584, May 2017.

J. of Cyber Security and Mobility

O. Gasser, Q. Scheitle, B. Rudolph, C. Denis, N. Schriker, and G. Carle, ``The amplification threat posed by publicly reachable BACnet devices'', J. of Cyber Security and Mobility, vol. 6, no. 1, pp. 77--104, October 2017.

J. of Experimental Algorithmics

N. Cohen, D. Coudert, and A. Lancin, ``On computing the Gromov hyperbolicity'', J. of Experimental Algorithmics, vol. 20, pp. (18 pages), August 2015.

J. of Information Policy

M. Palacin, M. Oliver, J. Infante, S. Oechsner, and A. Bikfalvi, ``The impact of content delivery networks on the Internet ecosystem'', J. of Information Policy, vol. 3, pp. 304--330, January 2013.

J. of Information Science and Engineering

S. Malliga, C. Selvi, and S. Kogilavani, ``Low storage and traceback overhear IP traceback system'', J. of Information Science and Engineering, vol. 32, pp. 27--45, January 2016.

M. Vijayalakshmi and S.M. Shalinie, ``Single packet ICMP traceback technique using router interface'', J. of Information Science and Engineering, vol. 31, no. 5, pp. 1757--1778, September 2015.

J. of Information Security

S. Bista and R. Chitrakar, ``DDoS Attack Detection Using Heuristics Clustering Algorithm and Naive Bayes Classification'', J. of Information Security, vol. 9, pp. (12 pages), January 2017.

J. of Information Security and Applications

K. Singh and T. De, ``MLP-GA based algorithm to detect application layer DDoS attack'', J. of Information Security and Applications, vol. 36, pp. 145--153, October 2017.

N. Hubballi and N. Tripathi, ``An event based technique for detecting spoofed IP packets'', J. of Information Security and Applications, vol. 35, pp. 32--43, May 2017.

J. of Internet Services and Applications

A. Lucchesi, A. Drummond, and G. Teodoro, ``High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approach'', J. of Internet Services and Applications, vol. 9, no. 3, pp. (18 pages), February 2018.

J. of Korean Inst. of Communications and Information Sciences

Y. Kim, D. Choi, T. Van, M. Long, and M. Park, ``DDoS Detection System Based on Multiple Machine Learning Combination for Software Defined Networking'', J. of Korean Inst. of Communications and Information Sciences, vol. 42, no. 8, pp. 1581--1590, August 2017.

J. of Machine Learning Research

A. Freno, M. Keller, and M. Tommasi, ``Probability estimation over large-scale random networks via the Fiedler delta statistic'', J. of Machine Learning Research, vol. XX, no. X, pp. X, December 2013.

J. of Mechanical Design

Z. Sha and J.H. Panchal, ``Estimating local decision-making behavior in complex evolutionary systems'', J. of Mechanical Design, vol. 136, no. 8, pp. (11 pages), April 2014.

J. of Medical Systems

H. Polat, H. Mehr, and A. Cetin, ``Diagnosis of chronic kidney disease based on Support Vector Machine by Feature Selection Methods'', J. of Medical Systems, vol. 41, no. 55, pp. (11 pages), February 2017.

J. of Network and Computer Applications

S. Behal, K. Kumar, and M. Sachdeva, ``D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events'', J. of Network and Computer Applications, vol. 111, pp. 49--63, June 2018.

G. Aceto, A. Botta, P. Marchetta, V. Persico, and A. Pescape, ``A comprehensive survey on internet outages'', J. of Network and Computer Applications, p. (48 pages), January 2018.

T. Phan, N. Bao, and M. Park, ``Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks'', J. of Network and Computer Applications, vol. 91, no. C, pp. 14--25, August 2017.

A. Jeyasekar, S. Kasmir~Raja, and R. Annie~Uthra, ``Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networks'', J. of Network and Computer Applications, vol. 93, pp. 91--109, May 2017.

A. AlEroud and I. Alsmadi, ``Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach'', J. of Network and Computer Applications, vol. 80, no. C, pp. 152--164, February 2017.

J. of Networks

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Intelligent sampling using an optimized neural network'', J. of Networks, vol. 11, no. 1, pp. 16--27, January 2016.

Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Performance of flow-based anomaly detection in sampled traffic'', J. of Networks, vol. 10, no. 9, pp. 512--520, January 2016.

J. Saldana, D. de Hoz, J. Fernandez-Navajas, J. Ruiz-Mas, F. Pascual, D.R. Lopez, D. Florez, J.A. Castell, and M. Nunez, ``Small-packet flows in Software Defined Networks: Traffic profile optimization'', J. of Networks, vol. 10, no. 4, pp. 176--187, April 2015.

W. Bhaya and M.E. Manaa, ``A proactive DDoS detection approach using data mining cluster analysis'', J. of Next Generation Information Technology, vol. 5, no. 4, pp. 36--47, November 2014.

L. Yujing, Z. Bofeng, W. Fei, and S. Jinshu, ``Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system'', J. of Next Generation Information Technology, vol. 1, no. 3, pp. 96--105, November 2010.

J. of Physics: Conf. Series

I. Kotenko, A. Chechulin, and A. Branitskiy, ``Generation of source data for experiments with network attack detection software'', J. of Physics: Conf. Series, p. (10 pages), January 2017.

J. of Software

G.-F. He, M. Yang, J.-Z. Luo, and L. Zhang, ``Online identification of Tor anonymous communication traffic'', J. of Software, vol. 24, no. 3, pp. 540--556, March 2013.

J. of Supercomputing

A. Nur and M. Tozal, ``Identifying critical autonomous systems in the Internet'', J. of Supercomputing, vol. 74, no. 10, pp. 4965--4985, October 2018.

J. of Tsinghua Univ.

S. Li, H. Duan, and X. Li, ``Real-time system for detecting inter-domain routing man-in-the-middle attacks'', J. of Tsinghua Univ., vol. 55, no. 11, pp. 1229--1234, December 2015.

J. on Communications

X.Y. Hu and J. Gong, ``Multipath inter-domain routing for named data networking'', J. on Communications, vol. 36, no. 10, pp. (13 pages), October 2015.

J. on Selected Areas in Communications

A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, ``On the geographic location of internet resources'', J. on Selected Areas in Communications, vol. 21, no. 6, pp. 934--947, August 2003.

J. Phys. A: Math. Theor.

Q. Xuan, F. Du, and T-J Wu, ``Partially ordered sets in complex networks'', J. Phys. A: Math. Theor., vol. 43, pp. 185001 (13 pp), April 2010.

J. Rekayasa Teknologi Informasi

A. Muhammad and F. Alameka, ``Integrasi metode normalized reelative network entropy dan neural network backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS'', J. Rekayasa Teknologi Informasi, vol. 1, no. 1, pp. 1--7, June 2017.

J. Scientific and Engineering Research

J. Singh, K. Kumar, M. Sachdeva, and N. Sidhu, ``DDoS attack's simulation using legitimate and attack real data sets'', J. Scientific and Engineering Research, vol. 3, no. 6, pp. 1--5, June 2012.

J. Security and Its Applications

Y. Xu and Z. Wang, ``Collapse by cascading failures in hybrid attacked regional Internet'', J. Security and Its Applications, vol. 6, no. 2, pp. 287--292, April 2012.

J. Security and Networks

Z. Chen and C. Ji, ``Optimal worm-scanning method using vulnerable-host distributions'', J. Security and Networks, vol. 2, no. 1/2, pp. 71--80, January 2007.

J. Software Engineering and Applications

J. Song, H. Zhao, B. Yang, and H. Sun, ``AS-level Internet macroscopic topology centralization evolvement analysis'', J. Software Engineering and Applications, vol. 3, pp. 901--905, October 2010.

J. Stat. Mechanics: Theory and Experiment

G.K. Orman, V. Labatut, and H. Cherifi, ``Comparative evaluation of community detection algorithms: a topological approach'', J. Stat. Mechanics: Theory and Experiment, vol. 2012, pp. P08001, August 2012.

J. Supercomputing

M.Z. Ahmad and R. Guha, ``Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation'', J. Supercomputing, vol. 62, no. 3, pp. 1425--1450, December 2012.

J. Systems and Software

Q. Liu, J.C.S. Lui, C. He, L. Pan, W. Fan, and Y. Shi, ``SAND: A fault-tolerant streaming architecture for network traffic analytics'', J. Systems and Software, vol. 122, pp. 553--563, August 2015.

Joint Conf. on Measurement and Modeling of Computer Systems

H. Chan, D. Dash, A. Perrig, and H. Zhang, ``Modeling adoptability of secure BGP protocols'', in Joint Conf. on Measurement and Modeling of Computer Systems, September 2006, pp. 389--390.

Journal of Computer Networks and Communications

M.~M. Oo, S. Kamolphiwong, T. Kamolphiwong, and S. Vasupongayya, ``Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN)'', Journal of Computer Networks and Communications, p. (12 pages), January 2019.

Journal of Conflict Resolution

P.~M. Lutscher, N.~B. Weidmann, M.~E. Roberts, M. Jonker, A. King, and A. Dainotti, ``At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes'', Journal of Conflict Resolution, p. (29 pages), January 2019.

Journal of Experimental Algorithmics (JEA)

D. Frigioni, M. D'Emidio, and G. D'Angelo, ``Fully Dynamic 2-Hop Cover Labeling'', Journal of Experimental Algorithmics (JEA), vol. 24, pp. (36 pages), January 2019.

Journal of Graph Algorithms and Applications

V. Chepoi, F.~F. Dragan, M. Habib, Y. Vaxes, and H. Alrasheed, ``Fast approximation of eccentricities and distances in hyperbolic graphs'', Journal of Graph Algorithms and Applications, vol. 23, pp. (41 pages), January 2019.

Journal of Information Security

L. Hong and S. Alzharani, ``Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation'', Journal of Information Security, vol. 9, pp. (17 pages), January 2018.

Journal of Information Security and Applications

N. Ghani and E. Bou-Harb, ``Passive Inference of Attacks on CPS Communication Protocols'', Journal of Information Security and Applications, p. (39 pages), January 2018.

Journal of King Saud University

S. Behal, M. Sachdeva, and K.~K. Saluja, ``D-FAC: A novel 0-Divergence based distributed DDoS defense system'', Journal of King Saud University, p. (14 pages), January 2018.

Journal of King Saud University - Computer and Information Sciences

N.~V. Patil, C.~R. Krishna, K. Kumar, and S. Behal, ``E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks'', Journal of King Saud University - Computer and Information Sciences, p. (15 pages), January 2019.

Journal of Network and Computer Applications

J. Li, H. Luo, S. Zhang, H. Li, and F. Yan, ``Design and implementation of efficient control for incoming inter-domain traffic with Information-Centric Networking'', Journal of Network and Computer Applications, vol. 133, pp. (16 pages), January 2019.

Journal of Parallel and Distributed Computing

H. Lin and C.~L. Wang, ``Efficient low-latency packet processing using On-GPU Thread-Data Remapping'', Journal of Parallel and Distributed Computing, vol. 133, pp. (11 pages), January 2019.

Journal of Theoretical and Applied Information Technology

I. Riadi and A.~W. Muhammad, ``Neural Network Based DDoS Detection Regarding Hidden Layer Variation'', Journal of Theoretical and Applied Information Technology, vol. 95, pp. (9 pages), January 2018.

Julius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE

F. Lehrieder, Performance evaluation and optimization of content distribution using overlay networks, Ph.D. thesis, Julius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE, June 2013.

Julius-Maximilians-Univ. Wurzburg

V. Burger, Performance evaluation and optimization of Content Delivery Networks, Ph.D. thesis, Julius-Maximilians-Univ. Wurzburg, August 2017.

K.U. Leuven

T. Erlebach, L.S. Moonen, F. Spieksma, and D. Vukadinovic, ``Connectivity measures for internet topologies'', Tech. rep., K.U. Leuven, December 2005.

Kauno Technologijos Univ.

A. Kulbis, ``Distributed port scan detection in network traffic'', M.S. thesis, Kauno Technologijos Univ., January 2015.

Kent State Univ.

A. Al-Baghdadi, ``Computing top-k closeness centrality in unweighted undirected graphs revisited'', M.S. thesis, Kent State Univ., May 2017.

M.M. Abu-Ata, Tree-like structure in graphs and embedability to trees, Ph.D. thesis, Kent State Univ., May 2014.

Knowledge and Information Systems

K. Shin, T. Rad, and C. Faloutsos, ``Patterns and anomalies in k-cores of real-world graphs with applications'', Knowledge and Information Systems, vol. 54, no. 3, pp. 677--710, March 2018.

N. Haghtalab, A. Laszka, A. Procaccia, Y. Vorobeychik, and X. Koutsoukos, ``Monitoring stealthy diffusion'', Knowledge and Information Systems, vol. 52, no. 3, pp. 657--685, September 2017.

KSII Trans on Internet and Information Systems

J.-S. Kim, M.-C. Ko, J. Nam, and J. Kim, ``Bitmap-based prefix caching for fast IP lookup'', KSII Trans on Internet and Information Systems, vol. 8, no. 3, pp. 873--889, March 2014.

KSII Trans. on Internet and Information Systems

Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing resilience of inter-domain routing system under regional failures'', KSII Trans. on Internet and Information Systems, vol. 10, no. 4, pp. 1630--1642, April 2016.

Kyoto Univ.

N.P. Hoang, ``Towards an autonomous system monitor for mitigating correlation attacks in the Tor network'', M.S. thesis, Kyoto Univ., August 2016.

Kyushu Univ.

N. Sahri, Research on performance and security improvements by Software Defined Network, Ph.D. thesis, Kyushu Univ., April 2016.

Latin America Networking Conf.

D. Kiedanski, E. Grampin, and J.~I. Alvarez-Hamelin, ``The Atlas Vision of IPv6 in Latin America: Topology and Latency'', in Latin America Networking Conf., January 2018, p. (8 pages).

Latin American Network Operations and Management Symp. (LANOMS)

K. Wehmuth and A. Ziviani, ``Distributed location of the critical nodes to network robustness based on spectral analysis'', in Latin American Network Operations and Management Symp. (LANOMS), October 2011, p. (8 pages).

Le Havre Univ.

M.A.S. Meslmawy, Efficient resources management in a distributed computer system, modeled as a dynamic complex system, Ph.D. thesis, Le Havre Univ., October 2015.

Lecture Notes in Business Information Processing (LNBIP)

S.Y. Dorbala and N. Hubballi, ``An experience report on scalable implementation of DDoS attack detection'', Lecture Notes in Business Information Processing (LNBIP), vol. 215, pp. 518--529, May 2015.

Lecture Notes in Computer Science

A. Baumann and B. Fabian, ``Vulnerability against Internet disruptions - A graph-based perspective'', Lecture Notes in Computer Science, vol. 9578, pp. 120--131, May 2016.

A. Sosnovich, O. Grumberg, and G. Nakibly, ``Analyzing Internet routing security using model checking'', Lecture Notes in Computer Science, vol. 9450, pp. 112--129, November 2015.

S. Ko, K. Kim, Y. Lee, and J. Song, ``A classification method of darknet traffic for advanced security monitoring and response'', Lecture Notes in Computer Science, vol. 8836, pp. 357--364, January 2014.

P. Chatziadam, I.G. Askoxylakis, and A. Fragkiadakis, ``A Network Telescope for Early Warning Intrusion Detection'', Lecture Notes in Computer Science, vol. 8533, pp. 11--22, January 2014.

Lecture Notes in Computer Science (LNCS)

A.R. Yusof, N.I. Udzir, and A. Selamat, ``An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack'', Lecture Notes in Computer Science (LNCS), vol. 9799, pp. 95--102, August 2016.

G. Nomikos and X. Dimitropoulos, ``traIXroute: Detecting IXPs in traceroute paths'', Lecture Notes in Computer Science (LNCS), vol. 9631, pp. 346--358, March 2016.

R. Fanou, P. Francois, and E. Aben, ``On the diversity of interdomain routing in Africa'', Lecture Notes in Computer Science (LNCS), vol. 8895, pp. 41--54, March 2015.

Lecture Notes in Social Networks (LNSN)

H. Alrashed, ``Delta hyperbolicity and the core-periphery structure in graphs'', Lecture Notes in Social Networks (LNSN), pp. 23--43, May 2018.

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

J. Chavula, N. Fearnster, A. Bagula, and H. Suleman, ``Quantifying the effects of circuitous routes on the latency of intra-Africa Internet traffic: A study of research and education networks'', Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 147, pp. 64--73, April 2015.

Linkoping Univ.

M. Niemela, ``Estimating Internet-scale Quality of Service parameters for VoIP'', M.S. thesis, Linkoping Univ., March 2016.

J. Leguay, ``An analysis on the Internet topology'', M.S. thesis, Linkoping Univ., March 2004.

Local Computer Networks Conf. Workshops (LCNW)

E. Balkanli, A.N. Zincir-Heywood, and M.I. Heywood, ``Feature selection for robust backscatter DDoS detection'', in Local Computer Networks Conf. Workshops (LCNW), October 2015, pp. 611--618.

Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4

W. Eberle, L. Holder, and D. Cook, ``Identifying threats using graph-based anomaly detection'', in Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4, J.J.P Tsai and P.S. Yu, Eds. April 2009, pp. 73--108, Springer.

MajecSTIC

F. de Montgolfier, M. Soto, and L. Viennot, ``Autour du caractere arborescent d'Internet'', in MajecSTIC 2010, October 2010, p. (8 pages).

Malicious Attack Propagation and Source Identification

J. Jiang, S. Wen, S. Yu, B. Liu, Y. Xiang, and W. Zhou, ``Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator'', Malicious Attack Propagation and Source Identification, p. (8 pages), January 2019.

Management Information Systems Quarterly

K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attack'', Management Information Systems Quarterly, vol. 41, pp. (28 pages), May 2016.

Masaryk Univ.

O. Zoder, ``Real-time detection of communication with blacklisted network hosts'', Tech. rep., Masaryk Univ., April 2018.

F. Halas, ``Performance measurement of stream data processing in Apache Spark'', M.S. thesis, Masaryk Univ., April 2017.

V. Bukac, Small scale denial of service attacks, Ph.D. thesis, Masaryk Univ., July 2015.

Massachusetts Inst. of Technology

A. Narayan, ``The design and implementation of a congestion control plane'', M.S. thesis, Massachusetts Inst. of Technology, February 2019.

MDPI J.

W.J.A. Silva and D.F.H. Sadok, ``A survey on efforts to evolve the control plane of inter-domain routing'', MDPI J., vol. 9, no. 5, pp. (26 pages), May 2018.

Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project

N.B. Melazzi, A. A.~Detti, and M. Pomposini, ``Scalability measurements in an information-centric network'', in Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project, May 2012, vol. 7586 of Lecture Notes in Computer Science, pp. 81--106.

Mediterranean Conf. on Algorithms

G. D'Angelo, M. D'Emidio, D. Frigioni, and D. Romano, ``Enhancing the computation of distributed shortest paths on real dynamic networks'', in Mediterranean Conf. on Algorithms, November 2012, vol. 7659 of Lecture Notes in Computer Science, pp. 148--158.

Meeting on Algorithmic Aspects of Telecommunications (ALGOTEL)

C. Gavoille, C. Glacet, N. Hanusse, and D. Ilcinkas, ``Routing the Internet with fifteen entries'', in Meeting on Algorithmic Aspects of Telecommunications (ALGOTEL), June 2015, p. (5 pages).

Michigan State Univ.

E. Norige, Hardware algorithms for high-speed packet processing, Ph.D. thesis, Michigan State Univ., January 2017.

Microelectronics Reliability

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``Efficient implementation of error correction codes in hash tables'', Microelectronics Reliability, vol. 54, no. 1, pp. 338--340, January 2014.

Microsystem Technologies

D. Boro and D.K Bhattacharyya, ``DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks'', Microsystem Technologies, vol. 23, no. 3, pp. 593--611, March 2017.

Midstates Conf. on Undergraduate Research in Computer Science and Mathematics

E.K. Takahashi, Y. Chen, and A. Lall, ``Divergence in network traffic'', in Midstates Conf. on Undergraduate Research in Computer Science and Mathematics, November 2011, p. (10 pages).

Mobile Information Systems

N. Dao, D. Vu, Y. Lee, S. Cho, C. Cho, and H. Kim, ``Pattern-identified online task scheduling in multitier edge computing for industrial IoT services'', Mobile Information Systems, vol. 2018, pp. (9 pages), April 2018.

Mobile Networks and Applications

Y. Sun, M. Li, S. Su, Z. Tian, W. Shi, and M. Han, ``Secure data sharing framework via hierarchical greedy embedding in darknets'', Mobile Networks and Applications, p. (9 pages), August 2019.

Y. Wang, J. Bi, and K. Zhang, ``A SDN-based framework for fine-grainedinter-domain routing diversity'', Mobile Networks and Applications, vol. 22, no. 5, pp. 1--12, April 2017.

Multi-media Conf.

D. Huang, J. Zhao, and X. Wang, ``Trading bandwidth for playback lag: Can active peers help?'', in Multi-media Conf., October 2010, pp. 791--794.

Multimedia Tools and Applications

K. Bhushan and B.~B. Gupta, ``Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing'', Multimedia Tools and Applications, vol. 78, pp. (32 pages), January 2019.

Natl Conf. on Communications (NCC)

S. Saurabh and A.~S. Sairam, ``Inferring the deployment of source address validation filtering using silence of path-backscatter'', in Natl Conf. on Communications (NCC), January 2018, p. (6 pages).

Natl Inst. of Technology, Rourkela

S. Sharma, ``Shuffling based mechanism for DDoS prevention on cloud environment'', M.S. thesis, Natl Inst. of Technology, Rourkela, May 2015.

Nature Communications

K.-K. Kleineberg, ``Metric clusters in evolutionary games on scale-free networks'', Nature Communications, vol. 8, pp. (8 pages), December 2017.

Nature Physics

K.-K. Kleineberg, M. Boguna, A. Serrano, and F. Papadopoulos, ``Hidden geometric correlations in real multiplex networks'', Nature Physics, vol. 12, pp. 1076--1081, July 2016.

Nature Scientific Reports

C. Zhang, S. Zhou, J. Miller, I. Cox, and B. Chain, ``Optimizing hybrid spreading in metapopulations'', Nature Scientific Reports, vol. 5, April 2015.

Naval Postgraduate School

D. Glasser, Longitudinal study of large-scale traceroute results, Ph.D. thesis, Naval Postgraduate School, March 2018.

B. Chainourov, ``Log analysis using Splunk Hadoop Connect'', M.S. thesis, Naval Postgraduate School, June 2017.

E.W. Gaston, ``High-frequency mapping of the IPv6 Internet using Yarrp'', M.S. thesis, Naval Postgraduate School, March 2017.

B. Greunke, ``Distributed emulation in support of large networks'', M.S. thesis, Naval Postgraduate School, June 2016.

W. Phua, ``Detection of active topology probing deception'', M.S. thesis, Naval Postgraduate School, September 2015.

M.D. Gray, ``Discovery of IPv6 router interface addresses via heuristic methods'', M.S. thesis, Naval Postgraduate School, September 2015.

E.C. Rye, ``Evaluating the limits of network topology inference via virtualized network emulation'', M.S. thesis, Naval Postgraduate School, June 2015.

A. West, ``Toward a robust method of presenting a rich, interconnected deceptive network topology'', M.S. thesis, Naval Postgraduate School, March 2015.

E. Rye and J. Rohrer, ``Graph reduction for emulated network experimentation'', Tech. rep., Naval Postgraduate School, March 2015.

B. LaFever, ``Methods for intelligent mapping of the IPv6 address space'', M.S. thesis, Naval Postgraduate School, March 2015.

L.D. Mosley, ``IPv6 network infrastructure and stability inference'', M.S. thesis, Naval Postgraduate School, September 2014.

J.E. Wright, ``Temporal comparisons of Internet topology'', M.S. thesis, Naval Postgraduate School, June 2014.

B. Landry, ``Comparing internet probing methodologies through an analysis of large dynamic graphs'', M.S. thesis, Naval Postgraduate School, June 2014.

T.V.H. Tran, ``IPv6 geolocation using latency constraints'', M.S. thesis, Naval Postgraduate School, March 2014.

Naval Postgraduate School, Monterey, CA, US

S. Marcisak, ``Correlating inferred data plane IPv6 reboot events with control plane BGP activity'', M.S. thesis, Naval Postgraduate School, Monterey, CA, US, March 2016.

S.L. Garfinkel and M. Shick, ``Passive TCP reconstruction and forensic analysis with tcpflow'', Tech. rep., Naval Postgraduate School, Monterey, CA, US, September 2013.

L.H.A. Daryl, ``Toward large-graph comparison measures to understand Internet topology dynamics'', M.S. thesis, Naval Postgraduate School, Monterey, CA, US, September 2013.

Nec Corp.

Y. Miyao, ``Network operation system, network operation method and network operation program'', Tech. rep., Nec Corp., December 2015.

Y. Miyao, ``Network designing system, network designing method, data transfer path determination method and network designing program'', Tech. rep., Nec Corp., November 2015.

Network and Distributed System Security Symp. (NDSS)

J. Deng, H. Li, H. Hu, K.C. Wang, G.J. Ahn, Z. Zhao, and W. Han, ``On the safety and efficiency of virtual firewall elasticity control'', in Network and Distributed System Security Symp. (NDSS), February 2017, p. (15 pages).

P. Mell, R. Harang, and A. Gueye, ``The resilience of the Internet to colluding country induced connectivity disruptions'', in Network and Distributed System Security Symp. (NDSS), February 2015.

A. Houmansadr, E.L. Wong, and V. Shmatikov, ``No direction home: The true cost of routing around decoys'', in Network and Distributed System Security Symp. (NDSS), February 2014, p. (14 pages).

C. Wacek, H. Tan, K. Bauer, and M. Sherr, ``An empirical evaluation of relay selection in Tor'', in Network and Distributed System Security Symp. (NDSS), February 2013, p. (17 pages).

Network Operations and Management Symp.

M. Cermak, D. Tovarnak, M. Lastovicka, and P. Caleda, ``A performance benchmark for NetFlow data analysis on distributed stream processing systems'', in Network Operations and Management Symp., July 2016, pp. 919--924.

Network Operations and Management Symp. (APNOMS)

M. Li, H. Wang, and J. Yang, ``Flattening and preferential attachment in the Internet evolution'', in Network Operations and Management Symp. (APNOMS), September 2012, p. (8 pages).

Network Traffic Anomaly Detection and Prevention

M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``A systematic hands-on approach to generate real-life intrusion datasets'', in Network Traffic Anomaly Detection and Prevention, September 2017, Computer Communications and Networks, pp. 71--114.

M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``Practical tools for attackers and defenders'', in Network Traffic Anomaly Detection and Prevention, September 2017, Computer Communications and Networks, pp. 201--242.

Network Traffic Measurement and Analysis Conf.

M. Wachs, Q. Scheitle, and G. Carle, ``Push away your privacy: Precise user tracking based on TLS client certificate authentication'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).

Q. Scheitle, O. Gasser, P. Sattler, and G. Carle, ``HLOC: Hints-based geolocation leveraging multiple measurement frameworks'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).

J. Mirkovic, G. Bartlett, J. Heidemann, H. Shi, and X. Deng, ``Do you see me now? Sparsity in passive observations of address liveness'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).

Network Traffic Measurement and Analysis Conf. (TMA)

S. Wassermann and P. Casas, ``Distributed Internet paths performance analysis through machine learning'', in Network Traffic Measurement and Analysis Conf. (TMA), October 2018, p. (2 pages).

W.~B. de Vries, R.~V. Rijswijk-Deij, P.~T. de Boer, and A. Pras, ``Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google'', in Network Traffic Measurement and Analysis Conf. (TMA), January 2018, p. (8 pages).

M. Cermak, T. Jirsik, P. Velan, J. Komarkova, S. Spacek, M. Drasar, and T. Plesnik, ``Towards provable network traffic measurement and analysis via semi-labeled trace datasets'', in Network Traffic Measurement and Analysis Conf. (TMA), January 2018, p. (8 pages).

J.F. Grailet and B. Donnet, ``Towards a renewed alias resolution with space search reduction and IP fingerprinting'', in Network Traffic Measurement and Analysis Conf. (TMA), June 2017, p. (9 pages).

Network Traffic Measurement and Analysis Conference (TMA)

J.~M. Del~Fiore, P. Merindol, V. Persico, C. Pelsser, and A. Pescape, ``Filtering the noise to reveal inter-domain lies'', in Network Traffic Measurement and Analysis Conference (TMA), January 2019, p. (8 pages).

Networking

D. Saucez and B. Donnet, ``On the dynamics of locators in LISP'', in Networking 2012, May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 385--396.

S. Hasan and S. Gorinsky, ``Obscure giants: detecting the provider-free ASes'', in Networking 2012, May 2012, vol. 7290 of Lecture Notes in Computer Science, pp. 149--160.

W.K. Chai, D. He, I. Psaras, and G. Pavlou, ``Cache 'less for more' in information-centric networks'', in Networking 2012, May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 27--40.

Networking Conf. (IFIP Networking) and Workshops

M. Amer, A. Busson, and I.~G. Lassous, ``Association Optimization in Wi-Fi Networks based on the Channel Busy Time Estimation'', in Networking Conf. (IFIP Networking) and Workshops, January 2018, p. (9 pages).

Networking Conf. (IFIP)

N. Tao, X. Chen, and X. Fu, ``AS path inference: From complex network perspective'', in Networking Conf. (IFIP), May 2015, p. (9 pages).

O. Ascigil, K.L. Calvert, and J.N. Griffioen, ``On the scalability of interdomain path computations'', in Networking Conf. (IFIP), June 2014, pp. 1--9.

Networks

M. Abu-Ata and F.F. Dragan, ``Metric tree-like structures in real-world networks: an empirical study'', Networks, vol. 67, no. 1, pp. 49--68, August 2015.

Networks and Heterogeneous Media

A. Jamakovic and S. Uhlig, ``On the relationships between topological measures in real-world networks'', Networks and Heterogeneous Media, vol. 3, no. 2, pp. 349--355, June 2008.

Networks and Optical Communications (NOC)

S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Bounded energy consumption with dynamic packet coalescing'', in Networks and Optical Communications (NOC), June 2012, p. (5 pages).

Neural Computation

J.Y. Suen and S. Navlakha, ``Using inspiration from synaptic plasticity rules to optimize traffic flow in distributed engineered networks'', Neural Computation, vol. 29, no. 5, pp. 1204--1228, May 2017.

Neural, Parallel and Scientific Computations

A. Iliev, N. Kyurkchiev, A. Rahnev, and T. Terzieva, ``Some New Approaches for Modelling Large-scale Worm Spreading on the Internet. II'', Neural, Parallel and Scientific Computations, vol. 27, pp. (13 pages), January 2019.

Neurocomputing

J. Shan, J. Luo, G. Ni, Z. Wu, and W. Duan, ``CVS: Fast cardinality estimation for large-scale data streams over sliding windows'', Neurocomputing, vol. 194, pp. 107--116, June 2016.

New Generation Computing

Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing the impact of cascading failures on the interdomain routing system of the Internet'', New Generation Computing, vol. 32, no. 3-4, pp. 237--255, August 2014.

New J. of Physics

M. Alessandro and C.C. Vittorio, ``Leveraging the nonuniform PSO network model as a benchmark for performance evaluation in community detection and link prediction'', New J. of Physics, vol. 20, pp. (23 pages), June 2018.

New J. Physics

M.G. Beiro, J.I. Alvarez-Hamelin, and J.R. Busch, ``A low complexity visualization tool that helps to perform complex systems analysis'', New J. Physics, vol. 10, no. 12, pp. 125003, December 2008.

Northeastern Univ.

S.L. Cortes, Jurisdictional arbitrage: Quantifying and counteracting the threat of government intelligence agencies against Tor, Ph.D. thesis, Northeastern Univ., December 2017.

Norwegian Univ. of Science and Technology

M.A.J. Markman and S. Tokheim, ``Reliable broadcast contribution over the public Internet'', M.S. thesis, Norwegian Univ. of Science and Technology, June 2012.

Operations Research

T. Erlebach, L.S. Moonen, F.C.R. Spieksma, and D. Vukadinovic, ``Connectivity measures for internet topologies on the level of autonomous systems'', Operations Research, vol. 57, no. 4, pp. 1006--1025, July 2009.

Optical Switching and Networking

A. Leiva, J.M. Finochietto, B. Huiszoon, V. Lopez, M. Tarifeno, J. Aracil, and A. Beghelli, ``Comparison in power consumption of static and dynamic WDM networks'', Optical Switching and Networking, vol. 8, no. 3, pp. 149--161, July 2011.

D. Larrabeiti, P. Reviriego, J.A. Hernandez, J.A. Maestro, and M.. Uruena, ``Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability'', Optical Switching and Networking, vol. 8, no. 3, pp. 131--138, July 2011.

OSA Photonics in Switching (PS)

P. Reviriego, D. Larrabeiti, and J.A. Maestro, ``Would energy efficient ethernet be effective on 10Gbps optical links?'', in OSA Photonics in Switching (PS), July 2010.

Packet Video Workshop (PV)

D. Ren and S.G. Chan, ``Achieving high-bitrate overlay live streaming with proxy helpers'', in Packet Video Workshop (PV), May 2012, pp. 7--12.

Pakistan Section Multitopic Conf.

U. Tariq, M. Hong, and K. Lhee, ``PMS an expeditious marking scheme to combat with the DDoS attack'', in Pakistan Section Multitopic Conf., December 2005, p. (4 pages).

Pan African Conf. on Science, Computing and Telecommunications (PACT)

N. Ochieng, A. Ismail, M. Waweru, and J. Orero, ``Detecting scanning computer worms using machine learning and darkspace network traffic'', in Pan African Conf. on Science, Computing and Telecommunications (PACT), March 2017, p. (6 pages).

Parallel and Distributed Processing Symp. Workshops (IPDPSW)

Y. Liu, J. Su, and R.K.C. Chang, ``LDC: Detecting BGP prefix hijacking by load distribution change'', in Parallel and Distributed Processing Symp. Workshops (IPDPSW), May 2012, pp. 1197--1203.

Parallel Computing

J. Fairbanks, R. Kannan, H. Park, and D. Bader, ``Behavioral clusters in dynamic graphs'', Parallel Computing, vol. 47, pp. 38--50, March 2015.

ParisTech

L. Liquori, R. Gaeta, and M. Sereno, ``A network aware resource discovery service'', Tech. rep., ParisTech, November 2019.

Q. Jacquemart, Towards uncovering BGP hijacking attacks, Ph.D. thesis, ParisTech, December 2016.

Passive and Active Measurement (PAM)

D. Veitch and K. Vijayalayan, ``Network timing and the 2015 leap second'', in Passive and Active Measurement (PAM), March 2016, vol. 9631 of Lecture Notes in Computer Science (LNCS), pp. 385--396.

Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``A brief history of MPLS usage in IPv6'', in Passive and Active Measurement (PAM), March 2016, Lecture Notes in Computer Science.

R. Mazloum, M.-O. Buob, J. Auge, B. Baynat, D. Ross, and T. Friedman, ``Violation of interdomain routing assumptions'', in Passive and Active Measurement (PAM), March 2014, p. (10 pages).

G. Baltra, R. Beverly, and G.G. Xie, ``Ingress point spreading: A new primitive for adaptive active network mapping'', in Passive and Active Measurement (PAM), March 2014, vol. 8362 of Lecture Notes in Computer Science (LNCS), pp. 56--66.

P. Marchetta, W. de Donato, and A. Pescape, ``Detecting third-party addresses in traceroute traces with IP timestamp option'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science (LNCS), pp. 21--30.

R. Hofstede, I. Drago, A. Sperotto, R. Sadre, and A. Pras, ``Measurement artifacts in NetFlow data'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science, pp. 1--10.

S. Gangam, J. Chandrashekar, I. Cunha, and J. Kurose, ``Estimating TCP latency approximately with passive measurements'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science (LNCS), pp. 83--93.

C. Lee, D.K. Lee, and S. Moon, ``Unmasking the growing UDP traffic in a campus network'', in Passive and Active Measurement (PAM), March 2012, vol. 7192 of Lecture Notes in Computer Science, pp. 1--10.

Y. Zhang, R. Oliveira, H. Zhang, and L. Zhang, ``Quantifying the pitfalls of traceroute in AS connectivity inference'', in Passive and Active Measurement (PAM), A. Krishnamurthy and B. Plattner, Eds. April 2010, vol. 6032 of Lecture Notes in Computer Science (LNCS), pp. 91--100, Springer.

J.-J. Pansiot, P. Merindol, B. Donnet, and O. Bonaventura, ``Extracting intra-domain topology from mrinfo probing'', in Passive and Active Measurement (PAM), A. Krishnamurthy and B. Plattner, Eds. April 2010, vol. 6032 of Lecture Notes in Computer Science (LNCS), pp. 81--90, Springer.

C. Lumezanu, R. Baden, N. Spring, and B. Bhattacharjee, ``Triangle inequality and routing policy violations in the internet'', in Passive and Active Measurement (PAM), March 2009, vol. 5448 of Lecture Notes in Computer Science (LNCS), pp. 45--54.

M.H. Gunes and K. Sarac, ``Analyzing router responsiveness to active measurement probes'', in Passive and Active Measurement (PAM), March 2009, vol. 5448 of Lecture Notes in Computer Science (LNCS), pp. 23--32.

A. Shriram and J. Kaur, ``Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth'', in Passive and Active Measurement (PAM), April 2006.

B. Donnet, T. Friedman, and M. Crovella, ``Improved algorithms for network topology discovery'', in Passive and Active Measurement (PAM), March 2005, vol. 3431 of Lecture Notes in Computer Science (LNCS), pp. 149--162.

L. Tang and M. Crovella, ``Geometric exploration of the landmark selection problem'', in Passive and Active Measurement (PAM), May 2004, vol. 3015 of Lecture Notes in Computer Science (LNCS), pp. 63--72.

Pattern Recognition Letters

M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection'', Pattern Recognition Letters, vol. 51, no. C, pp. 1--7, January 2015.

Peer-to-Peer Networking and Applications

C. Lin, Y. Bi, H. Zhao, and W. Cai, ``Research on bottleneck-delay in internet based on IP united mapping'', Peer-to-Peer Networking and Applications, pp. 1--13, July 2016.

A.G. Medrano-Chavez, E. Perez-Cortes, and M. Lopez-Guerrero, ``A performance comparison of Chord and Kademlia DHTs in high churn scenarios'', Peer-to-Peer Networking and Applications, vol. 8, pp. 807--821, June 2014.

Performance Evaluation

J. Chen, R.G. Addie, and M. Zukerman, ``Performance evaluation and service rate provisioning for a queue with fractional Brownian input'', Performance Evaluation, vol. 70, no. 11, pp. 1028--1045, November 2013.

Periodical of Ocean Univ. of China

P. Li, J. Bi, and Z. Zhou, ``A backscatter technology based study on source address spoofing'', Periodical of Ocean Univ. of China, vol. 38, pp. 125--128, January 2008.

Pervasive and Mobile Computing

R.~B. Basat, G. Einziger, and R. Friedman, ``Fast flow volume estimation'', Pervasive and Mobile Computing, vol. 48, January 2018.

Photonic Network Communications

C. Tunc and N. Akar, ``Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networks'', Photonic Network Communications, p. (11 pages), August 2014.

Phys. Rev. E

F. Papadopoulos, R. Aldecoa, and D. Krioukov, ``Network geometry inference using common neighbors'', Phys. Rev. E, vol. 92, pp. (16 pages), August 2015.

D. Hric, R.K. Darst, and S. Fortunato, ``Community detection in networks: Structural communities versus ground truth'', Phys. Rev. E, vol. 90, December 2014.

S. Melnik, A. Hackett, M.A. Porter, P.J. Mucha, and J.P. Gleeson, ``The unreasonable effectiveness of tree-based theory for networks with clustering'', Phys. Rev. E, vol. 83, March 2011.

Y. Xiao, B.D. MacArthur, H. Wang, M. Xiong, and W. Wang, ``Network quotients: structural skeletons of complex systems'', Phys. Rev. E, vol. 78, pp. 046102 (7 pages), January 2008.

Phys. Rev. Lett.

A.V. Goltsev, S.N. Dorogovtsev, J.G. Oliveira, and J.F.F. Mendes, ``Localization and spreading of diseases in complex networks'', Phys. Rev. Lett., vol. 109, pp. 128702, September 2012.

J.G. Restrepo, E. Ott, and B.R. Hunt, ``Characterizing the dynamical importance of network nodes and links'', Phys. Rev. Lett., vol. 97, pp. 094102 (4 pages), September 2006.

Physica A: Statistical Mechanics and its Applications

Z. Fan, Z. Han, W.~K.~S. Tang, and D. Lin, ``Relay-based information broadcast in complex networks'', Physica A: Statistical Mechanics and its Applications, vol. 495, pp. (13 pages), January 2018.

X. Zhang, G. Xu, and Y. Xia, ``Optimal defense resource allocation in scale-free networks'', Physica A: Statistical Mechanics and its Applications, vol. 492, pp. 2198--2204, January 2017.

Z. Wang, Q. Li, F. Jin, W. Xiong, and Y. Wu, ``Hyperbolic mapping of complex networks based on community information'', Physica A: Statistical Mechanics and its Applications, vol. 455, pp. 104--119, August 2016.

Z. Wang, Y. Wu, Q. Li, F. Jin, and W. Xiong, ``Link prediction based on hyperbolic mapping with community structure for complex networks'', Physica A: Statistical Mechanics and its Applications, vol. 450, pp. 609--623, May 2016.

X. Li, H. Wu, C. Scoglio, and D. Gruenbacher, ``Robust allocation of weighted dependency links in cyber-physical networks'', Physica A: Statistical Mechanics and its Applications, vol. 433, pp. 316--327, September 2015.

B-L Dou, X-G Wang, and S-Y Zhang, ``Robustness of networks against cascading failures'', Physica A: Statistical Mechanics and its Applications, vol. 389, no. 11, pp. 2310--2317, May 2010.

A. Korn, A. Schubert, and A. Telcs, ``Lobby index in networks'', Physica A: Statistical Mechanics and its Applications, vol. 388, no. 11, pp. 2221--2226, June 2009.

B. Xiao, L. Liu, X. Guo, and K. Xu, ``Modeling the IPv6 internet AS-level topology'', Physica A: Statistical Mechanics and its Applications, vol. 388, no. 4, pp. 529--540, February 2009.

Physical Review

F. Viger, A. Barrat, L. Dallasta, C. Zhang, and E. Kolaczyk, ``What is the real size of a sampled network? The case of the Internet'', Physical Review, vol. 75, no. 5, pp. (10 pages), May 2007.

Physics Review E

F. Papadopoulos and K.~K. Kleineberg, ``Link persistence and conditional distances in multiplex networks'', Physics Review E, vol. 99, pp. (18 pages), January 2019.

PLOS One

J. Lee, D. Choi, and L Sael, ``CTD: Fast, accurate, and interpretable method for static and dynamic tensor decompositions'', PLOS One, vol. 13, no. 7, pp. (18 pages), July 2018.

PLoS One

N.-N. Dao, J. Kim, M. Park, and S. Cho, ``Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks'', PLoS One, vol. 11, no. 8, pp. (24 pages), August 2016.

Plos One

D. Engel and T.W. Malone, ``Integrated information as a metric for group interaction'', Plos One, vol. 13, no. 10, pp. (19 pages), November 2018.

C. Zhang, S. Zhou, and B. Chain, ``Hybrid epidemics - A case study on computer worm Conficker'', Plos One, vol. 10, no. 5, May 2015.

M.A. Serrano and P. De~Los~Rios, ``Structural efficiency of percolated landscapes in flow networks'', Plos One, vol. 3, no. 11, November 2008.

preprints.org

I. Sarker, ``Cybersecurity Data Science: An Overview from Machine Learning Perspective'', Tech. rep., preprints.org, June 2020.

M. D'Emidio and D. Frigioni, ``Distance-vector algorithms for distributed shortest paths on dynamic power-law networks'', Tech. rep., preprints.org, July 2017.

Princeton Univ.

A. Gupta, Flexible and scalable systems for network management, Ph.D. thesis, Princeton Univ., October 2018.

M. Ghasemi, Data-driven management of CDN performance, Ph.D. thesis, Princeton Univ., December 2017.

N. Katta, Building efficient and reliable software-defined networks, Ph.D. thesis, Princeton Univ., November 2016.

J. Cesareo, ``Optimizing implicit proxy placement to evade traffic filters'', M.S. thesis, Princeton Univ., June 2012.

J. Cesareo, J. Karlin, M. Schapira, and J. Rexford, ``Optimizing the placement of implicit proxies'', Tech. rep., Princeton Univ., June 2012.

Principles, Systems and Applications of IP Telecommunications (IPTComm)

A. Knauf, G. Hege, T.C. Schmidt, and M. Wahlisch, ``A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP'', in Principles, Systems and Applications of IP Telecommunications (IPTComm), August 2010.

Privacy Enhancing Technologies

H. Tan, M. Sherr, and W. Zhou, ``Data-plane defenses against routing attacks on Tor'', in Privacy Enhancing Technologies, July 2016, vol. 2016 (4), pp. 276--293.

J. Juen, A. Johnson, A. Das, N. Borisov, and M. Caesar, ``Defending Tor from network adversaries: A case study of network path prediction'', in Privacy Enhancing Technologies, June 2015, vol. 2015, pp. 171--187.

Problems of information technology

A. Nabiyev, ``Application of clustering methods network traffic for detecting DDoS attacks'', Problems of information technology, vol. 1, pp. 98--107, January 2018.

Proc. Intl Symp. on High-Performance Parallel and Distributed Computing (HPDC)

G. Grigoryan, Y. Liu, and M. Kwon, ``Boosting FIB caching performance with aggregation'', in Proc. Intl Symp. on High-Performance Parallel and Distributed Computing (HPDC), June 2020, pp. 221--232.

Proc. of the Very Large Data Bases Endowment

Q. Huang and P. Lee, ``Toward high-performance distributed stream processing via approximate fault tolerance'', Proc. of the Very Large Data Bases Endowment, vol. 10, no. 3, pp. 73--84, November 2016.

Proc. of the Workshop on Mobility in the Evolving Internet Architecture

F. Bronzino, S. Mukherjee, and D. Raychaudhuri, ``The named-object abstraction for realizing advanced mobility services in the future Internet'', in Proc. of the Workshop on Mobility in the Evolving Internet Architecture, August 2017, pp. 37--42.

Proc. on Privacy Enhancing Technologies

C. Bocovich and I. Goldberg, ``Secure asymmetry and deployability for decoy routing systems'', Proc. on Privacy Enhancing Technologies, vol. 2018, no. 3, pp. 43--62, April 2018.

M Imani, A. Barton, and M. Wright, ``Guard Sets in Tor using AS Relationships'', in Proc. on Privacy Enhancing Technologies, January 2018, vol. 2018 (1), pp. 145--165.

G. Asharov, D. Demmler, M. Schapira, T. Schneider, G. Segev, S. Shenker, and M. Zohner, ``Privacy-preserving interdomain routing at Internet scale'', Proc. on Privacy Enhancing Technologies, vol. 2017, no. 3, pp. 147--167, July 2017.

M. Imani, A. Barton, and M. Wright, ``Forming guard sets using AS relationships'', Proc. on Privacy Enhancing Technologies, vol. 2017, no. 3, pp. 1--20, June 2017.

C. Chen and A. Perrig, ``PHI: Path-hidden lightweight anonymity protocol at network layer'', Proc. on Privacy Enhancing Technologies, vol. 2017, no. 1, pp. 100--117, December 2016.

A. Barton and M. Wright, ``DeNASA: Destination-naive AS-awareness in anonymous communications'', Proc. on Privacy Enhancing Technologies, vol. 2016, no. 4, pp. 356--372, July 2016.

A.D. Jaggard, A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, ``20,000 in league under the sea: Anonymous communication, trust, MLATs, and undersea cables'', Proc. on Privacy Enhancing Technologies, vol. 2015, no. 1, pp. 4--24, April 2015.

Proc. SIGCOMM Conf.

R. Mahajan, D. Wetherall, and T. Anderson, ``Understanding BGP misconfiguration'', in Proc. SIGCOMM Conf., October 2002, vol. 32 (4) of Computer Communication Review, pp. 3--16.

Proc. Symp. on SDN Research (SOSR)

X. Liu, M. Shirazipour, M. Yu, and Y. Zhang, ``MOZART: Temporal coordination of measurement'', in Proc. Symp. on SDN Research (SOSR), March 2016, p. (12 pages).

Proc. Workshop on Algorithm Engineering and Experiments (ALENEX)

M. Mitzenmacher, S. Pontarelli, and P. Reviriego, ``Adaptive cuckoo filters'', in Proc. Workshop on Algorithm Engineering and Experiments (ALENEX), January 2018, p. (12 pages).

Procedia Computer Science

K. Bhushan and B.~B. Gupta, ``Hypothesis test for low-rate DDoS attack detection in cloud computing environment'', Procedia Computer Science, p. (9 pages), January 2018.

S. Behal and K. Kumar, ``Trends in validation of DDoS research'', Procedia Computer Science, vol. 85, pp. 7--15, June 2016.

J. David and C. Thomas, ``DDoS attack detection using fast entropy approach on flow-based network traffic'', Procedia Computer Science, vol. 50, pp. 30--36, May 2015.

Procedia Engineering

L. Zheng, P. Zou, Y. Jia, and W. Han, ``Traffic anomaly detection and containment using Filter-Ary-Sketch'', Procedia Engineering, vol. 29, pp. 4297--4306, January 2012.

Proceedings on Privacy Enhancing Technologies

G. Fragkouli, K. Argyraki, and B. Ford, ``MorphIT: Morphing Packet Reports for Internet Transparency'', in Proceedings on Privacy Enhancing Technologies, January 2019, Proceedings on Privacy Enhancing Technologies, p. (16 pages).

Project-Team MASCOTTE, INRIA

N. Cohen, D. Couderty, and A. Lancin, ``Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs'', Tech. rep., Project-Team MASCOTTE, INRIA, September 2012.

PSIRP (TR09-003)

J. Rajahalme, M. Sarela, K. Visala, and J. Riihijarvi, ``Inter-domain rendezvous service architecture'', Tech. rep., PSIRP (TR09-003), December 2009.

Purdue Univ.

N. Hegde, Q. Chang, and M. Kulkarni, ``D2P: Automatically creating distributed dynamic programming codes'', Tech. rep., Purdue Univ., October 2018.

Z. Sha, Decision-centric foundations for complex systems engineering and design, Ph.D. thesis, Purdue Univ., August 2015.

J. Seibert, Security and economic implications of localizing traffic in overlay networks, Ph.D. thesis, Purdue Univ., May 2012.

H. Sellke, C.-C. Wang, S. Bagchi, and N.B. Shroff, ``Camouflaging timing channels in web traffic'', Tech. rep., Purdue Univ., December 2009.

Quality of Service (IWQoS) Symp.

B. Liu, J. Lu, Y. Kai, Y. Wang, and T. Pan, ``Power-proportional router: Architectural design and experimental evaluation'', in Quality of Service (IWQoS) Symp., May 2014, pp. 344--349.

Queensland Univ. of Technology, Brisbane, Australia

S. Bhatia, Detecting Distributed Denial-of-Service attacks and flash events, Ph.D. thesis, Queensland Univ. of Technology, Brisbane, Australia, August 2013.

Radboud Univ.

L. Bade, ``Resilience of the Domain Name System: A case study for .nl'', M.S. thesis, Radboud Univ., August 2016.

RAID : Intl Symp. on Research in Attacks, Intrusions, and Defenses

A. Noroozian, M. Korczynski, C.H. Ganan, G. Makita, K. Yoshioka, and M. van Eeten, ``Who gets the boot? Analyzing victimization by DDoS-as-a-Service'', in RAID 2016: Intl Symp. on Research in Attacks, Intrusions, and Defenses, September 2016, vol. 9854 of Lecture Notes in Computer Science (LNCS), pp. 368--389.

Recent Advances in Learning Automata

A. Rezvanian, A.~M. Saghiri, S.~M. Vahidipour, M. Esnaashari, and M.~R. Meybodi, ``Learning Automata for Cognitive Peer-to-Peer Networks'', Recent Advances in Learning Automata, p. (58 pages), January 2018.

Recent Findings in Intelligent Computing Techniques

V.~R. Vipul, ``Hybrid Traceback Scheme for DDoS Attacks'', Recent Findings in Intelligent Computing Techniques, p. (7 pages), January 2019.

Rensselaer Polytechnic Inst. (ProQuest Publ.)

N. Rastogi, A Network Intrusion Detection System (NIDS) based on information centrality to identify systemic cyber attacks in large systems, Ph.D. thesis, Rensselaer Polytechnic Inst. (ProQuest Publ.), August 2018.

Research in Intl Business and Finance

T.T. Huang and B.Q. Sun, ``The impact of the Internet on global industry: New evidence of Internet measurement'', Research in Intl Business and Finance, vol. 37, pp. 93--112, September 2015.

Research Methods for the Digital Humanities, Ch. 2

L. Levenburg, ``On interdisciplinary studies of physical information infrastructure'', in Research Methods for the Digital Humanities, Ch. 2, November 2018, pp. 15--30.

Riga Tech. Univ.

A. Skrastins, Resource and admission management in Next Generation Networks, Ph.D. thesis, Riga Tech. Univ., March 2017.

Rochester Inst. of Technology

Y. Nozaki, Tiered based addressing in internetwork routing protocols for the future Internet, Ph.D. thesis, Rochester Inst. of Technology, August 2014.

H. Du, Probabilistic modeling and inference for obfuscated network attack sequences, Ph.D. thesis, Rochester Inst. of Technology, August 2014.

S. Strapp, ``Segmentation and model generation for large-scale cyber attacks'', M.S. thesis, Rochester Inst. of Technology, August 2013.

Rutgers, The State Univ. of New Jersey

S. Sriram, ``Edge-aware inter-domain routing protocol for the MobilityFirst Future Internet Architecture'', M.S. thesis, Rutgers, The State Univ. of New Jersey, October 2015.

Ryerson Univ.

M.J.R. Dennis, ``Machine-learning and statistical methods for DDoS attack detection and defense system in Software Defined Networks'', M.S. thesis, Ryerson Univ., January 2018.

SAIEE Africa Research J.

B. Irwin, ``A source analysis of the Conficker outbreak from a Network Telescope'', SAIEE Africa Research J., vol. 104, no. 2, pp. 38--88, June 2013.

Sapienza Univ. of Rome

S. Ciavarella, Network analysis and algorithm solutions in critical emergency scenarios, Ph.D. thesis, Sapienza Univ. of Rome, January 2017.

Science China Information Sciences

S. Li, H. Duan, Z. Wang, J. Liang, and X. Li, ``An accurate distributed scheme for detection of prefix interception'', Science China Information Sciences, vol. 59, pp. (17 pages), May 2016.

Y. Zhang, B.X. Fang, and Y.Z. Zhang, ``Identifying heavy hitters in high-speed network monitoring'', Science China Information Sciences, vol. 53, no. 3, pp. 659--676, March 2010.

Scientific Reports

I. Papp, L. Varga, M. Afifi, I. Gere, and Z. Neda, ``Scaling in the space-time of the Internet'', Scientific Reports, vol. 9, pp. (9 pages), January 2019.

K. Kleineberg and D. Helbing, ``Collective navigation of complex networks: Participatory greedy routing'', Scientific Reports, p. (9 pages), April 2017.

SDN-Polygraph

J. Suarez-Varela, P. Barlet-Ros, and V. Carela-Espanol, ``A NetFlow/IPFIX implementation with OpenFlow'', Tech. rep., SDN-Polygraph, January 2017.

Securecomm and Workshops

L. Zhang and Y. Guan, ``TOPO: a topology-aware single packet attack traceback scheme'', in Securecomm and Workshops, August 2006, pp. 1--10.

Security and Communication Networks

J. Cheng, M. Li, X. Tang, V.~S. Sheng, Y. Liu, and W. Guo, ``Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing'', Security and Communication Networks, vol. 2018, pp. (15 pages), January 2018.

L. Zhou, M. Liao, C. Yuan, and H. Zhang, ``Low-Rate DDoS Attack Detection Using Expectation of Packet Size'', Security and Communication Networks, p. (14 pages), January 2017.

R. Deka and D. Bhattacharya, ``Self-similarity based DDoS attack detection using Hurst parameter'', Security and Communication Networks, vol. 9, no. 17, pp. 4468--4481, November 2016.

N. Hoque, D.K. Bhattacharyya, and J.K. Kalita, ``FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis'', Security and Communication Networks, vol. 9, no. 13, pp. 2032--2041, September 2016.

A. Bhandari, A.L. Sangal, and K. Kumar, ``Characterizing flash events and distributed denial-of-service attacks: an empirical investigation'', Security and Communication Networks, vol. 9, no. 13, pp. 2222--2239, September 2016.

M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric'', Security and Communication Networks, vol. 9, no. 16, pp. 3251--3270, July 2016.

K. Giotis, G. Androulidakis, and V. Maglaris, ``A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox'', Security and Communication Networks, vol. 9, pp. 1958--1970, October 2015.

M. Wan, H.-K. Zhang, T.-Y. Wu, and C.-H. Lo, ``Anomaly detection and response approach based on mapping requests'', Security and Communication Networks, vol. 7, no. 12, pp. 2277--2292, December 2014.

M.S. Fallah and N. Kahani, ``TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks'', Security and Communication Networks, vol. 7, no. 2, pp. 245--264, February 2014.

N. Lu, Y. Wang, S. Su, F. Yang, and R. Han, ``Filtering location optimization for the reactive packet filtering'', Security and Communication Networks, vol. XX, no. X, pp. X, July 2013.

Security Comm. Networks

Y. Liu, W. Peng, and J. Su, ``A study of IP prefix hijacking in cloud computing networks'', Security Comm. Networks, vol. XX, no. X, pp. X, February 2013.

Selected Computing Research Papers - University of Sunderland

G. Bulman, ``A Critical Analysis of Current Measures for Preventing Use of Fraudulent Resources in Cloud Computing'', in Selected Computing Research Papers - University of Sunderland, January 2018, vol. 7, p. (7 pages).

semanticscholar.org

D. Moon, J. Naous, J. Liu, K. Zarifis, M. Casado, T. Koponen, S. Shenker, and L. Breslau, ``Bridging the software/hardware forwarding divide'', Tech. rep., semanticscholar.org, January 2010.

Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM)

J. Singh, ``Using looking glasses to understand the Internet's structure'', in Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), September 2016, pp. 47--53.

Sensors

P. Fondo-Ferreiro, M. Rodriguez-Perez, M. Fernandez-Veiga, and S. Herreria-Alonso, ``Matching SDN and legacy networking hardware for energy efficiency and bounded delay'', Sensors, vol. 18, no. 11, pp. (23 pages), November 2018.

M.~A.~S. Monge, J.~M. Vidal, and L.~J.~G. Villalba, ``Reasoning and Knowledge Acquisition Framework for 5G Network Analytics'', Sensors, vol. 17, January 2017.

Sensors and Materials

T.Y. Chang and C.J. Hsieh, ``Detection and Analysis of Distributed Denial-of-service in Internet of Things-Employing Artificial Neural Network and Apache Spark Platform'', Sensors and Materials, vol. 30, no. 4, pp. 857--867, April 2018.

Shortest Path Solvers. From Software to Wetware

G. D'Angelo, M. D'Emidio, and D. Frigioni, ``Distance-Vector Algorithms for Distributed Shortest Paths Computation in Dynamic Networks'', Shortest Path Solvers. From Software to Wetware, p. (45 pages), January 2018.

SIGCOMM Computer Communication Review

A. Gamperli, V. Kotronis, and X. Dimitropoulos, ``Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework'', SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 369--370, October 2014.

SIGCOMM workshop on Internet network management

R. Bush, J. Hiebert, O. Maennel, M. Roughan, and S. Uhlig, ``Testing the reachability of (new) address space'', in SIGCOMM workshop on Internet network management, August 2007, pp. 236--241.

SIGCOMM workshop on Large-Scale Attack Defense (LSAD)

H. Farhat, ``Protecting TCP services from denial of service attacks'', in SIGCOMM workshop on Large-Scale Attack Defense (LSAD), September 2006, pp. 155--160.

Simposio Brasileiro em Seguranca da Informacao e Sistemas

M. Righi and R. Nunes, ``Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas'', in Simposio Brasileiro em Seguranca da Informacao e Sistemas, November 2015, p. (4 pages).

Simulation Modelling Practice and Theory

Y. Lai, Y. Chen, Z. Liu, Z. Yang, and X. Li, ``On monitoring and predicting mobile network traffic abnormality'', Simulation Modelling Practice and Theory, vol. 50, pp. 176--188, January 2015.

Smart Collaborative Identifier Network

H. Zhang, W. Su, and W. Quan, ``Security technologies of SINET'', Smart Collaborative Identifier Network, vol. Part II, pp. 223--249, October 2016.

SN Computer Science

R. Niranjana, V. Kumar, and Shina Sheen, ``Darknet Traffic Analysis and Classification Using Numerical AGM and Mean Shift Clustering Algorithm'', SN Computer Science, vol. 1, pp. (10 pages), August 2019.

Social Computing, Behavioral-Cultural Modeling and Prediction (SBP)

S. Strapp and S. Yang, ``Segmenting large-scale cyber attacks for online behavior model generation'', in Social Computing, Behavioral-Cultural Modeling and Prediction (SBP), April 2014, vol. 8393 of Lecture Notes in Computer Science (LNCS), pp. 169--177.

Software Networking

I. Sharafaldin, A. Gharib, A. Lashkari, and A. Ghorbani, ``Towards a reliable Intrusion Detection benchmark dataset'', Software Networking, vol. 2017, no. 1, pp. 177--200, July 2017.

Special Issue Insider Attacks

P. Manso, J. Moura, and C. Serrao, ``SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks'', Special Issue Insider Attacks, p. (17 pages), January 2019.

Spring Simulation Conference (SpringSim)

N. Ghose, L. Lazos, J. Rozenblit, and R. Breiger, ``Multimodal Graph Analysis of Cyber Attacks'', in Spring Simulation Conference (SpringSim), January 2019, p. (12 pages).

Springer Proc. in Complexity

M.A. Canbaz, K. Bakhshaliyev, and M.H. Gunes, ``Router-level topologies of Autonomous Systems'', Springer Proc. in Complexity, vol. IX, pp. 243--257, February 2018.

SSICLOPS

A. Agache, G. Antichi, F. Eberhardt, L. Eggert, P. Hasselmeyer, O. Hohlfeld, M. Honda, A. Ivanov, M. Kimmerlin, S. Klauck, J. Kommeri, G. Lettieri, S. Oechsner, M. Plauth, C. Raiciu, A. Ripke, P. Sarolahti, L. Schulte, E. Tsolakou, and M. Wojcik, ``Initial design of cloud infrastructure and federation mechanisms'', Tech. rep., SSICLOPS, February 2016.

SSRN Electronic J.

B. Fabian, T. Ermakova, and Z. Ghazaryan, ``Internet connectivity of financial services - A graph-based analysis'', SSRN Electronic J., p. (31 pages), July 2018.

ssrn.com

B. Fabian, S. Kelkel, T. Ermakova, and A. Baumann, ``Attacking Internet Border Routers - A Graph-Based Analysis of Strategies'', Tech. rep., ssrn.com, January 2018.

Stanford Univ., Stanford, CA, US

N.A. Handigol, Using packet histories to troubleshoot networks, Ph.D. thesis, Stanford Univ., Stanford, CA, US, June 2013.

N. Beheshti-Zavareh, Tiny buffers for electronic and optical routers, Ph.D. thesis, Stanford Univ., Stanford, CA, US, December 2009.

State Univ. of New York at Buffalo

D. Ha and H. Ngo, ``On the trade-off between the expected number of infected nodes and expected propagation time of malcodes'', Tech. rep., State Univ. of New York at Buffalo, May 2007.

Statistical and Machine Learning Approaches for Network Analysis, Ch. 6

D. Fay, H. Haddadi, A.W. Moore, R. Mortier, A.G. Thomason, and S. Uhlig, ``Weighted spectral distribution: A metric for structural analysis of networks'', in Statistical and Machine Learning Approaches for Network Analysis, Ch. 6, June 2012, p. (38 pages).

Statistics and Probability Letters

H. Wu and G. Kvizhinadze, ``Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies'', Statistics and Probability Letters, vol. 81, no. 8, pp. 1128--1135, March 2011.

Stony Brook Univ.

M.R. Anwar, ``Investigating interdomain routing in the wild'', M.S. thesis, Stony Brook Univ., December 2016.

M. Niaz, ``Measuring routing policies on the Internet'', M.S. thesis, Stony Brook Univ., May 2015.

Studies in Computational Intelligence

F.M. Pouzols, D.R. Lopez, and A.B. Barros, ``Predictive models of network traffic load'', Studies in Computational Intelligence, vol. 342, pp. 87--145, January 2011.

Sustainable Computing: Informatics and Systems

H. Abaci, G. Parr, S. McClean, A. Moore, and L. Krug, ``Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirements'', Sustainable Computing: Informatics and Systems, vol. 10, pp. 1--19, January 2016.

Swarm and Evolutionary Computation

J. Vidal, A. Orozco, and L. Villalba, ``Adaptive artificial immune networks for mitigating DoS flooding attacks'', Swarm and Evolutionary Computation, vol. 38, pp. 94--108, February 2018.

Swedish National Computer Networking Workshop (SNCNW)

V. Pacifici and G. Dan, ``Stable content-peering of autonomous systems in a content-centric network'', in Swedish National Computer Networking Workshop (SNCNW), June 2013, p. (4 pages).

Swinburne Univ. of Technology

B. Al-Musawi, Detecting BGP anomalies using recurrence quantification analysis, Ph.D. thesis, Swinburne Univ. of Technology, January 2018.

Swiss Fed. Inst. of Technology Zurich

M. Pulfer, ``Multi-path routing'', M.S. thesis, Swiss Fed. Inst. of Technology Zurich, January 2019.

Symp. of Quality of Service (IWQoS)

M. Zhu, J. Li, Y. Liu, D. Li, and J. Wu, ``TED: Inter-domain traffic engineering via deflection'', in Symp. of Quality of Service (IWQoS), May 2014, pp. 117--122.

Symp. on Applications and the Internet (SAINT)

K. Fujikawa, H. Tazaki, and H. Harai, ``Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network'', in Symp. on Applications and the Internet (SAINT), July 2012, pp. 68--73.

M. Zhang, M. Dusi, W. John, and C. Chen, ``Analysis of UDP traffic usage on internet backbone links'', in Symp. on Applications and the Internet (SAINT), September 2009, pp. 280--281.

Symp. on Applied Machine Intelligence and Informatics (SAMI)

S.-N. Orzen, ``Domain relations in trees arborescence for interaction search on persistent routing availability'', in Symp. on Applied Machine Intelligence and Informatics (SAMI), January 2014.

Symp. on Architectures for Networking and Communications Systems

R.~B. Basat, G. Einziger, S.~L. Feibish, J. Moraney, and D. Raz, ``Network-wide routing-oblivious heavy hitters'', in Symp. on Architectures for Networking and Communications Systems, January 2018, p. (8 pages).

Symp. on Architectures for Networking and Communications Systems (ANCS)

G. Grigoryan and Y. Yaoqing~Liu, ``PFCA: a programmable FIB caching architecture'', in Symp. on Architectures for Networking and Communications Systems (ANCS), July 2018, pp. 97--103.

T. Wellem, Y.-K. Lai, and W.-Y. Chung, ``A software defined sketch system for traffic monitoring'', in Symp. on Architectures for Networking and Communications Systems (ANCS), May 2015, pp. 197--198.

T. Song, X. Shi, and X. Ma, ``Fine-grained power scaling algorithms for energy efficient routers'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2014, pp. 197--206.

N. Hua, E. Norige, S Kumar, and B. Lynch, ``Non-crypto hardware hash functions for high performance networking ASICs'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2011, pp. 156--166.

M. Zadnik and M. Canini, ``Evolution of cache replacement policies to track heavy-hitter flows'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2010, p. (2 pages).

Symp. on Biometrics and Security Technologies (ISBAST)

M. Barati, A. Abdullah, N.I. Udzir, R. Mahmod, and N. Mustapha, ``Distributed Denial of Service detection using hybrid machine learning technique'', in Symp. on Biometrics and Security Technologies (ISBAST), August 2014, pp. 268--273.

Symp. on Computer and Computational Sciences (IMSCSS)

X. Bi, W. Tan, and R. Xiao, ``A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems'', in Symp. on Computer and Computational Sciences (IMSCSS), October 2008, pp. 132--135.

Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)

P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``A method to protect Bloom filters from soft errors'', in Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), October 2015, pp. 80--84.

Symp. on Experimental Algorithms (SEA)

G. D'Angelo, M. D'Emidio, D. Frigioni, and V. Maurizio, ``Engineering a new loop-free shortest paths routing algorithm'', in Symp. on Experimental Algorithms (SEA), January 2012, vol. 7276 of Lecture Notes in Computer Science, pp. 123--134.

Symp. on High Performance Computing and Communications (HPCC)

V. Moreno, R. Leira, I. Gonzalez, and F.J. Gomez-Arribas, ``Towards high-performance network processing in virtualized environments'', in Symp. on High Performance Computing and Communications (HPCC), August 2015, pp. 535--540.

Symp. on Information and Communication Technology (SolCT)

D.Q. Le, T. Jeong, H.E. Roman, and J.W. Hong, ``Traffic dispersion graph based anomaly detection'', in Symp. on Information and Communication Technology (SolCT), October 2011, pp. 36--41.

Symp. on Integrated Network Management (IM)

R. Mijumbi, J. Serrat, and J.-L. Gorricho, ``Self-managed resources in network virtualisation environments'', in Symp. on Integrated Network Management (IM), May 2015, pp. 1099--1106.

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Investigating unique flow marking for tracing back DDoS attacks'', in Symp. on Integrated Network Management (IM), May 2015, pp. 762--765.

J. Jiang, J. Luo, W. Li, and Y. Lu, ``Constraint conditions to eliminate AS incentive of lying in interdomain routing'', in Symp. on Integrated Network Management (IM), May 2013, pp. 650--656.

Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt)

A. Faggiani, E. Gregori, L. Lenzini, S. Mainardi, and A. Vecchio, ``On the feasibility of measuring the internet through smartphone-based crowdsourcing'', in Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), May 2012, pp. 318--323.

Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)

D Hintze and A. Rice, ``Picky: efficient and reproducible sharing of large datasets using Merkle-trees'', in Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2016, p. (9 pages).

Symp. on Network and Distributed System Security (NDSS)

A. Houmansadr and N. Borisov, ``SWIRL: A scalable watermark to detect correlated network flows'', in Symp. on Network and Distributed System Security (NDSS), February 2011.

Symp. on Network Computing and Applications (NCA)

N. Rivetti, Y. Busnel, and A. Mostefaoui, ``Efficiently summarizing data streams over sliding windows'', in Symp. on Network Computing and Applications (NCA), September 2015, pp. 151--158.

Symp. on Network Operations and Management (NOMS)

M. Li, H. Wang, J. Yang, and C. Li, ``A value based framework for provider selection of regional ISPs'', in Symp. on Network Operations and Management (NOMS), May 2014, pp. 1--8.

Symp. on Parallel Architectures, Algorithms and Programming (PAAP)

M. Wang, H. Zhou, and J. Chen, ``OpenISMA: An approach of achieving a scalable OpenFlow network by identifiers separating and mapping'', in Symp. on Parallel Architectures, Algorithms and Programming (PAAP), December 2015, pp. 26--33.

Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS)

P.A. Frangoudis, A. Ksentini, Y. Hadjadj-Aoul, and G. Boime, ``PTPv2-based metwork load estimation'', in Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS), September 2013, pp. 101--106.

Symp. on Principles of Distributed Computing (PODC)

C. Gavoille, C. Glacet, N. Hanusse, and D. Ilcinkas, ``Brief announcement: Routing the Internet with very few entries'', in Symp. on Principles of Distributed Computing (PODC), July 2015, pp. 33--35.

Symp. on Privacy Enhancing Technologies (PETS)

J. Sankey and M. Wright, ``Dovetail: stronger anonymity in next-generation Internet routing'', in Symp. on Privacy Enhancing Technologies (PETS), July 2014, vol. 8555 of Lecture Notes in Computer Science (LNCS), pp. 283--303.

Symp. on Quality of Service (IWQoS)

N. Geng, Y. Yang, and M. Xu, ``Flow-level traffic engineering in conventional networks with hop-by-hop routing'', in Symp. on Quality of Service (IWQoS), January 2018.

Symp. on Recent Advances in Intrusion Detection (RAID)

M. Rajab, F. Monrose, and A. Terzis, ``Fast and evasive attacks: highlighting the challenges ahead'', in Symp. on Recent Advances in Intrusion Detection (RAID). September 2006, vol. 4219 of Lecture Notes in Computer Science, pp. 206--225, Springer.

Symp. on Reliable Distributed Systems (SRDS)

P. Ekparinya, V. Gramoli, and G. Jourjon, ``Impact of man-in-the-middle attacks on Ethereum'', in Symp. on Reliable Distributed Systems (SRDS), October 2018, p. (10 pages).

E. Anceaume, Y. Busnel, N. Rivetti, and B. Sericola, ``Identifying global icebergs in distributed streams'', in Symp. on Reliable Distributed Systems (SRDS), September 2015, pp. 266--275.

Symp. on Research in Computer Security (ESORICS)

A. Studer and A. Perrig, ``The coremelt attack'', in Symp. on Research in Computer Security (ESORICS), September 2009, vol. 5789 of Lecture Notes in Computer Science (LNCS), pp. 37--52.

Symp. on SDN Research

R. Harrison, Q. Cai, A. Gupta, and J. Rexford, ``Network-wide heavy hitter detection with commodity switches'', in Symp. on SDN Research, March 2018, p. (3 pages).

O. Alipourfard, M. Moshref, Y. Zhou, T. Yang, and M. Yu, ``A comparison of performance and accuracy of measurement algorithms in software'', in Symp. on SDN Research, March 2018, p. (14 pages).

V. Sivaraman, S. Narayana, O. Rottenstreich, S. Muthukrishnan, and J. Rexford, ``Heavy-hitter detection entirely in the data plane'', in Symp. on SDN Research, April 2017, pp. 164--176.

M. Ghasemi, T. Benson, and J. Rexford, ``Dapper: Data plane performance diagnosis of TCP'', in Symp. on SDN Research, April 2017, pp. 61--74.

V. Kotronis, R. Kloti, M. Rost, P. Georgopoulos, B. Ager, S. Schmid, and X. Dimitropoulos, ``Stitching inter-domain paths over IXPs'', in Symp. on SDN Research, March 2016, p. (12 pages).

N. Katta, O. Alipourfard, J. Rexfor, and D. Walker, ``CacheFlow: Dependency-aware rule-caching for Software-Defined Networks'', in Symp. on SDN Research, March 2016, p. (12 pages).

Symp. on SDN Research (SOSR)

R. Birkner, A. Gupta, N. Feamster, and L. Vanbever, ``SDX-based flexibility or Internet correctness?: Pick two!'', in Symp. on SDN Research (SOSR), April 2017, p. (7 pages).

Symp. on Security and Privacy

M. Apostolaki, A. Zohar, and L. Vanbever, ``Hijacking bitcoin: Routing attacks on cryptocurrencies'', in Symp. on Security and Privacy, June 2017, pp. 375--392.

Symp. on Security in Computing and Communications

V. Srihari and R. Anitha, ``DDoS detection system using wavelet features and semi-supervised learning'', in Symp. on Security in Computing and Communications, September 2014, vol. 467 of Communications in Computer and Information Science, pp. 291--303.

Symp. on Service-Oriented System Engineering (SOSE)

M.-F. Wu, T.M. Jiang, and A. Wu, ``A virtual service framework for service composition QoS based on active measurement'', in Symp. on Service-Oriented System Engineering (SOSE), December 2008, pp. 68--72.

Symp. on Telecommunications Network Strategy and Planning (NETWORKS)

H. Asai and H. Esaki, ``Towards interdomain transit traffic reduction in peer-assisted content delivery networks'', in Symp. on Telecommunications Network Strategy and Planning (NETWORKS), September 2010.

Technical Univ. of Munich

M. Wachs, A secure and resilient communication infrastructure for decentralized networking applications, Ph.D. thesis, Technical Univ. of Munich, February 2015.

Technische Univ. Berlin (TKN-09-004)

F. Idzikowski, ``Search and analysis of backbone traffic measurements in the internet'', Tech. rep., Technische Univ. Berlin (TKN-09-004), March 2009.

Technische Univ. Muenchen, Faculty of Informatics

M. Helminger, ``Interactive visualization of global routing dynamics'', Tech. rep., Technische Univ. Muenchen, Faculty of Informatics, June 2011.

Technometrics

M. Xu, L. Hua, and S. Xu, ``A vine copula model for predicting the effectiveness of cyber defense early-warning'', Technometrics, vol. 0, pp. (42), November 2016.

Tecnico Lisboa

J.M.M. Domingos, ``Characterization and monitoring of critical systems on national Internet'', M.S. thesis, Tecnico Lisboa, May 2017.

A.C.M. Sousa, ``Scaling the Internet routing system through route aggregation'', M.S. thesis, Tecnico Lisboa, October 2014.

Tel-Aviv Univ., Israel

B. Korenfeld, ``CBTree: A practical concurrent self-adjusting search tree'', M.S. thesis, Tel-Aviv Univ., Israel, May 2012.

Telecom

M.~J. Mirchev, ``On the Spectra of Scale-free and Small-World Networks'', in Telecom 2017, January 2017, p. (8 pages).

Telecommunications Forum (TELFOR)

D. Perakovic, M. Perisa, I. Cvitic, and S. Husnjak, ``Artificial neuron network implementation in detection and classification of DDoS traffic'', in Telecommunications Forum (TELFOR), January 2016, vol. 24, p. (4 pages).

Teletraffic Congress (ITC)

V. Burger, F. Lehrieder, T. Hossfeld, and J. Seedorf, ``Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms'', in Teletraffic Congress (ITC), September 2012, pp. 1--8.

Telkomnika

B. Yang, H. Zhao, J. Zhang, J. Ai, S. Jia, x. Ge, and W. Liu, ``Analysis of interlayer connection catastrophe characteristics in Internet AS level topology'', Telkomnika, vol. 11, no. 2, pp. 567--576, February 2013.

Texas A and M Univ.

R. Dube, ``Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking'', M.S. thesis, Texas A and M Univ., December 2004.

Texas Tech Univ., Lubbock, TX, US

L.S. Juturu, ``Applying big data analytics on integrated cybersecurity datasets'', M.S. thesis, Texas Tech Univ., Lubbock, TX, US, May 2015.

Tezpur Univ.

M.H. Bhuyan, Applying data mining techniques in anomaly based network intrusion detection, Ph.D. thesis, Tezpur Univ., September 2013.

The Computer J.

V.T. Dang, T.T. Huong, H.T. Nguyen, N.N. Pham, N.T. Nguyen, and A. Marshall, ``SDN-based SYN proxy-A solution to enhance performance of attack mitigation under TCP SYN flood'', The Computer J., vol. 62, January 2019.

The Influence of Technology on Social Network Analysis and Mining, Ch. 11

W.H. Chong, W.S.B. Toh, and L.N. Teow, ``Efficient extraction of high-Betweenness vertices from heterogeneous networks'', in The Influence of Technology on Social Network Analysis and Mining, Ch. 11, January 2013, vol. 6 of Lecture Notes in Social Networks, pp. 255--273.

The International Arab Journal of Information Technology

V. Murugesan and M. Selvaraj, ``UDP based IP Traceback for Flooding DDoS Attack'', The International Arab Journal of Information Technology, p. (9 pages), January 2018.

The Journal of Supercomputing

K.~S. Sahoo, S.~K. Panda, S. Sahoo, B. Sahoo, and R. Dash, ``Toward secure software-defined networks against distributed denial of service attack'', The Journal of Supercomputing, p. (46 pages), January 2019.

The Network and Distributed System Security Symp.

Y. Gilad, A. Cohen, A. Herzberg, M. Schapira, and H. Shulman, ``Are we there yet? On RPKI's deployment and security'', in The Network and Distributed System Security Symp., February 2017, p. (15 pages).

The Scientific World J.

M.H. Yang, ``Storage-efficient 16-bit hybrid IP traceback with single packet'', The Scientific World J., vol. 2014, October 2014.

Theoretical Computer Science

M. D'Emidio, D. Frigioni, and A. Navarra, ``Explore and repair graphs with black holes using mobile entities'', Theoretical Computer Science, vol. 605, no. C, pp. 129--145, November 2015.

S. Ciceronea, G. D'Angelo, G. Di~Stefanoa, and D. Frigioni, ``Partially dynamic efficient algorithms for distributed shortest paths'', Theoretical Computer Science, vol. 411, no. 7-9, pp. 1013--1037, February 2010.

Theory and Applications of Graphs

M.E. Tozal, ``Policy-preferred paths in AS-level Internet topology graphs'', Theory and Applications of Graphs, vol. 5, no. 1, pp. (27 pages), March 2018.

ThinkMind, Conf. on Advances in Future Internet (AFIN)

N. Coelho, P. Salvador, and A. Nogueira, ``Inter-operator traffic differentiation based on multiscale analysis'', in ThinkMind, Conf. on Advances in Future Internet (AFIN), August 2013, p. (8 pages).

Traffic Measurement for Big Network Data

S. Chen, M. Chen, and Q. Xiao, ``Per-flow cardinality measurement'', in Traffic Measurement for Big Network Data, January 2017, Wireless Networks, pp. 47--76.

Trans. on Dependable and Secure Computing

S. Torabi, E. Bou-Harb, C. Assi, E. Karbab, A. Boukhtouta, and M. Debbabi, ``Inferring and investigating IoT-generated scanning campaigns targeting a large Network Telescope'', Trans. on Dependable and Secure Computing, vol. 0, pp. 1--16, March 2020.

Trans. on Network and Service Management

A Aral and T. Ovatman, ``A decentralized replica placement algorithm for edge computing'', Trans. on Network and Service Management, vol. 15, no. 2, pp. 516--529, June 2018.

Trans. on Network and Service Management (TNSM)

J.R. Luttringer, Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``Let there be light: Revealing hidden MPLS tunnels with TNT'', Trans. on Network and Service Management (TNSM), vol. 0, pp. 1--1, December 2019.

Trans. on Networking (TON)

V. Pacifici and G. Dan, ``Coordinated selfish distributed caching for peering content-centric networks'', Trans. on Networking (TON), vol. 24, no. 6, pp. 3690--3701, December 2016.

Transactions on Emerging Telecommunications Technologies

A. Alsadhan, A. Hussain, P. Liatsis, M. Alani, H. Tawfik, P. Kendrick, and H. Francis, ``Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks'', Transactions on Emerging Telecommunications Technologies, p. (15 pages), January 2019.

Transactions on Modeling and Performance Evaluation of Computing Systems

K. Bakhshaliyev, M.~A. Canbaz, and M.~H. Gunes, ``Investigating Characteristics of Internet Paths'', Transactions on Modeling and Performance Evaluation of Computing Systems, vol. 0, pp. (24 pages), January 2019.

Trustcom/BigDataSE/ISPA

P. Liu, Y. Li, Y. Sang, and J. Zhang, ``Anonymity-based privacy preserving network data publication'', in Trustcom/BigDataSE/ISPA, August 2016, pp. 823--828.

R. Wang, Z. Jia, and L. Ju, ``An entropy-based distributed DDoS detection mechanism in Software-Defined Networking'', in Trustcom/BigDataSE/ISPA, August 2015, pp. 310--317.

Tsinghua Science and Technology

L. He, Y. Jia, G. Ren, and Y. Liu, ``RISP: An RPKI-based inter-AS source protection mechanism'', Tsinghua Science and Technology, vol. 23, no. 1, pp. 1--12, February 2018.

TUM, Muenchen

S. Kettner, C. Madden, and R. Ziegler, ``Direct rotational interaction with a spherical projection'', Tech. rep., TUM, Muenchen, January 2004.

Turkish J. of Electrical Engineering and Computer Sciences

R. Saravanan, S. Shanmuganathan, and Y. Palanichamy, ``Behavior-based detection of application layer distributed denial of service attacks during flash events'', Turkish J. of Electrical Engineering and Computer Sciences, vol. 24, pp. 510--523, December 2016.

Turkish Journal of Electrical Engineering and Computer Science

H. Hu, X. Zhai, M. Wang, and G. Hu, ``Graph analysis of network flow connectivity behaviors'', Turkish Journal of Electrical Engineering and Computer Science, vol. 27, pp. (17 pages), January 2019.

Turkish Journal of Electrical Engineering and Computer Sciences

S. Behal, K. Kumar, and M. Sachdeva, ``A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics'', Turkish Journal of Electrical Engineering and Computer Sciences, vol. 26, pp. (12 pages), January 2018.

Twelfth ACM Intl Conf. on Web Search and Data Mining

P. Liu, A.~R. Benson, and M. Charikar, ``Sampling Methods for Counting Temporal Motifs'', in Twelfth ACM Intl Conf. on Web Search and Data Mining, January 2019, vol. 12, p. (9 pages).

Twente Student Conf. on IT

J. Fokkema, ``A study of impacts of flow timeouts on link provisioning'', in Twente Student Conf. on IT, June 2013, p. (6 pages).

Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC)

M. Karpowicz, ``On the design of energy-efficient service rate control mechanisms: CPU frequency control for Linux'', in Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC), September 2013, p. (6 pages).

UC Berkeley

J. Sherry, ``Future architectures for middlebox processing services on the Internet and in the Cloud'', M.S. thesis, UC Berkeley, December 2012.

J. Sherry, D. Kim, S. Mahalingam, A. Tang, S. Wang, and S. Ratnasamy, ``Netcalls: End host function calls to network traffic processing services'', Tech. rep., UC Berkeley, July 2012.

D. Moon, ``Achieving flexibility and performance for packet forwarding and data center management'', Tech. rep., UC Berkeley, May 2010.

UC Davis

S.T. Brugger, The quantitative comparison of computer networks, Ph.D. thesis, UC Davis, June 2009.

E. Proebstel, ``Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic'', M.S. thesis, UC Davis, January 2008.

UC Riverside

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation'', Tech. rep., UC Riverside, May 2007.

UK Performance Engineering Workshop

R. Clegg, ``Simulating internet traffic with Markov-modulated processes'', in UK Performance Engineering Workshop, January 2007.

UNICE : Networks and Applications Towards a Ubiquitously Connected World

B. Donnet and T. Friedman, ``Topology discovery using an address prefix based stopping rule'', in UNICE 2005: Networks and Applications Towards a Ubiquitously Connected World. June 2006, vol. 196 of IFIP Federation for Information Processing, pp. 119--130, Springer.

Univ, of Pisa

L. Vannucci, ``Indexing and compression of network flows'', Tech. rep., Univ, of Pisa, January 2017.

Univ. Autonoma de Madrid

R. Osuna, ``Estudio de captura y almacenamiento de trafico en redes fisicas y virtuales multi-Gigabit'', M.S. thesis, Univ. Autonoma de Madrid, June 2015.

P.M. Santiago~del Rio, Internet traffic classification for high-performance and off-the-shelf systems, Ph.D. thesis, Univ. Autonoma de Madrid, May 2013.

V.M. Martinez, ``Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks'', M.S. thesis, Univ. Autonoma de Madrid, January 2012.

Univ. Brescia

A. Este, F. Gringoli, and L. Salgarelli, ``An SMV-based approach to traffic classification'', Tech. rep., Univ. Brescia, January 2008.

Univ. Carlos III de Madrid

P. Bangera, Alternative revenue sources for Internet service providers, Ph.D. thesis, Univ. Carlos III de Madrid, November 2016.

J.C. Cardona, Inter-domain traffic management in an evolving Internet peering ecosystem, Ph.D. thesis, Univ. Carlos III de Madrid, June 2016.

J. Cardona, Inter-domain traffic management in and evolving Internet peering eco-system, Ph.D. thesis, Univ. Carlos III de Madrid, November 2015.

Univ. Complutense de Madrid

I.G. Padreny, ``Sistema de deteccion de ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, June 2015.

J. Martin, ``Sistema de deteccion de ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, June 2015.

Univ. de Aveiro

N.M.M. Coelho, ``Profiling de trafego inter-operador baseado em analise multi-escalar'', M.S. thesis, Univ. de Aveiro, December 2012.

Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia

S.D.B. Moreno, ``Evaluacion de desempeno de diversas arquitecturas de commutadores opticos'', M.S. thesis, Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia, December 2011.

Univ. de Louvain

M. De~Mol and G. Feuillen, ``Toward realistic network topologies'', M.S. thesis, Univ. de Louvain, June 2016.

Univ. Delaware

N. Ekiz, Transport layer reneging, Ph.D. thesis, Univ. Delaware, November 2012.

Univ. do Minho, Braga, PT

J.M.C. Silva, A modular traffic sampling architecture for flexible network measurements, Ph.D. thesis, Univ. do Minho, Braga, PT, January 2016.

Univ. du Havre

M.A.S. Meslmawy, Efficient resources management in a ditributed computer system, modeled as a dynamic complex system, Ph.D. thesis, Univ. du Havre, October 2015.

Univ. Federal Do Rio de Janeiro, Brazil

L.P. Spinelli, ``Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias'', M.S. thesis, Univ. Federal Do Rio de Janeiro, Brazil, August 2011.

Univ. Illinois, Urbana-Champaign

Z. Zhou, ``Per-flow cardinality estimation based on virtual LogLog sketching'', M.S. thesis, Univ. Illinois, Urbana-Champaign, August 2016.

Q. Li, Reducing short flows' latency in the internet, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, April 2016.

H. Wu, ``Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity region'', M.S. thesis, Univ. Illinois, Urbana-Champaign, October 2015.

J. Zhang, Statistical inference on network data, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, May 2014.

J. Juen, ``Protecting anonymity in the presence of autonomous system and internet exchange level adversaries'', M.S. thesis, Univ. Illinois, Urbana-Champaign, September 2012.

A. Houmansadr, Design, analysis, and implementation of effective network flow watermarking schemes, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2012.

N. Schear, Preventing encrypted traffic analysis, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2011.

F.M. Khan, Assuring network service with bandwidth and integrity based fairness, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2011.

Univ. Michigan

R. Venkataramanan, M.-W. Jeong, and B. Prabhakar, ``A flow- and packet-level model of the Internet'', Tech. rep., Univ. Michigan, July 2011.

Univ. Minnesota

Z. Lin, Toward building practical privacy enhancing technologies, Ph.D. thesis, Univ. Minnesota, July 2012.

Univ. Nebraska at Omaha

C. Bell, ``Examining change in Internet topology in terms of external events, April 2001 - April 2002'', M.S. thesis, Univ. Nebraska at Omaha, August 2011.

Univ. Newcastle upon Tyne

M.S. Andreou, Message traceback systems. Dancing with the devil, Ph.D. thesis, Univ. Newcastle upon Tyne, September 2009.

Univ. of Amsterdam

D. Garay, ``Network Peering Dashboard for SURFnet'', Tech. rep., Univ. of Amsterdam, January 2019.

B. Eikema, ``BGP routing security and deployment strategies'', Tech. rep., Univ. of Amsterdam, June 2015.

Univ. of Arizona

J.C. Acedo, ``Evolution of the Internet topology from a regional perspective'', M.S. thesis, Univ. of Arizona, January 2015.

Univ. of Barcelona

A. Pares~Palacin, ``Random graphs and applications'', Tech. rep., Univ. of Barcelona, June 2015.

Univ. of Botswana

K. Mokgolodi, ``Traffic prediction in cloud computing using time series models'', M.S. thesis, Univ. of Botswana, May 2015.

Univ. of Calgary

A. Gupta, ``Distributed Denial of Service attack detection using a machine learning approach'', M.S. thesis, Univ. of Calgary, September 2018.

K. Xylogiannopoulos, Data structures, algorithms and applications for Big Data analytics: Single, multiple and all repeated patterns detection in discrete sequences, Ph.D. thesis, Univ. of Calgary, April 2017.

Univ. of California Riverside

Y. He, G. Siganos, M. Faloutsos, and S. Krishnamurthy, ``Putting the links together: Measurements and impact'', Tech. rep., Univ. of California Riverside, January 2006.

Univ. of California San Diego

K. Benson, Leveraging Internet background radiation for opportunistic network analysis, Ph.D. thesis, Univ. of California San Diego, January 2016.

Univ. of California, Berkeley

P.~J. Pearce, Methods and systems for understanding large-scale Internet threats, Ph.D. thesis, Univ. of California, Berkeley, August 2018.

Univ. of California, San Diego

O. Gupta, ``Identifying traffic anomalies interfering with IBR based outage detection'', M.S. thesis, Univ. of California, San Diego, January 2018.

P. Mahadevan, Mechanisms for generating realistic annotated Internet topologies, Ph.D. thesis, Univ. of California, San Diego, January 2007.

Univ. of Cambridge

H. Haddadi, D. Fay, S. Uhlig, A. Moore, A. Jamakovic, and R. Mortier, ``Analysis of the Internet's structural evolution'', Tech. rep., Univ. of Cambridge, September 2009.

Univ. of Cape Town

J. Chavula, Improving Pan-African research and education networks through traffic engineering: A LISP/SDN approach, Ph.D. thesis, Univ. of Cape Town, October 2017.

O.A. Osanaiye, DDoS defence for service availability in cloud computing, Ph.D. thesis, Univ. of Cape Town, July 2016.

Univ. of Carlos III de Madrid

S.A.U. Hasan, The role of topology and contracts in Internet content delivery, Ph.D. thesis, Univ. of Carlos III de Madrid, June 2016.

Univ. of Coimbra

B.L. Dalmazo, A prediction-based approach for anomaly detection in the cloud, Ph.D. thesis, Univ. of Coimbra, October 2018.

Univ. of Essex

K. Kostas, ``Anomaly detection in networks using machine learning'', M.S. thesis, Univ. of Essex, August 2018.

Univ. of Granada

J.R.S.V. Macia, ``Design of a flow monitoring solution for OpenFlow Software-Defined Networks'', M.S. thesis, Univ. of Granada, September 2017.

Univ. of Illinois at Urbana-Champaign

Z. Liu, Minimal deployable endpoint-driven network forwarding: principle, designs and applications, Ph.D. thesis, Univ. of Illinois at Urbana-Champaign, July 2017.

Q. Li, Reducing short flows latency in the Internet, Ph.D. thesis, Univ. of Illinois at Urbana-Champaign, May 2016.

Univ. of Kentucky

Y. Yu, Ultra-fast and memory-efficient lookups for cloud, networked systems, and massive data management, Ph.D. thesis, Univ. of Kentucky, May 2018.

M.O. Ascigil, Design of a scalable path service for the Internet, Ph.D. thesis, Univ. of Kentucky, January 2015.

Univ. of Konstanz

C. Panse, Visualizing geo-related data using cartograms, Ph.D. thesis, Univ. of Konstanz, February 2005.

Univ. of Lagos

A.A. Afolorunso, Variational Bayesian Hidden Markov model for the prediction of Distributed Denial of Service attacks, Ph.D. thesis, Univ. of Lagos, July 2017.

Univ. of Ljubljana

T. Matek, ``Anomaly detection in computer networks using higher-order dependencies'', M.S. thesis, Univ. of Ljubljana, October 2017.

Univ. of Louisiana at Lafayette (ProQuest Publ.)

A.Y. Nur, The implications of the Internet's topological structure for its efficiency, security, and reliability, Ph.D. thesis, Univ. of Louisiana at Lafayette (ProQuest Publ.), November 2018.

Univ. of Madrid

M.A.S. Monge, Knowledge acquisition for autonomic network management in emerging self-organizing architectures, Ph.D. thesis, Univ. of Madrid, June 2019.

Univ. of Manitoba

T.L. Adelakun, ``A multifractal approach for detecting distributed denial of service attacks'', M.S. thesis, Univ. of Manitoba, March 2019.

Univ. of Maryland

Y. Lee, Improving accuracy and efficiency of network measurement by identifying homogenous IPv4 addresses, Ph.D. thesis, Univ. of Maryland, January 2018.

Z. Li, D. Levin, N. Spring, and B. Bhattacharjee, ``Longitudinal analysis of root server anycast inefficiencies'', Tech. rep., Univ. of Maryland, January 2017.

Univ. of Michigan, Ann Arbor, MI, US

J.J. Czyz, A brave new world: Studies on the deployment and security of the emerging IPv6 Internet, Ph.D. thesis, Univ. of Michigan, Ann Arbor, MI, US, June 2016.

Univ. of Minnesota

M.J. Schuchard, Adversarial degradation of the availability of routing infrastructures and other Internet-scale distributed systems, Ph.D. thesis, Univ. of Minnesota, June 2016.

Univ. of Nevada, Reno

M.A. Canbaz, Internet topology mining: From Big Data to Network Science, Ph.D. thesis, Univ. of Nevada, Reno, August 2018.

Univ. of New South Wales

N.M.A. Moustafa, Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic, Ph.D. thesis, Univ. of New South Wales, June 2017.

Univ. of Novi Sad

M. Petkovic, A contribution to the method for detection of denial of service attacks inInternet, Ph.D. thesis, Univ. of Novi Sad, September 2018.

Univ. of Oregon

R. Motamedi, Measurement-based characterization of large-scale networked systems, Ph.D. thesis, Univ. of Oregon, May 2017.

P. Kriegel, ``Determining the location of autonomous system relations among top tier Internet Service Providers in the United States'', Tech. rep., Univ. of Oregon, June 2016.

Univ. of Ottawa

R.H. Remedios, On improving DREAM framework with estimations and ProgME, Ph.D. thesis, Univ. of Ottawa, April 2017.

Univ. of Pennsylvania

M. Zhao, Accountability in distributed systems with incomplete information, Ph.D. thesis, Univ. of Pennsylvania, January 2016.

Univ. of South Florida

F.I.A. Shaikh, Security framework for the Internet of Things leveraging network telescopes and machine learning, Ph.D. thesis, Univ. of South Florida, April 2019.

Univ. of Southern California

M.M. Javadi, Timely, accurate, and scalable network management for data centers, Ph.D. thesis, Univ. of Southern California, December 2016.

Univ. of Stirling

H.S. Alharbi, Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networks, Ph.D. thesis, Univ. of Stirling, January 2017.

Univ. of Tennessee

J.A. Holland, ``Quantifying irregular geographic exposure on the Internet'', M.S. thesis, Univ. of Tennessee, May 2018.

J.M. Smith, ``Taking back the Internet: Defeating DDoS and adverse network conditions via reactive BGP routing'', M.S. thesis, Univ. of Tennessee, December 2017.

Univ. of Texas at Austin

M.S. Kim, Building and maintaining overlay networks for bandwidth-demanding applications, Ph.D. thesis, Univ. of Texas at Austin, August 2005.

Univ. of Toronto

B. Marczak, J. Scott-Railton, S. McKune, B.A. Razzak, and R. Deibert, ``HIDE AND SEEK - Tracking NSO Group Pegasus spyware to operations in 45 countries'', Tech. rep., Univ. of Toronto, September 2018.

Univ. of Twente

M. Vos, ``Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints'', Tech. rep., Univ. of Twente, July 2019.

R. Hofstede, Flow-based compromise detection, Ph.D. thesis, Univ. of Twente, June 2016.

A. Kolesnichenko, Model-checking mean-field models: algorithms and applications, Ph.D. thesis, Univ. of Twente, December 2014.

Univ. of Victoria

A. Raza, ``Anomaly detection systems for Distributed Denial of Service attacks'', M.S. thesis, Univ. of Victoria, February 2017.

Univ. of Victoria, Victoria, CA

A.L. Verigin, ``Evaluating the effectiveness of Sybil attacks against peer-to-peer botnets'', M.S. thesis, Univ. of Victoria, Victoria, CA, December 2013.

T. Godkin, ``Statistical assessment of peer-to-peer botnet features'', M.S. thesis, Univ. of Victoria, Victoria, CA, April 2013.

Univ. of Vigo

P.F. Ferreiro, ``Energy-efficient carrier SDN networks'', M.S. thesis, Univ. of Vigo, July 2018.

Univ. of Wisconsin System Madison United States

P. Barford, ``Diverse Data Sets for Impact'', Tech. rep., Univ. of Wisconsin System Madison United States, January 2018.

Univ. of Wuerzburg

T. Hossfeld, A. Binzenhoefer, D. Schlosser, K. Eger, J. Oberender, I. Dedinski, and G. Kunzmann, ``Towards efficient simulation of large scale P2P networks'', Tech. rep., Univ. of Wuerzburg, October 2005.

Univ. of Zurich

S. Bublitz, ``Towards a BitTorrent weather forecast'', M.S. thesis, Univ. of Zurich, January 2017.

Univ. Oregon, Eugene, OR, US

H.R. Ekbatani, Investigating the mutual impact of the P2P overlay and the AS-level underlay, Ph.D. thesis, Univ. Oregon, Eugene, OR, US, December 2012.

Univ. Paris Sud

L. Dall'asta, Dynamical phenomena on complex networks, Ph.D. thesis, Univ. Paris Sud, June 2006.

Univ. Pisa, Pisa, IT

D. De~Sensi, ``DPI over commodity hardware: implementation of a scalable framework using FastFlow'', M.S. thesis, Univ. Pisa, Pisa, IT, February 2013.

Univ. Politecnica de Catalunya, Barcelona, Spain

S.S. Santiago, ``Latency estimation of IP flows using NetFlow'', M.S. thesis, Univ. Politecnica de Catalunya, Barcelona, Spain, June 2013.

Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam

A. Szekeres, ``Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failures'', M.S. thesis, Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam, August 2011.

Univ. Rome

N. Blefari-Melazzi, M. Cancellieri, A. Detti, M. Pomposini, and S. Salsano, ``The CONET solution for information centric networking'', Tech. rep., Univ. Rome, January 2012.

Univ. Texas, Arlington, TX, US

J.M Sankey, ``Dovetail: stronger anonymity in next-generation Internet routing'', M.S. thesis, Univ. Texas, Arlington, TX, US, May 2013.

Univ. Texas, Austin

M.F. Iqbal, Workload-aware network processors: improving performance while minimizing power consumption, Ph.D. thesis, Univ. Texas, Austin, August 2013.

Univ. Texas, San Antonio, TX, US

Z. Zhan, A statistical framework for analyzing cyber attacks, Ph.D. thesis, Univ. Texas, San Antonio, TX, US, May 2014.

Univ. Waikato, New Zealand

A. King, ``Efficient internet topology discovery techniques'', M.S. thesis, Univ. Waikato, New Zealand, February 2010.

Univ. Washington, CSE Dept.

C. Prince and D. Wyatt, ``Confidence-weighted marginal utility analyses for improved internet mapping'', Tech. rep., Univ. Washington, CSE Dept., December 2004.

Univ. Waterloo, Ontario, CA

A. Tawakol, ``Performance analysis of TCAMs in switches'', M.S. thesis, Univ. Waterloo, Ontario, CA, April 2012.

University of Southern California (USC)

H. Guo and J. Heidemann, ``Detecting IoT Devices in the Internet (Extended)'', Tech. rep., University of Southern California (USC), January 2018.

University of Southern California / Information Sciences Institute

J. Heidemann, Y. Pradkin, and A. Nisar, ``Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended)'', Tech. rep., University of Southern California / Information Sciences Institute, January 2018.

USENIX

Y. Yang, J. Eo, G.~W. Kim, J.~Y. Kim, S. Lee, J. Seo, W.~W. Song, and B.~G. Chun, ``Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies'', in USENIX, January 2019, p. (15 pages).

Usenix Conf. Hot-ICE

L. Jose, M. Yu, and J. Rexford, ``Online measurement of large traffic aggregates on commodity switches'', in Usenix Conf. Hot-ICE 2011, March 2011.

USENIX NSDI

T. Levai, F. Nemeth, B. Raghavan, and G. Retvari, ``Batchy: Batch-scheduling data flow graphs with service-level objectives'', in USENIX NSDI, February 2020, p. (18 pages).

Usenix Security Conf. (SEC)

W. Lian, E. Rescorla, H. Shacham, and S. Savage, ``Measuring the practical impact of DNSSEC deploymen'', in Usenix Security Conf. (SEC), August 2013, pp. 573--588.

Z Lin and N. Hopper, ``New attacks on timing-based network flow watermarks'', in Usenix Security Conf. (SEC), August 2012, p. (16 pages).

M. Rajab, F. Monrose, and A. Terzis, ``On the effectiveness of distributed worm monitoring'', in Usenix Security Conf. (SEC), July 2005, pp. 15--15.

Usenix Security Symp.

E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, ``Eclipse attacks on bitcoin's peer-to-peer network'', in Usenix Security Symp., August 2015.

USENIX Security Symp.

B. Liu, C. Lu, H. Duan, Y. Liu, Z. Li, S. Hao, and M. Yang, ``Who is answering my queries: Understanding and characterizing interception of the DNS resolution path'', in USENIX Security Symp., August 2018, p. (17 pages).

M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, X. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou, ``Understanding the Mirai botnet'', in USENIX Security Symp., August 2017, p. (18 pages).

F. Li, Z. Durumeric, J. Czyz, M. Karami, M. Bailey, D. McCoy, S. Savage, and V. Paxson, ``You've got vulnerability: Exploring effective vulnerability notifications'', in USENIX Security Symp., August 2016, p. (18 pages).

Usenix Symp. on Networked Systems Design and Implementation (NSDI)

H. Wang, K.S. Lee, and H. Weatherspoon, ``PHY convert channels: Can you see the idles?'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2014.

N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown, ``I know what your packet did last hop: Using packet histories to troubleshoot networks'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2014, pp. 71--85.

M. Yu, L. Jose, and R. Miao, ``Software defined traffic measurement with OpenSketch'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2013, p. (14 pages).

A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel, ``NetReview: detecting when interdomain routing goes wrong'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI). April 2009, pp. 437--452, Usenix Ass. Berkeley, CA, US.

J.P. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, and A. Venkataramani, ``Consensus routing: the internet as a distributed system'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2008, pp. 351--364.

USENIX Symp. on Networked Systems Design and Implementation (NSDI)

R. Birkner, D. Drachsler-Cohen, L. Vanbever, and M. Vechev, ``Net2Text: query-guided summarization of network forwarding behaviors'', in USENIX Symp. on Networked Systems Design and Implementation (NSDI), April 2018, pp. 609--623.

H.V. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, ``iPlane Nano: path prediction for peer-to-peer applications'', in USENIX Symp. on Networked Systems Design and Implementation (NSDI), April 2009, pp. 137--152.

Vehicular Technology Conf. (VTC-Fall)

J. Jin, ``BGP route leak prevention based on BGPsec'', in Vehicular Technology Conf. (VTC-Fall), August 2018, p. (6 pages).

Versatile Cybersecurity

S. Bhatia, S. Behal, and I. Ahmed, ``Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions'', Versatile Cybersecurity, p. (43 pages), January 2018.

Vilnius Univ.

A. Lengvinas, ``Investigation of Internet traffic anomalies by application of neural networks'', M.S. thesis, Vilnius Univ., May 2018.

Vinnitsia Nat. Tech. Univ.

B.V. Kulchytskyy and L.M. Cooperstein, ``To the problem of forming the dataset for DDoS attack research'' January 2019.

Virginia Polytechnic Inst. and State Univ.

N. Tata, ``MicroCuckoo hash engine for high-speed IP lookup'', M.S. thesis, Virginia Polytechnic Inst. and State Univ., June 2017.

Visualization for Computer Security (VizSec)

B. Irwin and N. Pilkington, ``High level internet scale traffic visualization using Hilbert curve mapping'', in Visualization for Computer Security (VizSec), J.R. Goodall, G. Conti, and K.-L. Ma, Eds., May 2008, Mathematics and Visualization, pp. 147--158.

Visualization for Cyber Security (VizSec)

J Fowler, T Johnson, P Simonetto, P Lazos, S. Kobourov, M. Schneider, and C. Aceda, ``IMap: Visualizing network activity over Internet maps'', in Visualization for Cyber Security (VizSec), November 2014, p. (8 pages).

S. Papadopoulos, G. Theodoridis, and D. Tzovaras, ``BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies'', in Visualization for Cyber Security (VizSec), October 2013, pp. 57--64.

VLDB Endowment

A.W. Fu, H. Wu, J. Cheng, and R.C. Wong, ``IS-Label: an independent-set based labeling scheme for point-to-point distance querying'', VLDB Endowment, vol. 6, no. 6, pp. 457--468, April 2013.

VLDB J.

O. Papapetrou, M. Garofalakis, and A. Deligiannakis, ``Sketching distributed sliding-window data streams'', VLDB J., vol. 24, no. 3, pp. 345--368, March 2015.

Washington State Univ., Pullman, WA, US

H. Liu, A collaborative defense framework against DDoS attacks in networks, Ph.D. thesis, Washington State Univ., Pullman, WA, US, May 2013.

Wireless Algorithms, Systems, and Applications

D. Sun, K. Yang, Z. Shi, and Y. Wang, ``Detecting flooding DDoS under flash crowds based on Mondrian forest'', in Wireless Algorithms, Systems, and Applications, January 2017, Lecture Notes in Computer Science (LNCS), pp. 729--740.

Wireless Communications and Mobile Computing (IWCMC)

A.Y. Privalov and A. Tsarev, ``Analysis and simulation of WAN traffic by self-similar traffic model with OMNET'', in Wireless Communications and Mobile Computing (IWCMC), August 2014, pp. 629--634.

R Pecori and L. Veltri, ``A statistical blind technique for recognition of internet traffic with dependence enforcement'', in Wireless Communications and Mobile Computing (IWCMC), August 2014, pp. 328--333.

F. Gringoli, L. Nava, A. Este, and L. Salgarelli, ``MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware'', in Wireless Communications and Mobile Computing (IWCMC), August 2012, pp. 450--455.

O. Gremillet, P. Goncalves, P. Vicat-Blanc~Primet, and A. Dupas, ``Traffic classification techniques supporting semantic networks'', in Wireless Communications and Mobile Computing (IWCMC), June 2010, pp. 463--467.

WIT, Hokkaido, Japan

H. Asai and H. Esaki, ``A methodology for magnitude-based inter-AS distance estimation'', in WIT2009, Hokkaido, Japan, June 2009.

Workshop on Analyzing Networks and Learning with Graphs (NIPS)

K. Miller and T. Eliassi-Rad, ``Continuous time group discovery in dynamic graphs'', in Workshop on Analyzing Networks and Learning with Graphs (NIPS), December 2009.

Workshop on Big Data Analytics and Machine Learning for Data Communication Networks

M. Li, C. Lumensanu, B. Zong, and H. Chen, ``Deep Learning IP Network Representations'', in Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, January 2018, p. (7 pages).

Workshop on Cloud-Assisted Networking

A. Lazaris and V.~K. Prasanna, ``DeepFlow: a deep learning framework for software-defined measurement'', in Workshop on Cloud-Assisted Networking, January 2017, vol. 2, p. (5 pages).

Workshop on Computational Intelligence for Multimedia Understanding (IWCIM)

R. Fouladi, C. Kayatas, and E. Anarim, ``Statistical measures: Promising features for time series based DDoS attack detection'', in Workshop on Computational Intelligence for Multimedia Understanding (IWCIM), January 2018, p. (9 pages).

Workshop on Computational Intelligence in Security for Information Systems (CISIS)

A. Baiocchi, G. Maiolini, G. Molina, and A. Rizzi, ``On-the-fly statistical classification of internet traffic at application layer based on cluster analysis'', in Workshop on Computational Intelligence in Security for Information Systems (CISIS). October 2008, vol. 53 of Advances in Soft Computing, pp. 178--185, Springer.

Workshop on Graph Data Management Experiences and Systems (GRADES)

C. Joslyn, S. Choudhury, D. Haglin, B. Howe, B. Nickless, and B. Olsen, ``Massive scale cyber traffic analysis: A driver for graph database research'', in Workshop on Graph Data Management Experiences and Systems (GRADES), June 2013, p. (6 pages).

Workshop on Hot Topics in Networks

A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira, ``One hop for RPKI, one giant leap for BGP security'', in Workshop on Hot Topics in Networks, November 2015, p. (7 pages).

Workshop on Hot Topics in Networks (HotNets)

O. Alipourfard, M. Moshref, and M. Yu, ``Re-evaluating measurement algorithms in software'', in Workshop on Hot Topics in Networks (HotNets), November 2015.

G. Retvari, D. Szabo, A. Gulyas, A. Korosi, and J. Tapolcai, ``An information-theoretic approach to routing scalability'', in Workshop on Hot Topics in Networks (HotNets), October 2014, p. (7 pages).

Workshop on Incentives, Overlays, and Economic Traffic Control (ETM)

H. Asai and H. Esaki, ``Estimating AS relationships for application-layer traffic optimization'', in Workshop on Incentives, Overlays, and Economic Traffic Control (ETM), September 2010, vol. 6236 of Lecture Notes in Computer Science (LNCS), pp. 51--63.

Workshop on Information Forensics and Security (WIFS)

T. Hirayama, K. Toyoda, and I. Sasase, ``Fast target link flooding attack detection scheme by analyzing traceroute packets flow'', in Workshop on Information Forensics and Security (WIFS), November 2015, p. (6 pages).

Workshop on Local and Metropolitan Area Networks

H. Jiang, S. Chen, H. Hu, and M. Zhang, ``Superpoint-based detection against distributed denial of service (DDoS) flooding attacks'', in Workshop on Local and Metropolitan Area Networks, April 2015, p. (6 pages).

Workshop on Local and Metropolitan Area Networks (LANMAN)

M. Zhu, Y. Liu, J. Li, and J. Wu, ``CCOF: Congestion control on the fly for inter-domain routing'', in Workshop on Local and Metropolitan Area Networks (LANMAN), May 2014, pp. 1--2.

Workshop on Managing Systems Automatically and Dynamically

M. Kato, K. Cho, M. Honda, and H. Tokuda, ``Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation'', in Workshop on Managing Systems Automatically and Dynamically, October 2012, p. (7 pages).

Workshop on Measurement and Networking

A. Canbaz, K. Bakhshaliyev, and M. Gunes, ``Analysis of path stability within autonomous systems'', in Workshop on Measurement and Networking, September 2017, p. (6 pages).

Workshop on Mining and Learning with Graphs

W. Eberle and L. Holder, ``Identifying anomalies in graph streams using change detection'', in Workshop on Mining and Learning with Graphs, January 2016, p. (8 pages).

Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE )

H.V. Hansen, V. Goebel, T. Plagemann, and M. Siekkinen, ``Resource adaptive distributed information sharing'', in Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE 2010), F.A. Aagesen and S.J. Knapskog, Eds., June 2010, vol. 6164 of Lecture Notes in Computer Science (LNCS), pp. 246--255.

Workshop on Open Problems in Network Security (iNetSec)

D.E. Asoni, C. Chen, D. Barrera, and A. Perrig, ``On building onion routing into future Internet architectures'', in Workshop on Open Problems in Network Security (iNetSec), May 2016, vol. 9591 of Lecture Notes in Computer Science, pp. 71--81.

Workshop on Reliable Networks Design and Modeling (RNDM)

V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Probabilistic flow marking for IP traceback (PFM)'', in Workshop on Reliable Networks Design and Modeling (RNDM), October 2015, pp. 229--236.

Workshop on Scalable trusted computing (STC)

B. Parno, Z. Zhou, and A. Perrig, ``Using trustworthy host-based information in the network'', in Workshop on Scalable trusted computing (STC), October 2012, pp. 33--44.

Workshop on Self-Organizing Systems (IWSOS)

P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``On the local approximations of node centrality in Internet router-level topologies'', in Workshop on Self-Organizing Systems (IWSOS), May 2013, vol. 8221 of Lecture Notes in Computer Science (LNCS), pp. 115--126.

Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX)

K. Wehmuth and A. Ziviani, ``Distributed assessment of the closeness centrality ranking in complex networks'', in Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX), April 2012, pp. 43--48.

Workshop on Traffic Monitoring and Analysis (TMA)

D. Revelo, M.A. Ricci, B. Donnet, and J.I. Alvarez-Hamlin, ``Unveiling the MPLS structure on Internet topology'', in Workshop on Traffic Monitoring and Analysis (TMA), April 2016, p. (8 pages).

WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC)

R. Pasquini, F.L. Verdi, and M.F. Magalhaes, ``Towards local routing state in the future internet'', in WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC), April 2012.

WRI Conf. on Communications and Mobile Computing (CMC)

G. Zhang, ``Measuring the impacts of sampling bias on internet AS-level topology inference'', in WRI Conf. on Communications and Mobile Computing (CMC), March 2009, pp. 181--188.

X Southern Conference on Programmable Logic (SPL)

T. Alonso, M. Ruiz, G. Sutter, S. Lopez-Buedo, and J.~E. Lopez~de Vergara, ``Towards 100 GbE FPGA-Based Flow Monitoring'', in 2019 X Southern Conference on Programmable Logic (SPL), January 2019, vol. 10, p. (8 pages).

York Univ.

B. Andreopoulos, A. Aijun, and X. Wang, ``Multi-layer increasing coherence clustering of Autonomous Systems with MULICsoft'', Tech. rep., York Univ., April 2005.

Youngstown State Univ.

A.A. Drivere, ``Can we study the topology of the Internet from the vantage points of large and small content providers?'', M.S. thesis, Youngstown State Univ., December 2011.

zenodo.org

G. Tilch, T. Ermakova, and B. Fabian, ``A multilayer graph model of the Internet topology'', Tech. rep., zenodo.org, October 2017.

  Last Modified: Mon Jul-6-2020 22:31:12 UTC
  Page URL: https://www.caida.org/data/publications/bypublication/bypublication_full.xml