CAIDA Publications funded by the IMPACT project
Below is a list of publications in the academic literature, (co-)authored
by CAIDA researchers that explicitly acknowledge funding from the IMPACT project.
IMPACT (2012-2017) Related Papers
- M. Bailey and E. Kenneally, "Cyber-security Research Ethics Dialogue & Strategy (CREDS) Workshop Report", ACM SIGCOMM Computer Communication Review (CCR), vol. 44, no. 2, pp. 76--79, Apr 2014.
- T. Zseby, N. Brownlee, A. King, and k. claffy, "Nightlights: Entropy-based Metrics for Classifying Darkspace Traffic Patterns", in Passive and Active Network Measurement Workshop (PAM). Mar 2014, PAM 2014.
- T. Zseby, A. King, M. Fomenkov, and k. claffy, "Analysis of Unidirectional IP Traffic to Darkspace with an Educational Data Kit" Feb 2014.
- A. Dainotti, K. Benson, A. King, k. claffy, M. Kallitsis, E. Glatz, and X. Dimitropoulos, "Estimating Internet address space usage through passive measurements", ACM SIGCOMM Computer Communication Review (CCR), vol. 44, no. 1, pp. 42--49, Jan 2014.
- A. King, A. Dainotti, B. Huffaker, and k. claffy, "A Coordinated View of the Temporal Evolution of Large-scale Internet Events", Computing, vol. 96, no. 1, pp. 53--65, Jan 2014.
- K. Benson, A. Dainotti, k. claffy, and E. Aben, "Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation", in Traffic Monitoring and Analysis Workshop (TMA), Apr 2013.
- T. Zseby, A. King, N. Brownlee, and k. claffy, "The Day After Patch Tuesday: Effects Observable in IP Darkspace Traffic", in Passive and Active Network Measurement Workshop (PAM), Mar 2013, vol. 7799, pp. 273--275.
- A. Dainotti, A. King, K. Claffy, F. Papale, and A. Pescape, "Analysis of a "/0" Stealth Scan from a Botnet", Nov 2012, pp. 1--14.
- A. Dainotti, A. King, and K. Claffy, "Analysis of Internet-wide Probing using Darknets", in Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Oct 2012.
- T. Zseby and k. claffy, "DUST 2012 Workshop Report", ACM SIGCOMM Computer Communication Review (CCR), vol. 42, no. 5, pp. 49--53, Oct 2012.
Previous IMPACT (2007-2012) Related Papers
- D. Dittrich and E. Kenneally, "The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research", Tech. rep., U.S. Department of Homeland Security, Aug 2012.
- k. claffy, "Border Gateway Protocol (BGP) and Traceroute Data Workshop Report", ACM SIGCOMM Computer Communication Review (CCR), vol. 42, no. 3, pp. 28--31, Jul 2012.
- B. Huffaker, M. Fomenkov, and k. claffy, "Internet Topology Data Comparison", Tech. rep., Cooperative Association for Internet Data Analysis (CAIDA), May 2012.
- M. Bailey, E. Kenneally, and D. Dittrich, "A Refined Ethical Impact Assessment Tool and a Case Study of its Application", in Workshop on Ethics in Computer Security Research (WECSR), Mar 2012.
- M. Bailey, D. Dittrich, E. Kenneally, and D. Maughan, "The Menlo Report", IEEE Security & Privacy, vol. 10, no. 2, pp. 71--75, Mar 2012.
- A. Dainotti, A. Pescape, and K. Claffy, "Issues and future directions in traffic classification", IEEE Network, vol. 26, no. 1, pp. 35--40, Jan 2012.
- A. Dainotti, R. Amman, E. Aben, and K. Claffy, "Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the Internet", ACM SIGCOMM Computer Communication Review (CCR), vol. 42, no. 1, pp. 31--39, Jan 2012.
- k. claffy, "Tracking IPv6 Evolution: Data We Have and Data We Need", ACM SIGCOMM Computer Communication Review (CCR), vol. 43, no. 3, pp. 43--48, Jul 2011.
- B. Huffaker, M. Fomenkov, and k. claffy, "Geocompare: a comparison of public and commercial geolocation databases - Technical Report ", Tech. rep., Cooperative Association for Internet Data Analysis (CAIDA), May 2011.
- N. Christin, E. Kenneally, J. McHugh, and A. Stavrou, "Moving Forward, Building an Ethics Community (Panel Statements) ", in Workshop on Ethics in Computer Security Research (WECSR), Mar 2011.
- W. John, M. Dusi and kc claffy, "Estimating routing symmetry on single links by passive flow measurements", in: Proc. International Wireless Communications and Mobile Computing Conference, p. 473-478, Mar 2010.
- E. Kenneally and k.c. claffy, "Dialing privacy and utility: a proposed data-sharing framework to advance Internet research", IEEE Security and Privacy 8 (4), 31-39, July 2010.
- S. Castro, M. Zhang, W. John, D. Wessels and k claffy, "Understanding and preparing for DNS evolution", in: F. Ricciato, M. Mellia and E. Biersack (eds.), Traffic Monitoring and Analysis Workshop (TMA 2010), p. 1-16, Mar 2010.
- E. Kenneally, M. Bailey and D. Maughan, "A framework for understanding and applying ethical principles in network and security research", in: Workshop on "Ethics in Computer Security Research (WECSR)", Jan 2010.
- E. Kenneally and k claffy, "An internet data sharing framework for balancing privacy and utility", in: Engaging Data: First International Forum on the Application and Management of Personal Electronic Information, Oct 2009.
- F. Gringoli, L. Salgarelli, M. Dusi, N. Cascarano, F. Risso and k claffy, "GT: picking up the truth from the ground for internet traffic", ACM SIGCOMM Computer Communication Review (CCR) 39 (5), 12-18, Oct 2009.