|
Search the dblp DataBase
Zhuoqing Morley Mao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:179-188 [Conf]
- Nick Feamster, Zhuoqing Morley Mao, Jennifer Rexford
BorderGuard: detecting cold potatoes from peers. [Citation Graph (0, 0)][DBLP] Internet Measurement Conference, 2004, pp:213-218 [Conf]
- Zhuoqing Morley Mao, Randy Bush, Timothy Griffin, Matthew Roughan
BGP beacons. [Citation Graph (0, 0)][DBLP] Internet Measurement Comference, 2003, pp:1-14 [Conf]
- Himabindu Pucha, Y. Charlie Hu, Zhuoqing Morley Mao
On the impact of research network based testbeds on wide-area experiments. [Citation Graph (0, 0)][DBLP] Internet Measurement Conference, 2006, pp:133-146 [Conf]
- Hyunseok Chang, Sugih Jamin, Zhuoqing Morley Mao, Walter Willinger
An Empirical Approach to Modeling Inter-AS Traffic Matrices. [Citation Graph (0, 0)][DBLP] Internet Measurment Conference, 2005, pp:139-152 [Conf]
- Ningning Hu, Li Li, Zhuoqing Morley Mao, Peter Steenkiste, Jia Wang
A measurement study of Internet bottlenecks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:1689-1700 [Conf]
- Zhuoqing Morley Mao, David Johnson, Jennifer Rexford, Jia Wang, Randy H. Katz
Scalable and Accurate Identification of AS-level Forwarding Paths. [Citation Graph (0, 0)][DBLP] INFOCOM, 2004, pp:- [Conf]
- Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen
Enriching Intrusion Alerts Through Multi-Host Causality. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Zhuoqing Morley Mao, Hoi-sheung Wilson So, ByungHoon Kang
Network support for mobile multimedia using a self-adaptive distributed proxy. [Citation Graph (0, 0)][DBLP] NOSSDAV, 2001, pp:107-116 [Conf]
- Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica
The SAHARA Model for Service Composition across Multiple Providers. [Citation Graph (0, 0)][DBLP] Pervasive, 2002, pp:1-14 [Conf]
- Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, Arthur W. Berger, Bruce M. Maggs
Locating internet routing instabilities. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2004, pp:205-218 [Conf]
- Ningning Hu, Erran L. Li, Zhuoqing Morley Mao, Peter Steenkiste, Jia Wang
Locating internet bottlenecks: algorithms, measurements, and implications. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2004, pp:41-54 [Conf]
- Zhuoqing Morley Mao, Ramesh Govindan, George Varghese, Randy H. Katz
Route flap damping exacerbates internet routing convergence. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2002, pp:221-233 [Conf]
- Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, Randy H. Katz
Towards an accurate AS-level traceroute tool. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2003, pp:365-378 [Conf]
- Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, Zhuoqing Morley Mao, Scott Shenker, Ion Stoica
HLP: a next generation inter-domain routing protocol. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2005, pp:13-24 [Conf]
- Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Gao, Randy Bush
A measurement study on the impact of routing events on end-to-end internet path performance. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2006, pp:375-386 [Conf]
- Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
On AS-level path inference. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2005, pp:339-349 [Conf]
- Matthew Roughan, Timothy Griffin, Zhuoqing Morley Mao, Albert G. Greenberg, Brian Freeman
Combining routing and traffic data for detection of IP forwarding anomalies. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2004, pp:416-417 [Conf]
- Xin Hu, Zhuoqing Morley Mao
Accurate Real-time Identification of IP Prefix Hijacking. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:3-17 [Conf]
- Zhuoqing Morley Mao, Charles D. Cranor, Fred Douglis, Michael Rabinovich, Oliver Spatscheck, Jia Wang
A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2002, pp:229-242 [Conf]
- Rangarajan Vasudevan, Zhuoqing Morley Mao, Oliver Spatscheck, Jacobus E. van der Merwe
Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2006, pp:157-170 [Conf]
- Zhuoqing Morley Mao, David Johnson, Oliver Spatscheck, Jacobus E. van der Merwe, Jia Wang
Efficient and robust streaming provisioning in VPNs. [Citation Graph (0, 0)][DBLP] WWW, 2003, pp:118-127 [Conf]
- Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, David Watson, Farnam Jahanian, Danny McPherson
Toward understanding distributed blackhole placement. [Citation Graph (0, 0)][DBLP] WORM, 2004, pp:54-64 [Conf]
- Ying Zhang, Evan Cooke, Zhuoqing Morley Mao
Internet-scale malware mitigation: combining intelligence of the control and data plane. [Citation Graph (0, 0)][DBLP] WORM, 2006, pp:33-40 [Conf]
- Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, S. Ross, Ben Y. Zhao
The Ninja architecture for robust Internet-scale systems and services. [Citation Graph (0, 0)][DBLP] Computer Networks, 2001, v:35, n:4, pp:473-497 [Journal]
- Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
Characterizing Dark DNS Behavior. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:140-156 [Conf]
- Ying Zhang, Zhuoqing Morley Mao, Jia Wang
A Firewall for Routers: Protecting against Routing Misbehavior. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:20-29 [Conf]
- Ying Zhang, Zhuoqing Morley Mao, Jia Wang
A Framework for Measuring and Predicting the Impact of Routing Changes. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:339-347 [Conf]
- Jian Wu, Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang
Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network. [Citation Graph (0, 0)][DBLP] NSDI, 2005, pp:- [Conf]
- Michael Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario
Automated Classification and Analysis of Internet Malware. [Citation Graph (0, 0)][DBLP] RAID, 2007, pp:178-197 [Conf]
- Himabindu Pucha, Ying Zhang, Zhuoqing Morley Mao, Y. Charlie Hu
Understanding network delay changes caused by routing events. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2007, pp:73-84 [Conf]
Performance and power modeling in a multi-programmed multi-core environment. [Citation Graph (, )][DBLP]
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. [Citation Graph (, )][DBLP]
HC-BGP: A light-weight and flexible scheme for securing prefix ownership. [Citation Graph (, )][DBLP]
Differentiated BGP Update Processing for Improved Routing Convergence. [Citation Graph (, )][DBLP]
TCP revisited: a fresh look at TCP in the wild. [Citation Graph (, )][DBLP]
Detecting traffic differentiation in backbone ISPs with NetPolice. [Citation Graph (, )][DBLP]
On the impact of route monitor selection. [Citation Graph (, )][DBLP]
Wide-Area IP Network Mobility. [Citation Graph (, )][DBLP]
Cache contention and application performance prediction for multi-core systems. [Citation Graph (, )][DBLP]
Anatomizing application performance differences on smartphones. [Citation Graph (, )][DBLP]
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing. [Citation Graph (, )][DBLP]
Effective Diagnosis of Routing Disruptions from End Systems. [Citation Graph (, )][DBLP]
Peeking into Spammer Behavior from a Unique Vantage Point. [Citation Graph (, )][DBLP]
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. [Citation Graph (, )][DBLP]
A Measurement Study of Internet Delay Asymmetry. [Citation Graph (, )][DBLP]
Ispy: detecting ip prefix hijacking on my own. [Citation Graph (, )][DBLP]
DECOR: DEClaritive network management and OpeRation. [Citation Graph (, )][DBLP]
Botnet spam campaigns can be long lasting: evidence, implications, and analysis. [Citation Graph (, )][DBLP]
A case for unsupervised-learning-based spam filtering. [Citation Graph (, )][DBLP]
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. [Citation Graph (, )][DBLP]
Practical defenses against BGP prefix hijacking. [Citation Graph (, )][DBLP]
Internet routing resilience to failures: analysis and implications. [Citation Graph (, )][DBLP]
PACMAN: a platform for automated and controlled network operations and configuration management. [Citation Graph (, )][DBLP]
DECOR: DEClarative network management and OpeRation. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.009secs
|