Search the dblp DataBase
Vern Paxson :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Robin Sommer , Vern Paxson Exploiting Independent State For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:59-71 [Conf ] Holger Dreger , Anja Feldmann , Vern Paxson , Robin Sommer Operational experiences with high-volume network intrusion detection. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:2-11 [Conf ] Robin Sommer , Vern Paxson Enhancing byte-level network intrusion detection signatures with context. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:262-271 [Conf ] Holger Dreger , Christian Kreibich , Vern Paxson , Robin Sommer Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP ] DIMVA, 2005, pp:206-221 [Conf ] Nicholas Weaver , Vern Paxson , José M. González The shunt: an FPGA-based accelerator for network intrusion prevention. [Citation Graph (0, 0)][DBLP ] FPGA, 2007, pp:199-206 [Conf ] Ruoming Pang , Vern Paxson , Robin Sommer , Larry L. Peterson binpac: a yacc for writing application protocol parsers. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:289-300 [Conf ] Jayanthkumar Kannan , Jaeyeon Jung , Vern Paxson , Can Emre Koksal Semi-automated discovery of application session structure. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:119-132 [Conf ] Vern Paxson Strategies for sound internet measurement. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2004, pp:263-271 [Conf ] Eddie Kohler , Jinyang Li , Vern Paxson , Scott Shenker Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:253-266 [Conf ] Ruoming Pang , Vinod Yegneswaran , Paul Barford , Vern Paxson , Larry L. Peterson Characteristics of internet background radiation. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2004, pp:27-40 [Conf ] Stefan Kornexl , Vern Paxson , Holger Dreger , Anja Feldmann , Robin Sommer Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. [Citation Graph (0, 0)][DBLP ] Internet Measurment Conference, 2005, pp:267-272 [Conf ] Abhishek Kumar , Vern Paxson , Nicholas Weaver Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. [Citation Graph (0, 0)][DBLP ] Internet Measurment Conference, 2005, pp:351-364 [Conf ] Ruoming Pang , Mark Allman , Mike Bennett , Jason Lee , Vern Paxson , Brian Tierney A First Look at Modern Enterprise Traffic. [Citation Graph (0, 0)][DBLP ] Internet Measurment Conference, 2005, pp:15-28 [Conf ] Nick G. Duffield , Francesco Lo Presti , Vern Paxson , Donald F. Towsley Inferring Link Loss Using Striped Unicast Probes. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:915-923 [Conf ] Paul Francis , Sugih Jamin , Vern Paxson , Lixia Zhang , Daniel F. Gryniewicz , Yixin Jin An Architecture for a Global Internet Host Distance Estimation Service. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1999, pp:210-217 [Conf ] Weidong Cui , Vern Paxson , Nicholas Weaver , Randy H. Katz Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] Vern Paxson Defending against network IDS evasion. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] David L. Donoho , Ana Georgina Flesia , Umesh Shankar , Vern Paxson , Jason Coit , Stuart Staniford Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:17-35 [Conf ] José M. González , Vern Paxson Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:272-289 [Conf ] Mark Allman , Vern Paxson On Estimating End-to-End Network Path Properties. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1999, pp:263-274 [Conf ] Ruoming Pang , Vern Paxson A high-level programming environment for packet trace anonymization and transformation. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2003, pp:339-351 [Conf ] Vern Paxson End-to-end Routing Behavior in the Internet. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1996, pp:25-38 [Conf ] Vern Paxson End-to-end Internet Packet Dynamics. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1997, pp:139-152 [Conf ] Vern Paxson Automated Packet Trace Analysis of TCP Implementations. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1997, pp:167-179 [Conf ] Vern Paxson , Sally Floyd Wide-Area Traffic: The Failure of Poisson Modeling. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1994, pp:257-268 [Conf ] Yin Zhang , Lee Breslau , Vern Paxson , Scott Shenker On the characteristics and origins of internet flow rates. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2002, pp:309-322 [Conf ] Vern Paxson Measuring adversaries. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2004, pp:142- [Conf ] Vern Paxson On Calibrating Measurements of Packet Transit Times. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1998, pp:11-21 [Conf ] Carey L. Williamson , Walter Willinger , Vern Paxson , Benjamin Melamed Network Traffic Measurement and Modelling (Panel). [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1995, pp:56-57 [Conf ] Jaeyeon Jung , Vern Paxson , Arthur W. Berger , Hari Balakrishnan Fast Portscan Detection Using Sequential Hypothesis Testing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:211-225 [Conf ] Umesh Shankar , Vern Paxson Active Mapping: Resisting NIDS Evasion without Altering Traffic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:44-61 [Conf ] Vern Paxson , Chris Saltmarsh Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. [Citation Graph (0, 0)][DBLP ] USENIX Winter, 1993, pp:141-156 [Conf ] Stuart Staniford , Vern Paxson , Nicholas Weaver How to Own the Internet in Your Spare Time. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:149-167 [Conf ] Nicholas Weaver , Stuart Staniford , Vern Paxson Very Fast Containment of Scanning Worms. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:29-44 [Conf ] Vern Paxson , Sally Floyd Why We Don't Know How To Simulate the Internet. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1997, pp:1037-1044 [Conf ] Vern Paxson An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:51- [Conf ] Stuart Staniford , David Moore , Vern Paxson , Nicholas Weaver The top speed of flash worms. [Citation Graph (0, 0)][DBLP ] WORM, 2004, pp:33-42 [Conf ] Nicholas Weaver , Ihab Hamadeh , George Kesidis , Vern Paxson Preliminary results using scale-down to explore worm dynamics. [Citation Graph (0, 0)][DBLP ] WORM, 2004, pp:65-72 [Conf ] Ruzena Bajcsy , Terry Benzel , Matt Bishop , Robert Braden , Carla E. Brodley , Sonia Fahmy , Sally Floyd , W. Hardaker , Anthony D. Joseph , George Kesidis , Karl N. Levitt , Robert Lindell , Peng Liu , David Miller , Russ Mundy , Cliford Neuman , Ron Ostrenga , Vern Paxson , Phillip A. Porras , Catherine Rosenberg , J. Doug Tygar , Shankar Sastry , Daniel F. Sterne , Shyhtsun Felix Wu Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Aggregate congestion control. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal ] Ruoming Pang , Mark Allman , Vern Paxson , Jason Lee The devil and packet trace anonymization. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2006, v:36, n:1, pp:29-38 [Journal ] Vern Paxson End-to-end routing behavior in the internet. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2006, v:36, n:5, pp:41-56 [Journal ] Vern Paxson Bro: a system for detecting network intruders in real-time. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:23-24, pp:2435-2463 [Journal ] Vern Paxson Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic [Citation Graph (0, 0)][DBLP ] CoRR, 1998, v:0, n:, pp:- [Journal ] Joseph M. Hellerstein , Vern Paxson , Larry L. Peterson , Timothy Roscoe , Scott Shenker , David Wetherall The Network Oracle. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 2005, v:28, n:1, pp:3-10 [Journal ] David Moore , Vern Paxson , Stefan Savage , Colleen Shannon , Stuart Staniford-Chen , Nicholas Weaver Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal ] Vern Paxson , Michael Waidner Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:81- [Journal ] Sally Floyd , Vern Paxson Difficulties in simulating the internet. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2001, v:9, n:4, pp:392-403 [Journal ] Vern Paxson Empirically derived analytic models of wide-area TCP connections. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1994, v:2, n:4, pp:316-336 [Journal ] Vern Paxson End-to-end routing behavior in the Internet. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:5, pp:601-615 [Journal ] Vern Paxson End-to-end internet packet dynamics. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1999, v:7, n:3, pp:277-292 [Journal ] Vern Paxson , Sally Floyd Wide area traffic: the failure of Poisson modeling. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1995, v:3, n:3, pp:226-244 [Journal ] Eddie Kohler , Jinyang Li , Vern Paxson , Scott Shenker Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2006, v:16, n:6, pp:1207-1218 [Journal ] Nick G. Duffield , Francesco Lo Presti , Vern Paxson , Donald F. Towsley Network loss tomography using striped unicast probes. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2006, v:14, n:4, pp:697-710 [Journal ] Jaeyeon Jung , Rodolfo A. Milito , Vern Paxson On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. [Citation Graph (0, 0)][DBLP ] DIMVA, 2007, pp:175-192 [Conf ] Matthias Vallentin , Robin Sommer , Jason Lee , Craig Leres , Vern Paxson , Brian Tierney The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:107-126 [Conf ] Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. [Citation Graph (, )][DBLP ] An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] Automating analysis of large-scale botnet probing events. [Citation Graph (, )][DBLP ] A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Issues and etiquette concerning use of shared measurement data. [Citation Graph (, )][DBLP ] A brief history of scanning. [Citation Graph (, )][DBLP ] On dominant characteristics of residential broadband internet traffic. [Citation Graph (, )][DBLP ] On calibrating enterprise switch measurements. [Citation Graph (, )][DBLP ] Detecting Forged TCP Reset Packets. [Citation Graph (, )][DBLP ] On the Spam Campaign Trail. [Citation Graph (, )][DBLP ] A Reactive Measurement Framework. [Citation Graph (, )][DBLP ] A Longitudinal View of HTTP Traffic. [Citation Graph (, )][DBLP ] Predicting the Resource Consumption of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Enriching network security analysis with time travel. [Citation Graph (, )][DBLP ] Predicting the resource consumption of network intrusion detection systems. [Citation Graph (, )][DBLP ] Efficient and Robust TCP Stream Normalization. [Citation Graph (, )][DBLP ] Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. [Citation Graph (, )][DBLP ] Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP ] A taxonomy of computer worms. [Citation Graph (, )][DBLP ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] An analysis of using reflectors for distributed denial-of-service attacks. [Citation Graph (, )][DBLP ] Selecting the 2008 sigcomm test-of-time awardwinner(s). [Citation Graph (, )][DBLP ] On estimating end-to-end network path properties. [Citation Graph (, )][DBLP ] An architecture for exploiting multi-core processors to parallelize network intrusion prevention. [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.013secs