The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vern Paxson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Robin Sommer, Vern Paxson
    Exploiting Independent State For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:59-71 [Conf]
  2. Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer
    Operational experiences with high-volume network intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:2-11 [Conf]
  3. Robin Sommer, Vern Paxson
    Enhancing byte-level network intrusion detection signatures with context. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:262-271 [Conf]
  4. Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
    Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:206-221 [Conf]
  5. Nicholas Weaver, Vern Paxson, José M. González
    The shunt: an FPGA-based accelerator for network intrusion prevention. [Citation Graph (0, 0)][DBLP]
    FPGA, 2007, pp:199-206 [Conf]
  6. Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson
    binpac: a yacc for writing application protocol parsers. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:289-300 [Conf]
  7. Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal
    Semi-automated discovery of application session structure. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:119-132 [Conf]
  8. Vern Paxson
    Strategies for sound internet measurement. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:263-271 [Conf]
  9. Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker
    Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:253-266 [Conf]
  10. Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson
    Characteristics of internet background radiation. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:27-40 [Conf]
  11. Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer
    Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:267-272 [Conf]
  12. Abhishek Kumar, Vern Paxson, Nicholas Weaver
    Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:351-364 [Conf]
  13. Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney
    A First Look at Modern Enterprise Traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:15-28 [Conf]
  14. Nick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley
    Inferring Link Loss Using Striped Unicast Probes. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:915-923 [Conf]
  15. Paul Francis, Sugih Jamin, Vern Paxson, Lixia Zhang, Daniel F. Gryniewicz, Yixin Jin
    An Architecture for a Global Internet Host Distance Estimation Service. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:210-217 [Conf]
  16. Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
    Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  17. Vern Paxson
    Defending against network IDS evasion. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  18. David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford
    Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:17-35 [Conf]
  19. José M. González, Vern Paxson
    Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:272-289 [Conf]
  20. Mark Allman, Vern Paxson
    On Estimating End-to-End Network Path Properties. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1999, pp:263-274 [Conf]
  21. Ruoming Pang, Vern Paxson
    A high-level programming environment for packet trace anonymization and transformation. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:339-351 [Conf]
  22. Vern Paxson
    End-to-end Routing Behavior in the Internet. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1996, pp:25-38 [Conf]
  23. Vern Paxson
    End-to-end Internet Packet Dynamics. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1997, pp:139-152 [Conf]
  24. Vern Paxson
    Automated Packet Trace Analysis of TCP Implementations. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1997, pp:167-179 [Conf]
  25. Vern Paxson, Sally Floyd
    Wide-Area Traffic: The Failure of Poisson Modeling. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1994, pp:257-268 [Conf]
  26. Yin Zhang, Lee Breslau, Vern Paxson, Scott Shenker
    On the characteristics and origins of internet flow rates. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:309-322 [Conf]
  27. Vern Paxson
    Measuring adversaries. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:142- [Conf]
  28. Vern Paxson
    On Calibrating Measurements of Packet Transit Times. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:11-21 [Conf]
  29. Carey L. Williamson, Walter Willinger, Vern Paxson, Benjamin Melamed
    Network Traffic Measurement and Modelling (Panel). [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1995, pp:56-57 [Conf]
  30. Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan
    Fast Portscan Detection Using Sequential Hypothesis Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:211-225 [Conf]
  31. Umesh Shankar, Vern Paxson
    Active Mapping: Resisting NIDS Evasion without Altering Traffic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:44-61 [Conf]
  32. Vern Paxson, Chris Saltmarsh
    Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1993, pp:141-156 [Conf]
  33. Stuart Staniford, Vern Paxson, Nicholas Weaver
    How to Own the Internet in Your Spare Time. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:149-167 [Conf]
  34. Nicholas Weaver, Stuart Staniford, Vern Paxson
    Very Fast Containment of Scanning Worms. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:29-44 [Conf]
  35. Vern Paxson, Sally Floyd
    Why We Don't Know How To Simulate the Internet. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1997, pp:1037-1044 [Conf]
  36. Vern Paxson
    An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:51- [Conf]
  37. Stuart Staniford, David Moore, Vern Paxson, Nicholas Weaver
    The top speed of flash worms. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:33-42 [Conf]
  38. Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson
    Preliminary results using scale-down to explore worm dynamics. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:65-72 [Conf]
  39. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  40. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Aggregate congestion control. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal]
  41. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal]
  42. Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
    The devil and packet trace anonymization. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2006, v:36, n:1, pp:29-38 [Journal]
  43. Vern Paxson
    End-to-end routing behavior in the internet. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2006, v:36, n:5, pp:41-56 [Journal]
  44. Vern Paxson
    Bro: a system for detecting network intruders in real-time. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:23-24, pp:2435-2463 [Journal]
  45. Vern Paxson
    Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic [Citation Graph (0, 0)][DBLP]
    CoRR, 1998, v:0, n:, pp:- [Journal]
  46. Joseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall
    The Network Oracle. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2005, v:28, n:1, pp:3-10 [Journal]
  47. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver
    Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal]
  48. Vern Paxson, Michael Waidner
    Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:81- [Journal]
  49. Sally Floyd, Vern Paxson
    Difficulties in simulating the internet. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2001, v:9, n:4, pp:392-403 [Journal]
  50. Vern Paxson
    Empirically derived analytic models of wide-area TCP connections. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1994, v:2, n:4, pp:316-336 [Journal]
  51. Vern Paxson
    End-to-end routing behavior in the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:5, pp:601-615 [Journal]
  52. Vern Paxson
    End-to-end internet packet dynamics. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1999, v:7, n:3, pp:277-292 [Journal]
  53. Vern Paxson, Sally Floyd
    Wide area traffic: the failure of Poisson modeling. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1995, v:3, n:3, pp:226-244 [Journal]
  54. Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker
    Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:16, n:6, pp:1207-1218 [Journal]
  55. Nick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley
    Network loss tomography using striped unicast probes. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:14, n:4, pp:697-710 [Journal]
  56. Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson
    On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:175-192 [Conf]
  57. Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney
    The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:107-126 [Conf]

  58. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. [Citation Graph (, )][DBLP]


  59. An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP]


  60. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


  61. Automating analysis of large-scale botnet probing events. [Citation Graph (, )][DBLP]


  62. A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  63. Issues and etiquette concerning use of shared measurement data. [Citation Graph (, )][DBLP]


  64. A brief history of scanning. [Citation Graph (, )][DBLP]


  65. On dominant characteristics of residential broadband internet traffic. [Citation Graph (, )][DBLP]


  66. On calibrating enterprise switch measurements. [Citation Graph (, )][DBLP]


  67. Detecting Forged TCP Reset Packets. [Citation Graph (, )][DBLP]


  68. On the Spam Campaign Trail. [Citation Graph (, )][DBLP]


  69. A Reactive Measurement Framework. [Citation Graph (, )][DBLP]


  70. A Longitudinal View of HTTP Traffic. [Citation Graph (, )][DBLP]


  71. Predicting the Resource Consumption of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  72. Enriching network security analysis with time travel. [Citation Graph (, )][DBLP]


  73. Predicting the resource consumption of network intrusion detection systems. [Citation Graph (, )][DBLP]


  74. Efficient and Robust TCP Stream Normalization. [Citation Graph (, )][DBLP]


  75. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. [Citation Graph (, )][DBLP]


  76. Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP]


  77. A taxonomy of computer worms. [Citation Graph (, )][DBLP]


  78. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


  79. An analysis of using reflectors for distributed denial-of-service attacks. [Citation Graph (, )][DBLP]


  80. Selecting the 2008 sigcomm test-of-time awardwinner(s). [Citation Graph (, )][DBLP]


  81. On estimating end-to-end network path properties. [Citation Graph (, )][DBLP]


  82. An architecture for exploiting multi-core processors to parallelize network intrusion prevention. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002