Publications
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009).
(2007).
(2014).
(2015).
(2012).
(2010).
(2015).
(2011).
(2000).
(2009).
(2015).
(2009).
(2008).
Ethical Concerns for Censorship Measurement.
Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015).
(2011). Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
(2005).
(2011).
(2011).
Here Be Web Proxies.
8362, 183-192.
(2014).
(2010).
(2012). How to Own the Internet in Your Spare Time.
Proceedings of the Eleventh USENIX Security Symposium (Security '02).
(2002).
(2011).
Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003).