Found 220 results
Author [ Title(Desc)] Type Year
Filters: Author is V. Paxson  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Weaver, N., Staniford S., & Paxson V. (2007).  Very Fast Containment of Scanning Worms, Revisited. 113-145.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.
Paxson, V., & Floyd S. (1997).  Why We Don't Know How To Simulate The Internet. Proceedings of the 1997 Winter Simulation Conference.
Paxson, V., & Floyd S. (1995).  Wide-Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking. 3(3), 226-244.
Srivastava, M., Hansen M., Burke J., Parker A., Reddy S., Saurabh G., et al. (2006).  Wireless Urban Sensing Systems.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.