Publications
Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003). Growth Trends in Wide-Area TCP Connections.
IEEE Network. 8-17.
(1994). Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic.
Computer Communication Review. 27(5), 5-18.
(1997). End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking. 5(5), 601-615.
(1997). End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking. 7(3), 277-292.
(1999). Empirically-Derived Analytic Models of Wide-Area TCP Connections.
IEEE/ACM Transactions on Networking. 2,
(1994). Difficulties in Simulating the Internet.
IEEE/ACM Transactions on Networking. 9(4), 392-403.
(2001). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Controlling High Bandwidth Aggregates in the Network.
ACM SIGCOMM Computer Communication Review. 32(3), 62-73.
(2002). On the Characteristics and Origins of Internet Flow Rates.
ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
(2002). An Architecture for Large-Scale Internet Measurement.
IEEE Communications. 36(8), 48-54.
(1998). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009).
(2001). Aggregate Congestion Control.
ACM SIGCOMM Computer Communication Review. 32(1), 69.
(2002). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.
Journal on Computer Virology. 4(1), 197-210.
(2008). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). Why We Don't Know How To Simulate The Internet.
Proceedings of the 1997 Winter Simulation Conference.
(1997).
(2014).
(2011). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018). Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004). VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016).
(2010).