Publications
Scaling Phenomena in the Internet: Critically Examining Criticality.
Proceedings of National Academy of Science of the United States of America (PNAS). 99,
(2002). Robust TCP Reassembly in the Presence of Adversaries.
Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.
(2005).
(2009). RFC 4440: IAB Thoughts on the Role of the Internet Research Task Force (IRTF).
(Floyd, S., Paxson V., & Falk A., Ed.).
(2006). Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
(2006). Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the International World Wide Web Conference.
(2016).
(2011).
(2011). A Reactive Measurement Framework.
92-101.
(2008).
(2012).
Protocol-Independent Adaptive Replay of Application Dialog.
Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
(2006). Profiling Underground Merchants Based on Network Behavior.
Proceedings of APWG eCrime 2016.
(2016).
(2008). A Primer on IPv4 Scarcity.
ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
(2015). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).
(2010).
(2008). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016).
(2013).
(2010). On the Potential Abuse of IGMP.
ACM Computer Communication Review. 47(1),
(2017). Pktd: A Packet Capture and Injection Daemon.
Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
(2003).
(2010).
Opportunistic Measurement: Extracting Insight from Spurious Traffic.
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
(2005). Operational Experiences with High-Volume Network Intrusion Detection.
Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
(2004).