Publications

Found 215 results
Author Title [ Type(Asc)] Year
Filters: Author is Vern Paxson  [Clear All Filters]
Conference Paper
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Rasti, R., Murthy M., Weaver N., & Paxson V. (2015).  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Paxson, V. (2004).  Strategies for Sound Internet Measurement. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 52(9), 99-107.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 3-14.
Grier, C., Thomas K., Paxson V., & Zhang M. (2010).  @spam: The Underground on 140 Characters or Less. 27-37.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Marczak, B., & Paxson V. (2017).  Social Engineering Attacks on Government Opponents: Target Perspectives. Proceedings on Privacy Enhancing Technologies. 2, 152-164.
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2006).  Semi-Automated Discovery of Application Session Structure. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,
Dharmapurikar, S., & Paxson V. (2005).  Robust TCP Reassembly in the Presence of Adversaries. Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.

Pages