Publications
(2008).
(2008).
(2008).
(2008).
A Reactive Measurement Framework.
92-101.
(2008).
(2008).
(2008).
(2008).
(2007).
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
1-7.
(2007). A Brief History of Scanning.
77-82.
(2007).
(2007).
(2007).
(2007). The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
(2007). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007). Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention.
Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2007). binpac: A yacc for Writing Application Protocol Parsers.
Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
(2006). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006). Enhancing Network Intrusion Detection With Integrated Sampling and Filtering.
Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
(2006). Fighting Coordinated Attackers with Cross-Organizational Information on Sharing.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
(2006). Network Loss Tomography Using Striped Unicast Probes.
IEEE/ACM Transactions on Networking. 697-710.
(2006).