Found 15 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is D and Author is Vern Paxson  [Clear All Filters]
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Floyd, S., & Paxson V. (2001).  Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking. 9(4), 392-403.
Zhang, Y., & Paxson V. (2000).  Detecting Backdoors. Proceedings of the Ninth USENIX Security Symposium.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.