Publications

Found 215 results
Author Title Type [ Year(Asc)]
Filters: Author is Vern Paxson  [Clear All Filters]
2006
Cui, W., Paxson V., Weaver N., & Katz R. H. (2006).  Protocol-Independent Adaptive Replay of Application Dialog. Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
[Anonymous] (2006).  RFC 4440: IAB Thoughts on the Role of the Internet Research Task Force (IRTF). (Floyd, S., Paxson V., & Falk A., Ed.).
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2006).  Semi-Automated Discovery of Application Session Structure. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
Srivastava, M., Hansen M., Burke J., Parker A., Reddy S., Saurabh G., et al. (2006).  Wireless Urban Sensing Systems.
2005
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Kornexl, S.., Paxson V., Dreger H., Feldmann A., & Sommer R. (2005).  Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2005).  Detecting Hidden Causality in Network Connections.
Dreger, H., Kreibich C., Paxson V., & Sommer R. (2005).  Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
Sommer, R., & Paxson V. (2005).  Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
Kumar, A., Paxson V., & Weaver N. (2005).  Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
Pang, R., Allman M., Bennett M., Lee J., Paxson V., & Tierney B. (2005).  A First Look at Modern Enterprise Traffic. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 15-28.
Hellerstein, J. M., Paxson V., Peterson L., Roscoe T., Shenker S., & Wetherall D. (2005).  The Network Oracle. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Dharmapurikar, S., & Paxson V. (2005).  Robust TCP Reassembly in the Presence of Adversaries. Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.
Yegneswaran, V., Barford P., & Paxson V. (2005).  Using Honeynets for Internet Situational Awareness. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
2004
Pang, R., Yegneswaran V., Barford P., Paxson V., & Peterson L. (2004).  Characteristics of Internet Background Radiation. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Jung, J., Paxson V., Berger A.., & Balakrishnan H. (2004).  Fast Portscan Detection Using Sequention Hypothesis Testing. Proceedings of IEEE Symposium on Security and Privacy. 211-225.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2004).  Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Paxson, V. (2004).  Strategies for Sound Internet Measurement. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.

Pages