Publications

Found 773 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
Conference Paper
Zhang, C. Micahel, & Paxson V. (2011).  Detecting and Analyzing Automated Activity on Twitter.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Zhang, Y., & Paxson V. (2000).  Detecting Backdoors. Proceedings of the Ninth USENIX Security Symposium.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Beamer, S., Asanović K., & Patterson D. (2012).  Direction-Optimizing Breadth-First Search.
Caballero, J., Poosankam P., Kreibich C., & Song D. (2009).  Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering. 621-634.
Almeida, M., Finamore A., Perino D., Vallina-Rodriguez N., & Varvello M. (2017).  Dissecting DNS Stakeholders in Mobile Networks. Proceedings of CoNEXT.
Beamer, S., Buluç A., Asanović K., & Patterson D. (2013).  Distributed Memory Breadth-First Search Revisited: Enabling Bottom-Up Search.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Vutukuru, M., Balakrishnan H., & Paxson V. (2008).  Efficient and Robust TCP Stream Normalization. 96-110.
DeNero, J., Bansal M., Pauls A., & Klein D. (2009).  Efficient Parsing for Transducer Grammars. 227-235.
Favre, B., Hakkani-Tür D., Petrov S., & Klein D. (2008).  Efficient Sentence Segmentation Using Syntactic Features. 77-80.
de Melo, G., Baker C. F., Ide N., Passonneau R. J., & Fellbaum C. (2012).  Empirical Comparisons of MASC Word Sense Annotations.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Allman, M., Christensen K.., Nordman B., & Paxson V. (2007).  Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems.

Pages