Publications

Found 215 results
Author [ Title(Desc)] Type Year
Filters: Author is Vern Paxson  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Willinger, W., Paxson V., & Taqqu M. S. (1998).  Self-similarity and Heavy Tails: Structural Modeling of Network Traffic.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2006).  Semi-Automated Discovery of Application Session Structure. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Marczak, B., & Paxson V. (2017).  Social Engineering Attacks on Government Opponents: Target Perspectives. Proceedings on Privacy Enhancing Technologies. 2, 152-164.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.

Pages