Publications
On Estimating End-to-End Network Path Properties.
ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
(2001).
(2008). Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
(2005). Enhancing Network Intrusion Detection With Integrated Sampling and Filtering.
Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
(2006). Enhancing Byte-Level Network Intrusion Detection Signatures with Context.
Proceedings of ACM CCS.
(2003). End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking. 5(5), 601-615.
(1997). End-to-End Internet Packet Dynamics.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997). End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking. 7(3), 277-292.
(1999).
(2007). Empirically-Derived Analytic Models of Wide-Area TCP Connections.
IEEE/ACM Transactions on Networking. 2,
(1994).
(2008). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006).
(2009). Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick.
25(5), 1805-1869.
(1997). Difficulties in Simulating the Internet.
IEEE/ACM Transactions on Networking. 9(4), 392-403.
(2001). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Detecting Stepping Stones.
Proceedings of the Ninth USENIX Security Symposium.
(2000).
(2013).
(2005).
(2009). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Detecting Backdoors.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019).
(2011).