Publications
A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.
Journal on Computer Virology. 4(1), 197-210.
(2008). Aggregate Congestion Control.
ACM SIGCOMM Computer Communication Review. 32(1), 69.
(2002).
(2001). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009). An Architecture for Large-Scale Internet Measurement.
IEEE Communications. 36(8), 48-54.
(1998). On the Characteristics and Origins of Internet Flow Rates.
ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
(2002). Controlling High Bandwidth Aggregates in the Network.
ACM SIGCOMM Computer Communication Review. 32(3), 62-73.
(2002). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Difficulties in Simulating the Internet.
IEEE/ACM Transactions on Networking. 9(4), 392-403.
(2001). Empirically-Derived Analytic Models of Wide-Area TCP Connections.
IEEE/ACM Transactions on Networking. 2,
(1994). End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking. 7(3), 277-292.
(1999). End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking. 5(5), 601-615.
(1997). Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic.
Computer Communication Review. 27(5), 5-18.
(1997). Growth Trends in Wide-Area TCP Connections.
IEEE Network. 8-17.
(1994). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003). Network Loss Tomography Using Striped Unicast Probes.
IEEE/ACM Transactions on Networking. 697-710.
(2006). The Network Oracle.
Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
(2005). Observed Structure of Addresses in IP Traffic.
IEEE/ACM Transactions on Networking. 14(16), 1207-1218.
(2006). On the Potential Abuse of IGMP.
ACM Computer Communication Review. 47(1),
(2017). A Primer on IPv4 Scarcity.
ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
(2015). Towards Situational Awareness of Large-Scale Botnet Probing Events.
IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
(2011).
(2000). Where Mathematics Meets the Internet.
Notices of the American Mathematical Society. 45(8), 961-970.
(1998).