Publications
Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). Active Mapping: Resisting NIDS Evasion Without Altering Traffic.
Proceedings of the IEEE Symposium on Security and Privacy.
(2003). Enhancing Byte-Level Network Intrusion Detection Signatures with Context.
Proceedings of ACM CCS.
(2003). A High-level Programming Environment for Packet Trace Anonymization and Transformation.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
(2003). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003).
(2003). Pktd: A Packet Capture and Injection Daemon.
Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
(2003).
(2003). A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003). Aggregate Congestion Control.
ACM SIGCOMM Computer Communication Review. 32(1), 69.
(2002). On the Characteristics and Origins of Internet Flow Rates.
ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
(2002). On the Characteristics and Origins of Internet Flow Rates.
Proceedings of the ACM SIGCOMM Conference. 309-322.
(2002). Controlling High Bandwidth Aggregates in the Network.
ACM SIGCOMM Computer Communication Review. 32(3), 62-73.
(2002). Estimating Router ICMP Generation Delays.
Proceedings of Passive & Active Measurement: PAM-2002.
(2002). How to Own the Internet in Your Spare Time.
Proceedings of the Eleventh USENIX Security Symposium (Security '02).
(2002).
(2002).
(2002). Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay.
Proceedings of RAID.
(2002). Observed Structure of Addresses in IP Traffic.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
(2002). Scaling Phenomena in the Internet: Critically Examining Criticality.
Proceedings of National Academy of Science of the United States of America (PNAS). 99,
(2002).
(2001).
On the Constancy of Internet Path Properties.
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop (IMW '01). 197-211.
(2001). Difficulties in Simulating the Internet.
IEEE/ACM Transactions on Networking. 9(4), 392-403.
(2001).