Publications

Found 217 results
Author Title [ Type(Desc)] Year
Filters: Author is Vern Paxson  [Clear All Filters]
Conference Paper
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Journal Article
Jung, J., Milito R. A., & Paxson V. (2008).  On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. Journal on Computer Virology. 4(1), 197-210.
Mahajan, R., Bellovin S. M., Floyd S., Ioannidis J., Paxson V., & Shenker S. (2002).  Aggregate Congestion Control. ACM SIGCOMM Computer Communication Review. 32(1), 69.
Paxson, V. (2001).  An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. 31(3), 
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Paxson, V., Mahdavi J., Adams A. K., & Mathis M. (1998).  An Architecture for Large-Scale Internet Measurement. IEEE Communications. 36(8), 48-54.
Zhang, Y., Breslau L., Paxson V., & Shenker S. (2002).  On the Characteristics and Origins of Internet Flow Rates. ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
Mahajan, R., Bellovin S. M., Floyd S., Ioannidis J., Paxson V., & Shenker S. (2002).  Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM Computer Communication Review. 32(3), 62-73.
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
Floyd, S., & Paxson V. (2001).  Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking. 9(4), 392-403.
Paxson, V. (1994).  Empirically-Derived Analytic Models of Wide-Area TCP Connections. IEEE/ACM Transactions on Networking. 2,
Paxson, V. (1999).  End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking. 7(3), 277-292.
Paxson, V. (1997).  End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking. 5(5), 601-615.
Paxson, V. (1997).  Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic. Computer Communication Review. 27(5), 5-18.
Paxson, V. (1994).  Growth Trends in Wide-Area TCP Connections. IEEE Network. 8-17.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  Inside the Slammer Worm. IEEE Magazine of Security and Privacy. 1(4), 33-39.
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2006).  Network Loss Tomography Using Striped Unicast Probes. IEEE/ACM Transactions on Networking. 697-710.
Hellerstein, J. M., Paxson V., Peterson L., Roscoe T., Shenker S., & Wetherall D. (2005).  The Network Oracle. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
Kohler, E., Li J., Paxson V., & Shenker S. (2006).  Observed Structure of Addresses in IP Traffic. IEEE/ACM Transactions on Networking. 14(16), 1207-1218.
Sargent, M., Kristoff J., Paxson V., & Allman M. (2017).  On the Potential Abuse of IGMP. ACM Computer Communication Review. 47(1), 
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Adams, A. K., Bu T., Cáceres R., Duffield N., Friedman T., Horowitz J., et al. (2000).  The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior.
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.

Pages