Publications

Found 215 results
Author Title [ Type(Desc)] Year
Filters: Author is Vern Paxson  [Clear All Filters]
Technical Report
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Tschantz, M. Carl, Afroz S., Paxson V., & Tygar J.D.. (2014).  On Modeling the Costs of Censorship. CoRR. abs/1409.3211,
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  The Spread of the Sapphire/Slammer Worm.
Zhang, Y., Paxson V., & Shenker S. (2000).  The Stationarity of Internet Path Properties: Routing, Loss, and Throughput.
Rasti, R., Murthy M., & Paxson V. (2014).  Temporal Lensing and its Application in Pulsing Denial of Service Attacks.
Nechaev, B., Paxson V., Allman M., Bennett M., & Gurtov A. (2013).  Towards Methodical Calibration: A Case Study of Enterprise Switch Measurements.
Srivastava, M., Hansen M., Burke J., Parker A., Reddy S., Saurabh G., et al. (2006).  Wireless Urban Sensing Systems.

Pages