Publications

Found 223 results
Author [ Title(Asc)] Type Year
Filters: Author is Vern Paxson  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Cui, W., Paxson V., Weaver N., & Katz R. H. (2006).  Protocol-Independent Adaptive Replay of Application Dialog. Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication Over DNS. SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Felegyhazi, M., Kreibich C., & Paxson V. (2010).  On the Potential of Proactive Domain Blacklisting.
Sargent, M., Kristoff J., Paxson V., & Allman M. (2017).  On the Potential Abuse of IGMP. ACM Computer Communication Review. 47(1), 
Gonzalez, J. Maria, & Paxson V. (2003).  Pktd: A Packet Capture and Injection Daemon. Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.

Pages