Found 219 results
Author Title [ Type(Asc)] Year
Filters: Author is Vern Paxson  [Clear All Filters]
Journal Article
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2006).  Network Loss Tomography Using Striped Unicast Probes. IEEE/ACM Transactions on Networking. 697-710.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  Inside the Slammer Worm. IEEE Magazine of Security and Privacy. 1(4), 33-39.
Paxson, V. (1994).  Growth Trends in Wide-Area TCP Connections. IEEE Network. 8-17.
Paxson, V. (1997).  Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic. Computer Communication Review. 27(5), 5-18.
Paxson, V. (1997).  End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking. 5(5), 601-615.
Paxson, V. (1999).  End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking. 7(3), 277-292.
Paxson, V. (1994).  Empirically-Derived Analytic Models of Wide-Area TCP Connections. IEEE/ACM Transactions on Networking. 2,
Floyd, S., & Paxson V. (2001).  Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking. 9(4), 392-403.
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
Mahajan, R., Bellovin S. M., Floyd S., Ioannidis J., Paxson V., & Shenker S. J. (2002).  Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM Computer Communication Review. 32(3), 62-73.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
Paxson, V., Mahdavi J., Adams A. K., & Mathis M. (1998).  An Architecture for Large-Scale Internet Measurement. IEEE Communications. 36(8), 48-54.
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Paxson, V. (2001).  An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. 31(3), 
Mahajan, R., Bellovin S. M., Floyd S., Ioannidis J., Paxson V., & Shenker S. J. (2002).  Aggregate Congestion Control. ACM SIGCOMM Computer Communication Review. 32(1), 69.
Jung, J., Milito R. A., & Paxson V. (2008).  On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. Journal on Computer Virology. 4(1), 197-210.
Conference Paper
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Paxson, V., & Floyd S. (1997).  Why We Don't Know How To Simulate The Internet. Proceedings of the 1997 Winter Simulation Conference.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.