Publications

Found 223 results
Author Title [ Type(Desc)] Year
Filters: Author is Vern Paxson  [Clear All Filters]
Conference Paper
Marczak, B., & Paxson V. (2017).  Social Engineering Attacks on Government Opponents: Target Perspectives. Proceedings on Privacy Enhancing Technologies. 2, 152-164.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Grier, C., Thomas K., Paxson V., & Zhang M. (2010).  @spam: The Underground on 140 Characters or Less. 27-37.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 52(9), 99-107.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 3-14.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Paxson, V. (2004).  Strategies for Sound Internet Measurement. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Rasti, R., Murthy M., Weaver N., & Paxson V. (2015).  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks.
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Yegneswaran, V., Barford P., & Paxson V. (2005).  Using Honeynets for Internet Situational Awareness. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Muthukrishnan, C.., Paxson V., Allman M., & Akella A. (2010).  Using Strongly Typed Networking to Architect for Tussle.
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.

Pages