Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    dataset    location   |
|   Citation Format:    abbreviated    complete   |
YearAuthor(s)TitlePublicationDataset
2020
Wang, RuohuiVerifying Self-Simularity For Current Network TrafficUniversity of Wisconsin-Madison Anonymized Internet Traces
2020
Zhou, Yu
Zhang, Dai
Gao, Kai
Sun, Chen
Cao, Jiamin
Wang, Yangyan
Xu, Mingwei
We, Jianping
Newton: intent-driven network traffic monitoringCoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Reviriego, Pedro
Pontarelli, Solvatore
When Filtering is not Possible Caching Negatives with Fingerprints Comes to the RescueCoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Hypolite, Joel
Sonchack, John
Hershkop, Shlomo
Dautenhahn, Nathan
DeHon, Andre
Smith, Jonathan M.
DeepMatch: Practical Deep Packet Inspection in the Data Planeusing Network ProcessorsCoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Hwan Song, Cha
Govindan Kannan, Pravein
Kian Hsiang Low, Byan
Choon Chan, Mun
FCM-Sketch: Generic Network Measurementswith Data Plane SupportCoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Yu, Liangcheng
Sonchack, John
Liu, Vincent
Mantis: Reactive Programmable SwitchesProceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication Anonymized Internet Traces
2020
Rzepka, M.
Borylo, P.
Lason, A.
Szymanski, A.
PARD: Hybrid Proactive and Reactive Method Eliminating Flow Setup Latency in SDNJournal of Network and Systems Management Anonymized Internet Traces
2020
Rashelbach, Alon
Rottenstreich, Ori
Silberstein, Mark
A Computational Approach to Packet ClassificationProceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication Anonymized Internet Traces
2020
Gong, Junzhi
Li, Yuliang
Anwer, Bilal
Shaikh, Aman
Yu, Minlan
Microscope: Queue-based Performance Diagnosis for Network FunctionsProceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication Anonymized Internet Traces
2020
Chen, X.
Landau-Feibish, S.
Braverman, M.
Rexford, J.
BeauCoup: Answering Many Network Traffic Queries, One Memory Update at a TimeAnnual conference of the ACM Special Interest Group on Data Communication on the applications, technologies Anonymized Internet Traces
2020
Turkovic, B.
Oostenbrink, J.
Kuipers, F.A.
Keslassy, I.
Orda, A.
Sequential zeroing: Online heavy-hitter detection on programmable hardwareIFIP Networking Anonymized Internet Traces
2020
Sarker, I.Cybersecurity Data Science: An Overview from Machine Learning Perspectivepreprints.org Anonymized Internet Traces
Denial of Service Attacks
2020
Grigoryan, G.
Liu, Y.
Kwon, M.
Boosting FIB caching performance with aggregationProc. Intl Symp. on High-Performance Parallel and Distributed Computing (HPDC) Anonymized Internet Traces
2020
Basat, R. B.
Chen, X.
Einziger, G.
Feibish, S. L.
Raz, D.
Yu, M
Routing Oblivious Measurement AnalyticsIFIP Networking Conference Anonymized Internet Traces
2020
Ding, D.
Savi, M.
Siracusa, D.
Estimating Logarithmic and Exponential Functions to Track Network Traffic Entropy in P4NOMS -2020 IEEE/IFIP Network Operations and Management Symposium Anonymized Internet Traces
2020
Czachorski, Tadeusz
Gelenbe, Erol
Kuaban Suila, Godlove
Marek, Dariusv
Dynamics of Software Defined Networks: Diffusion ModelsResearchgate.net Anonymized Internet Traces
2020
Oeldemann, A.
Biersack, F.
Wild, T.
Herkersdorf, A.
Inter-server RSS: Extending receive side scaling for inter-server workload distributionEuromicro Intl Conf. on Parallel, Distributed and Network-Based Processing (PDP) Anonymized Internet Traces
2020
Mitzenmacher, M.
Pontarelli, S.
Reviriego, P.
Adaptive cuckoo filtersACM J. Exp. Algorithms Anonymized Internet Traces
2020
Ding, D.
Savi, M.
Antichi, G.
Siracusa, D.
An Incrementally-deployable P4-enabled Architecture for Network-wide Heavy-hitter DetectionIEEE Transactions on Network and Service Management Anonymized Internet Traces
2020
Levai, T.
Nemeth, F.
Raghavan, B.
Retvari, G.
Batchy: Batch-scheduling data flow graphs with service-level objectivesUSENIX NSDI Anonymized Internet Traces
2020
Wang, Toa
Zhu, Hang
Ruffym, Fabian
Jin, Xin
Sivaraman, Anirudh
Ports, Dan
Panda, Aurojit
Multitenancy for fast and programmable networks in the cloudUSENIX Workshop on Hot Topics in Cloud Computing, HotCloud , co-located with USENIX ATC 2020 Anonymized Internet Traces
2020
Reviriego, P.
Martinez, J.
Pontarelli, S.
Improving packet flow counting with fingerprint countingIEEE Comm. Lett. Anonymized Internet Traces
2019
Zhou, You
Zhang, Youlin
Ma, Chaoyi
Chen, Shigang
O. Odegbile, Olufemi
Generalized Sketch Families for Network TrafficMeasurementProceedings of the ACM on Measurement and Analysis of Computing Systems Anonymized Internet Traces
2019
Ivkin, Nikita
Yu, Zhuolong
Braverman, Vladimir
Jin, Xin
QPipe: quantiles sketch fully in the data planeCoNEXT 19: Proceedings of the International Conference on Emerging Networking Experiments And Technologies Anonymized Internet Traces
Other Datasets
Topology with Archipelago
2019
Ivkin, Nikita
Ben Basat, Ran
Liu, Zaoxing
Einziger, Gil
Friedman, Roy
Braverman, Vladimir
I Know What You Did Last Summer: Network Monitoring using Interval QueriesProceedings of the ACM on Measurement and Analysis of Computing Systems Anonymized Internet Traces
2019
Gomez, C.A.
Wang, X.
Shami, A.
Intelligent active queue management using explicit congestion notificationIEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2019
Chen, X.
Feibish, S. L.
Koral, Y.
Rexford, J.
Rottenstreich, O.
Monetti, S. A.
Wang, T. Y.
Fine-grained queue measurement in the data planeInternational Conference on Emerging Networking Experiments And Technologies Anonymized Internet Traces
2019
Yang, T.
Zhang, H.
Li, H.
Gong, J.
Uhlig, S.
Chen, S.
Uden, L.
Li, X.
HeavyKeeper: An accurate algorithm for finding top-k elephant flowsIEEE/ACM Trans. on Networking Anonymized Internet Traces
2019
Richter, Philipp
Berger, Arthur
Scanning the Scanners: Sensing the Internet from a MassivelyDistributed Network TelescopeIMC 19: Proceedings of the Internet Measurement Conference Anonymized Internet Traces
2019
Iannacone, M.D.
Bridges, R.A.
Quantifiable and comparable evaluations of cyber defensive capabilities: A survey and novel, unified approacharxiv.org Anonymized Internet Traces
2019
Xu, J.READ: a three-communicating-stage distributed super points detections algorithmarxiv.org Anonymized Internet Traces
2019
Monge, M.A.S.Knowledge acquisition for autonomic network management in emerging self-organizing architecturesUniv. of Madrid Anonymized Internet Traces
2019
Ivkin, N.
Liberty, E.
Lang, K.
Karnin, Z.
Braverman, V.
Streaming quantiles algorithms with small space and update timearxiv.org Anonymized Internet Traces
2019
Ding, D.
Savi, M.
Antichi, G.
Siracusa, D.
Incremental deployment of programmable switches for network-wide heavy-hitter detectionIEEE Conference on Network Softwarization (NetSoft) Anonymized Internet Traces
2019
Lazaris, A.
Prasanna, V. K.
An LSTM Framework For Modeling Network TrafficIFIP/IEEE Symp. on Integrated Network and Service Management (IM) Anonymized Internet Traces
2019
Hsu, C.-Y.
Indyk, P.
Katabi, D.
Vakilian, A.
Learning-based frequency estimation algorithmsIntl Conf. on Learning Representations Anonymized Internet Traces
2019
Shaikh, F.I.A.Security framework for the Internet of Things leveraging network telescopes and machine learningUniv. of South Florida Anonymized Internet Traces
2019
Dautrich, J.L.J.
Ravishankar, C.V.
Inferring insertion times and optimizing error penalties in time-decaying Bloom filtersACM Trans, on Database Systems (TODS) Anonymized Internet Traces
2019
Cohen, R.
Nezri, Y.
Cardinality estimation in a virtualized network device using online machine learningarxiv.org Anonymized Internet Traces
Denial of Service Attacks
2019
Turkovic, B.
Oostenbrink, J.
Kuipers, F.
Detecting heavy hitters in the data-planearxiv.org Anonymized Internet Traces
2019
Narayan, A.The design and implementation of a congestion control planeMassachusetts Inst. of Technology Anonymized Internet Traces
2019
Garcia-Dorado, Jose Luis
Aracil, Javier
Flow-concurrence and bandwidth ratio on the InternetComputer Communications Anonymized Internet Traces
2019
Zhuang, Z.
Wang, J.
Qi, Q.
Sun, H.
Liao, J.
Toward Greater Intelligence in Route Planning: A Graph-Aware Deep Learning ApproachIEEE Systems J. Anonymized Internet Traces
2019
Zhang, S.
Zhang, Y.
Yin, L.
Yuan, T.
Wu, Z.
Luo, H.
Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of ThingsIEEE Access Anonymized Internet Traces
2019
Yang, Y.
Eo, J.
Kim, G. W.
Kim, J. Y.
Lee, S.
Seo, J.
Song, W. W.
Chun, B. G.
Apache Nemo: A Framework for Building Distributed Dataflow Optimization PoliciesUSENIX Anonymized Internet Traces
2019
Yang, T.
Xu, J.
Liu, X.
Liu, P.
Wang, L.
Bi, J.
Li, X.
A Generic Technique for Sketches to Adapt to Different Counting RangesIEEE INFOCOM - IEEE Conference on Computer Communications Anonymized Internet Traces
2019
Wang, S.
Bi, J.
Sun, C.
Zhou, Y.
Prophet: Real-time Queue Length Inference in Programmable SwitchesACM Symp. on SDN Research Anonymized Internet Traces
2019
Tang, L.
Huang, Q.
Lee, P. P. C.
MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data StreamsIEEE INFOCOM - IEEE Conference on Computer Communications Anonymized Internet Traces
2019
Park, M.
Phan, T. V.
Efficient Distributed Denial-of-Service Attack Defense in SDN-Based CloudIEEE Access Anonymized Internet Traces
Denial of Service Attacks
2019
Oo, M. M.
Kamolphiwong, S.
Kamolphiwong, T.
Vasupongayya, S.
Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN)Journal of Computer Networks and Communications Anonymized Internet Traces
2019
Nasirian, F.
Pajouh, F. M.
Namayanja, J.
Exact algorithms for the minimum cost vertex blocker clique problemComputers and Operations Research Anonymized Internet Traces
2019
Luo, L.
Guo, D.
Zhao, X.
Wu, J.
Rottenstreich, O.
Luo, X.
Near-accurate multiset reconciliationIEEE Trans. on Knowledge and Data Engineering Anonymized Internet Traces
2019
Liu, P.
Benson, A. R.
Charikar, M.
Sampling Methods for Counting Temporal MotifsTwelfth ACM Intl Conf. on Web Search and Data Mining Anonymized Internet Traces
2019
Lin, Y. B.
Huang, C. C.
Tsai, S. C.
A SDN Soft Computing Application for Detecting Heavy HittersIEEE Transactions on Industrial Informatics Anonymized Internet Traces
2019
Lin, H.
Wang, C. L.
Efficient low-latency packet processing using On-GPU Thread-Data RemappingJournal of Parallel and Distributed Computing Anonymized Internet Traces
2019
Li, J.
Luo, H.
Zhang, S.
Li, H.
Yan, F.
Design and implementation of efficient control for incoming inter-domain traffic with Information-Centric NetworkingJournal of Network and Computer Applications Anonymized Internet Traces
2019
Leira, R.
Gifre, L.
Gonzalez, I.
Lopez de Vergara, J. E.
Aracil, J.
Wormhole: a novel big data platform for 100 Gbit/s network monitoring and beyondConference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) Anonymized Internet Traces
2019
Leira, R.
Julian-Moreno, G.
Gonzalez, I.
Gomez-Arribas, F. J.
Lopez de Vergara, J. E.
Performance assessment of 40 Gbit/s off-the-shelf network cards for virtual network probes in 5G networksComputer Networks Anonymized Internet Traces
2019
Lapolli, A. C.
Marques, J. A.
Gaspary, L. P.
Offloading Real-time DDoS Attack Detection to Programmable Data PlanesIFIP/IEEE Symp. on Integrated Network and Service Management (IM) Anonymized Internet Traces
Denial of Service Attacks
2019
Hu, H.
Zhai, X.
Wang, M.
Hu, G.
Graph analysis of network flow connectivity behaviorsTurkish Journal of Electrical Engineering and Computer Science Anonymized Internet Traces
2019
Gupta, L.
Jain, R.
Erbad, A.
Bhamare, D.
The P-ART framework for placement of virtual network services in a multi-cloud environmentComputer Communications Anonymized Internet Traces
2019
Fragkouli, G.
Argyraki, K.
Ford, B.
MorphIT: Morphing Packet Reports for Internet TransparencyProceedings on Privacy Enhancing Technologies Anonymized Internet Traces
2019
Dang, V.T.
Huong, T.T.
Nguyen, H.T.
Pham, N.N.
Nguyen, N.T.
Marshall, A.
SDN-based SYN proxy-A solution to enhance performance of attack mitigation under TCP SYN floodThe Computer J. Anonymized Internet Traces
2019
Czekaj, M.
Jamro, E.
Flow caching effectiveness in packet forwarding applicationsComputer Science Journal Anonymized Internet Traces
2019
Cao, J.
Yang, X.
Wang, Y.
A Hybrid Privacy Preserving against Multi-attacks for Network Data PublicationInternational Computer Science and Applications Conference (ICSAC ) Anonymized Internet Traces
2019
Cafaro, M.
Epicoco, I.
Pulimeno, M.
CMSS: Sketching based reliable tracking of large network flowsFuture Generation Computer Systems Anonymized Internet Traces
2019
Basat, R. B.
Chen, X.
Einziger, G.
Friedman, R.
Kassner, Y.
Randomized Admission Policy for Efficient Top-k, Frequency, and Volume EstimationIEEE/ACM Transactions on Networking Anonymized Internet Traces
2019
Alsirhani, A.
Sampalli, S.
Bodorik, P.
DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in Apache SparkIEEE Trans. on Network and Service Management Anonymized Internet Traces
2019
Alonso, T.
Ruiz, M.
Sutter, G.
Lopez-Buedo, S.
Lopez de Vergara, J. E.
Towards 100 GbE FPGA-Based Flow MonitoringX Southern Conference on Programmable Logic (SPL) Anonymized Internet Traces
2019
Alasmar, M.
Parisis, G.
Clegg, R.
Zakhleniu, N.
On the Distribution of Traffic Volumes in the Internet and its ImplicationsIEEE INFOCOM - IEEE Conference on Computer Communications Anonymized Internet Traces
2019
Aamir, M.
Zaidi, S. M. A.
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluationInternational Journal of Information Security Anonymized Internet Traces
2018
Zhao, Z.
Shi, X.
Yin, X.
Wang, Z.
HashFlow for better flow record collectionarxiv.org Anonymized Internet Traces
2018
Xu, J.
Ding, W.
Hu, X.
VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time windowarxiv.org Anonymized Internet Traces
2018
Bayati, A.
Nguyen, K. K.
Cheriet, M.
Multiple-step-ahead traffic prediction in high-speed networksIEEE Comm. Lett. Anonymized Internet Traces
2018
Pacheco, F.
Exposito, E.
Gineste, M.
Baudoin, C.
Aguilar, J.
Towards the deployment of machine learning solutions in network traffic classification: A systematic surveyIEEE Comm. Surveys and Tutorials Anonymized Internet Traces
2018
Nur, A.Y.The implications of the Internets topological structure for its efficiency, security, and reliabilityUniv. of Louisiana at Lafayette (ProQuest Publ.) Anonymized Internet Traces
Topology with BGP
2018
Fondo-Ferreiro, P.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Herreria-Alonso, S.
Matching SDN and legacy networking hardware for energy efficiency and bounded delaySensors Anonymized Internet Traces
2018
Engel, D.
Malone, T.W.
Integrated information as a metric for group interactionPlos One Anonymized Internet Traces
2018
Wu, N.
Tseng, S.
Tang, A.
Accurate rate-aware flow-level traffic splittingAllerton Conf. on Communication, Control, and Computing Anonymized Internet Traces
2018
Liu, P.
Benson, A.
Charikar, M.
A sampling framework for counting temporal motifsarxiv.org Anonymized Internet Traces
2018
Gupta, A.Flexible and scalable systems for network managementPrinceton Univ. Anonymized Internet Traces
2018
Dai, H.
Li, M.
Liu, A.
Finding persistent items in distributed datasetsConf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2018
Brandt, M.
Dai, T.
Klein, A.
Shulman, H.
Waidner, M.
Domain validation++ for MitM-resilient PKIACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
Topology with BGP
2018
Zhang, Z.
Qin, Q.
Ma, L.
Poularakis, K.
Le, F.
Leung, K.K.
Kompella, S.
Tassiulas, L.
Routing performance in distributed SDN under synchronization constraintdais-ita.org Anonymized Internet Traces
2018
Yang, T.
Gong, J.
Zhang, H.
Zou, L.
Shi, L.
Li, X.
HeavyGuardian: Separate and guard hot items in data streamsACM SIGKDD Intl Conf. on Knowledge Discovery and Data Mining Anonymized Internet Traces
2018
Ting, D.Count-Min: Optimal estimation and tight error bounds using empirical error distributionsConf. on Knowledge Discovery and Data Mining (SIGKDD) Anonymized Internet Traces
2018
Kostas, K.Anomaly detection in networks using machine learningUniv. of Essex Anonymized Internet Traces
2018
Gupta, A.
Harrison, R.
Canini, M.
Feamster, N.
Rexford, J.
Willinger, W.
Sonata: query-driven streaming network telemetryConf. on Special Interest Group on Data Communication Anonymized Internet Traces
2018
Cheng, Z.
Huang, Q.
Lee, P.P.C.
On the performance and convergence of distributed stream processing via approximate fault tolerancearxiv.org Anonymized Internet Traces
2018
Chen, C.Infrastructure-based anonymous communication protocols in future internet architecturesCarnegie Mellon Univ Anonymized Internet Traces
Topology with BGP
2018
Wu, H.
Hsiao, H.C.
Asoni, D.E.
Scherrer, S.
Perrig, A.
Hu, Y.C.
CLEF: Limiting the damage caused by large flows in the Internet core (technical report)arxiv.org Anonymized Internet Traces
2018
Sharafaldin, I.
Lashkari, A.H.
Ghorbani, A.A.
A detailed analysis of the CICIDS2017 data setIntl Conf. on Information Systems Security and Privacy Anonymized Internet Traces
Denial of Service Attacks
2018
Lee, J.
Choi, D.
Sael, L
CTD: Fast, accurate, and interpretable method for static and dynamic tensor decompositionsPLOS One Anonymized Internet Traces
2018
Grigoryan, G.
Yaoqing Liu, Y.
PFCA: a programmable FIB caching architectureSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2018
Goehring, M.
Shulman, H.
Waidner, M.
Path MTU discovery considered harmfulConf. on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2018
Ferreiro, P.F.Energy-efficient carrier SDN networksUniv. of Vigo Anonymized Internet Traces
2018
Fondo-Ferreiro, P.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Implementing energy saving algorithms for ethernet link aggregates with ONOSConf. on Software Defined Systems (SDS) Anonymized Internet Traces
2018
Arthur-Durett, K.
Carroll, T. E.
Chikkagoudar, S.
Discovering significant co-occurrences to characterize network behaviorsIntl Conf. on Human Interface and the Management of Information Anonymized Internet Traces
2018
Aral, A
Ovatman, T.
A decentralized replica placement algorithm for edge computingTrans. on Network and Service Management Anonymized Internet Traces
2018
Yu, Y.Ultra-fast and memory-efficient lookups for cloud, networked systems, and massive data managementUniv. of Kentucky Anonymized Internet Traces
2018
Lengvinas, A.Investigation of Internet traffic anomalies by application of neural networksVilnius Univ. Anonymized Internet Traces
2018
Kucera, J.
Popescu, D.A.
Antichi, G.
Korenek, J.
Moore, A.W.
Seek and Push: Detecting large traffic aggregates in the dataplanearxiv.org Anonymized Internet Traces
2018
Kirilin, V.
Gorinsky, S.
A protocol-ignorance perspective on incremental deployability of routing protocolsIFIP Networking Conf. (NETWORKING) Anonymized Internet Traces
Topology with Archipelago
2018
Glass-Vanderlan, T.R.
Iannacone, M.E.
Vincent, M.S.
Chen, Q.
Bridges, R.A.
A survey of Intrusion Detection Systems leveraging host dataarxiv.org Anonymized Internet Traces
2018
Zoder, O.Real-time detection of communication with blacklisted network hostsMasaryk Univ. Anonymized Internet Traces
2018
Suarez-Varela, J.
Barlet-Ros, P.
Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffsComputer Networks Anonymized Internet Traces
2018
Sonchack, John.
Aviv, A.
Keller, E.
Smith, J.
Turboflow: information rich flow record generation on commodity switchesEuroSys Conf. Anonymized Internet Traces
2018
Marnerides, A.K.
Pezaros, D.P.
Hutchison, D.
Internet traffic characterisation: Third-order statistics and higher-order spectra for precise traffic modellingComputer Networks Anonymized Internet Traces
2018
Dao, N.
Vu, D.
Lee, Y.
Cho, S.
Cho, C.
Kim, H.
Pattern-identified online task scheduling in multitier edge computing for industrial IoT servicesMobile Information Systems Anonymized Internet Traces
2018
Bocovich, C.
Goldberg, I.
Secure asymmetry and deployability for decoy routing systemsProc. on Privacy Enhancing Technologies Anonymized Internet Traces
2018
Zhu, L.
Tang, X.
Shen, M.
Du, X.
Guizani, M.
Privacy-preserving DDoS attack detection using cross-domain traffic in Software Defined NetworksIEEE J. on Selected Areas in Communications Anonymized Internet Traces
2018
Harrison, R.
Cai, Q.
Gupta, A.
Rexford, J.
Network-wide heavy hitter detection with commodity switchesSymp. on SDN Research Anonymized Internet Traces
2018
Alipourfard, O.
Moshref, M.
Zhou, Y.
Yang, T.
Yu, M.
A comparison of performance and accuracy of measurement algorithms in softwareSymp. on SDN Research Anonymized Internet Traces
2018
Vidal, J.
Orozco, A.
Villalba, L.
Adaptive artificial immune networks for mitigating DoS flooding attacksSwarm and Evolutionary Computation Anonymized Internet Traces
Denial of Service Attacks
2018
Mastorakis, S.
Ahmed, T.
Pisharath, J.
ISA-based trusted network functions and server applications in the untrusted cloudarxiv.org Anonymized Internet Traces
2018
Lucchesi, A.
Drummond, A.
Teodoro, G.
High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approachJ. of Internet Services and Applications Anonymized Internet Traces
2018
Goyal, P.
Narayan, A.
Cangialosi, F.
Raghavan, D.
Narayana, S.
Alizadeh, M.
Balakrishnan, H.
Elasticity detection: A building block for Internet congestion controlarxiv.org Anonymized Internet Traces
2018
Chen, C.
Asoni, D.
Perrig, A.
Barrera, D.
Danezis, G.
Troncoso, C.
TARANET: Traffic-analysis resistant anonymity at the NETwork layerarxiv.org Anonymized Internet Traces
Topology with BGP
2018
Zhou, Y.
Bi, J.
Yang, T.
Gao, K.
Zhang, C.
Cao, J.
Wang, J.
KeySight: Troubleshooting programmable switches via scalable high-coverage behavior trackingIntl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2018
Zhou, A.
Zhu, H.
Liu, L.
Zhu, C.
Detection of super nodes based on connection metrics for network data streamsIEEE Intl Conf on Big Data Analysis (ICBDA) Anonymized Internet Traces
2018
Zhou, A.
Liu, L.
Zhu, H.
Zhu, C.
Chen, L.
Parallel Sketch Based Super Node Detection with TraceabilityChinese Journal of Electronics Anonymized Internet Traces
2018
Zhang, C.
Feng, Y.
Song, H.
Wan, Y.
Xu, W.
Wang, Y.
Dai, H.
Li, Y.
Lin, B.
OBMA: Minimizing Bitmap Data Structure with Fast and Uninterrupted Update ProcessingIEEE/ACM Intl Symp. on Quality of Service (IWQoS) Anonymized Internet Traces
2018
Yang, T.
Jiang, J.
Liu, P.
Huang, Q.
Gong, J.
Zhou, Y.
Miao, R.
Li, X.
Uhlig, S.
Elastic sketch: adaptive and fast network-wide measurementsACM Special Interest Group on Data Communication Anonymized Internet Traces
2018
Wu, N.
Bi, Y.
Michael, N.
Tang, A.
Doyle, J.C.
Matni, N.
A Control-Theoretic Approach to In-Network Congestion ManagementIEEE/ACM Trans. on Networking Anonymized Internet Traces
2018
Wu, J.
Chen, Y.
Zheng, H.
Approximation algorithms for dependency-aware rule-caching in Software-Defined NetworksIEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2018
Wu, H.
Hsiao, H.C.
Asoni, D.E.
Scherrer, S.
Perrig, A.
Hu, Y.C.
CLEF: Limiting the Damage Caused by Large Flows in the Internet CoreIntl Conf. on Cryptology and Network Security Anonymized Internet Traces
2018
Wang, Z.
Zhou, C.
Yu, Y.
Xingang, S.
Yin, X.
Yao, J.
Fast detection of heavy hitters in Software Defined Networking using an adaptive and learning methodIntl Conf. on Cloud Computing and Security Anonymized Internet Traces
2018
Velarde-Alvarado, P.
Martinez-Pelaez, R.
Mena-Camare, L.
Ochoa-Brust, A.
Iriarte-Solis, A.
Design of a Traffic Generation Platform for Offline Evaluation of NIDSIntl Conf. On Advances In Computing, Control And Networking Anonymized Internet Traces
2018
Ullah, S.
Awan, M. D.
Khiyal, M. S. H.
Big Data in Cloud Computing: A Resource Management PerspectiveHindawi Scientific Programming Anonymized Internet Traces
2018
Teixeira, D.R.
Silva, J.M.C.
Lima, S.R.
Deploying Time-based Sampling Techniques in Software-Defined NetworkingIntl Conf. on Software, Telecommunications and Computer Networks (SoftCOM) Anonymized Internet Traces
2018
Shin, J.Y.
Kirovski, D.
Harper, D.T.
Computing units using directional wireless communicationarxiv.org Anonymized Internet Traces
2018
Sharafaldin, I.
Lashkari, A.H.
Ghorbani, A.A.
Toward generating a new intrusion detection dataset and intrusion traffic characterization.Intl Conf. on Information Systems Security and Privacy (ICISSP) Anonymized Internet Traces
Denial of Service Attacks
2018
Saavedra, M. Z.
Yu, W. E.
Towards Large Scale Packet Capture and Network Flow Analysis on HadoopIntl Symp. on Computing and Networking Workshops (CANDARW) Anonymized Internet Traces
2018
Remedios, R. H.
Nayak, A.
On improving measurement accuracy of DREAM framework with estimation filtersIEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2018
Quoc, D. L.
Akkus, I. E.
Bhatotia, P.
Blanas, S.
Chen, R.
Fetzer, C.
Strufe, T.
ApproxJoin: Approximate Distributed JoinsACM Symp. on Cloud Computing Anonymized Internet Traces
2018
Peng, Z.
Li, H.
Hu, C.
DIAL: Distributed Elephant Flow Counting on SDNIEEE Global Communications Conf. (GLOBECOM) Anonymized Internet Traces
2018
Nisioti, A.
Mylonas, A.
Yoo, P. D.
Katos, V.
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised MethodsIEEE Communications Surveys and Tutorials Anonymized Internet Traces
2018
Nasr, M.
Bahramali, A.
Houmansadr, A.
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep LearningACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
2018
Narayan, A.
Cangialosi, F.
Raghavan, D.
Goyal, P.
Narayana, S.
Mittal, R.
Alizadeh, M.
Malakrishnan, H.
Restructuring endpoint congestion controlConf. of the ACM Special Interest Group on Data Communication Anonymized Internet Traces
2018
Nabiyev, A.Application of clustering methods network traffic for detecting DDoS attacksProblems of information technology Anonymized Internet Traces
2018
Moriarty, K.
Morton, A.
Effects of Pervasive Encryption on OperatorsInternet Engineering Task Force (IETF) Anonymized Internet Traces
2018
Mitzenmacher, M.
Pontarelli, S.
Reviriego, P.
Adaptive cuckoo filtersProc. Workshop on Algorithm Engineering and Experiments (ALENEX) Anonymized Internet Traces
2018
Meryem, A.
Samira, D.
Bouabid, E. O.
Enhancing Cloud Security using advanced MapReduce k-means on log filesIntl Conf. on Software Engineering and Information Management Anonymized Internet Traces
2018
Mao, W.
Shen, Z.
Huang, X.
Facilitating network functions virtualization by exploring locality in network traffic: A proposalIntl Conf. on Computer Science and Artificial Intelligence Anonymized Internet Traces
2018
Lu, J.
Yang, T.
Wang, Y.
Dai, H.
Chen, X.
Jin, L.
Song, H.
Liu, B.
Low Computational Cost Bloom FiltersIEEE/ACM Transactions on Networking (TON) Anonymized Internet Traces
2018
Li, X.
Cheng, W.
Zhang, T.
Xie, J.
Ren, F.
Yang, B.
Power efficient high performance packet I/OIntl Conf. on Parallel Processing Article No. 69 Anonymized Internet Traces
2018
Li, H.
Hu, H.
Gu, G.
Ahn, G. J.
Zhang, F.
vNIDS: Towards elastic security with safe and efficient virtualization of Network Intrusion Detection SystemsACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
2018
Kumari, A.
Chandra, J.
Sairam, A.
Optimizing flow setup time in software defined networkIntl Conf. on Communication Systems and Networks (COMSNETS) Anonymized Internet Traces
2018
Kim, C.
Lee, H.
A High-Bandwidth PCM-Based Memory System for Highly Available IP Routing Table LookupIEEE Computer Architecture Letters Anonymized Internet Traces
2018
Kao, S. C.
Lee, D. Y.
Chen, T. Y.
Wu, A. Y.
Dynamically updatable ternary segmented aging Bloom filter for OpenFlow-compliant low-power packet processingIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2018
Julian-Moreno, G.
Leira, R.
Lopez de Vergara, J.E.
Gomez-Arribas, F.J.
Gonzalez, I.
On the feasibility of 40 gbps network data capture and retention with general purpose hardwareAnnual ACM Symp. on Applied Computing Anonymized Internet Traces
2018
Joshi, H. P.
Dutta, R.
GADFly: A fast and robust algorithm to detect P2P botnets in communication graphsIEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2018
Huang, Q.
Lee, P. P. C.
Bao, Y.
Sketchlearn: relieving user burdens in approximate measurement with automated statistical inferenceACM Special Interest Group on Data Communication Anonymized Internet Traces
2018
Hu, H.
Zhai, X.
Wang, M.
Hu, G.
Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs)International Conference on Cloud Computing and Security Anonymized Internet Traces
2018
Guo, H.
Heidemann, J.
Detecting IoT Devices in the Internet (Extended)University of Southern California (USC) Anonymized Internet Traces
2018
Girma, A.
Wang, P.
An Efficient Hybrid Model for Detecting Distributed Denial of Service (DDOS) Attacks in Cloud Computing using Multivariate Correlation and Data Mining Clustering TechniquesIssues in Information System Anonymized Internet Traces
2018
Geng, N.
Yang, Y.
Xu, M.
Flow-level traffic engineering in conventional networks with hop-by-hop routingSymp. on Quality of Service (IWQoS) Anonymized Internet Traces
2018
Fouladi, R.
Kayatas, C.
Anarim, E.
Statistical measures: Promising features for time series based DDoS attack detectionWorkshop on Computational Intelligence for Multimedia Understanding (IWCIM) Anonymized Internet Traces
Denial of Service Attacks
2018
Fondo-Ferreiro, P.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
QoS-aware energye efficient algorithms for ethernet link aggregates in Software-Defined NetworksIntl Conf on Software, Telecommunications and Computer Networks (SoftCOM) Anonymized Internet Traces
2018
Dai, H.
Shahzad, M.
Liu, A. X.
Li, M.
Zhong, Y.
Chen, G.
Identifying and Estimating Persistent Items in Data StreamsIEEE/ACM Transactions on Networking Anonymized Internet Traces
2018
Ciftcioglu, E.
Hardy, R.
Chan, K.
Scott, L.
Oliveira, D.
Verma, G.
Chaff allocation and performance for network traffic obfuscationIEEE Intl Conf. on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2018
Cermak, M.
Jirsik, T.
Velan, P.
Komarkova, J.
Spacek, S.
Drasar, M.
Plesnik, T.
Towards provable network traffic measurement and analysis via semi-labeled trace datasetsNetwork Traffic Measurement and Analysis Conf. (TMA) Anonymized Internet Traces
2018
Cao, Z.
Chen, X.
Sheng, Y.
Ni, H.
Catching the flow with locality sensitive hashing in programmable data planesIntl Conf. on Software Engineering and Service Science (ICSESS) Anonymized Internet Traces
2018
Braud, T.
Heusse, M.
Duda, A.
The virtue of gentleness: Improving connection response times with SYN priority active queue ManagementIFIP Networking Conf. (IFIP Networking) and Workshops Anonymized Internet Traces
2018
Ben-Basat, R.
Chen, X.
Einziger, G.
Rottenstreich, O.
Efficient Measurement on Programmable Switches Using Probabilistic RecirculationIntl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2018
Basat, R. B.
Einziger, G.
Friedman, R.
Fast flow volume estimationPervasive and Mobile Computing Anonymized Internet Traces
2018
Basat, R. B.
Einziger, G.
Friedman, R.
Luizelli, M. C.
Waisbard, E.
Volumetric hierarchical heavy hittersIntl Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2018
Basat, R. B.
Einziger, G.
Feibish, S. L.
Moraney, J.
Raz, D.
Network-wide routing-oblivious heavy hittersSymp. on Architectures for Networking and Communications Systems Anonymized Internet Traces
2018
Atmaca, T.
Kamli, A.
Rataj, A.
Adaptation of the N-GREEN architecture for a bursty trafficIntl Confe. on Computer Networks Anonymized Internet Traces
2018
Amer, M.
Busson, A.
Lassous, I. G.
Association Optimization in Wi-Fi Networks based on the Channel Busy Time EstimationNetworking Conf. (IFIP Networking) and Workshops Anonymized Internet Traces
2018
Alsirhani, A.
Sampalli, S.
Bodorik, P.
DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache SparkIEEE Canadian Conf. on Electrical and Computer Engineering (CCECE) Anonymized Internet Traces
2018
Ahmed, M. E.
Ullah, S.
Kim, H.
Statistical Application Fingerprinting for DDoS Attack MitigationIEEE Transactions on Information Forensics and Security Anonymized Internet Traces
Denial of Service Attacks
2018
Abu, P.A.
Saavedra, M.Z.
Medalla, A.H.
Yu, W.E.
Adapting block-sized captures for faster network flow analysis on the Hadoop ecosystemIEEE Intl Conf. on Computer and Communications Anonymized Internet Traces
2017
Xu, T.
Gao, D.
Dong, P.
Foh, C.
Zhang, H.
Mitigating the table-overflow attack in Software-Defined NetworkingIEEE Trans. on Network and Service Management Anonymized Internet Traces
Topology with Archipelago
2017
Saavedra, M.Z.N.L.
Yu, W.E.S.
A comparison between text, Parquet, and PCAP formats for use in distributed network flow analysis on HadoopJ. of Advances in Computer Networks Anonymized Internet Traces
2017
Lee, T.H.Towards an accountable and private InternetETH Zurich Anonymized Internet Traces
2017
Ghasemi, M.Data-driven management of CDN performancePrinceton Univ. Anonymized Internet Traces
2017
Cortes, S.L.Jurisdictional arbitrage: Quantifying and counteracting the threat of government intelligence agencies against TorNortheastern Univ. Anonymized Internet Traces
2017
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
Memory-efficient and ultra-fast network lookup and forwarding using Othello hashingarxiv.org Anonymized Internet Traces
2017
Rodriguez-Perez, M.
Herreria-Alonso, S.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Delay properties of energy efficient ethernet networksIEEE Communications Lett. Anonymized Internet Traces
2017
Matek, T.Anomaly detection in computer networks using higher-order dependenciesUniv. of Ljubljana Anonymized Internet Traces
2017
Varela, J.
Ros, P.
Towards a NetFlow implementation for OpenFlow software-Defined NetworksIntl Teletraffic Congress Anonymized Internet Traces
2017
Quoc, D.L.
Chen, R.
Bhatotia, P.
Fetzer, C.
Hilt, V.
Strufe, T.
Approximate stream analytics in Apache Flink and Apache Spark streamingarxiv.org Anonymized Internet Traces
2017
Macia, J.R.S.V.Design of a flow monitoring solution for OpenFlow Software-Defined NetworksUniv. of Granada Anonymized Internet Traces
2017
Silveira, F.A.F.Minimizing the number of observers required for traffic matrix generationFed. Univ. of Espirito Santo Anonymized Internet Traces
Topology with Archipelago
2017
Phan, T.
Bao, N.
Park, M.
Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacksJ. of Network and Computer Applications Anonymized Internet Traces
Denial of Service Attacks
2017
Luo, H.
Chen, Z.
Li, J.
Vasilakos, A.V.
Preventing distributed Denial-of-Service flooding attacks with dynamic path identifiersIEEE Trans. on Information Forensics and Security Anonymized Internet Traces
Topology with Archipelago
2017
Kim, Y.
Choi, D.
Van, T.
Long, M.
Park, M.
DDoS Detection System Based on Multiple Machine Learning Combination for Software Defined NetworkingJ. of Korean Inst. of Communications and Information Sciences Anonymized Internet Traces
Denial of Service Attacks
2017
Huang, Q.
Lee, P.
Li, R.
Tang, L.
Chen, Y.
Zhang, G.
SketchVisor: Robust network measurement for software packet processingACM SIGCOMM Anonymized Internet Traces
2017
Guerrero, F.G.Stochastic traffic analysis of contemporary Internet high-speed linksColombian Conf. on Computing Anonymized Internet Traces
2017
Ben-Basat, R.B.
Einziger, G.
Friedman, R.
Luizelli, M.C.
Waisbard, E.
Constant time updates in hierarchical heavy hittersACM Special Interest Group on Data Communication (SIGCOMM) Anonymized Internet Traces
2017
Sharafaldin, I.
Gharib, A.
Lashkari, A.
Ghorbani, A.
Towards a reliable Intrusion Detection benchmark datasetSoftware Networking Anonymized Internet Traces
Denial of Service Attacks
2017
Meng, J.
Ren, F.
Lin, C.
Modeling and understanding burst transmission for energy efficient ethernetComputer Networks Anonymized Internet Traces
2017
Kim, T.
Lim, J.
Kim, J.
Cho, W.
Chung, E.
Lee, H.
Scalable bandwidth shaping scheme via adaptively managed parallel heaps in manycore-based network processorsACM Trans. on Design Automation of Electronic Systems Anonymized Internet Traces
2017
Iordache, M.
Jouet, S.
Marnerides, A.
Pezaros, D.
Distributed, multi-level network anomaly detection for datacentre networksIEEE ICC Next Generation Networking and Internet Symp. Anonymized Internet Traces
2017
Wu, N.
Bi, Y.
Michael, N.
Tang, A.
Doyle, J.
Matni, N.
HFTraC: High-frequency traffic controlConf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2017
Muhammad, A.
Alameka, F.
Integrasi metode normalized reelative network entropy dan neural network backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoSJ. Rekayasa Teknologi Informasi Anonymized Internet Traces
Denial of Service Attacks
2017
Mirkovic, J.
Bartlett, G.
Heidemann, J.
Shi, H.
Deng, X.
Do you see me now? Sparsity in passive observations of address livenessNetwork Traffic Measurement and Analysis Conf. Anonymized Internet Traces
2017
Maltinsky, A.
Giladi, R.
Shavitt, Y.
On network neutrality measurementsACM Trans. on Intelligent Systems and Technology (TIST) Anonymized Internet Traces
2017
Lu, J.
Wan, Y.
Li, Y.
Zhang, C.
Dai, H.
Wang, Y.
Zhang, G.
Liu, B.
Ultra-fast Bloom filters using SIMD techniquesIntl Symp. on Quality of Service (IWQoS) Anonymized Internet Traces
2017
Duan, H.
Wang, C.
Yuan, X.
Zhou, Y.
Wang, Q.
Ren, K.
LightBox: SGX-assisted secure network functions at near-native speedarxiv.org Anonymized Internet Traces
2017
Chainourov, B.Log analysis using Splunk Hadoop ConnectNaval Postgraduate School Anonymized Internet Traces
2017
Albdair, M.
Addie, R.
Fatseas, D.
Social network behaviour inferred from O-D pair trafficAustralian J. of Telecommunications and the Digital Economy Anonymized Internet Traces
2017
Taghouti, M.
Lucani, D.
Fitzek, F.
Bouallegue, A.
Random linear network coding schemes for reduced zero-padding overhead: Complexity and overhead analysisEuropean Wireless Conf. Anonymized Internet Traces
2017
Lopez, E.
Navarro, L.
Tight bounds for sketches in traffic validationConf. on Networking, Sensing and Control Anonymized Internet Traces
2017
Basat, R.B.
Einziger, G.
Friedman, R.
Kassner, Y.
Randomized admission policy for efficient top-k and frequency estimationConf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2017
Basat, R.
Einziger, G.
Friedman, R.
Kassner, Y.
Optimal elephant flow detectionIEEE Conf. on Computer Communications Anonymized Internet Traces
2017
Anderson, D.
Bevan, P.
Lang, K.
Liberty, E.
Rhodes, L.
Thaler, J.
A high-performance algorithm for identifying frequent items in data streamsarxiv.org Anonymized Internet Traces
2017
Alonso, S.
Perez, M.
Veiga, M.
Garcia, C.
Optimizing dual-mode EEE interfaces: Deep-sleep is healthyIEEE Trans. on Communications Anonymized Internet Traces
2017
Sivaraman, V.
Narayana, S.
Rottenstreich, O.
Muthukrishnan, S.
Rexford, J.
Heavy-hitter detection entirely in the data planeSymp. on SDN Research Anonymized Internet Traces
2017
Remedios, R.H.On improving DREAM framework with estimations and ProgMEUniv. of Ottawa Anonymized Internet Traces
2017
Rao, M.
Naidu, M.
A model for generating synthetic network flows and accuracy index for evaluation of anomaly network Intrusion Detection SystemsIndian J. Science and Technology Anonymized Internet Traces
2017
Oeldemann, A.
Wild, T.
Herkersdorf, H.
Reducing data center resource over-provisioning through dynamic load management for virtualized network functionsArchitecture of Computing Systems (ARCS) Anonymized Internet Traces
2017
Lee, T.
Pappas, C.
Perrig, A.
Gligor, V.
Hu, Y.
The case for in-network replay suppressionAsia Conf. on Computer and Communications Security Anonymized Internet Traces
Paper Data and Tools
2017
Halas, F.Performance measurement of stream data processing in Apache SparkMasaryk Univ. Anonymized Internet Traces
2017
Ghasemi, M.
Benson, T.
Rexford, J.
Dapper: Data plane performance diagnosis of TCPSymp. on SDN Research Anonymized Internet Traces
2017
Birkner, R.
Gupta, A.
Feamster, N.
Vanbever, L.
SDX-based flexibility or Internet correctness?: Pick two!Symp. on SDN Research (SOSR) Anonymized Internet Traces
Topology with BGP
2017
Skrastins, A.Resource and admission management in Next Generation NetworksRiga Tech. Univ. Anonymized Internet Traces
2017
Duffield, N.
Xu, Y.
Xia, L.
Ahmed, N.
Yu, M.
Stream aggregation through order samplingarxiv.org Anonymized Internet Traces
2017
Cascone, C.
Bifulco, R.
Pontarelli, S.
Capone, A.
Relaxing state-access constraints in stateful programmable data planesarxiv.org Anonymized Internet Traces
2017
Boro, D.
Bhattacharyya, D.K
DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacksMicrosystem Technologies Anonymized Internet Traces
Denial of Service Attacks
2017
Bhaya, W.
Manaa, M.E.
DDoS attack detection approach using an efficient cluster analysis in large data scaleConf. on New Trends in Information and Communications Technology Applications (NTICT) Anonymized Internet Traces
Denial of Service Attacks
2017
Vasiliadis, G.
Koromilas, L.
Polychronakis, M.
Ioannidis, S.
Design and implementation of a stateful network packet processing framework for GPUsIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2017
Suarez-Varela, J.
Barlet-Ros, P.
Reinventing NetFlow for OpenFlow Software-Defined Networksarxiv.org Anonymized Internet Traces
2017
Lazarou, G.
Alam, M.
Picone, J.
Measuring the variability of CAIDA internet traffic tracesConf. on Computer and Information Technology Anonymized Internet Traces
2017
Engel, D.
Malone, W.
Integrated information as a metric for group interaction: Analyzing human and computer groups using a technique developed to measure consciousnessarxiv.org Anonymized Internet Traces
2017
Deng, J.
Li, H.
Hu, H.
Wang, K.C.
Ahn, G.J.
Zhao, Z.
Han, W.
On the safety and efficiency of virtual firewall elasticity controlNetwork and Distributed System Security Symp. (NDSS) Anonymized Internet Traces
2017
Afek, Y.
Barr, A.
Feibish, S.
Schiff, L.
Detecting heavy flows in the SDN match and action modelarxiv.org Anonymized Internet Traces
2017
Zazo, J.F.
Lopez-Buedo, S.
Ruiz, M.
Sutter, G.
A single-FPGA architecture for detecting heavy hitters in 100 Gbit/s ethernet linksIntl Conf. on ReConFigurable Computing and FPGAs (ReConFig) Anonymized Internet Traces
2017
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
A concise forwarding information base for scalable and fast name lookupsIntl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2017
Xiao, Q.
Chen, S.
Zhou, Y.
Chen, M.
Luo, J.
Li, T.
Ling, Y.
Cardinality estimation for elephant flows: A compact solution based on virtual register sharingIEEE/ACM Trans. on Networking Anonymized Internet Traces
2017
Vannucci, L.Indexing and compression of network flowsUniv, of Pisa Anonymized Internet Traces
2017
Tai, K. S.
Sharan, V.
Bailis, P.
Valiant, G.
Finding Heavily-Weighted Features in Data Streamsarxiv.org Anonymized Internet Traces
2017
Suarez-Varela, J.
Barlet-Ros, P.
Carela-Espanol, V.
A NetFlow/IPFIX implementation with OpenFlowSDN-Polygraph Anonymized Internet Traces
2017
Quoc, D. L.
Chen, R.
Bhatotia, P.
Fetzer, C.
Hilt, V.
Strufe, T.
StreamApprox: approximate computing for stream analyticsACM/IFIP/USENIX Middleware Conf. Anonymized Internet Traces
2017
Norige, E.Hardware algorithms for high-speed packet processingMichigan State Univ. Anonymized Internet Traces
2017
Nasr, M.
Houmansadr, A.
Mazumdar, A.
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic AnalysisACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
2017
Monge, M. A. S.
Vidal, J. M.
Villalba, L. J. G.
Reasoning and Knowledge Acquisition Framework for 5G Network AnalyticsSensors Anonymized Internet Traces
2017
Mirkovic, J.
Kline, E.
Reiher, P.
RESECT: Self-Learning Traffic Filters for IP Spoofing DefenseAnnual Computer Security Applications Conf. Anonymized Internet Traces
Topology with BGP
2017
Lee, K.Towards precise network measurementsCornell Univ. Anonymized Internet Traces
2017
Lazaris, A.
Prasanna, V. K.
DeepFlow: a deep learning framework for software-defined measurementWorkshop on Cloud-Assisted Networking Anonymized Internet Traces
2017
Kolesnikov, A.Load modelling and generation in IP-based networksarxiv.org Anonymized Internet Traces
2017
Joo, Y.I.
Park, M.
An efficient DDoS attack detection mechanism based on distributed self organizing mapIntl J. of Applied Engineering Research Anonymized Internet Traces
Denial of Service Attacks
2017
Huong, T.
Thanh, N.
Software defined networking-based one-packet DDoS mitigation architectureConf. on Ubiquitous Information Management and Communication (IMCOM) Anonymized Internet Traces
2017
Fu, J.
Zhang, K.
Practical Concurrent Self-Organizing ListsIntl Conf. on Parallel and Distributed Systems (ICPADS) Anonymized Internet Traces
2017
Conti, M.
Gangwal, A.
Blocking intrusions at border using software defined-internet exchange point (SD-IXP)Conf. on Network Function Virtualization and Software Defined Networks (NFV-SDN) Anonymized Internet Traces
2017
Conti, M.
Gangwal, A.
Gaur, M. S.
A comprehensive and effective mechanism for DDoS detection in SDNIntl Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob) Anonymized Internet Traces
2017
Chen, S.
Chen, M.
Xiao, Q.
Per-flow cardinality measurementTraffic Measurement for Big Network Data Anonymized Internet Traces
2017
Cenedese, A.
Tramarin, F.
Vitturi, S.
An energy efficient ethernet strategy based on traffic prediction and shapingIEEE Trans. on Communications Anonymized Internet Traces
UCSD Network Telescope
2017
Atifi, A.
Bou-Harb, E.
On correlating network traffic for cyber threat intelligence: A Bloom filter approachIntl Wireless Communications and Mobile Computing Conf. (IWCMC) Anonymized Internet Traces
2016
Xia, Q.
Chen, T.
Xu, W.
CIDS: Adapting legacy Intrusion Detection Systems to the cloud with hybrid samplingIntl Conf. on Computer and Information Technology Anonymized Internet Traces
2016
Saldana, J.What to do with the Wi-Fi wild westHorizon Anonymized Internet Traces
2016
Javadi, M.M.Timely, accurate, and scalable network management for data centersUniv. of Southern California Anonymized Internet Traces
2016
Hendawi, A.
Alali, F.
Wang, X.
Guan, Y.
Zhou, T.
Liu, X.
Basit, N.
Stankovic, J.
Hobbits: Hadoop and Hive based Internet traffic analysisIEEE Conf. on Big Data Anonymized Internet Traces
2016
Gharib, A.
Sharafaldin, I.
Lashkari, A.
Ghorbani, A.
An evaluation framework for Intrusion Detection datasetConf. on Information Science and Security Anonymized Internet Traces
Denial of Service Attacks
2016
Chen, C.
Perrig, A.
PHI: Path-hidden lightweight anonymity protocol at network layerProc. on Privacy Enhancing Technologies Anonymized Internet Traces
Topology with BGP
2016
Bayati, A.
Asghari, V.
Nguyen, K.
Cheriet, M.
Gaussian process regression based traffic modeling and prediction in high-speed networksGlobal Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2016
Aral, A.Resource mapping optimization for distributed cloud servicesIstanbul Technical Univ. Anonymized Internet Traces
2016
Albdair, M.
Addie, R.
Fatseas, D.
Inference of social network behavior from Internet traffic tracesConf. on Telecommunication Networks and Applications (ITNAC) Anonymized Internet Traces
2016
Narayana, S.
Sivaraman, A.
Nathan, V.
Alizadeh, M.
Walker, D.
Rexford, J.
Jeyakumar, V.
Kim, C.
Hardware-software co-design for network performance measurementACM Workshop on Hot Topics in Networks Pages Anonymized Internet Traces
2016
Moraney, J.
Raz, D.
Efficient detection of flow anomalies with limited monitoring resourcesConf. on Network and Service Management (CNSM) Anonymized Internet Traces
2016
Li, C.
Chen, Z.
Zheng, W.
Wu, Y.
Cao, J.
BAH: A bitmap index compression algorithm for fast data retrievalConf. on Local Computer Networks (LCN) Anonymized Internet Traces
2016
Lee, T.
Pappas, C.
Szalachowski, P.
Perrig, A.
Communication based on per-packet one-time addressesConf. on Network Protocols (ICNP) Anonymized Internet Traces
2016
Katta, N.Building efficient and reliable software-defined networksPrinceton Univ. Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
A probabilistic sampling method for efficient flow-based analysisJ. of Communications and Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Huang, Q.
Lee, P.
Toward high-performance distributed stream processing via approximate fault toleranceProc. of the Very Large Data Bases Endowment Anonymized Internet Traces
2016
Dey, P.
Yuksel, M.
CAR: Cloud-assisted routingConf. on Network Function Virtualization and Software Defined Networks Anonymized Internet Traces
2016
Nguyen, H.
Begin, T.
Busson, A.
Lassous, I.
Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networksConf. on Network and Service Management Anonymized Internet Traces
2016
Namayanja, J.
Janeja, V.
Characterization of evolving networks for cybersecurityInformation Fusion for Cyber-Security Analytics, Ch. 5 Anonymized Internet Traces
2016
Retnaswamy, B.
Ponniah, K.
A new ontology?based multi agent framework for intrusion detectionIntl J. of Communication Systems Anonymized Internet Traces
2016
Hintze, D
Rice, A.
Picky: efficient and reproducible sharing of large datasets using Merkle-treesSymp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2016
Zhou, Z.Per-flow cardinality estimation based on virtual LogLog sketchingUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2016
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
A concise forwarding information base for scalable and fast flat name switchingarxiv.org Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Sketch-guided filtering support for detecting superspreaders in high-speed networksElectronics Letters Anonymized Internet Traces
2016
Song, T.
Jiang, Z.
Wei, Y.
Shi, X.
Ma, X.
Ormond, O.
Traffic aware energy efficient router: Architecture, prototype and algorithmsIEEE J. on Selected Areas in Communications Anonymized Internet Traces
2016
Singh, N.
Singh, K.
De, T.
Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature SelectionConf. on Informatics and Analytics Anonymized Internet Traces
Denial of Service Attacks
2016
Meitei, I.
Singh, K.
De, T.
Detection of DDoS DNS amplification attack using classification algorithmConf. on Informatics and Analytics Anonymized Internet Traces
2016
Liu, Z.
Manousis, A.
Vorsanger, X.
Sekar, V.
Braverman, V.
One sketch to rule them all: Rethinking network flow monitoring with UnivMonACM SIGCOMM Anonymized Internet Traces
2016
Liu, P.
Li, Y.
Sang, Y.
Zhang, J.
Anonymity-based privacy preserving network data publicationTrustcom/BigDataSE/ISPA Anonymized Internet Traces
2016
Dao, N.-N.
Kim, J.
Park, M.
Cho, S.
Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networksPLoS One Anonymized Internet Traces
2016
Pontarelli, S.
Reviriego, P.
Cuckoo Cache: A Technique to Improve Flow Monitoring ThroughputIEEE Internet Computing Anonymized Internet Traces
2016
Phan, T.
Toan, T.
Tuyen, D.
Huong, T.
Nguyen, T.
OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacksConf. on Communications and Electronics Anonymized Internet Traces
Denial of Service Attacks
2016
Phan, T.
Bao, N.
Park, M.
A novel hybrid flow-based handler with DDoS attacks in Software-Defined NetworkingConf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Anonymized Internet Traces
Denial of Service Attacks
2016
Foroushani, V.A.A security framework based on flow marking IP-traceback techniquesDalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
Topology with Skitter
2016
Chen, Y.
Wang, S.
A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropyConf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government Anonymized Internet Traces
2016
Cermak, M.
Tovarnak, D.
Lastovicka, M.
Caleda, P.
A performance benchmark for NetFlow data analysis on distributed stream processing systemsNetwork Operations and Management Symp. Anonymized Internet Traces
2016
Xu, X.
Zhang, J.
Li, Q.
Equalized interval centroid based watermarking scheme for stepping stone tracebackConf. on Data Science in Cyberspace Anonymized Internet Traces
2016
Xing, C
Ding, K.
Hu, C.
Chen, M.
Sample and fetch-based large flow detection mechanism in Software Defined NetworksIEEE Comm. Letters Anonymized Internet Traces
2016
Wu, Y.
Chen, Z.
Cao, J.
Li, H.
Li, C.
Wang, Y.
Zheng, W.
Chang, J.
Zhou, J.
Hu, Z.
Guo, J.
CAMP: A new bitmap index for data retrieval in traffic archivalIEEE Comm. Letters Anonymized Internet Traces
2016
Sahri, N.
Okamura, K.
Adaptive query rate for anomaly detection with SDNIntl J. of Computer Science and Network Security Anonymized Internet Traces
2016
Huang, T.
Sethu, H.
Kandasamy, N.
A new approach to dimensionality reduction for anomaly detection in data trafficarxiv.org Anonymized Internet Traces
2016
Hofstede, R.Flow-based compromise detectionUniv. of Twente Anonymized Internet Traces
2016
Einziger, G.
Fellman, B.
Friedman, R.
Kassner, Y.
ICE buckets: improved counter estimation for network measurementarxiv.org Anonymized Internet Traces
2016
Cermak, M.
Celeda, P.
Detecting advanced network threats using a similarity searchConf. on Autonomous Infrastructure, Management, and Security Anonymized Internet Traces
2016
Abada, A.Resource optimization of TCAM-based SDN measurements via diminishing-points autodetectionEuropean Conf. on Networks and Communications Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Huang, C.-Y.
Chung, Y.-W.
Toward hardware support for a flexible sketch-based network traffic monitoring systemIEEE Region 10 Symp. (TENSYMP) Anonymized Internet Traces
2016
Fairbanks, J.Graph analysis combining numerical, statistical, and streaming techniquesGeorgia Inst. of Technology Anonymized Internet Traces
2016
Asoni, D.E.
Chen, C.
Barrera, D.
Perrig, A.
On building onion routing into future Internet architecturesWorkshop on Open Problems in Network Security (iNetSec) Anonymized Internet Traces
2016
Sahri, N.Research on performance and security improvements by Software Defined NetworkKyushu Univ. Anonymized Internet Traces
2016
Pan, T.
Huang, T.
Liu, J.
Zhang, J.
Yang, F.
Li, S.
Liu, Y.
Fast content store lookup using locality-aware skip list in Content-Centric NetworksConf. on Computer Comm. Workshops Anonymized Internet Traces
2016
Krishnan, D.
Quoc, D.
Bhatotia, P.
Fetzer, C.
Rodrigues, R.
IncApprox: A data analytics system for incremental approximate computingConf. on World Wide Web Anonymized Internet Traces
2016
Bozakov, Z.
Rizk, A.
Bhat, D.
Zink, M.
Measurement-based flow characterization in centrally controlled networksConf. on Computer Communications Anonymized Internet Traces
2016
Ben-Basat, R.
Einziger, G.
Friedman, R.
Heavy hitters in streams and sliding windowsIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2016
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Autonomous system based flow marking scheme for IP-TracebackIEEE/IFIP Network Operations and Management Symp. (NOMS) Anonymized Internet Traces
Denial of Service Attacks
Topology with Skitter
2016
Zhao, T.
Li, T.
Han, B.
Sun, Z.
Huang, J.
Design and implementation of Software Defined Hardware Counters for SDNComputer Networks Anonymized Internet Traces
2016
Qian, S.
Wu, G.
Huang, J.
Das, T.
Benchmarking modern distributed streaming platformsConf. on Industrial Technology (ICIT) Anonymized Internet Traces
2016
Liu, X.
Shirazipour, M.
Yu, M.
Zhang, Y.
MOZART: Temporal coordination of measurementProc. Symp. on SDN Research (SOSR) Anonymized Internet Traces
2016
Lim, H.
Sekar, V.
Abe, Y.
Anderson, D.G.
NetMemex: Providing full-fidelity traffic archivalarxiv.org Anonymized Internet Traces
2016
Lei, C.
Zhang, H.
Liu, Y.
Du, X.
Net-flow fingerprint model based on optimization theoryArabian J. for Science and Engineering Anonymized Internet Traces
2016
Katta, N.
Alipourfard, O.
Rexfor, J.
Walker, D.
CacheFlow: Dependency-aware rule-caching for Software-Defined NetworksSymp. on SDN Research Anonymized Internet Traces
2016
Boro, D.
Basumatary, H.
Goswami, T.
Bhattacharyya, D.K.
UDP Flooding attack detection using information metric measureConf. on ICT for Sustainable Development Anonymized Internet Traces
2016
Xie, Y.
Wang, Y.
He, H.
Xiang, Y.
Yu, S.
Liu, X.
A general collaborative framework for modeling and perceiving distributed network behaviorIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2016
Silva, J.M.C.A modular traffic sampling architecture for flexible network measurementsUniv. do Minho, Braga, PT Anonymized Internet Traces
2016
Perakovic, D.
Perisa, M.
Cvitic, I.
Husnjak, S.
Artificial neuron network implementation in detection and classification of DDoS trafficTelecommunications Forum (TELFOR) Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Performance of flow-based anomaly detection in sampled trafficJ. of Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Intelligent sampling using an optimized neural networkJ. of Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Garroppo, R.G.
Nencioni, G.
Procissi, G.
Tavanti, L.
The impact of the access point power model on the energy-efficient management of infrastructured wireless LANsJ. Computer Networks Anonymized Internet Traces
2016
Einziger, G.
Friedman, R.
Counting with TinyTable: Every Bit Counts!Intl Conf. on Distributed Computing and Networking (ICDN) Anonymized Internet Traces
2016
Abaci, H.
Parr, G.
McClean, S.
Moore, A.
Krug, L.
Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirementsSustainable Computing: Informatics and Systems Anonymized Internet Traces
2015
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
SCREAM: Sketch Resource Allocation for Software-defined MeasurementACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2015
Li, C.
Yang, J.
Wang, Z.
Li, F.
Yang, Y.
A lightweight DDoS flooding attack detection algorithm based on synchronous long flowsGlobal Communications Conf. (GLOBECOM) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Flow-based anomaly detection using semisupervised learningConf. on Signal Processing and Communication Systems (ICSPCS) Anonymized Internet Traces
Denial of Service Attacks
2015
Huang, T.Adaptive sampling and statistical inference for anomaly detectionDrexel Univ. Anonymized Internet Traces
2015
Chen, Z.
Luo, H.
Zhang, M.
Li, J.
Improving network security by dynamically changing path identifiers in future InternetGlobal Communications Conf. (GLOBECOM) Anonymized Internet Traces
2015
Chen, X.-F.
Yu, S.-Z.
CIPA: A collaborative intrusion prevention architecture for programmable network and SDNComputers and Security Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Zhang, Z.
Guo, Z.
Yang, Y.
Bounded-reorder packet scheduling in optical cut-through switchIEEE Trans. on Parallel and Distributed Systems Anonymized Internet Traces
2015
Venkatesh, B.
Choudhury, S.H.
Nagajara, S.
Balakrishnan, N.
BotSpot: fast graph based identification of structured P2P botsJ. Computer Virology and Hacking Techniques Anonymized Internet Traces
2015
Righi, M.
Nunes, R.
Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas DinamicasSimposio Brasileiro em Seguranca da Informacao e Sistemas Anonymized Internet Traces
Denial of Service Attacks
2015
Purwanto, Y.
Kuspriyanto, Hendrawan
Rahardjo, B.
Statistical analysis on aggregate and flow based traffic features distributionConf. on Wireless and Telematics (ICWT) Anonymized Internet Traces
Denial of Service Attacks
2015
Liu, Z.
Vorsanger, G.
Braverman, V.
Sekar, V.
Enabling a RISC approach for Software-Defined Monitoring using universal streamingACM Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Lei, C.
Zhang, H.
Li, M.
Liu, Y.
Network watermarking model based on optimization theoryConf. on Cloud Computing and Big Data (CCBD) Anonymized Internet Traces
2015
Jadidi, Z.Flow-based anomaly detection in high-speed networksGriffith Univ. Anonymized Internet Traces
2015
Huang, T.
Sethu, H.
Kandasamy, N.
A fast algorithm for detecting anomalous changes in network trafficConf. on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Alipourfard, O.
Moshref, M.
Yu, M.
Re-evaluating measurement algorithms in softwareWorkshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Deterministic flow marking for IPv6 traceback (DFM6)Conf. on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Wu, H.Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity regionUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2015
Saldana, J.
Forcen, I.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Improving network efficiency with SimplemuxConf. on Computer and Information Technology (CIT) Anonymized Internet Traces
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A method to protect Bloom filters from soft errorsSymp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) Anonymized Internet Traces
2015
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, M.
Frame coalescing in dual-mode EEEarxiv.org Anonymized Internet Traces
2015
Erazo, M.A.
Rong, R.
Liu, J.
Symbiotic network simulation and emulationACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2015
Chen, C.
Asoni, D.E.
Barrera, D.
Danezis, G.
Perrig, A.
HORNET: High-speed onion routing at the network layerConf. on Computer and Communications Security (CCS) Anonymized Internet Traces
Topology with BGP
2015
Basescu, C.
Reischuk, R.M.
Szalachowski, P.
Perrig, A.
Zhang, Y.
Hsiao, H.-C.
Kubota, A.
Urakawa, J.
SIBRA: Scalable Internet Bandwidth Reservation Architecturearxiv.org Anonymized Internet Traces
Topology with BGP
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Probabilistic flow marking for IP traceback (PFM)Workshop on Reliable Networks Design and Modeling (RNDM) Anonymized Internet Traces
Denial of Service Attacks
2015
Rivetti, N.
Busnel, Y.
Mostefaoui, A.
Efficiently summarizing data streams over sliding windowsSymp. on Network Computing and Applications (NCA) Anonymized Internet Traces
Denial of Service Attacks
2015
de Oliviera Schmidt, R.
Sadre, R.
Sperotto, A.
van den Berg, H.
Pras, A.
Impact of packet sampling on link dimensioningIEEE Trans. on Network and Service Management Anonymized Internet Traces
2015
Anceaume, E.
Busnel, Y.
Rivetti, N.
Sericola, B.
Identifying global icebergs in distributed streamsSymp. on Reliable Distributed Systems (SRDS) Anonymized Internet Traces
Denial of Service Attacks
2015
Moreno, V.
Ramos, J.
Santiado del Rio, P.M.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Commodity packet capture engines: tutorial, cookbook and applicabilityIEEE Communications Surveys and Tutorials Anonymized Internet Traces
2015
Moreno, V.
Leira, R.
Gonzalez, I.
Gomez-Arribas, F.J.
Towards high-performance network processing in virtualized environmentsSymp. on High Performance Computing and Communications (HPCC) Anonymized Internet Traces
2015
Liu, Q.
Lui, J.C.S.
He, C.
Pan, L.
Fan, W.
Shi, Y.
SAND: A fault-tolerant streaming architecture for network traffic analyticsJ. Systems and Software Anonymized Internet Traces
2015
Li, X.
Qian, C.
The virtual network function placement problemComputer Communications Student Workshops Anonymized Internet Traces
2015
Li, X.
Qian, C.
Low-complexity multi-resource packet scheduling for network function virtualizationConf. on Computer Communications Anonymized Internet Traces
2015
Kim, M.
Jung, S.
Park, M.
A distributed self-organizing map for DoS attack detectionConf. on Ubiquitous and Future Networks Anonymized Internet Traces
Denial of Service Attacks
2015
Albiltaje, H.Detecting DDoS attack using a multilayer data mining techniquesIslamic Univ. of Gaza Anonymized Internet Traces
2015
Popescu, I.
Miyazaki, T.
Chino, M.
Wang, X.
Okamoto, S.
Gravey, A.
Gravey, P.
Veeraraghavan, M.
Brandt-Pearce, M.
Yamanaka, N.
Application-centric energy-efficient Ethernet with quality of service supportElectronics Letters Anonymized Internet Traces
2015
Ding, H.
Rabinovich, M.
TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2015
Xiao, Q.
Chen, S.
Chen, M.
Ling, Y.
Hyper-compact virtual estimators for Big Network Data based on register sharingIntl Conf. on Measurement and Modeling of Computer Systems Anonymized Internet Traces
2015
Padreny, I.G.Sistema de deteccion de ataques DDoS en TorUniv. Complutense de Madrid Anonymized Internet Traces
Denial of Service Attacks
2015
Osuna, R.Estudio de captura y almacenamiento de trafico en redes fisicas y virtuales multi-GigabitUniv. Autonoma de Madrid Anonymized Internet Traces
2015
Martin, J.Sistema de deteccion de ataques DDoS en TorUniv. Complutense de Madrid Anonymized Internet Traces
Denial of Service Attacks
2015
Addanki, R.
Maji, S.
Veeraraghavan, M.
Tracy, C.
A measurement-based study of big-data movementConf. on Networks and Communications (EuCNC) Anonymized Internet Traces
2015
Zhang, Z.
Wang, B.
Lan, J.
Identifying elephant flows in internet backbone traffic with bloom filters and LRUComputer Communications Anonymized Internet Traces
2015
Wellem, T.
Lai, Y.-K.
Chung, W.-Y.
A software defined sketch system for traffic monitoringSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2015
Sharma, S.Shuffling based mechanism for DDoS prevention on cloud environmentNatl Inst. of Technology, Rourkela Anonymized Internet Traces
Denial of Service Attacks
2015
Namayanja, J.M.
Janeja, V.P.
Change detection in evolving computer networks: Changes in densification and diameter over timeConf. on Intelligence and Security Informatics (ISI) Anonymized Internet Traces
2015
Mokgolodi, K.Traffic prediction in cloud computing using time series modelsUniv. of Botswana Anonymized Internet Traces
2015
Mijumbi, R.
Serrat, J.
Gorricho, J.-L.
Self-managed resources in network virtualisation environmentsSymp. on Integrated Network Management (IM) Anonymized Internet Traces
2015
Ayesta, U.
Bertaux, L.
Carvin, D.
Non-intrusive scheduling of TCP flowsIFIP Networking Conf. Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Investigating unique flow marking for tracing back DDoS attacksSymp. on Integrated Network Management (IM) Anonymized Internet Traces
Denial of Service Attacks
2015
Steinert, R.
Hess, A.
Observing software-defined networks using a decentralized link monitoring approachConf. on Network Softwarization (NetSoft) Anonymized Internet Traces
2015
Saldana, J.
de Hoz, D.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Pascual, F.
Lopez, D.R.
Florez, D.
Castell, J.A.
Nunez, M.
Small-packet flows in Software Defined Networks: Traffic profile optimizationJ. of Networks Anonymized Internet Traces
2015
Radan, M.
Keslassy, I.
Tapping into the routers unutilized processing powerConf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2015
Einziger, G.
Fellman, B.
Kassner, Y.
Independent counter estimation bucketsConf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2015
Danelutto, M.
De Sensi, D.
Torquati, M.
Energy driven adaptivity in stream parallel computationsEuromicro Conf. on Parallel, Distributed, and Network-Based Processing Anonymized Internet Traces
2015
Balkanli, E.A comprehensive study on one-way backscatter traffic analysisDalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A synergetic use of Bloom filters for error detection and correctionIEEE Trans. on Very Large Scale Integration (VLSI) Systems Anonymized Internet Traces
2015
Papapetrou, O.
Garofalakis, M.
Deligiannakis, A.
Sketching distributed sliding-window data streamsVLDB J. Anonymized Internet Traces
2015
Fairbanks, J.
Kannan, R.
Park, H.
Bader, D.
Behavioral clusters in dynamic graphsParallel Computing Anonymized Internet Traces
2015
Chen, J.
Addie, R.G.
Zukerman, M.
Neame, T.D.
Performance evaluation of a queue fed by a Poisson Lomax burst processIEEE Communications Letters Anonymized Internet Traces
2015
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Shen, M.
Xu, K.
Yang, K.
A neuro-fuzzy approach to self-management of virtual network resourcesJ. Expert Systems with Applications Anonymized Internet Traces
2015
Singh, S.A.Techniques for online analysis of large distributed dataIowa State Univ., Ames, IO, US Anonymized Internet Traces
2015
Sahri, N.M.
Okamura, K.
Adaptive anomaly detection for SDNAsia-Pacific Advanced Network Anonymized Internet Traces
2015
Kulbis, A.Distributed port scan detection in network trafficKauno Technologijos Univ. Anonymized Internet Traces
2014
Lu, R.
Wu, G.
Xie, B.
Hu, J.
StreamBench: Towards benchmarking modern distributed stream computing frameworksConf. on Utility and Cloud Computing (UCC) Anonymized Internet Traces
2014
Barik, R.
Divakaran, D.M.
Development and experimentation of TCP initial window functionConf. on Network of the Future (NOF) Anonymized Internet Traces
2014
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
The CB tree: a practical concurrent self-adjusting search treeDistributed Computing Anonymized Internet Traces
2014
Wang, H.
Lee, K.S.
Li, E.
Lum, C.L.
Tang, A.
Weatherspoon, K.
Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networksInternet Measurement Conf. (IMC) Anonymized Internet Traces
2014
Lai, Y.
Wellem, T.
You, H.-P.
Hardware-assisted estimation of entropy norm for high-speed network trafficIET Electronics Lett. Anonymized Internet Traces
2014
Xiao, Q.
Qiao, Y.
Zhen, M.
Chen, S.
Estimating the persistent spreads in high-speed networksIEEE Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2014
Tuyen, D.V.
Truong, T.H.
Hung, N.T.
Puype, B.
Colle, D.
Steenhaut, K.
Thanh, N.H.
An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacksConf. on Advanced Technologies for Communications (ATC) Anonymized Internet Traces
2014
Song, T.
Shi, X.
Ma, X.
Fine-grained power scaling algorithms for energy efficient routersSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2014
Pontarelli, S.
Reviriego, P.
Maestro, J.A.
Efficient flow sampling with back-annotated cuckoo hashingIEEE Communications Letters Anonymized Internet Traces
2014
Namayanja, J.M.
Janeja, V.P.
Change detection in temporally evolving computer networks: A big data frameworkConf. on Big Data Anonymized Internet Traces
2014
Korosi, A.
Tapolcai, J.
Mihalka, B.
Meszaros, G.
Retvari, G.
Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneouslyConf. on Network Protocols (ICNP) Anonymized Internet Traces
2014
Gardiner, J.
Nagaraja, S.
On the reliability of network measurement techniques Used for malware traffic analysisCambridge Intl Workshop on Security Protocols Anonymized Internet Traces
2014
Ekiz, N.
Amer, P.D.
Transport layer renegingComputer Communications Anonymized Internet Traces
2014
Yu, Y.
Qian, C.
Li, X.
Distributed and collaborative traffic monitoring in software defined networksHot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2014
Tunc, C.
Akar, N.
Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networksPhotonic Network Communications Anonymized Internet Traces
2014
Privalov, A.Y.
Tsarev, A.
Analysis and simulation of WAN traffic by self-similar traffic model with OMNETWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Pecori, R
Veltri, L.
A statistical blind technique for recognition of internet traffic with dependence enforcementWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
DREAM: Dynamic Resource Allocation for Software-defined MeasurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2014
McHale, L.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for SDN data plane matchingICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN) Anonymized Internet Traces
2014
Luao, H.
Cui, J.
Chen, G.
Chen, Z.
Zhang, H.
On the applicability of software defined networking to large scale networksConf. on Computer Communication and Networks (ICCCN) Anonymized Internet Traces
2014
Barati, M.
Abdullah, A.
Udzir, N.I.
Mahmod, R.
Mustapha, N.
Distributed Denial of Service detection using hybrid machine learning techniqueSymp. on Biometrics and Security Technologies (ISBAST) Anonymized Internet Traces
Denial of Service Attacks
2014
Schmidt, R.
Sadre, R.
A. Sperotto, A.
van den Berg, H.
Pras, A.
A hybrid procedure for efficient link dimensioningComputer Networks Anonymized Internet Traces
2014
Moreno, V.
Santiado del Rio, P.M.
Ramos, J.
Muelas, B.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systemsIntl J. Network Management Anonymized Internet Traces
2014
Frangoudis, P.A.
Hadjadj-Aoul, Y.
Ksentini, A.
Rubino, G.
Etame, T.
Brun, C.
PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top servicesConf. on Information, Intelligence, Systems and Applications (IISA) Anonymized Internet Traces
2014
Shahzad, M.
Liu, A.X.
Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stampingACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2014
Schmidt, R.
Sadre, R.
Melnikov, N.
Schonwalder, J.
Pras, A.
Linking network usage patterns to traffic Gaussianity fitIFIP Networking Conf. Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Contributions to efficient resource management in virtual networksIFIP Conf. on Autonomous Infrastructure, Management and Security (AIMS) Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
Famaey, J.
De Turck, F.
Neural network-based autonomous allocation of resources in virtual networksEuropean Conf. on Networks and Communications (EuCNC) Anonymized Internet Traces
2014
Hsiao, H.-C.Toward a highly available future InternetCarnegie Mellon Univ. Anonymized Internet Traces
Topology with BGP
Topology with Skitter
2014
Zhou, X.
Petrovic, M.
Eskridge, T.
Carvalho, M.
Tao, X.
Exploring Netflow data using HadoopASE BigData/SocialCom/Cybersecurity Conf. Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Energy efficient exact matching for flow identification with cuckoo affinity hashingIEEE Communications Letters Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
De Turck, F.
Latre, S.
Design and evaluation of learning algorithms for dynamic resource management in virtual networksIEEE/IFIP Network Operations and Management Symp. (NOMS) Anonymized Internet Traces
2014
Liu, B.
Lu, J.
Kai, Y.
Wang, Y.
Pan, T.
Power-proportional router: Architectural design and experimental evaluationQuality of Service (IWQoS) Symp. Anonymized Internet Traces
2014
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
TDFA: Traceback-based defense against DDoS flooding attacksIEEE Int Conf. on Advanced Information Networking and Applications (AINA) Anonymized Internet Traces
Denial of Service Attacks
2014
Wang, H.
Lee, K.S.
Weatherspoon, H.
PHY convert channels: Can you see the idles?Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Handigol, N.
Heller, B.
Jeyakumar, V.
Mazieres, D.
McKeown, N.
I know what your packet did last hop: Using packet histories to troubleshoot networksUsenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Masud, M.M.
Mustafa, U.
Trabelsi, Z.
A data driven firewall for faster packet filteringConf. on Communications and Networking (ComNet) Anonymized Internet Traces
2014
Kim, J.-S.
Ko, M.-C.
Nam, J.
Kim, J.
Bitmap-based prefix caching for fast IP lookupKSII Trans on Internet and Information Systems Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Efficient implementation of error correction codes in hash tablesMicroelectronics Reliability Anonymized Internet Traces
2014
Kudo, T.
Takin, T.
On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet samplingIntl J. of Network Management Anonymized Internet Traces
UCSD Network Telescope
2013
Zhang, Y.
Sun, Y.
Zhang, J.
Xu, J.
Wu, Y.
An efficient framework for parallel and continuous frequent item monitoringConcurrency Computation: Practice and Experience Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Socket overloading for fun and cache-poisoningComputer Security Applications Conf. (ACSAC) Anonymized Internet Traces
2013
Larsen, R.Slow port scanning with BroGjovik Univ. College, Gjovik, Norway Anonymized Internet Traces
2013
Chen, J.
Addie, R.G.
Zukerman, M.
Performance evaluation and service rate provisioning for a queue with fractional Brownian inputPerformance Evaluation Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
IP traceback through (authenticated) deterministic flow marking: an empirical evaluationEURASIP J. on Information Security Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Sperotto, A.
Pras, A.
Lightweight link dimensioning using sFlow samplingConf. on Network and Services Management (CNSM) Anonymized Internet Traces
2013
Retvari, G.
Tapolcai, J.
Korosi, A.
Majdan, A.
Heszberger, Z.
Compressing IP forwarding tables: towards entropy bounds and beyondACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2013
Lee, M.
Duffield, N.
Kompella, R.R.
High-fidelity per-flow delay measurements with reference latency interpolationIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2013
Iqbal, M.F.
Holt, J.
Ryoo, J.H.
John, L.K.
de Veciana, G.
Flow migration on multicore network processors: Load balancing while minimizing packet reorderingConf. on Parallel Processing (ICPP) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Shulman, H.
Off-path hacking: the illusion of challenge-response authenticationIEEE Security and Privacy Anonymized Internet Traces
2013
Casey, C.J.
Sutton, A.
Dos Reis, G.
Sprintson, A.
Eliminating network protocol vulnerabilities through abstraction and systems language designConf. on Network Protocols (ICNP) Anonymized Internet Traces
2013
Karpowicz, M.On the design of energy-efficient service rate control mechanisms: CPU frequency control for LinuxTyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC) Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Vulnerable delegation of DNS resolutionEuropean Symp. on Research in Computer Security (ESORICS) Anonymized Internet Traces
2013
Garfinkel, S.L.
Shick, M.
Passive TCP reconstruction and forensic analysis with tcpflowNaval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2013
Frangoudis, P.A.
Ksentini, A.
Hadjadj-Aoul, Y.
Boime, G.
PTPv2-based metwork load estimationSymp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS) Anonymized Internet Traces
2013
Moshref, M.
Yu, M.
Govindan, R.
Resource/accuracy tradeoffs in software-defined measurementACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2013
Megyesi, P.
Molnar, S.
Analysis of elephant users in broadband network trafficEUNICE/IFIP WG 6.6 Workshop: Advances in Communication Networking Anonymized Internet Traces
2013
Iqbal, M.F.Workload-aware network processors: improving performance while minimizing power consumptionUniv. Texas, Austin Anonymized Internet Traces
2013
Hu, Y.-H.A fluid-based approach for modeling network activitiesJ Electr Electron Syst Anonymized Internet Traces
2013
Coelho, N.
Salvador, P.
Nogueira, A.
Inter-operator traffic differentiation based on multiscale analysisThinkMind, Conf. on Advances in Future Internet (AFIN) Anonymized Internet Traces
2013
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Reducing the cost of implementing error correction codes in content addressable memoriesIEEE Trans. on Circuits and Systems II: Express Briefs Anonymized Internet Traces
2013
Guo, Z.
Yang, Y.
High-speed multicast scheduling for all-optical packet switchesConf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2013
Ghoshal, P.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for Software Defined FirewallsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2013
Santiago, S.S.Latency estimation of IP flows using NetFlowUniv. Politecnica de Catalunya, Barcelona, Spain Anonymized Internet Traces
2013
Namayanja, J.M.
Janeja, V.P.
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networksIEEE Conf. on Intelligence and Security Informatics Anonymized Internet Traces
2013
Leira, R.
Gomez, P.
Gonzalez, I.
Lopez de Vergara, J.E.
Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardwareConf. on Smart Communications in Network Technologies (SaCoNeT) Anonymized Internet Traces
2013
Joslyn, C.
Choudhury, S.
Haglin, D.
Howe, B.
Nickless, B.
Olsen, B.
Massive scale cyber traffic analysis: A driver for graph database researchWorkshop on Graph Data Management Experiences and Systems (GRADES) Anonymized Internet Traces
Denial of Service Attacks
2013
Iacovazzi, A.
Baiocchi, A.
Investigating the trade-off between overhead and delay for full packet traffic privacyIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2013
Handigol, N.A.Using packet histories to troubleshoot networksStanford Univ., Stanford, CA, US Anonymized Internet Traces
2013
Fokkema, J.A study of impacts of flow timeouts on link provisioningTwente Student Conf. on IT Anonymized Internet Traces
2013
Clegg, R.G.
Araujo, J.T.
Landa, R.
Mykoniati, E.
Griffin, D.
Rio, M.
On the relationship between fundamental measurements in TCP flowsIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2013
Zadnik, M.Optimization of network flow monitoringInformation Sciences and Technologies Bulletin of the ACM Slovakia Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Pras, A.
Gaussian traffic revisitedIFIP Networking Conf. Anonymized Internet Traces
2013
Santiago del Rio, P.M.Internet traffic classification for high-performance and off-the-shelf systemsUniv. Autonoma de Madrid Anonymized Internet Traces
2013
Petkov, V.
Rajagopal, R.
Obraczka, K.
Characterizing per-application network traffic using entropyACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2013
Liu, H.A collaborative defense framework against DDoS attacks in networksWashington State Univ., Pullman, WA, US Anonymized Internet Traces
Denial of Service Attacks
2013
Erazo, M.A.
Liu, J.
Leveraging symbiotic relationship between simulation and emulation for scalable network experimentationConf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS) Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
On evaluating IP traceback schemes: a practical perspectiveIEEE Security and Privacy Workshops Anonymized Internet Traces
2013
Yu, M.
Jose, L.
Miao, R.
Software defined traffic measurement with OpenSketchUsenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Fragmentation considered vulnerableACM Trans. on Information and System Security (TISSEC) Anonymized Internet Traces
2013
Ahmadzadeh, S.A.
Agnew, G.
Turbo covert channel: An iterative framework for covert communication over data networksIEEE INFOCOM Anonymized Internet Traces
2013
Hofstede, R.
Drago, I.
Sperotto, A.
Sadre, R.
Pras, A.
Measurement artifacts in NetFlow dataPassive and Active Measurement (PAM) Anonymized Internet Traces
2013
He, G.-F.
Yang, M.
Luo, J.-Z.
Zhang, L.
Online identification of Tor anonymous communication trafficJ. of Software Anonymized Internet Traces
2013
Gangam, S.
Chandrashekar, J.
Cunha, I.
Kurose, J.
Estimating TCP latency approximately with passive measurementsPassive and Active Measurement (PAM) Anonymized Internet Traces
2013
Dautrich Jr, J.L.
Ravishankar, C.V.
Inferential time-decaying Bloom filtersConf. on Extending Database Technology (EDBT) Anonymized Internet Traces
2013
De Sensi, D.DPI over commodity hardware: implementation of a scalable framework using FastFlowUniv. Pisa, Pisa, IT Anonymized Internet Traces
2013
Kim, S.
Nam, S.Y.
A long range dependent Internet traffic model using unbounded Johnson distributionIEICE Trans. on Communications Anonymized Internet Traces
2012
Liu, W.
Yan, Y.
Dong, T.
Run-hua, T.
Self-similarity and heavy-tail of ICMP trafficJ. Computers Anonymized Internet Traces
2012
Detal, G.
Paasch, C.
van der Linden, S.
Merindol, P.
Avoine, G.
Bonaventure, O.
Revisiting flow-based load balancing: Stateless path selection in data center networksComputer Networks Anonymized Internet Traces
2012
Coelho, N.M.M.Profiling de trafego inter-operador baseado em analise multi-escalarUniv. de Aveiro Anonymized Internet Traces
2012
Basaran, C.
Kang, K.-D.
Zhou, Y.
Suzer, M.H.
Adaptive load shedding via fuzzy control in data stream management systemsConf. on Service-Oriented Computing and Applications (SOCA) Anonymized Internet Traces
2012
Santiago del Rio, P.M.
Rossi, D.
Gringoli, F.
Nava, L.
Salgarelli, L.
Aracil, J.
Wire-speed statistical classification of network traffic on commodity hardwareInternet Measurement Conf. (IMC) Anonymized Internet Traces
2012
Moriyama, E.
Takahashi, T.
Miyamoto, D.
DNS-based defense against IP spoofing attacksConf. on Neural Information Processing Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
A GI/G/1 model for 10 Gb/s energy efficient ethernet linksIEEE Trans. on Communications Anonymized Internet Traces
2012
Ekiz, N.Transport layer renegingUniv. Delaware Anonymized Internet Traces
2012
Zhang, X.
Ding, W.
Comparative research on internet flows characteristicsConf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics Anonymized Internet Traces
2012
Weinberg, Z.
Wang, J.
Yegneswaran, V.
Briesemeister, L.
Cheung, S.
Wang, F.
Boneh, D.
StegoTorus: a camouflage proxy for the Tor anonymity systemACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2012
Moreno, V.
Santiago del Rio, P.M.
Ramos, J.
Garnica, J.
Garcia-Dorado, J.L.
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O enginesIEEE Communications Lett. Anonymized Internet Traces
2012
Kim, J.
Park, M.
Han, S.
Kim, J.
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookupIEICE Trans. on Communications Anonymized Internet Traces
2012
Kato, M.
Cho, K.
Honda, M.
Tokuda, H.
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregationWorkshop on Managing Systems Automatically and Dynamically Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Efficient traffic aware power management in multicore communications processorsACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Cao, Z.
Panwar, S.S.
Efficient buffering and scheduling for a single-chip crosspoint-queued switchACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
CBTree: A practical concurrent self-adjusting search treeDistributed Computing (DISC) Anonymized Internet Traces
2012
Xiaojuan, S.
Bin, L.
Stream data analysis for backbone network intrusion detection systemConf. on Oxide Materials for Electronic Engineering (OMEE) Anonymized Internet Traces
2012
Mogul, J.C.
Congdon, P.
Hey, you darned counters!: get off my ASIC!ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2012
Lin, Z
Hopper, N.
New attacks on timing-based network flow watermarksUsenix Security Conf. (SEC) Anonymized Internet Traces
2012
He, P.
Guan, H.
Xie, G.
Salamatian, K.
Evaluating and optimizing IP lookup on many core processorsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Gringoli, F.
Nava, L.
Este, A.
Salgarelli, L.
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardwareWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2012
Detti, A.
Pomposini, M.
Blefari-Melazzi, N.
Salsano, S.
Supporting the Web with an information centric network that routes by nameComputer Networks Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Multiadaptive sampling for lightweight network measurementsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Lin, Z.Toward building practical privacy enhancing technologiesUniv. Minnesota Anonymized Internet Traces
2012
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architecturesComputer Communications Anonymized Internet Traces
2012
Zhao, Y.
Yuan, R.
Wang, W.
Meng, D.
Zhang, S.
Li, J.
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone trafficConf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2012
Yang, T.
Duan, R.
Lu, J.
Zhang, S.
Dai, H.
Liu, B.
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancyConf. on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Optimizing network measurements through self-adaptive samplingConf. on High Performance Computing and Communication (HPCC) Anonymized Internet Traces
2012
Qardaji, W.
Li, N.
Anonymizing network traces with temporal pseudonym consistencyConf. on Distributed Computing Systems Workshops (ICDCSW) Anonymized Internet Traces
2012
Markman, M.A.J.
Tokheim, S.
Reliable broadcast contribution over the public InternetNorwegian Univ. of Science and Technology Anonymized Internet Traces
2012
Kuang, J.
Bhuyan, L.
Klefstad, R.
Traffic-aware power optimization for network applications on multicore serversDesign Automation Conf. Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Bounded energy consumption with dynamic packet coalescingNetworks and Optical Communications (NOC) Anonymized Internet Traces
2012
Hanay, Y.S.
Li, W.
Tessier, R.
Wolf, T.
Saving energy and improving TCP throughput with rate adaptation in EthernetIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2012
Guo, Z.
Yang, Y.
High speed multicast scheduling in hybrid optical packet switches with guaranteed latencyIEEE Trans. on Computers Anonymized Internet Traces
2012
Fragni, C.
Costa, L.H.M.K.
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routersComputer Networks Anonymized Internet Traces
2012
Davy, A.
Jennings, B.
Botvich, D.
QoSPlan: A measurement based quality of service aware network planning frameworkJ. Network and Systems Management Anonymized Internet Traces
2012
Melazzi, N.B.
A. Detti, A.
Pomposini, M.
Scalability measurements in an information-centric networkMeasurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project Anonymized Internet Traces
2012
Korenfeld, B.CBTree: A practical concurrent self-adjusting search treeTel-Aviv Univ., Israel Anonymized Internet Traces
2012
Fan, J.
Hu, C.
He, K.
Jiang, J.
Liuy, B.
Reducing power of traffic manager in routers via dynamic on/off-chip schedulingIEEE INFOCOM Anonymized Internet Traces
2012
Zhang, H.
Lu, G.
Qassrawi, M.T.
Zhang, Y.
Yu, X.
Feature selection for optimizing traffic classificationComputer Communications Anonymized Internet Traces
2012
Verma, H.
Yadav, B.
Bansal, P.
Raj, S.
IPv4 to IPv6 shift: major challengesJ. Engineering and Innovative Technology (IJEIT) Anonymized Internet Traces
2012
Tawakol, A.Performance analysis of TCAMs in switchesUniv. Waterloo, Ontario, CA Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Power and performance analysis of network traffic prediction techniquesIEEE Symp. on Performance Analysis of Systems and Software (ISPASS) Anonymized Internet Traces
2012
Zhang, W.
Bi, J.
Wu, J.
Zhang, B.
Catching popular prefixes at AS border routers with a prediction based methodComputer Networks Anonymized Internet Traces
2012
Tsidon, E.
Hanniel, I.
Keslassy, I.
Estimators also need shared values to grow togetherIEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Kanizo, Y.
Keslassy, I.
The variable-increment counting Bloom filterIEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter?IEEE INFOCOM Anonymized Internet Traces
2012
Pan, T.
Guo, X.
Zhang, C.
Jiang, J.
Wu, H.
Liu, B.
Tracking millions of flows in high speed networks for application identificationIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2012
Lee, C.
Lee, D.K.
Moon, S.
Unmasking the growing UDP traffic in a campus networkPassive and Active Measurement (PAM) Anonymized Internet Traces
2012
Houmansadr, A.
Kiyavash, N.
Borisov, N.
Non-blind watermarking of network flowsarxiv.org Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Optimal configuration of energy-efficient ethernetComputer Networks Anonymized Internet Traces
2012
Gilbert, J.Scalable wavelet-based active network stepping stone detectionAir Force Inst. of Technology, Air Univ, Anonymized Internet Traces
2012
Lee, M.
Duffield, N.
Kompella, R.R.
Opportunistic flow-level latency estimation using consistent NetFlowIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2012
Kanizo, Y.
Hay, D.
Keslassy, I.
Maximizing the throughput of cuckoo hashing in network devicesComNet, Technion, Israel Anonymized Internet Traces
2012
Shpiner, A.
Keslassy, I.
Cohen, R.
Reducing the reordering delay in multi-core network processorsComNet, Technion, Israel Anonymized Internet Traces
2012
Martinez, V.M.Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networksUniv. Autonoma de Madrid Anonymized Internet Traces
2012
Houmansadr, A.Design, analysis, and implementation of effective network flow watermarking schemesUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2012
Blefari-Melazzi, N.
Cancellieri, M.
Detti, A.
Pomposini, M.
Salsano, S.
The CONET solution for information centric networkingUniv. Rome Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Behavioral graph analysis of Internet applicationsIEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2011
Vishwanath, A.
Sivaraman, V.
Zhao, Z.
Russell, C.
Thottan, M.
Adapting router buffers for energy efficiencyACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2011
Moreno, S.D.B.Evaluacion de desempeno de diversas arquitecturas de commutadores opticosUniv. de los Andes, Facultad de Ingenieria, Bogota, Colombia Anonymized Internet Traces
2011
Matias, R.
Carvalho, A.M.M.
Teodoro, V.A.
Tes, D.
Araujo, L.B.
Performance comparison of forecasting models applied to LAN/MAN traffic predictionIEEE Workshop on Local and Metropolitan Area Networks (LANMAN) Anonymized Internet Traces
2011
Hua, N.
Norige, E.
Kumar, S
Lynch, B.
Non-crypto hardware hash functions for high performance networking ASICsSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2011
Houmansadr, A.
Nguyen, G.T.K.
Caesar, M.
Borisov, N.
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible DeniabilityACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2011
Guo, Z.
Yang, Y.
Pipelining multicast scheduling in all-optical packet switches with delay guaranteeIntl Teletraffic Congress (ITC) Anonymized Internet Traces
2011
Clegg, R.
Landa, R.
Rio, M.
Criticisms of modelling packet traffic using long-range dependence (extended version)J. Computer and System Sciences Anonymized Internet Traces
2011
Spinelli, L.P.Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatoriasUniv. Federal Do Rio de Janeiro, Brazil Anonymized Internet Traces
2011
Detti, A.
Melazzi, N.B.
Salsano, S.
Pomposini, M.
CONET: a content centric inter-networking architectureACM SIGCOMM Workshop on Information-Centric Networking (ICN) Anonymized Internet Traces
2011
Venkataramanan, R.
Jeong, M.-W.
Prabhakar, B.
A flow- and packet-level model of the InternetUniv. Michigan Anonymized Internet Traces
2011
Marsan, M.A.
Fernandez Anta, A.
Mancuso, V.
Rengarajan, B.
Vasallo, P.
Rizzo, G.
A simple analytical model for energy efficient ethernetIEEE Communications Lett. Anonymized Internet Traces
2011
Leiva, A.
Finochietto, J.M.
Huiszoon, B.
Lopez, V.
Tarifeno, M.
Aracil, J.
Beghelli, A.
Comparison in power consumption of static and dynamic WDM networksOptical Switching and Networking Anonymized Internet Traces
2011
Larrabeiti, D.
Reviriego, P.
Hernandez, J.A.
Maestro, J.A.
Uruena, M..
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viabilityOptical Switching and Networking Anonymized Internet Traces
2011
Valgenti, V.C.
Paul, R.R.
Kim, M.S.
Netshuffle: Improving traffic trace anonymization through graph distortionIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2011
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filterComNet, Technion, Israel Anonymized Internet Traces
2011
Grieco, L.A.
Barakat, C.
Marzulli, M.
Spectral models for bitrate measurement from packet sampled trafficIEEE Trans. on Network and Service Management Anonymized Internet Traces
2011
Mothersole, I.
Reed, M.J.
Optimising rule order for a packet filtering firewallConf. on Network and Information Systems Security (SAR-SSI) Anonymized Internet Traces
2011
He, F.
Xiang, F.
Yibo Xue, Y.
Jun Li, J.
Towards high-performance network application identification with aggregate-flow cachearxiv.org Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Gu, L.
Network-aware behavior clustering of Internet end hostsIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
UCSD Network Telescope
2011
Ekiz, N.
Rahman, A.H.
Amer, P.D.
Misbehaviors in TCP SACK generationACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2011
Dusi, M.
Gringoli, F.
Salgarelli, L.
Quantifying the accuracy of the ground truth associated with Internet traffic tracesComputer Networks Anonymized Internet Traces
2011
Reviriego, P.
Huiszoon, B.
Lopez, V.
Coenen, R.B.
Hernandez, J.A.
Maestro, J.A.
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical linksIEEE J. Selected Topics in Quantum Electronics Anonymized Internet Traces
2011
Jose, L.
Yu, M.
Rexford, J.
Online measurement of large traffic aggregates on commodity switchesUsenix Conf. Hot-ICE Anonymized Internet Traces
2011
Houmansadr, A.
Borisov, N.
SWIRL: A scalable watermark to detect correlated network flowsSymp. on Network and Distributed System Security (NDSS) Anonymized Internet Traces
2011
Schear, N.Preventing encrypted traffic analysisUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2011
Pouzols, F.M.
Lopez, D.R.
Barros, A.B.
Predictive models of network traffic loadStudies in Computational Intelligence Anonymized Internet Traces
2011
Liu, H.
Sun, Y.
Valgenti, V.C.
Kim, M.S.
TrustGuard: A flow-level reputation-based DDoS defense systemConf. on Consumer Communications and Networking (CCNC) Anonymized Internet Traces
Denial of Service Attacks
2010
He, K.
Hu, C.
Jiang, J.
Zhou, Y.
Liu, B.
A2C: Anti-attack counters for traffic measurementIEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2010
Haider, A.
Acharya, K.
Raja, M.Y.A.
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networksHigh-Capacity Optical Networks and Enabling Technologies (HONET) Anonymized Internet Traces
2010
Mouchos, C.
Tsokanos, A.
Kouvatsos, D.D.
Dynamic OBS offset allocation in WDM networksComputer Communications Anonymized Internet Traces
2010
Zadnik, M.
Canini, M.
Evolution of cache replacement policies to track heavy-hitter flowsSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2010
Saxena, M.
Kompella, R.
CLAMP: Efficient class-based sampling for flexible flow monitoringComputer Networks Anonymized Internet Traces
2010
Kanizo, Y.
Hay, D.
Keslassy, I.
Hash tables with finite buckets are less resistant to deletionsAllerton Conf. on Communication, Control and Computing Anonymized Internet Traces
2010
Scappini, R.Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u OnditasFacultad de Informatica, Univ. Nacional de la Plata Anonymized Internet Traces
2010
Santiago del Rio, P.M.
Ramos, J.
Salvador, A.
de Vergara, J.E.L.
Aracil, J.
Cuadra, A.
Cutanda, M.
Application of Internet traffic characterization to all-optical networksConf. on. Transparent Optical Networks (ICTON) Anonymized Internet Traces
2010
Yuan, R.
Weibing, Y.
Mingyu, C.
Xiaofang, Z.
Jianping, F.
Robust TCP reassembly with a hardware-based solution for backbone trafficConf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2010
Woldeselassie, M.
Clegg, R.
Rio, M.
Forecasting full-path network congestion using one bit signallingIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2010
Reviriego, P.
Larrabeiti, D.
Maestro, J.A.
Would energy efficient ethernet be effective on 10Gbps optical links?OSA Photonics in Switching (PS) Anonymized Internet Traces
2010
Fenacci, D.
Franke, B.
Empirical evaluation of data transformations for network infrastructure applicationsConf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X) Anonymized Internet Traces
Topology with Archipelago
2010
Zhang, N.
Wang, F.
Gong, B.
Li, L.
Identifying heavy-hitter flows fast and accuratelyConf. on Future Computer and Communication (ICFCC) Anonymized Internet Traces
2010
Reviriego, P.
Sanchez-Macian, A.
Maestro, J.A.
Bleakley, C.J.
Increasing the MTU size for energy efficiency in ethernetIET Signals and Systems Conf. (ISSC) Anonymized Internet Traces
2010
Lee, D.
Carpenter, B.E.
Brownlee, N.
Observations of UDP to TCP ratio and port numbersConf. on Internet Monitoring and Protection (ICIMP) Anonymized Internet Traces
2010
Hansen, H.V.
Goebel, V.
Plagemann, T.
Siekkinen, M.
Resource adaptive distributed information sharingWorkshop on Networked Services and Applications - Engineering, Control and Management (EUNICE ) Anonymized Internet Traces
2010
Gremillet, O.
Goncalves, P.
Vicat-Blanc Primet, P.
Dupas, A.
Traffic classification techniques supporting semantic networksWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2010
Moon, D.Achieving flexibility and performance for packet forwarding and data center managementUC Berkeley Anonymized Internet Traces
2010
Lee, M.
Duffield, N.
Kompella, R.
Two samples are enough: Opportunistic flow-level latency estimation using NetFlowIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Parallelizing weighted frequency counting in high-speed network monitoringComputer Communications Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Identifying heavy hitters in high-speed network monitoringScience China Information Sciences Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processorsDynamically reconfigurable systems, architectures, design methods and applications, Ch. 17 Anonymized Internet Traces
2010
Albrecht, C.
Foag, J.
Koch, R.
Maehle, E.
Pionteck, T.
DynaCORE - dynamically reconfigurable coprocessor for network processorsDynamically reconfigurable systems, architectures, design methods and applications, Ch. 16 Anonymized Internet Traces
2010
John, W.Characterization and classification of internet backbone trafficChalmers Univ. of Technology, Gothenborg, Sweden Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
An application-aware load balancing strategy for network processorsConf. on High performance embedded architectures and compilers (HIPEAC) Anonymized Internet Traces
2010
Moon, D.
Naous, J.
Liu, J.
Zarifis, K.
Casado, M.
Koponen, T.
Shenker, S.
Breslau, L.
Bridging the software/hardware forwarding dividesemanticscholar.org Anonymized Internet Traces
2009
Sellke, H.
Wang, C.-C.
Bagchi, S.
Shroff, N.B.
Camouflaging timing channels in web trafficPurdue Univ. Anonymized Internet Traces
2009
Beheshti-Zavareh, N.Tiny buffers for electronic and optical routersStanford Univ., Stanford, CA, US Anonymized Internet Traces
2009
Schear, N.
Borisov, N.
Preventing SSL traffic analysis with realistic cover trafficACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2009
Jiang, W.
Prasanna, V.K.
Reducing dynamic power dissipation in pipelined forwarding enginesIEEE Conf. on Computer Design (ICCD) Anonymized Internet Traces
2009
Zhang, M.
Dusi, M.
John, W.
Chen, C.
Analysis of UDP traffic usage on internet backbone linksSymp. on Applications and the Internet (SAINT) Anonymized Internet Traces
2009
Este, A.
Gringoli, F.
Salgarelli, L.
Support Vector Machines for TCP traffic classificationComputer Networks Anonymized Internet Traces
2009
Andreou, M.S.Message traceback systems. Dancing with the devilUniv. Newcastle upon Tyne Anonymized Internet Traces
Topology with Skitter
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
Joint entropy analysis model for DDoS attack detectionConf. on Information Assurance and Security (IAS) Anonymized Internet Traces
UCSD Network Telescope
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
A traffic coherence analysis model for DDoS attack detectionConf. on Security and Cryptography (SECRYPT) Anonymized Internet Traces
UCSD Network Telescope
2009
Vishwanath, K.V.
Vahdat, A.
Swing: Realistic and responsive network traffic generationIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Ishakian, V.
Akinwumi, J.
Matta, I.
On the cost of supporting multihoming and mobilityBoston Univ., CS Dept. Anonymized Internet Traces
2009
Clegg, R.G.
Withall, M.S.
Moore, A.W.
Phillips, I.W.
Parish, D.J.
Rio, M.
Landa, R.
Haddadi, H.
Kyriakopoulos, K.
Auge, J.
Clayton, R.
Salmon, D.
Challenges in the capture and dissemination of measurements from high-speed networksIET Communications Anonymized Internet Traces
2009
Brugger, S.T.The quantitative comparison of computer networksUC Davis Anonymized Internet Traces
2009
Saxena, M.
Kompella, R.
A framework for efficient class-based samplingIEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Does the internet still demonstrate fractal nature?IEEE Conf. on Networking (ICN) Anonymized Internet Traces
2009
Idzikowski, F.Search and analysis of backbone traffic measurements in the internetTechnische Univ. Berlin (TKN-09-004) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Levy flights and fractal modeling of internet trafficIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Maiolini, G.
Molina, G.
Baiocchi, A.
Rizzi, A.
On the fly application flows identification by exploiting K-means based classifiersJ. Information Assurance and Security Anonymized Internet Traces
2009
Kanizo, Y.
Hay, D.
Keslassy, I.
Optimal dynamic hash tablesComNet, Technion, Israel Anonymized Internet Traces
2009
Andreou, M.S.
van Moorsel, A.
COTraSE Connection Oriented Traceback in Switched EthernetJ. Information Assurance and Security Anonymized Internet Traces
2008
Casado, M.
Koponen, T.
Moon, D.
Shenker, S.
Rethinking packet forwarding hardwareACM SIGCOMM HotNets Workshop Anonymized Internet Traces
2008
Baiocchi, A.
Maiolini, G.
Molina, G.
Rizzi, A.
On-the-fly statistical classification of internet traffic at application layer based on cluster analysisWorkshop on Computational Intelligence in Security for Information Systems (CISIS) Anonymized Internet Traces
2008
Andreou, M.
Moorsel, A.
COTraSE: Connection Oriented Traceback in Switched EthernetConf. on Information Assurance and Security Anonymized Internet Traces
Topology with Skitter
2008
Dusi, M.
Gringoli, F.
Salgarelli, L.
IP traffic classification for QoS guarantees: the independence of packetsIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2008
Pouzols, F.M.
Barriga, A.
Lopez, D.R.
Sanchez-Solano, S.
Linguistic summarization of network traffic flowsIEEE Conf. on Fuzzy Systems (FUZZ-IEEE) Anonymized Internet Traces
2008
Shevtekar, A.
Ansari, N.
A router-based technique to mitigate reduction of quality (RoQ) attacksComputer Networks Anonymized Internet Traces
2008
Clegg, R.
Landa, R.
Haddadi, H.
Rio, M.
Moore, A.W.
Techniques for flow inversion on sampled dataIEEE INFOCOM Workshop Global Internet Symp. Anonymized Internet Traces
2008
Meitinger, M.
Ohlendorf, R.
Wild, T.
Herkersdorf, A.
A hardware packet re-sequencer unit for network processorsArchitecture of Computing Systems (ARCS) Anonymized Internet Traces
2008
Raspall, F.
Sallent, S.
Adaptive shared-state samplingInternet Measurement Conf. (IMC) Anonymized Internet Traces
2008
Proebstel, E.Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled trafficUC Davis Anonymized Internet Traces
2008
Este, A.
Gringoli, F.
Salgarelli, L.
An SMV-based approach to traffic classificationUniv. Brescia Anonymized Internet Traces
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
Network performance analysis based on histogram workload modelsIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2007
Shevtekar, A.
Ansari, N.
A proactive test based differentiation to mitigate low rate DoS attacksIEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2007
Whitehead, B.
Lung, C.-H.
Rabinovitch, P.
A TCP connection establishment filter: symmetric connection detectionIEEE Conf. on Communications (ICC) Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementationUC Riverside Anonymized Internet Traces
Topology with Skitter
2007
Clegg, R.
Haddadi, H.
Landa, R.
Rio, M.
Towards informative statistical flow inversionarxiv.org Anonymized Internet Traces
2007
Haddadi, H.
Landa, R.
Rio, M.
Bhatti, S.
Revisiting the issues on netflow sample and export performancearxiv.org Anonymized Internet Traces
2007
Yuan, L.
Chuah, C.
Mohapatra, P.
ProgME: towards programmable network measurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Salgarelli, L.
Gringoli, F.
Karagiannis, T.
Comparing traffic classifiersACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network monitoring using traffic dispersion graphs (TDGs)Internet Measurement Conf. (IMC) Anonymized Internet Traces
Topology with Skitter
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
A histogram-based stochastic process for finite buffer occupancy analysisConf. on Performance Evaluation Methodologies and Tools (VALUETOOLS) Anonymized Internet Traces
2007
Clegg, R.Simulating internet traffic with Markov-modulated processesUK Performance Engineering Workshop Anonymized Internet Traces
2006
Park, J.
Tyan, H.-R.
Jay Kuo, C.-C.
GA-based internet traffic classification technique for QoS provisioningConf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Anonymized Internet Traces
2006
Okuno, M.
Nishimura, S.
Ishida, S.
Nishi, H.
Cache-based network processor architecture: evaluation with real network trafficIEICE Trans. on Electronics Anonymized Internet Traces
2006
Vishwanath, K.
Vahdat, A.
Realistic and responsive network traffic generationACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Varghese, G.
Fingerhut, J.
F. Bonomi, F.
Detecting evasion attacks at high speeds without reassemblyACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed linksIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2006
Clegg, R.Markov-modulated on/off processes for long-range dependent internet trafficarxiv.org Anonymized Internet Traces
2006
Constantinou, F.
Mavrommatis, P.
Identifying known and unknown peer-to-peer trafficIEEE Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
2006
Wang, H.
Lin, Y.
Jin, Y.
Cheng, S.
Easily-implemented adaptive packet sampling for high speed networks flow measurementConf. on Computational Science (ICCS) Anonymized Internet Traces
2006
Kumar, S.
Maschmeyer, J.
Crowley, P.
Exploiting locality to ameliorate packet queue contention and serializationACM Conf. on Computing Frontiers Anonymized Internet Traces
2006
Chen, Y.
Hwang, K.
Collaborative change detection of DDoS attacks on community and ISP networksIEEE Symp. on Collaborative Technologies and Systems (CTS) Anonymized Internet Traces
2006
Shriram, A.
Kaur, J.
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidthPassive and Active Measurement (PAM) Anonymized Internet Traces
2006
Hu, Y.
Chiu, D.-M.
Lui, J.
Entropy based flow aggregationIFIP Networking Conf. Anonymized Internet Traces
2006
Clegg, R.Modelling internet traffic using Markov chainsImperial College, London, UK Anonymized Internet Traces
2005
Kompella, R.
Estan, C.
The power of slicing in internet flow measurementInternet Measurement Conf. (IMC) Anonymized Internet Traces
2005
Veitch, D.
Hohna, N.
Abry, P.
Multifractality in TCP/IP traffic: the case againstComputer Networks Anonymized Internet Traces
2005
Jiang, H.
Dovrolis, C.
Why is the internet traffic bursty in short (sub-RTT) timescales?ACM SIGMETRICS Performance Evaluation Review Anonymized Internet Traces
2005
Okuno, M.
Ishida, S.
Nishi, H.
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routeraIEICE Trans. on Electronics Anonymized Internet Traces
2004
Karagiannis, T.
Molle, M.
Faloutsos, M.
Long-range dependence: ten years of Internet traffic modelingIEEE Internet Computing Anonymized Internet Traces
2004
Okuno, M.
Nishi, H.
Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handlerIEICE technical report: Circuits and system Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed linksInternet Measurement Conf. (IMC) Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the miceACM Trans. on Computer Systems (TOCS) Anonymized Internet Traces
2003
Estan, C.
Savage, S.
Varghese, G.
Automatically inferring patterns of resource consumption in network trafficACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Anonymized Internet Traces
2002
Estan, C.
Varghese, G.
New directions in traffic measurement and accountingACM SIGCOMM Computer Communication Review Anonymized Internet Traces
1999
Fang, W.
Peterson, L.
Inter-AS traffic patterns and there implicationsIEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2019
Cheng, J.
Li, J.
Tang, X.
Sheng, V.S.
Zhang, C.
Li, M.
A novel DDoS attack detection method using Optimized Generalized Multiple Kernel Learningarxiv.org Denial of Service Attacks
2019
Behal, S.
Singh, P.
LeCAM: A novel metric for detecting DDoS attacks IEEE Intl Conf. on Electronics and Communication and Aerospace Technology Denial of Service Attacks
2019
Bakker, J.
Ng, B.
Seah, W.K. G.
Pekar, A.
Traffic Classification with Machine Learning in a Live NetworkIFIP/IEEE Symp. on Integrated Network and Service Management (IM) Denial of Service Attacks
2019
Chen, J.
Tang, X.
Cheng, J.
Wang, F.
Xu, R.
DDoS attack detection method based on network abnormal behavior in Big Data Environmentarxiv.org Denial of Service Attacks
2019
Adelakun, T.L.A multifractal approach for detecting distributed denial of service attacksUniv. of Manitoba Denial of Service Attacks
2019
Zhang, M.
Shi, L.
Sisodia, D.
Li, J.
Reiher, P.
On multi-point, in-network filtering of Distributed Denial-of-Service trafficIFIP/IEEE Symp. on Integrated Network and Service Management (IM) Denial of Service Attacks
2019
Vipul, V. R.Hybrid Traceback Scheme for DDoS AttacksRecent Findings in Intelligent Computing Techniques Denial of Service Attacks
2019
Sahoo, K. S.
Panda, S. K.
Sahoo, S.
Sahoo, B.
Dash, R.
Toward secure software-defined networks against distributed denial of service attackThe Journal of Supercomputing Denial of Service Attacks
2019
Prasad, K. M.
Siva, V. S.
Kishore, K.
Sreenivasulu, M.
DITFEC: Drift Identification in Traffic-Flow Streams for DDoS Attack Defense Through Ensemble ClassifierComputing and Network Sustainability Denial of Service Attacks
UCSD Network Telescope
2019
Patil, N. V.
Krishna, C. R.
Kumar, K.
Behal, S.
E-Had: A distributed and collaborative detection framework for early detection of DDoS attacksJournal of King Saud University - Computer and Information Sciences Denial of Service Attacks
2019
Nawrocki, M.
Schmidt, T.C.
Wahlisch, M.
Uncovering vulnerable industrial control systems from the Internet corearxiv.org Denial of Service Attacks
2019
Manso, P.
Moura, J.
Serrao, C.
SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS AttacksSpecial Issue Insider Attacks Denial of Service Attacks
2019
Liang, X.
Znati, T.
An empirical study of intelligent approaches to DDoS detection in large scale networksInternational Conference on Computing, Networking and Communications (ICNC) Denial of Service Attacks
2019
Kulchytskyy, B.V.
Cooperstein, L.M.
To the problem of forming the dataset for DDoS attack researchVinnitsia Nat. Tech. Univ. Denial of Service Attacks
2019
Khalaf, B. A.
Mostafa, S. A.
Mustapha, A.
Mohammed, M. A.
Abduallah, W. M.
Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense MethodsIEEE Access Denial of Service Attacks
2019
Guo, W.
Tang, X.
Cheng, J.
Xu, J.
Cai, C.
Guo, Y.
DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence TheoryInternational Conference on Artificial Intelligence and Security Denial of Service Attacks
2019
Gu, Y.
Li, K.
Guo, Z.
Wang, Y.
Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection AlgorithmIEEE Access Denial of Service Attacks
2019
Cui, J.
Wang, M.
Luo, Y.
Zhong, H.
DDoS detection and defense mechanism based on cognitive-inspired computing in SDNFuture Generation Computer Systems Denial of Service Attacks
2019
Bojovic, P. D.
Basicevic, I.
Ocovaj, S.
Popovic, M.
A practical approach to detection of distributed denial-of-service attacks using a hybrid detection methodComputers and Electrical Engineering Denial of Service Attacks
2019
Bhushan, K.
Gupta, B. B.
Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computingMultimedia Tools and Applications Denial of Service Attacks
2019
Alsadhan, A.
Hussain, A.
Liatsis, P.
Alani, M.
Tawfik, H.
Kendrick, P.
Francis, H.
Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacksTransactions on Emerging Telecommunications Technologies Denial of Service Attacks
2018
Barbhuiya, S.
Papazachos, Z.
Kilpatrick, P.
Nikolopoulos, D.S.
RADS: Real-time anomaly detection system for cloud data centresarxiv.org Denial of Service Attacks
2018
Pelloso, M.Distributed Denial of Service attack prediction systemFed. Univ. of Parana Denial of Service Attacks
2018
Dalmazo, B.L.A prediction-based approach for anomaly detection in the cloudUniv. of Coimbra Denial of Service Attacks
2018
Petkovic, M.A contribution to the method for detection of denial of service attacks inInternetUniv. of Novi Sad Denial of Service Attacks
2018
Gupta, A.Distributed Denial of Service attack detection using a machine learning approachUniv. of Calgary Denial of Service Attacks
2018
Hamid, Y.
Balasaraswathi, R.
Journaux, L.
Sugumaran, M.
Benchmark datasets for Network Intrusion Detection: A reviewIntl J. of Network Security Denial of Service Attacks
2018
Cheng, J.
Zhou, J.
Liu, Q.
Tang, X.
Guo, Y.
A DDoS detection method for socially aware networking based on forecasting fusion feature sequenceComputer J. Denial of Service Attacks
2018
Behal, S.
Kumar, K.
Sachdeva, M.
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash eventsJ. of Network and Computer Applications Denial of Service Attacks
2018
Prasad, K. M.
Reddy, A. R. M.
Rao, K. V.
DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environmentCluster Computing Denial of Service Attacks
UCSD Network Telescope
2018
Cheng, J.
Xu, R.
Tang, X.
Sheng, V.
Cai, C.
An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environmentCMC: Computers, Materials and Continua Denial of Service Attacks
2018
Chang, T.Y.
Hsieh, C.J.
Detection and Analysis of Distributed Denial-of-service in Internet of Things-Employing Artificial Neural Network and Apache Spark PlatformSensors and Materials Denial of Service Attacks
2018
Alsirhani, A.
Sampalli, S.
Bodorik, P.
DDoS attack detection system: Utilizing classification algorithms with Apache SparkConf. on New Technologies, Mobility and Security (NTMS) Denial of Service Attacks
2018
Abusitta, A.
Martine, B.
Dagenais, M.
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environmentJ. of Cloud Computing: Advances, Systems and Applications Denial of Service Attacks
2018
Hoque, N.
Bhattacharyya, D.
HLR_DDoS: A low-rate and high-rate DDoS attack detection method using a -divergenceIntl Conf. on Computing and Communication Systems Denial of Service Attacks
2018
Deka, R.
Bhattacharyya, D.
Kalita, J.
Granger causality in TCP flooding attackIntl J. of Network Security Denial of Service Attacks
2018
Zhang, R.
Cheng, J.
Tang, X.
Liu, Q.
He, X.
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering AlgorithmIntl Conf. on Cloud Computing and Security Denial of Service Attacks
2018
Yu, Y.
Guo, L.
Liu, Y.
Zheng, J.
Zong, Y.
An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular NetworksIEEE Access Denial of Service Attacks
2018
Wiedenmann, S.
Mundt, T.
Goltz, J.
Designing and Implementing a Benchmark Collection for Attack Simulation in Field bus SystemsIEEE Conf. on Application, Information and Network Security (AINS) Denial of Service Attacks
2018
Wang, M.
Zhou, H.
Chen, J.
PoTiA: A Popularity and Timeout Analysis Based SDN Controller Protection ApproachIEEE Access Denial of Service Attacks
2018
Vickers, P.
Debashi, M.
Sonification of Network Traffic for Detecting and Learning About Botnet BehaviorIEEE Access Denial of Service Attacks
2018
Uramova, J.
Sege, P.
Moravik, M.
Papan, J.
Kontsek, M.
Hrabovsky, J.
Infrastructure for Generating New IDS DatasetIntl Conf. on Emerging eLearning Technologies and Applications (ICETA) Denial of Service Attacks
2018
Tseung, C. Y.
Chow, K. P.
Forensic-Aware Anti-DDoS DeviceIEEE Security and Privacy Workshops (SPW) Denial of Service Attacks
2018
Thang, T. M.
Nguyen, C. Q.
Nguyen., K. V.
Synflood Spoofed Source DDoS Attack Defense Based on Packet ID Anomaly Detection with Bloom FilterAsian Conf. on Defense Technology (ACDT) Denial of Service Attacks
2018
Riadi, I.
Muhammad, A. W.
Neural Network Based DDoS Detection Regarding Hidden Layer VariationJournal of Theoretical and Applied Information Technology Denial of Service Attacks
2018
Petkovic, M.
Basicevic, I.
Kukolj, D.
Popovic, M.
Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacksComputer Science and Information Systems Denial of Service Attacks
2018
Nam, T.
Phong, P.
Khoa, T.
Huong, T.
Nam, P.
Thanh, N.
Thang, L.
Tran, P.
Dung, Le.
Loi, V.
Self-organizing map-based approaches in DDoS flooding detection using SDNIntl Conf. on Information Networking (ICOIN) Denial of Service Attacks
2018
Mowla, N. I.
Doh, I.
Chae, K.
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi wordComputer Science and Information Systems Denial of Service Attacks
2018
Modi, C.
Patel, D.
A feasible approach to intrusion detection in virtual network layer of Cloud computingAcademy Proceeding in Engineering Sciences Denial of Service Attacks
2018
Mao, J.
Deng, W.
Shen, F.
DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic FeaturesIEEE Intl Conf. On Trust, Security And Privacy In Computing And Communications/On Big Data Science And Engineering (TrustCom/BigDataSE) Denial of Service Attacks
2018
Maheshwari, R.
Rajput, A.
Gupta, A. K.
Private Virtual Cloud Infrastructure Modelling using VCPHCF-RTT Security AgentIntl Conf. on Computing Communication and Automation (ICCCA) Denial of Service Attacks
2018
Kirti, S.
Agrawal, N.
Kumar, S.
Sah, D. K.
Prevention of DDoS attack through harmonic homogeneity difference mechanism on traffic flowIntl Conf. on Recent Advances in Information Technology (RAIT) Denial of Service Attacks
2018
Johnson, K.
De, T.
Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computationIET Information Security Denial of Service Attacks
2018
Iliev, G.
Shaikh, J. R.
Blockchain based Confidentiality and Integrity Preserving Scheme for Enhancing E-commerce SecurityGlobal Conf. on Wireless Computing and Networking (GCWCN) Denial of Service Attacks
2018
Idhammad, M.
Afdel, K.
Belouch, M.
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random ForestHindawi Security and Communication Networks Denial of Service Attacks
2018
Huh, J. H.Implementation of lightweight intrusion detection model for security of smart green house and vertical farmIntl J. of Distributed Sensor Networks Denial of Service Attacks
2018
Huang, H.
Sun, Y. E.
Chen, S.
Tang, S.
Han, K.
Yuan, J.
Yang, W.
You can drop but you cant hide: K-persistent spread estimation in high-speed networksIEEE Conf. on Computer Comm. (INFOCOM) Denial of Service Attacks
2018
Hrabovsky, J.
Segec, P.
Moravcik, M.
Papan, J.
Trends in Application of Machine Learning to Network-Based Intrusion Detection SystemsIntl Conf. on Innovations for Community Services Denial of Service Attacks
2018
Hong, L.
Alzharani, S.
Generation of DDoS Attack Dataset for Effective IDS Development and EvaluationJournal of Information Security Denial of Service Attacks
2018
Hartzel, K. S.
Spangler, W. E.
Managing IT Implementation Risk: A Model from High Reliability OrganizationsIntl Association for Computer Information Systems Denial of Service Attacks
2018
Ghanbari, M.
Kinsner, W.
Extracting features from both the input and the output of a convolutional neural network to detect Distributed Denial of Service attacksIEEE Intl Conf. on Cognitive Informatics and Cognitive Computing (ICCI*CC) Denial of Service Attacks
2018
Dennis, M.J.R.Machine-learning and statistical methods for DDoS attack detection and defense system in Software Defined NetworksRyerson Univ. Denial of Service Attacks
2018
Deka, R. K.
Bhattacharya, D. K.
Kalita, J. K.
Active Learning to Detect DDoS Attack Using Ranked FeaturesComputer Comm. Denial of Service Attacks
2018
Chinnusamy, M.
Raju, N.
Effective Method to Detect Distributed Denial of Service AttacksInternational Journal of Pure and Applied Mathematics Denial of Service Attacks
2018
Chhabra, G. S.
Singh, V.
Singh, M.
Hadoop-based analytic framework for cyber forensicsInternational Journal of Communication Systems Denial of Service Attacks
2018
Cheng, J.
Li, M.
Tang, X.
Sheng, V. S.
Liu, Y.
Guo, W.
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud ComputingSecurity and Communication Networks Denial of Service Attacks
2018
Camargo, C. O.
Faria, E. R.
Zarpelao, B. B.
Miani, R. S.
Qualitative evaluation of denial of service datasetsBrazilian Symp. on Information Systems Denial of Service Attacks
Topology with Archipelago
2018
Bulman, G.A Critical Analysis of Current Measures for Preventing Use of Fraudulent Resources in Cloud ComputingSelected Computing Research Papers - University of Sunderland Denial of Service Attacks
2018
Boukhtouta, A.
Pourzandi, M.
Brunner, R.
Dault, S.
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised MethodologyIFIP Annual Conf. on Data and Applications Security and Privacy Denial of Service Attacks
2018
Bhuyan, M. H.
Elmroth, E.
Multi-scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation MetricIEEE Intl Conf. on Machine Learning and Applications (ICMLA) Denial of Service Attacks
2018
Bhushan, K.
Gupta, B. B.
Hypothesis test for low-rate DDoS attack detection in cloud computing environmentProcedia Computer Science Denial of Service Attacks
2018
Bhatia, S.
Behal, S.
Ahmed, I.
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future DirectionsVersatile Cybersecurity Denial of Service Attacks
2018
Behal, S.
Kumar, K.
Sachdeva, M.
A generalized detection system to detect distributed denial of service attacks and flash events for information theory metricsTurkish Journal of Electrical Engineering and Computer Sciences Denial of Service Attacks
2018
Behal, S.
Sachdeva, M.
Saluja, K. K.
D-FAC: A novel 0-Divergence based distributed DDoS defense systemJournal of King Saud University Denial of Service Attacks
2017
Dao, N.N.
Phan, T.V.
Saad, U.
Kim, J.
Bauschert, T.
Cho, S.
Securing heterogeneous IoT with intelligent DDoS attack behavior learningarxiv.org Denial of Service Attacks
2017
Baishya, R.
Hoque, N.
Bhattacharya, D.
DDoS attack detection using unique source IP deviationIntl J. of Network Security Denial of Service Attacks
2017
Thangamalar, C.
Ravikumar, K.
Rating association for short degree DDoS attack recognitionIntl J. of Engineering and Technology Denial of Service Attacks
2017
Singh, K.
De, T.
MLP-GA based algorithm to detect application layer DDoS attackJ. of Information Security and Applications Denial of Service Attacks
2017
Singh, K.J.
De, T.
Mathematical modelling of DDoS attack and detection using correlationJ. Cyber Security Technology Denial of Service Attacks
2017
Hoque, N.
Kashyap, H.
Bhattacharyya, D.
Real-time DDoS attack detection using FPGAComputer Comm. Denial of Service Attacks
2017
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
A systematic hands-on approach to generate real-life intrusion datasetsNetwork Traffic Anomaly Detection and Prevention Denial of Service Attacks
2017
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
Practical tools for attackers and defendersNetwork Traffic Anomaly Detection and Prevention Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Sachdeva, M.
Discriminating flash events from DDoS Attacks: A comprehensive reviewIntl J. of Network Security Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Wang, Y.
A distinction method of flooding DDoS and flash crowds based on user traffic behaviorIEEE Trustcom/BigDataSE/ICESS Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Sachdeva, M.
Characterizing DDoS attacks and flash events: Review, research gaps and future directionsComputer Science Review Denial of Service Attacks
2017
Jing, G.Research on application of DDos attack detection technology based on software defined networkActa Technica CSAV Denial of Service Attacks
2017
Axon, L.
Nurse, J.R.C.
Goldsmith, M.
Creese, S.
A formalised approach to designing sonification systems for network-security monitoringIntl J. On Advances in Security Denial of Service Attacks
2017
Afolorunso, A.A.Variational Bayesian Hidden Markov model for the prediction of Distributed Denial of Service attacksUniv. of Lagos Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Lv, B.
A behavior-based method for distinction of flooding DDoS and flash crowdsConf. on Knowledge Science, Engineering and Management Denial of Service Attacks
2017
Salman, T.
Bhamare, D.
Erbad, A.
Jain, R.
Samaka, M.
Machine learning for anomaly detection and categorization in multi-cloud environmentsConf. on Cyber Security and Cloud Computing Denial of Service Attacks
2017
Moustafa, N.M.A.Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network trafficUniv. of New South Wales Denial of Service Attacks
2017
Mosharraf, N.
Jayasumana, A.
Ray, I.
A distributed mechanism to protect against DDoS attacksIFIP Conf. on Data and Applications Security and Privacy Denial of Service Attacks
2017
Nogueira, M.
Santos, A.
Moura, J.
Early signals from volumetric DDoS attacks: An empirical studyarxiv.org Denial of Service Attacks
2017
Hubballi, N.
Tripathi, N.
An event based technique for detecting spoofed IP packetsJ. of Information Security and Applications Denial of Service Attacks
2017
Xylogiannopoulos, K.Data structures, algorithms and applications for Big Data analytics: Single, multiple and all repeated patterns detection in discrete sequencesUniv. of Calgary Denial of Service Attacks
2017
Saravanan, R.
Loganathan, S.
Shunmuganathan, S.
Palanichamy, Y.
Suspicious score based mechanism to protect web servers against application layer Distributed Denial of Service attacksIntl J. of Intelligent Engineering and Systems Denial of Service Attacks
2017
Rahmat, S.
Niyaz, Q.
Javaid, A.
Sun, W.
Normal and anomalous traffic flow pattern analysis for organizational networksCanadian Conf. on Electrical and Computer Engineering (CCECE) Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Computer networks detection of DDoS attacks and flash events using novel information theory metricsComputer Networks Denial of Service Attacks
2017
Righi, M.ADDoS detection through recurrence quantification analysis based on dynamic feature extraction and adaptive clusteringFed. Univ. of Santa Maria Denial of Service Attacks
2017
Liu, J.
Lai, Y.
Zhang, S.
FL-GUARD: A detection and defense system for DDoS attack in SDNConf. on Cryptography, Security and Privacy Denial of Service Attacks
2017
Cheng, L.
Divakaran, D.
Ang, A.
Lim, W.
Thing, V.
FACT: A framework for authentication in cloud-based IP tracebackIEEE Trans. on Information Forensics and Security Denial of Service Attacks
2017
Al-mamory, S.
Algelal, S.
A modified DBSCAN clustering algorithm for proactive detection of DDoS attacksConf. on New Trends in Information and Communications Technology Applications (NTICT) Denial of Service Attacks
2017
Raza, A.Anomaly detection systems for Distributed Denial of Service attacksUniv. of Victoria Denial of Service Attacks
2017
AlEroud, A.
Alsmadi, I.
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approachJ. of Network and Computer Applications Denial of Service Attacks
2017
Villalba, L.J.G.
Orozco, A.L.S.
Vidal, J.M.
Advanced payload analyzer preprocessorFuture Generation Computer Sysems Denial of Service Attacks
2017
Sun, D.
Yang, K.
Lv, B.
Shi, Z.
Could we beat a new mimicking attack?Asia-Pacific Network Operations and Management Symp. (APNOMS) Denial of Service Attacks
2017
Sun, D.
Yang, K.
Lv, B.
Shi, Z.
A new mimicking attack by LSGANIntl Conf. on Tools with Artificial Intelligence Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Wang, Y.
Detecting flooding DDoS under flash crowds based on Mondrian forestWireless Algorithms, Systems, and Applications Denial of Service Attacks
2017
Sreeram, I.
Vuppala, V. P. K.
HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithmApplied Computing and Informatics Denial of Service Attacks
2017
Riadi, I.
Muhammad, A.W.
Sunardi, S.
Network packet classification using neural network based on training function and hidden layer neuron number variationIntl J. of Advanced Computer Science and Applications Denial of Service Attacks
2017
Muhammad, A.
Riadi, I.
Sunardi, S.
Deteksi serangan DDoS menggunakan neural network dengan fungsi fixed moving average windowJ. Informatika Sunan Kalijaga Denial of Service Attacks
2017
Mosharraf, N.
Jayasumana, A.P.
Ray, I.
Bezawada, B.
History-based throttling of Distributed Denial-of-Service attacksIntl Conf. on E-Business and Telecommunications Denial of Service Attacks
2017
Mohamed, F.
AlBelooshi, B.
Salah, K.
Yeun, C.Y.
Damiani, E.
A scattering technique for protecting cryptographic keys in the cloudIntl Workshops on Foundations and Applications of Self* Systems (FAS*W) Denial of Service Attacks
2017
Kotenko, I.
Chechulin, A.
Branitskiy, A.
Generation of source data for experiments with network attack detection softwareJ. of Physics: Conf. Series Denial of Service Attacks
2017
Kaur, G.
Behal, S.
Shifali, K.
An information divergence based approach to detect flooding DDoS attacks and Flash CrowdsIntl Conf. on Applied and Theoretical Computing and Communication Technology (iCATccT) Denial of Service Attacks
2017
Ghanbari, M.
Kinsner, W.
Ferens, K.
Detecting a distributed denial of service attack using a pre-processed convolutional neural networkElectrical Power and Energy Conf. (EPEC) Denial of Service Attacks
2017
Chin, T.
Xiong, K.
Rahouti, M.
SDN-based kernel modular countermeasure for intrusion detectionIntl Conf. on Security and Privacy in Communication Systems Denial of Service Attacks
2017
Chen, W.Distributed data streaming algorithms for network anomaly detectionIowa State Univ. Denial of Service Attacks
UCSD Network Telescope
2017
Bista, S.
Chitrakar, R.
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naive Bayes ClassificationJ. of Information Security Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Detection of DDoS attacks and flash events using information theory metrics-An empirical investigationComputer Communications Denial of Service Attacks
2016
Siahmarzkooh, A.
Karimpour, J.
Lotfi, S.
A cluster-based approach towards detecting and modeling network dictionary attacksEngineering, Technology and Applied Science Research Denial of Service Attacks
2016
Saravanan, R.
Shanmuganathan, S.
Palanichamy, Y.
Behavior-based detection of application layer distributed denial of service attacks during flash eventsTurkish J. of Electrical Engineering and Computer Sciences Denial of Service Attacks
2016
Bhatia, S.Ensemble-based model for DDoS attack detection and flash event separationFuture Technologies Conf. Denial of Service Attacks
2016
Deka, R.
Bhattacharya, D.
Self-similarity based DDoS attack detection using Hurst parameterSecurity and Communication Networks Denial of Service Attacks
2016
Zhang, H.
Su, W.
Quan, W.
Security technologies of SINETSmart Collaborative Identifier Network Denial of Service Attacks
2016
Kong, X.
Chen, Y.
Tian, H.
Wang, T.
Cai, Y.
Chen, X.
A novel botnet detection method based on preprocessing data packet by graph structure clusteringConf. on Cyber-Enabled Distributed Computing and Knowledge Discovery Denial of Service Attacks
2016
Osanaiye, O.
Choo, K.
Dlodlo, M.
Change-point cloud DDoS detection using packet inter-arrival timeComputer Science and Electronic Engineering Denial of Service Attacks
2016
Hoque, N.
Bhattacharyya, D.K.
Kalita, J.K.
FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysisSecurity and Communication Networks Denial of Service Attacks
2016
Bhandari, A.
Sangal, A.L.
Kumar, K.
Characterizing flash events and distributed denial-of-service attacks: an empirical investigationSecurity and Communication Networks Denial of Service Attacks
2016
Yusof, A.R.
Udzir, N.I.
Selamat, A.
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attackLecture Notes in Computer Science (LNCS) Denial of Service Attacks
2016
Singh, K.
Thongam, K.
De, T.
Entropy-based application layer DDoS attack detection using artificial neural networksEntropy Denial of Service Attacks
2016
Ghahfarokhi, N.M.Cooperative defense mechanism for detection, identification, and filtering of DDos attacksColorado State Univ. Denial of Service Attacks
2016
Osanaiye, O.A.DDoS defence for service availability in cloud computingUniv. of Cape Town Denial of Service Attacks
2016
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metricSecurity and Communication Networks Denial of Service Attacks
2016
Shan, J.
Luo, J.
Ni, G.
Wu, Z.
Duan, W.
CVS: Fast cardinality estimation for large-scale data streams over sliding windowsNeurocomputing Denial of Service Attacks
2016
Muharish, E.Y.M.Packet filter approach to detect Denial of Service attacksCalifornia State Univ. San Bernardino Denial of Service Attacks
2016
Chen, Y.
Chen, X.
Tian, H.
Wang, T.
Cai, Y.
A blind detection method for tracing the real source of DDoS attack packets by cluster matchingIEEE Conf. on Communication Software and Networks Denial of Service Attacks
2016
Behal, S.
Kumar, K.
Trends in validation of DDoS researchProcedia Computer Science Denial of Service Attacks
2016
Karimi, A.
Niyaz, Q.
Sun, W.
Javaid, A.
Devabhaktuni, V.
Distributed network traffic feature extraction for a real-time IDSIEEE Conf. on Electro Information Technology Denial of Service Attacks
2016
Ain, A.
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
Rank correlation for low-rate DDoS attack detection: An empirical evaluationIntl J. of Network Security Denial of Service Attacks
2016
Giotis, K.
Apostolaki, M.
Maglaris, V.
A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domainsIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
Topology with BGP
2016
Dalmazo, B.L.
Vilela, J.P.
Simoes, P.
Curado, M.
Expedite feature extraction for enhanced cloud anomaly detectionIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
2016
Aleroud, A.
Alsmadi, I.
Identifying DoS attacks on software defined networks: A relation context approachIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
2016
Hoque, N.
Bhattacharyya, D.
Kalita, J.
Denial of Service attack detection using multivariate correlation analysisConf. on Information and Communication Technology for Competitive Strategies Denial of Service Attacks
2016
Cheng, L.
Divakaran, D.M.
Lim, W.Y.
Thing, V.L.L.
Opportunistic piggyback marking for IP tracebackIEEE Trans. on Information Forensics and Security Denial of Service Attacks
2016
Zheng, L.
Li, J.
Wang, H.
Zeng, X.
Improving accuracy and automation of anomaly detectors based on self-correlationJ. Internet Technology (JIT) Denial of Service Attacks
UCSD Network Telescope
2016
Hoque, N.
Bhattacharyya, D.K.
Kalita, J.K.
A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysisConf. on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2016
Eberle, W.
Holder, L.
Identifying anomalies in graph streams using change detectionWorkshop on Mining and Learning with Graphs Denial of Service Attacks
Topology with BGP
2015
Robinson, R.R.R.
Thomas, C.
Ranking of machine learning algorithms based on the performance in classifying DDoS attacksIEEE Recent Advances in Intelligent Computational Systems (RAICS) Denial of Service Attacks
UCSD Network Telescope
2015
Rastegari, S.Intelligent network intrusion detection using an evolutionary computation approachEdith Cowan Univ. Denial of Service Attacks
2015
Poongodi, M.
Bose, S.
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANETCluster Computing Denial of Service Attacks
2015
Gulisano, V.
Zori, M.
Fu, Z
Peris, R.
Paptriantafilou, M.
Martinez, M.
STONE: A streaming DDoS defense frameworkJ. Expert System with Applications Denial of Service Attacks
2015
Wang, S.
Li, Y.
Zhao, X.
Wang, B.
Intrusion detection system design of cloud computing based on abnormal traffic identificationIntl J. of Reasoning-based Intelligent Systems Denial of Service Attacks
2015
Rastegari, S.
Lam, C.
Hingston, P.
A statistical rule learning approach to network intrusion detectionIntl Conf. on IT Convergence and Security Denial of Service Attacks
2015
Giotis, K.
Androulidakis, G.
Maglaris, V.
A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middleboxSecurity and Communication Networks Denial of Service Attacks
2015
Balkanli, E.
Zincir-Heywood, A.N.
Heywood, M.I.
Feature selection for robust backscatter DDoS detectionLocal Computer Networks Conf. Workshops (LCNW) Denial of Service Attacks
UCSD Network Telescope
2015
Zhou, L.
Liao, M.
Yuan, C.
Sheng, Z.
Zhang, H.
DDOS attack detection using packet size intervalConf. on Wireless Communications, Networking and Mobile Computing (WiCOM ) Denial of Service Attacks
2015
Poongodi, M.
Bose, S.
A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS attack in MANETArabian J. for Science and Engineering Denial of Service Attacks
2015
Wang, R.
Jia, Z.
Ju, L.
An entropy-based distributed DDoS detection mechanism in Software-Defined NetworkingTrustcom/BigDataSE/ISPA Denial of Service Attacks
2015
Rastegari, S.
Hingston, P.
Lam, C.P.
Evolving statistical rulesets for network intrusion detectionJ. Applied Soft Computing Denial of Service Attacks
2015
Nurohman, H.
Purwanto, Y.
Hafidudin, X.
Traffic anomaly based detection: Anomaly detection by self-similar analysisIntl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC) Denial of Service Attacks
2015
Buragohain, C.
Kalita, M.J.
Singh, S.
Bhattacharyya, D.K.
Anomaly based DDoS attack detectionIntl J. of Computer Applications Denial of Service Attacks
2015
Wang, R.
Zhang, Z.
Ju, L.
Jia, Z.
A novel OpenFlow-based DDoS flooding attack detection and response mechanism in Software-Defined NetworkingIntl J. of Information Security and Privacy (IJISP) Denial of Service Attacks
2015
Bukac, V.Small scale denial of service attacksMasaryk Univ. Denial of Service Attacks
2015
Juturu, L.S.Applying big data analytics on integrated cybersecurity datasetsTexas Tech Univ., Lubbock, TX, US Denial of Service Attacks
2015
Dorbala, S.Y.
Hubballi, N.
An experience report on scalable implementation of DDoS attack detectionLecture Notes in Business Information Processing (LNBIP) Denial of Service Attacks
2015
David, J.
Thomas, C.
DDoS attack detection using fast entropy approach on flow-based network trafficProcedia Computer Science Denial of Service Attacks
2015
Chen, W.
Guan, Y.
Distinct element counting in distributed dynamic data streamsConf. on Computer Communications (INFOCOM) Denial of Service Attacks
2015
Jiang, H.
Chen, S.
Hu, H.
Zhang, M.
Superpoint-based detection against distributed denial of service (DDoS) flooding attacksWorkshop on Local and Metropolitan Area Networks Denial of Service Attacks
2015
Bhuyan, M.H.
Kalwar, A.
Goswami, A.
Bhattacharyya, D.K.
Kalita, J.K.
Low-rate and high-rate Distributed DoS attack detection using partial rank correlationIntl. Conf. on Communication Systems and Network Technologies (CSNT) Denial of Service Attacks
2015
Shamshirband, S.
Daghighi, B.
Anuar, N.B.
Kiah, L.M.
Patel, A.
Abraham, A.
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in networkJ. Intelligent and Fuzzy Systems Denial of Service Attacks
2015
Lai, Y.
Chen, Y.
Liu, Z.
Yang, Z.
Li, X.
On monitoring and predicting mobile network traffic abnormalitySimulation Modelling Practice and Theory Denial of Service Attacks
UCSD Network Telescope
2015
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detectionPattern Recognition Letters Denial of Service Attacks
2014
Wan, M.
Zhang, H.-K.
Wu, T.-Y.
Lo, C.-H.
Anomaly detection and response approach based on mapping requestsSecurity and Communication Networks Denial of Service Attacks
2014
Shrestha, A.Visualizing spatio-temporal dataGeorgia State Univ. Denial of Service Attacks
2014
Shrestha, A.
Zhu, Y.
Manandhar, K.
NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysisAdvances in Visual Computing Denial of Service Attacks
2014
Kato, K.
Klyuev, V.
Large-scale network packet analysis for intelligent DDoS attack detection developmentConf. on Internet Technology and Secured Transactions (ICITST) Denial of Service Attacks
2014
Bhaya, W.
Manaa, M.E.
A proactive DDoS detection approach using data mining cluster analysisJ. of Next Generation Information Technology Denial of Service Attacks
2014
Purwanto, Y.
Kuspriyanto, Hendrawan
Rahardjo, B.
Traffic anomaly detection in DDos flooding attackConf. on Telecommunication Systems Services and Applications (TSSA) Denial of Service Attacks
2014
Wang, J.
Paschalidis, I.C.
Botnet detection using social graph analysisAllerton Conf. on Communication, Control, and Computing Denial of Service Attacks
2014
Srihari, V.
Anitha, R.
DDoS detection system using wavelet features and semi-supervised learningSymp. on Security in Computing and Communications Denial of Service Attacks
2014
Shamsolmoali, P.
Zareapoor, M.
Statistical-based filtering system against DDOS attacks in cloud computingConf. on Advances in Computing, Communications and Informatics (ICACCI) Denial of Service Attacks
2014
Kato, K.
Klyuev, V.
An intelligent DDoS attack detection system using packet analysis and support vector machineIntl J. of Intelligent Computing Research (IJICR) Denial of Service Attacks
2014
Giotis, K.
Androulidakis, G.
Maglaris, V.
Leveraging SDN for efficient anomaly detection and mitigation on legacy networksEuropean Workshop on Software Defined Networks Denial of Service Attacks
2014
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
Information metrics for low-rate DDoS attack detection: A comparative evaluationIntl. Conf. on Contemporary Computing (IC3) Denial of Service Attacks
2014
Bhatia, S.
Schmidt, D.
Mohay, G.
Tickle, A.
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and flash eventsComputers and Security Denial of Service Attacks
2014
Takahashi, R.Distributed denial of service (DDoS) attack detection system using burst detectionFuture Univ. Hakodate Denial of Service Attacks
2013
Luo, H.
Lin, Y.
Zhang, H.
Zukerman, M.
Preventing DDoS attacks by identifier/locator separationIEEE Network Denial of Service Attacks
2013
Bhuyan, M.H.Applying data mining techniques in anomaly based network intrusion detectionTezpur Univ. Denial of Service Attacks
2013
Bhatia, S.Detecting Distributed Denial-of-Service attacks and flash eventsQueensland Univ. of Technology, Brisbane, Australia Denial of Service Attacks
2013
Dassouki, K.
Debar, H.
Safa, H.
Hijazi, A.
A TCP delay-based mechanism for detecting congestion in the InternetConf. on Communications and Information Technology (ICCIT) Denial of Service Attacks
2013
Chen, W.
Liu, Y.
Guan, Y.
Cardinality change-based early detection of large-scale cyber-attacksIEEE INFOCOM Denial of Service Attacks
UCSD Network Telescope
2013
Callau-Zori, M.
Jimenez-Peris, R.
Gulisano, V.
Papatriantafilou, M.
Fu, Z.
Patino-Martinez, M.
STONE: A stream-based DDoS defense frameworkACM Symp. on Applied Computing (SAC) Denial of Service Attacks
2013
Kumar, P.A.R.
Selvakumar, S.
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systemsComputer Communications Denial of Service Attacks
UCSD Network Telescope
2012
Bhatia, S.
Schmidt, D.
Mohay, G.
Ensemble-based DDoS detection and mitigation modelConf. on Security of Information and Networks (SIN) Denial of Service Attacks
2012
Fu, Z.Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigationChalmers Univ. of Technology, Gothenborg, Sweden Denial of Service Attacks
2012
Singh, J.
Kumar, K.
Sachdeva, M.
Sidhu, N.
DDoS attacks simulation using legitimate and attack real data setsJ. Scientific and Engineering Research Denial of Service Attacks
2012
Feitosa, E.
Souto, E.
Sadok, D.H.
An orchestration approach for unwanted Internet traffic identificationComputer Networks Denial of Service Attacks
2012
Anitha, R.
Karthik, R.
Pravin, V.
Thirugnanam, K.
A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference systemConf. on Computer Science, Engineering and Applications (ICCSEA) Denial of Service Attacks
2012
Rahmani, H.
Sahli, N.
Kamoun, F.
DDoS flooding attack detection scheme based on F-divergenceComputer Communications Denial of Service Attacks
2012
Zheng, L.
Zou, P.
Jia, Y
Han, W.
An online learning and unsupervised traffic anomaly detection systemAdvanced Science Lett. Denial of Service Attacks
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection and containment using Filter-Ary-SketchProcedia Engineering Denial of Service Attacks
UCSD Network Telescope
2012
Karthick, R.R.
Hattiwale, V.P.
Ravindran, B.
Adaptive network intrusion detection system using a hybrid approachConf. on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2011
Takahashi, E.K.
Chen, Y.
Lall, A.
Divergence in network trafficMidstates Conf. on Undergraduate Research in Computer Science and Mathematics Denial of Service Attacks
2011
Le, D.Q.
Jeong, T.
Roman, H.E.
Hong, J.W.
Traffic dispersion graph based anomaly detectionSymp. on Information and Communication Technology (SolCT) Denial of Service Attacks
2011
Bhatia, S.
Mohay, G.
Tickle, A.
Ahmed, E.
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash eventConf. on Availability, Reliability and Security (ARES) Denial of Service Attacks
2011
Khan, F.M.Assuring network service with bandwidth and integrity based fairnessUniv. Illinois, Urbana-Champaign Denial of Service Attacks
2021
Apostolaki, Maria
Maire, Cedric
Vanbever, Laurent
PERIMETER: A network-layer attack on the anonymity of cryptocurrenciesETH Zurich Other Datasets
Topology with BGP
2019
Rehman, A.M.
Goldberg, S.
Choffnes, D.
Passport: Enabling accurate country-level router geolocation using inaccurate sourcesarxiv.org Other Datasets
Topology with BGP
2019
Gong, D.
Tran, M.
Shinde, S.
Jin, H.
Sekar, V.
Saxena, P.
Kang, M.S.
Practical verifiable in-network filtering for DDoS defensearxiv.org Other Datasets
Topology with BGP
2018
Dahlberg, R.
Pulls, T.
Vestin, J.
Hoiland-Jorgensen, T.
Kassler, A.
Aggregation-based certificate transparency gossiparxiv.org Other Datasets
Topology with BGP
2017
Liu, Z.
Liu, Y.
Winter, P.
Mittal, P.
Hu, Y.
TorPolice: Towards enforcing service-defined access policies in anonymous systemsarxiv.org Other Datasets
2017
Liu, Z.Minimal deployable endpoint-driven network forwarding: principle, designs and applicationsUniv. of Illinois at Urbana-Champaign Other Datasets
Topology with BGP
2017
Jeyasekar, A.
Kasmir Raja, S.
Annie Uthra, R.
Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networksJ. of Network and Computer Applications Other Datasets
2016
Krenc, T.
Feldmann, A.
BGP prefix delegations: A deep diveInternet Measurement Conf. (IMC) Paper Data and Tools
Topology with Archipelago
Topology with BGP
2016
Singh, J.Using looking glasses to understand the Internets structureSeminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM) Paper Data and Tools
2015
Nithyanand, R.
Starov, O.
Zair, A.
Gill, P.
Schapira, M.
Measuring and mitigating AS-level adversaries against Torarxiv.org Paper Data and Tools
2015
Kamiyama, N.Analyzing impact of introducing CCN on profit of ISPsIEEE Trans. on Network and Service Management Paper Data and Tools
Topology with BGP
2014
Kamiyama, N.CCN economics: Can ISPs profit by introducing CCN?Conf. on Network and Service Management (CNSM) and Workshop Paper Data and Tools
Topology with BGP
2020
Todd, Arnold
He, Jia
Jiang, Weifan
Calder, Matt
Cunha, Italo
Giotsas, Vasileios
Katz-Bassett, Ethan
Cloud Provider Connectivity in the Flat InternetInternet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2020
Prehn, Lars
Lichtblau, Franziska
Feldmann, Anja
When wells run dry: the 2020 IPv4 address marketCoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Topology with Archipelago
2020
Lin, Zinan
Jain, Alankar
Wang, Chen
Fanti, Giulia
Sekar, Vyas
Using GANs for Sharing Networked Time Series Data:Challenges, Initial Promise, and Open QuestionsIMC 20: Proceedings of the ACM Internet Measurement Conference Topology with Archipelago
2020
Huang, Yuchen
Rabinovich, Michael
Al-Dalky, Rami
FlashRoute: Efficient Traceroute on a Massive ScaleIMC 20: Proceedings of the ACM Internet Measurement Conference Topology with Archipelago
2020
Giotsas, Vasileios
Nomikos, George
Kotronis, Vasileios
Serpezis, Pavlos
Gigis, Petros
Manassakis, Lefteris
Dietzel, Christoph
Konstantaras, Stravros
Dimitropoulos, Xenofontas
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPsIEEE/ACM Transactions on Networking Topology with Archipelago
Topology with BGP
2020
Giotsas, Vasileios
Koch, Thomas
Fazzion, Elverton
Cunha, Italo
Calder, Matt
Madhyastha, Harsha
Katz-Bassett, Ethan
Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale TraceroutesIMC 20: Proceedings of the ACM Internet Measurement Conference Topology with Archipelago
2020
Osat, Saeed
Radicchi, Filippo
Papadopoulos, Fragkiskos
k-core structure of real multiplex networksPhys. Rev. Research 2 Topology with Archipelago
2020
Chen, Di
Ba, Yang
Qiu, Han
Zhu, Junhu
Wang, Qingxian
ISRchain: Achieving efficient interdomain secure routing with blockchainComputers and Electrical Engineering Topology with Archipelago
Topology with BGP
2020
Sing Tomar, Shailendra
Rawat, Anil
Vyavahare, Prakash D
Tokebar, Sanjiv
Conceptual model for comparison of IPv6 ISPs based on IPv4 traffic profilesInternational Journal of Information Technology Topology with Archipelago
2020
Ke, Xiangyu
Khan, Arijit
Al Hasan, Mohommad
Rezvansangsari, Rojin
Reliability Maximization in Uncertain GraphsIEEE Transactions on Knowledge and Data Engineering Topology with Archipelago
2020
Gharaeibeh, Manaf
Papadopoulos, Christos
Heidemann, John
Partridge, Craig
Delay-based Identification of Internet Block MovementColorado State University, Computer Science Topology with Archipelago
2020
Rye, E.
Beverly, R.
Discovering the IPv6 Network PeripheryInternational Conference on Passive and Active Network Measurement Topology with Archipelago
Topology with BGP
2020
Karapoola, Sareena
Vairam, Prasanna Karthik
Raman, Shankar
Kamakoti, V.
Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacksComputer Communications Topology with Archipelago
Topology with BGP
2020
C. Rye, Erik
Beverly, Robert
Discovering the IPv6 Network PeripheryarXiv Topology with Archipelago
Topology with BGP
2019
Luttringer, J.R.
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
Let there be light: Revealing hidden MPLS tunnels with TNTTrans. on Network and Service Management (TNSM) Topology with Archipelago
2019
Sun, Y.
Li, M.
Su, S.
Tian, Z.
Shi, W.
Han, M.
Secure data sharing framework via hierarchical greedy embedding in darknetsMobile Networks and Applications Topology with Archipelago
2019
Bottger, T.
Antichi, G.
Fernandes, E.L.
di Lallo, R.
Bruyere, M.
Uhlig, S.
Tyson, G.
Ignacio, C.
Shaping the Internet: 10 years of IXP growtharxiv.org Topology with Archipelago
Topology with BGP
2019
Vanaubel, Y.
Luttringer, J.R.
Merindol, P.
Pansiot, J.J.
Donnet, B.
TNT, watch me explode: A light in the dark for revealing MPLS tunnelsIEEE Topology with Archipelago
2019
Sfirakis, I.
Kotronis, V.
Validating IP prefixes and AS-paths with Blockchainsarxiv.org Topology with Archipelago
Topology with BGP
2019
Berg, A.
Forsberg, D.
Identifying DNS-tunneled traffic with predictive modelsarxiv.org Topology with Archipelago
2019
Holland, J.
Smith, J.
Schuchard, M.
Measuring irregular geographic exposure on the Internetarxiv.org Topology with Archipelago
2019
Rye, E.C.
Martin, J.
Beverly, R.
EUI-64 considered harmfularxiv.org Topology with Archipelago
2019
Funel, A.The graph structure of the Internet at the Autonomous Systems level during ten yearsarxiv.org Topology with Archipelago
2019
Wu, X.
Gong, X.
Wu, Q.
Que, X.
Tian, Y.
Hierarchical Forwarding Bit Index Explicit Replication (HF-BIER) in MulticastIEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC) Topology with Archipelago
2019
Tolpin, D.Population anomaly detection through deep gaussianizationACM/SIGAPP Symp. on Applied Computing Topology with Archipelago
2019
Papp, I.
Varga, L.
Afifi, M.
Gere, I.
Neda, Z.
Scaling in the space-time of the InternetScientific Reports Topology with Archipelago
2019
Papadopoulos, F.
Kleineberg, K. K.
Link persistence and conditional distances in multiplex networksPhysics Review E Topology with Archipelago
2019
Milolidakis, A.
Fontugne, R.
Dimitropoulos, X.
Detecting Network Disruptions At Colocation FacilitiesIEEE INFOCOM - IEEE Conference on Computer Communications Topology with Archipelago
2019
Li, M.
Zong, B.
Lumezanu, C.
Chen, H.
Learning IP network representationsACM SIGCOMM Computer Communication Review Topology with Archipelago
2019
Iodice, M.
Candela, M.
Di Battista, G.
Periodic Path Changes in RIPE AtlasIEEE Access Topology with Archipelago
2019
Frigioni, D.
DEmidio, M.
DAngelo, G.
Fully Dynamic 2-Hop Cover LabelingJournal of Experimental Algorithmics (JEA) Topology with Archipelago
2019
Elejla, O. E.
Anbar, M.
Belaton, B.
Alabsi, B.
Al-Ani, A. K.
Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks DetectionComputational Science and Technology Topology with Archipelago
2019
DEmidio, M.
Frigioni, D.
Distributed Shortest Paths on Power Law Networks in the Generalized Linear Preference Model: An Experimental StudyInternational Conference on Computational Science and Its Applications Topology with Archipelago
2019
Chepoi, V.
Dragan, F. F.
Habib, M.
Vaxes, Y.
Alrasheed, H.
Fast approximation of eccentricities and distances in hyperbolic graphsJournal of Graph Algorithms and Applications Topology with Archipelago
Topology with BGP
2019
Baishya, R. C.
Bhattacharyya, D. K.
A Complete Detection and Mitigation Framework to Protect a Network from DDoS AttacksIETE Journal of Research Topology with Archipelago
2018
Basheir, L.Power-law degree distribution consistency in the AS-level Internet topologyIntl Conf. on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE) Topology with Archipelago
Topology with Skitter
2018
Sigloch, S.Mobile Internet connectivity, exploring structural bottlenecks in Tamil Nadu using active Internet periphery measurementsAnglia Ruskin University Topology with Archipelago
Topology with BGP
Topology with Skitter
2018
Barik, R.
Welzl, M.
Elmokashfi, A. M.
Dreibholz, T.
Gjessing, S.
Can WebRTC QoS Work? A DSCP measurement studyIntl Teletraffic Congress Topology with Archipelago
2018
Yan, S.
Khan, A.
Composite hashing for data stream sketchesarxiv.org Topology with Archipelago
2018
Pearce, P. J.Methods and systems for understanding large-scale Internet threatsUniv. of California, Berkeley Topology with Archipelago
2018
Apostolaki, M.
Marti, G.
Muller, J.
Vanbever, L.
SABRE: Protecting bitcoin against routing attacksarxiv.org Topology with Archipelago
2018
Wang, F.
Gao, L.
Xiaozhe, S.
Hirai, H.
Fujikawa, K.
Efficient handling of excessive locators in hierarchical addressingIEEE Conf. on Computer Communications Topology with Archipelago
2018
Fabian, B.
Ermakova, T.
Ghazaryan, Z.
Internet connectivity of financial services - A graph-based analysisSSRN Electronic J. Topology with Archipelago
2018
Singh, A.
Garg, S.
Batra, S.
Kumar, N.
Rodrigues, J. J.
Bloom filter based optimization scheme for massive data handling in IoT environmentFuture Generation Computer Systems Topology with Archipelago
2018
Holland, J.A.Quantifying irregular geographic exposure on the InternetUniv. of Tennessee Topology with Archipelago
2018
Mell, P.
Gueye, A.
Schanzle, C.
Quantifying information exposure in Internet routingConf. on Trust, Security And Privacy In Computing And Communications/Big Data Science And Engineering (TrustCom/BigDataSE) Topology with Archipelago
Topology with BGP
2018
Griffin, D.
Phan, T.
Maini, E.
Rio, M.
Simoens, P.
On the feasibility of using current data centre infrastructure for latency-sensitive applicationsIEEE Trans. on Cloud Computing Topology with Archipelago
2018
Wang, J.H.
An, C.
A study on geographic properties of Internet routingComputer Networks Topology with Archipelago
2018
Gueye, A.
Mbaye, B.
On the prevalence of boomerang routing in Africa: Analysis and potential solutionsInnovations and Interdisciplinary Solutions for Underserved Areas (InterSol) Topology with Archipelago
2018
Glasser, D.Longitudinal study of large-scale traceroute resultsNaval Postgraduate School Topology with Archipelago
Topology with BGP
2018
Nur, A.Y.
Tozal, M.E.
Cross-AS (X-AS) Internet topology mappingComputer Networks Topology with Archipelago
Topology with BGP
2018
Xue, L.
Ma, X.
Luo, X.
Chang, E.W.W.
Miu, T.T.N.
Gu, G.
LinkScope: Toward detecting target link flooding attacksIEEE Trans. on Information Forensics and Security Topology with Archipelago
2018
Qiu, H.
Zhu, H.
Li, Y.
Zeng, Z.
FD-SP: A Method for Predicting Cascading Failures of Inter-domain Routing SystemIntl Conf. on Computer and Communications (ICCC) Topology with Archipelago
2018
Nur, A. Y.
Tozal, M. E.
Geography and Routing in the InternetACM Transactions on Spatial Algorithms and Systems (TSAS) Topology with Archipelago
Topology with BGP
2018
Malliga, S.
Kanimozhiselvi, C. S.
Kogilavani, S. V.
A Logarithmic and Exponentiation Based IP Traceback Scheme with Zero Logging and Storage OverheadInternational Journal on Future Revolution in Computer Science and Communication Engineering Topology with Archipelago
Topology with Skitter
2018
Li, Y.
Xie, H.
Lui, J. C. S.
Quantifying Deployability and Evolvability of Future Internet Architectures via Economic ModelsIEEE Intl Conf. on Network Protocols (ICNP) Topology with Archipelago
2018
Li, M.
Lumensanu, C.
Zong, B.
Chen, H.
Deep Learning IP Network RepresentationsWorkshop on Big Data Analytics and Machine Learning for Data Communication Networks Topology with Archipelago
2018
Lee, Y.Improving accuracy and efficiency of network measurement by identifying homogenous IPv4 addressesUniv. of Maryland Topology with Archipelago
2018
Kiedanski, D.
Grampin, E.
Alvarez-Hamelin, J. I.
The Atlas Vision of IPv6 in Latin America: Topology and LatencyLatin America Networking Conf. Topology with Archipelago
2018
Hu, H.
Liu, W.
Fei, G.
Yang, S.
Hu, G.
A Novel Method for Router-to-AS Mapping Based on Graph Community DiscoveryInformation and Communications Technology Topology with Archipelago
2018
Heidemann, J.
Pradkin, Y.
Nisar, A.
Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended)University of Southern California / Information Sciences Institute Topology with Archipelago
2018
Fukuda, K.
Heidemann, J.
Who Knocks at the IPv6 Door?: Detecting IPv6 ScanningInternet Measurement Conf. (IMC) Topology with Archipelago
2018
Fan, Z.
Han, Z.
Tang, W. K. S.
Lin, D.
Relay-based information broadcast in complex networksPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2018
Fan, Z.
Tang, W.
Interplay of ICP and IXP over the Internet with power-law featuresIntl J. of Modern Physics C Topology with Archipelago
2018
Fabian, B.
Kelkel, S.
Ermakova, T.
Baumann, A.
Attacking Internet Border Routers - A Graph-Based Analysis of Strategiesssrn.com Topology with Archipelago
2018
Elejla, O. E.
Anbar, M.
Belaton, B.
Hamouda, S.
Labeled flow-based dataset of ICMPv6-based DDoS attacksarxiv.org Topology with Archipelago
2018
DAngelo, G.
DEmidio, M.
Frigioni, D.
Distance-Vector Algorithms for Distributed Shortest Paths Computation in Dynamic NetworksShortest Path Solvers. From Software to Wetware Topology with Archipelago
2018
Cicalese, D.
Rossi, D.
A longitudinal study of IP AnycastACM SIGCOMM Computer Communication Review Topology with Archipelago
2018
Beverly, R.
Duraiajan, R.
Plonka, D.
Roherer, J. P.
In the IP of the Beholder: Strategies for Active IPv6 Topology DiscoveryInternet Measurement Conf. (IMC) Topology with Archipelago
2018
Barford, P.Diverse Data Sets for ImpactUniv. of Wisconsin System Madison United States Topology with Archipelago
2018
Al-Musawi, B.Detecting BGP anomalies using recurrence quantification analysisSwinburne Univ. of Technology Topology with Archipelago
2018
Aceto, G.
Botta, A.
Marchetta, P.
Persico, V.
Pescape, A.
A comprehensive survey on internet outagesJ. of Network and Computer Applications Topology with Archipelago
Topology with BGP
2017
Kleineberg, K.-K.Metric clusters in evolutionary games on scale-free networksNature Communications Topology with Archipelago
2017
Vanaubel, Y.
Merindol, P.
Pansiot, J.
Donnet, B.
Through the wormhole: Tracking invisible MPLS tunnelsInternet Measurement Conf. (IMC) Topology with Archipelago
2017
Murdock, A.
Li, F.
Bramsen, P.
Durumeric, Z.
Paxson, V.
Target generation for Internet-wide IPv6 scanningInternet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2017
Mukherjee, S.
Sriram, S.
Vu, T.
Raychaudhuri, D.
EIR: Edge-aware inter-domain routing protocol for the future mobile internetComputer Networks Topology with Archipelago
2017
Lichtblau, F.
Streibeld, F.
Kruger, T.
Richter, P.
Feldmann, A.
Detection, classification, and analysis of inter-domain traffic with spoofed source IP addressesInternet Measurement Conf. (IMC) Topology with Archipelago
2017
Chavula, J.Improving Pan-African research and education networks through traffic engineering: A LISP/SDN approachUniv. of Cape Town Topology with Archipelago
2017
Wang, F.
Shao, X.
Gao, L.
Hirai, H.
Fujikawa, K.
Labelling and encoding hierarchical addressing for scalable Internet routingAdv. in Computer and Computational Sciences Topology with Archipelago
2017
Mayer, R.
Graser, L.
Gupta, H.
Saurez, E.
Ramachandran, U.
EmuFog: Extensible and scalable emulation of large-scale fog computing infrastructuresarxiv.org Topology with Archipelago
2017
Edeline, K.
Donnet, B.
A first look at the prevalence and persistence of middleboxes in the wildIntl Teletraffic Congress Topology with Archipelago
2017
Ando, M.
Okada, M.
Kanaoka, A.
Simulation study of BGP origin validation effect against mis-origination with Internet topologyAsia Joint Conf. on Information Security Topology with Archipelago
Topology with BGP
2017
Bronzino, F.
Mukherjee, S.
Raychaudhuri, D.
The named-object abstraction for realizing advanced mobility services in the future InternetProc. of the Workshop on Mobility in the Evolving Internet Architecture Topology with Archipelago
2017
Muscoloni, A.
Cannistraci, C.V.
Local-ring network automata and the impact of hyperbolic geometry in complex network link-predictionarxiv.org Topology with Archipelago
2017
Mukherjee, S.
Sriram, S.
Raychaudhuri, D.
Edge-aware inter-domain routing for realizing next-generation mobility servicesIEEE Conf. on Communications (ICC) Topology with Archipelago
2017
Hu, G.
Chen, W.
Li, Q.
Jiang, Y.
Xu, K.
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity codeFuture Generation Computer Systems Topology with Archipelago
Topology with BGP
2017
DEmidio, M.
Frigioni, D.
Distance-vector algorithms for distributed shortest paths on dynamic power-law networkspreprints.org Topology with Archipelago
2017
Candela, M.
Bartolomeo, M.
Battista, G.
Squarcella, C.
Radian: Visual exploration of traceroutesIEEE Trans. Visualization and Computer Graphics Topology with Archipelago
2017
Scheitle, Q.
Gasser, O.
Sattler, P.
Carle, G.
HLOC: Hints-based geolocation leveraging multiple measurement frameworksNetwork Traffic Measurement and Analysis Conf. Topology with Archipelago
2017
Cho, S.
Nithyanand, R.
Razaghpanah, A.
Gill, P.
A churn for the better: Localizing censorship using network-level path churn and network tomographyarxiv.org Topology with Archipelago
Topology with BGP
2017
Apostolaki, M.
Zohar, A.
Vanbever, L.
Hijacking bitcoin: Routing attacks on cryptocurrenciesSymp. on Security and Privacy Topology with Archipelago
2017
Ren, L.F.
Wang, Z.
Liu, X.
Li, Q.
Chen, Z.
The design and implementation of a covering MDN-complete-life-cycle malicious domain detection frameworkIntl Conf. on Computer Science and Technology (CST) Topology with Archipelago
2017
Motamedi, R.Measurement-based characterization of large-scale networked systemsUniv. of Oregon Topology with Archipelago
Topology with BGP
2017
Jiang, Q.
Hu, H.
Hu, G.
Two-type information fusion based IP-to-AS mapping table refiningJ. of Computer Science and Technology Topology with Archipelago
Topology with BGP
2017
Fabian, B.
Baumann, A.
Ehlert, M.
Vasilis, V.
Ermakova, T.
CORIA - Analyzing Internet connectivity risks using network graphsIEEE Conf. on Communications (ICC) Topology with Archipelago
Topology with BGP
2017
Ciavarella, S.
Bartolini, N.
Khamfroush, H.
La Porta, T.
Progressive damage assessment and network recovery after massive failuresComputer Communications Topology with Archipelago
2017
Kleineberg, K.
Helbing, D.
Collective navigation of complex networks: Participatory greedy routingScientific Reports Topology with Archipelago
2017
Gaston, E.W.High-frequency mapping of the IPv6 Internet using YarrpNaval Postgraduate School Topology with Archipelago
2017
Schuchard, M.
Geddes, J.
Schliep, M.
Hopper, N.
The cost of the path not takenIEEE Global Communications Conf. (GLOBECOM) Topology with Archipelago
2017
Almeida, R.
Fonseca, O.
Fazzion, E.
Guedes, D.
Meira, W.
Cunha, I.
A characterization of load balancing on the IPv6 InternetConf. on Passive and Active Network Measurement Topology with Archipelago
Topology with BGP
2017
Zhang, X.
Xu, G.
Xia, Y.
Optimal defense resource allocation in scale-free networksPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2017
Zhang, C.
Hu, G.
Chen, G.
Sangaiah, A. K.
Zhang, P.
Yan, X.
Jiang, W.
Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing AttackIEEE Access Topology with Archipelago
2017
Tootaghaj, D. Z.
He, T.
La Porta, T.
Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network MonitoringACM SIGMETRICS Performance Evaluation Review Topology with Archipelago
2017
Sun, Y.
Zhang, Y.
Fang, B.
Zhang, H.
Succinct and practical greedy embedding for geometric routingComputer Communications Topology with Archipelago
2017
Pearce, P.
Ensalfi, R.
Li, F.
Feamster, N.
Paxson, V.
Augur: Internet-wide detection of connectivity disruptionsIEEE Symp. on Security and Privacy Topology with Archipelago
2017
Lee, Y.
Spring, N.
Identifying and Analyzing Broadband Internet Reverse DNS NamesIntl Conf. on emerging Networking EXperiments and Technologies Topology with Archipelago
Topology with BGP
2017
Fernandes, S.Performance evaluation for network services, systems and protocols arxiv.org Topology with Archipelago
Topology with BGP
2017
Ciavarella, S.Network analysis and algorithm solutions in critical emergency scenariosSapienza Univ. of Rome Topology with Archipelago
2017
Cho, S.
Nithyanand, R.
Gill, P.
Razaghpanah, A.
A Churn for the BetterCoNEXT Topology with Archipelago
Topology with BGP
2017
Canbaz, M. A.
Thom, J.
Gunes, M. H.
Comparative analysis of internet topology data setsConf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2017
Alves, D.S.F.
Obraczka, K.
An empirical characterization of Internet round-trip timesACM Symp. on QoS and Security for Wireless and Mobile Networks Topology with Archipelago
2016
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Towards variable length addressing for scalable Internet routingIEEE Performance Computing and Communications Conf. (IPCCC) Topology with Archipelago
2016
Jacquemart, Q.Towards uncovering BGP hijacking attacksParisTech Topology with Archipelago
2016
Xu, Q.
Zhang, X.
Zhao, J.
Wang, X.
Wolf, T.
Fast shortest-path queries on large-scale graphsInternational Conference on Network Protocols Topology with Archipelago
Topology with Skitter
2016
Richter, P.
Smaragdakis, G.
Plonka, D.
Berger, A.
Beyond counting: New perspectives on the active IPv4 address spaceInternet Measurement Conf. (IMC) Topology with Archipelago
2016
Marder, A.
Smith, J.M.
MAP-IT: Multipass accurate passive inferences from tracerouteInternet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2016
Liaskos, C.
Dimitropoulos, X.
Tassiulas, L.
Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approachIEEE Trans. on Network and Service Management Topology with Archipelago
Topology with BGP
2016
Beverly, R.Yarrping the Internet: Randomized high-speed active topology discoveryInternet Measurement Conf. (IMC) Topology with Archipelago
2016
Gueye, A.
Mell, P.
Banse, D.
Congo, F.
On the Internet connectivity in AfricaEAI Conf. on e-Infrastructure and e-Services for developing countries Topology with Archipelago
2016
Chandrasekaran, B.Head into the cloud: An analysis of the emerging cloud infrastructureDuke Univ. Topology with Archipelago
Topology with BGP
2016
Wang, Z.
Li, Q.
Jin, F.
Xiong, W.
Wu, Y.
Hyperbolic mapping of complex networks based on community informationPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2016
Li, F.
Durumeric, Z.
Czyz, J.
Karami, M.
Bailey, M.
McCoy, D.
Savage, S.
Paxson, V.
Youve got vulnerability: Exploring effective vulnerability notificationsUSENIX Security Symp. Topology with Archipelago
2016
Tan, H.
Sherr, M.
Zhou, W.
Data-plane defenses against routing attacks on TorPrivacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2016
Rohrer, J.
LaFever, B.
Beverly, R.
Empirical study of router IPv6 interface address distributionsIEEE Internet Computing Topology with Archipelago
2016
Lin, C.
Bi, Y.
Zhao, H.
Cai, W.
Research on bottleneck-delay in internet based on IP united mappingPeer-to-Peer Networking and Applications Topology with Archipelago
2016
Kleineberg, K.-K.
Boguna, M.
Serrano, A.
Papadopoulos, F.
Hidden geometric correlations in real multiplex networksNature Physics Topology with Archipelago
2016
Kim, T.H.
Kim, D.S.
Jung, H.Y.
Defending against DDoS attacks under IP spoofing using image processing approachIEICE Trans. on Communications Topology with Archipelago
2016
Barton, A.
Wright, M.
DeNASA: Destination-naive AS-awareness in anonymous communicationsProc. on Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2016
Wang, Y.
Zhang, K.
Quantifying the flattening of Internet topologyConf. on Future Internet Technologies Topology with Archipelago
Topology with BGP
Topology with Skitter
2016
Shah, A.
Fontunge, R.
Papadopoulos, C.
Towards characterizing international routing detoursarxiv.org Topology with Archipelago
Topology with BGP
2016
De Mol, M.
Feuillen, G.
Toward realistic network topologiesUniv. de Louvain Topology with Archipelago
2016
Czyz, J.J.A brave new world: Studies on the deployment and security of the emerging IPv6 InternetUniv. of Michigan, Ann Arbor, MI, US Topology with Archipelago
2016
Wang, Z.
Wu, Y.
Li, Q.
Jin, F.
Xiong, W.
Link prediction based on hyperbolic mapping with community structure for complex networksPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2016
Nithyanand, R.
Singh, R.
Cho, S.
Gill, P.
Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client designarxiv.org Topology with Archipelago
2016
Li, Q.Reducing short flows latency in the InternetUniv. of Illinois at Urbana-Champaign Topology with Archipelago
Topology with BGP
2016
Baumann, A.
Fabian, B.
Vulnerability against Internet disruptions - A graph-based perspectiveLecture Notes in Computer Science Topology with Archipelago
Topology with BGP
2016
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type inference in Internet AS graphsComputer Comm.s Workshops (INFOCOM WKSHPS) Topology with Archipelago
Topology with BGP
2016
Tan, Z.D.H.Network level attacks and defenses against anonymity networksGeorgetown Univ. Topology with Archipelago
Topology with BGP
2016
Rye, E.C.
Rohrer, J.P.
Beverly, R.
Revisiting AS-level graph reductionComputer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing resilience of inter-domain routing system under regional failuresKSII Trans. on Internet and Information Systems Topology with Archipelago
Topology with BGP
2016
Li, Q.Reducing short flows latency in the internetUniv. Illinois, Urbana-Champaign Topology with Archipelago
Topology with BGP
2016
Canbaz, M.A.Data-driven large scale network-layer Internet simulationIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Veitch, D.
Vijayalayan, K.
Network timing and the 2015 leap secondPassive and Active Measurement (PAM) Topology with Archipelago
2016
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
A brief history of MPLS usage in IPv6Passive and Active Measurement (PAM) Topology with Archipelago
Topology with BGP
2016
Nomikos, G.
Dimitropoulos, X.
traIXroute: Detecting IXPs in traceroute pathsLecture Notes in Computer Science (LNCS) Topology with Archipelago
Topology with BGP
2016
Marcisak, S.Correlating inferred data plane IPv6 reboot events with control plane BGP activityNaval Postgraduate School, Monterey, CA, US Topology with Archipelago
2016
Jiao, B.
Shi, J.-M.
Graph perturbations and corresponding spectral changes in Internet topologiesComputer Communications Topology with Archipelago
2016
Kleineberg, K.
Boguna, M.
Serrano, M.
Papadopoulos, F.
Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigationarxiv.org Topology with Archipelago
Topology with BGP
2016
Gao, Q.
Wang, F.
Gao, L.
Quantifying AS path inflation by routing policiesIntl J. of Future Generation Communication and Networking Topology with Archipelago
2016
Chen, J.
Kumar, V.S.A.
Marathe, M.V.
Sundaram, R.
Thakur, M.
Thulasidasan, S.
A study of the structure and vulnerabilities of metropolitan area networksIntl. Conf. on Communication Systems and Networks (COMSNETS) Topology with Archipelago
Topology with Skitter
2015
Sun, Y.
Zhang, Y.
Zhang, H.
Fang, B.
Du, X.
Geometric Routing on Flat Names for ICNIEEE Global Comm. Conference Topology with Archipelago
2015
Liu, W.
Jiang, Q.
Fei, G.
Yuan, M.
Hu, G.
A novel methodology of router-to-AS mapping inspired by community discoveryarxiv.org Topology with Archipelago
2015
DEmidio, M.
Frigioni, D.
Navarra, A.
Explore and repair graphs with black holes using mobile entitiesTheoretical Computer Science Topology with Archipelago
2015
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
MPLS under the microscope: Revealing actual transit path diversityInternet Measurement Conf. (IMC) Topology with Archipelago
2015
Sriram, S.Edge-aware inter-domain routing protocol for the MobilityFirst Future Internet ArchitectureRutgers, The State Univ. of New Jersey Topology with Archipelago
2015
Medeiros, J.P.S.
Motta Pires, P.S.
Borges Neto, J.B.
Loureiro, A.A.F.
Minimization and placement of sensors in structurally observable networksConf. on Computer and Information Technology (CIT) Topology with Archipelago
2015
Fabian, B.
Baumann, A.
Lackner, J.
Topological analysis of cloud service connectivityComputers and Industrial Engineering Topology with Archipelago
Topology with BGP
2015
Vijayalakshmi, M.
Shalinie, S.M.
Single packet ICMP traceback technique using router interfaceJ. of Information Science and Engineering Topology with Archipelago
2015
Phua, W.Detection of active topology probing deceptionNaval Postgraduate School Topology with Archipelago
2015
Li, X.
Wu, H.
Scoglio, C.
Gruenbacher, D.
Robust allocation of weighted dependency links in cyber-physical networksPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2015
Gray, M.D.Discovery of IPv6 router interface addresses via heuristic methodsNaval Postgraduate School Topology with Archipelago
2015
Papadopoulos, F.
Aldecoa, R.
Krioukov, D.
Network geometry inference using common neighborsPhys. Rev. E Topology with Archipelago
2015
Gao, Q.
Wang, F.
Gao, L.
Routing-policy aware peering for large content providersComputer Comm. Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet Autonomous SystemsEPJ Data Science Topology with Archipelago
2015
Yanbin, S.
Yu, Z.
Shen, S.
Hongli, Z.
Binxing, F.
Geometric name routing for ICN in dynamic worldChina Comm. Topology with Archipelago
2015
Kotronis, V.
Gamperli, A.
Dimitropoulos, X.
Routing centralization across domains via SDN: A model and emulation framework for BGP evolutionComputer Networks Topology with Archipelago
2015
Katsaros, K.
Vasilakos, X.
Okwii, T.
Xylomenos, G.
Pavlou, G.
Polyzos, G.
On the inter-domain scalability of route-by-name information-centric network architecturesIFIP Networking Conf. Topology with Archipelago
2015
DAndrea, A.
DEmidio, M.
Frigioni, D.
Leucci, S.
Proietti, G.
Dynamic maintenance of a shortest-path tree on homogeneous batches of updates: New algorithms and experimentsJ. Experimental Algorithmics Topology with Archipelago
2015
Juen, J.
Johnson, A.
Das, A.
Borisov, N.
Caesar, M.
Defending Tor from network adversaries: A case study of network path predictionPrivacy Enhancing Technologies Topology with Archipelago
2015
Simoens, P.
Herzeele, L.V.
Vandeputte, F.
Vermoesen, L.
Challenges for orchestration and instance selection of composite services in distributed edge cloudsIntl. Symp. on Integrated Network Management (IM) Topology with Archipelago
2015
Siddiqui, M.S.
Montero, D.
Serral-Gracia, R.
Yannuzzi, M.
Self-reliant detection of route leaks in inter-domain routingComputer Networks Topology with Archipelago
2015
Jaggard, A.D.
Johnson, A.
Cortes, S.
Syverson, P.
Feigenbaum, J.
20,000 in league under the sea: Anonymous communication, trust, MLATs, and undersea cablesProc. on Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2015
Edeline, K.
Donnet, B.
Towards a middlebox policy taxonomy: Path impairmentsIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2015
Chavula, J.
Fearnster, N.
Bagula, A.
Suleman, H.
Quantifying the effects of circuitous routes on the latency of intra-Africa Internet traffic: A study of research and education networksLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Topology with Archipelago
2015
West, A.Toward a robust method of presenting a rich, interconnected deceptive network topologyNaval Postgraduate School Topology with Archipelago
2015
Padmanabhan, R.
Li, Z.
Levin, D.
Spring, N.
UAv6: Alias Resolution in IPv6 Using Unused AddressesIntl Conf. on Passive and Active Network Measurement Topology with Archipelago
2015
LaFever, B.Methods for intelligent mapping of the IPv6 address spaceNaval Postgraduate School Topology with Archipelago
2015
Wachs, M.A secure and resilient communication infrastructure for decentralized networking applicationsTechnical Univ. of Munich Topology with Archipelago
2015
Mell, P.
Harang, R.
Gueye, A.
The resilience of the Internet to colluding country induced connectivity disruptionsNetwork and Distributed System Security Symp. (NDSS) Topology with Archipelago
2015
Chandrasekaran, B.
Bai, M.
Schoenfield, M.
Berger, A.
Caruso, N.
Economou, G.
Gilliss, S.
Maggs, B.
Moses, K.
Duff, D.
Ng, K.C.
Sirer, E.G.
Weber, R.
Wong, B.
Alidade: IP geolocation without active probingDuke Univ. Topology with Archipelago
Topology with BGP
2014
Siddiqui, M.S.
Montero, D.
Yannuzzi, M.
Serral-Gracia, R.
Masip-Bruin, X.
Ramirez, W.
Route leak detection using real-time analytics on local BGP informationIEEE Global Communications Conf. Topology with Archipelago
2014
Hric, D.
Darst, R.K.
Fortunato, S.
Community detection in networks: Structural communities versus ground truthPhys. Rev. E Topology with Archipelago
Topology with BGP
2014
Kang, M.S.
Gligor, V.D.
Routing bottlenecks in the Internet: Causes, exploits, and countermeasuresConf. on Computer and Communications Security Topology with Archipelago
Topology with BGP
2014
Fowler, J
Johnson, T
Simonetto, P
Lazos, P
Kobourov, S.
Schneider, M.
Aceda, C.
IMap: Visualizing network activity over Internet mapsVisualization for Cyber Security (VizSec) Topology with Archipelago
UCSD Network Telescope
2014
Durairajan, R.
Sommers, J.
Barford, P.
Layer 1-informed Internet topology measurementInternet Measurement Conf. (IMC) Topology with Archipelago
2014
Kiremire, A.R.
Brust, M.R.
Phoha, V.V.
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemesComputer Networks Topology with Archipelago
2014
Craven, R.
Beverly, R.
Allman, M.
A middlebox-cooperative TCP for a non end-to-end internetACM SIGCOMM Computer Communication Review Topology with Archipelago
2014
Reed, D.
Warbritton, D.
Sicker, D.
Current trends and controversies in Internet peering and transit: Implications for the future evolution of the InternetConf. on Communication, Information and Internet Policy (TPRC) Topology with Archipelago
2014
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
Comparative assessment of centrality indices and implications on the vulnerability of ISP networksIntl Teletraffic Congress (ITC) Topology with Archipelago
2014
Mosley, L.D.IPv6 network infrastructure and stability inferenceNaval Postgraduate School Topology with Archipelago
2014
Maggs, B.Mapping the whole InternetDuke Univ. Topology with Archipelago
Topology with BGP
2014
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoptionConf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) Topology with Archipelago
2014
Burnett, S.R.Empowering bystanders to facilitate Internet censorship measurement and circumventionGeorgia Tech Topology with Archipelago
UCSD Network Telescope
2014
Wright, J.E.Temporal comparisons of Internet topologyNaval Postgraduate School Topology with Archipelago
2014
Landry, B.Comparing internet probing methodologies through an analysis of large dynamic graphsNaval Postgraduate School Topology with Archipelago
2014
Jaggard, A.D.
Johnson, A.
Syverson, P.
Feigenbaum, J.
Representing network trust and using it to improve anonymous communicationarxiv.org Topology with Archipelago
Topology with BGP
2014
Kang, M.S.
Gligor, V.D.
Routing bottlenecks in the Internet - causes, exploits, and countermeasuresCarnegie Mellon Univ. Topology with Archipelago
Topology with BGP
2014
Tran, T.V.H.IPv6 geolocation using latency constraintsNaval Postgraduate School Topology with Archipelago
2014
Baltra, G.
Beverly, R.
Xie, G.G.
Ingress point spreading: A new primitive for adaptive active network mappingPassive and Active Measurement (PAM) Topology with Archipelago
2014
Xu, Y.
Ma, W.
Robustness analyses of Internet topology with power-law featuresIntl J. of Future Generation Communication and Networking Topology with Archipelago
2014
Orzen, S.-N.Domain relations in trees arborescence for interaction search on persistent routing availabilitySymp. on Applied Machine Intelligence and Informatics (SAMI) Topology with Archipelago
2014
Gansner, E.R.
Krishnamurthy, B.
Willinger, W.
Bustamante, F.E.
Sanchez, M.A.
Demo abstract: towards extracting semantics by visualizing large traceroute datasetsComputing Topology with Archipelago
2013
Verigin, A.L.Evaluating the effectiveness of Sybil attacks against peer-to-peer botnetsUniv. of Victoria, Victoria, CA Topology with Archipelago
2013
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
The multiple instances of node centrality and their implications on the vulnerability of ISP networksarxiv.org Topology with Archipelago
2013
Johnson, A.
Wacek, C.
Jansen, R.
Sherr, M.
Syverson, P.
Users get routed: Traffic correlation on Tor by realistic adversariesACM SIGSAC Conf. on Computer and Communications Security (CCS) Topology with Archipelago
Topology with BGP
2013
Vanaubel, Y.
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Network fingerprinting: TTL-based router signaturesInternet Measurement Conf. (IMC) Topology with Archipelago
2013
Ma, L.
He, T.
Leung, K.K.
Swami, A.
Towsley, D.
Identifiability of link metrics based on end-to-end path measurementsInternet Measurement Conf. (IMC) Topology with Archipelago
2013
Khan, A.
Kwon, T.
Kim, H.
Choi, Y.
AS-level topology collection through looking glass serversInternet Measurement Conf. (IMC) Topology with Archipelago
2013
Sapegin, A.
Uhlig, S.
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing eventsComputer Communications Topology with Archipelago
2013
Daryl, L.H.A.Toward large-graph comparison measures to understand Internet topology dynamicsNaval Postgraduate School, Monterey, CA, US Topology with Archipelago
2013
Chabarek, J.
Barford, P.
Whats in a name?: decoding router interface namesACM workshop on HotPlanet Topology with Archipelago
2013
Lu, N.
Wang, Y.
Su, S.
Yang, F.
Han, R.
Filtering location optimization for the reactive packet filteringSecurity and Communication Networks Topology with Archipelago
2013
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
On the local approximations of node centrality in Internet router-level topologiesWorkshop on Self-Organizing Systems (IWSOS) Topology with Archipelago
2013
Chen, A.
Chan, E.W.W.
Luo, X.
Fok, W.W.T.
Chang, R.K.C.
An efficient approach to multi-level route analyticsIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with Archipelago
2013
Yang, B.
Zhao, H.
Zhang, J.
Ai, J.
Jia, S.
Ge, x.
Liu, W.
Analysis of interlayer connection catastrophe characteristics in Internet AS level topologyTelkomnika Topology with Archipelago
2013
Wacek, C.
Tan, H.
Bauer, K.
Sherr, M.
An empirical evaluation of relay selection in TorNetwork and Distributed System Security Symp. (NDSS) Topology with Archipelago
Topology with BGP
2013
Wang, Y.
Bi, J.
Wu, J.
Revisiting the rich club of the Internet AS-level topologyIEICE Trans. on Communications Topology with Archipelago
Topology with Skitter
2012
Yu, M.
Jiang, W.
Li, H.
Stoica, I.
Tradeoffs in CDN designs for throughput oriented trafficACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Archipelago
2012
Sherry, J.Future architectures for middlebox processing services on the Internet and in the CloudUC Berkeley Topology with Archipelago
Topology with BGP
2012
Ren, D.
Wong, W.
Gary Chan, S.-H.
Toward continuous push-based P2P live streamingIEEE Global Telecommunications Conf. (GLOBECOM) Topology with Archipelago
2012
Ahmad, M.Z.
Guha, R.
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computationJ. Supercomputing Topology with Archipelago
2012
DAngelo, G.
DEmidio, M.
Frigioni, D.
Romano, D.
Enhancing the computation of distributed shortest paths on real dynamic networksMediterranean Conf. on Algorithms Topology with Archipelago
2012
Wachs, M.
Grothoff, C.
Thurimella, R.
Partitioning the InternetConf. on Risks and Security of Internet and Systems (CRiSIS) Topology with Archipelago
Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networksIEEE Conf. on Local Computer Networks (LCN) Topology with Archipelago
2012
Tyson, G.
Kaune, S.
Miles, S.
El-khatib, Y.
Mauthe, A.
Taweel, A.
A trace-driven analysis of caching in content-centric networksIEEE Conf. on Computer Communications and Networks (ICCCN) Topology with Archipelago
2012
Kambhampati, V.
Papadopolous, C.
Massey, D.
Epiphany: A location hiding architecture for protecting critical services from DDoS attacksIEEE/IFIP Conf. on Dependable Systems and Networks (DSN) Topology with Archipelago
2012
Fiorese, A.
Simoes, P.
Boavida, F.
Peer selection in P2P service overlays using geographical location criteriaComputational Science and Its Applications (ICCSA) Topology with Archipelago
2012
Xu, Y.
Zhang, X.
Analysis of Internet robustness in attacksConf. on Systems and Informatics (ICSAI) Topology with Archipelago
2012
Schlegel, R.
Wong, D.S.
Anonymous overlay network supporting authenticated routingInformation Sciences Topology with Archipelago
2012
Ren, D.
Chan, S.G.
Achieving high-bitrate overlay live streaming with proxy helpersPacket Video Workshop (PV) Topology with Archipelago
2012
Papadakis, H.
Fragopoulou, P.
Markatos, E.
Roussopoulos, M.
ITA: Innocuous topology awareness for unstructured P2P networksIEEE Trans. on Parallel and Distributed Systems Topology with Archipelago
Topology with BGP
2012
Faggiani, A.
Gregori, E.
Lenzini, L.
Mainardi, S.
Vecchio, A.
On the feasibility of measuring the internet through smartphone-based crowdsourcingSymp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) Topology with Archipelago
2012
Xu, Y.
Wang, Z.
Collapse by cascading failures in hybrid attacked regional InternetJ. Security and Its Applications Topology with Archipelago
2012
Jacquin, L.
Roca, V.
Kaafar, M.A.
Schuler, F.
Roch, J.-L.
IBTrack: an ICMP black holes trackerhal.archives-ouvertes.fr Topology with Archipelago
2012
Huang, H.
Zhang, B.
Chan, S.-H.G.
Cheung, G.
Frossard, P.
Coding and replication co-design for interactive multiview video streamingIEEE INFOCOM Topology with Archipelago
2012
Cicerone, S.
DAngelo, G.
Di Stefano, G.
Frigioni, D.
Maurizio, V.
Engineering a new algorithm for distributed shortest paths on dynamic networksAlgorithmica Topology with Archipelago
2012
Wang, Y.
Su, S.
Yang, Y.
Ren, J.
A more efficient hybrid approach for single-packet IP tracebackEUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) Topology with Archipelago
Topology with Skitter
2012
DAngelo, G.
DEmidio, M.
Frigioni, D.
Maurizio, V.
Engineering a new loop-free shortest paths routing algorithmSymp. on Experimental Algorithms (SEA) Topology with Archipelago
2011
Sommers, J.
Erikson, B.
Barford, P.
On the prevalence and characteristics of MPLS deployments in the open InternetInternet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2011
Zhang, Y.
Oliveira, R.
Wang, Y.
Su, S.
Zhang, B.
Bi, J.
Zhang, H.
Zhang, L.
A framework to quantify the pitfalls of using traceroute in AS-level topology measurementIEEE J. Selected Areas in Communications Topology with Archipelago
2011
Marchetta, P.
Merindol, P.
Donnet, B.
Pescape, A.
Pansiot, J.-J.
Topology discovery at the router level: a new hybrid tool targeting ISP networksIEEE J. Selected Areas in Communications Topology with Archipelago
Topology with Skitter
2011
Jesus, V.
Aguiar, R.L.
Steenkiste, P.
Topological implications of cascading interdomain bilateral traffic agreementsIEEE J. Selected Areas in Communications Topology with Archipelago
2011
Ahmad, M.Z.
Guha, R.
Internet exchange points and Internet routingConf. on Network Protocols (ICNP) Topology with Archipelago
2011
Moreira, M.D.D.
Laufer, R.
Fernandes, N.C.
Duarte, O.C.M.B.
A stateless traceback technique for identifying the origin of attacks from a single packetIEEE Conf. on Communications (ICC) Topology with Archipelago
2011
Gregori, E.
Lenzini, L.
Orsini, C.
k-clique communities in the Internet AS-level topology graphDistributed Computing Systems Workshops (ICDCSW) Topology with Archipelago
2011
Tomasik, J.
Weisser, M.-A.
Internet topology on as-level: Model, generation methods and toolIEEE Performance Computing and Communications Conf. (IPCC) Topology with Archipelago
Topology with BGP
2011
Gregori, E.
Lenzini, L
Orsini, C.
k-dense communities in the internet AS-level topologyConf. on Communication Systems and Networks (COMSNETS) Topology with Archipelago
2011
Gregori, E.
Improta, A.
Lenzini, L.
Orsini, C.
The impact of IXPs on the AS-level topology structure of the InternetComputer Communications Topology with Archipelago
2010
Fan, X.
Heidemann, J.
Selecting representative IP addresses for internet topology studiesInternet Measurement Conf. (IMC) Topology with Archipelago
2010
Beverly, R.
Berger, A.
Xie, G.G.
Primitives for active internet topology mapping: toward high-frequency characterizationInternet Measurement Conf. (IMC) Topology with Archipelago
2010
Ahmad, M.Z.
Guha, R.
Impact of Internet exchange points on Internet topology evolutionConf. on Local Computer Networks (LCN) Topology with Archipelago
Topology with Skitter
2010
Tomasik, J.
Weisser, M.-A.
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchyIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with Archipelago
2010
Knauf, A.
Hege, G.
Schmidt, T.C.
Wahlisch, M.
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIPPrinciples, Systems and Applications of IP Telecommunications (IPTComm) Topology with Archipelago
2010
Zhang, Y.
Oliveira, R.
Zhang, H.
Zhang, L.
Quantifying the pitfalls of traceroute in AS connectivity inferencePassive and Active Measurement (PAM) Topology with Archipelago
2010
Laki, S.
Matray, P.
Haga, P.
Sebok, T.
Csabai, I.
Vattay, G.
Spotter: a model based active geolocation serviceIEEE Conf. on Computer Communications (INFOCOM) Topology with Archipelago
2010
King, A.Efficient internet topology discovery techniquesUniv. Waikato, New Zealand Topology with Archipelago
2010
Ciceronea, S.
DAngelo, G.
Di Stefanoa, G.
Frigioni, D.
Partially dynamic efficient algorithms for distributed shortest pathsTheoretical Computer Science Topology with Archipelago
2009
Zhang, G.-Q.
Zhang, G.-Q.
Cheng, S.-Q.
Zhou, T.
Symbiotic effect: A guideline for network modelingEPL (Europhysics Letters) Topology with Archipelago
2009
Germoglio, G.
Dias, B.
Sousa, P.
Automated and distributed network service monitoringAsia-Pacific Network Operations and Management Symp. (APNOMS) Topology with Archipelago
2009
Saucez, D.
Donnet, B.
Bonaventure, O.
On the impact of clustering on measurement reductionIFIP Networking Conf. Topology with Archipelago
2009
Dai, L
Cao, Y.
Cui, Y.
Xue, Y.
On scalability of proximity-aware peer-to-peer streamingComputer Communications Topology with Archipelago
Topology with BGP
2008
Wu, M.-F.
Jiang, T.M.
Wu, A.
A virtual service framework for service composition QoS based on active measurementSymp. on Service-Oriented System Engineering (SOSE) Topology with Archipelago
2008
Dramburg, M.Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer InternettopologienHochschule fuer Angewandte Wissenschaften Hamburg, Germany Topology with Archipelago
Topology with Skitter
2008
Wahlisch, M.
Schmidt, T.C.
Spalt, W.
What is happening from behind?: Making the impact of internet topology visibleCampus-Wide Information Systems Topology with Archipelago
Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Ge, X.
Research on the distribution of network nodes based on multiple measurement pointsComputer Science Topology with Archipelago
2007
Li, C.
Zhao, H.
Zhang, X.
Yuan, S.
Analysis on traveling time of internetChina Institute of Communications Topology with Archipelago
2006
Chan, H.
Dash, D.
Perrig, A.
Zhang, H.
Modeling adoptability of secure BGP protocolsJoint Conf. on Measurement and Modeling of Computer Systems Topology with Archipelago
2005
Su, W.-J.
Zhao, H.
Xu, Y.
Zhang, W.-B.
Internet complex network separation degree analysis based on hopsJ. China Inst. of Communications Topology with Archipelago
2020
Krenc, Thomas
Beverly, Robert
Smaragdakis, Georgios
Keep your Communities Clean: Exploring the Routing MessageImpact of BGP CommunitiesCoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Topology with BGP
2020
Jin, Zitong
Shi, Xingang
Yang, Yan
Yin, Xia
Wang, Zhiliang
Wu, Jianping
TopoScope: Recover AS Relationships From Fragmentary ObservationsIMC 20: Proceedings of the ACM Internet Measurement Conference Topology with BGP
2020
Shao, X.
Gao, L
Verifying Policy-based Routing at Internet ScaleIEEE INFOCOM -IEEE Conference on Computer Communications Topology with BGP
2020
Pi, Yibo
Jamin, Sugih
Danzig, Peter
Qian, Feng
Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric ViewProceedings of the ACM on Measurement and Analysis of Computing Systems Topology with BGP
2020
Grailet, Jean-Francois
Donnet, Benoit
Virtual Insanity: Linear Subnet DiscoveryIEEE Transactions on Network and Service Management Topology with BGP
2020
Barik, Runa
Welzl, Michael
Fairhurst, Gorry
Elmokashfi, Ahmed
Dreibholz, Thomas
Gjessing, Stein
On the usability of transport protocols other than TCP: A home gateway and internet path traversal studyComputer Networks Topology with BGP
2020
Shapira, T.
Shavitt, Y.
Unveiling the type of relationship between Autonomous Systems using deep learningIEEE/IFIP Intl Workshop on Analytics for Network and Service Management (AnNet) Topology with BGP
2020
Giotsas, V.
Livadariu, I.
Gigis, P.
A first look at the misuse and abuse of the IPv4 Transfer MarketIntl Conf. on Passive and Active Network Measurement Topology with BGP
2020
Witono, T.
Yazid, S.
Portrait of Indonesia Internet Topology at the Autonomous System LevelComputational Science and Technology. Lecture Notes in Electrical Engineering Topology with BGP
2020
Subramani, Karthika
Perdisci, Roberto
Konte, Maria
IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Pointsarxiv Topology with BGP
2020
Sonneveld, JotteA Gravitational Approach for Ranking Autonomous Systems in Large Autonomous System NetworksUniversity of Twente Topology with BGP
2020
Pariset, Matteo
Ford, Bryan
Basescu, Cristina
Applying Approximate Distance Oracles to Internet RoutingSwiss Federal Institute of Technology Lausanne Topology with BGP
2020
He, HanyueRelationship between Network Traffic Topology Map and Degree of CompetitionJournal of Physics: Conference Series Topology with BGP
2019
London, Palma
Vardi, Shai
Wierman, Adam
Logarithmic Communication for DistributedOptimization in Multi-Agent SystemsProceedings of the ACM on Measurement and Analysis of Computing Systems Topology with BGP
2019
Liquori, L.
Gaeta, R.
Sereno, M.
A network aware resource discovery serviceParisTech Topology with BGP
2019
Yeganah, Bahador
Durairajan, Ramakrishnan
Rejaie, Reza
Willinger, Walter
How Cloud Traffic Goes Hiding:A Study of Amazon Peering FabricIMC 19: Proceedings of the Internet Measurement Conference Topology with BGP
2019
Raman, Aravindh
Joglekar, Sagar
De Cristofaro, Emiliano
Sastry, Nishanth
Tyson, Gareth
Challenges in the Decentralised Web:The Mastodon CaseIMC 19: Proceedings of the Internet Measurement Conference Topology with BGP
2019
Vos, M.Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprintsUniv. of Twente Topology with BGP
2019
Niaki, A.A.
Cho, S.
Weinberg, Z.
Hoang, N.P.
Razaghpanah, A.
Christin, N.
Gill, P.
ICLab: A global, longitudinal Internet censorship measurement platformarxiv.org Topology with BGP
2019
Tajeuna, E.G.
Bouguessa, M.
Wang, S.
Modeling and predicting community structure changes in time-evolving social networksIEEE Trans. on Knowledge and Data Engineering Topology with BGP
2019
McDaniel, T.
Smith, J.M.
Schuchard, M.
The Maestro attack: Orchestrating malicious flows with BGParxiv.org Topology with BGP
2019
Zhao, B.Z.H.
Ikram, M.
Asghar, H.J.
Kaafar, M.A.
Chaabane, A.
Thilakarathna, K.
A decade of mal-activity reporting: A retrospective analysis of Internet malicious activity blacklistsarxiv.org Topology with BGP
2019
Liu, T.
Lui, J.
Lin, D.
Hui, D.
On the feasibility of inter-domain routing via a small broker setIEEE Trans. on Parallel and Distributed Systems Topology with BGP
2019
Yang, Y.
Yin, X.
Shi, X.
Wang, Z.
He, J.
Fu, T. Z. J.
Winslett, M.
Inter-domain routing bottlenecks and their aggravationComputer Networks Topology with BGP
2019
Xiang, Q.
Zhang, J. J.
Wang, X. T.
Liu, Y. J.
Guok, C.
Le, F.
Newman, H.
Yang, Y. R.
MacAuley, J.
Toward Fine-Grained, Privacy-Preserving, Efficient Multi-Domain Network Resource DiscoveryIEEE Journal on Selected Areas in Communications Topology with BGP
2019
Tran, M.
Kang, M. S.
Hsiao, H. C.
Chiang, W. H.
Tung, S. P.
Wang, Y. S.
On the Feasibility of Rerouting-based DDoS DefensesIEEE Symp. on Security and Privacy Topology with BGP
2019
Tian, Z.
Su, S.
Shi, W.
Du, X.
Guizani, M.
Yu, X.
A data-driven method for future Internet route decision modelingFuture Generation Computer Systems Topology with BGP
2019
Sermpezis, P.
Kotronis, V.
Inferring Catchment in Internet RoutingACM on Measurement and Analysis of Computing Systems Topology with BGP
2019
Pulfer, M.Multi-path routingSwiss Fed. Inst. of Technology Zurich Topology with BGP
2019
Lin, Z.
Wang, C.
An Efficient Approximation of Betweenness Centrality for Uncertain GraphsIEEE Access Topology with BGP
2019
Leyba, K. G.
Edwards, B.
Freeman, C.
Crandall, J. R.
Forrest, S.
Borders and gateways: measuring and analyzing national as chokepointsACM SIGCAS Conf. on Computing and Sustainable Societies Topology with BGP
2019
Jiao, L.
Lin, X.
Zhou, R.
Chen, X.
Online Scheduling of Traffic Diversion and Cloud Scrubbing with Uncertainty in Current InputsACM Intl Symp. on Mobile Ad Hoc Networking and Computing (Mobihoc) Topology with BGP
2019
Jiang, J.
Wen, S.
Yu, S.
Liu, B.
Xiang, Y.
Zhou, W.
Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source EstimatorMalicious Attack Propagation and Source Identification Topology with BGP
2019
Ghose, N.
Lazos, L.
Rozenblit, J.
Breiger, R.
Multimodal Graph Analysis of Cyber AttacksSpring Simulation Conference (SpringSim) Topology with BGP
2019
Garay, D.Network Peering Dashboard for SURFnetUniv. of Amsterdam Topology with BGP
2019
Dwaraki, A.
Freedman, R.
Zilberstein, S.
Wolf, T.
Using Natural Language Constructs and Concepts to Aid Network ManagementInternational Conference on Computing, Networking and Communications (ICNC) Topology with BGP
2019
Del Fiore, J. M.
Merindol, P.
Persico, V.
Pelsser, C.
Pescape, A.
Filtering the noise to reveal inter-domain liesNetwork Traffic Measurement and Analysis Conference (TMA) Topology with BGP
2019
Bakhshaliyev, K.
Canbaz, M. A.
Gunes, M. H.
Investigating Characteristics of Internet PathsTransactions on Modeling and Performance Evaluation of Computing Systems Topology with BGP
2018
Weinberg, Z.Toward automated worldwide monitoring of network-level censorshipCarnegie Mellon Univ. Topology with BGP
2018
Ramanathan, S.
Mirkovic, J.
Yu, M.
Zhang, Y.
SENSS against volumetric DDoS attacksComputer Security Applications Conf. (CSAC) Topology with BGP
2018
Pi, Y.
Jamin, S.
Danzig, P.
Shaha, J.
AP-atoms: A high-accuracy data-driven client aggregation for global load balancingIEEE/ACM Trans. on Networking Topology with BGP
2018
Mani, A.
Dworken, D.
Vaidya, T.
Sherr, M.
An extensive evaluation of the Internets open proxiesAnnual Computer Security Applications Conf. Topology with BGP
2018
Jansen, R.
Traudt, M.
Geddes, J.
Wacek, C.
Sherr, M.
Syverson, P.
KIST: Kernel-informed socket transport for TorACM Trans. on Privacy and Security (TOPS) Topology with BGP
2018
Xiang, Q.
Zhang, J.J.
Wang, X.T.
Liu, Y.J.
Guok, C.
Le, F.
MacAuley, J.
Newman, H.
Yang, Y.R.
Fine-grained, multi-domain network resource abstraction as a fundamental primitive to enable high-performance, collaborative data sciencesIntl Conf. for High Performance Computing, Networking, Storage and Analysis Topology with BGP
2018
Smith, J.M.
Birkeland, K.
McDaniel, T.
Schuchard, M.
Withdrawing the BGP re-routing curtain: Understanding the security impact of BGP poisoning via real-world measurementsarxiv.org Topology with BGP
2018
Semertzidis, K.
Pitoura, E.
Terzi, E.
Tsaparas, P.
Finding lasting dense subgraphsData Mining and Knowledge Discovery Topology with BGP
2018
Levenburg, L.On interdisciplinary studies of physical information infrastructureResearch Methods for the Digital Humanities, Ch. 2 Topology with BGP
2018
Gilad, Y.
Hlavacek, T.
Herzberg, A.
Schapira, M.
Shulman, H.
Perfect is the enemy of good: Setting realistic goals for interdomain routing securityACM Workshop on Hot Topics in Networks Topology with BGP
2018
Doan, T.V.
Pajevic, L.
Bajpai, V.
Ott, J.
Tracing the path to YouTube: A quantification of path lengths and latencies toward content cachesIEEE Communications Magazine Topology with BGP
2018
Brandt, M.
Shulman, H.
Waidner, M.
Internet as a source of randomnessACM Workshop on Hot Topics in Networks Topology with BGP
2018
Wassermann, S.
Casas, P.
Distributed Internet paths performance analysis through machine learningNetwork Traffic Measurement and Analysis Conf. (TMA) Topology with BGP
2018
Streibelt, F.
Lichtblau, F.
Beverly, R.
Max, A. F.
Pelsser, C.
Smaragdakis, G.
Bush, R.
BGP communities: Even more worms in the routing canInternet Measurement Conf. (IMC) Topology with BGP
2018
Singh, R.
Dunna, A.
Gill, P.
Characterizing the deployment and performance of multi-CDNsInternet Measurement Conference (IMC) Topology with BGP
2018
Nur, A.
Tozal, M.
Identifying critical autonomous systems in the InternetJ. of Supercomputing Topology with BGP
2018
Nomikos, K.
Nomikos, G.
Kotronis, V.
Sermpezise, P.
Gigis, P.
Manassakis, L.
Dietzel, C.
Konstantaras, S.
Dimitropoulos, X.
Giotsas, V.
O peer, where art thou?: Uncovering remote peering interconnections at IXPsInternet Measurement Conf. (IMC) Topology with BGP
2018
Hegde, N.
Chang, Q.
Kulkarni, M.
D2P: Automatically creating distributed dynamic programming codesPurdue Univ. Topology with BGP
2018
Ekparinya, P.
Gramoli, V.
Jourjon, G.
Impact of man-in-the-middle attacks on EthereumSymp. on Reliable Distributed Systems (SRDS) Topology with BGP
2018
Shao, X.
Asaeda, H.
Dong, M.
Ma, Z
Cooperative inter-domain cache sharing for information-centric networking via a bargaining game approachIEEE Trans. on Network Science and Engineering Topology with BGP
2018
Marczak, B.
Scott-Railton, J.
McKune, S.
Razzak, B.A.
Deibert, R.
HIDE AND SEEK - Tracking NSO Group Pegasus spyware to operations in 45 countriesUniv. of Toronto Topology with BGP
2018
Yuce, E.
Selcuk, A.A.
Server notaries: A complementary approach to the Web PKI trust modelIET Information Security Topology with BGP
2018
Spring, N.
Li, Z.
Levin, D.
Bhattacharjee, B.
Internet anycast: performance, problems, and potentialACM SIGCOMM Topology with BGP
2018
Sikos, L.
Stumptner, M.
Mayer, W.
Howard, C.
Voigt, S.
Philp, D.
Automated reasoning over provenance-aware communication network knowledge in support of cyber-situational awarenessIntl Conf. on Knowledge Science, Engineering and Management Topology with BGP
2018
Liu, Z.
Jin, H.
Hu, Y. C.
Bailey, M.
Practical proactive DDoS-attack mitigation via endpoint-driven in-network traffic controlIEEE/ACM Trans. on Networking Topology with BGP
2018
Liu, B.
Lu, C.
Duan, H.
Liu, Y.
Li, Z.
Hao, S.
Yang, M.
Who is answering my queries: Understanding and characterizing interception of the DNS resolution pathUSENIX Security Symp. Topology with BGP
2018
Jin, J.BGP route leak prevention based on BGPsecVehicular Technology Conf. (VTC-Fall) Topology with BGP
2018
Dethise, A.
Chiesa, M.
Canini, M.
Prelude: Ensuring inter-domain loop-freedom in SDN-enabled networksAsia-Pacific Workshop on Networking Topology with BGP
2018
Canbaz, M.A.Internet topology mining: From Big Data to Network ScienceUniv. of Nevada, Reno Topology with BGP
2018
Smith, J.
Schuchard, M.
Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routingIEEE Symp. on Security and Privacy Topology with BGP
2018
Krohnke, N.
Jansen, J.
Vranken, H.
Resilience of the Domain Name System: A case study of the .nl-domainComputer Networks Topology with BGP
2018
Dey, P.K.
Canbaz, M.A.
Yuksel, M.
Gunes, M.H.
On correlating ISP topologies to their businessesIntl Conf. on Communications (ICC) Topology with BGP
2018
Bottger, T.
Cuadrado, F.
Uhlig, S.
Looking for hypergiants in PeeringDBACM SIGCOMM Computer Communication Review Topology with BGP
2018
Sun, Y.
Yin, L.
Wang, Z.
Guo, Y.
Fang, B.
Identifying the propagation sources of stealth wormsIntl Conf. on Computational Science Topology with BGP
2018
Gao, S.
Shrivastava, S.
Ogan, K.
Xin, Y.
Baldin, I.
Evaluating path query mechanisms as a foundation for SDN network controlIEEE Conf. on Network Softwarization and Workshops (NetSoft) Topology with BGP
2018
Baumann, A.Network Science - Applications in technology, business and social mediaHumboldt Univ. of Berlin Topology with BGP
2018
Alessandro, M.
Vittorio, C.C.
Leveraging the nonuniform PSO network model as a benchmark for performance evaluation in community detection and link predictionNew J. of Physics Topology with BGP
2018
Silva, W.J.A.
Sadok, D.F.H.
A survey on efforts to evolve the control plane of inter-domain routingMDPI J. Topology with BGP
2018
Lierde, H.V.
Chow, T.W.S.
Delvenne, J.C.
Spectral clustering algorithms for the detection of clusters in block-cyclic and block-acyclic graphsJ. of Complex Networks Topology with BGP
2018
Ekparinya, P.
Gramoli, V.
Jourjon, G.
Double-spending risk quantification in private, consortium and public Ethereum blockchainsarxiv.org Topology with BGP
2018
Alrashed, H.Delta hyperbolicity and the core-periphery structure in graphsLecture Notes in Social Networks (LNSN) Topology with BGP
2018
Silva, W.J.A.An architecture to manage incoming traffic of inter-domain routing using OpenFlow networksInformation Topology with BGP
2018
Siddula, M.
Li, L.
Li, Y.
An empirical study on the privacy preservation of online social networksIEEE Access Topology with BGP
2018
Shah, A.Systems for characterizing Internet routingColorado State Univ. Topology with BGP
UCSD Network Telescope
2018
Mendoza, J.R.
Ocampo, R.
Montes, I.
Festin, C.A.
Efficient feature extraction for Internet data analysis using AS2VecACM Symp. on Applied Computing Topology with BGP
2018
Ma, X.
Li, J.
Tang, Y.
An, B.
Guan, X.
Protecting internet infrastructure against link flooding attacks: A techno-economic perspectiveInformation Sciences Topology with BGP
2018
Birkner, R.
Drachsler-Cohen, D.
Vanbever, L.
Vechev, M.
Net2Text: query-guided summarization of network forwarding behaviorsUSENIX Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2018
Berenguer, S.
Pintor, F.
Radiography of Internet autonomous systems interconnection in Latin America and the CaribbeanComputer Comm. Topology with BGP
2018
Tozal, M.E.Policy-preferred paths in AS-level Internet topology graphsTheory and Applications of Graphs Topology with BGP
2018
Shin, K.
Rad, T.
Faloutsos, C.
Patterns and anomalies in k-cores of real-world graphs with applicationsKnowledge and Information Systems Topology with BGP
2018
Wu, J.
Zhong, J.
Chen, Z.
Chen, B.
Optimal coupling patterns in interconnected communication networksIEEE Trans. on Circuits and Systems Topology with BGP
2018
He, L.
Jia, Y.
Ren, G.
Liu, Y.
RISP: An RPKI-based inter-AS source protection mechanismTsinghua Science and Technology Topology with BGP
2018
Canbaz, M.A.
Bakhshaliyev, K.
Gunes, M.H.
Router-level topologies of Autonomous SystemsSpringer Proc. in Complexity Topology with BGP
2018
Xue, J.
Wang, J.
Liu, S.
Ma, X.
Wang, H.
Dissecting persistent instability of web service: A joint perspective of server schedule dynamics and path latencyInternational Journal of Communication Systems Topology with BGP
2018
Wails, R.
Sun, Y.
Johnson, A.
Chiang, M.
Mittal, P.
Tempest: Temporal dynamics in anonymity systemsarxiv.org Topology with BGP
2018
Syamkumar, M.
Mani, S. K.
Durairajan, R.
Barford, P.
Sommers, J.
Wrinkles in Time: Detecting Internet-wide Events via NTPIFIP Networking Conference (IFIP Networking) and Workshops Topology with BGP
2018
Shi, Q.
Wang, X.
Lin, W.
Placement Strategy for Replicated Servers in CDNChinese Control Conf. (CCC) Topology with BGP
2018
Michelinakis, F.
Doroud, H.
Razaghpanah, A.
Lutu, A.
Vallina-Rodriguez, N.
Gill, P.
Widmer, J.
The cloud that runs the mobile Internet: A measurement study of mobile cloud servicesConf. on Computer Communications Topology with BGP
2018
Marzano, A.
Alexander, D.
Fontesca, E.
Hoepers, C.
Steeding-Jessen, K.
Chaves, M. H. P. c.
Cunha, I.
Guedes, D.
The Evolution of Bashlite and Mirai IoT BotnetsIEEE Symp. on Computers and Communications (ISCC) Topology with BGP
2018
Mani, A.
Wilson-Brown, T.
Jansen, R.
Johnson, A.
Sherr, M.
Understanding Tor Usage with Privacy-Preserving MeasurementInternet Measurement Conf. (IMC) Topology with BGP
2018
Kontaxis, G.Reducing third parties in the network through client-side intelligenceColumbia Univ. Topology with BGP
2018
Imani, M
Barton, A.
Wright, M.
Guard Sets in Tor using AS RelationshipsProc. on Privacy Enhancing Technologies Topology with BGP
2018
de Vries, W. B.
Rijswijk-Deij, R. V.
de Boer, P. T.
Pras, A.
Passive Observations of a Large DNS Service: 2.5 Years in the Life of GoogleNetwork Traffic Measurement and Analysis Conf. (TMA) Topology with BGP
2018
Chiba, D.
Yagi, T.
Akiyama, M.
Shibahara, T.
Mori, T.
Goto, S.
DomainProfiler: toward accurate and early discovery of domain names abused in futureInternational Journal of Information Security () Topology with BGP
2018
Bottger, T.
Cuadrado, F.
Tyson, G.
Castro, I.
Uhlig, S.
Open connect everywhere: A glimpse at the Internet ecosystem through the lens of the Netflix CDNarxiv.org Topology with BGP
2017
Zhang, Z.
Ma, L.
Leung, K. K.
Le, F.
Kompella, S.
Tassiulas, L.
How better is distributed SDN? An analytical approacharxiv.org Topology with BGP
2017
Smith, J.M.Taking back the Internet: Defeating DDoS and adverse network conditions via reactive BGP routingUniv. of Tennessee Topology with BGP
2017
Gosain, D.
Agarwal, A.
Chakravarty, S.
Acharya, H.B.
The devils in the details: Placing decoy routers in the InternetComputer Security Applications Conf. Topology with BGP
2017
Rula, J.
Bustamente, F.
Steiner, M.
Cell spotting: Studying the role of cellular networks in the InternetInternet Measurement Conf. (IMC) Topology with BGP
2017
Goodchild, B.
Chiu, Y.
Hansen, R.
Lu, H.
Calder, M.
Luckie, M.
Lloyd, W.
Choffnes, D.
Katz-Bassett, E.
The record route option is an option!Internet Measurement Conf. (IMC) Topology with BGP
2017
Giotsas, V.
Smaragdakis, G.
Dietzel, C.
Richter, P.
Feldmann, A.
Berger, A.
Inferring BGP blackholing activity in the InternetInternet Measurement Conf. (IMC) Topology with BGP
2017
Zhang, X.
Moore, C.
Newman, M.E.J.
Random graph models for dynamic networksEur. Physical J. Topology with BGP
2017
Yang, H.
Lam, S.S.
Scalable verification of networks with packet transformers using atomic predicatesIEEE/ACM Trans. on Networking (TON) Topology with BGP
2017
Tilch, G.
Ermakova, T.
Fabian, B.
A multilayer graph model of the Internet topologyzenodo.org Topology with BGP
2017
Nasr, M.
Zolfaghari, H.
Houmansadr, A.
The waterfall of liberty: Decoy routing circumvention that resists routing attacksConf. on Computer and Communications Security (SIGSAC) Topology with BGP
2017
Kotronis, V.
Nomikos, G.
Manassakis, L.
Mavrommatis, D.
Dimitropoulos, X.
Shortcuts through colocation facilitiesarxiv.org Topology with BGP
2017
Gasser, O.
Scheitle, Q.
Rudolph, B.
Denis, C.
Schriker, N.
Carle, G.
The amplification threat posed by publicly reachable BACnet devicesJ. of Cyber Security and Mobility Topology with BGP
2017
Acharya, H.B.
Chakravarty, S.
Gosain, D.
Few throats to choke: On the current structure of the InternetConf. on Local Computer Networks (LCN) Topology with BGP
2017
Liu, Z.
Jin, H.
Hu, Y.
Bailey, M.
MiddlePolice: Fine-grained endpoint-driven in-network traffic control for proactive DDoS attack mitigationarxiv.org Topology with BGP
2017
Haghtalab, N.
Laszka, A.
Procaccia, A.
Vorobeychik, Y.
Koutsoukos, X.
Monitoring stealthy diffusionKnowledge and Information Systems Topology with BGP
2017
Canbaz, A.
Bakhshaliyev, K.
Gunes, M.
Analysis of path stability within autonomous systemsWorkshop on Measurement and Networking Topology with BGP
2017
Gregori, E.
Lenzini, L.
Luconi, V.
AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systemsComputer Communications Topology with BGP
2017
Burger, V.Performance evaluation and optimization of Content Delivery NetworksJulius-Maximilians-Univ. Wurzburg Topology with BGP
2017
Antonakakis, M.
April, T.
Bailey, M.
Bernhard, M.
Bursztein, E.
Cochran, J.
Durumeric, Z.
Halderman, J.
Invernizzi, L.
Kallitsis, M.
Kumar, D.
Lever, C.
Ma, X.
Mason, J.
Menscher, D.
Seaman, C.
Sullivan, N.
Thomas, K.
Zhou, Y.
Understanding the Mirai botnetUSENIX Security Symp. Topology with BGP
2017
Kuenzer, S.
Ivanov, A.
Manco, F.
Mendes, J.
Volchkov, Y.
Schmidt, F.
Yasukata, K.
Honda, M.
Huici, F.
Unikernels everywhere: The case for elastic CDNsIntl Conf. on Virtual Execution Environments (SIGPLAN) Topology with BGP
2017
Hiran, R.
Carlsson, N.
Shahmehri, N.
Collaborative framework for protection against attacks targeting BGP and edge networksComputer Networks Topology with BGP
2017
Fanou, R.
Francois, P.
Aben, E.
Mwangi, M.
Goburdhan, N.
Valera, F.
Four years tracking unrevealed topological changes in the African interdomainComputer Communications Topology with BGP
2017
Asharov, G.
Demmler, D.
Schapira, M.
Schneider, T.
Segev, G.
Shenker, S.
Zohner, M.
Privacy-preserving interdomain routing at Internet scaleProc. on Privacy Enhancing Technologies Topology with BGP
2017
Wachs, M.
Scheitle, Q.
Carle, G.
Push away your privacy: Precise user tracking based on TLS client certificate authenticationNetwork Traffic Measurement and Analysis Conf. Topology with BGP
2017
Tata, N.MicroCuckoo hash engine for high-speed IP lookupVirginia Polytechnic Inst. and State Univ. Topology with BGP
2017
Sermpezis, P.
Nomikos, G.
Dimitropoulos, X.
Re-mapping the Internet: Bring the IXPs into playarxiv.org Topology with BGP
2017
Reuter, A.
Bush, R.
Cunha, I.
Katz-Bassett, E.
Schmidt, T.
Wahlisch, M.
Towards a rigorous methodology for measuring adoption of RPKI route validation and filteringarxiv.org Topology with BGP
2017
London, P.Distributed optimization and data market designCalifornia Inst. of Technology Topology with BGP
2017
Imani, M.
Barton, A.
Wright, M.
Forming guard sets using AS relationshipsProc. on Privacy Enhancing Technologies Topology with BGP
2017
Grailet, J.F.
Donnet, B.
Towards a renewed alias resolution with space search reduction and IP fingerprintingNetwork Traffic Measurement and Analysis Conf. (TMA) Topology with BGP
2017
Bangera, P.
Gorinsky, S.
Ads versus regular contents: Dissecting the web hosting ecosystemIFIP Networking Conf. Topology with BGP
2017
Vega-Oliveros, D. A.
Costa, L. d. F.
Rodrigues, F. A.
Influence maximization on correlated networks through community identificationarxiv.org Topology with BGP
2017
Suen, J.Y.
Navlakha, S.
Using inspiration from synaptic plasticity rules to optimize traffic flow in distributed engineered networksNeural Computation Topology with BGP
2017
Jancicka, J.Automatic classification of network entitiesCharles Univ. Topology with BGP
2017
Domingos, J.M.M.Characterization and monitoring of critical systems on national InternetTecnico Lisboa Topology with BGP
2017
Al-Baghdadi, A.Computing top-k closeness centrality in unweighted undirected graphs revisitedKent State Univ. Topology with BGP
2017
Wang, Y.
Bi, J.
Zhang, K.
A SDN-based framework for fine-grainedinter-domain routing diversityMobile Networks and Applications Topology with BGP
2017
Tyson, G.
Huang, S.
Cuadrado, F.
Castro, T.
Perta, V.
Sathiaseelan, A.
Uhlig, S.
Exploring HTTP header manipulation in-the-wildConf. on World Wide Web Topology with BGP
2017
Tozal, M.E.Autonomous system ranking by topological characteristics: A comparative studyIEEE Systems Conf. (SysCon) Topology with BGP
2017
Sun, Y.
Edmundson, A.
Feamster, N.
Chiang, M.
Mittal, P.
Counter-RAPTOR: Safeguarding Tor against active routing attacksarxiv.org Topology with BGP
2017
Sermpezis, P.
Dimitropoulos, X.
Can SDN accelerate BGP convergence? A performance analysis of inter-domain routing centralizationarxiv.org Topology with BGP
2017
Pacifici, V.
Dan, G.
Distributed caching algorithms for interconnected operator CDNsIEEE J. on Selected Areas in Communications Topology with BGP
2017
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.
Perrig, A.
Authentication challenges in a global environmentACM Trans. on Privacy and Security (TOPS) Topology with BGP
2017
Gilad, Y.
Cohen, A.
Herzberg, A.
Schapira, M.
Shulman, H.
Are we there yet? On RPKIs deployment and securityThe Network and Distributed System Security Symp. Topology with BGP
2017
Dong, W.
Gao, Y.
Wu, W.
Bu, J.
Chen, C.
Li, X.
Optimal monitor assignment for preferential link tomography in communication networksIEEE/ACM Trans. on Networking (TON) Topology with BGP
2017
Tanaka, Y.
Goto, A.
Suspicious FQDN evaluation based on variations in malware download URLsIEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining Topology with BGP
2017
Sakuma, K.
Asahina, H.
Haruta, S.
Sasase, I.
Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destinationAsia-Pacific Conference on Communications (APCC) Topology with BGP
2017
Nozaki, Y.
Golen, E.
Shenoy, N.
A modular architecture for scalable inter-domain routingIEEE Computing and Communication Workshop and Conf. (CCWC) Topology with BGP
2017
Moriano, P.
Achar, S.
Camp, L. J.
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomaliesComputers and Security Topology with BGP
2017
Mirchev, M. J.On the Spectra of Scale-free and Small-World NetworksTelecom Topology with BGP
2017
Liu, J.
Yang, B.
Liu, J.
Lu, Y.
Zhu, K.
Forwarding degree-based AS relationship recognition algorithmIEEE Advanced Information Technology, Electronic and Automation Control Conf. (IAEAC) Topology with BGP
2017
Li, Z.
Levin, D.
Spring, N.
Bhattacharjee, B.
Longitudinal analysis of root server anycast inefficienciesUniv. of Maryland Topology with BGP
2017
Huth, M.
Fabian, B.
Inferring business relationships in the internet backboneIntl J. of Networking and Virtual Organisations Topology with BGP
2017
Holland, J.
Schuchard, M.
POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation StatesACM SIGSAC Conf. on Computer and Communications Security Topology with BGP
2017
Gomez, J. L. G.
Wang, R.
Chen, M. H.
Chou, C. F.
ETMP-BGP: Effective tunnel-based multi-path BGP routing using software-defined networkingIEEE International Conference on Systems, Man, and Cybernetics (SMC) Topology with BGP
2017
Finamore, A.
Varvello, M.
Papagiannaki, K.
Mind the Gap Between HTTP and HTTPS in Mobile NetworksIntl Conf. on Passive and Active Network Measurement Topology with BGP
2017
Cakmak, G.
Aydin, M. N.
A country-specific analysis on internet interconnection ecosystemsIntl Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Topology with BGP
2017
Bublitz, S.Towards a BitTorrent weather forecastUniv. of Zurich Topology with BGP
2017
Ali, A.
Rahman, M. A. U.
A Efficient Privacy Based Multi User Computation Using Inter Domain Routing DecisionIntl J. of Scientific Research in Computer Science, Engineering and Information Technology Topology with BGP
2017
Ahmad, A.
Jaradat, Y.
Maoud, M. Z.
Machine Learning Approach for Categorizing Internet Autonomous Systems LinksIntl Conf. on Green and Human Information Technology Topology with BGP
2016
Sobrinho, J.L.
Vanbever, L.
Le, F.
Sousa, A.
Rexford, J.
Scaling the Internet routing system through distributed route aggregationIEEE/ACM Trans. on Networking (TON) Topology with BGP
2016
Semertzidis, K.
Pitoura, E.
Terzi, E.
Tsaparas, P.
Best friends forever (BFF): Finding lasting dense subgraphsarxiv.org Topology with BGP
2016
Pacifici, V.
Dan, G.
Coordinated selfish distributed caching for peering content-centric networksTrans. on Networking (TON) Topology with BGP
2016
Chen, M.
Xu, M.
Li, Q.
Yang, Y.
Measurement of large-scale BGP events: Definition, detection, and analysisComputer Networks Topology with BGP
2016
Anwar, M.R.Investigating interdomain routing in the wildStony Brook Univ. Topology with BGP
2016
Wuebbeling, M.
Meier, M.
Improved calculation of AS resilience against IP prefix hijackingIEEE Conf. on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wassermann, S.
Casas, P.
Reverse traceroute with DisNETPerf, a distributed Internet paths performance analyzerIEEE Conf. on Local Computer Networks (LCN) Topology with BGP
2016
Wassermann, S.
Casas, P.
Donnet, B.
Leduc, G.
Mellia, M.
On the analysis of Internet paths with DisNETPerf, a distributed paths performance analyzerIEEE Conf. on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Klick, J.
Lau, S.
Wahlisch, M.
Roth, V.
Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selectionInternet Measurement Conf. (IMC) Topology with BGP
2016
Jonker, M.
Sperotto, A.
van Rijswijk-Deij, R.
Sadre, R.
Pras, A.
Measuring the adoption of DDoS protection servicesInternet Measurement Conf. (IMC) Topology with BGP
2016
Comarela, G.
Terzi, E.
Crovella, M.
Detecting unusually-routed ASes: Methods and applicationsInternet Measurement Conf. (IMC) Topology with BGP
2016
Chung, T.
Choffnes, D.
Mislove, A.
Tunneling for transparency: A large-scale analysis of end-to-end violations in the InternetInternet Measurement Conf. (IMC) Topology with BGP
2016
Chung, T.
Liu, Y.
Choffnes, D.
Levin, D.
Maggs, B.M.
Mislove, A.
Wilson, C.
Measuring and applying invalid SSL certificates: The silent majorityInternet Measurement Conf. (IMC) Topology with BGP
2016
Chatterjee, A.
Chakraborty, A.
Pal, S.
Mukherjee, A.
Naskar, M.
Non-autonomous dynamic network model involving growth and decayIntl Conf. on Advanced Networks and Telecommunications Systems Topology with BGP
2016
Bangera, P.Alternative revenue sources for Internet service providersUniv. Carlos III de Madrid Topology with BGP
2016
Syamkumar, M.
Durairajan, R.
Barford, P.
Bigfoot: A geo-based visualization methodology for detecting BGP threatsIEEE Symp. on Visualization for Cyber Security (VizSec) Topology with BGP
2016
Nasr, M.
Houmansadr, A.
Game of decoys: Optimal decoy routing through game theoryConf. on Computer and Communications Security (SIGSAC) Topology with BGP
2016
Liu, Z.
Jin, H.
Hu, Y.C.
Bailey, M.
MiddlePolice: Toward enforcing destination-defined policies in the middle of the InternetConf. on Computer and Communications Security (SIGSAC) Topology with BGP
2016
Cangialosi, F.
Chung, T.
Choffnes, D.
Levin, D.
Maggs, B.
Mislove, A.
Wilson, C.
Measurement and analysis of private key sharing in the HTTPS ecosystemACM SIGSAC Conf. on Computer and Communications Security Topology with BGP
2016
Wang, C.
Li, Z.
Huang, X.
Zhang, P.
Inferring the average as path length of the InternetIEEE Conf. on Network Infrastructure and Digital Content (IC-NIDC) Topology with BGP
2016
Tozal, M.E.Enumerating single destination, policy-preferred paths in AS-level Internet topology mapsIEEE Sarnoff Symp. Topology with BGP
2016
Noroozian, A.
Korczynski, M.
Ganan, C.H.
Makita, G.
Yoshioka, K.
van Eeten, M.
Who gets the boot? Analyzing victimization by DDoS-as-a-ServiceRAID : Intl Symp. on Research in Attacks, Intrusions, and Defenses Topology with BGP
2016
Liquori, L.
Sereno, M.
LogNet: Extending Internet with a network aware discovery serviceInria-French Inst. for Research in Computer Science Topology with BGP
2016
Gosain, D.
Agarwal, A.
Acharya, H.B.
Chakravarty, S.
Qi points: placing decoy routers in the internetIndraprastha Inst. of Information Technology Delhi (IIITD) Topology with BGP
2016
Yang, Y.
Shi, X.
Yin, X.
Wang, Z.
The power of prefix hijackings in the Internet hierarchyIEEE Trustcom/BigDataSE/ISPA Topology with BGP
2016
Hoang, N.P.Towards an autonomous system monitor for mitigating correlation attacks in the Tor networkKyoto Univ. Topology with BGP
2016
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
Jumpstarting BGP security with path-end validationACM SIGCOMM Topology with BGP
2016
Bade, L.Resilience of the Domain Name System: A case study for .nlRadboud Univ. Topology with BGP
2016
Wang, Y.
Bi, J.
Zhang, K.
Wu, Y.
A framework for fine-grained inter-domain routing diversity via SDNConf. on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2016
Varghese, J.S.
Ruan, L.
Computing customer cones of peering networksApplied Networking Research Workshop Topology with BGP
2016
Bergamini, E.
Wegner, M.
Lukarski, D.
Meyerhenke, H.
Estimating current-flow closeness centrality with a multigrid Laplacian solverarxiv.org Topology with BGP
2016
Zhang, Y.
Wang, X.
Perrig, A.
Zheng, Z.
Tumbler: Adaptable link access in the bots-infested InternetComputer Networks Topology with BGP
2016
Singh, R.
Koo, H.
Miramirkhani, N.
Miraj F., Akoglu
L., Gill P.
The politics of routing: Investigating the relationship between AS connectivity and Internet freedomarxiv.org Topology with BGP
2016
Shao, X.
Wang, F.
Gao, L.
Fujikawa, K.
Harai, H.
Distributed encoding for multiple-inherited locators to accommodate billions of objects in the InternetIEEE Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2016
Schuchard, M.J.Adversarial degradation of the availability of routing infrastructures and other Internet-scale distributed systemsUniv. of Minnesota Topology with BGP
2016
Schuchard, M.
Hopper, N.
E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentivesarxiv.org Topology with BGP
2016
Kriegel, P.Determining the location of autonomous system relations among top tier Internet Service Providers in the United StatesUniv. of Oregon Topology with BGP
2016
Hasan, S.A.U.The role of topology and contracts in Internet content deliveryUniv. of Carlos III de Madrid Topology with BGP
2016
Greunke, B.Distributed emulation in support of large networksNaval Postgraduate School Topology with BGP
2016
Chiba, D.
Yagi, T.
Akiyama, M.
Shibahara, T.
Yada, T.
Mori, T.
Goto, S.
DomainProfiler: Discovering domain names abused in futureConf. on Dependable Systems and Networks Topology with BGP
2016
Cardona, J.C.Inter-domain traffic management in an evolving Internet peering ecosystemUniv. Carlos III de Madrid Topology with BGP
2016
Teneva, N.
Mudrakarta, P.K.
Kondor, R.
Multiresolution matrix compressionConf. on Artificial Intelligence and Statistics Topology with BGP
2016
Li, S.
Duan, H.
Wang, Z.
Liang, J.
Li, X.
An accurate distributed scheme for detection of prefix interceptionScience China Information Sciences Topology with BGP
2016
Feng, Z.
Xu, M.
Yang, Y.
Revolutionizing the inter-domain business model by information-centric thinkingIEEE Conf. on Communications (ICC) Topology with BGP
2016
Eppstein, D.
Goodrich, M.T.
Lam, J.
Mamano, N.
Mitzenmacher, M.
Torres, M.
Models and algorithms for graph watermarkingarxiv.org Topology with BGP
Topology with Skitter
2016
Zhao, M.
Zhou, W.
Gurney, A.J.T.
Haeberlen, A.
Sherr, M.
Loo, B.T.
Private and verifiable interdomain routing decisionsIEEE/ACM Trans. on Networking (TON) Topology with BGP
2016
Tozal, M.E.The Internet: A system of interconnected autonomous systemsIEEE Systems Conf. (SysCon) Topology with BGP
2016
Revelo, D.
Ricci, M.A.
Donnet, B.
Alvarez-Hamlin, J.I.
Unveiling the MPLS structure on Internet topologyWorkshop on Traffic Monitoring and Analysis (TMA) Topology with BGP
2016
Guo, C.
Karsten, M.
On the feasibility of core-rooted path addressingIEEE/IFIP Network Operations and Management Symp. (NOMS) Topology with BGP
2016
Sukrit, G.
Rami, P.
Konstantin, K.
Comparative network analysis using KronFitComplex Networks Topology with BGP
2016
Niemela, M.Estimating Internet-scale Quality of Service parameters for VoIPLinkoping Univ. Topology with BGP
2016
Kotronis, V.
Kloti, R.
Rost, M.
Georgopoulos, P.
Ager, B.
Schmid, S.
Dimitropoulos, X.
Stitching inter-domain paths over IXPsSymp. on SDN Research Topology with BGP
2016
Frey, S.
Elkhatib, Y.
Rashid, A.
Follis, K.
Vidler, J.
Race, N.
Edwards, C.
It bends but would it break? Topological analysis of BGP infrastructures in EuropeIEEE European Symp. on Security and Privacy (EuroSP) Topology with BGP
2016
Cardona, J.C.
Vissicchio, S.
Lucente, P.
Francois, P.
I cant get no satisfaction: Helping autonomous systems identify their unsatisfied interdomain interestsIEEE Trans. on Network and Service Management Topology with BGP
2016
Agache, A.
Antichi, G.
Eberhardt, F.
Eggert, L.
Hasselmeyer, P.
Hohlfeld, O.
Honda, M.
Ivanov, A.
Kimmerlin, M.
Klauck, S.
Kommeri, J.
Lettieri, G.
Oechsner, S.
Plauth, M.
Raiciu, C.
Ripke, A.
Sarolahti, P.
Schulte, L.
Tsolakou, E.
Wojcik, M.
Initial design of cloud infrastructure and federation mechanismsSSICLOPS Topology with BGP
2016
Zhao, M.Accountability in distributed systems with incomplete informationUniv. of Pennsylvania Topology with BGP
2016
Machado, F.F.Analysis of the degree ranking stability in scale-free networksFederal Univ. of Rio de Janeiro Topology with BGP
2016
Garcia-Robledo, A.
Diaz-Perez, A.
Morales-Luna, G.
Characterization and coarsening of Autonomous System networks: Measuring and simplifying the InternetAdvanced Methods for Complex Network Analysis Topology with BGP
2016
Benson, K.Leveraging Internet background radiation for opportunistic network analysisUniv. of California San Diego Topology with BGP
UCSD Network Telescope
2015
Wassermann, S.
Casas, P.
Donnet, B.
Towards DisNETPerf: a distributed Internet paths performance analyzerACM CoNEXT Student Workshop Topology with BGP
2015
Wang, M.
Zhou, H.
Chen, J.
OpenISMA: An approach of achieving a scalable OpenFlow network by identifiers separating and mappingSymp. on Parallel Architectures, Algorithms and Programming (PAAP) Topology with BGP
2015
Miyao, Y.Network operation system, network operation method and network operation programNec Corp. Topology with BGP
2015
Li, S.
Duan, H.
Li, X.
Real-time system for detecting inter-domain routing man-in-the-middle attacksJ. of Tsinghua Univ. Topology with BGP
2015
Konte, M.Understanding and defending against internet infrastructures supporting cybecrime operationsGeorgia Inst. of Technology Topology with BGP
2015
Yin, X.
Wu, D.
Wang, Z.
Shi, X.
Wu, J.
DIMR: Disjoint Interdomain Multipath RoutingComputer Networks Topology with BGP
2015
Sosnovich, A.
Grumberg, O.
Nakibly, G.
Analyzing Internet routing security using model checkingLecture Notes in Computer Science Topology with BGP
2015
Shah, A.
Papadopoulos, C.
Characterizing international BGP detoursColorado State Univ. Technical Report Topology with BGP
2015
Miyao, Y.Network designing system, network designing method, data transfer path determination method and network designing programNec Corp. Topology with BGP
2015
Meiling, S.
Schmidt, T.C.
Steinbach, T.
On performance and robustness of Internet-based smart grid communication: A case study for GermanyConf. on Smart Grid Communications (SmartGridComm) Topology with BGP
2015
Johnson, A.
Jansen, R.
Jaggard, A.D.
Feigenbaum, J.
Syverson, P.
Avoiding the Man on the Wire: Improving Tors security with trust-aware path selectionarxiv.org Topology with BGP
2015
Hirayama, T.
Toyoda, K.
Sasase, I.
Fast target link flooding attack detection scheme by analyzing traceroute packets flowWorkshop on Information Forensics and Security (WIFS) Topology with BGP
2015
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
One hop for RPKI, one giant leap for BGP securityWorkshop on Hot Topics in Networks Topology with BGP
2015
Chen, Z.
Bi, J.
Fu, Y.
Wang, Y.
Xu, A.
MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDNConf. on Network Protocols (ICNP) Topology with BGP
2015
Cardona, J.Inter-domain traffic management in and evolving Internet peering eco-systemUniv. Carlos III de Madrid Topology with BGP
2015
Szabo, D.
Korosi, A.
Biro, J.
Gulyas, A.
Deductive way of reasoning about the Internet AS level topologyChin. Phys. B Topology with BGP
2015
Meslmawy, M.A.S.Efficient resources management in a distributed computer system, modeled as a dynamic complex systemLe Havre Univ. Topology with BGP
2015
Meslmawy, M.A.S.Efficient resources management in a ditributed computer system, modeled as a dynamic complex systemUniv. du Havre Topology with BGP
2015
Li, S.
Duan, H.
Wang, Z.
Li, X.
Route leaks identification by detecting routing loopsConf. on Security and Privacy in Communication Systems (SecureComm) Topology with BGP
2015
Lareida, A.
Petropoulos, G.
Burger, V.
Seufert, M.
Soursos, S.
Stiller, B.
Augmenting home routers for socially-aware traffic managementConf. on Local Computer Networks (LCN) Topology with BGP
2015
Konte, M.
Perdisci, R.
Feamster, N.
ASwatch: An AS reputation system to expose bulletproof hosting ASesACM SIGCOMM Computer Communication Review Topology with BGP
2015
Hu, X.Y.
Gong, J.
Multipath inter-domain routing for named data networkingJ. on Communications Topology with BGP
2015
Feng, Z.
Xu, M.
Yang, Y.
Li, Q.
Wang, Y.
Li, Q.
Ohlman, B.
Chen, M.
Joint optimization of content replication and traffic engineering in ICNConf. on Local Computer Networks (LCN) Topology with BGP
2015
Chiu, Y.-C.
Schlinker, B.
Radhakrishnan, A.B.
Katz-Bassett, E.
Govindan, R.
Are we one hop away from a better Internet?Internet Measurement Conf. (IMC) Topology with BGP
2015
Anwar, R.
Niaz, H.
Choffnes, D.
Cunha, I.
Gill, P.
Katz-Bassett, E.
Investigating interdomain routing policies in the wildInternet Measurement Conf. (IMC) Topology with BGP
2015
Ahmed, N.
Sarac, K.
An experimental study on inter-domain routing dynamics using IP-level path tracesConf. on Local Computer Networks (LCN) Topology with BGP
2015
Liu, B.
Bi, J.
DISCS: A DIStributed Collaboration System for inter-AS spoofing defenseIntl Conf. on Parallel Processing (ICPP) Topology with BGP
2015
Sha, Z.Decision-centric foundations for complex systems engineering and designPurdue Univ. Topology with BGP
2015
Lee, T.
Szalachowski, P.
Barrera, D.
Perrig, A.
Lee, H.
Watrin, D.
Bootstrapping real-world deployment of future Internet architecturesarxiv.org Topology with BGP
2015
Kurar, B.
Tahboub, R.
Internet scale DoS attacksIntl J. of Applied Mathematics, Electronics and Computers Topology with BGP
2015
Kloti, R.
Kotronis, V.
Ager, B.
Dimitropoulos, X.
Policy-compliant path diversity and bisection bandwidthIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2015
Heilman, E.
Kendler, A.
Zohar, A.
Goldberg, S.
Eclipse attacks on bitcoins peer-to-peer networkUsenix Security Symp. Topology with BGP
2015
Cohen, N.
Coudert, D.
Lancin, A.
On computing the Gromov hyperbolicityJ. of Experimental Algorithmics Topology with BGP
2015
Abu-Ata, M.
Dragan, F.F.
Metric tree-like structures in real-world networks: an empirical studyNetworks Topology with BGP
Topology with Skitter
2015
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type prediction in Internet AS graphsIowa State Univ. Topology with BGP
2015
Hoang, N.P.
Asano, Y.
Yoshikawa, M.
Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable TorConf. on Advanced Communication Technology (ICACT) Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Brief announcement: Routing the Internet with very few entriesSymp. on Principles of Distributed Computing (PODC) Topology with BGP
2015
Rye, E.C.Evaluating the limits of network topology inference via virtualized network emulationNaval Postgraduate School Topology with BGP
2015
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.-J.
Perrig, A.
Designing a global authentication infrastructurearxiv.org Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Routing the Internet with fifteen entriesMeeting on Algorithmic Aspects of Telecommunications (ALGOTEL) Topology with BGP
2015
Eikema, B.BGP routing security and deployment strategiesUniv. of Amsterdam Topology with BGP
2015
Dinh, T.N.
Thai, M.T.
Network under joint node and link attacks: Vulnerability assessment methods and analysisIEEE/ACM Trans. on Networking (TON) Topology with BGP
2015
Chen, C.
Matsumoto, S.
Perrig, A.
ECO-DNS: Expected consistency optimization for DNSIntl. Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2015
Tao, N.
Chen, X.
Fu, X.
AS path inference: From complex network perspectiveNetworking Conf. (IFIP) Topology with BGP
2015
Niaz, M.Measuring routing policies on the InternetStony Brook Univ. Topology with BGP
2015
Lee, J.Y.
Oh, J.C.
A node-centric reputation computation algorithm on online social networksApplications of Social Media and Social Network Analysis Topology with BGP
2015
Fonseca, O.
Fazzion, E.
Cunha, I.
Las-Casas, P.
Guedes, D.
Meira, W.
Hoepers, C.
Steding-Jessen, K.
Chaves, M.H.P.C.
A spam traffic cost analysis for network operatorsBrazilian Symp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2015
DIgnazio, A.
Giovannetti, E.
Predicting internet commercial connectivity wars: The impact of trust and operators asymmetryIntl J. of Forecasting Topology with BGP
2015
Rye, E.
Rohrer, J.
Graph reduction for emulated network experimentationNaval Postgraduate School Topology with BGP
2015
Fanou, R.
Francois, P.
Aben, E.
On the diversity of interdomain routing in AfricaLecture Notes in Computer Science (LNCS) Topology with BGP
2015
Erunika, O.
Kaneko, K.
Taraoka, F.
Performance evaluation of host-based mobility management schemes in the InternetIntl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU) Topology with BGP
2015
Wang, H.
Cui, W.
Xiao, Y.
Tong, H.
Robust network construction against intentional attacksConf. on Big Data and Smart Computing (BIGCOMP) Topology with BGP
2015
Nakata, Y.
Arakawa, S.
Murata, M.
A provider and peer selection policy for the future sustainable internetIntl J. of Management and Network Economics Topology with BGP
2015
Kotronis, V.Centralizing routing control across domains: Architectural approach and prominent use casesETH Zurich Topology with BGP
2015
Eberle, W.
Holder, L.
Scalable anomaly detection in graphsIntelligent Data Analysis Topology with BGP
2015
Ascigil, M.O.Design of a scalable path service for the InternetUniv. of Kentucky Topology with BGP
2015
Acedo, J.C.Evolution of the Internet topology from a regional perspectiveUniv. of Arizona Topology with BGP
2014
Palacin, M.
Bikfalvi, A.
Oliver, M.
Mercury: Revealing hidden interconnections between access ISPs and content providersEUNICE Topology with BGP
2014
Johnson, T.
Lazos, L.
Network anomaly detection using autonomous system flow aggregatesIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2014
Ahmed, N.
Kamil, Sarac
Measuring path divergence in the InternetConf. on Performance Computing and Communications (IPCCC) Topology with BGP
2014
Lodhi, A.H.The economics of internet peering interconnectionsGeorgia Inst. of Technology Topology with BGP
2014
Hiran, R.
Carlsson, N.
Shahmehri, N.
PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based securityACM Workshop on Information Sharing and Collaborative Security Topology with BGP
2014
Yang, H.
Lam, S.S.
Collaborative verification of forward and reverse reachability in the Internet data planeIEEE Conf. on Network Protocol (ICNP) Topology with BGP
2014
Sousa, A.C.M.Scaling the Internet routing system through route aggregationTecnico Lisboa Topology with BGP
2014
Sha, Z.
Panchal, J.
Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice modeConf. on Systems, Man, and Cybernetics (SMC) Topology with BGP
2014
Retvari, G.
Szabo, D.
Gulyas, A.
Korosi, A.
Tapolcai, J.
An information-theoretic approach to routing scalabilityWorkshop on Hot Topics in Networks (HotNets) Topology with BGP
2014
Gamperli, A.
Kotronis, V.
Dimitropoulos, X.
Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation frameworkSIGCOMM Computer Communication Review Topology with BGP
2014
Eberle, W.
Holder, L.
A partitioning approach to scaling anomaly detection in graph streamsIntl. Conf. on Big Data Topology with BGP
2014
Antikainen, M.
Aura, T.
Sarela, M.
Denial-of-service attacks in bloom-filter-based forwardingIEEE/ACM Trans. on Networking (TON) Topology with BGP
2014
Wang, J.M.
Dai, X.
Bensaou, B.
Content peering in content centric networksIEEE Conf. on Local Computer Networks Topology with BGP
2014
Wu, X.
Griffioen, J.
Supporting application-based route selectionConf. on Computer Communication and Networks (ICCCN) Topology with BGP
2014
Nozaki, Y.Tiered based addressing in internetwork routing protocols for the future InternetRochester Inst. of Technology Topology with BGP
2014
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing the impact of cascading failures on the interdomain routing system of the InternetNew Generation Computing Topology with BGP
2014
Sankey, J.
Wright, M.
Dovetail: stronger anonymity in next-generation Internet routingSymp. on Privacy Enhancing Technologies (PETS) Topology with BGP
2014
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols?Computer Networks Topology with BGP
2014
Gersch, J.
Massey, D.
Papadopoulos, C.
Incremental deployment strategies for effective detection and prevention of BGP origin hijacksConf. on Distributed Computing Systems (ICDCS) Topology with BGP
2014
Bangera, P.
Gorinsky, G.
Economics of traffic attraction by transit providersIFIP Networking Conf. Topology with BGP
2014
Ascigil, O.
Calvert, K.L.
Griffioen, J.N.
On the scalability of interdomain path computationsNetworking Conf. (IFIP) Topology with BGP
2014
Amaral, P.
Bernardo, L.
Pinto, P.F.
Multipath policy routing for the inter-domain scenarioIntl Conf. on Communications (ICC) Topology with BGP
2014
Zhu, M.
Liu, Y.
Li, J.
Wu, J.
CCOF: Congestion control on the fly for inter-domain routingWorkshop on Local and Metropolitan Area Networks (LANMAN) Topology with BGP
2014
Zhu, M.
Li, J.
Liu, Y.
Li, D.
Wu, J.
TED: Inter-domain traffic engineering via deflectionSymp. of Quality of Service (IWQoS) Topology with BGP
2014
Qazi, S.
Moors, T.
Disjoint-path selection in Internet: What traceroutes tell us?arxiv.org Topology with BGP
2014
Li, M.
Wang, H.
Yang, J.
Li, C.
A value based framework for provider selection of regional ISPsSymp. on Network Operations and Management (NOMS) Topology with BGP
Topology with Skitter
2014
Borici, A.
Thomo, A.
Semantic graph compression with hypergraphsConf. on Advanced Information Networking and Applications (AINA) Topology with BGP
2014
Abu-Ata, M.M.Tree-like structure in graphs and embedability to treesKent State Univ. Topology with BGP
2014
Visala, K.
Keating, A.
Khan, R.H.
Models and tools for the high-level simulation of a name-based interdomain routing architectureComputer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2014
Sha, Z.
Panchal, J.H.
Estimating local decision-making behavior in complex evolutionary systemsJ. of Mechanical Design Topology with BGP
2014
Sahhaf, S.
Tavernier, W.
Colle, D.
Pickavet, M.
Demeester, P.
Availability analysis of resilient geometric routing on Internet topologyConf. on Design of Reliable Communication Networks (DRCN) Topology with BGP
2014
Hasan, S.
Gorinsky, S.
Dovrolis, C.
Sitaraman, R.K.
Trade-offs in optimizing the cache deployments of CDNsIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2014
Chen, K.
Fhoffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P usersIEEE Trans. on Computers Topology with BGP
2014
Mazloum, R.
Buob, M.-O.
Auge, J.
Baynat, B.
Ross, D.
Friedman, T.
Violation of interdomain routing assumptionsPassive and Active Measurement (PAM) Topology with BGP
2014
Laszka, A.
Johnson, B.
Grossklags, J.
Felegyhazi, M.
Estimating systematic risk in real-world networksConf. on Financial Cryptography and Data Security Topology with BGP
2014
Shi, J.
Zhang, B.
Making inter-domain routing power-aware?Conf. on Computing, Networking and Communications (ICNC) Topology with BGP
2014
Houmansadr, A.
Wong, E.L.
Shmatikov, V.
No direction home: The true cost of routing around decoysNetwork and Distributed System Security Symp. (NDSS) Topology with BGP
2014
Tan, F
Wu, J.
Xia, Y.
Tse, C.K.
Traffic congestion in interconnected complex networksarxiv.org Topology with BGP
2014
Geva, M.
Herzberg, A.
Gev, Y.
Bandwidth Distributed Denial of Service: Attacks and defensesIEEE Security and Privacy Topology with BGP
2013
Lee, S.B.
Kang, M.S.
Gligor, V.D.
CoDef: Collaborative defense against large-scale link-flooding attacksACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eriksson, B
Durairajan, R.
Barford, P.
RiskRoute: A framework for mitigating network outage threatsACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eberle, W.
Holder, L.
Incremental anomaly detection in graphsConf. on Data Mining Workshops Topology with BGP
2013
Gersch, J.
Massey, D.
Characterizing vulnerability to IP hijack attemptsIEEE Conf. on Technologies for Homeland Security (HST) Topology with BGP
2013
Zhao, M.
Aditya, P.
Chen, A.
Lin, Y.
Haeberlen, A.
Druschel, P.
Maggs, B.
Wishon, B.
Ponec, M.
Peer-assisted content distribution in Akamai NetSessionInternet Measurement Conf. (IMC) Topology with BGP
2013
Papadopoulos, S.
Theodoridis, G.
Tzovaras, D.
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomaliesVisualization for Cyber Security (VizSec) Topology with BGP
2013
Karaarslan, E.
Perez, A.G.
Siaterlis, C.
Recreating a large-scale BGP incident in a realistic environmentInformation Sciences and Systems , Proc Symp. on Computer and Information Sciences Topology with BGP
2013
Bangera, P.
Gorinsky, S.
An economic perspective on traffic attraction by Internet transit providersIEEE Conf. on Network Protocols (ICNP) Topology with BGP
2013
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attackHong Kong Univ. of Science and Technology Topology with BGP
UCSD Network Telescope
2013
Meirom, E.A.
Mannor, S.
Orda, A.
Network formation games and the Internet structurearxiv.org Topology with BGP
2013
Lian, W.
Rescorla, E.
Shacham, H.
Savage, S.
Measuring the practical impact of DNSSEC deploymenUsenix Security Conf. (SEC) Topology with BGP
2013
Lee, J.Y.
Oh, J.C.
A model for recursive propagations of reputations in social networksIEEE/ACM Conf. on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2013
Wang, Y.
Wang, Z.
Zhang, L.
An epidemic-dynamics-based model for CXPST spreading in inter-domain routing systemConf. on Bio-Inspired Computing: Theories and Applications (BIC-TA) Topology with BGP
2013
Nappa, A.
Rafique, M.Z.
Caballero1, J.
Driving in the cloud: An analysis of drive-by download operations and abuse reportingConf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing survivability of inter-domain routing system under cascading failuresFrontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC) Topology with BGP
2013
Kaur, B.
Kahlon, K.S.
Sharma, S.
Inter-domain routing with shielded infrastructure and buzzer techniqueIntl J. of Computer Applications Topology with BGP
2013
Pacifici, V.
Dan, G.
Stable content-peering of autonomous systems in a content-centric networkSwedish National Computer Networking Workshop (SNCNW) Topology with BGP
2013
Misseri, X.
Gojmerac, I.
Rougier, J.-L.
IDRD: Enabling inter-domain route diversityIEEE Conf. on Communications (ICC) Topology with BGP
2013
Lehrieder, F.Performance evaluation and optimization of content distribution using overlay networksJulius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE Topology with BGP
2013
Sankey, J.MDovetail: stronger anonymity in next-generation Internet routingUniv. Texas, Arlington, TX, US Topology with BGP
2013
Jiang, J.
Luo, J.
Li, W.
Lu, Y.
Constraint conditions to eliminate AS incentive of lying in interdomain routingSymp. on Integrated Network Management (IM) Topology with BGP
2013
Hsiao, H.-C.
Kim, T.H.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.
Perrig, A.
STRIDE: Sanctuary Trail - Refuge from Internet DDoS EntrapmentACM SIGSAC Symp. on Information, computer and communications security (ASIACSS) Topology with BGP
2013
Pacifici, V.
Dan, G.
Content-peering dynamics of autonomous caches in a content-centric networkIEEE INFOCOM Topology with BGP
2013
Neudorfer, L.
Shavitt, Y.
Zilberman, N.
Improving AS relationship inference using PoPsIEEE INFOCOM Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
Taenaka, Y.
Hazeyama, H.
PhishCage: reproduction of fraudulent websites in the emulated InternetICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
COSMO - Emulation of Internet traffic (poster abstract)ICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyachi, T.
Miwa, S.
Design and implementation of XBurnerICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Marchetta, P.
de Donato, W.
Pescape, A.
Detecting third-party addresses in traceroute traces with IP timestamp optionPassive and Active Measurement (PAM) Topology with BGP
2013
Camacho, J.M.
Garcia-Martinez, A.
Bagnulo, M.
Valera, F.
BGP-XM: BGP eXtended multipath for transit Autonomous SystemsComputer Networks Topology with BGP
2013
Matsuda, K.
Hasegawa, G.
Kamei, S.
Murata, M.
A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurementIEICE Trans. on Information and Systems Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
A study of IP prefix hijacking in cloud computing networksSecurity Comm. Networks Topology with BGP
2013
Qin, D.
Yang, J.
Wang, H.
Experimental study on diversity and novelty of interdomain pathsChinese J. of Electronics Topology with BGP
2013
Palacin, M.
Oliver, M.
Infante, J.
Oechsner, S.
Bikfalvi, A.
The impact of content delivery networks on the Internet ecosystemJ. of Information Policy Topology with BGP
2013
Moses, K.V.Improving IP-based geo-location through Internet topology and geospatial datasetsDuke Univ., Durham, NC, US Topology with BGP
2013
Mislove, A.
Koppula, H.S.
Gummadi, K.P.
Druschel, P.
Bhattacharjee, B.
An empirical validation of growth models for complex networksDynamics On and Of Complex Networks Topology with BGP
2013
Erola, P.
Gomez, S.
Arenas, A.
On the routability of the InternetDynamics On and Of Complex Networks Topology with BGP
2013
Dhin, T.N.Complex networks under attacks: Vulnerability assessment and optimizationFlorida Univ. Topology with BGP
2013
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-Betweenness vertices from heterogeneous networksThe Influence of Technology on Social Network Analysis and Mining, Ch. 11 Topology with BGP
2012
Vasilakos, X.
Katsaros, K.
Xylomenos, G.
Cloud computing for global name-resolution in information-centric networksIEEE Symp. on Network Cloud Computing and Applications (NCCA) Topology with BGP
2012
Meyer, S.
Wahlisch, M.
Schmidt, T.C.
Exploring reachability via settlement-free peeringACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2012
Ekbatani, H.R.Investigating the mutual impact of the P2P overlay and the AS-level underlayUniv. Oregon, Eugene, OR, US Topology with BGP
2012
Schuchard, M.
Geddes, J.
Thompson, C.
Hopper, N.
Routing around decoysACM Conf. on Computer and Communications Security (CCS) Topology with BGP
2012
Dinh, T.N.
Shen, Y.
Thai, M.T.
An efficient spectral bound for link vulnerability assessment in large-scale networksIEEE Military Communications Conf. (MILCOM) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
A tale of nine Internet exchange points: studying path latencies through major regional IXPsIEEE Conf. on Local Computer Networks (LCN) Topology with BGP
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the Internet evolutionNetwork Operations and Management Symp. (APNOMS) Topology with BGP
2012
Juen, J.Protecting anonymity in the presence of autonomous system and internet exchange level adversariesUniv. Illinois, Urbana-Champaign Topology with BGP
2012
Cohen, N.
Couderty, D.
Lancin, A.
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphsProject-Team MASCOTTE, INRIA Topology with BGP
2012
Burger, V.
Lehrieder, F.
Hossfeld, T.
Seedorf, J.
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarmsTeletraffic Congress (ITC) Topology with BGP
2012
Rajahalma, J.Inter-domain incentives and Internet architectureAalto Univ., FI Topology with BGP
2012
Orman, G.K.
Labatut, V.
Cherifi, H.
Comparative evaluation of community detection algorithms: a topological approachJ. Stat. Mechanics: Theory and Experiment Topology with BGP
2012
Gjoka, M.
Kurant, M.
Markopoulou, A.
2.5K-graphs: from sampling to generationarxiv.org Topology with BGP
2012
Beben, A.
Batalla, J.M.
Chai, W.K.
Sliwinski, J.
Multi-criteria decision algorithms for efficient content delivery in content networksAnn. Telecommunications Topology with BGP
2012
Ager, B.
Chatzis, N.
Feldmann, A.
Sarrar, N.
Uhlig, S.
Willinger, W.
Anatomy of a large European IXPACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2012
Sherry, J.
Kim, D.
Mahalingam, S.
Tang, A.
Wang, S.
Ratnasamy, S.
Netcalls: End host function calls to network traffic processing servicesUC Berkeley Topology with BGP
2012
Fujikawa, K.
Tazaki, H.
Harai, H.
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS networkSymp. on Applications and the Internet (SAINT) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Evaluating end-user network benefits of peering with path latenciesIEEE Conf. on Computer Communications and Networks (ICCCN) Topology with BGP
2012
Tomasik, J.
Weisser, M.-A.
The inter-domain hierarchy in measured and randomly generated AS-level topologiesIEEE Conf. on Communications (ICC) Topology with BGP
2012
Sobrinho, J.L.
Tiago Quelhas, T.
A theory for the connectivity discovered by routing protocolsIEEE/ACM Trans. on Networking (TON) Topology with BGP
2012
Keating, A.Models for the simulation of a name-based interdomain routing architectureAalto Univ., FI Topology with BGP
2012
Hsiao, H.-C.
Kim, T.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.D.
Perrig, A.
Sanctuary trail: refuge from Internet DDoS entrapmentCarnegie Mellon Univ. Topology with BGP
2012
Deng, W.
Muhlbauer, W.
Yang, Y.
Zhu, P.
Lu, X.
Plattner, B.
Shedding light on the use of AS relationships for path inferenceJ. Communications and Networks Topology with BGP
2012
Cesareo, J.Optimizing implicit proxy placement to evade traffic filtersPrinceton Univ. Topology with BGP
2012
Cesareo, J.
Karlin, J.
Schapira, M.
Rexford, J.
Optimizing the placement of implicit proxiesPrinceton Univ. Topology with BGP
2012
Tozal, M.E.
Sarac, K.
Estimating network layer subnet characteristics via statistical samplingIFIP TC 6 Networking Conf. Topology with BGP
2012
Seibert, J.Security and economic implications of localizing traffic in overlay networksPurdue Univ. Topology with BGP
2012
Saucez, D.
Donnet, B.
On the dynamics of locators in LISPNetworking Topology with BGP
2012
Nozaki, Y.
Tuncer, H.
Shenoy, N.
ISP tiered model based architecture for routing scalabilityIEEE Conf. on Communications (ICC) Topology with BGP
2012
Liu, Y.
Su, J.
Chang, R.K.C.
LDC: Detecting BGP prefix hijacking by load distribution changeParallel and Distributed Processing Symp. Workshops (IPDPSW) Topology with BGP
2012
Hasan, S.
Gorinsky, S.
Obscure giants: detecting the provider-free ASesNetworking Topology with BGP
2012
Chaudhury, A.
Basuchowdhuri, P.
Majumder, S.
Spread of information in a social network using influential nodesAdvances in Knowledge Discovery and Data Mining Topology with BGP
2012
Chai, W.K.
He, D.
Psaras, I.
Pavlou, G.
Cache less for more in information-centric networksNetworking Topology with BGP
2012
Pasquini, R.
Verdi, F.L.
Magalhaes, M.F.
Towards local routing state in the future internetWPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2012
Liu, H.
Hu, X.
Zhao, D.
Lu, X.
Failure isolation based defense against Internet CXPST-like attackJ. Hybrid Information Technology Topology with BGP
2012
Strowes, S.D.
Perkins, C.
Harnessing Internet topological stability in Thorup-Zwick compact routingIEEE INFOCOM Topology with BGP
2012
Sobrinho, J.L.
Le, F.
A fresh look at inter-domain route aggregationIEEE INFOCOM Topology with BGP
2012
Ribeiro, B.
Basu, P.
Towsley, D.
Multiple random walks to uncover short paths in power law networksIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Qin, D.
Yang, J.
Liu, Z.
Wang, H.
Zhang, B.
Zhang, W.
AMIR: Another multipath interdomain routingIEEE Conf. on Advanced Information Networking and Applications (AINA) Topology with BGP
2012
Lutu, A.
Bagnulo, M.
Stanojevic, R.
An economic side-effect for prefix deaggregationIEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Grey, M.
Rossberg, M.
Schaefer, G.
Automatic creation of VPN backup paths for improved resilience against BGP-attackersACM Symp. on Applied Computing (SAC) Topology with BGP
2012
Qin, D.
Yang, J.
Wang, H.
Zhang, B.
Gao, L.
Liu, Z.
Multipath interdomain routing via deviation from primary pathConf. on Information Networking (ICOIN) Topology with BGP
2012
Edwards, B.
Hofmeyr, S.
Stelle, G.
Forrest, S.
Internet topology over timearxiv.org Topology with BGP
2012
Wei, W.
Yingjie, X.
Yabo, D.
ASTVA: DDoS-limiting architecture for Next Generation InternetAdv. Materials Research Topology with BGP
2012
Chen, Y.
Le Merrer, E.
Li, Z.
Yaning Liu, Y.
Simon, G.
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTVComputer Networks Topology with BGP
2011
Drivere, A.A.Can we study the topology of the Internet from the vantage points of large and small content providers?Youngstown State Univ. Topology with BGP
2011
Liu, Y.
Peng, W.
Su, J.
Study on IP prefix hijacking in cloud computing networks based on attack planningConf. on Trust, Security and Privacy in Computing and Communications (TrustCom) Topology with BGP
2011
Chen, M.
Yu, L.
Bai, H.
Two propositions about geographical distributions of BitTorrent file resourcesConf. on Informatics, Cybernetics, and Computer Engineering (ICCE) Topology with BGP
2011
Takahashi, Y.
Ishibashi, K.
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted trafficConf. on Network Games, Control and Optimization (NetGCooP) Topology with BGP
2011
Kurant, M.
Markopoulou, A.
Towards unbiased BFS samplingIEEE J. Selected Areas in Communications Topology with BGP
2011
Gjoka, M.
Kurant, M.
Butts, C.T.
Markopoulou, A.
Practical recommendations on crawling online social networksIEEE J. Selected Areas in Communications Topology with BGP
2011
Zhang, B.-F.
Li, Y.
Liu, Y.-J.
Su, J.-S.
Analysis of prefix hijacking based on AS hierarchical modelConf. on Network and System Security (NSS) Topology with BGP
2011
Szekeres, A.Multi-path inter-domain routing: The impact on BGPs scalability, stability and resilience to link failuresUniv. Politehnica of Bucharest and Vrije Univ. Amsterdam Topology with BGP
2011
Alvarez-Hamelin, J.I.
Anunziata, D.
Beiro, M.G.
Barrat, A.
DallAsta, L.
Vespignani, A.
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool)Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires Topology with BGP
2011
Wong, E.L.
Shmatikov, V.
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routingConf. on Dependable Systems and Networks (DSN) Topology with BGP
2011
Strowes, S.D.
Mooney, G.
Perkins, C.
Compact routing on the Internet AS-graphIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2011
Liu, Y.
Dai, B.
Zhu, P.
Su, J.
Whom to convince? It really matters in BGP prefix hijacking attack and defenseFuture Information Technology Topology with BGP
2011
Karaoglu, H.T.
Yuksel, M.
Gunes, M.H.
On the scalability of path exploration using opportunistic path-vector routingIEEE Conf. on Communications (ICC) Topology with BGP
2011
Helminger, M.Interactive visualization of global routing dynamicsTechnische Univ. Muenchen, Faculty of Informatics Topology with BGP
2011
Amaral, P.
Silva, E.
Bernardo, L.
Pinto, P.
Inter-domain traffic engineering using an AS-level multipath routing architectureIEEE Conf. on Communications (ICC) Topology with BGP
2011
Siritana, H.
Kitisin, S.
Gertphol, S.
A study of autonomous system relationships within ThailandConf. on Computer Science and Software Engineering (JCSSE) Topology with BGP
2011
Akashi, O.Analysis of cooperative management strategies against route-hijackingIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
Topology with Skitter
2011
Scholz, J.
Greiner, M.
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metricsEPL (Europhysics Letters) Topology with BGP
Topology with Skitter
2011
Deng, W.
Karaliopoulos, M.
Muehlbauer, W.
Zhu, P.
Lu, X.
Plattner, B.
k-Fault tolerance of the Internet AS graphComputer Networks Topology with BGP
2011
Deng, W.
Zhu, P.
Xiong, N.
Xiao, Y.
Xiaofeng, H.
How resilient are individual ASes against AS-level link failures?IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2011
Wu, H.
Kvizhinadze, G.
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequenciesStatistics and Probability Letters Topology with BGP
2011
Melnik, S.
Hackett, A.
Porter, M.A.
Mucha, P.J.
Gleeson, J.P.
The unreasonable effectiveness of tree-based theory for networks with clusteringPhys. Rev. E Topology with BGP
Topology with Skitter
2011
Bangera, P.
Gorinsky, S.
Impact of prefix hijacking on payments of providersConf. on Communication Systems and Networks (COMSNETS) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing systemJ. of Next Generation Information Technology Topology with BGP
2010
Rasti, A.H.
Magharei, N.
Rejaie, R.
Willinger, W.
Eyeball ASes: from geography to connectivityInternet Measurement Conf. (IMC) Topology with BGP
2010
Huang, D.
Zhao, J.
Wang, X.
Trading bandwidth for playback lag: Can active peers help?Multi-media Conf. Topology with BGP
2010
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols?ACM SIGCOMM Computer Communication Review Topology with BGP
2010
Asai, H.
Esaki, H.
Towards interdomain transit traffic reduction in peer-assisted content delivery networksSymp. on Telecommunications Network Strategy and Planning (NETWORKS) Topology with BGP
2010
Asai, H.
Esaki, H.
Estimating AS relationships for application-layer traffic optimizationWorkshop on Incentives, Overlays, and Economic Traffic Control (ETM) Topology with BGP
2010
Hanif, S.Impact of topology on BGP convergenceDept. Computer Science, VU Univ. Amsterdam Topology with BGP
2010
Guo, T.
Wang, N.
Tafazolli, R.
Moessner, K.
Policy-aware virtual relay placement for inter-domain path diversityIEEE Symp. on Computers and Communications (ISCC) Topology with BGP
2010
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-betweenness verticesConf. on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2010
Elena, E.
Rougier, J.
Secci, S.
Characterisation of AS-level path deviations and multipath in Internet routingEURO-NF Conf. on Next Generation Internet (NGI) Topology with BGP
2010
Vilhar, A.
Novak, R.
Kandus, G.
The impact of network topology on the performance of MAP selection algorithmsComputer Networks Topology with BGP
2010
Tarkoma, S.
Antikainen, M.
Canopy: publish/subscribe with upgraph combinationIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Rajahalme, J.Incentive-informed inter-domain multicastIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Hu, C.
Chen, K.
Chen, Y.
Liu, B.
Evaluating potential routing diversity for internet failure recoveryIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Dou, B-L
Wang, X-G
Zhang, S-Y
Robustness of networks against cascading failuresPhysica A: Statistical Mechanics and its Applications Topology with BGP
2010
Xuan, Q.
Du, F.
Wu, T-J
Partially ordered sets in complex networksJ. Phys. A: Math. Theor. Topology with BGP
2010
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Bonaventura, O.
Extracting intra-domain topology from mrinfo probingPassive and Active Measurement (PAM) Topology with BGP
2010
DiBenedetto, S.
Stone, A.
Strout, M.
Massey, D.
Simulating internet scale topologies with metaroutingColorado State Univ. Topology with BGP
2010
Chen, K.
Hu, C.
Zhang, W.
Chen, Y.
Liu, B.
On the eyeshots of BGP vantage pointsIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2010
Amaral, P.
Ganhao, F.
Assuncao, C.
Bernardo, L.
Pinto, P.
Scalable multi-region routing at inter-domain levelIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
A study of hinge-transmit property of BGP routing systemForum on Computer Science-Technology and Applications (IFCSTA) Topology with BGP
2009
Strowes, S.D.
Perkins, C.
Deterministic, reduced-visibility inter-domain forwardingACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Rajahalme, J.
Sarela, M.
Visala, K.
Riihijarvi, J.
Inter-domain rendezvous service architecturePSIRP (TR09-003) Topology with BGP
2009
Miller, K.
Eliassi-Rad, T.
Continuous time group discovery in dynamic graphsWorkshop on Analyzing Networks and Learning with Graphs (NIPS) Topology with BGP
2009
Chen, K.
Choffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P usersACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Merindol, P.
Van den Schrieck, V.
Donnet, B.
Bonaventure, O.
Pansiot, J.-J.
Quantifying ASes multiconnectivity using multicast informationInternet Measurement Conf. (IMC) Topology with BGP
2009
Studer, A.
Perrig, A.
The coremelt attackSymp. on Research in Computer Security (ESORICS) Topology with BGP
2009
Shu, W.
Changjia, C.
Backup routing for BGP: Virtual ring routing schemeIEEE Conf. on Computer Science and Information Technology (ICCSIT) Topology with BGP
2009
Avramopoulos, I.
Suchara, M.
Protecting DNS from routing attacks: a comparison of two alternative anycast implementationsIEEE Security and Privacy Topology with BGP
2009
Miwa, S.
Suzuki, M.
Hazeyama, H.
Uda, S.
Miyachi, T.
Kadobayashi, Y.
Shinoda, Y.
Experiences in emulating 10K AS topology with massive VM multiplexingACM workshop on Virtualized infrastructure systems and architectures Topology with BGP
2009
Guoqiang, Y.
Wenhua, D.
An efficient algorithm for AS path inferringConf. on Hybrid Information Technology Topology with BGP
2009
Cittadini, L.
Rimondini, M.
Corea, M.
Di Battista, G.
On the feasibility of static analysis for BGP convergenceIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
2009
Asai, H.
Esaki, H.
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNsAsia Future Internet summer school, Jeju, Korea Topology with BGP
2009
Amaral, P.
Bernardo, L.
Pinto, P.
DTIA: An Architecture for Inter-Domain RoutingIEEE Conf. on Communications (ICC) Topology with BGP
2009
Bui, Q.D.
Jennings, A.
Relay node selection in large-scale VoIP overlay networksConf. on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2009
Xu, Y.
Zhang, W.
A power-law approach on router-level internet macroscopic topology modelingFuzzy Information and Engineering, Volume 2 Topology with BGP
2009
Shavitt, Y.
Shir, E.
Weinsberg, U.
Near-deterministic inference of AS relationshipsConf. on Telecommunications (ConTEL) Topology with BGP
2009
Asai, H.
Esaki, H.
A methodology for magnitude-based inter-AS distance estimationWIT, Hokkaido, Japan Topology with BGP
2009
DIgnazio, A.
Giovannetti, E.
Asymmetry and discrimination in Internet peering: evidence from the LINXJ. Industrial Organization Topology with BGP
2009
Di Menna, A.
Refice, T.
Cittadini, L.
Di Battista, G.
Measuring route diversity in the internet from remote vantage pointsIEEE Conf. on Networking (ICN) Topology with BGP
2009
Weinsberg, U.
Shavitt, Y.
Shir, E.
Near-deterministic inference of AS relationshipsIEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2009
Liu, B.
Cui, Y.
Lu, Y.
Xue, Y.
Locality-awareness in BitTorrent-like P2P applicationsIEEE Trans. on Multimedia Topology with BGP
2009
Hasegawa, G.
Hiraoka, Y.
Murata, M.
Evaluation of free-riding traffic problem in overlay routing and its mitigation methodConf. on Networking and Services (ICNS) Topology with BGP
2009
Haeberlen, A.
Avramopoulos, I.
Rexford, J.
Druschel, P.
NetReview: detecting when interdomain routing goes wrongUsenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2009
Eberle, W.
Holder, L.
Cook, D.
Identifying threats using graph-based anomaly detectionMachine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4 Topology with BGP
2009
Zhang, G.Measuring the impacts of sampling bias on internet AS-level topology inferenceWRI Conf. on Communications and Mobile Computing (CMC) Topology with BGP
2009
Lumezanu, C.
Baden, R.
Spring, N.
Bhattacharjee, B.
Triangle inequality and routing policy violations in the internetPassive and Active Measurement (PAM) Topology with BGP
2009
Leskovec, J.
Lang, K.J.
Dasgupta, A.
Mahoney, M.W.
Large-scale community structure in social and information networksCarnegie Mellon Univ. Topology with BGP
Topology with Skitter
2009
Puzis, R.
Yagil, D.
Elovici, Y.
Braha, D.
Collaborative attack on internet users anonymityInternet Research Topology with BGP
2008
Kang, U.
Tsourakakis, C.
Appel, A.P.
Faloutsos, C.
Leskovec, J.
HADI: Fast diameter estimation and mining in massive graphs with HadoopCarnegie Mellon Univ. Topology with BGP
2008
Hei, Y.
Nakao, A.
Hasegawa, T.
Ogishi, T.
Yamamoto, S.
AS alliance: cooperatively improving resilience of intra-alliance communicationACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2008
Serrano, M.A.
De Los Rios, P.
Structural efficiency of percolated landscapes in flow networksPlos One Topology with BGP
2008
MacArthur, B.D.
Sanchez-Garcia, R.J.
Anderson, J.W.
Symmetry in complex networksDiscrete Applied Mathematics Topology with BGP
2008
Vilhar, A.
Novak, R.
Policy relationship annotations of predefined AS-level topologiesComputer Networks Topology with BGP
2008
Wojciechowski, M.Border Gateway modeling and simulationDep. Computer Science, VU Univ. Amsterdam Topology with BGP
2008
Raghavan, V.
Riley, G.
Jaafar, T.
Realistic topology modeling for the internet BGP infrastructureIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with BGP
2008
Hazeyama, H.
Suzuki, M.
Miwa, S.
Miyamoto, D.
Kadobayashi, Y.
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasuresConf. on Cyber Security Experimentation and Test Topology with BGP
2008
Katz, G.J.
Kider, J.T.
All-pairs shortest-paths for large graphs on the GPUACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware Topology with BGP
2008
Li, L.
Chen, C.
Exploring possible strategies for competitions between Autonomous SystemsIEEE Conf. on Communications (ICC) Topology with BGP
2008
John, J.P.
Katz-Bassett, E.
Krishnamurthy, A.
Anderson, T.
Venkataramani, A.
Consensus routing: the internet as a distributed systemUsenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2008
Xiao, Y.
MacArthur, B.D.
Wang, H.
Xiong, M.
Wang, W.
Network quotients: structural skeletons of complex systemsPhys. Rev. E Topology with BGP
2007
Qazi, S.
Moors, T.
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networksIEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2007
Muehlbauer, W.
Uhlig, S.
Fu, B.
Meulle, M.
Maennel, O.
In search for an appropriate granularity to model routing policiesACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Ballani, H.
Francis, P.
Zhang, X.
A study of prefix hijacking and interception in the internetACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Wu, J.
Zhang, Y.
Mao, Z.M.
Shin, K.G.
Internet routing resilience to failures: analysis and implicationsACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2007
Huang, C.
Li, J.
Ross, K.W.
Can internet video-on-demand be profitable?ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2006
Restrepo, J.G.
Ott, E.
Hunt, B.R.
Characterizing the dynamical importance of network nodes and linksPhys. Rev. Lett. Topology with BGP
2006
DIgnazio, A.
Giovannetti, E.
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approachJ. Competition Law and Economics Topology with BGP
2020
Yeganeh, Bahador
Durairajan, Ramakrishnan
Rejale, Reza
Willinger, Walter
A First Comparative Characterization of Multi-cloud Connectivity in Today InternetPassive and Active Measurement Topology with Skitter
2018
Qiu, K.
Zhu, Y.
Yuan, J.
Zhao, J.
Wang, X.
Wolf, T.
ParaPLL: Fast parallel shortest-path distance query on large-scale weighted graphsIntl Conf. on Parallel Processing Topology with Skitter
2018
Murugesan, V.
Shalini, M.
Yang, M.H.
Design and analysis of hybrid single packet IP traceback schemeIET Networks Topology with Skitter
2018
Rezvanian, A.
Saghiri, A. M.
Vahidipour, S. M.
Esnaashari, M.
Meybodi, M. R.
Learning Automata for Cognitive Peer-to-Peer NetworksRecent Advances in Learning Automata Topology with Skitter
2018
Murugesan, V.
Selvaraj, M. S.
Yang, M. H.
HPSIPT: A high-precision single-packet IP traceback schemeComputer Networks Topology with Skitter
2018
Murugesan, V.
Selvaraj, M.
UDP based IP Traceback for Flooding DDoS AttackThe International Arab Journal of Information Technology Topology with Skitter
2018
Cai, J.
Luo, J. Z.
Liu, Y.
Wei, W.
Lei, F.
A network community restructuring mechanism for transport efficiency improvement in scale-free complex networksConcurrency and Computation Practice and Experience Topology with Skitter
2018
Alrasheed, H.On the Eccentricity Function in GraphsIntl Workshop on Complex Networks Topology with Skitter
2017
Gilmore, J.S.
Engelbrecht, H.A.
Pithos: Distributed storage for nassive nulti-user virtual environmentsACM Trans. on Multimedia Computing, Communications, and Applications (TOMM) Topology with Skitter
2017
Eppstein, D.
Goodrich, M.T.
Mitzenmacher, M.
Torres, M.R.
2-3 Cuckoo filters for faster triangle listing and set intersectionACM SIGMOD-SIGACT-SIGAI Symp. on Principles of Database Systems Topology with Skitter
2017
Luo, J.N.
Yang, M.H.
Improved single packet traceback scheme with Bloom filtersIntl Conf. on Internet of Things as a Service Topology with Skitter
2016
An, H.
Lee, H.
Perrig, A.
Coordination of anti-spoofing mechanisms in partial deploymentsJ. of Communications and Networks Topology with Skitter
2016
Bhardwaj, O.
Anschelevich, E.
Kar, K.
Coalitionally stable pricing schemes for inter-domain forwardingComputer Networks Topology with Skitter
2016
Malliga, S.
Selvi, C.
Kogilavani, S.
Low storage and traceback overhear IP traceback systemJ. of Information Science and Engineering Topology with Skitter
2015
Kloster, K.
Gleich, D.F.
Seeded PageRank solution pathsarxiv.org Topology with Skitter
2015
Francois, G.
Festor, O.
Anomaly traceback using software defined networkingIntl. Workshop on Information Forensics and Security (WIFS) Topology with Skitter
2015
Staudt, C.L.
Sazonovs, A.
Meyerhenke, H.
NetworKit: A tool suite for large-scale complex network analysisarxiv.org Topology with Skitter
2015
Saha, S.Efficient methods on reducing data redundancy in the InternetAalto Univ., FI Topology with Skitter
2015
Huang, T.T.
Sun, B.Q.
The impact of the Internet on global industry: New evidence of Internet measurementResearch in Intl Business and Finance Topology with Skitter
2015
Li, D.
Sha, W.
Dynamic ring for seamless mobility in identity centric networksComputers and Communication (ISCC) Topology with Skitter
2015
Pares Palacin, A.Random graphs and applicationsUniv. of Barcelona Topology with Skitter
2014
Yang, M.H.Storage-efficient 16-bit hybrid IP traceback with single packetThe Scientific World J. Topology with Skitter
2014
Yang, M.H.
Yang, M.C.
Luo, J.-N.
Hsu, W.C.
High accuracy and low storage hybrid IP tracebackConf. on Computer, Information and Telecommunication Systems (CITS) Topology with Skitter
2014
Medrano-Chavez, A.G.
Perez-Cortes, E.
Lopez-Guerrero, M.
A performance comparison of Chord and Kademlia DHTs in high churn scenariosPeer-to-Peer Networking and Applications Topology with Skitter
2014
Zhang, J.Statistical inference on network dataUniv. Illinois, Urbana-Champaign Topology with Skitter
2014
Arora, D.
Verigin, A.
Godkin, T.
Neville, S.W.
Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnetsConf. on Advanced Information Networking and Applications (AINA) Topology with Skitter
2014
Fallah, M.S.
Kahani, N.
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacksSecurity and Communication Networks Topology with Skitter
2014
Dundjerski, D.
Tomasevic, M.
Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocolsConcurrency Computation: Practice and Experience Topology with Skitter
2013
Freno, A.
Keller, M.
Tommasi, M.
Probability estimation over large-scale random networks via the Fiedler delta statisticJ. of Machine Learning Research Topology with Skitter
2013
Seo, D.
Lee, H.
Perrig, A.
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacksComputers and Security Topology with Skitter
2013
Preciado, V.M.
Jadbabaie, A.
Moment-based spectral analysis of large-scale networks using local structural informationIEEE/ACM Trans. on Networking (TON) Topology with Skitter
2013
Godkin, T.Statistical assessment of peer-to-peer botnet featuresUniv. of Victoria, Victoria, CA Topology with Skitter
2013
Fu, A.W.
Wu, H.
Cheng, J.
Wong, R.C.
IS-Label: an independent-set based labeling scheme for point-to-point distance queryingVLDB Endowment Topology with Skitter
2013
Nikolaevskiy, I.
Lukyanenko, A.
Polishchuk, T.
Polishchuk, V.
Gurtov, A.
isBF: scalable in-packet Bloom filter based multicastACM Symp. on Applied Computing (SAC) Topology with Skitter
2013
Chen, Y.
Kawadia, V.
Urgaonkar, R.
Detecting overlapping temporal community structure in time-evolving networksarxiv.org Topology with Skitter
2013
Tang, M.
Zhang, G.
Lin, T.
Liu, J.
HDLBR: A name-independent compact routing scheme for power-law networksComputer Communications Topology with Skitter
2013
Ni, C.
Jin, G.
CTFPi: A new method for packet filtering of firewallConf. on Information Technology and Software Engineering, Ch. 48 Topology with Skitter
2012
Karasawa, T.
Soshi, M.
Miyaji, A.
A novel hybrid IP traceback scheme with packet countersConf. on Internet and Distributed Computing Systems (IDCS) Topology with Skitter
2012
Parno, B.
Zhou, Z.
Perrig, A.
Using trustworthy host-based information in the networkWorkshop on Scalable trusted computing (STC) Topology with Skitter
2012
Preciado, V.M.
Draief, M.
Jadbabaie, A.
Structural analysis of viral spreading processes in social and communication networks using egonetsarxiv.org Topology with Skitter
2012
Goltsev, A.V.
Dorogovtsev, S.N.
Oliveira, J.G.
Mendes, J.F.F.
Localization and spreading of diseases in complex networksPhys. Rev. Lett. Topology with Skitter
2012
Fay, D.
Haddadi, H.
Moore, A.W.
Mortier, R.
Thomason, A.G.
Uhlig, S.
Weighted spectral distribution: A metric for structural analysis of networksStatistical and Machine Learning Approaches for Network Analysis, Ch. 6 Topology with Skitter
2012
Yang, M.-H.
Yang, M.-C.
RIHT: A novel hybrid IP traceback schemeIEEE Trans. on Information Forensics and Security Topology with Skitter
2012
Wehmuth, K.
Ziviani, A.
Distributed assessment of the closeness centrality ranking in complex networksWorkshop on Simplifying Complex Networks for Practitioners (SIMPLEX) Topology with Skitter
2011
Mukaddam, A.
ELHajj, I.
Hop count variabilityConf. for Internet Technology and Secured Transactions (ICITST) Topology with Skitter
2011
Wehmuth, K.
Ziviani, A.
Distributed location of the critical nodes to network robustness based on spectral analysisLatin American Network Operations and Management Symp. (LANOMS) Topology with Skitter
2011
Bell, C.Examining change in Internet topology in terms of external events, April 2001 - April 2002Univ. Nebraska at Omaha Topology with Skitter
2011
Youssef, M.
Kooij, R.
Scoglio, C.
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemicsJ. Computational Science Topology with Skitter
2011
Alvarez-Hamelin, J.I.
Beiro, M.G.
Busch, J.R.
Understanding edge connectivity in the Internet through core decompositionInternet Mathematics Topology with Skitter
2010
Song, J.
Zhao, H.
Yang, B.
Sun, H.
AS-level Internet macroscopic topology centralization evolvement analysisJ. Software Engineering and Applications Topology with Skitter
2010
de Montgolfier, F.
Soto, M.
Viennot, L.
Autour du caractere arborescent dInternetMajecSTIC Topology with Skitter
2010
Xu, Y.
Wang, Z.
On an IBA topology model for internet topology structureConf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Topology with Skitter
2010
Yan, G.
Eidenbenz, S.
Thulasidasan, S.
Datta, P.
Ramaswamy, V.
Criticality analysis of Internet infrastructureComputer Networks Topology with Skitter
2010
Scholtes, I.
Botev, J.
Esch, M.
Hohfeld, A.
Schloss, H.
Zech, B.
TopGen - internet router-level topology generation based on technology constraintsConf. on Simulation Tools and Techniques for Communications, Networks and Systems Topology with Skitter
2010
Fay, D.
Haddadi, H.
Thomason, A.
Moore, A.W.
Mortier, R.
Jamakovic, A.
Uhlig, S.
Rio, M.
Weighted spectral distribution for Internet topology analysis: Theory and applicationsIEEE/ACM Trans. on Networking Topology with Skitter
2009
Augustin, B.
Krishnamurthy, B.
Willinger, W.
IXPs: mapped?Internet Measurement Conf. (IMC) Topology with Skitter
2009
Jin, G.
Zhang, F.
Li, Y.
Zhang, H.
Qian, J.
A hash-based path identification scheme for DDoS attacks defenseConf. on Computer and Information Technology Topology with Skitter
2009
Haddadi, H.
Fay, D.
Uhlig, S.
Moore, A.
Jamakovic, A.
Mortier, R.
Analysis of the Internets structural evolutionUniv. of Cambridge Topology with Skitter
2009
Haddadi, H.
Fay, D.
Jamakovic, A.
Maennel, O.
Moore, A.
Mortier, R.
Uhlig, S.
On the importance of local connectivity for Internet topology modelsIntl Teletraffic Congress Topology with Skitter
2009
Erlebach, T.
Moonen, L.S.
Spieksma, F.C.R.
Vukadinovic, D.
Connectivity measures for internet topologies on the level of autonomous systemsOperations Research Topology with Skitter
2009
Korn, A.
Schubert, A.
Telcs, A.
Lobby index in networksPhysica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Xu, Y.
Zhao, H.
An improved BA model for router-level internet macroscopic topologyIAENG J. Computer Science Topology with Skitter
2009
Madhyastha, H.V.
Katz-Bassett, E.
Anderson, T.
Krishnamurthy, A.
Venkataramani, A.
iPlane Nano: path prediction for peer-to-peer applicationsUSENIX Symp. on Networked Systems Design and Implementation (NSDI) Topology with Skitter
2009
Gunes, M.H.
Sarac, K.
Analyzing router responsiveness to active measurement probesPassive and Active Measurement (PAM) Topology with Skitter
2009
Durresi, A.
Paruchuri, V.
Barolli, L.
Fast autonomous system tracebackJ. Network and Computer Applications Topology with Skitter
2009
Xiao, B.
Liu, L.
Guo, X.
Xu, K.
Modeling the IPv6 internet AS-level topologyPhysica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Kaune, S.
Pussep, K.
Leng, C.
Kovacevic, A.
Tyson, G.
Steinmetz, R.
Modelling the internet delay space based on geographical locationsConf. on Parallel, Distributed and Network-based Processing Topology with Skitter
2008
Sung, M.
Xu, J.
Li, J.
Li, L.
Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundationIEEE/ACM Trans. on Networking (TON) Topology with Skitter
2008
Qu, Z.
Huang, C.
Liu, N.
A novel two-step traceback scheme for DDoS attacksIntl. Symp. on Intelligent Information Technology Application Topology with Skitter
2008
Paruchuri, V.
Durresi, A.
Chellappan, S.
TTL based Packet Marking for IP tracebackGlobal Telecommunications Conf. Topology with Skitter
2008
Liu, L.
Xu, K.
Time series of Internet AS-level topology graphs: four patterns and one modelarxiv.org Topology with Skitter
2008
Beiro, M.G.
Alvarez-Hamelin, J.I.
Busch, J.R.
A low complexity visualization tool that helps to perform complex systems analysisNew J. Physics Topology with Skitter
2008
Jin, G.
Li, Y.
Zhang, H.
Qian, J.
A Pi2HC mechanism against DDoS attacksConf. on Communications and Networking in China Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Wang, L.
Correctness of sampling bias on Internet router-level topologyConf. on Wireless Communications, Networking and Mobile Computing Topology with Skitter
2008
Bi, X.
Tan, W.
Xiao, R.
A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous SystemsSymp. on Computer and Computational Sciences (IMSCSS) Topology with Skitter
2008
Wei, W.
Dong, Y.
Lu, D.
Jin, G.
Optimal control of DDoS defense with multi-resource max-min fairnessConf. on Cybernetics and Intelligent Systems Topology with Skitter
2008
Kahani, N.
Shiry, S.
Bagherzadeh, M.
Detecting Denial of Service attacks utilizing machine learning methodsConf. on the Applications of Digital Information and Web Technologies Topology with Skitter
2008
Zhang, X.
Zhao, H.
Wang, L.
Li, C.
On the Internet AS-level topology evolution basing on hierarchy characteristicChinese Control and Decision Conf. Topology with Skitter
2008
Zhang, J.
Zhao, H.
Zhou, Y.
The study on characteristics of the coreness of router-level internet nodesChinese Control and Decision Conf. (CCDC) Topology with Skitter
2008
Haddadi, H.
Fay, D.
Jamakovic, A.
Maennel, O.
Moore, A.
Mortier, R.
Rio, M.
Uhlig, S.
Beyond node degree: Evaluating AS topology modelsarxiv.org Topology with Skitter
2008
Muthuprasanna, M.
Manimaran, G.
Distributed divide-and-conquer techniques for effective DDoS attack defensesConf. on Distributed Computing Systems Topology with Skitter
2008
Jamakovic, A.
Uhlig, S.
On the relationships between topological measures in real-world networksNetworks and Heterogeneous Media Topology with Skitter
2008
Haddadi, H.
Fay, D.
Uhlig, S.
Moore, A.
Mortier, R.
Jamakovic, A.
Rio, M.
Tuning topology generators using spectral distributionsIntl Performance Evaluation Workshop (SPEC) Topology with Skitter
2008
Latapy, M.
Magnien, C.
Complex network measurements: estimating the relevance of observed propertiesIEEE Conf. on Computer Communications (INFOCOM) Topology with Skitter
2008
Fraigniaud, P.
Febhar, E.
Viennot, F.
The inframetric model for the internetIEEE Conf. on Computer Communications (INFOCOM) Topology with Skitter
2008
Kooij, R.
Jamakovic, A.
Van Kesteren, F.
De Koning, T.
Theisler, I.
Veldhoven, P.
Het Nederlands elftal als complex netwerkDelft Univ. Topology with Skitter
2008
Cheng, L.
Hutchinson, N.
Ito, M.
RealNet: A topology generator based on real Internet topologyConf. on Advanced Information Networking and Applications Workshops (AINA) Topology with Skitter
2008
Amr, S.
El-Beltagy, M.
Helmy, M.
Analyzing Internet connectivity data using modified k-shell analysisIntl Conf. on Informatics and Systems (INFOS) Topology with Skitter
2007
Flaxman, A.
Vera, J.
Bias reduction in traceroute sampling - Towards a more accurate map of the InternetAlgorithms and Models for the Web-Graph Topology with Skitter
2007
Abdelhafez, M.Modeling and simulations of worms and mitigation techniquesGeorgia Inst. of Technology Topology with Skitter
2007
Paruchuri, V.
Durresi, A.
Jain, R.
On the (in)effectiveness of probabilistic marking for IP traceback under DDoS attacksGlobal Telecommunications Conf. Topology with Skitter
2007
Akashi, O
Fukuda, K.
Hirotsu, T.
Sugawara, T.
Analysis of diagnostic capability for hijacked route problemIntl Workshop on IP Operations and Management Topology with Skitter
2007
Oliveira, R.
Zhang, B.
Zhang, L.
Observing the evolution of internet as topologyConf. on Applications, technologies, architectures, and protocols for computer communications Topology with Skitter
2007
Bush, R.
Hiebert, J.
Maennel, O.
Roughan, M.
Uhlig, S.
Testing the reachability of (new) address spaceSIGCOMM workshop on Internet network management Topology with Skitter
2007
Jackson, A.
Milliken, W.
Santivanez, C.
Condell, M.
Strayer, T.
A topological analysis of monitor placementInt. Symp. on Network Computing and Applications (NCA) Topology with Skitter
2007
Choi, B.
Moon, S.
Cruz, R.
Zhang, Z.
Diot, C.
Quantile sampling for practical delay monitoring in Internet backbone networksComputer Networks Topology with Skitter
2007
Leguay, J.
Latapy, M.
Friedman, T.
Salamatiana, K.
Describing and simulating internet routesComputer Networks Topology with Skitter
2007
Viger, F.
Barrat, A.
Dallasta, L.
Zhang, C.
Kolaczyk, E.
What is the real size of a sampled network? The case of the InternetPhysical Review Topology with Skitter
2007
Sung, M.
Chiang, J.
Xu, J.
Scalable hash-based IP traceback using rate-limited Probabilistic Packet MarkingGeorgia Inst. of Technology Topology with Skitter
2007
Ha, D.
Ngo, H.
On the trade-off between the expected number of infected nodes and expected propagation time of malcodesState Univ. of New York at Buffalo Topology with Skitter
2007
Zhou, S.
Zhang, G.-Q.
Chinese Internet AS-level topologyIET Communications Topology with Skitter
2007
Schmidt, T.C.
Wahlisch, M.
Zhang, Y.
On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routingIEEE Conf. on Networking (ICN) Topology with Skitter
2007
Kunzmann, G.
Nagel, R.
Hossfeld, T.
Binzenhofer, A.
Eger, K.
Efficient simulation of large-scale P2P networks: modeling network transmission timesEUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) Topology with Skitter
2007
Gao, Z.
Ansari, N.
A practical and robust inter-domain marking scheme for IP tracebackComputer Networks Topology with Skitter
2007
Mahadevan, P.Mechanisms for generating realistic annotated Internet topologiesUniv. of California, San Diego Topology with Skitter
2006
Khanmohammadi, K.
Fallah, M.
Distributed packet filtering based on IP tracebackCairo Univ. Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Deployment of an algorithm for large-scale topology discoveryIEEE J. Selected Areas in Communications Topology with Skitter
2006
Donnet, B.
Bayant, B.
Friedman, T.
Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negativesACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Skitter
2006
Li, Z.
Xiang, Y.
He, D.
Simulation and analysis of DDoS in Active Defense EnvironmentConf. on Computational and Information Science Topology with Skitter
2006
Li, Z.
Xiang, Y.
Mathematical analysis of active DDoS defense systemsConf. on Computational Intelligence and Security Topology with Skitter
2006
Guillaume, J.-L.
Latapy, M.
Magoni, D.
Relevance of massively distributed explorations of the internet topology: qualitative resultsComputer Networks Topology with Skitter
2006
Yaar, A.
Perrig, A.
Song, D.
StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defenseIEEE J. Selected Areas in Communications Topology with Skitter
2006
Latapy, M.
Magnien, C.
Measuring fundamental properties of real-world complex networksarxiv.org Topology with Skitter
2006
Farhat, H.Protecting TCP services from denial of service attacksSIGCOMM workshop on Large-Scale Attack Defense (LSAD) Topology with Skitter
2006
Zhang, L.
Guan, Y.
TOPO: a topology-aware single packet attack traceback schemeSecurecomm and Workshops Topology with Skitter
2006
Zhou, S.Characterising and modelling the internet topology - The rich-club phenomenon and the PFP modelBT Technology J. Topology with Skitter
2006
Donnet, B.
Friedman, T.
Topology discovery using an address prefix based stopping ruleUNICE : Networks and Applications Towards a Ubiquitously Connected World Topology with Skitter
2006
Dallasta, L.Dynamical phenomena on complex networksUniv. Paris Sud Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Efficient route tracing from a single sourcearxiv.org Topology with Skitter
2006
Srinivasan, S.
Zegura, E.
RouteSeer: Topological placement of nodes in service overlaysGeorgia Inst. of Technology Topology with Skitter
2006
Jin, S.
Bestavros, A.
Small-world characteristics of internet topologies and implications on multicast scalingComputer Networks Topology with Skitter
2006
Dhamdhere, A.
Dovrolis, C.
ISP and egress path selection for multihomed networksConf. on Computer Communications Topology with Skitter
2006
Yan, P.
Lee, M.
Towards an adaptive packet marking scheme for IP tracebacke-Business and Telecommunication Networks Topology with Skitter
2006
He, Y.
Siganos, G.
Faloutsos, M.
Krishnamurthy, S.
Putting the links together: Measurements and impactUniv. of California Riverside Topology with Skitter
2006
Chen, G.
Fan, Z.
Li, X.
Modelling the complex Internet topologyComplex Dynamics in Communication Networks Topology with Skitter
2005
Tariq, U.
Hong, M.
Lhee, K.
PMS an expeditious marking scheme to combat with the DDoS attackPakistan Section Multitopic Conf. Topology with Skitter
2005
Erlebach, T.
Moonen, L.S.
Spieksma, F.
Vukadinovic, D.
Connectivity measures for internet topologiesK.U. Leuven Topology with Skitter
2005
Xiang, Y.
Zhou, W.
Mark-aided distributed filtering by using neural network for DDoS defenseIEEE Global Telecommunications Conf. (GLOBECOM) Topology with Skitter
2005
Janic, M.
Van Mieghem, P.
On properties of multicast routing treesJ. Communication Systems Topology with Skitter
2005
Hossfeld, T.
Binzenhoefer, A.
Schlosser, D.
Eger, K.
Oberender, J.
Dedinski, I.
Kunzmann, G.
Towards efficient simulation of large scale P2P networksUniv. of Wuerzburg Topology with Skitter
2005
Chen, R.
Park, J.-M.
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sourcesIEEE Conf. on Computer Communications and Networks (ICCCN) Topology with Skitter
2005
Kim, M.S.Building and maintaining overlay networks for bandwidth-demanding applicationsUniv. of Texas at Austin Topology with Skitter
2005
Martins, O.A.Affecting IP traceback with recent Internet topology mapsIowa State Univ. Topology with Skitter
2005
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Efficient algorithms for large-scale topology discoveryACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2005
Donnet, B.
Friedman, T.
A CIDR stopping rule for topology discoveryAlgotel Topology with Skitter
2005
Andreopoulos, B.
Aijun, A.
Wang, X.
Multi-layer increasing coherence clustering of Autonomous Systems with MULICsoftYork Univ. Topology with Skitter
2005
Yaar, A.
Perrig, A.
Song, D.
FIT: Fast Internet TracebackIEEE Conf. on Computer Communications (INFOCOM) Topology with Skitter
2005
Donnet, B.
Friedman, T.
Crovella, M.
Improved algorithms for network topology discoveryPassive and Active Measurement (PAM) Topology with Skitter
2005
Panse, C.Visualizing geo-related data using cartogramsUniv. of Konstanz Topology with Skitter
2005
Yip, B.
Goyette, S.
Madden, C.
Visualising Internet traffic data with three-dimensional spherical displayAsia-Pacific Symp. on Information visualisation (APVis) Topology with Skitter
2005
Xiang, Y.
Zhou, W.
Safeguard information infrastructure against DDos attacks: Experiments and modelingIntl Conf. on Cryptology and Network Security Topology with Skitter
2005
Lee, G.
Lim, H.
Hong, M.
Lee, D.
A dynamic path identification mechanism to defend against DDoS attacksIntl Conf. on Information Networking (ICOIN) Topology with Skitter
2004
Prince, C.
Wyatt, D.
Confidence-weighted marginal utility analyses for improved internet mappingUniv. Washington, CSE Dept. Topology with Skitter
2004
Dube, R.Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet MarkingTexas A and M Univ. Topology with Skitter
2004
Wang, X.
Reiter, M.
Mitigating bandwidth-exhaustion attacks using congestion puzzlesACM Conf. on Computer and Communications Security (CCS) Topology with Skitter
2004
Veitch, D.
Babu, S.
Pasztor, A.
Robust synchronization of software clocks across the InternetInternet Measurement Conf. (IMC) Topology with Skitter
2004
Yaar, A.
Perrig, A.
Song, D.
SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacksIEEE Symp. on Security and Privacy Topology with Skitter
2004
Tang, L.
Crovella, M.
Geometric exploration of the landmark selection problemPassive and Active Measurement (PAM) Topology with Skitter
2004
Kim, S.
Hong, M.
Kim, D.
A study on marking bit size for path identification method: Deploying the Pi filter at the end hostConf. on Computational Science and Its Applications Topology with Skitter
2004
Collins, M.
Reiter, M.
An empirical analysis of target-resident DoS filtersIEEE Symp. on Security and Privacy Topology with Skitter
2004
Xu, K.
Duan, Z.
Zhang, Z.-L.
Chandrashekar, J.
On properties of Internet Exchange Points and their impact on AS topology and relationshipIFIP-TC6 Networking Conf. (NETWORKING) Topology with Skitter
2004
Leguay, J.An analysis on the Internet topologyLinkoping Univ. Topology with Skitter
2004
Amini, L.
Shaikh, A.
Schulzrinne, H.
Effective peering for multi-provider content delivery servicesConf. of the IEEE Computer and Communications Societies (INFOCOM) Topology with Skitter
2004
Zhou, S.
Mondragon, R.J.
Redundancy and robustness of AS-level Internet topology and its modelsElectronics Letters Topology with Skitter
2004
Kettner, S.
Madden, C.
Ziegler, R.
Direct rotational interaction with a spherical projectionTUM, Muenchen Topology with Skitter
2003
Tang, L.
Crovella, M.
Virtual landmarks for the internetInternet Measurement Conf. (IMC) Topology with Skitter
2003
Jin, S.
Bestavros, A.
Small-world characteristics of the Internet and multicast scalingIntl Symp. on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS) Topology with Skitter
2003
Sung, M.
Xu, J.
IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacksIEEE Trans. on Parallel and Distributed Systems Topology with Skitter
2003
Lakhina, A.
Byers, J.W.
Crovella, M.
Matta, I.
On the geographic location of internet resourcesJ. on Selected Areas in Communications Topology with Skitter
2003
Gummadi, K.
Gummadi, R.
Gribble, S.
Ratnasamy, S.
Shenker, S.
Stoica, I.
The impact of DHT routing geometry on resilience and proximityACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications Topology with Skitter
2003
Zhou, S.
Mondragon, R.
Analyzing and modelling the AS-level Internet topologyarxiv.org Topology with Skitter
2003
Teixeira, T.
Marzullo, K.
Savage, S.
Voelker, G.M.
Characterizing and measuring path diversity of internet topologiesACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2003
Yaar, A.
Perrig, A.
Song, D.
Pi: a path identification mechanism to defend against DDoS attacksIEEE Symp. on Security and Privacy Topology with Skitter
2003
Fayed, M.
Krapivsky, P.
Byers, J.W.
Crovella, M.
Finkel, D.
Redner, S.
On the emergence of highly variable distributions in the autonomous system topologyACM SIGCOMM Computer Communication Review Topology with Skitter
2002
Mahajan, R.
Wetherall, D.
Anderson, T.
Understanding BGP misconfigurationProc. SIGCOMM Conf. Topology with Skitter
2020
Prashar, Deepak
Jha, Sudan
A novel approach for Spam Email Filtering Using Machine LearningJournal of Cybersecurity and Information Management (JCIM) UCSD Network Telescope
2020
Torabi, S.
Bou-Harb, E.
Assi, C.
Debbabi, M.
A scalable platform for investigating exploited IoT devices and fingerprinting unsolicited activitiesForensic Sci. Int.: Digital Investigation UCSD Network Telescope
2020
Pour, M.S.
Mangino, A.
Friday, K.
Rathbun, M.
Bou-Harb, E.
Iqbal, F.
Samtani, S.
Crichigno, J.
Ghani, N.
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wildComputers and Security UCSD Network Telescope
2020
Mangino, A.
Pour, M.S.
Bou-Harb, E.
Internet-scale insecurity of consumer Internet of Things: An empirical measurements perspectiveACM Transactions on Management Information Systems (TMIS) UCSD Network Telescope
2020
Torabi, S.
Bou-Harb, E.
Assi, C.
Karbab, E.
Boukhtouta, A.
Debbabi, M.
Inferring and investigating IoT-generated scanning campaigns targeting a large Network TelescopeTrans. on Dependable and Secure Computing UCSD Network Telescope
2019
Pour, M.S.
Mangino, A.
Friday, K.
Rathbun, M.
Bou-Harb, E.
Iqbal, F.
Shaban, K.
Erradi, A.
Data-driven curation, learning and analysis for inferring evolving iot botnets in the wildIntl Conf. on Availability, Reliability and Security UCSD Network Telescope
2019
Niranjana, R.
Kumar, V.
Sheen, Shina
Darknet Traffic Analysis and Classification Using Numerical AGM and Mean Shift Clustering AlgorithmSN Computer Science UCSD Network Telescope
2019
Neshenko, N.
Bou-Harb, E.
Crichigno, J.
Kaddoum, G.
Ghani, N.
Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitationsComm. Surveys and Tutorials UCSD Network Telescope
2019
Zhou, L.
Sood, K.
Xiang, Y.
ERM: An Accurate Approach to Detect DDoS Attacks using Entropy Rate MeasurementIEEE Communications Letters UCSD Network Telescope
2019
Pour, M. S.
Bou-Harb, E.
Varma, K.
Neshenko, N.
Pados, D. A.
Choo, K. K. R.
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaignsDigital Investigation UCSD Network Telescope
2019
Jiang, J.
Wen, S.
Liu, B.
Yu, S.
Xiang, Y.
Zhou, W.
Malicious Attack Propagation and Source IdentificationAdvances in Information Security UCSD Network Telescope
2019
Iliev, A.
Kyurkchiev, N.
Rahnev, A.
Terzieva, T.
Some New Approaches for Modelling Large-scale Worm Spreading on the Internet. IINeural, Parallel and Scientific Computations UCSD Network Telescope
2019
Ciocarlie, G. F.
Stavrou, A.
Stolfo, S. J.
Keromytis, A. D.
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection modelsGoogle Patents UCSD Network Telescope
2018
Husak, M.
Komarkova, J.
Bou-Harb, E.
Celeda, P.
Survey of attack projection, prediction, and forecasting in cyber securityIEEE Communications Surveys and Tutorials UCSD Network Telescope
2018
Rastogi, N.A Network Intrusion Detection System (NIDS) based on information centrality to identify systemic cyber attacks in large systemsRensselaer Polytechnic Inst. (ProQuest Publ.) UCSD Network Telescope
2018
Neshenko, N.A Network Telescope approach for inferring and characterizing IoT exploitationsFlorida Atlantic Univ. UCSD Network Telescope
2018
Torabi, S.
Bou-Harb, E.
Assi, C.
Galluscio, M.
Boukhtouta, A.
Debbabi, M.
Inferring, characterizing, and investigating Internet-scale malicious IoT device activities: A Network Telescope perspectiveInt. Conf. on Dependable Systems and Networks (DSN) UCSD Network Telescope
2018
Ezzahra, Q.
Khaled, B.
Bou-Harb, E.
Fachkha, C.
Zouari, B.
On the collaborative inference of DDoS: An information-theoretic distributed approachIntl Wireless Comm. and Mobile Computing Conf. (IWCMC) UCSD Network Telescope
2018
Galluscio, M.
Neshenko, N.
Bou-Harb, E.
Huang, Y.
Ghani, N.
Crichigno, J.
Kaddoum, G.
A first empirical look on internet-scale exploitations of IoT devicesIntl Symp. on Personal, Indoor, and Mobile Radio Communications (PIMRC) UCSD Network Telescope
2018
Vichaidis, N.
Tsunoda, H.
Keeni, G. M.
Analyzing darknet TCP traffic stability at different timescalesIntl Conf. on Information Networking (ICOIN) UCSD Network Telescope
2018
Sridharan, R.
Maiti, R. R.
Tippenhauer, N. O.
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless TrafficACM Conf. on Security and Privacy in Wireless and Mobile Networks UCSD Network Telescope
2018
Shaikh, F.
Bou-Harb, E.
Crichigno, J.
Ghani, N.
A machine learning model for classifying unsolicited IoT devices by observing Network TelescopesIntl Wireless Comm. and Mobile Computing Conf. (IWCMC) UCSD Network Telescope
2018
Shaikh, F.
Bou-Harb, E.
Neshenko, N.
Wright, A. P.
Ghani, N.
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT DevicesIEEE Communications Magazine UCSD Network Telescope
2018
Saurabh, S.
Sairam, A. S.
Inferring the deployment of source address validation filtering using silence of path-backscatterNatl Conf. on Communications (NCC) UCSD Network Telescope
2018
Resende, P. A. A.
Drummond, A. C.
A Survey of Random Forest Based Methods for Intrusion Detection SystemsACM Computing Surveys (CSUR) UCSD Network Telescope
2018
Pour, M. S.
Bou-Harb, E.
Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence GenerationIEEE International Conference on Communications (ICC) UCSD Network Telescope
2018
Neshenko, N.
Husak, M.
Bou-Harb, E.
Celeda, P.
Al-Mulla, S.
Fachkha, C.
Data-Driven Intelligence for Characterizing Internet-Scale IoT ExploitationsIEEE Globecom Workshops (GC Wkshps) UCSD Network Telescope
2018
Husak, M.
Neshenko, N.
Bou-Harb, E.
Celeda, P.
Assessing Internet-wide Cyber Situational Awareness of Critical SectorsIntl Conf. on Availability, Reliability and Security UCSD Network Telescope
2018
Gupta, O.Identifying traffic anomalies interfering with IBR based outage detectionUniv. of California, San Diego UCSD Network Telescope
2018
Ghani, N.
Bou-Harb, E.
Passive Inference of Attacks on CPS Communication ProtocolsJournal of Information Security and Applications UCSD Network Telescope
2017
Iglesias, F.
Zseby, T.
Pattern discovery in Internet background radiationIEEE Trans. on Big Data UCSD Network Telescope
2017
Bou-Harb, E.
Husak, M.
Debbabi, M.
Assi, C.
Big data sanitization and cyber situational awareness: A Network Telescope perspectiveIEEE Trans. on Big Data UCSD Network Telescope
2017
Haddadi, F.
Heywood, A.
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?Intl J. of Network Management UCSD Network Telescope
2017
Ochieng, N.
Ismail, A.
Waweru, M.
Orero, J.
Detecting scanning computer worms using machine learning and darkspace network trafficPan African Conf. on Science, Computing and Telecommunications (PACT) UCSD Network Telescope
2017
Dauxois, J.
Nucit, A.
Some estimation problems in epidemic modelingCommunications in Statistics - Simulation and Computation UCSD Network Telescope
2017
Polat, H.
Mehr, H.
Cetin, A.
Diagnosis of chronic kidney disease based on Support Vector Machine by Feature Selection MethodsJ. of Medical Systems UCSD Network Telescope
2017
Zhou, L.
Liao, M.
Yuan, C.
Zhang, H.
Low-Rate DDoS Attack Detection Using Expectation of Packet SizeSecurity and Communication Networks UCSD Network Telescope
2017
Alharbi, H.S.Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networksUniv. of Stirling UCSD Network Telescope
2016
Xu, M.
Hua, L.
Xu, S.
A vine copula model for predicting the effectiveness of cyber defense early-warningTechnometrics UCSD Network Telescope
2016
Chen, P.
Xu, M.
Xu, S.
Hu, T.
Modeling and predicting extreme cyber attack rates via marked point processesJ. Applied Statistics UCSD Network Telescope
2016
Lin, C.
Wu, C.
Huang, M.
Wen, Z.
Cheng, Q.
Adaptive IP mutation: A proactive approach for defending against worm propagationIEEE Symp. onReliable Distributed Systems Workshops (SRDSW) UCSD Network Telescope
2016
Haddadi, F.Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithmsDalhousie Univ. UCSD Network Telescope
2016
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attackManagement Information Systems Quarterly UCSD Network Telescope
2016
Fachkha, C.
Debbabi, M.
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterizationIEEE Communications Surveys and Tutorials UCSD Network Telescope
2016
Marnerides, A.
Mauthe, A.
Analysis and characterisation of botnet scan trafficConf. on Computing, Networking and Communications (ICNC) UCSD Network Telescope
2016
Kolesnichenko, A.
Haverkort, B.
Remke, A.
de Boer, P.
Fitting a code-red virus spread model: An account of putting theory into practiceConf. on the Design of Reliable Communication Networks (DRCN) UCSD Network Telescope
2016
Kirubavathi, G.
Anitha, R.
Botnet detection via mining of traffic flow characteristicsComputers and Electrical Engineering UCSD Network Telescope
2016
Chen, Z.
Chen, C.
Characterising heterogeneity in vulnerable hosts on worm propagationIntl J. Security and Networks UCSD Network Telescope
2015
Haga, Y.
Saso, A.
Mori, T.
Goto, S.
Increasing the darkness of darknet trafficGlobal Communications Conf. (GLOBECOM) UCSD Network Telescope
2015
Fachkha, C.Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacksConcordia Univ. UCSD Network Telescope
2015
Donoghue, N.
Hahn, B.
Xu, H.
Kroeger, T.
Zage, D.
Johnson, R.
Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Databasearxiv.org UCSD Network Telescope
2015
Gupta, S.
Gupta, B.B.
Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-artIntl J. System Assurance Engineering and Management UCSD Network Telescope
2015
Zhan, Z.
Xu, M.
Xu, S.
Predicting cyber attack rates with extreme valuesIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2015
Vaidya, T.2001-2013: Survey and analysis of major cyberattacksarxiv.org UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Chain, B.
Hybrid epidemics - A case study on computer worm ConfickerPlos One UCSD Network Telescope
2015
Haddadi, F.
Le Cong, D.
Porter, L.
Zincir-Heywood, A.
On the effectiveness of different botnet detection approachesInformation Security Practice and Experience (ISPE) UCSD Network Telescope
2015
Balkanli, E.
Zincir-Heywood, A.N.
Highlights on analyzing one-way traffic using different toolsIEEE Symp. on Computational Intelligence for Security and Defense Applications (CISDA) UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Miller, J.
Cox, I.
Chain, B.
Optimizing hybrid spreading in metapopulationsNature Scientific Reports UCSD Network Telescope
2015
Yao, G.
Bi, J.
Vasilakos, A.V.
Passive IP Traceback: disclosing the locations of IP spoofers from path backscatterIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2015
Chen, H.Toward hardware-oriented defensive network infrastructureBinghamton Univ. UCSD Network Telescope
2014
Zhan, Z.
Xu, M.
Xu, S.
A characterization of cybersecurity posture from Network Telescope dataConf. on Trustworthy Systems (InTrust) UCSD Network Telescope
2014
Kolesnichenko, A.Model-checking mean-field models: algorithms and applicationsUniv. of Twente UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Entropy-based characterization of Internet background radiationEntropy UCSD Network Telescope
2014
Balkanli, E.
Alves, J.
Zincir-Heywood, A.N.
Supervised learning to detect DDoS attacksIEEE Computational Intelligence in Cyber Security (CICS) UCSD Network Telescope
2014
Yang, S.
Du, H.
Holsopple, J.
Sudit, M.
Attack ProjectionAdvances in Information Security UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Modelling IP darkspace traffic by means of clustering techniquesCommunications and Network Security (CNS) UCSD Network Telescope
2014
Garcia, S.
Grill, M.
Stiborek, J.
Zunino, A.
An empirical comparison of botnet detection methodsComputers and Security UCSD Network Telescope
2014
Balkanli, E.
Zincir-Heywood, A.N.
On the analysis of backscatter trafficIEEE Local Computer Networks Workshops (LCN Workshops) UCSD Network Telescope
2014
Du, H.Probabilistic modeling and inference for obfuscated network attack sequencesRochester Inst. of Technology UCSD Network Telescope
2014
Kale, M.
Choudhari, D.M.
DDOS attack detection based on an ensemble of neural classifierIntl J. Computer Science and Network Security (IJCSNS) UCSD Network Telescope
2014
Gonzalez, C.Information theoretic measures for the detection of anomalies in IP darkspace trafficBarcelona Tech UCSD Network Telescope
2014
Du, H.
Yang, S.J.
Probabilistic Inference for Obfuscated Network Attack SequencesConf. on Dependable Systems and Networks UCSD Network Telescope
2014
Zhan, Z.A statistical framework for analyzing cyber attacksUniv. Texas, San Antonio, TX, US UCSD Network Telescope
2014
Wang, P.
Guan, X.
Zhao, J.
Tao, J.
Qin, T.
A new sketch method for measuring host connection degree distributionIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2014
Strapp, S.
Yang, S.
Segmenting large-scale cyber attacks for online behavior model generationSocial Computing, Behavioral-Cultural Modeling and Prediction (SBP) UCSD Network Telescope
2014
Khan, F.
Hosein, N.
Ghiasi, S.
Chuah, C.
Sharma, P.
Streaming solutions for fine-grained network traffic measurements and analysisIEEE/ACM Trans. on Networking (TON) UCSD Network Telescope
2014
Singh, K.
Guntuku, S.C.
Thakur, A.
Hota, C.
Big data analytics framework for peer-to-peer botnet detection using random forestsInformation Sciences UCSD Network Telescope
2014
Ko, S.
Kim, K.
Lee, Y.
Song, J.
A classification method of darknet traffic for advanced security monitoring and responseLecture Notes in Computer Science UCSD Network Telescope
2014
Chatziadam, P.
Askoxylakis, I.G.
Fragkiadakis, A.
A Network Telescope for Early Warning Intrusion DetectionLecture Notes in Computer Science UCSD Network Telescope
2013
Huang S.Y., Huang Y.Network forensic analysis using growing hierarchical SOMIEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov) UCSD Network Telescope
2013
Du, H.
Yang, S.J.
Temporal and spatial analyses for large-scale cyber attacksHandbook of Computational Approaches to Counterterrorism UCSD Network Telescope
2013
Tidy, L.J.
Woodhead, S.
Wetherall, J.
Simulation of zero-day worm epidemiology in the dynamic, heterogeneous InternetJ. Defense Modeling and Simulation: Applications, Methodology, Technology UCSD Network Telescope
2013
Strapp, S.Segmentation and model generation for large-scale cyber attacksRochester Inst. of Technology UCSD Network Telescope
2013
Guntuku, S.
Narang, P.
Hota, C.
Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural networkarxiv.org UCSD Network Telescope
2013
Irwin, B.A source analysis of the Conficker outbreak from a Network TelescopeSAIEE Africa Research J. UCSD Network Telescope
2013
Ma, C.
Yang, Y.
Guo, X.
Improved SEIR viruses propagation model and the patchs impact on the propagation of the virusJ. of Computational Information Systems UCSD Network Telescope
2013
Tidy, L.
Woodhead, S.
Wetherall, J.
A large-scale zero-day worm simulator for cyber-epidemiological analysisConf. on Advances in Computer Science and Electronics Engineering (CSEE) UCSD Network Telescope
2013
Wang, F.
Zhang, Y.
Guo, H.
Wang, C.
Combating good point set scanning-based self-learning worms by using predatorsJ. Network Security UCSD Network Telescope
2013
Andrysiak, T.
Saganowski, L.
Choras, M.
DDoS attacks detection by means of greedy algorithmsImage Processing and Communications Challenges 4 UCSD Network Telescope
2012
Xu, E.
Hsu, W.
Lee, M.L.
Patel, D.
Top-k maximal influential paths in network dataDatabase and Expert Systems Applications UCSD Network Telescope
2012
Martin, S.
Chiarello, L.
Leduc, G.
DISco: A distributed information store for network challenges and their outcomeIEEE Network Operations and Management Symp. (NOMS) UCSD Network Telescope
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection improvement based on spatial-temporal characteristicsAdvanced Science Lett. UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Characterizing transition behaviors in Internet attack sequencesIEEE Conf. on Computer Communications and Networks (ICCCN) UCSD Network Telescope
2011
Suresh, M.
Anitha, R.
Evaluating machine learning algorithms for detecting DDoS attacksAdvances in Network Security and Applications (CNSA) UCSD Network Telescope
2011
Abouzakhar, N.S.
Chen, H.
Christianson, B.
An enhanced fuzzy ARM approach for intrusion detectionJ. Digital Crime and Forensics UCSD Network Telescope
2011
Narita, M.
Katoh, T.
Bista, B.B.
Takata, T.
Evaluation of a distributed detecting method for SYN flood attacks using a real Internet traceAdvanced Information Networking and Applications (WAINA) UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Discovering collaborative cyber attack patterns using social network analysisConf. on Social computing, behavioral-cultural modeling and prediction (SBP) UCSD Network Telescope
2011
Saganowski, L.
Andrysiak, T.
Choras, M.
Renk, R.
Expansion of matching pursuit methodology for anomaly detection in computer networksAdvances in Intelligent and Soft Computing UCSD Network Telescope
2011
Choras, M.
Saganowski, L.
Renk, R.
Holubowicz, W.
Statistical and signal-based network traffic recognition for anomaly detectionExpert Systems UCSD Network Telescope
2010
Yao, G.
Bi, J.
Zhou, Z.
Passive IP traceback: capturing the origin of anonymous traffic through network telescopesACM SIGCOMM Computer Communication Review UCSD Network Telescope
2010
Abouzakhar, N.S.
Bakar, A.
A chi-square testing-based intrusion detection modelConf. on Cybercrime Forensics Education and Training (CFET ) UCSD Network Telescope
2010
Fadlullah, Z.M.
Taleb, T.
Vasilakos, A.V.
Guizani, M.
Kato, N.
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysisIEEE/ACM Trans. on Networking (TON) UCSD Network Telescope
2010
Bi, J.
Hu, P.
Li, P.
Study on classification and characteristics of source address spoofing attacks in the InternetIEEE Conf. on Networking (ICN) UCSD Network Telescope
2010
Gupta, R.
Ramamritham, K.
Mohania, M.
Ratio threshold queries over distributed data sourcesConf. on Data Engineering (ICDE) UCSD Network Telescope
2009
Kyriakopoulos, K.G.
Parish, D.J.
Using wavelets for compression and detecting events in anomalous network trafficConf. on Systems and Networks Communication UCSD Network Telescope
2009
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Measuring complexity and predictability in networks with multiscale entropy analysisIEEE Conf. on Computer Communications (INFOCOM) UCSD Network Telescope
2008
He, X.
Parameswaran, S.
MCAD: Multiple connection based anomaly detectionIEEE Conf. on Communication Systems (ICCS) UCSD Network Telescope
2008
Choi, H.
Lee, H.
Kim, H.
Fast detection and visualization of network attacks on parallel coordinatesComputers and Security UCSD Network Telescope
2008
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Metrics for characterizing complexity of network trafficConf. on Telecommunications (ICT) UCSD Network Telescope
2008
Irwin, B.
Pilkington, N.
High level internet scale traffic visualization using Hilbert curve mappingVisualization for Computer Security (VizSec) UCSD Network Telescope
2008
Wei, S.
Mirkovic, J.
Correcting congestion-based error in network telescopes observations of worm dynamicsInternet Measurement Conf. (IMC) UCSD Network Telescope
2008
Li, P.
Bi, J.
Zhou, Z.
A backscatter technology based study on source address spoofingPeriodical of Ocean Univ. of China UCSD Network Telescope
2008
Francois, J.
State, R.
Festor, O.
Activity monitoring for large honeynets and network telescopesJ. Advances in Systems and Measurements UCSD Network Telescope
2007
Dainotti, A.
Pescape, A.
Ventre, G.
Worm traffic analysis and characterizationIEEE Conf. on Communications (ICC) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Measuring network-aware worm spreading abilityIEEE Conf. on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Vojnovic, M.
Gupta, V.
Karagiannis, T.
Gkantsidis, C.
Sampling strategies for epidemic-style information disseminationIEEE Conf. on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Optimal worm-scanning method using vulnerable-host distributionsJ. Security and Networks UCSD Network Telescope
2006
Rajab, M.
Monrose, F.
Terzis, A.
Fast and evasive attacks: highlighting the challenges aheadSymp. on Recent Advances in Intrusion Detection (RAID) UCSD Network Telescope
2006
Francois, J.
State, R.
Festor, O.
Tracking global wide configuration errorsIEEE Workshop on Monitoring, Attack Detection and Mitigation UCSD Network Telescope
2006
Hamadeh, I.
Kesidis, G.
Toward a framework for forensic analysis of scanning wormsEmerging Trends in Information and Communication Security (ETRICS) UCSD Network Telescope
2006
Peng, Y.
Gong, J.
Yang, W.
Liu, W.
Disclosing the element distribution of Bloom filterConf. on Computational Science (ICCS) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
Worm evolution tracking via timing analysisACM workshop on Rapid Malcode (WORM) UCSD Network Telescope
2005
Chen, Z.
Ji, C.
Importance-scanning worm using vulnerable-host distributionIEEE Global Telecommunications Conf. (GLOBECOM) UCSD Network Telescope
2005
Chen, Z.
Lin, C.
Ni, J.
Ruan, D.-H.
Zheng, B.
Jiang, Y.-X.
Peng, X.
Wang, Y.
Luo, A.
Zhu, B.
Yue, Y.
Ren, F.-Y.
Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LANIEEE Conf. on Local Computer Networks (LCN) UCSD Network Telescope
2005
Kumar, A.
Paxson, V.
Weaver, N.
Exploiting underlying structure for detailed reconstruction of an internet-scale eventInternet Measurement Conf. (IMC) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
On the effectiveness of distributed worm monitoringUsenix Security Conf. (SEC) UCSD Network Telescope
2005
Chhabra, P.
John, A.
Saran, H.
PISA: Automatic extraction of traffic signaturesIFIP Networking Conf. UCSD Network Telescope

  Last Modified: Wed Apr-14-2021 19:14:38 UTC
  Page URL: https://www.caida.org/data/publications/index.xml