



This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.
We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.
For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.
Anonymized Internet Traces
Ruohui Wang, ``Verifying Self-Simularity For Current Network Traffic'', Tech. rep., University of Wisconsin-Madison, December 2020.
Yu Zhou, Dai Zhang, Kai Gao, Chen Sun, Jiamin Cao, Yangyan Wang, Mingwei Xu, and Jianping We, ``Newton: intent-driven network traffic monitoring'', in CoNEXT 20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, October 2020, p. (14 pages).
Pedro Reviriego and Solvatore Pontarelli, ``When Filtering is not Possible Caching Negatives with Fingerprints Comes to the Rescue'', in CoNEXT 20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, October 2020, p. (8 pages).
Joel Hypolite, John Sonchack, Shlomo Hershkop, Nathan Dautenhahn, Andre DeHon, and Jonathan~M. Smith, ``DeepMatch: Practical Deep Packet Inspection in the Data Planeusing Network Processors'', in CoNEXT 20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, October 2020, p. (15 pages).
Cha Hwan~Song, Pravein Govindan~Kannan, Byan Kian Hsiang~Low, and Mun Choon~Chan, ``FCM-Sketch: Generic Network Measurementswith Data Plane Support'', in CoNEXT 20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, October 2020, p. (15 pages).
Liangcheng Yu, John Sonchack, and Vincent Liu, ``Mantis: Reactive Programmable Switches'', in Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication, July 2020, p. (14 pages).
M. Rzepka, P. Borylo, A. Lason, and A. Szymanski, ``PARD: Hybrid Proactive and Reactive Method Eliminating Flow Setup Latency in SDN'', Journal of Network and Systems Management, vol. 28, pp. 1547--1574, July 2020.
Alon Rashelbach, Ori Rottenstreich, and Mark Silberstein, ``A Computational Approach to Packet Classification'', in Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication, July 2020, p. (15 pages).
Junzhi Gong, Yuliang Li, Bilal Anwer, Aman Shaikh, and Minlan Yu, ``Microscope: Queue-based Performance Diagnosis for Network Functions'', in Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication, July 2020, p. (14 pages).
X. Chen, S. Landau-Feibish, M. Braverman, and J. Rexford, ``BeauCoup: Answering Many Network Traffic Queries, One Memory Update at a Time'', in Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies. July 2020, pp. 226--239, ACM.
B. Turkovic, J. Oostenbrink, F.A. Kuipers, I. Keslassy, and A. Orda, ``Sequential zeroing: Online heavy-hitter detection on programmable hardware'', in IFIP Networking, June 2020.
I. Sarker, ``Cybersecurity Data Science: An Overview from Machine Learning Perspective'', Tech. rep., preprints.org, June 2020.
G. Grigoryan, Y. Liu, and M. Kwon, ``Boosting FIB caching performance with aggregation'', in Proc. Intl Symp. on High-Performance Parallel and Distributed Computing (HPDC), June 2020, pp. 221--232.
R.~B. Basat, X. Chen, G. Einziger, S.~L. Feibish, D. Raz, and M Yu, ``Routing Oblivious Measurement Analytics'', in 2020 IFIP Networking Conference. June 2020, pp. 449--457, arXiv.
D. Ding, M. Savi, and D. Siracusa, ``Estimating Logarithmic and Exponential Functions to Track Network Traffic Entropy in P4'', in NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium. April 2020, pp. 1--9, IEEE.
Tadeusz Czachorski, Erol Gelenbe, Godlove Kuaban~Suila, and Dariusv Marek, ``Dynamics of Software Defined Networks: Diffusion Models'', Tech. rep., Researchgate.net, April 2020.
A. Oeldemann, F. Biersack, T. Wild, and A. Herkersdorf, ``Inter-server RSS: Extending receive side scaling for inter-server workload distribution'', in Euromicro Intl Conf. on Parallel, Distributed and Network-Based Processing (PDP), March 2020, pp. 1--1.
M. Mitzenmacher, S. Pontarelli, and P. Reviriego, ``Adaptive cuckoo filters'', ACM J. Exp. Algorithms, vol. 25, no. 1, March 2020.
D. Ding, M. Savi, G. Antichi, and D. Siracusa, ``An Incrementally-deployable P4-enabled Architecture for Network-wide Heavy-hitter Detection'', in IEEE Transactions on Network and Service Management. March 2020, vol. 17.1, pp. 75--88, IEEE.
T. Levai, F. Nemeth, B. Raghavan, and G. Retvari, ``Batchy: Batch-scheduling data flow graphs with service-level objectives'', in USENIX NSDI, February 2020, p. (18 pages).
Toa Wang, Hang Zhu, Fabian Ruffym, Xin Jin, Anirudh Sivaraman, Dan Ports, and Aurojit Panda, ``Multitenancy for fast and programmable networks in the cloud'', in 12th USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2020, co-located with USENIX ATC 2020, January 2020, p. (8 pages).
P. Reviriego, J. Martinez, and S. Pontarelli, ``Improving packet flow counting with fingerprint counting'', IEEE Comm. Lett., vol. 24, no. 1, pp. 76--80, January 2020.
You Zhou, Youlin Zhang, Chaoyi Ma, Shigang Chen, and Olufemi O.~Odegbile, ``Generalized Sketch Families for Network TrafficMeasurement'', Proceedings of the ACM on Measurement and Analysis of Computing Systems, p. (34 pages), December 2019.
Nikita Ivkin, Zhuolong Yu, Vladimir Braverman, and Xin Jin, ``QPipe: quantiles sketch fully in the data plane'', in CoNEXT 19: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, December 2019, p. (7 pages).
Nikita Ivkin, Ran Ben~Basat, Zaoxing Liu, Gil Einziger, Roy Friedman, and Vladimir Braverman, ``I Know What You Did Last Summer: Network Monitoring using Interval Queries'', Proceedings of the ACM on Measurement and Analysis of Computing Systems, p. (28 pages), December 2019.
C.A. Gomez, X. Wang, and A. Shami, ``Intelligent active queue management using explicit congestion notification'', in IEEE Global Comm. Conf. (GLOBECOM), December 2019, p. (6 pages).
X. Chen, S.~L. Feibish, Y. Koral, J. Rexford, O. Rottenstreich, S.~A. Monetti, and T.~Y. Wang, ``Fine-grained queue measurement in the data plane'', in 15th International Conference on Emerging Networking Experiments And Technologies. December 2019, pp. 15--29, ACM.
T. Yang, H. Zhang, H. Li, J. Gong, S. Uhlig, S. Chen, L. Uden, and X. Li, ``HeavyKeeper: An accurate algorithm for finding top-k elephant flows'', IEEE/ACM Trans. on Networking, vol. 27, no. 5, pp. (14 pages), October 2019.
Philipp Richter and Arthur Berger, ``Scanning the Scanners: Sensing the Internet from a MassivelyDistributed Network Telescope'', in IMC 19: Proceedings of the Internet Measurement Conference, October 2019, p. (14 pages).
M.D. Iannacone and R.A. Bridges, ``Quantifiable and comparable evaluations of cyber defensive capabilities: A survey and novel, unified approach'', Tech. rep., arxiv.org, October 2019.
J. Xu, ``READ: a three-communicating-stage distributed super points detections algorithm'', Tech. rep., arxiv.org, July 2019.
M.A.S. Monge, Knowledge acquisition for autonomic network management in emerging self-organizing architectures, Ph.D. thesis, Univ. of Madrid, June 2019.
N. Ivkin, E. Liberty, K. Lang, Z. Karnin, and V. Braverman, ``Streaming quantiles algorithms with small space and update time'', Tech. rep., arxiv.org, June 2019.
D. Ding, M. Savi, G. Antichi, and D. Siracusa, ``Incremental deployment of programmable switches for network-wide heavy-hitter detection'', in 2019 IEEE Conference on Network Softwarization (NetSoft). June 2019, pp. 160--168, IEEE.
A. Lazaris and V.~K. Prasanna, ``An LSTM Framework For Modeling Network Traffic'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), May 2019, p. (6 pages).
C.-Y. Hsu, P. Indyk, D. Katabi, and A. Vakilian, ``Learning-based frequency estimation algorithms'', in Intl Conf. on Learning Representations, May 2019, p. (20 pages).
F.I.A. Shaikh, Security framework for the Internet of Things leveraging network telescopes and machine learning, Ph.D. thesis, Univ. of South Florida, April 2019.
J.L.J. Dautrich and C.V. Ravishankar, ``Inferring insertion times and optimizing error penalties in time-decaying Bloom filters'', ACM Trans, on Database Systems (TODS), vol. 44, no. 2, pp. (32 pages), April 2019.
R. Cohen and Y. Nezri, ``Cardinality estimation in a virtualized network device using online machine learning'', Tech. rep., arxiv.org, March 2019.
B. Turkovic, J. Oostenbrink, and F. Kuipers, ``Detecting heavy hitters in the data-plane'', Tech. rep., arxiv.org, February 2019.
A. Narayan, ``The design and implementation of a congestion control plane'', M.S. thesis, Massachusetts Inst. of Technology, February 2019.
Jose~Luis Garcia-Dorado and Javier Aracil, ``Flow-concurrence and bandwidth ratio on the Internet'', Computer Communications, vol. 136, pp. 43 -- 52, February 2019.
Z. Zhuang, J. Wang, Q. Qi, H. Sun, and J. Liao, ``Toward Greater Intelligence in Route Planning: A Graph-Aware Deep Learning Approach'', IEEE Systems J., p. (12 pages), January 2019.
S. Zhang, Y. Zhang, L. Yin, T. Yuan, Z. Wu, and H. Luo, ``Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things'', IEEE Access, vol. 7, pp. (9 pages), January 2019.
Y. Yang, J. Eo, G.~W. Kim, J.~Y. Kim, S. Lee, J. Seo, W.~W. Song, and B.~G. Chun, ``Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies'', in USENIX, January 2019, p. (15 pages).
T. Yang, J. Xu, X. Liu, P. Liu, L. Wang, J. Bi, and X. Li, ``A Generic Technique for Sketches to Adapt to Different Counting Ranges'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).
S. Wang, J. Bi, C. Sun, and Y. Zhou, ``Prophet: Real-time Queue Length Inference in Programmable Switches'', in ACM Symp. on SDN Research, January 2019, p. (2 pages).
L. Tang, Q. Huang, and P.~P.~C. Lee, ``MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data Streams'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).
M. Park and T.~V. Phan, ``Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud'', IEEE Access, vol. 7, pp. (14 pages), January 2019.
M.~M. Oo, S. Kamolphiwong, T. Kamolphiwong, and S. Vasupongayya, ``Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN)'', Journal of Computer Networks and Communications, p. (12 pages), January 2019.
F. Nasirian, F.~M. Pajouh, and J. Namayanja, ``Exact algorithms for the minimum cost vertex blocker clique problem'', Computers and Operations Research, vol. 103, pp. (13 pages), January 2019.
L. Luo, D. Guo, X. Zhao, J. Wu, O. Rottenstreich, and X. Luo, ``Near-accurate multiset reconciliation'', IEEE Trans. on Knowledge and Data Engineering, vol. 31, pp. (13 pages), January 2019.
P. Liu, A.~R. Benson, and M. Charikar, ``Sampling Methods for Counting Temporal Motifs'', in Twelfth ACM Intl Conf. on Web Search and Data Mining, January 2019, vol. 12, p. (9 pages).
Y.~B. Lin, C.~C. Huang, and S.~C. Tsai, ``A SDN Soft Computing Application for Detecting Heavy Hitters'', IEEE Transactions on Industrial Informatics, p. (9 pages), January 2019.
H. Lin and C.~L. Wang, ``Efficient low-latency packet processing using On-GPU Thread-Data Remapping'', Journal of Parallel and Distributed Computing, vol. 133, pp. (11 pages), January 2019.
J. Li, H. Luo, S. Zhang, H. Li, and F. Yan, ``Design and implementation of efficient control for incoming inter-domain traffic with Information-Centric Networking'', Journal of Network and Computer Applications, vol. 133, pp. (16 pages), January 2019.
R. Leira, L. Gifre, I. Gonzalez, J.~E. Lopez~de Vergara, and J. Aracil, ``Wormhole: a novel big data platform for 100 Gbit/s network monitoring and beyond'', in 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), January 2019, vol. 22, p. (5 pages).
R. Leira, G. Julian-Moreno, I. Gonzalez, F.~J. Gomez-Arribas, and J.~E. Lopez~de Vergara, ``Performance assessment of 40 Gbit/s off-the-shelf network cards for virtual network probes in 5G networks'', Computer Networks, vol. 152, pp. (13 pages), January 2019.
A.~C. Lapolli, J.~A. Marques, and L.~P. Gaspary, ``Offloading Real-time DDoS Attack Detection to Programmable Data Planes'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), January 2019, p. (9 pages).
H. Hu, X. Zhai, M. Wang, and G. Hu, ``Graph analysis of network flow connectivity behaviors'', Turkish Journal of Electrical Engineering and Computer Science, vol. 27, pp. (17 pages), January 2019.
L. Gupta, R. Jain, A. Erbad, and D. Bhamare, ``The P-ART framework for placement of virtual network services in a multi-cloud environment'', Computer Communications, vol. 139, pp. (19 pages), January 2019.
G. Fragkouli, K. Argyraki, and B. Ford, ``MorphIT: Morphing Packet Reports for Internet Transparency'', in Proceedings on Privacy Enhancing Technologies, January 2019, Proceedings on Privacy Enhancing Technologies, p. (16 pages).
V.T. Dang, T.T. Huong, H.T. Nguyen, N.N. Pham, N.T. Nguyen, and A. Marshall, ``SDN-based SYN proxy-A solution to enhance performance of attack mitigation under TCP SYN flood'', The Computer J., vol. 62, January 2019.
M. Czekaj and E. Jamro, ``Flow caching effectiveness in packet forwarding applications'', Computer Science Journal, vol. 20, pp. (19 pages), January 2019.
J. Cao, X. Yang, and Y. Wang, ``A Hybrid Privacy Preserving against Multi-attacks for Network Data Publication'', in International Computer Science and Applications Conference (ICSAC 2019), January 2019, p. (5 pages).
M. Cafaro, I. Epicoco, and M. Pulimeno, ``CMSS: Sketching based reliable tracking of large network flows'', Future Generation Computer Systems, vol. 101, pp. (14 pages), January 2019.
R.~B. Basat, X. Chen, G. Einziger, R. Friedman, and Y. Kassner, ``Randomized Admission Policy for Efficient Top-k, Frequency, and Volume Estimation'', IEEE/ACM Transactions on Networking, p. (14 pages), January 2019.
A. Alsirhani, S. Sampalli, and P. Bodorik, ``DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in Apache Spark'', IEEE Trans. on Network and Service Management, p. (14 pages), January 2019.
T. Alonso, M. Ruiz, G. Sutter, S. Lopez-Buedo, and J.~E. Lopez~de Vergara, ``Towards 100 GbE FPGA-Based Flow Monitoring'', in 2019 X Southern Conference on Programmable Logic (SPL), January 2019, vol. 10, p. (8 pages).
M. Alasmar, G. Parisis, R. Clegg, and N. Zakhleniu, ``On the Distribution of Traffic Volumes in the Internet and its Implications'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).
M. Aamir and S.~M.~A. Zaidi, ``DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation'', International Journal of Information Security, p. (25 pages), January 2019.
Z. Zhao, X. Shi, X. Yin, and Z. Wang, ``HashFlow for better flow record collection'', Tech. rep., arxiv.org, December 2018.
J. Xu, W. Ding, and X. Hu, ``VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time window'', Tech. rep., arxiv.org, December 2018.
A. Bayati, K.~K. Nguyen, and M. Cheriet, ``Multiple-step-ahead traffic prediction in high-speed networks'', IEEE Comm. Lett., vol. 22, no. 12, pp. 2447--2450, December 2018.
F. Pacheco, E. Exposito, M. Gineste, C. Baudoin, and J. Aguilar, ``Towards the deployment of machine learning solutions in network traffic classification: A systematic survey'', IEEE Comm. Surveys and Tutorials, vol. 21, no. 2, pp. 1988--2014, November 2018.
A.Y. Nur, The implications of the Internets topological structure for its efficiency, security, and reliability, Ph.D. thesis, Univ. of Louisiana at Lafayette (ProQuest Publ.), November 2018.
P. Fondo-Ferreiro, M. Rodriguez-Perez, M. Fernandez-Veiga, and S. Herreria-Alonso, ``Matching SDN and legacy networking hardware for energy efficiency and bounded delay'', Sensors, vol. 18, no. 11, pp. (23 pages), November 2018.
D. Engel and T.W. Malone, ``Integrated information as a metric for group interaction'', Plos One, vol. 13, no. 10, pp. (19 pages), November 2018.
N. Wu, S. Tseng, and A. Tang, ``Accurate rate-aware flow-level traffic splitting'', in Allerton Conf. on Communication, Control, and Computing, October 2018, pp. 774--783.
P. Liu, A. Benson, and M. Charikar, ``A sampling framework for counting temporal motifs'', Tech. rep., arxiv.org, October 2018.
A. Gupta, Flexible and scalable systems for network management, Ph.D. thesis, Princeton Univ., October 2018.
H. Dai, M. Li, and A. Liu, ``Finding persistent items in distributed datasets'', in Conf. on Computer Communications (INFOCOM), October 2018, pp. 1403--1411.
M. Brandt, T. Dai, A. Klein, H. Shulman, and M. Waidner, ``Domain validation++ for MitM-resilient PKI'', in ACM SIGSAC Conf. on Computer and Communications Security, October 2018, pp. 2060--2076.
Z. Zhang, Q. Qin, L. Ma, K. Poularakis, F. Le, K.K. Leung, S. Kompella, and L. Tassiulas, ``Routing performance in distributed SDN under synchronization constraint'', Tech. rep., dais-ita.org, September 2018.
T. Yang, J. Gong, H. Zhang, L. Zou, L. Shi, and X. Li, ``HeavyGuardian: Separate and guard hot items in data streams'', in ACM SIGKDD Intl Conf. on Knowledge Discovery and Data Mining, August 2018, pp. 2584--2593.
D. Ting, ``Count-Min: Optimal estimation and tight error bounds using empirical error distributions'', in Conf. on Knowledge Discovery and Data Mining (SIGKDD), August 2018, pp. 2319--2328.
K. Kostas, ``Anomaly detection in networks using machine learning'', M.S. thesis, Univ. of Essex, August 2018.
A. Gupta, R. Harrison, M. Canini, N. Feamster, J. Rexford, and W. Willinger, ``Sonata: query-driven streaming network telemetry'', in Conf. on Special Interest Group on Data Communication, August 2018, pp. 357--371.
Z. Cheng, Q. Huang, and P.P.C. Lee, ``On the performance and convergence of distributed stream processing via approximate fault tolerance'', Tech. rep., arxiv.org, August 2018.
C. Chen, Infrastructure-based anonymous communication protocols in future internet architectures, Ph.D. thesis, Carnegie Mellon Univ, August 2018.
H. Wu, H.C. Hsiao, D.E. Asoni, S. Scherrer, A. Perrig, and Y.C. Hu, ``CLEF: Limiting the damage caused by large flows in the Internet core (technical report)'', Tech. rep., arxiv.org, July 2018.
I. Sharafaldin, A.H. Lashkari, and A.A. Ghorbani, ``A detailed analysis of the CICIDS2017 data set'', in Intl Conf. on Information Systems Security and Privacy, July 2018, pp. 172--188.
J. Lee, D. Choi, and L Sael, ``CTD: Fast, accurate, and interpretable method for static and dynamic tensor decompositions'', PLOS One, vol. 13, no. 7, pp. (18 pages), July 2018.
G. Grigoryan and Y. Yaoqing~Liu, ``PFCA: a programmable FIB caching architecture'', in Symp. on Architectures for Networking and Communications Systems (ANCS), July 2018, pp. 97--103.
M. Goehring, H. Shulman, and M. Waidner, ``Path MTU discovery considered harmful'', in Conf. on Distributed Computing Systems (ICDCS), July 2018.
P.F. Ferreiro, ``Energy-efficient carrier SDN networks'', M.S. thesis, Univ. of Vigo, July 2018.
P. Fondo-Ferreiro, M. Rodriguez-Perez, and M. Fernandez-Veiga, ``Implementing energy saving algorithms for ethernet link aggregates with ONOS'', in Conf. on Software Defined Systems (SDS), June 2018, p. (8 pages).
K. Arthur-Durett, T.~E. Carroll, and S. Chikkagoudar, ``Discovering significant co-occurrences to characterize network behaviors'', in Intl Conf. on Human Interface and the Management of Information, June 2018, vol. 10904 of Lecture Notes in Computer Science, pp. 609--623.
A Aral and T. Ovatman, ``A decentralized replica placement algorithm for edge computing'', Trans. on Network and Service Management, vol. 15, no. 2, pp. 516--529, June 2018.
Y. Yu, Ultra-fast and memory-efficient lookups for cloud, networked systems, and massive data management, Ph.D. thesis, Univ. of Kentucky, May 2018.
A. Lengvinas, ``Investigation of Internet traffic anomalies by application of neural networks'', M.S. thesis, Vilnius Univ., May 2018.
J. Kucera, D.A. Popescu, G. Antichi, J. Korenek, and A.W. Moore, ``Seek and Push: Detecting large traffic aggregates in the dataplane'', Tech. rep., arxiv.org, May 2018.
V. Kirilin and S. Gorinsky, ``A protocol-ignorance perspective on incremental deployability of routing protocols'', in IFIP Networking Conf. (NETWORKING), May 2018, p. (9 pages).
T.R. Glass-Vanderlan, M.E. Iannacone, M.S. Vincent, Q. Chen, and R.A. Bridges, ``A survey of Intrusion Detection Systems leveraging host data'', Tech. rep., arxiv.org, May 2018.
O. Zoder, ``Real-time detection of communication with blacklisted network hosts'', Tech. rep., Masaryk Univ., April 2018.
J. Suarez-Varela and P. Barlet-Ros, ``Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs'', Computer Networks, vol. 135, pp. 289--301, April 2018.
John. Sonchack, A. Aviv, E. Keller, and J. Smith, ``Turboflow: information rich flow record generation on commodity switches'', in EuroSys Conf., April 2018, p. (16 pages).
A.K. Marnerides, D.P. Pezaros, and D. Hutchison, ``Internet traffic characterisation: Third-order statistics and higher-order spectra for precise traffic modelling'', Computer Networks, vol. 134, pp. 183--201, April 2018.
N. Dao, D. Vu, Y. Lee, S. Cho, C. Cho, and H. Kim, ``Pattern-identified online task scheduling in multitier edge computing for industrial IoT services'', Mobile Information Systems, vol. 2018, pp. (9 pages), April 2018.
C. Bocovich and I. Goldberg, ``Secure asymmetry and deployability for decoy routing systems'', Proc. on Privacy Enhancing Technologies, vol. 2018, no. 3, pp. 43--62, April 2018.
L. Zhu, X. Tang, M. Shen, X. Du, and M. Guizani, ``Privacy-preserving DDoS attack detection using cross-domain traffic in Software Defined Networks'', IEEE J. on Selected Areas in Communications, vol. 36, no. 3, pp. 628--643, March 2018.
R. Harrison, Q. Cai, A. Gupta, and J. Rexford, ``Network-wide heavy hitter detection with commodity switches'', in Symp. on SDN Research, March 2018, p. (3 pages).
O. Alipourfard, M. Moshref, Y. Zhou, T. Yang, and M. Yu, ``A comparison of performance and accuracy of measurement algorithms in software'', in Symp. on SDN Research, March 2018, p. (14 pages).
J. Vidal, A. Orozco, and L. Villalba, ``Adaptive artificial immune networks for mitigating DoS flooding attacks'', Swarm and Evolutionary Computation, vol. 38, pp. 94--108, February 2018.
S. Mastorakis, T. Ahmed, and J. Pisharath, ``ISA-based trusted network functions and server applications in the untrusted cloud'', Tech. rep., arxiv.org, February 2018.
A. Lucchesi, A. Drummond, and G. Teodoro, ``High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approach'', J. of Internet Services and Applications, vol. 9, no. 3, pp. (18 pages), February 2018.
P. Goyal, A. Narayan, F. Cangialosi, D. Raghavan, S. Narayana, M. Alizadeh, and H. Balakrishnan, ``Elasticity detection: A building block for Internet congestion control'', Tech. rep., arxiv.org, February 2018.
C. Chen, D. Asoni, A. Perrig, D. Barrera, G. Danezis, and C. Troncoso, ``TARANET: Traffic-analysis resistant anonymity at the NETwork layer'', Tech. rep., arxiv.org, February 2018.
Y. Zhou, J. Bi, T. Yang, K. Gao, C. Zhang, J. Cao, and J. Wang, ``KeySight: Troubleshooting programmable switches via scalable high-coverage behavior tracking'', in Intl Conf. on Network Protocols (ICNP), January 2018, vol. 26, p. (11 pages).
A. Zhou, H. Zhu, L. Liu, and C. Zhu, ``Detection of super nodes based on connection metrics for network data streams'', in IEEE Intl Conf on Big Data Analysis (ICBDA), January 2018, vol. 3, p. (6 pages).
A. Zhou, L. Liu, H. Zhu, C. Zhu, and L. Chen, ``Parallel Sketch Based Super Node Detection with Traceability'', Chinese Journal of Electronics, vol. 27, pp. (8 pages), January 2018.
C. Zhang, Y. Feng, H. Song, Y. Wan, W. Xu, Y. Wang, H. Dai, Y. Li, and B. Lin, ``OBMA: Minimizing Bitmap Data Structure with Fast and Uninterrupted Update Processing'', in IEEE/ACM Intl Symp. on Quality of Service (IWQoS), January 2018, vol. 26, p. (6 pages).
T. Yang, J. Jiang, P. Liu, Q. Huang, J. Gong, Y. Zhou, R. Miao, X. Li, and S. Uhlig, ``Elastic sketch: adaptive and fast network-wide measurements'', in ACM Special Interest Group on Data Communication, January 2018, p. (15 pages).
N. Wu, Y. Bi, N. Michael, A. Tang, J.C. Doyle, and N. Matni, ``A Control-Theoretic Approach to In-Network Congestion Management'', IEEE/ACM Trans. on Networking, vol. 26, pp. (14 pages), January 2018.
J. Wu, Y. Chen, and H. Zheng, ``Approximation algorithms for dependency-aware rule-caching in Software-Defined Networks'', in IEEE Global Comm. Conf. (GLOBECOM), January 2018, p. (6 pages).
H. Wu, H.C. Hsiao, D.E. Asoni, S. Scherrer, A. Perrig, and Y.C. Hu, ``CLEF: Limiting the Damage Caused by Large Flows in the Internet Core'', in Intl Conf. on Cryptology and Network Security, January 2018, p. (20 pages).
Z. Wang, C. Zhou, Y. Yu, S. Xingang, X. Yin, and J. Yao, ``Fast detection of heavy hitters in Software Defined Networking using an adaptive and learning method'', in Intl Conf. on Cloud Computing and Security, January 2018, p. (12 pages).
P. Velarde-Alvarado, R. Martinez-Pelaez, L. Mena-Camare, A. Ochoa-Brust, and A. Iriarte-Solis, ``Design of a Traffic Generation Platform for Offline Evaluation of NIDS'', in Intl Conf. On Advances In Computing, Control And Networking, January 2018, vol. 8, p. (6 pages).
S. Ullah, M.~D. Awan, and M.~S.~H. Khiyal, ``Big Data in Cloud Computing: A Resource Management Perspective'', Hindawi Scientific Programming, vol. 2018, pp. (18 pages), January 2018.
D.R. Teixeira, J.M.C. Silva, and S.R. Lima, ``Deploying Time-based Sampling Techniques in Software-Defined Networking'', in Intl Conf. on Software, Telecommunications and Computer Networks (SoftCOM), January 2018, vol. 26.
J.Y. Shin, D. Kirovski, and D.T. Harper, ``Computing units using directional wireless communication'' January 2018.
I. Sharafaldin, A.H. Lashkari, and A.A. Ghorbani, ``Toward generating a new intrusion detection dataset and intrusion traffic characterization.'', in Intl Conf. on Information Systems Security and Privacy (ICISSP), January 2018, vol. 1, pp. 108--116.
M.~Z. Saavedra and W.~E. Yu, ``Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop'', in Intl Symp. on Computing and Networking Workshops (CANDARW), January 2018, p. (4 pages).
R.~H. Remedios and A. Nayak, ``On improving measurement accuracy of DREAM framework with estimation filters'', in IEEE Global Comm. Conf. (GLOBECOM), January 2018, p. (7 pages).
D.~L. Quoc, I.~E. Akkus, P. Bhatotia, S. Blanas, R. Chen, C. Fetzer, and T. Strufe, ``ApproxJoin: Approximate Distributed Joins'', in ACM Symp. on Cloud Computing, January 2018, p. (13 pages).
Z. Peng, H. Li, and C. Hu, ``DIAL: Distributed Elephant Flow Counting on SDN'', in IEEE Global Communications Conf. (GLOBECOM), January 2018, p. (6 pages).
A. Nisioti, A. Mylonas, P.~D. Yoo, and V. Katos, ``From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods'', IEEE Communications Surveys and Tutorials, vol. 20, pp. (20 pages), January 2018.
M. Nasr, A. Bahramali, and A. Houmansadr, ``DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2018, p. (15 pages).
A. Narayan, F. Cangialosi, D. Raghavan, P. Goyal, S. Narayana, R. Mittal, M. Alizadeh, and H. Malakrishnan, ``Restructuring endpoint congestion control'', in Conf. of the ACM Special Interest Group on Data Communication, January 2018, p. (14 pages).
A. Nabiyev, ``Application of clustering methods network traffic for detecting DDoS attacks'', Problems of information technology, vol. 1, pp. 98--107, January 2018.
K. Moriarty and A. Morton, ``Effects of Pervasive Encryption on Operators'', Tech. rep., Internet Engineering Task Force (IETF), January 2018.
M. Mitzenmacher, S. Pontarelli, and P. Reviriego, ``Adaptive cuckoo filters'', in Proc. Workshop on Algorithm Engineering and Experiments (ALENEX), January 2018, p. (12 pages).
A. Meryem, D. Samira, and E.~O. Bouabid, ``Enhancing Cloud Security using advanced MapReduce k-means on log files'', in Intl Conf. on Software Engineering and Information Management, January 2018, p. (5 pages).
W. Mao, Z. Shen, and X. Huang, ``Facilitating network functions virtualization by exploring locality in network traffic: A proposal'', in Intl Conf. on Computer Science and Artificial Intelligence, January 2018, p. (5 pages).
J. Lu, T. Yang, Y. Wang, H. Dai, X. Chen, L. Jin, H. Song, and B. Liu, ``Low Computational Cost Bloom Filters'', IEEE/ACM Transactions on Networking (TON), vol. 26, pp. (14 pages), January 2018.
X. Li, W. Cheng, T. Zhang, J. Xie, F. Ren, and B. Yang, ``Power efficient high performance packet I/O'', in Intl Conf. on Parallel Processing Article No. 69, January 2018, vol. 69, p. (10 pages).
H. Li, H. Hu, G. Gu, G.~J. Ahn, and F. Zhang, ``vNIDS: Towards elastic security with safe and efficient virtualization of Network Intrusion Detection Systems'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2018, p. (18 pages).
A. Kumari, J. Chandra, and A. Sairam, ``Optimizing flow setup time in software defined network'', in Intl Conf. on Communication Systems and Networks (COMSNETS), January 2018, p. (3 pages).
C. Kim and H. Lee, ``A High-Bandwidth PCM-Based Memory System for Highly Available IP Routing Table Lookup'', IEEE Computer Architecture Letters, vol. 17, January 2018.
S.~C. Kao, D.~Y. Lee, T.~Y. Chen, and A.~Y. Wu, ``Dynamically updatable ternary segmented aging Bloom filter for OpenFlow-compliant low-power packet processing'', IEEE/ACM Trans. on Networking (TON), vol. 26, pp. (14 pages), January 2018.
G. Julian-Moreno, R. Leira, J.E. Lopez~de Vergara, F.J. Gomez-Arribas, and I. Gonzalez, ``On the feasibility of 40 gbps network data capture and retention with general purpose hardware'', in Annual ACM Symp. on Applied Computing, January 2018, vol. 33, p. (9 pages).
H.~P. Joshi and R. Dutta, ``GADFly: A fast and robust algorithm to detect P2P botnets in communication graphs'', in IEEE Global Comm. Conf. (GLOBECOM), January 2018, p. (6 pages).
Q. Huang, P.~P.~C. Lee, and Y. Bao, ``Sketchlearn: relieving user burdens in approximate measurement with automated statistical inference'', in ACM Special Interest Group on Data Communication, January 2018, p. (15 pages).
H. Hu, X. Zhai, M. Wang, and G. Hu, ``Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs)'', in International Conference on Cloud Computing and Security, January 2018, p. (11 pages).
H. Guo and J. Heidemann, ``Detecting IoT Devices in the Internet (Extended)'', Tech. rep., University of Southern California (USC), January 2018.
A. Girma and P. Wang, ``An Efficient Hybrid Model for Detecting Distributed Denial of Service (DDOS) Attacks in Cloud Computing using Multivariate Correlation and Data Mining Clustering Techniques'', Issues in Information System, vol. 19, pp. (12 pages), January 2018.
N. Geng, Y. Yang, and M. Xu, ``Flow-level traffic engineering in conventional networks with hop-by-hop routing'', in Symp. on Quality of Service (IWQoS), January 2018.
R. Fouladi, C. Kayatas, and E. Anarim, ``Statistical measures: Promising features for time series based DDoS attack detection'', in Workshop on Computational Intelligence for Multimedia Understanding (IWCIM), January 2018, p. (9 pages).
P. Fondo-Ferreiro, M. Rodriguez-Perez, and M. Fernandez-Veiga, ``QoS-aware energye efficient algorithms for ethernet link aggregates in Software-Defined Networks'', in Intl Conf on Software, Telecommunications and Computer Networks (SoftCOM), January 2018, p. (5 pages).
H. Dai, M. Shahzad, A.~X. Liu, M. Li, Y. Zhong, and G. Chen, ``Identifying and Estimating Persistent Items in Data Streams'', IEEE/ACM Transactions on Networking, vol. 26, pp. (14 pages), January 2018.
E. Ciftcioglu, R. Hardy, K. Chan, L. Scott, D. Oliveira, and G. Verma, ``Chaff allocation and performance for network traffic obfuscation'', in IEEE Intl Conf. on Distributed Computing Systems (ICDCS), January 2018, vol. 38, p. (4 pages).
M. Cermak, T. Jirsik, P. Velan, J. Komarkova, S. Spacek, M. Drasar, and T. Plesnik, ``Towards provable network traffic measurement and analysis via semi-labeled trace datasets'', in Network Traffic Measurement and Analysis Conf. (TMA), January 2018, p. (8 pages).
Z. Cao, X. Chen, Y. Sheng, and H. Ni, ``Catching the flow with locality sensitive hashing in programmable data planes'', in Intl Conf. on Software Engineering and Service Science (ICSESS), January 2018, p. (5 pages).
T. Braud, M. Heusse, and A. Duda, ``The virtue of gentleness: Improving connection response times with SYN priority active queue Management'', in IFIP Networking Conf. (IFIP Networking) and Workshops, January 2018, p. (9 pages).
R. Ben-Basat, X. Chen, G. Einziger, and O. Rottenstreich, ``Efficient Measurement on Programmable Switches Using Probabilistic Recirculation'', in Intl Conf. on Network Protocols (ICNP), January 2018, vol. 26, p. (11 pages).
R.~B. Basat, G. Einziger, and R. Friedman, ``Fast flow volume estimation'', Pervasive and Mobile Computing, vol. 48, January 2018.
R.~B. Basat, G. Einziger, R. Friedman, M.~C. Luizelli, and E. Waisbard, ``Volumetric hierarchical heavy hitters'', in Intl Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), January 2018, vol. 26, p. (12 pages).
R.~B. Basat, G. Einziger, S.~L. Feibish, J. Moraney, and D. Raz, ``Network-wide routing-oblivious heavy hitters'', in Symp. on Architectures for Networking and Communications Systems, January 2018, p. (8 pages).
T. Atmaca, A. Kamli, and A. Rataj, ``Adaptation of the N-GREEN architecture for a bursty traffic'', in Intl Confe. on Computer Networks, January 2018, p. (13 pages).
M. Amer, A. Busson, and I.~G. Lassous, ``Association Optimization in Wi-Fi Networks based on the Channel Busy Time Estimation'', in Networking Conf. (IFIP Networking) and Workshops, January 2018, p. (9 pages).
A. Alsirhani, S. Sampalli, and P. Bodorik, ``DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache Spark'', in IEEE Canadian Conf. on Electrical and Computer Engineering (CCECE), January 2018, p. (6 pages).
M.~E. Ahmed, S. Ullah, and H. Kim, ``Statistical Application Fingerprinting for DDoS Attack Mitigation'', IEEE Transactions on Information Forensics and Security, vol. 14, pp. (14 pages), January 2018.
P.A. Abu, M.Z. Saavedra, A.H. Medalla, and W.E. Yu, ``Adapting block-sized captures for faster network flow analysis on the Hadoop ecosystem'', in IEEE Intl Conf. on Computer and Communications, January 2018, vol. 4, p. (8 pages).
T. Xu, D. Gao, P. Dong, C. Foh, and H. Zhang, ``Mitigating the table-overflow attack in Software-Defined Networking'', IEEE Trans. on Network and Service Management, vol. 14, no. 4, pp. 1086--1097, December 2017.
M.Z.N.L. Saavedra and W.E.S. Yu, ``A comparison between text, Parquet, and PCAP formats for use in distributed network flow analysis on Hadoop'', J. of Advances in Computer Networks, vol. 5, no. 2, pp. 59--64, December 2017.
T.H. Lee, ``Towards an accountable and private Internet'', M.S. thesis, ETH Zurich, December 2017.
M. Ghasemi, Data-driven management of CDN performance, Ph.D. thesis, Princeton Univ., December 2017.
S.L. Cortes, Jurisdictional arbitrage: Quantifying and counteracting the threat of government intelligence agencies against Tor, Ph.D. thesis, Northeastern Univ., December 2017.
Y. Yu, D. Belazzougui, C. Qian, and Q. Zhang, ``Memory-efficient and ultra-fast network lookup and forwarding using Othello hashing'', Tech. rep., arxiv.org, November 2017.
M. Rodriguez-Perez, S. Herreria-Alonso, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Delay properties of energy efficient ethernet networks'', IEEE Communications Lett., vol. 21, no. 10, pp. 2194--2197, October 2017.
T. Matek, ``Anomaly detection in computer networks using higher-order dependencies'', M.S. thesis, Univ. of Ljubljana, October 2017.
J. Varela and P. Ros, ``Towards a NetFlow implementation for OpenFlow software-Defined Networks'', in Intl Teletraffic Congress, September 2017, vol. 29, pp. 187--195.
D.L. Quoc, R. Chen, P. Bhatotia, C. Fetzer, V. Hilt, and T. Strufe, ``Approximate stream analytics in Apache Flink and Apache Spark streaming'', Tech. rep., arxiv.org, September 2017.
J.R.S.V. Macia, ``Design of a flow monitoring solution for OpenFlow Software-Defined Networks'', M.S. thesis, Univ. of Granada, September 2017.
F.A.F. Silveira, ``Minimizing the number of observers required for traffic matrix generation'', M.S. thesis, Fed. Univ. of Espirito Santo, August 2017.
T. Phan, N. Bao, and M. Park, ``Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks'', J. of Network and Computer Applications, vol. 91, no. C, pp. 14--25, August 2017.
H. Luo, Z. Chen, J. Li, and A.V. Vasilakos, ``Preventing distributed Denial-of-Service flooding attacks with dynamic path identifiers'', IEEE Trans. on Information Forensics and Security, vol. 12, no. 8, pp. 1801--1815, August 2017.
Y. Kim, D. Choi, T. Van, M. Long, and M. Park, ``DDoS Detection System Based on Multiple Machine Learning Combination for Software Defined Networking'', J. of Korean Inst. of Communications and Information Sciences, vol. 42, no. 8, pp. 1581--1590, August 2017.
Q. Huang, P. Lee, R. Li, L. Tang, Y. Chen, and G. Zhang, ``SketchVisor: Robust network measurement for software packet processing'', in ACM SIGCOMM, August 2017, pp. 113--126.
F.G. Guerrero, ``Stochastic traffic analysis of contemporary Internet high-speed links'', in Colombian Conf. on Computing, August 2017, vol. 735 of Communications in Computer and Information Science, pp. 44--58.
R.B. Ben-Basat, G. Einziger, R. Friedman, M.C. Luizelli, and E. Waisbard, ``Constant time updates in hierarchical heavy hitters'', in ACM Special Interest Group on Data Communication (SIGCOMM), August 2017, pp. (127--140).
I. Sharafaldin, A. Gharib, A. Lashkari, and A. Ghorbani, ``Towards a reliable Intrusion Detection benchmark dataset'', Software Networking, vol. 2017, no. 1, pp. 177--200, July 2017.
J. Meng, F. Ren, and C. Lin, ``Modeling and understanding burst transmission for energy efficient ethernet'', Computer Networks, vol. 122, pp. 217--230, July 2017.
T. Kim, J. Lim, J. Kim, W. Cho, E. Chung, and H. Lee, ``Scalable bandwidth shaping scheme via adaptively managed parallel heaps in manycore-based network processors'', ACM Trans. on Design Automation of Electronic Systems, vol. 22, no. 4, pp. (26 pages), July 2017.
M. Iordache, S. Jouet, A. Marnerides, and D. Pezaros, ``Distributed, multi-level network anomaly detection for datacentre networks'', in IEEE ICC Next Generation Networking and Internet Symp., July 2017, p. (6 pages).
N. Wu, Y. Bi, N. Michael, A. Tang, J. Doyle, and N. Matni, ``HFTraC: High-frequency traffic control'', in Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2017, pp. 43--44.
A. Muhammad and F. Alameka, ``Integrasi metode normalized reelative network entropy dan neural network backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS'', J. Rekayasa Teknologi Informasi, vol. 1, no. 1, pp. 1--7, June 2017.
J. Mirkovic, G. Bartlett, J. Heidemann, H. Shi, and X. Deng, ``Do you see me now? Sparsity in passive observations of address liveness'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).
A. Maltinsky, R. Giladi, and Y. Shavitt, ``On network neutrality measurements'', ACM Trans. on Intelligent Systems and Technology (TIST), vol. 8, no. 4, June 2017.
J. Lu, Y. Wan, Y. Li, C. Zhang, H. Dai, Y. Wang, G. Zhang, and B. Liu, ``Ultra-fast Bloom filters using SIMD techniques'', in Intl Symp. on Quality of Service (IWQoS), June 2017, p. (6 pages).
H. Duan, C. Wang, X. Yuan, Y. Zhou, Q. Wang, and K. Ren, ``LightBox: SGX-assisted secure network functions at near-native speed'', Tech. rep., arxiv.org, June 2017.
B. Chainourov, ``Log analysis using Splunk Hadoop Connect'', M.S. thesis, Naval Postgraduate School, June 2017.
M. Albdair, R. Addie, and D. Fatseas, ``Social network behaviour inferred from O-D pair traffic'', Australian J. of Telecommunications and the Digital Economy, vol. 5, no. 2, pp. 131--150, June 2017.
M. Taghouti, D. Lucani, F. Fitzek, and A. Bouallegue, ``Random linear network coding schemes for reduced zero-padding overhead: Complexity and overhead analysis'', in European Wireless Conf., May 2017, pp. 321--327.
E. Lopez and L. Navarro, ``Tight bounds for sketches in traffic validation'', in Conf. on Networking, Sensing and Control, May 2017, p. (6 pages).
R.B. Basat, G. Einziger, R. Friedman, and Y. Kassner, ``Randomized admission policy for efficient top-k and frequency estimation'', in Conf. on Computer Communications (INFOCOM), May 2017, p. (9 pages).
R. Basat, G. Einziger, R. Friedman, and Y. Kassner, ``Optimal elephant flow detection'', in IEEE Conf. on Computer Communications, May 2017, p. (9 pages).
D. Anderson, P. Bevan, K. Lang, E. Liberty, L. Rhodes, and J. Thaler, ``A high-performance algorithm for identifying frequent items in data streams'', Tech. rep., arxiv.org, May 2017.
S. Alonso, M. Perez, M. Veiga, and C. Garcia, ``Optimizing dual-mode EEE interfaces: Deep-sleep is healthy'', IEEE Trans. on Communications, vol. 65, no. 8, pp. 3374--3385, May 2017.
V. Sivaraman, S. Narayana, O. Rottenstreich, S. Muthukrishnan, and J. Rexford, ``Heavy-hitter detection entirely in the data plane'', in Symp. on SDN Research, April 2017, pp. 164--176.
R.H. Remedios, On improving DREAM framework with estimations and ProgME, Ph.D. thesis, Univ. of Ottawa, April 2017.
M. Rao and M. Naidu, ``A model for generating synthetic network flows and accuracy index for evaluation of anomaly network Intrusion Detection Systems'', Indian J. Science and Technology, vol. 10, no. 14, pp. (16 pages), April 2017.
A. Oeldemann, T. Wild, and H. Herkersdorf, ``Reducing data center resource over-provisioning through dynamic load management for virtualized network functions'', in Architecture of Computing Systems (ARCS), April 2017, vol. 10172 of Lecture Notes in Computer Science (LNCS), pp. 234--247.
T. Lee, C. Pappas, A. Perrig, V. Gligor, and Y. Hu, ``The case for in-network replay suppression'', in Asia Conf. on Computer and Communications Security, April 2017, pp. 862--873.
F. Halas, ``Performance measurement of stream data processing in Apache Spark'', M.S. thesis, Masaryk Univ., April 2017.
M. Ghasemi, T. Benson, and J. Rexford, ``Dapper: Data plane performance diagnosis of TCP'', in Symp. on SDN Research, April 2017, pp. 61--74.
R. Birkner, A. Gupta, N. Feamster, and L. Vanbever, ``SDX-based flexibility or Internet correctness?: Pick two!'', in Symp. on SDN Research (SOSR), April 2017, p. (7 pages).
A. Skrastins, Resource and admission management in Next Generation Networks, Ph.D. thesis, Riga Tech. Univ., March 2017.
N. Duffield, Y. Xu, L. Xia, N. Ahmed, and M. Yu, ``Stream aggregation through order sampling'', Tech. rep., arxiv.org, March 2017.
C. Cascone, R. Bifulco, S. Pontarelli, and A. Capone, ``Relaxing state-access constraints in stateful programmable data planes'', Tech. rep., arxiv.org, March 2017.
D. Boro and D.K Bhattacharyya, ``DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks'', Microsystem Technologies, vol. 23, no. 3, pp. 593--611, March 2017.
W. Bhaya and M.E. Manaa, ``DDoS attack detection approach using an efficient cluster analysis in large data scale'', in Conf. on New Trends in Information and Communications Technology Applications (NTICT), March 2017, pp. 168--173.
G. Vasiliadis, L. Koromilas, M. Polychronakis, and S. Ioannidis, ``Design and implementation of a stateful network packet processing framework for GPUs'', IEEE/ACM Trans. on Networking (TON), vol. 25, no. 1, pp. 610--623, February 2017.
J. Suarez-Varela and P. Barlet-Ros, ``Reinventing NetFlow for OpenFlow Software-Defined Networks'', Tech. rep., arxiv.org, February 2017.
G. Lazarou, M. Alam, and J. Picone, ``Measuring the variability of CAIDA internet traffic traces'', in Conf. on Computer and Information Technology, February 2017, p. (6 pages).
D. Engel and W. Malone, ``Integrated information as a metric for group interaction: Analyzing human and computer groups using a technique developed to measure consciousness'', Tech. rep., arxiv.org, February 2017.
J. Deng, H. Li, H. Hu, K.C. Wang, G.J. Ahn, Z. Zhao, and W. Han, ``On the safety and efficiency of virtual firewall elasticity control'', in Network and Distributed System Security Symp. (NDSS), February 2017, p. (15 pages).
Y. Afek, A. Barr, S. Feibish, and L. Schiff, ``Detecting heavy flows in the SDN match and action model'', Tech. rep., arxiv.org, February 2017.
J.F. Zazo, S. Lopez-Buedo, M. Ruiz, and G. Sutter, ``A single-FPGA architecture for detecting heavy hitters in 100 Gbit/s ethernet links'', in Intl Conf. on ReConFigurable Computing and FPGAs (ReConFig), January 2017, p. (6 pages).
Y. Yu, D. Belazzougui, C. Qian, and Q. Zhang, ``A concise forwarding information base for scalable and fast name lookups'', in Intl Conf. on Network Protocols (ICNP), January 2017, vol. 25, p. (10 pages).
Q. Xiao, S. Chen, Y. Zhou, M. Chen, J. Luo, T. Li, and Y. Ling, ``Cardinality estimation for elephant flows: A compact solution based on virtual register sharing'', IEEE/ACM Trans. on Networking, vol. 25, pp. (15 pages), January 2017.
L. Vannucci, ``Indexing and compression of network flows'', Tech. rep., Univ, of Pisa, January 2017.
K.~S. Tai, V. Sharan, P. Bailis, and G. Valiant, ``Finding Heavily-Weighted Features in Data Streams'', Tech. rep., arxiv.org, January 2017.
J. Suarez-Varela, P. Barlet-Ros, and V. Carela-Espanol, ``A NetFlow/IPFIX implementation with OpenFlow'', Tech. rep., SDN-Polygraph, January 2017.
D.~L. Quoc, R. Chen, P. Bhatotia, C. Fetzer, V. Hilt, and T. Strufe, ``StreamApprox: approximate computing for stream analytics'', in ACM/IFIP/USENIX Middleware Conf., January 2017, vol. 18, p. (12 pages).
E. Norige, Hardware algorithms for high-speed packet processing, Ph.D. thesis, Michigan State Univ., January 2017.
M. Nasr, A. Houmansadr, and A. Mazumdar, ``Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2017, p. (16 pages).
M.~A.~S. Monge, J.~M. Vidal, and L.~J.~G. Villalba, ``Reasoning and Knowledge Acquisition Framework for 5G Network Analytics'', Sensors, vol. 17, January 2017.
J. Mirkovic, E. Kline, and P. Reiher, ``RESECT: Self-Learning Traffic Filters for IP Spoofing Defense'', in Annual Computer Security Applications Conf., January 2017, vol. 33, p. (9 pages).
K. Lee, Towards precise network measurements, Ph.D. thesis, Cornell Univ., January 2017.
A. Lazaris and V.~K. Prasanna, ``DeepFlow: a deep learning framework for software-defined measurement'', in Workshop on Cloud-Assisted Networking, January 2017, vol. 2, p. (5 pages).
A. Kolesnikov, ``Load modelling and generation in IP-based networks'', Tech. rep., arxiv.org, January 2017.
Y.I. Joo and M. Park, ``An efficient DDoS attack detection mechanism based on distributed self organizing map'', Intl J. of Applied Engineering Research, vol. 12, no. 13, pp. 3609--3615, January 2017.
T. Huong and N. Thanh, ``Software defined networking-based one-packet DDoS mitigation architecture'', in Conf. on Ubiquitous Information Management and Communication (IMCOM), January 2017, vol. 11 (110), p. (7 pages).
J. Fu and K. Zhang, ``Practical Concurrent Self-Organizing Lists'', in Intl Conf. on Parallel and Distributed Systems (ICPADS), January 2017.
M. Conti and A. Gangwal, ``Blocking intrusions at border using software defined-internet exchange point (SD-IXP)'', in Conf. on Network Function Virtualization and Software Defined Networks (NFV-SDN), January 2017, p. (6 pages).
M. Conti, A. Gangwal, and M.~S. Gaur, ``A comprehensive and effective mechanism for DDoS detection in SDN'', in Intl Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob), January 2017, vol. 13, p. (8 pages).
S. Chen, M. Chen, and Q. Xiao, ``Per-flow cardinality measurement'', in Traffic Measurement for Big Network Data, January 2017, Wireless Networks, pp. 47--76.
A. Cenedese, F. Tramarin, and S. Vitturi, ``An energy efficient ethernet strategy based on traffic prediction and shaping'', IEEE Trans. on Communications, vol. 65, no. 1, pp. 270--282, January 2017.
A. Atifi and E. Bou-Harb, ``On correlating network traffic for cyber threat intelligence: A Bloom filter approach'', in Intl Wireless Communications and Mobile Computing Conf. (IWCMC), January 2017, vol. 13, p. (6 pages).
Q. Xia, T. Chen, and W. Xu, ``CIDS: Adapting legacy Intrusion Detection Systems to the cloud with hybrid sampling'', in Intl Conf. on Computer and Information Technology, December 2016, pp. 508--515.
J. Saldana, ``What to do with the Wi-Fi wild west'', Tech. rep., Horizon 2020, December 2016.
M.M. Javadi, Timely, accurate, and scalable network management for data centers, Ph.D. thesis, Univ. of Southern California, December 2016.
A. Hendawi, F. Alali, X. Wang, Y. Guan, T. Zhou, X. Liu, N. Basit, and J. Stankovic, ``Hobbits: Hadoop and Hive based Internet traffic analysis'', in IEEE Conf. on Big Data, December 2016, pp. 2590--2599.
A. Gharib, I. Sharafaldin, A. Lashkari, and A. Ghorbani, ``An evaluation framework for Intrusion Detection dataset'', in Conf. on Information Science and Security, December 2016, p. (5 pages).
C. Chen and A. Perrig, ``PHI: Path-hidden lightweight anonymity protocol at network layer'', Proc. on Privacy Enhancing Technologies, vol. 2017, no. 1, pp. 100--117, December 2016.
A. Bayati, V. Asghari, K. Nguyen, and M. Cheriet, ``Gaussian process regression based traffic modeling and prediction in high-speed networks'', in Global Comm. Conf. (GLOBECOM), December 2016, p. (7 pages).
A. Aral, Resource mapping optimization for distributed cloud services, Ph.D. thesis, Istanbul Technical Univ., December 2016.
M. Albdair, R. Addie, and D. Fatseas, ``Inference of social network behavior from Internet traffic traces'', in Conf. on Telecommunication Networks and Applications (ITNAC), December 2016, p. (6 pages).
S. Narayana, A. Sivaraman, V. Nathan, M. Alizadeh, D. Walker, J. Rexford, V. Jeyakumar, and C. Kim, ``Hardware-software co-design for network performance measurement'', in ACM Workshop on Hot Topics in Networks Pages, November 2016, vol. 15, pp. 190--196.
J. Moraney and D. Raz, ``Efficient detection of flow anomalies with limited monitoring resources'', in Conf. on Network and Service Management (CNSM), November 2016, pp. 55--63.
C. Li, Z. Chen, W. Zheng, Y. Wu, and J. Cao, ``BAH: A bitmap index compression algorithm for fast data retrieval'', in Conf. on Local Computer Networks (LCN), November 2016, pp. 697--705.
T. Lee, C. Pappas, P. Szalachowski, and A. Perrig, ``Communication based on per-packet one-time addresses'', in Conf. on Network Protocols (ICNP), November 2016, p. (10 pages).
N. Katta, Building efficient and reliable software-defined networks, Ph.D. thesis, Princeton Univ., November 2016.
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``A probabilistic sampling method for efficient flow-based analysis'', J. of Communications and Networks, vol. 18, no. 5, pp. 818--825, November 2016.
Q. Huang and P. Lee, ``Toward high-performance distributed stream processing via approximate fault tolerance'', Proc. of the Very Large Data Bases Endowment, vol. 10, no. 3, pp. 73--84, November 2016.
P. Dey and M. Yuksel, ``CAR: Cloud-assisted routing'', in Conf. on Network Function Virtualization and Software Defined Networks, November 2016, p. (7 pages).
H. Nguyen, T. Begin, A. Busson, and I. Lassous, ``Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networks'', in Conf. on Network and Service Management, October 2016, vol. 12, pp. 336--341.
J. Namayanja and V. Janeja, ``Characterization of evolving networks for cybersecurity'', in Information Fusion for Cyber-Security Analytics, Ch. 5, October 2016, vol. 691 of Studies in Computational Intelligence, pp. 111--127.
B. Retnaswamy and K. Ponniah, ``A new ontology?based multi agent framework for intrusion detection'', Intl J. of Communication Systems, vol. 29, no. 17, pp. 2490--2502, September 2016.
D Hintze and A. Rice, ``Picky: efficient and reproducible sharing of large datasets using Merkle-trees'', in Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2016, p. (9 pages).
Z. Zhou, ``Per-flow cardinality estimation based on virtual LogLog sketching'', M.S. thesis, Univ. Illinois, Urbana-Champaign, August 2016.
Y. Yu, D. Belazzougui, C. Qian, and Q. Zhang, ``A concise forwarding information base for scalable and fast flat name switching'', Tech. rep., arxiv.org, August 2016.
T. Wellem and Y.-K. Lai, ``Sketch-guided filtering support for detecting superspreaders in high-speed networks'', Electronics Letters, vol. 52, no. 17, pp. 1459--1461, August 2016.
T. Song, Z. Jiang, Y. Wei, X. Shi, X. Ma, and O. Ormond, ``Traffic aware energy efficient router: Architecture, prototype and algorithms'', IEEE J. on Selected Areas in Communications, vol. 34, no. 12, pp. 3814--3827, August 2016.
N. Singh, K. Singh, and T. De, ``Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection'', in Conf. on Informatics and Analytics, August 2016, p. (9 pages).
I. Meitei, K. Singh, and T. De, ``Detection of DDoS DNS amplification attack using classification algorithm'', in Conf. on Informatics and Analytics, August 2016, p. (6 pages).
Z. Liu, A. Manousis, X. Vorsanger, V. Sekar, and V. Braverman, ``One sketch to rule them all: Rethinking network flow monitoring with UnivMon'', in ACM SIGCOMM, August 2016, pp. 101--114.
P. Liu, Y. Li, Y. Sang, and J. Zhang, ``Anonymity-based privacy preserving network data publication'', in Trustcom/BigDataSE/ISPA, August 2016, pp. 823--828.
N.-N. Dao, J. Kim, M. Park, and S. Cho, ``Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks'', PLoS One, vol. 11, no. 8, pp. (24 pages), August 2016.
S. Pontarelli and P. Reviriego, ``Cuckoo Cache: A Technique to Improve Flow Monitoring Throughput'', IEEE Internet Computing, vol. 20, no. 4, pp. 46--53, July 2016.
T. Phan, T. Toan, D. Tuyen, T. Huong, and T. Nguyen, ``OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks'', in Conf. on Communications and Electronics, July 2016, pp. 13--18.
T. Phan, N. Bao, and M. Park, ``A novel hybrid flow-based handler with DDoS attacks in Software-Defined Networking'', in Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress, July 2016, pp. 350--357.
V.A. Foroushani, A security framework based on flow marking IP-traceback techniques, Ph.D. thesis, Dalhousie Univ., Halifax, CA, July 2016.
Y. Chen and S. Wang, ``A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropy'', in Conf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government, July 2016, pp. 150--155.
M. Cermak, D. Tovarnak, M. Lastovicka, and P. Caleda, ``A performance benchmark for NetFlow data analysis on distributed stream processing systems'', in Network Operations and Management Symp., July 2016, pp. 919--924.
X. Xu, J. Zhang, and Q. Li, ``Equalized interval centroid based watermarking scheme for stepping stone traceback'', in Conf. on Data Science in Cyberspace, June 2016, pp. 109--117.
C Xing, K. Ding, C. Hu, and M. Chen, ``Sample and fetch-based large flow detection mechanism in Software Defined Networks'', IEEE Comm. Letters, vol. 20, no. 9, pp. 1764--1767, June 2016.
Y. Wu, Z. Chen, J. Cao, H. Li, C. Li, Y. Wang, W. Zheng, J. Chang, J. Zhou, Z. Hu, and J. Guo, ``CAMP: A new bitmap index for data retrieval in traffic archival'', IEEE Comm. Letters, vol. 20, no. 6, pp. 1128--1131, June 2016.
N. Sahri and K. Okamura, ``Adaptive query rate for anomaly detection with SDN'', Intl J. of Computer Science and Network Security, vol. 16, no. 6, pp. 43--51, June 2016.
T. Huang, H. Sethu, and N. Kandasamy, ``A new approach to dimensionality reduction for anomaly detection in data traffic'', Tech. rep., arxiv.org, June 2016.
R. Hofstede, Flow-based compromise detection, Ph.D. thesis, Univ. of Twente, June 2016.
G. Einziger, B. Fellman, R. Friedman, and Y. Kassner, ``ICE buckets: improved counter estimation for network measurement'', Tech. rep., arxiv.org, June 2016.
M. Cermak and P. Celeda, ``Detecting advanced network threats using a similarity search'', in Conf. on Autonomous Infrastructure, Management, and Security, June 2016, vol. 9701 of Lecture Notes in Computer Science, pp. 137--141.
A. Abada, ``Resource optimization of TCAM-based SDN measurements via diminishing-points autodetection'', in European Conf. on Networks and Communications, June 2016, p. (6 pages).
T. Wellem, Y.-K. Lai, C.-Y. Huang, and Y.-W. Chung, ``Toward hardware support for a flexible sketch-based network traffic monitoring system'', in IEEE Region 10 Symp. (TENSYMP), May 2016, pp. 7--12.
J. Fairbanks, Graph analysis combining numerical, statistical, and streaming techniques, Ph.D. thesis, Georgia Inst. of Technology, May 2016.
D.E. Asoni, C. Chen, D. Barrera, and A. Perrig, ``On building onion routing into future Internet architectures'', in Workshop on Open Problems in Network Security (iNetSec), May 2016, vol. 9591 of Lecture Notes in Computer Science, pp. 71--81.
N. Sahri, Research on performance and security improvements by Software Defined Network, Ph.D. thesis, Kyushu Univ., April 2016.
T. Pan, T. Huang, J. Liu, J. Zhang, F. Yang, S. Li, and Y. Liu, ``Fast content store lookup using locality-aware skip list in Content-Centric Networks'', in Conf. on Computer Comm. Workshops, April 2016, p. (6 pages).
D. Krishnan, D. Quoc, P. Bhatotia, C. Fetzer, and R. Rodrigues, ``IncApprox: A data analytics system for incremental approximate computing'', in Conf. on World Wide Web, April 2016, pp. 1133--1144.
Z. Bozakov, A. Rizk, D. Bhat, and M. Zink, ``Measurement-based flow characterization in centrally controlled networks'', in Conf. on Computer Communications, April 2016, p. (9 pages).
R. Ben-Basat, G. Einziger, and R. Friedman, ``Heavy hitters in streams and sliding windows'', in IEEE Conf. on Computer Communications (INFOCOM), April 2016, p. (9 pages).
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Autonomous system based flow marking scheme for IP-Traceback'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 121--128.
T. Zhao, T. Li, B. Han, Z. Sun, and J. Huang, ``Design and implementation of Software Defined Hardware Counters for SDN'', Computer Networks, vol. 102, pp. 129--144, March 2016.
S. Qian, G. Wu, J. Huang, and T. Das, ``Benchmarking modern distributed streaming platforms'', in Conf. on Industrial Technology (ICIT), March 2016, pp. 592--598.
X. Liu, M. Shirazipour, M. Yu, and Y. Zhang, ``MOZART: Temporal coordination of measurement'', in Proc. Symp. on SDN Research (SOSR), March 2016, p. (12 pages).
H. Lim, V. Sekar, Y. Abe, and D.G. Anderson, ``NetMemex: Providing full-fidelity traffic archival'', Tech. rep., arxiv.org, March 2016.
C. Lei, H. Zhang, Y. Liu, and X. Du, ``Net-flow fingerprint model based on optimization theory'', Arabian J. for Science and Engineering, vol. 41, pp. 3081--3088, March 2016.
N. Katta, O. Alipourfard, J. Rexfor, and D. Walker, ``CacheFlow: Dependency-aware rule-caching for Software-Defined Networks'', in Symp. on SDN Research, March 2016, p. (12 pages).
D. Boro, H. Basumatary, T. Goswami, and D.K. Bhattacharyya, ``UDP Flooding attack detection using information metric measure'', in Conf. on ICT for Sustainable Development, February 2016, vol. 408 of Advances in Intelligent Systems and Computing, pp. 143--153.
Y. Xie, Y. Wang, H. He, Y. Xiang, S. Yu, and X. Liu, ``A general collaborative framework for modeling and perceiving distributed network behavior'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 5, pp. 3162--3176, January 2016.
J.M.C. Silva, A modular traffic sampling architecture for flexible network measurements, Ph.D. thesis, Univ. do Minho, Braga, PT, January 2016.
D. Perakovic, M. Perisa, I. Cvitic, and S. Husnjak, ``Artificial neuron network implementation in detection and classification of DDoS traffic'', in Telecommunications Forum (TELFOR), January 2016, vol. 24, p. (4 pages).
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Performance of flow-based anomaly detection in sampled traffic'', J. of Networks, vol. 10, no. 9, pp. 512--520, January 2016.
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Intelligent sampling using an optimized neural network'', J. of Networks, vol. 11, no. 1, pp. 16--27, January 2016.
R.G. Garroppo, G. Nencioni, G. Procissi, and L. Tavanti, ``The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs'', J. Computer Networks, vol. 94, no. C, pp. 99--111, January 2016.
G. Einziger and R. Friedman, ``Counting with TinyTable: Every Bit Counts!'', in Intl Conf. on Distributed Computing and Networking (ICDN), January 2016, p. 10 pages.
H. Abaci, G. Parr, S. McClean, A. Moore, and L. Krug, ``Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirements'', Sustainable Computing: Informatics and Systems, vol. 10, pp. 1--19, January 2016.
M. Moshref, M. Yu, R. Govindan, and A. Vahdat, ``SCREAM: Sketch Resource Allocation for Software-defined Measurement'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2015.
C. Li, J. Yang, Z. Wang, F. Li, and Y. Yang, ``A lightweight DDoS flooding attack detection algorithm based on synchronous long flows'', in Global Communications Conf. (GLOBECOM), December 2015, p. (6 pages).
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Flow-based anomaly detection using semisupervised learning'', in Conf. on Signal Processing and Communication Systems (ICSPCS), December 2015, p. (5 pages).
T. Huang, Adaptive sampling and statistical inference for anomaly detection, Ph.D. thesis, Drexel Univ., December 2015.
Z. Chen, H. Luo, M. Zhang, and J. Li, ``Improving network security by dynamically changing path identifiers in future Internet'', in Global Communications Conf. (GLOBECOM), December 2015, p. (7 pages).
X.-F. Chen and S.-Z. Yu, ``CIPA: A collaborative intrusion prevention architecture for programmable network and SDN'', Computers and Security, vol. 58, pp. 1--19, December 2015.
Z. Zhang, Z. Guo, and Y. Yang, ``Bounded-reorder packet scheduling in optical cut-through switch'', IEEE Trans. on Parallel and Distributed Systems, vol. 26, no. 11, pp. 2927--2941, November 2015.
B. Venkatesh, S.H. Choudhury, S. Nagajara, and N. Balakrishnan, ``BotSpot: fast graph based identification of structured P2P bots'', J. Computer Virology and Hacking Techniques, vol. 11, pp. 247--261, November 2015.
M. Righi and R. Nunes, ``Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas'', in Simposio Brasileiro em Seguranca da Informacao e Sistemas, November 2015, p. (4 pages).
Y. Purwanto, Hendrawan Kuspriyanto, and B. Rahardjo, ``Statistical analysis on aggregate and flow based traffic features distribution'', in Conf. on Wireless and Telematics (ICWT), November 2015, p. (6 pages).
Z. Liu, G. Vorsanger, V. Braverman, and V. Sekar, ``Enabling a RISC approach for Software-Defined Monitoring using universal streaming'', in ACM Workshop on Hot Topics in Networks (HotNets), November 2015, p. (7 pages).
C. Lei, H. Zhang, M. Li, and Y. Liu, ``Network watermarking model based on optimization theory'', in Conf. on Cloud Computing and Big Data (CCBD), November 2015, pp. 101--104.
Z. Jadidi, Flow-based anomaly detection in high-speed networks, Ph.D. thesis, Griffith Univ., November 2015.
T. Huang, H. Sethu, and N. Kandasamy, ``A fast algorithm for detecting anomalous changes in network traffic'', in Conf. on Network and Service Management (CNSM), November 2015, pp. 251--255.
O. Alipourfard, M. Moshref, and M. Yu, ``Re-evaluating measurement algorithms in software'', in Workshop on Hot Topics in Networks (HotNets), November 2015.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Deterministic flow marking for IPv6 traceback (DFM6)'', in Conf. on Network and Service Management (CNSM), November 2015, pp. 270--273.
H. Wu, ``Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity region'', M.S. thesis, Univ. Illinois, Urbana-Champaign, October 2015.
J. Saldana, I. Forcen, J. Fernandez-Navajas, and J. Ruiz-Mas, ``Improving network efficiency with Simplemux'', in Conf. on Computer and Information Technology (CIT), October 2015, pp. 446--453.
P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``A method to protect Bloom filters from soft errors'', in Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), October 2015, pp. 80--84.
S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and M. Lopez-Garcia, ``Frame coalescing in dual-mode EEE'', Tech. rep., arxiv.org, October 2015.
M.A. Erazo, R. Rong, and J. Liu, ``Symbiotic network simulation and emulation'', ACM Trans. on Modeling and Computer Simulation (TOMACS), vol. 26, no. 1, pp. (25 pages), October 2015.
C. Chen, D.E. Asoni, D. Barrera, G. Danezis, and A. Perrig, ``HORNET: High-speed onion routing at the network layer'', in Conf. on Computer and Communications Security (CCS), October 2015, pp. 1441--1454.
C. Basescu, R.M. Reischuk, P. Szalachowski, A. Perrig, Y. Zhang, H.-C. Hsiao, A. Kubota, and J. Urakawa, ``SIBRA: Scalable Internet Bandwidth Reservation Architecture'', Tech. rep., arxiv.org, October 2015.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Probabilistic flow marking for IP traceback (PFM)'', in Workshop on Reliable Networks Design and Modeling (RNDM), October 2015, pp. 229--236.
N. Rivetti, Y. Busnel, and A. Mostefaoui, ``Efficiently summarizing data streams over sliding windows'', in Symp. on Network Computing and Applications (NCA), September 2015, pp. 151--158.
R. de Oliviera~Schmidt, R. Sadre, A. Sperotto, H. van~den Berg, and A. Pras, ``Impact of packet sampling on link dimensioning'', IEEE Trans. on Network and Service Management, vol. 12, no. 3, pp. 392--405, September 2015.
E. Anceaume, Y. Busnel, N. Rivetti, and B. Sericola, ``Identifying global icebergs in distributed streams'', in Symp. on Reliable Distributed Systems (SRDS), September 2015, pp. 266--275.
V. Moreno, J. Ramos, P.M. Santiado~del Rio, J.L. Garcia-Dorado, F.J. Gomez-Arribas, and J. Aracil, ``Commodity packet capture engines: tutorial, cookbook and applicability'', IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1364--1390, August 2015.
V. Moreno, R. Leira, I. Gonzalez, and F.J. Gomez-Arribas, ``Towards high-performance network processing in virtualized environments'', in Symp. on High Performance Computing and Communications (HPCC), August 2015, pp. 535--540.
Q. Liu, J.C.S. Lui, C. He, L. Pan, W. Fan, and Y. Shi, ``SAND: A fault-tolerant streaming architecture for network traffic analytics'', J. Systems and Software, vol. 122, pp. 553--563, August 2015.
X. Li and C. Qian, ``The virtual network function placement problem'', in Computer Communications Student Workshops, August 2015, pp. 69--70.
X. Li and C. Qian, ``Low-complexity multi-resource packet scheduling for network function virtualization'', in Conf. on Computer Communications, August 2015, pp. 1400--1408.
M. Kim, S. Jung, and M. Park, ``A distributed self-organizing map for DoS attack detection'', in Conf. on Ubiquitous and Future Networks, August 2015, pp. 19--22.
H. Albiltaje, ``Detecting DDoS attack using a multilayer data mining techniques'', M.S. thesis, Islamic Univ. of Gaza, August 2015.
I. Popescu, T. Miyazaki, M. Chino, X. Wang, S. Okamoto, A. Gravey, P. Gravey, M. Veeraraghavan, M. Brandt-Pearce, and N. Yamanaka, ``Application-centric energy-efficient Ethernet with quality of service support'', Electronics Letters, vol. 51, no. 15, pp. 1165--1167, July 2015.
H. Ding and M. Rabinovich, ``TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurement'', ACM SIGCOMM Computer Communication Review, vol. 45, no. 3, pp. 20--27, July 2015.
Q. Xiao, S. Chen, M. Chen, and Y. Ling, ``Hyper-compact virtual estimators for Big Network Data based on register sharing'', in Intl Conf. on Measurement and Modeling of Computer Systems, June 2015, vol. 43 (1) of Performance Evaluation Review, pp. 417--428.
I.G. Padreny, ``Sistema de deteccion de ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, June 2015.
R. Osuna, ``Estudio de captura y almacenamiento de trafico en redes fisicas y virtuales multi-Gigabit'', M.S. thesis, Univ. Autonoma de Madrid, June 2015.
J. Martin, ``Sistema de deteccion de ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, June 2015.
R. Addanki, S. Maji, M. Veeraraghavan, and C. Tracy, ``A measurement-based study of big-data movement'', in Conf. on Networks and Communications (EuCNC), June 2015, pp. 445--449.
Z. Zhang, B. Wang, and J. Lan, ``Identifying elephant flows in internet backbone traffic with bloom filters and LRU'', Computer Communications, vol. 61, pp. 70--78, May 2015.
T. Wellem, Y.-K. Lai, and W.-Y. Chung, ``A software defined sketch system for traffic monitoring'', in Symp. on Architectures for Networking and Communications Systems (ANCS), May 2015, pp. 197--198.
S. Sharma, ``Shuffling based mechanism for DDoS prevention on cloud environment'', M.S. thesis, Natl Inst. of Technology, Rourkela, May 2015.
J.M. Namayanja and V.P. Janeja, ``Change detection in evolving computer networks: Changes in densification and diameter over time'', in Conf. on Intelligence and Security Informatics (ISI), May 2015, pp. 185--187.
K. Mokgolodi, ``Traffic prediction in cloud computing using time series models'', M.S. thesis, Univ. of Botswana, May 2015.
R. Mijumbi, J. Serrat, and J.-L. Gorricho, ``Self-managed resources in network virtualisation environments'', in Symp. on Integrated Network Management (IM), May 2015, pp. 1099--1106.
U. Ayesta, L. Bertaux, and D. Carvin, ``Non-intrusive scheduling of TCP flows'', in IFIP Networking Conf., May 2015, p. (9 pages).
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Investigating unique flow marking for tracing back DDoS attacks'', in Symp. on Integrated Network Management (IM), May 2015, pp. 762--765.
R. Steinert and A. Hess, ``Observing software-defined networks using a decentralized link monitoring approach'', in Conf. on Network Softwarization (NetSoft), April 2015, p. (5 pages).
J. Saldana, D. de Hoz, J. Fernandez-Navajas, J. Ruiz-Mas, F. Pascual, D.R. Lopez, D. Florez, J.A. Castell, and M. Nunez, ``Small-packet flows in Software Defined Networks: Traffic profile optimization'', J. of Networks, vol. 10, no. 4, pp. 176--187, April 2015.
M. Radan and I. Keslassy, ``Tapping into the routers unutilized processing power'', in Conf. on Computer Communications (INFOCOM), April 2015, pp. 2569--2577.
G. Einziger, B. Fellman, and Y. Kassner, ``Independent counter estimation buckets'', in Conf. on Computer Communications (INFOCOM), April 2015, pp. 2560--2568.
M. Danelutto, D. De~Sensi, and M. Torquati, ``Energy driven adaptivity in stream parallel computations'', in Euromicro Conf. on Parallel, Distributed, and Network-Based Processing, April 2015, pp. 103--110.
E. Balkanli, ``A comprehensive study on one-way backscatter traffic analysis'', M.S. thesis, Dalhousie Univ., Halifax, CA, April 2015.
P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``A synergetic use of Bloom filters for error detection and correction'', IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 23, no. 3, pp. 584--587, March 2015.
O. Papapetrou, M. Garofalakis, and A. Deligiannakis, ``Sketching distributed sliding-window data streams'', VLDB J., vol. 24, no. 3, pp. 345--368, March 2015.
J. Fairbanks, R. Kannan, H. Park, and D. Bader, ``Behavioral clusters in dynamic graphs'', Parallel Computing, vol. 47, pp. 38--50, March 2015.
J. Chen, R.G. Addie, M. Zukerman, and T.D. Neame, ``Performance evaluation of a queue fed by a Poisson Lomax burst process'', IEEE Communications Letters, vol. 19, no. 3, pp. 367--370, March 2015.
R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Shen, K. Xu, and K. Yang, ``A neuro-fuzzy approach to self-management of virtual network resources'', J. Expert Systems with Applications, vol. 42, no. 3, pp. 1376--1390, February 2015.
S.A. Singh, Techniques for online analysis of large distributed data, Ph.D. thesis, Iowa State Univ., Ames, IO, US, January 2015.
N.M. Sahri and K. Okamura, ``Adaptive anomaly detection for SDN'', Asia-Pacific Advanced Network, vol. 40, pp. 57--63, January 2015.
A. Kulbis, ``Distributed port scan detection in network traffic'', M.S. thesis, Kauno Technologijos Univ., January 2015.
R. Lu, G. Wu, B. Xie, and J. Hu, ``StreamBench: Towards benchmarking modern distributed stream computing frameworks'', in Conf. on Utility and Cloud Computing (UCC), December 2014, pp. 69--78.
R. Barik and D.M. Divakaran, ``Development and experimentation of TCP initial window function'', in Conf. on Network of the Future (NOF), December 2014, p. (8 pages.
Y. Afek, H. Kaplan, B. Korenfeld, A. Morrison, and R.E. Tarjan, ``The CB tree: a practical concurrent self-adjusting search tree'', Distributed Computing, vol. 27, no. 6, pp. 393--417, December 2014.
H. Wang, K.S. Lee, E. Li, C.L. Lum, A. Tang, and K. Weatherspoon, ``Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networks'', in Internet Measurement Conf. (IMC), November 2014, p. (14 pages).
Y. Lai, T. Wellem, and H.-P. You, ``Hardware-assisted estimation of entropy norm for high-speed network traffic'', IET Electronics Lett., vol. 50, no. 24, pp. 1845--1847, November 2014.
Q. Xiao, Y. Qiao, M. Zhen, and S. Chen, ``Estimating the persistent spreads in high-speed networks'', in IEEE Conf. on Network Protocols (ICNP), October 2014, pp. 131--142.
D.V. Tuyen, T.H. Truong, N.T. Hung, B. Puype, D. Colle, K. Steenhaut, and N.H. Thanh, ``An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacks'', in Conf. on Advanced Technologies for Communications (ATC), October 2014, pp. 446--451.
T. Song, X. Shi, and X. Ma, ``Fine-grained power scaling algorithms for energy efficient routers'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2014, pp. 197--206.
S. Pontarelli, P. Reviriego, and J.A. Maestro, ``Efficient flow sampling with back-annotated cuckoo hashing'', IEEE Communications Letters, vol. 18, no. 10, pp. 1695,1698, October 2014.
J.M. Namayanja and V.P. Janeja, ``Change detection in temporally evolving computer networks: A big data framework'', in Conf. on Big Data, October 2014, pp. 54--61.
A. Korosi, J. Tapolcai, B. Mihalka, G. Meszaros, and G. Retvari, ``Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneously'', in Conf. on Network Protocols (ICNP), October 2014, pp. 332--343.
J. Gardiner and S. Nagaraja, ``On the reliability of network measurement techniques Used for malware traffic analysis'', in Cambridge Intl Workshop on Security Protocols, October 2014, vol. 8809 of Lecture Notes in Computer Science, pp. 321--333.
N. Ekiz and P.D. Amer, ``Transport layer reneging'', Computer Communications, vol. 52, no. 1, pp. 82--88, October 2014.
Y. Yu, C. Qian, and X. Li, ``Distributed and collaborative traffic monitoring in software defined networks'', in Hot Topics in Software Defined Networking (HotSDN), August 2014, pp. 85--90.
C. Tunc and N. Akar, ``Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networks'', Photonic Network Communications, p. (11 pages), August 2014.
A.Y. Privalov and A. Tsarev, ``Analysis and simulation of WAN traffic by self-similar traffic model with OMNET'', in Wireless Communications and Mobile Computing (IWCMC), August 2014, pp. 629--634.
R Pecori and L. Veltri, ``A statistical blind technique for recognition of internet traffic with dependence enforcement'', in Wireless Communications and Mobile Computing (IWCMC), August 2014, pp. 328--333.
M. Moshref, M. Yu, R. Govindan, and A. Vahdat, ``DREAM: Dynamic Resource Allocation for Software-defined Measurement'', ACM SIGCOMM Computer Communication Review, vol. 44, pp. 419--430, August 2014.
L. McHale, C.J. Casey, P.V. Gratz, and A. Sprintson, ``Stochastic pre-classification for SDN data plane matching'', in ICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN), August 2014.
H. Luao, J. Cui, G. Chen, Z. Chen, and H. Zhang, ``On the applicability of software defined networking to large scale networks'', in Conf. on Computer Communication and Networks (ICCCN), August 2014, p. (6 pages).
M. Barati, A. Abdullah, N.I. Udzir, R. Mahmod, and N. Mustapha, ``Distributed Denial of Service detection using hybrid machine learning technique'', in Symp. on Biometrics and Security Technologies (ISBAST), August 2014, pp. 268--273.
R. Schmidt, R. Sadre, A. A.~Sperotto, H. van~den Berg, and A. Pras, ``A hybrid procedure for efficient link dimensioning'', Computer Networks, vol. 67, pp. 252--269, July 2014.
V. Moreno, P.M. Santiado~del Rio, J. Ramos, B. Muelas, J.L. Garcia-Dorado, F.J. Gomez-Arribas, and J. Aracil, ``Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems'', Intl J. Network Management, vol. 24, no. 4, pp. 221--234, July 2014.
P.A. Frangoudis, Y. Hadjadj-Aoul, A. Ksentini, G. Rubino, T. Etame, and C. Brun, ``PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top services'', in Conf. on Information, Intelligence, Systems and Applications (IISA), July 2014, pp. 176--181.
M. Shahzad and A.X. Liu, ``Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2014, pp. 207--219.
R. Schmidt, R. Sadre, N. Melnikov, J. Schonwalder, and A. Pras, ``Linking network usage patterns to traffic Gaussianity fit'', in IFIP Networking Conf., June 2014, p. (9 pages).
R. Mijumbi, J.-L. Gorricho, and J. Serrat, ``Contributions to efficient resource management in virtual networks'', in IFIP Conf. on Autonomous Infrastructure, Management and Security (AIMS), June 2014, p. (5 pages).
R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, J. Famaey, and F. De~Turck, ``Neural network-based autonomous allocation of resources in virtual networks'', in European Conf. on Networks and Communications (EuCNC), June 2014, p. (6 pages).
H.-C. Hsiao, Toward a highly available future Internet, Ph.D. thesis, Carnegie Mellon Univ., June 2014.
X. Zhou, M. Petrovic, T. Eskridge, M. Carvalho, and X. Tao, ``Exploring Netflow data using Hadoop'', in ASE BigData/SocialCom/Cybersecurity Conf., May 2014, p. (10 pages).
P. Reviriego, S. Pontarelli, and J.A. Maestro, ``Energy efficient exact matching for flow identification with cuckoo affinity hashing'', IEEE Communications Letters, vol. 18, no. 5, pp. 885--888, May 2014.
R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, F. De~Turck, and S. Latre, ``Design and evaluation of learning algorithms for dynamic resource management in virtual networks'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), May 2014, p. (9 pages).
B. Liu, J. Lu, Y. Kai, Y. Wang, and T. Pan, ``Power-proportional router: Architectural design and experimental evaluation'', in Quality of Service (IWQoS) Symp., May 2014, pp. 344--349.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``TDFA: Traceback-based defense against DDoS flooding attacks'', in IEEE Int Conf. on Advanced Information Networking and Applications (AINA), May 2014, pp. 597--604.
H. Wang, K.S. Lee, and H. Weatherspoon, ``PHY convert channels: Can you see the idles?'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2014.
N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown, ``I know what your packet did last hop: Using packet histories to troubleshoot networks'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2014, pp. 71--85.
M.M. Masud, U. Mustafa, and Z. Trabelsi, ``A data driven firewall for faster packet filtering'', in Conf. on Communications and Networking (ComNet), March 2014, p. (5 pages).
J.-S. Kim, M.-C. Ko, J. Nam, and J. Kim, ``Bitmap-based prefix caching for fast IP lookup'', KSII Trans on Internet and Information Systems, vol. 8, no. 3, pp. 873--889, March 2014.
P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``Efficient implementation of error correction codes in hash tables'', Microelectronics Reliability, vol. 54, no. 1, pp. 338--340, January 2014.
T. Kudo and T. Takin, ``On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling'', Intl J. of Network Management, vol. 24, no. 1, pp. 28--47, January 2014.
Y. Zhang, Y. Sun, J. Zhang, J. Xu, and Y. Wu, ``An efficient framework for parallel and continuous frequent item monitoring'', Concurrency Computation: Practice and Experience, vol. 0, pp. (24 pages), December 2013.
A. Herzberg and H. Shulman, ``Socket overloading for fun and cache-poisoning'', in Computer Security Applications Conf. (ACSAC), December 2013, pp. 189--198.
R. Larsen, ``Slow port scanning with Bro'', M.S. thesis, Gjovik Univ. College, Gjovik, Norway, November 2013.
J. Chen, R.G. Addie, and M. Zukerman, ``Performance evaluation and service rate provisioning for a queue with fractional Brownian input'', Performance Evaluation, vol. 70, no. 11, pp. 1028--1045, November 2013.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``IP traceback through (authenticated) deterministic flow marking: an empirical evaluation'', EURASIP J. on Information Security, November 2013.
R. Schmidt, R. Sadre, A. Sperotto, and A. Pras, ``Lightweight link dimensioning using sFlow sampling'', in Conf. on Network and Services Management (CNSM), October 2013, pp. 152--155.
G. Retvari, J. Tapolcai, A. Korosi, A. Majdan, and Z. Heszberger, ``Compressing IP forwarding tables: towards entropy bounds and beyond'', ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 111--122, October 2013.
M. Lee, N. Duffield, and R.R. Kompella, ``High-fidelity per-flow delay measurements with reference latency interpolation'', IEEE/ACM Trans. on Networking (TON), vol. 21, no. 5, pp. 1567--1580, October 2013.
M.F. Iqbal, J. Holt, J.H. Ryoo, L.K. John, and G. de Veciana, ``Flow migration on multicore network processors: Load balancing while minimizing packet reordering'', in Conf. on Parallel Processing (ICPP), October 2013, pp. 150--159.
Y. Gilad, A. Herzberg, and H. Shulman, ``Off-path hacking: the illusion of challenge-response authentication'', IEEE Security and Privacy, vol. PP, no. 99, pp. (8 pages), October 2013.
C.J. Casey, A. Sutton, G. Dos~Reis, and A. Sprintson, ``Eliminating network protocol vulnerabilities through abstraction and systems language design'', in Conf. on Network Protocols (ICNP), October 2013, p. (6 pages).
M. Karpowicz, ``On the design of energy-efficient service rate control mechanisms: CPU frequency control for Linux'', in Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC), September 2013, p. (6 pages).
A. Herzberg and H. Shulman, ``Vulnerable delegation of DNS resolution'', in European Symp. on Research in Computer Security (ESORICS), September 2013, vol. 8134 of Lecture Notes in Computer Science, pp. 219--236.
S.L. Garfinkel and M. Shick, ``Passive TCP reconstruction and forensic analysis with tcpflow'', Tech. rep., Naval Postgraduate School, Monterey, CA, US, September 2013.
P.A. Frangoudis, A. Ksentini, Y. Hadjadj-Aoul, and G. Boime, ``PTPv2-based metwork load estimation'', in Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS), September 2013, pp. 101--106.
M. Moshref, M. Yu, and R. Govindan, ``Resource/accuracy tradeoffs in software-defined measurement'', in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), August 2013.
P. Megyesi and S. Molnar, ``Analysis of elephant users in broadband network traffic'', in EUNICE/IFIP WG 6.6 Workshop: Advances in Communication Networking, August 2013, vol. 8115 of Lecture Notes in Computer Science, pp. 37--45.
M.F. Iqbal, Workload-aware network processors: improving performance while minimizing power consumption, Ph.D. thesis, Univ. Texas, Austin, August 2013.
Y.-H. Hu, ``A fluid-based approach for modeling network activities'', J Electr Electron Syst, vol. 2, no. 2, pp. (8 pages), August 2013.
N. Coelho, P. Salvador, and A. Nogueira, ``Inter-operator traffic differentiation based on multiscale analysis'', in ThinkMind, Conf. on Advances in Future Internet (AFIN), August 2013, p. (8 pages).
P. Reviriego, S. Pontarelli, J.A. Maestro, and M. Ottavi, ``Reducing the cost of implementing error correction codes in content addressable memories'', IEEE Trans. on Circuits and Systems II: Express Briefs, vol. 60, no. 7, pp. 432--436, July 2013.
Z. Guo and Y. Yang, ``High-speed multicast scheduling for all-optical packet switches'', in Conf. on Networking, Architecture and Storage (NAS), July 2013, pp. 156--165.
P. Ghoshal, C.J. Casey, P.V. Gratz, and A. Sprintson, ``Stochastic pre-classification for Software Defined Firewalls'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2013.
S.S. Santiago, ``Latency estimation of IP flows using NetFlow'', M.S. thesis, Univ. Politecnica de Catalunya, Barcelona, Spain, June 2013.
J.M. Namayanja and V.P. Janeja, ``Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks'', in IEEE Conf. on Intelligence and Security Informatics, June 2013, pp. 191--196.
R. Leira, P. Gomez, I. Gonzalez, and J.E. Lopez~de Vergara, ``Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardware'', in Conf. on Smart Communications in Network Technologies (SaCoNeT), June 2013, p. (5 pages).
C. Joslyn, S. Choudhury, D. Haglin, B. Howe, B. Nickless, and B. Olsen, ``Massive scale cyber traffic analysis: A driver for graph database research'', in Workshop on Graph Data Management Experiences and Systems (GRADES), June 2013, p. (6 pages).
A. Iacovazzi and A. Baiocchi, ``Investigating the trade-off between overhead and delay for full packet traffic privacy'', in IEEE Conf. on Communications (ICC), June 2013, pp. 1345--1350.
N.A. Handigol, Using packet histories to troubleshoot networks, Ph.D. thesis, Stanford Univ., Stanford, CA, US, June 2013.
J. Fokkema, ``A study of impacts of flow timeouts on link provisioning'', in Twente Student Conf. on IT, June 2013, p. (6 pages).
R.G. Clegg, J.T. Araujo, R. Landa, E. Mykoniati, D. Griffin, and M. Rio, ``On the relationship between fundamental measurements in TCP flows'', in IEEE Conf. on Communications (ICC), June 2013, pp. 2502--2506.
M. Zadnik, ``Optimization of network flow monitoring'', Information Sciences and Technologies Bulletin of the ACM Slovakia, vol. 5, no. 1, pp. (6 pages), May 2013.
R. Schmidt, R. Sadre, and A. Pras, ``Gaussian traffic revisited'', in IFIP Networking Conf., May 2013.
P.M. Santiago~del Rio, Internet traffic classification for high-performance and off-the-shelf systems, Ph.D. thesis, Univ. Autonoma de Madrid, May 2013.
V. Petkov, R. Rajagopal, and K. Obraczka, ``Characterizing per-application network traffic using entropy'', ACM Trans. on Modeling and Computer Simulation (TOMACS), vol. 23, no. 2, pp. (25 pages), May 2013.
H. Liu, A collaborative defense framework against DDoS attacks in networks, Ph.D. thesis, Washington State Univ., Pullman, WA, US, May 2013.
M.A. Erazo and J. Liu, ``Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation'', in Conf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS), May 2013, pp. 79--90.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``On evaluating IP traceback schemes: a practical perspective'', in IEEE Security and Privacy Workshops, May 2013, pp. 127--134.
M. Yu, L. Jose, and R. Miao, ``Software defined traffic measurement with OpenSketch'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2013, p. (14 pages).
Y. Gilad and A. Herzberg, ``Fragmentation considered vulnerable'', ACM Trans. on Information and System Security (TISSEC), vol. 15, no. 4, pp. (31 pages), April 2013.
S.A. Ahmadzadeh and G. Agnew, ``Turbo covert channel: An iterative framework for covert communication over data networks'', in IEEE INFOCOM, April 2013, pp. 2031--2039.
R. Hofstede, I. Drago, A. Sperotto, R. Sadre, and A. Pras, ``Measurement artifacts in NetFlow data'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science, pp. 1--10.
G.-F. He, M. Yang, J.-Z. Luo, and L. Zhang, ``Online identification of Tor anonymous communication traffic'', J. of Software, vol. 24, no. 3, pp. 540--556, March 2013.
S. Gangam, J. Chandrashekar, I. Cunha, and J. Kurose, ``Estimating TCP latency approximately with passive measurements'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science (LNCS), pp. 83--93.
J.L. Dautrich~Jr and C.V. Ravishankar, ``Inferential time-decaying Bloom filters'', in Conf. on Extending Database Technology (EDBT), March 2013, pp. 239--250.
D. De~Sensi, ``DPI over commodity hardware: implementation of a scalable framework using FastFlow'', M.S. thesis, Univ. Pisa, Pisa, IT, February 2013.
S. Kim and S.Y. Nam, ``A long range dependent Internet traffic model using unbounded Johnson distribution'', IEICE Trans. on Communications, vol. E96-B, no. 1, pp. 301--304, January 2013.
W. Liu, Y. Yan, T. Dong, and T. Run-hua, ``Self-similarity and heavy-tail of ICMP traffic'', J. Computers, vol. 7, no. 12, pp. 2948--2954, December 2012.
G. Detal, C. Paasch, S. van~der Linden, P. Merindol, G. Avoine, and O. Bonaventure, ``Revisiting flow-based load balancing: Stateless path selection in data center networks'', Computer Networks, vol. 57, pp. 1204--1216, December 2012.
N.M.M. Coelho, ``Profiling de trafego inter-operador baseado em analise multi-escalar'', M.S. thesis, Univ. de Aveiro, December 2012.
C. Basaran, K.-D. Kang, Y. Zhou, and M.H. Suzer, ``Adaptive load shedding via fuzzy control in data stream management systems'', in Conf. on Service-Oriented Computing and Applications (SOCA), December 2012, p. (8 pages).
P.M. Santiago~del Rio, D. Rossi, F. Gringoli, L. Nava, L. Salgarelli, and J. Aracil, ``Wire-speed statistical classification of network traffic on commodity hardware'', in Internet Measurement Conf. (IMC), November 2012, pp. 65--72.
E. Moriyama, T. Takahashi, and D. Miyamoto, ``DNS-based defense against IP spoofing attacks'', in Conf. on Neural Information Processing, November 2012, vol. 7667 of Lecture Notes in Computer Science, pp. 599--609.
S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``A GI/G/1 model for 10 Gb/s energy efficient ethernet links'', IEEE Trans. on Communications, vol. 60, no. 11, pp. 3386--3395, November 2012.
N. Ekiz, Transport layer reneging, Ph.D. thesis, Univ. Delaware, November 2012.
X. Zhang and W. Ding, ``Comparative research on internet flows characteristics'', in Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics, October 2012, pp. 114--118.
Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh, ``StegoTorus: a camouflage proxy for the Tor anonymity system'', in ACM Conf. on Computer and Communications Security (CCS), October 2012, pp. 109--120.
V. Moreno, P.M. Santiago~del Rio, J. Ramos, J. Garnica, and J.L. Garcia-Dorado, ``Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines'', IEEE Communications Lett., vol. 99, pp. 1--4, October 2012.
J. Kim, M. Park, S. Han, and J. Kim, ``An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup'', IEICE Trans. on Communications, vol. E95-B, no. 10, pp. 3298--3301, October 2012.
M. Kato, K. Cho, M. Honda, and H. Tokuda, ``Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation'', in Workshop on Managing Systems Automatically and Dynamically, October 2012, p. (7 pages).
M.F. Iqbal and L.K. John, ``Efficient traffic aware power management in multicore communications processors'', in ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS), October 2012, pp. 123--134.
Z. Cao and S.S. Panwar, ``Efficient buffering and scheduling for a single-chip crosspoint-queued switch'', in ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS), October 2012, pp. 111--122.
Y. Afek, H. Kaplan, B. Korenfeld, A. Morrison, and R.E. Tarjan, ``CBTree: A practical concurrent self-adjusting search tree'', in Distributed Computing (DISC), October 2012, vol. 7611 of Lecture Notes in Computer Science, pp. 1--15.
S. Xiaojuan and L. Bin, ``Stream data analysis for backbone network intrusion detection system'', in Conf. on Oxide Materials for Electronic Engineering (OMEE), September 2012, pp. 321--323.
J.C. Mogul and P. Congdon, ``Hey, you darned counters!: get off my ASIC!'', in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), August 2012, pp. 25--30.
Z Lin and N. Hopper, ``New attacks on timing-based network flow watermarks'', in Usenix Security Conf. (SEC), August 2012, p. (16 pages).
P. He, H. Guan, G. Xie, and K. Salamatian, ``Evaluating and optimizing IP lookup on many core processors'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2012, pp. 1--7.
F. Gringoli, L. Nava, A. Este, and L. Salgarelli, ``MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware'', in Wireless Communications and Mobile Computing (IWCMC), August 2012, pp. 450--455.
A. Detti, M. Pomposini, N. Blefari-Melazzi, and S. Salsano, ``Supporting the Web with an information centric network that routes by name'', Computer Networks, vol. 56, pp. 3705--3722, August 2012.
J.M.C. Silva and S.R. Lima, ``Multiadaptive sampling for lightweight network measurements'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2012, pp. 1--7.
Z. Lin, Toward building practical privacy enhancing technologies, Ph.D. thesis, Univ. Minnesota, July 2012.
V. Ishakian, J. Akinwumi, F. Esposito, and I. Matta, ``On supporting mobility and multihoming in recursive internet architectures'', Computer Communications, vol. 35, no. 13, pp. 1561--1573, July 2012.
Y. Zhao, R. Yuan, W. Wang, D. Meng, S. Zhang, and J. Li, ``A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic'', in Conf. on Networking, Architecture and Storage (NAS), June 2012, pp. 154--163.
T. Yang, R. Duan, J. Lu, S. Zhang, H. Dai, and B. Liu, ``CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy'', in Conf. on Distributed Computing Systems (ICDCS), June 2012, pp. 678--687.
J.M.C. Silva and S.R. Lima, ``Optimizing network measurements through self-adaptive sampling'', in Conf. on High Performance Computing and Communication (HPCC), June 2012, pp. 794--801.
W. Qardaji and N. Li, ``Anonymizing network traces with temporal pseudonym consistency'', in Conf. on Distributed Computing Systems Workshops (ICDCSW), June 2012, pp. 622--633.
M.A.J. Markman and S. Tokheim, ``Reliable broadcast contribution over the public Internet'', M.S. thesis, Norwegian Univ. of Science and Technology, June 2012.
J. Kuang, L. Bhuyan, and R. Klefstad, ``Traffic-aware power optimization for network applications on multicore servers'', in Design Automation Conf., June 2012, pp. 1006--1011.
S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Bounded energy consumption with dynamic packet coalescing'', in Networks and Optical Communications (NOC), June 2012, p. (5 pages).
Y.S. Hanay, W. Li, R. Tessier, and T. Wolf, ``Saving energy and improving TCP throughput with rate adaptation in Ethernet'', in IEEE Conf. on Communications (ICC), June 2012, pp. 1249--1254.
Z. Guo and Y. Yang, ``High speed multicast scheduling in hybrid optical packet switches with guaranteed latency'', IEEE Trans. on Computers, vol. 62, no. 10, pp. 1972--1987, June 2012.
C. Fragni and L.H.M.K. Costa, ``ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers'', Computer Networks, vol. 56, no. 9, pp. 2249--2261, June 2012.
A. Davy, B. Jennings, and D. Botvich, ``QoSPlan: A measurement based quality of service aware network planning framework'', J. Network and Systems Management, p. (36 pages), June 2012.
N.B. Melazzi, A. A.~Detti, and M. Pomposini, ``Scalability measurements in an information-centric network'', in Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project, May 2012, vol. 7586 of Lecture Notes in Computer Science, pp. 81--106.
B. Korenfeld, ``CBTree: A practical concurrent self-adjusting search tree'', M.S. thesis, Tel-Aviv Univ., Israel, May 2012.
J. Fan, C. Hu, K. He, J. Jiang, and B. Liuy, ``Reducing power of traffic manager in routers via dynamic on/off-chip scheduling'', in IEEE INFOCOM, May 2012, pp. 1925--1933.
H. Zhang, G. Lu, M.T. Qassrawi, Y. Zhang, and X. Yu, ``Feature selection for optimizing traffic classification'', Computer Communications, vol. 35, no. 12, pp. 1457--1471, April 2012.
H. Verma, B. Yadav, P. Bansal, and S. Raj, ``IPv4 to IPv6 shift: major challenges'', J. Engineering and Innovative Technology (IJEIT), vol. 1, no. 4, pp. 38--44, April 2012.
A. Tawakol, ``Performance analysis of TCAMs in switches'', M.S. thesis, Univ. Waterloo, Ontario, CA, April 2012.
M.F. Iqbal and L.K. John, ``Power and performance analysis of network traffic prediction techniques'', in IEEE Symp. on Performance Analysis of Systems and Software (ISPASS), April 2012, pp. 112--113.
W. Zhang, J. Bi, J. Wu, and B. Zhang, ``Catching popular prefixes at AS border routers with a prediction based method'', Computer Networks, vol. 56, pp. 1486--1502, March 2012.
E. Tsidon, I. Hanniel, and I. Keslassy, ``Estimators also need shared values to grow together'', in IEEE INFOCOM, March 2012, pp. 1889--1897.
O. Rottenstreich, Y. Kanizo, and I. Keslassy, ``The variable-increment counting Bloom filter'', in IEEE INFOCOM, March 2012, pp. 1880--1888.
O. Rottenstreich and I. Keslassy, ``The Bloom paradox: When not to use a Bloom filter?'', in IEEE INFOCOM, March 2012, pp. 1638--1646.
T. Pan, X. Guo, C. Zhang, J. Jiang, H. Wu, and B. Liu, ``Tracking millions of flows in high speed networks for application identification'', in IEEE Conf. on Computer Communications (INFOCOM), March 2012, pp. 1647--1655.
C. Lee, D.K. Lee, and S. Moon, ``Unmasking the growing UDP traffic in a campus network'', in Passive and Active Measurement (PAM), March 2012, vol. 7192 of Lecture Notes in Computer Science, pp. 1--10.
A. Houmansadr, N. Kiyavash, and N. Borisov, ``Non-blind watermarking of network flows'', Tech. rep., arxiv.org, March 2012.
S. Herreria-Alonso, M. Rodriguez-Perez, M. Fernandez-Veiga, and C. Lopez-Garcia, ``Optimal configuration of energy-efficient ethernet'', Computer Networks, pp. 2456--2467, March 2012.
J. Gilbert, ``Scalable wavelet-based active network stepping stone detection'', M.S. thesis, Air Force Inst. of Technology, Air Univ,, March 2012.
M. Lee, N. Duffield, and R.R. Kompella, ``Opportunistic flow-level latency estimation using consistent NetFlow'', IEEE/ACM Trans. on Networking (TON), vol. 20, no. 1, pp. 139--152, February 2012.
Y. Kanizo, D. Hay, and I. Keslassy, ``Maximizing the throughput of cuckoo hashing in network devices'', Tech. rep., ComNet, Technion, Israel, February 2012.
A. Shpiner, I. Keslassy, and R. Cohen, ``Reducing the reordering delay in multi-core network processors'', Tech. rep., ComNet, Technion, Israel, January 2012.
V.M. Martinez, ``Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks'', M.S. thesis, Univ. Autonoma de Madrid, January 2012.
A. Houmansadr, Design, analysis, and implementation of effective network flow watermarking schemes, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2012.
N. Blefari-Melazzi, M. Cancellieri, A. Detti, M. Pomposini, and S. Salsano, ``The CONET solution for information centric networking'', Tech. rep., Univ. Rome, January 2012.
K. Xu and F. Wang, ``Behavioral graph analysis of Internet applications'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2011, p. (5 pages).
A. Vishwanath, V. Sivaraman, Z. Zhao, C. Russell, and M. Thottan, ``Adapting router buffers for energy efficiency'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2011, p. (12 pages).
S.D.B. Moreno, ``Evaluacion de desempeno de diversas arquitecturas de commutadores opticos'', M.S. thesis, Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia, December 2011.
R. Matias, A.M.M. Carvalho, V.A. Teodoro, D. Tes, and L.B. Araujo, ``Performance comparison of forecasting models applied to LAN/MAN traffic prediction'', in IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), October 2011, p. (6 pages).
N. Hua, E. Norige, S Kumar, and B. Lynch, ``Non-crypto hardware hash functions for high performance networking ASICs'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2011, pp. 156--166.
A. Houmansadr, G.T.K. Nguyen, M. Caesar, and N. Borisov, ``Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability'', in ACM Conf. on Computer and Communications Security (CCS), October 2011, pp. 187--199.
Z. Guo and Y. Yang, ``Pipelining multicast scheduling in all-optical packet switches with delay guarantee'', in Intl Teletraffic Congress (ITC), September 2011, pp. 174--181.
R. Clegg, R. Landa, and M. Rio, ``Criticisms of modelling packet traffic using long-range dependence (extended version)'', J. Computer and System Sciences, vol. 77, no. 5, pp. 861--868, September 2011.
L.P. Spinelli, ``Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias'', M.S. thesis, Univ. Federal Do Rio de Janeiro, Brazil, August 2011.
A. Detti, N.B. Melazzi, S. Salsano, and M. Pomposini, ``CONET: a content centric inter-networking architecture'', in ACM SIGCOMM Workshop on Information-Centric Networking (ICN), August 2011, pp. 50--55.
R. Venkataramanan, M.-W. Jeong, and B. Prabhakar, ``A flow- and packet-level model of the Internet'', Tech. rep., Univ. Michigan, July 2011.
M.A. Marsan, A. Fernandez~Anta, V. Mancuso, B. Rengarajan, P. Vasallo, and G. Rizzo, ``A simple analytical model for energy efficient ethernet'', IEEE Communications Lett., vol. 15, no. 7, pp. 773--775, July 2011.
A. Leiva, J.M. Finochietto, B. Huiszoon, V. Lopez, M. Tarifeno, J. Aracil, and A. Beghelli, ``Comparison in power consumption of static and dynamic WDM networks'', Optical Switching and Networking, vol. 8, no. 3, pp. 149--161, July 2011.
D. Larrabeiti, P. Reviriego, J.A. Hernandez, J.A. Maestro, and M.. Uruena, ``Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability'', Optical Switching and Networking, vol. 8, no. 3, pp. 131--138, July 2011.
V.C. Valgenti, R.R. Paul, and M.S. Kim, ``Netshuffle: Improving traffic trace anonymization through graph distortion'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).
O. Rottenstreich and I. Keslassy, ``The Bloom paradox: When not to use a Bloom filter'', Tech. rep., ComNet, Technion, Israel, June 2011.
L.A. Grieco, C. Barakat, and M. Marzulli, ``Spectral models for bitrate measurement from packet sampled traffic'', IEEE Trans. on Network and Service Management, vol. 8, no. 2, pp. 141--152, June 2011.
I. Mothersole and M.J. Reed, ``Optimising rule order for a packet filtering firewall'', in Conf. on Network and Information Systems Security (SAR-SSI), May 2011, p. (6 pages).
F. He, F. Xiang, Y. Yibo~Xue, and J. Jun~Li, ``Towards high-performance network application identification with aggregate-flow cache'', Tech. rep., arxiv.org, May 2011.
K. Xu, F. Wang, and L. Gu, ``Network-aware behavior clustering of Internet end hosts'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 2078--2086.
N. Ekiz, A.H. Rahman, and P.D. Amer, ``Misbehaviors in TCP SACK generation'', ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 17--23, April 2011.
M. Dusi, F. Gringoli, and L. Salgarelli, ``Quantifying the accuracy of the ground truth associated with Internet traffic traces'', Computer Networks, vol. 55, no. 5, pp. 1158--1167, April 2011.
P. Reviriego, B. Huiszoon, V. Lopez, R.B. Coenen, J.A. Hernandez, and J.A. Maestro, ``Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links'', IEEE J. Selected Topics in Quantum Electronics, vol. 17, no. 2, pp. 419--427, March 2011.
L. Jose, M. Yu, and J. Rexford, ``Online measurement of large traffic aggregates on commodity switches'', in Usenix Conf. Hot-ICE 2011, March 2011.
A. Houmansadr and N. Borisov, ``SWIRL: A scalable watermark to detect correlated network flows'', in Symp. on Network and Distributed System Security (NDSS), February 2011.
N. Schear, Preventing encrypted traffic analysis, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2011.
F.M. Pouzols, D.R. Lopez, and A.B. Barros, ``Predictive models of network traffic load'', Studies in Computational Intelligence, vol. 342, pp. 87--145, January 2011.
H. Liu, Y. Sun, V.C. Valgenti, and M.S. Kim, ``TrustGuard: A flow-level reputation-based DDoS defense system'', in Conf. on Consumer Communications and Networking (CCNC), January 2011, pp. 287--291.
K. He, C. Hu, J. Jiang, Y. Zhou, and B. Liu, ``A2C: Anti-attack counters for traffic measurement'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2010, p. (5 pages).
A. Haider, K. Acharya, and M.Y.A. Raja, ``Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks'', in High-Capacity Optical Networks and Enabling Technologies (HONET), December 2010, pp. 67--72.
C. Mouchos, A. Tsokanos, and D.D. Kouvatsos, ``Dynamic OBS offset allocation in WDM networks'', Computer Communications, vol. 33, no. Suppl 1, pp. S130--S145, November 2010.
M. Zadnik and M. Canini, ``Evolution of cache replacement policies to track heavy-hitter flows'', in Symp. on Architectures for Networking and Communications Systems (ANCS), October 2010, p. (2 pages).
M. Saxena and R. Kompella, ``CLAMP: Efficient class-based sampling for flexible flow monitoring'', Computer Networks, vol. 54, no. 14, pp. 2345--2356, October 2010.
Y. Kanizo, D. Hay, and I. Keslassy, ``Hash tables with finite buckets are less resistant to deletions'', in Allerton Conf. on Communication, Control and Computing, September 2010, pp. 678--685.
R. Scappini, ``Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas'', M.S. thesis, Facultad de Informatica, Univ. Nacional de la Plata, August 2010.
P.M. Santiago~del Rio, J. Ramos, A. Salvador, J.E.L. de Vergara, J. Aracil, A. Cuadra, and M. Cutanda, ``Application of Internet traffic characterization to all-optical networks'', in Conf. on. Transparent Optical Networks (ICTON), August 2010.
R. Yuan, Y. Weibing, C. Mingyu, Z. Xiaofang, and F. Jianping, ``Robust TCP reassembly with a hardware-based solution for backbone traffic'', in Conf. on Networking, Architecture and Storage (NAS), July 2010, pp. 439--447.
M. Woldeselassie, R. Clegg, and M. Rio, ``Forecasting full-path network congestion using one bit signalling'', in IEEE Conf. on Communications (ICC), July 2010, pp. 1--5.
P. Reviriego, D. Larrabeiti, and J.A. Maestro, ``Would energy efficient ethernet be effective on 10Gbps optical links?'', in OSA Photonics in Switching (PS), July 2010.
D. Fenacci and B. Franke, ``Empirical evaluation of data transformations for network infrastructure applications'', in Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X), July 2010, pp. 55--62.
N. Zhang, F. Wang, B. Gong, and L. Li, ``Identifying heavy-hitter flows fast and accurately'', in Conf. on Future Computer and Communication (ICFCC), June 2010, vol. 3, pp. 26--29.
P. Reviriego, A. Sanchez-Macian, J.A. Maestro, and C.J. Bleakley, ``Increasing the MTU size for energy efficiency in ethernet'', in IET Signals and Systems Conf. (ISSC), June 2010, pp. 124--128.
D. Lee, B.E. Carpenter, and N. Brownlee, ``Observations of UDP to TCP ratio and port numbers'', in Conf. on Internet Monitoring and Protection (ICIMP), June 2010, pp. 99--104.
H.V. Hansen, V. Goebel, T. Plagemann, and M. Siekkinen, ``Resource adaptive distributed information sharing'', in Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE 2010), F.A. Aagesen and S.J. Knapskog, Eds., June 2010, vol. 6164 of Lecture Notes in Computer Science (LNCS), pp. 246--255.
O. Gremillet, P. Goncalves, P. Vicat-Blanc~Primet, and A. Dupas, ``Traffic classification techniques supporting semantic networks'', in Wireless Communications and Mobile Computing (IWCMC), June 2010, pp. 463--467.
D. Moon, ``Achieving flexibility and performance for packet forwarding and data center management'', Tech. rep., UC Berkeley, May 2010.
M. Lee, N. Duffield, and R. Kompella, ``Two samples are enough: Opportunistic flow-level latency estimation using NetFlow'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 9 pp.
Y. Zhang, B.X. Fang, and Y.Z. Zhang, ``Parallelizing weighted frequency counting in high-speed network monitoring'', Computer Communications, vol. 34, no. 4, pp. 536--547, April 2010.
Y. Zhang, B.X. Fang, and Y.Z. Zhang, ``Identifying heavy hitters in high-speed network monitoring'', Science China Information Sciences, vol. 53, no. 3, pp. 659--676, March 2010.
R. Ohlendorf, M. Meitinger, T. Wild, and A. Herkersdorf, ``FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors'', in Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17, M. Platzner, J. Teich, and N. Wehn, Eds. March 2010, pp. 355--374, Springer.
C. Albrecht, J. Foag, R. Koch, E. Maehle, and T. Pionteck, ``DynaCORE - dynamically reconfigurable coprocessor for network processors'', in Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16, M. Platzner, J. Teich, and N. Wehn, Eds. March 2010, pp. 335--354, Springer.
W. John, Characterization and classification of internet backbone traffic, Ph.D. thesis, Chalmers Univ. of Technology, Gothenborg, Sweden, February 2010.
R. Ohlendorf, M. Meitinger, T. Wild, and A. Herkersdorf, ``An application-aware load balancing strategy for network processors'', in Conf. on High performance embedded architectures and compilers (HIPEAC). January 2010, vol. 5952 of Lecture Notes in Computer Science (LNCS), pp. 156--170, Springer.
D. Moon, J. Naous, J. Liu, K. Zarifis, M. Casado, T. Koponen, S. Shenker, and L. Breslau, ``Bridging the software/hardware forwarding divide'', Tech. rep., semanticscholar.org, January 2010.
H. Sellke, C.-C. Wang, S. Bagchi, and N.B. Shroff, ``Camouflaging timing channels in web traffic'', Tech. rep., Purdue Univ., December 2009.
N. Beheshti-Zavareh, Tiny buffers for electronic and optical routers, Ph.D. thesis, Stanford Univ., Stanford, CA, US, December 2009.
N. Schear and N. Borisov, ``Preventing SSL traffic analysis with realistic cover traffic'', in ACM Conf. on Computer and Communications Security (CCS), November 2009.
W. Jiang and V.K. Prasanna, ``Reducing dynamic power dissipation in pipelined forwarding engines'', in IEEE Conf. on Computer Design (ICCD), October 2009.
M. Zhang, M. Dusi, W. John, and C. Chen, ``Analysis of UDP traffic usage on internet backbone links'', in Symp. on Applications and the Internet (SAINT), September 2009, pp. 280--281.
A. Este, F. Gringoli, and L. Salgarelli, ``Support Vector Machines for TCP traffic classification'', Computer Networks, vol. 53, no. 14, pp. 2476--2490, September 2009.
M.S. Andreou, Message traceback systems. Dancing with the devil, Ph.D. thesis, Univ. Newcastle upon Tyne, September 2009.
H. Rahmani, N. Sahli, and F. Kamoun, ``Joint entropy analysis model for DDoS attack detection'', in Conf. on Information Assurance and Security (IAS), August 2009, pp. 267--271.
H. Rahmani, N. Sahli, and F. Kamoun, ``A traffic coherence analysis model for DDoS attack detection'', in Conf. on Security and Cryptography (SECRYPT), E. Fernandez-Medina, M. Malek, and J. Hernando, Eds. July 2009, pp. 148--154, INSTICC Press.
K.V. Vishwanath and A. Vahdat, ``Swing: Realistic and responsive network traffic generation'', IEEE/ACM Trans. on Networking (TON), vol. 17, no. 3, pp. 712--725, June 2009.
V. Ishakian, J. Akinwumi, and I. Matta, ``On the cost of supporting multihoming and mobility'', Tech. rep., Boston Univ., CS Dept., June 2009.
R.G. Clegg, M.S. Withall, A.W. Moore, I.W. Phillips, D.J. Parish, M. Rio, R. Landa, H. Haddadi, K. Kyriakopoulos, J. Auge, R. Clayton, and D. Salmon, ``Challenges in the capture and dissemination of measurements from high-speed networks'', IET Communications, vol. 3, no. 6, pp. 957--966, June 2009.
S.T. Brugger, The quantitative comparison of computer networks, Ph.D. thesis, UC Davis, June 2009.
M. Saxena and R. Kompella, ``A framework for efficient class-based sampling'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009.
G. Terdik and T. Gyires, ``Does the internet still demonstrate fractal nature?'', in IEEE Conf. on Networking (ICN), March 2009, pp. 30--34.
F. Idzikowski, ``Search and analysis of backbone traffic measurements in the internet'', Tech. rep., Technische Univ. Berlin (TKN-09-004), March 2009.
G. Terdik and T. Gyires, ``Levy flights and fractal modeling of internet traffic'', IEEE/ACM Trans. on Networking (TON), vol. 17, no. 1, pp. 120--129, February 2009.
G. Maiolini, G. Molina, A. Baiocchi, and A. Rizzi, ``On the fly application flows identification by exploiting K-means based classifiers'', J. Information Assurance and Security, vol. 4, no. 2, pp. 142--150, January 2009.
Y. Kanizo, D. Hay, and I. Keslassy, ``Optimal dynamic hash tables'', Tech. rep., ComNet, Technion, Israel, January 2009.
M.S. Andreou and A. van Moorsel, ``COTraSE Connection Oriented Traceback in Switched Ethernet'', J. Information Assurance and Security, vol. 4, no. 2, pp. 91--105, January 2009.
M. Casado, T. Koponen, D. Moon, and S. Shenker, ``Rethinking packet forwarding hardware'', in ACM SIGCOMM HotNets Workshop, November 2008, p. (6 pages).
A. Baiocchi, G. Maiolini, G. Molina, and A. Rizzi, ``On-the-fly statistical classification of internet traffic at application layer based on cluster analysis'', in Workshop on Computational Intelligence in Security for Information Systems (CISIS). October 2008, vol. 53 of Advances in Soft Computing, pp. 178--185, Springer.
M. Andreou and A. Moorsel, ``COTraSE: Connection Oriented Traceback in Switched Ethernet'', in Conf. on Information Assurance and Security, September 2008, pp. 198--204.
M. Dusi, F. Gringoli, and L. Salgarelli, ``IP traffic classification for QoS guarantees: the independence of packets'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2008, pp. 914--921.
F.M. Pouzols, A. Barriga, D.R. Lopez, and S. Sanchez-Solano, ``Linguistic summarization of network traffic flows'', in IEEE Conf. on Fuzzy Systems (FUZZ-IEEE), June 2008, pp. 619--624.
A. Shevtekar and N. Ansari, ``A router-based technique to mitigate reduction of quality (RoQ) attacks'', Computer Networks, vol. 52, no. 5, pp. 957--970, April 2008.
R. Clegg, R. Landa, H. Haddadi, M. Rio, and A.W. Moore, ``Techniques for flow inversion on sampled data'', in IEEE INFOCOM Workshop Global Internet Symp., April 2008, p. (6 pages).
M. Meitinger, R. Ohlendorf, T. Wild, and A. Herkersdorf, ``A hardware packet re-sequencer unit for network processors'', in Architecture of Computing Systems (ARCS). February 2008, vol. 4934 of Lecture Notes in Computer Science, pp. 85--97, Springer.
F. Raspall and S. Sallent, ``Adaptive shared-state sampling'', in Internet Measurement Conf. (IMC), January 2008, pp. 271--284.
E. Proebstel, ``Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic'', M.S. thesis, UC Davis, January 2008.
A. Este, F. Gringoli, and L. Salgarelli, ``An SMV-based approach to traffic classification'', Tech. rep., Univ. Brescia, January 2008.
E. Hernandez-Orallo and J. Vila-Carbo, ``Network performance analysis based on histogram workload models'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), October 2007, pp. 209--216.
A. Shevtekar and N. Ansari, ``A proactive test based differentiation to mitigate low rate DoS attacks'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2007, pp. 639--644.
B. Whitehead, C.-H. Lung, and P. Rabinovitch, ``A TCP connection establishment filter: symmetric connection detection'', in IEEE Conf. on Communications (ICC), June 2007, pp. 247--253.
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation'', Tech. rep., UC Riverside, May 2007.
R. Clegg, H. Haddadi, R. Landa, and M. Rio, ``Towards informative statistical flow inversion'', Tech. rep., arxiv.org, May 2007.
H. Haddadi, R. Landa, M. Rio, and S. Bhatti, ``Revisiting the issues on netflow sample and export performance'', Tech. rep., arxiv.org, April 2007.
L. Yuan, C. Chuah, and P. Mohapatra, ``ProgME: towards programmable network measurement'', ACM SIGCOMM Computer Communication Review, vol. 37, no. 4, pp. 97--108, January 2007.
L. Salgarelli, F. Gringoli, and T. Karagiannis, ``Comparing traffic classifiers'', ACM SIGCOMM Computer Communication Review, vol. 37, no. 3, pp. 65--68, January 2007.
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network monitoring using traffic dispersion graphs (TDGs)'', in Internet Measurement Conf. (IMC), January 2007, pp. 315--320.
E. Hernandez-Orallo and J. Vila-Carbo, ``A histogram-based stochastic process for finite buffer occupancy analysis'', in Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS), January 2007, vol. 321 (44) of ValueTools.
R. Clegg, ``Simulating internet traffic with Markov-modulated processes'', in UK Performance Engineering Workshop, January 2007.
J. Park, H.-R. Tyan, and C.-C. Jay~Kuo, ``GA-based internet traffic classification technique for QoS provisioning'', in Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), December 2006.
M. Okuno, S. Nishimura, S. Ishida, and H. Nishi, ``Cache-based network processor architecture: evaluation with real network traffic'', IEICE Trans. on Electronics, vol. E89-C, no. 11, pp. 1620--1628, November 2006.
K. Vishwanath and A. Vahdat, ``Realistic and responsive network traffic generation'', ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 111--122, October 2006.
G. Varghese, J. Fingerhut, and F. F.~Bonomi, ``Detecting evasion attacks at high speeds without reassembly'', ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 327--338, October 2006.
C. Estan, G. Varghese, and M. Fisk, ``Bitmap algorithms for counting active flows on high speed links'', IEEE/ACM Trans. on Networking (TON), vol. 14, no. 5, pp. 925--937, October 2006.
R. Clegg, ``Markov-modulated on/off processes for long-range dependent internet traffic'', Tech. rep., arxiv.org, October 2006.
F. Constantinou and P. Mavrommatis, ``Identifying known and unknown peer-to-peer traffic'', in IEEE Symp. on Network Computing and Applications (NCA), July 2006, pp. 93--102.
H. Wang, Y. Lin, Y. Jin, and S. Cheng, ``Easily-implemented adaptive packet sampling for high speed networks flow measurement'', in Conf. on Computational Science (ICCS), May 2006, vol. 3994 of Lecture Notes in Computer Science (LNCS), pp. 128--135.
S. Kumar, J. Maschmeyer, and P. Crowley, ``Exploiting locality to ameliorate packet queue contention and serialization'', in ACM Conf. on Computing Frontiers, May 2006, pp. 279--290.
Y. Chen and K. Hwang, ``Collaborative change detection of DDoS attacks on community and ISP networks'', in IEEE Symp. on Collaborative Technologies and Systems (CTS), May 2006, pp. 401--410.
A. Shriram and J. Kaur, ``Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth'', in Passive and Active Measurement (PAM), April 2006.
Y. Hu, D.-M. Chiu, and J. Lui, ``Entropy based flow aggregation'', in IFIP Networking Conf., April 2006, vol. 3976 of Lecture Notes in Computer Science (LNCS), pp. 1204--1209.
R. Clegg, ``Modelling internet traffic using Markov chains'' January 2006.
R. Kompella and C. Estan, ``The power of slicing in internet flow measurement'', in Internet Measurement Conf. (IMC), October 2005, pp. 9--9.
D. Veitch, N. Hohna, and P. Abry, ``Multifractality in TCP/IP traffic: the case against'', Computer Networks, vol. 48, no. 3, pp. 293--313, June 2005.
H. Jiang and C. Dovrolis, ``Why is the internet traffic bursty in short (sub-RTT) timescales?'', ACM SIGMETRICS Performance Evaluation Review, vol. 33, no. 1, pp. 241--252, June 2005.
M. Okuno, S. Ishida, and H. Nishi, ``Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera'', IEICE Trans. on Electronics, vol. E88-C, no. 4, pp. 536--543, April 2005.
T. Karagiannis, M. Molle, and M. Faloutsos, ``Long-range dependence: ten years of Internet traffic modeling'', IEEE Internet Computing, vol. 8, no. 5, pp. 57--64, September 2004.
M. Okuno and H. Nishi, ``Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler'', IEICE technical report: Circuits and system, vol. 103, no. 716, pp. 61--66, March 2004.
C. Estan, G. Varghese, and M. Fisk, ``Bitmap algorithms for counting active flows on high speed links'', in Internet Measurement Conf. (IMC), October 2003, p. (14 pages).
C. Estan and G. Varghese, ``New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice'', ACM Trans. on Computer Systems (TOCS), vol. 21, no. 3, pp. 270--313, August 2003.
C. Estan, S. Savage, and G. Varghese, ``Automatically inferring patterns of resource consumption in network traffic'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2003, pp. 137--148.
C. Estan and G. Varghese, ``New directions in traffic measurement and accounting'', ACM SIGCOMM Computer Communication Review, vol. 32, no. 4, pp. 323--336, October 2002.
W. Fang and L. Peterson, ``Inter-AS traffic patterns and there implications'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 1999, vol. 3, pp. 1859--1868.
Denial of Service Attacks
I. Sarker, ``Cybersecurity Data Science: An Overview from Machine Learning Perspective'', Tech. rep., preprints.org, June 2020.
J. Cheng, J. Li, X. Tang, V.S. Sheng, C. Zhang, and M. Li, ``A novel DDoS attack detection method using Optimized Generalized Multiple Kernel Learning'', Tech. rep., arxiv.org, June 2019.
S. Behal and P. Singh, ``LeCAM: A novel metric for detecting DDoS attacks '', in IEEE Intl Conf. on Electronics and Communication and Aerospace Technology, June 2019, p. (7 pages).
J. Bakker, B. Ng, W.K.~G. Seah, and A. Pekar, ``Traffic Classification with Machine Learning in a Live Network'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), May 2019, p. (6 pages).
R. Cohen and Y. Nezri, ``Cardinality estimation in a virtualized network device using online machine learning'', Tech. rep., arxiv.org, March 2019.
J. Chen, X. Tang, J. Cheng, F. Wang, and R. Xu, ``DDoS attack detection method based on network abnormal behavior in Big Data Environment'', Tech. rep., arxiv.org, March 2019.
T.L. Adelakun, ``A multifractal approach for detecting distributed denial of service attacks'', M.S. thesis, Univ. of Manitoba, March 2019.
M. Zhang, L. Shi, D. Sisodia, J. Li, and P. Reiher, ``On multi-point, in-network filtering of Distributed Denial-of-Service traffic'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), January 2019, p. (9 pages).
V.~R. Vipul, ``Hybrid Traceback Scheme for DDoS Attacks'', Recent Findings in Intelligent Computing Techniques, p. (7 pages), January 2019.
K.~S. Sahoo, S.~K. Panda, S. Sahoo, B. Sahoo, and R. Dash, ``Toward secure software-defined networks against distributed denial of service attack'', The Journal of Supercomputing, p. (46 pages), January 2019.
K.~M. Prasad, V.~S. Siva, K. Kishore, and M. Sreenivasulu, ``DITFEC: Drift Identification in Traffic-Flow Streams for DDoS Attack Defense Through Ensemble Classifier'', Computing and Network Sustainability, vol. 75, pp. (8 pages), January 2019.
N.~V. Patil, C.~R. Krishna, K. Kumar, and S. Behal, ``E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks'', Journal of King Saud University - Computer and Information Sciences, p. (15 pages), January 2019.
M. Park and T.~V. Phan, ``Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud'', IEEE Access, vol. 7, pp. (14 pages), January 2019.
M. Nawrocki, T.C. Schmidt, and M. Wahlisch, ``Uncovering vulnerable industrial control systems from the Internet core'', Tech. rep., arxiv.org, January 2019.
P. Manso, J. Moura, and C. Serrao, ``SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks'', Special Issue Insider Attacks, p. (17 pages), January 2019.
X. Liang and T. Znati, ``An empirical study of intelligent approaches to DDoS detection in large scale networks'', in 2019 International Conference on Computing, Networking and Communications (ICNC), January 2019, p. (7 pages).
A.~C. Lapolli, J.~A. Marques, and L.~P. Gaspary, ``Offloading Real-time DDoS Attack Detection to Programmable Data Planes'', in IFIP/IEEE Symp. on Integrated Network and Service Management (IM), January 2019, p. (9 pages).
B.V. Kulchytskyy and L.M. Cooperstein, ``To the problem of forming the dataset for DDoS attack research'' January 2019.
B.~A. Khalaf, S.~A. Mostafa, A. Mustapha, M.~A. Mohammed, and W.~M. Abduallah, ``Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods'', IEEE Access, vol. 7, pp. (23 pages), January 2019.
W. Guo, X. Tang, J. Cheng, J. Xu, C. Cai, and Y. Guo, ``DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory'', in International Conference on Artificial Intelligence and Security, January 2019, p. (11 pages).
Y. Gu, K. Li, Z. Guo, and Y. Wang, ``Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm'', IEEE Access, vol. 7, pp. (15 pages), January 2019.
J. Cui, M. Wang, Y. Luo, and H. Zhong, ``DDoS detection and defense mechanism based on cognitive-inspired computing in SDN'', Future Generation Computer Systems, p. (8 pages), January 2019.
P.~D. Bojovic, I. Basicevic, S. Ocovaj, and M. Popovic, ``A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method'', Computers and Electrical Engineering, p. (13 pages), January 2019.
K. Bhushan and B.~B. Gupta, ``Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing'', Multimedia Tools and Applications, vol. 78, pp. (32 pages), January 2019.
A. Alsadhan, A. Hussain, P. Liatsis, M. Alani, H. Tawfik, P. Kendrick, and H. Francis, ``Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks'', Transactions on Emerging Telecommunications Technologies, p. (15 pages), January 2019.
S. Barbhuiya, Z. Papazachos, P. Kilpatrick, and D.S. Nikolopoulos, ``RADS: Real-time anomaly detection system for cloud data centres'', Tech. rep., arxiv.org, November 2018.
M. Pelloso, ``Distributed Denial of Service attack prediction system'', M.S. thesis, Fed. Univ. of Parana, October 2018.
B.L. Dalmazo, A prediction-based approach for anomaly detection in the cloud, Ph.D. thesis, Univ. of Coimbra, October 2018.
M. Petkovic, A contribution to the method for detection of denial of service attacks inInternet, Ph.D. thesis, Univ. of Novi Sad, September 2018.
A. Gupta, ``Distributed Denial of Service attack detection using a machine learning approach'', M.S. thesis, Univ. of Calgary, September 2018.
I. Sharafaldin, A.H. Lashkari, and A.A. Ghorbani, ``A detailed analysis of the CICIDS2017 data set'', in Intl Conf. on Information Systems Security and Privacy, July 2018, pp. 172--188.
Y. Hamid, R. Balasaraswathi, L. Journaux, and M. Sugumaran, ``Benchmark datasets for Network Intrusion Detection: A review'', Intl J. of Network Security, vol. 20, no. 4, pp. 645--654, July 2018.
J. Cheng, J. Zhou, Q. Liu, X. Tang, and Y. Guo, ``A DDoS detection method for socially aware networking based on forecasting fusion feature sequence'', Computer J., vol. 61, no. 7, pp. 959--970, July 2018.
S. Behal, K. Kumar, and M. Sachdeva, ``D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events'', J. of Network and Computer Applications, vol. 111, pp. 49--63, June 2018.
K.~M. Prasad, A.~R.~M. Reddy, and K.~V. Rao, ``DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment'', Cluster Computing, vol. 21, pp. 1765--1783, May 2018.
J. Cheng, R. Xu, X. Tang, V. Sheng, and C. Cai, ``An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment'', CMC: Computers, Materials and Continua, vol. 55, no. 1, pp. 95--119, May 2018.
T.Y. Chang and C.J. Hsieh, ``Detection and Analysis of Distributed Denial-of-service in Internet of Things-Employing Artificial Neural Network and Apache Spark Platform'', Sensors and Materials, vol. 30, no. 4, pp. 857--867, April 2018.
A. Alsirhani, S. Sampalli, and P. Bodorik, ``DDoS attack detection system: Utilizing classification algorithms with Apache Spark'', in Conf. on New Technologies, Mobility and Security (NTMS), April 2018, p. (7 pages).
A. Abusitta, B. Martine, and M. Dagenais, ``An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment'', J. of Cloud Computing: Advances, Systems and Applications, vol. 7, no. 9, pp. (18 pages), April 2018.
N. Hoque and D. Bhattacharyya, ``HLR_DDoS: A low-rate and high-rate DDoS attack detection method using a -divergence'', in Intl Conf. on Computing and Communication Systems, March 2018, vol. 24 of Lecture Notes in Networks and Systems (LNNS), pp. 655--662.
R. Deka, D. Bhattacharyya, and J. Kalita, ``Granger causality in TCP flooding attack'', Intl J. of Network Security, vol. 21, no. 1, pp. 30--39, March 2018.
J. Vidal, A. Orozco, and L. Villalba, ``Adaptive artificial immune networks for mitigating DoS flooding attacks'', Swarm and Evolutionary Computation, vol. 38, pp. 94--108, February 2018.
R. Zhang, J. Cheng, X. Tang, Q. Liu, and X. He, ``DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm'', in Intl Conf. on Cloud Computing and Security, January 2018, p. (17 pages).
Y. Yu, L. Guo, Y. Liu, J. Zheng, and Y. Zong, ``An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks'', IEEE Access, vol. 6, pp. (10 pages), January 2018.
S. Wiedenmann, T. Mundt, and J. Goltz, ``Designing and Implementing a Benchmark Collection for Attack Simulation in Field bus Systems'', in IEEE Conf. on Application, Information and Network Security (AINS), January 2018, p. (9 pages).
M. Wang, H. Zhou, and J. Chen, ``PoTiA: A Popularity and Timeout Analysis Based SDN Controller Protection Approach'', IEEE Access, vol. 6, pp. (15 pages), January 2018.
P. Vickers and M. Debashi, ``Sonification of Network Traffic for Detecting and Learning About Botnet Behavior'', IEEE Access, vol. 6, pp. (14 pages), January 2018.
J. Uramova, P. Sege, M. Moravik, J. Papan, M. Kontsek, and J. Hrabovsky, ``Infrastructure for Generating New IDS Dataset'', in Intl Conf. on Emerging eLearning Technologies and Applications (ICETA), January 2018, vol. 16, p. (8 pages).
C.~Y. Tseung and K.~P. Chow, ``Forensic-Aware Anti-DDoS Device'', in 2018 IEEE Security and Privacy Workshops (SPW), January 2018, p. (12 pages).
T.~M. Thang, C.~Q. Nguyen, and K.~V. Nguyen., ``Synflood Spoofed Source DDoS Attack Defense Based on Packet ID Anomaly Detection with Bloom Filter'', in Asian Conf. on Defense Technology (ACDT), January 2018, vol. 5.
I. Sharafaldin, A.H. Lashkari, and A.A. Ghorbani, ``Toward generating a new intrusion detection dataset and intrusion traffic characterization.'', in Intl Conf. on Information Systems Security and Privacy (ICISSP), January 2018, vol. 1, pp. 108--116.
I. Riadi and A.~W. Muhammad, ``Neural Network Based DDoS Detection Regarding Hidden Layer Variation'', Journal of Theoretical and Applied Information Technology, vol. 95, pp. (9 pages), January 2018.
M. Petkovic, I. Basicevic, D. Kukolj, and M. Popovic, ``Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks'', Computer Science and Information Systems, vol. 15, no. 1, pp. 139--162, January 2018.
T. Nam, P. Phong, T. Khoa, T. Huong, P. Nam, N. Thanh, L. Thang, P. Tran, Le. Dung, and V. Loi, ``Self-organizing map-based approaches in DDoS flooding detection using SDN'', in Intl Conf. on Information Networking (ICOIN), January 2018, pp. 249--254.
N.~I. Mowla, I. Doh, and K. Chae, ``CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word'', Computer Science and Information Systems, vol. 15, pp. (24 pages), January 2018.
C. Modi and D. Patel, ``A feasible approach to intrusion detection in virtual network layer of Cloud computing'', Academy Proceeding in Engineering Sciences, p. (16 pages), January 2018.
J. Mao, W. Deng, and F. Shen, ``DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features'', in IEEE Intl Conf. On Trust, Security And Privacy In Computing And Communications/On Big Data Science And Engineering (TrustCom/BigDataSE), January 2018, vol. 17th and 12th, p. (7 pages).
R. Maheshwari, A. Rajput, and A.~K. Gupta, ``Private Virtual Cloud Infrastructure Modelling using VCPHCF-RTT Security Agent'', in Intl Conf. on Computing Communication and Automation (ICCCA), January 2018, vol. 4, p. (5 pages).
S. Kirti, N. Agrawal, S. Kumar, and D.~K. Sah, ``Prevention of DDoS attack through harmonic homogeneity difference mechanism on traffic flow'', in Intl Conf. on Recent Advances in Information Technology (RAIT), January 2018, vol. 4, p. (6 pages).
K. Johnson and T. De, ``Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation'', IET Information Security, p. (14 pages), January 2018.
G. Iliev and J.~R. Shaikh, ``Blockchain based Confidentiality and Integrity Preserving Scheme for Enhancing E-commerce Security'', in Global Conf. on Wireless Computing and Networking (GCWCN), January 2018, p. (4 pages).
M. Idhammad, K. Afdel, and M. Belouch, ``Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest'', Hindawi Security and Communication Networks, p. (14 pages), January 2018.
J.~H. Huh, ``Implementation of lightweight intrusion detection model for security of smart green house and vertical farm'', Intl J. of Distributed Sensor Networks, vol. 14, pp. (11 pages), January 2018.
H. Huang, Y.~E. Sun, S. Chen, S. Tang, K. Han, J. Yuan, and W. Yang, ``You can drop but you cant hide: K-persistent spread estimation in high-speed networks'', in IEEE Conf. on Computer Comm. (INFOCOM), January 2018, p. (9 pages).
J. Hrabovsky, P. Segec, M. Moravcik, and J. Papan, ``Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems'', in Intl Conf. on Innovations for Community Services, January 2018, vol. 18, p. (10 pages).
L. Hong and S. Alzharani, ``Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation'', Journal of Information Security, vol. 9, pp. (17 pages), January 2018.
K.~S. Hartzel and W.~E. Spangler, ``Managing IT Implementation Risk: A Model from High Reliability Organizations'', in Intl Association for Computer Information Systems, January 2018, vol. 58, p. (60 pages).
M. Ghanbari and W. Kinsner, ``Extracting features from both the input and the output of a convolutional neural network to detect Distributed Denial of Service attacks'', IEEE Intl Conf. on Cognitive Informatics and Cognitive Computing (ICCI*CC), vol. 17, pp. (7 pages), January 2018.
R. Fouladi, C. Kayatas, and E. Anarim, ``Statistical measures: Promising features for time series based DDoS attack detection'', in Workshop on Computational Intelligence for Multimedia Understanding (IWCIM), January 2018, p. (9 pages).
M.J.R. Dennis, ``Machine-learning and statistical methods for DDoS attack detection and defense system in Software Defined Networks'', M.S. thesis, Ryerson Univ., January 2018.
R.~K. Deka, D.~K. Bhattacharya, and J.~K. Kalita, ``Active Learning to Detect DDoS Attack Using Ranked Features'', Computer Comm., p. (28 pages), January 2018.
M. Chinnusamy and N. Raju, ``Effective Method to Detect Distributed Denial of Service Attacks'', International Journal of Pure and Applied Mathematics, vol. 119, pp. (7 pages), January 2018.
G.~S. Chhabra, V. Singh, and M. Singh, ``Hadoop-based analytic framework for cyber forensics'', International Journal of Communication Systems, vol. 31, pp. (17 pages), January 2018.
J. Cheng, M. Li, X. Tang, V.~S. Sheng, Y. Liu, and W. Guo, ``Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing'', Security and Communication Networks, vol. 2018, pp. (15 pages), January 2018.
C.~O. Camargo, E.~R. Faria, B.~B. Zarpelao, and R.~S. Miani, ``Qualitative evaluation of denial of service datasets'', in Brazilian Symp. on Information Systems, January 2018, p. (8 pages).
G. Bulman, ``A Critical Analysis of Current Measures for Preventing Use of Fraudulent Resources in Cloud Computing'', in Selected Computing Research Papers - University of Sunderland, January 2018, vol. 7, p. (7 pages).
A. Boukhtouta, M. Pourzandi, R. Brunner, and S. Dault, ``Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology'', in IFIP Annual Conf. on Data and Applications Security and Privacy, January 2018, p. (18 pages).
M.~H. Bhuyan and E. Elmroth, ``Multi-scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric'', in IEEE Intl Conf. on Machine Learning and Applications (ICMLA), January 2018, vol. 17, p. (8 pages).
K. Bhushan and B.~B. Gupta, ``Hypothesis test for low-rate DDoS attack detection in cloud computing environment'', Procedia Computer Science, p. (9 pages), January 2018.
S. Bhatia, S. Behal, and I. Ahmed, ``Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions'', Versatile Cybersecurity, p. (43 pages), January 2018.
S. Behal, K. Kumar, and M. Sachdeva, ``A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics'', Turkish Journal of Electrical Engineering and Computer Sciences, vol. 26, pp. (12 pages), January 2018.
S. Behal, M. Sachdeva, and K.~K. Saluja, ``D-FAC: A novel 0-Divergence based distributed DDoS defense system'', Journal of King Saud University, p. (14 pages), January 2018.
M.~E. Ahmed, S. Ullah, and H. Kim, ``Statistical Application Fingerprinting for DDoS Attack Mitigation'', IEEE Transactions on Information Forensics and Security, vol. 14, pp. (14 pages), January 2018.
N.N. Dao, T.V. Phan, U. Saad, J. Kim, T. Bauschert, and S. Cho, ``Securing heterogeneous IoT with intelligent DDoS attack behavior learning'', Tech. rep., arxiv.org, November 2017.
R. Baishya, N. Hoque, and D. Bhattacharya, ``DDoS attack detection using unique source IP deviation'', Intl J. of Network Security, vol. 19, no. 6, pp. 929--939, November 2017.
C. Thangamalar and K. Ravikumar, ``Rating association for short degree DDoS attack recognition'', Intl J. of Engineering and Technology, vol. 9, no. 5, pp. 3640--3647, October 2017.
K. Singh and T. De, ``MLP-GA based algorithm to detect application layer DDoS attack'', J. of Information Security and Applications, vol. 36, pp. 145--153, October 2017.
K.J. Singh and T. De, ``Mathematical modelling of DDoS attack and detection using correlation'', J. Cyber Security Technology, vol. 1, no. 3-4, pp. 175--186, September 2017.
N. Hoque, H. Kashyap, and D. Bhattacharyya, ``Real-time DDoS attack detection using FPGA'', Computer Comm., vol. 110, pp. 48--55, September 2017.
M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``A systematic hands-on approach to generate real-life intrusion datasets'', in Network Traffic Anomaly Detection and Prevention, September 2017, Computer Communications and Networks, pp. 71--114.
M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``Practical tools for attackers and defenders'', in Network Traffic Anomaly Detection and Prevention, September 2017, Computer Communications and Networks, pp. 201--242.
S. Behal, K. Kumar, and M. Sachdeva, ``Discriminating flash events from DDoS Attacks: A comprehensive review'', Intl J. of Network Security, vol. 19, no. 5, September 2017.
D. Sun, K. Yang, Z. Shi, and Y. Wang, ``A distinction method of flooding DDoS and flash crowds based on user traffic behavior'', in IEEE Trustcom/BigDataSE/ICESS, August 2017, pp. 65--72.
T. Phan, N. Bao, and M. Park, ``Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks'', J. of Network and Computer Applications, vol. 91, no. C, pp. 14--25, August 2017.
Y. Kim, D. Choi, T. Van, M. Long, and M. Park, ``DDoS Detection System Based on Multiple Machine Learning Combination for Software Defined Networking'', J. of Korean Inst. of Communications and Information Sciences, vol. 42, no. 8, pp. 1581--1590, August 2017.
S. Behal, K. Kumar, and M. Sachdeva, ``Characterizing DDoS attacks and flash events: Review, research gaps and future directions'', Computer Science Review, vol. 25, pp. 101--114, August 2017.
I. Sharafaldin, A. Gharib, A. Lashkari, and A. Ghorbani, ``Towards a reliable Intrusion Detection benchmark dataset'', Software Networking, vol. 2017, no. 1, pp. 177--200, July 2017.
G. Jing, ``Research on application of DDos attack detection technology based on software defined network'', Acta Technica CSAV, vol. 62, no. 1B, pp. 489--498, July 2017.
L. Axon, J.R.C. Nurse, M. Goldsmith, and S. Creese, ``A formalised approach to designing sonification systems for network-security monitoring'', Intl J. On Advances in Security, vol. 10, no. 1-2, pp. 26--47, July 2017.
A.A. Afolorunso, Variational Bayesian Hidden Markov model for the prediction of Distributed Denial of Service attacks, Ph.D. thesis, Univ. of Lagos, July 2017.
D. Sun, K. Yang, Z. Shi, and B. Lv, ``A behavior-based method for distinction of flooding DDoS and flash crowds'', in Conf. on Knowledge Science, Engineering and Management, June 2017, pp. 129--136.
T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, ``Machine learning for anomaly detection and categorization in multi-cloud environments'', in Conf. on Cyber Security and Cloud Computing, June 2017, pp. 97--103.
A. Muhammad and F. Alameka, ``Integrasi metode normalized reelative network entropy dan neural network backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS'', J. Rekayasa Teknologi Informasi, vol. 1, no. 1, pp. 1--7, June 2017.
N.M.A. Moustafa, Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic, Ph.D. thesis, Univ. of New South Wales, June 2017.
N. Mosharraf, A. Jayasumana, and I. Ray, ``A distributed mechanism to protect against DDoS attacks'', in IFIP Conf. on Data and Applications Security and Privacy, June 2017, vol. 10359 of Lecture Notes in Computer Science (LNCS), pp. 529--540.
M. Nogueira, A. Santos, and J. Moura, ``Early signals from volumetric DDoS attacks: An empirical study'', Tech. rep., arxiv.org, May 2017.
N. Hubballi and N. Tripathi, ``An event based technique for detecting spoofed IP packets'', J. of Information Security and Applications, vol. 35, pp. 32--43, May 2017.
K. Xylogiannopoulos, Data structures, algorithms and applications for Big Data analytics: Single, multiple and all repeated patterns detection in discrete sequences, Ph.D. thesis, Univ. of Calgary, April 2017.
R. Saravanan, S. Loganathan, S. Shunmuganathan, and Y. Palanichamy, ``Suspicious score based mechanism to protect web servers against application layer Distributed Denial of Service attacks'', Intl J. of Intelligent Engineering and Systems, vol. 10, no. 4, pp. 147--156, April 2017.
S. Rahmat, Q. Niyaz, A. Javaid, and W. Sun, ``Normal and anomalous traffic flow pattern analysis for organizational networks'', in Canadian Conf. on Electrical and Computer Engineering (CCECE), April 2017, vol. 30, p. (4 pages).
S. Behal and K. Kumar, ``Computer networks detection of DDoS attacks and flash events using novel information theory metrics'', Computer Networks, vol. 116, pp. 96--110, April 2017.
M.A Righi, ``DDoS detection through recurrence quantification analysis based on dynamic feature extraction and adaptive clustering'', M.S. thesis, Fed. Univ. of Santa Maria, March 2017.
J. Liu, Y. Lai, and S. Zhang, ``FL-GUARD: A detection and defense system for DDoS attack in SDN'', in Conf. on Cryptography, Security and Privacy, March 2017, pp. 107--111.
L. Cheng, D. Divakaran, A. Ang, W. Lim, and V. Thing, ``FACT: A framework for authentication in cloud-based IP traceback'', IEEE Trans. on Information Forensics and Security, vol. 12, no. 3, pp. 604--616, March 2017.
D. Boro and D.K Bhattacharyya, ``DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks'', Microsystem Technologies, vol. 23, no. 3, pp. 593--611, March 2017.
W. Bhaya and M.E. Manaa, ``DDoS attack detection approach using an efficient cluster analysis in large data scale'', in Conf. on New Trends in Information and Communications Technology Applications (NTICT), March 2017, pp. 168--173.
S. Al-mamory and S. Algelal, ``A modified DBSCAN clustering algorithm for proactive detection of DDoS attacks'', in Conf. on New Trends in Information and Communications Technology Applications (NTICT), March 2017, pp. 304--309.
A. Raza, ``Anomaly detection systems for Distributed Denial of Service attacks'', M.S. thesis, Univ. of Victoria, February 2017.
A. AlEroud and I. Alsmadi, ``Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach'', J. of Network and Computer Applications, vol. 80, no. C, pp. 152--164, February 2017.
L.J.G. Villalba, A.L.S. Orozco, and J.M. Vidal, ``Advanced payload analyzer preprocessor'', Future Generation Computer Sysems, vol. 76, pp. (9 pages), January 2017.
D. Sun, K. Yang, B. Lv, and Z. Shi, ``Could we beat a new mimicking attack?'', in Asia-Pacific Network Operations and Management Symp. (APNOMS), January 2017, vol. 19, p. (4 pages).
D. Sun, K. Yang, B. Lv, and Z. Shi, ``A new mimicking attack by LSGAN'', in Intl Conf. on Tools with Artificial Intelligence, January 2017, p. (7 pages).
D. Sun, K. Yang, Z. Shi, and Y. Wang, ``Detecting flooding DDoS under flash crowds based on Mondrian forest'', in Wireless Algorithms, Systems, and Applications, January 2017, Lecture Notes in Computer Science (LNCS), pp. 729--740.
I. Sreeram and V.~P.~K. Vuppala, ``HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm'', Applied Computing and Informatics, vol. 15, pp. (7 pages), January 2017.
I. Riadi, A.W. Muhammad, and S. Sunardi, ``Network packet classification using neural network based on training function and hidden layer neuron number variation'', Intl J. of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 248--252, January 2017.
A. Muhammad, I. Riadi, and S. Sunardi, ``Deteksi serangan DDoS menggunakan neural network dengan fungsi fixed moving average window'', J. Informatika Sunan Kalijaga, vol. 1, no. 3, pp. 115--122, January 2017.
N. Mosharraf, A.P. Jayasumana, I. Ray, and B. Bezawada, ``History-based throttling of Distributed Denial-of-Service attacks'', in Intl Conf. on E-Business and Telecommunications, January 2017, p. (24 pages).
F. Mohamed, B. AlBelooshi, K. Salah, C.Y. Yeun, and E. Damiani, ``A scattering technique for protecting cryptographic keys in the cloud'', in Intl Workshops on Foundations and Applications of Self* Systems (FAS*W), January 2017, vol. 2, p. (6 pages).
I. Kotenko, A. Chechulin, and A. Branitskiy, ``Generation of source data for experiments with network attack detection software'', J. of Physics: Conf. Series, p. (10 pages), January 2017.
G. Kaur, S. Behal, and K. Shifali, ``An information divergence based approach to detect flooding DDoS attacks and Flash Crowds'', in Intl Conf. on Applied and Theoretical Computing and Communication Technology (iCATccT), January 2017, vol. 3, p. (8 pages).
Y.I. Joo and M. Park, ``An efficient DDoS attack detection mechanism based on distributed self organizing map'', Intl J. of Applied Engineering Research, vol. 12, no. 13, pp. 3609--3615, January 2017.
M. Ghanbari, W. Kinsner, and K. Ferens, ``Detecting a distributed denial of service attack using a pre-processed convolutional neural network'', in Electrical Power and Energy Conf. (EPEC), January 2017, p. (15 pages).
T. Chin, K. Xiong, and M. Rahouti, ``SDN-based kernel modular countermeasure for intrusion detection'', in Intl Conf. on Security and Privacy in Communication Systems, January 2017, p. (20 pages).
W. Chen, Distributed data streaming algorithms for network anomaly detection, Ph.D. thesis, Iowa State Univ., January 2017.
S. Bista and R. Chitrakar, ``DDoS Attack Detection Using Heuristics Clustering Algorithm and Naive Bayes Classification'', J. of Information Security, vol. 9, pp. (12 pages), January 2017.
S. Behal and K. Kumar, ``Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation'', Computer Communications, vol. 103, pp. (10 pages), January 2017.
A. Siahmarzkooh, J. Karimpour, and S. Lotfi, ``A cluster-based approach towards detecting and modeling network dictionary attacks'', Engineering, Technology and Applied Science Research, vol. 6, no. 6, pp. 1227--1234, December 2016.
R. Saravanan, S. Shanmuganathan, and Y. Palanichamy, ``Behavior-based detection of application layer distributed denial of service attacks during flash events'', Turkish J. of Electrical Engineering and Computer Sciences, vol. 24, pp. 510--523, December 2016.
A. Gharib, I. Sharafaldin, A. Lashkari, and A. Ghorbani, ``An evaluation framework for Intrusion Detection dataset'', in Conf. on Information Science and Security, December 2016, p. (5 pages).
S. Bhatia, ``Ensemble-based model for DDoS attack detection and flash event separation'', in Future Technologies Conf., December 2016, pp. 958--967.
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``A probabilistic sampling method for efficient flow-based analysis'', J. of Communications and Networks, vol. 18, no. 5, pp. 818--825, November 2016.
R. Deka and D. Bhattacharya, ``Self-similarity based DDoS attack detection using Hurst parameter'', Security and Communication Networks, vol. 9, no. 17, pp. 4468--4481, November 2016.
H. Zhang, W. Su, and W. Quan, ``Security technologies of SINET'', Smart Collaborative Identifier Network, vol. Part II, pp. 223--249, October 2016.
X. Kong, Y. Chen, H. Tian, T. Wang, Y. Cai, and X. Chen, ``A novel botnet detection method based on preprocessing data packet by graph structure clustering'', in Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery, October 2016, pp. 42--45.
O. Osanaiye, K. Choo, and M. Dlodlo, ``Change-point cloud DDoS detection using packet inter-arrival time'', in Computer Science and Electronic Engineering, September 2016, pp. 204--209.
N. Hoque, D.K. Bhattacharyya, and J.K. Kalita, ``FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis'', Security and Communication Networks, vol. 9, no. 13, pp. 2032--2041, September 2016.
A. Bhandari, A.L. Sangal, and K. Kumar, ``Characterizing flash events and distributed denial-of-service attacks: an empirical investigation'', Security and Communication Networks, vol. 9, no. 13, pp. 2222--2239, September 2016.
A.R. Yusof, N.I. Udzir, and A. Selamat, ``An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack'', Lecture Notes in Computer Science (LNCS), vol. 9799, pp. 95--102, August 2016.
N. Singh, K. Singh, and T. De, ``Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection'', in Conf. on Informatics and Analytics, August 2016, p. (9 pages).
K. Singh, K. Thongam, and T. De, ``Entropy-based application layer DDoS attack detection using artificial neural networks'', Entropy, vol. 18, no. 10, pp. (17 pages), August 2016.
N.M. Ghahfarokhi, Cooperative defense mechanism for detection, identification, and filtering of DDos attacks, Ph.D. thesis, Colorado State Univ., August 2016.
T. Phan, T. Toan, D. Tuyen, T. Huong, and T. Nguyen, ``OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks'', in Conf. on Communications and Electronics, July 2016, pp. 13--18.
T. Phan, N. Bao, and M. Park, ``A novel hybrid flow-based handler with DDoS attacks in Software-Defined Networking'', in Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress, July 2016, pp. 350--357.
O.A. Osanaiye, DDoS defence for service availability in cloud computing, Ph.D. thesis, Univ. of Cape Town, July 2016.
V.A. Foroushani, A security framework based on flow marking IP-traceback techniques, Ph.D. thesis, Dalhousie Univ., Halifax, CA, July 2016.
M. Bhuyan, D. Bhattacharyya, and J. Kalita, ``E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric'', Security and Communication Networks, vol. 9, no. 16, pp. 3251--3270, July 2016.
J. Shan, J. Luo, G. Ni, Z. Wu, and W. Duan, ``CVS: Fast cardinality estimation for large-scale data streams over sliding windows'', Neurocomputing, vol. 194, pp. 107--116, June 2016.
E.Y.M. Muharish, ``Packet filter approach to detect Denial of Service attacks'', M.S. thesis, California State Univ. San Bernardino, June 2016.
Y. Chen, X. Chen, H. Tian, T. Wang, and Y. Cai, ``A blind detection method for tracing the real source of DDoS attack packets by cluster matching'', in IEEE Conf. on Communication Software and Networks, June 2016, pp. 551--555.
S. Behal and K. Kumar, ``Trends in validation of DDoS research'', Procedia Computer Science, vol. 85, pp. 7--15, June 2016.
A. Karimi, Q. Niyaz, W. Sun, A. Javaid, and V. Devabhaktuni, ``Distributed network traffic feature extraction for a real-time IDS'', in IEEE Conf. on Electro Information Technology, May 2016, pp. 522--526.
A. Ain, M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``Rank correlation for low-rate DDoS attack detection: An empirical evaluation'', Intl J. of Network Security, vol. 18, no. 3, pp. 474--480, May 2016.
K. Giotis, M. Apostolaki, and V. Maglaris, ``A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 495--501.
B.L. Dalmazo, J.P. Vilela, P. Simoes, and M. Curado, ``Expedite feature extraction for enhanced cloud anomaly detection'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 1215--1220.
A. Aleroud and I. Alsmadi, ``Identifying DoS attacks on software defined networks: A relation context approach'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 853--857.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Autonomous system based flow marking scheme for IP-Traceback'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 121--128.
N. Hoque, D. Bhattacharyya, and J. Kalita, ``Denial of Service attack detection using multivariate correlation analysis'', in Conf. on Information and Communication Technology for Competitive Strategies, March 2016, p. (6 pages).
L. Cheng, D.M. Divakaran, W.Y. Lim, and V.L.L. Thing, ``Opportunistic piggyback marking for IP traceback'', IEEE Trans. on Information Forensics and Security, vol. 11, no. 2, pp. 273--288, February 2016.
L. Zheng, J. Li, H. Wang, and X. Zeng, ``Improving accuracy and automation of anomaly detectors based on self-correlation'', J. Internet Technology (JIT), vol. 17, no. 1, pp. 39--51, January 2016.
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Performance of flow-based anomaly detection in sampled traffic'', J. of Networks, vol. 10, no. 9, pp. 512--520, January 2016.
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Intelligent sampling using an optimized neural network'', J. of Networks, vol. 11, no. 1, pp. 16--27, January 2016.
N. Hoque, D.K. Bhattacharyya, and J.K. Kalita, ``A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis'', in Conf. on Communication Systems and Networks (COMSNETS), January 2016, p. (2 pages).
W. Eberle and L. Holder, ``Identifying anomalies in graph streams using change detection'', in Workshop on Mining and Learning with Graphs, January 2016, p. (8 pages).
R.R.R. Robinson and C. Thomas, ``Ranking of machine learning algorithms based on the performance in classifying DDoS attacks'', in 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), December 2015, pp. 185--190.
S. Rastegari, Intelligent network intrusion detection using an evolutionary computation approach, Ph.D. thesis, Edith Cowan Univ., December 2015.
M. Poongodi and S. Bose, ``Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET'', Cluster Computing, vol. 18, no. 4, pp. 1549--1559, December 2015.
C. Li, J. Yang, Z. Wang, F. Li, and Y. Yang, ``A lightweight DDoS flooding attack detection algorithm based on synchronous long flows'', in Global Communications Conf. (GLOBECOM), December 2015, p. (6 pages).
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, ``Flow-based anomaly detection using semisupervised learning'', in Conf. on Signal Processing and Communication Systems (ICSPCS), December 2015, p. (5 pages).
V. Gulisano, M. Zori, Z Fu, R. Peris, M. Paptriantafilou, and M. Martinez, ``STONE: A streaming DDoS defense framework'', J. Expert System with Applications, vol. 42, no. 24, pp. 9620--9633, December 2015.
X.-F. Chen and S.-Z. Yu, ``CIPA: A collaborative intrusion prevention architecture for programmable network and SDN'', Computers and Security, vol. 58, pp. 1--19, December 2015.
S. Wang, Y. Li, X. Zhao, and B. Wang, ``Intrusion detection system design of cloud computing based on abnormal traffic identification'', Intl J. of Reasoning-based Intelligent Systems, vol. 7, no. 3/4, pp. 186--192, November 2015.
M. Righi and R. Nunes, ``Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas'', in Simposio Brasileiro em Seguranca da Informacao e Sistemas, November 2015, p. (4 pages).
Y. Purwanto, Hendrawan Kuspriyanto, and B. Rahardjo, ``Statistical analysis on aggregate and flow based traffic features distribution'', in Conf. on Wireless and Telematics (ICWT), November 2015, p. (6 pages).
S. Rastegari, C. Lam, and P. Hingston, ``A statistical rule learning approach to network intrusion detection'', in Intl Conf. on IT Convergence and Security, October 2015, p. (5 pages).
K. Giotis, G. Androulidakis, and V. Maglaris, ``A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox'', Security and Communication Networks, vol. 9, pp. 1958--1970, October 2015.
E. Balkanli, A.N. Zincir-Heywood, and M.I. Heywood, ``Feature selection for robust backscatter DDoS detection'', in Local Computer Networks Conf. Workshops (LCNW), October 2015, pp. 611--618.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Probabilistic flow marking for IP traceback (PFM)'', in Workshop on Reliable Networks Design and Modeling (RNDM), October 2015, pp. 229--236.
L. Zhou, M. Liao, C. Yuan, Z. Sheng, and H. Zhang, ``DDOS attack detection using packet size interval'', in Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), September 2015, p. (7 pages).
N. Rivetti, Y. Busnel, and A. Mostefaoui, ``Efficiently summarizing data streams over sliding windows'', in Symp. on Network Computing and Applications (NCA), September 2015, pp. 151--158.
M. Poongodi and S. Bose, ``A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS attack in MANET'', Arabian J. for Science and Engineering, vol. 40, no. 12, pp. 3583--3594, September 2015.
E. Anceaume, Y. Busnel, N. Rivetti, and B. Sericola, ``Identifying global icebergs in distributed streams'', in Symp. on Reliable Distributed Systems (SRDS), September 2015, pp. 266--275.
R. Wang, Z. Jia, and L. Ju, ``An entropy-based distributed DDoS detection mechanism in Software-Defined Networking'', in Trustcom/BigDataSE/ISPA, August 2015, pp. 310--317.
S. Rastegari, P. Hingston, and C.P. Lam, ``Evolving statistical rulesets for network intrusion detection'', J. Applied Soft Computing, vol. 33, no. C, pp. 348--359, August 2015.
H. Nurohman, Y. Purwanto, and X. Hafidudin, ``Traffic anomaly based detection: Anomaly detection by self-similar analysis'', in Intl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC), August 2015, p. (6 pages).
M. Kim, S. Jung, and M. Park, ``A distributed self-organizing map for DoS attack detection'', in Conf. on Ubiquitous and Future Networks, August 2015, pp. 19--22.
C. Buragohain, M.J. Kalita, S. Singh, and D.K. Bhattacharyya, ``Anomaly based DDoS attack detection'', Intl J. of Computer Applications, vol. 123, no. 17, pp. 35--40, August 2015.
R. Wang, Z. Zhang, L. Ju, and Z. Jia, ``A novel OpenFlow-based DDoS flooding attack detection and response mechanism in Software-Defined Networking'', Intl J. of Information Security and Privacy (IJISP), vol. 9, no. 3, pp. 21--40, July 2015.
V. Bukac, Small scale denial of service attacks, Ph.D. thesis, Masaryk Univ., July 2015.
I.G. Padreny, ``Sistema de deteccion de ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, June 2015.
J. Martin, ``Sistema de deteccion de ataques DDoS en Tor'', M.S. thesis, Univ. Complutense de Madrid, June 2015.
S. Sharma, ``Shuffling based mechanism for DDoS prevention on cloud environment'', M.S. thesis, Natl Inst. of Technology, Rourkela, May 2015.
L.S. Juturu, ``Applying big data analytics on integrated cybersecurity datasets'', M.S. thesis, Texas Tech Univ., Lubbock, TX, US, May 2015.
S.Y. Dorbala and N. Hubballi, ``An experience report on scalable implementation of DDoS attack detection'', Lecture Notes in Business Information Processing (LNBIP), vol. 215, pp. 518--529, May 2015.
J. David and C. Thomas, ``DDoS attack detection using fast entropy approach on flow-based network traffic'', Procedia Computer Science, vol. 50, pp. 30--36, May 2015.
W. Chen and Y. Guan, ``Distinct element counting in distributed dynamic data streams'', in Conf. on Computer Communications (INFOCOM), May 2015, pp. 2371--2379.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Investigating unique flow marking for tracing back DDoS attacks'', in Symp. on Integrated Network Management (IM), May 2015, pp. 762--765.
H. Jiang, S. Chen, H. Hu, and M. Zhang, ``Superpoint-based detection against distributed denial of service (DDoS) flooding attacks'', in Workshop on Local and Metropolitan Area Networks, April 2015, p. (6 pages).
M.H. Bhuyan, A. Kalwar, A. Goswami, D.K. Bhattacharyya, and J.K. Kalita, ``Low-rate and high-rate Distributed DoS attack detection using partial rank correlation'', in Intl. Conf. on Communication Systems and Network Technologies (CSNT), April 2015, pp. 706--710.
E. Balkanli, ``A comprehensive study on one-way backscatter traffic analysis'', M.S. thesis, Dalhousie Univ., Halifax, CA, April 2015.
S. Shamshirband, B. Daghighi, N.B. Anuar, L.M. Kiah, A. Patel, and A. Abraham, ``Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network'', J. Intelligent and Fuzzy Systems, vol. 28, no. 3, pp. 1345--1357, January 2015.
Y. Lai, Y. Chen, Z. Liu, Z. Yang, and X. Li, ``On monitoring and predicting mobile network traffic abnormality'', Simulation Modelling Practice and Theory, vol. 50, pp. 176--188, January 2015.
M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection'', Pattern Recognition Letters, vol. 51, no. C, pp. 1--7, January 2015.
M. Wan, H.-K. Zhang, T.-Y. Wu, and C.-H. Lo, ``Anomaly detection and response approach based on mapping requests'', Security and Communication Networks, vol. 7, no. 12, pp. 2277--2292, December 2014.
A. Shrestha, Visualizing spatio-temporal data, Ph.D. thesis, Georgia State Univ., December 2014.
A. Shrestha, Y. Zhu, and K. Manandhar, ``NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysis'', in Advances in Visual Computing, December 2014, vol. 8887 of Lecture Notes in Computer Science, pp. 357--366.
K. Kato and V. Klyuev, ``Large-scale network packet analysis for intelligent DDoS attack detection development'', in Conf. on Internet Technology and Secured Transactions (ICITST), December 2014, pp. 360--365.
W. Bhaya and M.E. Manaa, ``A proactive DDoS detection approach using data mining cluster analysis'', J. of Next Generation Information Technology, vol. 5, no. 4, pp. 36--47, November 2014.
Y. Purwanto, Hendrawan Kuspriyanto, and B. Rahardjo, ``Traffic anomaly detection in DDos flooding attack'', in Conf. on Telecommunication Systems Services and Applications (TSSA), October 2014, p. (6 pages).
J. Wang and I.C. Paschalidis, ``Botnet detection using social graph analysis'', in Allerton Conf. on Communication, Control, and Computing, September 2014, pp. 393--400.
V. Srihari and R. Anitha, ``DDoS detection system using wavelet features and semi-supervised learning'', in Symp. on Security in Computing and Communications, September 2014, vol. 467 of Communications in Computer and Information Science, pp. 291--303.
P. Shamsolmoali and M. Zareapoor, ``Statistical-based filtering system against DDOS attacks in cloud computing'', in Conf. on Advances in Computing, Communications and Informatics (ICACCI), September 2014, pp. 1234--1239.
K. Kato and V. Klyuev, ``An intelligent DDoS attack detection system using packet analysis and support vector machine'', Intl J. of Intelligent Computing Research (IJICR), vol. 5, no. 3, pp. 464--471, September 2014.
K. Giotis, G. Androulidakis, and V. Maglaris, ``Leveraging SDN for efficient anomaly detection and mitigation on legacy networks'', in European Workshop on Software Defined Networks, September 2014, pp. 85--90.
M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, ``Information metrics for low-rate DDoS attack detection: A comparative evaluation'', in Intl. Conf. on Contemporary Computing (IC3), August 2014, pp. 80--84.
M. Barati, A. Abdullah, N.I. Udzir, R. Mahmod, and N. Mustapha, ``Distributed Denial of Service detection using hybrid machine learning technique'', in Symp. on Biometrics and Security Technologies (ISBAST), August 2014, pp. 268--273.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``TDFA: Traceback-based defense against DDoS flooding attacks'', in IEEE Int Conf. on Advanced Information Networking and Applications (AINA), May 2014, pp. 597--604.
S. Bhatia, D. Schmidt, G. Mohay, and A. Tickle, ``A framework for generating realistic traffic for Distributed Denial-of-Service attacks and flash events'', Computers and Security, vol. 40, pp. 95--107, February 2014.
R. Takahashi, ``Distributed denial of service (DDoS) attack detection system using burst detection'' January 2014.
H. Luo, Y. Lin, H. Zhang, and M. Zukerman, ``Preventing DDoS attacks by identifier/locator separation'', IEEE Network, vol. 27, no. 6, pp. 60--65, November 2013.
M.H. Bhuyan, Applying data mining techniques in anomaly based network intrusion detection, Ph.D. thesis, Tezpur Univ., September 2013.
S. Bhatia, Detecting Distributed Denial-of-Service attacks and flash events, Ph.D. thesis, Queensland Univ. of Technology, Brisbane, Australia, August 2013.
C. Joslyn, S. Choudhury, D. Haglin, B. Howe, B. Nickless, and B. Olsen, ``Massive scale cyber traffic analysis: A driver for graph database research'', in Workshop on Graph Data Management Experiences and Systems (GRADES), June 2013, p. (6 pages).
K. Dassouki, H. Debar, H. Safa, and A. Hijazi, ``A TCP delay-based mechanism for detecting congestion in the Internet'', in Conf. on Communications and Information Technology (ICCIT), June 2013, pp. 141--145.
H. Liu, A collaborative defense framework against DDoS attacks in networks, Ph.D. thesis, Washington State Univ., Pullman, WA, US, May 2013.
W. Chen, Y. Liu, and Y. Guan, ``Cardinality change-based early detection of large-scale cyber-attacks'', in IEEE INFOCOM, April 2013, pp. 1788--1796.
M. Callau-Zori, R. Jimenez-Peris, V. Gulisano, M. Papatriantafilou, Z. Fu, and M. Patino-Martinez, ``STONE: A stream-based DDoS defense framework'', in ACM Symp. on Applied Computing (SAC), March 2013, pp. 807--812.
P.A.R. Kumar and S. Selvakumar, ``Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems'', Computer Communications, vol. 36, no. 3, pp. 303--319, February 2013.
S. Bhatia, D. Schmidt, and G. Mohay, ``Ensemble-based DDoS detection and mitigation model'', in Conf. on Security of Information and Networks (SIN), October 2012, pp. 79--86.
Z. Fu, Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation, Ph.D. thesis, Chalmers Univ. of Technology, Gothenborg, Sweden, August 2012.
J. Singh, K. Kumar, M. Sachdeva, and N. Sidhu, ``DDoS attacks simulation using legitimate and attack real data sets'', J. Scientific and Engineering Research, vol. 3, no. 6, pp. 1--5, June 2012.
E. Feitosa, E. Souto, and D.H. Sadok, ``An orchestration approach for unwanted Internet traffic identification'', Computer Networks, vol. 56, pp. 2805--2831, May 2012.
R. Anitha, R. Karthik, V. Pravin, and K. Thirugnanam, ``A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference system'', in Conf. on Computer Science, Engineering and Applications (ICCSEA), May 2012, vol. 167 of Advances in Intelligent Systems and Computing, pp. 773--782.
H. Rahmani, N. Sahli, and F. Kamoun, ``DDoS flooding attack detection scheme based on F-divergence'', Computer Communications, vol. 35, pp. 1380--1391, April 2012.
L. Zheng, P. Zou, Y Jia, and W. Han, ``An online learning and unsupervised traffic anomaly detection system'', Advanced Science Lett., vol. 7, pp. 449--455, March 2012.
L. Zheng, P. Zou, Y. Jia, and W. Han, ``Traffic anomaly detection and containment using Filter-Ary-Sketch'', Procedia Engineering, vol. 29, pp. 4297--4306, January 2012.
R.R. Karthick, V.P. Hattiwale, and B. Ravindran, ``Adaptive network intrusion detection system using a hybrid approach'', in Conf. on Communication Systems and Networks (COMSNETS), January 2012, pp. 1--7.
E.K. Takahashi, Y. Chen, and A. Lall, ``Divergence in network traffic'', in Midstates Conf. on Undergraduate Research in Computer Science and Mathematics, November 2011, p. (10 pages).
D.Q. Le, T. Jeong, H.E. Roman, and J.W. Hong, ``Traffic dispersion graph based anomaly detection'', in Symp. on Information and Communication Technology (SolCT), October 2011, pp. 36--41.
S. Bhatia, G. Mohay, A. Tickle, and E. Ahmed, ``Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event'', in Conf. on Availability, Reliability and Security (ARES), August 2011, pp. 210--217.
H. Liu, Y. Sun, V.C. Valgenti, and M.S. Kim, ``TrustGuard: A flow-level reputation-based DDoS defense system'', in Conf. on Consumer Communications and Networking (CCNC), January 2011, pp. 287--291.
F.M. Khan, Assuring network service with bandwidth and integrity based fairness, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, January 2011.
Other Datasets
Maria Apostolaki, Cedric Maire, and Laurent Vanbever, ``PERIMETER: A network-layer attack on the anonymity of cryptocurrencies'', Tech. rep., ETH Zurich, March 2021.
Nikita Ivkin, Zhuolong Yu, Vladimir Braverman, and Xin Jin, ``QPipe: quantiles sketch fully in the data plane'', in CoNEXT 19: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, December 2019, p. (7 pages).
A.M. Rehman, S. Goldberg, and D. Choffnes, ``Passport: Enabling accurate country-level router geolocation using inaccurate sources'', Tech. rep., arxiv.org, May 2019.
D. Gong, M. Tran, S. Shinde, H. Jin, V. Sekar, P. Saxena, and M.S. Kang, ``Practical verifiable in-network filtering for DDoS defense'', Tech. rep., arxiv.org, January 2019.
R. Dahlberg, T. Pulls, J. Vestin, T. Hoiland-Jorgensen, and A. Kassler, ``Aggregation-based certificate transparency gossip'', Tech. rep., arxiv.org, June 2018.
Z. Liu, Y. Liu, P. Winter, P. Mittal, and Y. Hu, ``TorPolice: Towards enforcing service-defined access policies in anonymous systems'', Tech. rep., arxiv.org, December 2017.
Z. Liu, Minimal deployable endpoint-driven network forwarding: principle, designs and applications, Ph.D. thesis, Univ. of Illinois at Urbana-Champaign, July 2017.
A. Jeyasekar, S. Kasmir~Raja, and R. Annie~Uthra, ``Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networks'', J. of Network and Computer Applications, vol. 93, pp. 91--109, May 2017.
Paper Data and Tools
T. Lee, C. Pappas, A. Perrig, V. Gligor, and Y. Hu, ``The case for in-network replay suppression'', in Asia Conf. on Computer and Communications Security, April 2017, pp. 862--873.
T. Krenc and A. Feldmann, ``BGP prefix delegations: A deep dive'', in Internet Measurement Conf. (IMC), November 2016, pp. 469--475.
J. Singh, ``Using looking glasses to understand the Internets structure'', in Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), September 2016, pp. 47--53.
R. Nithyanand, O. Starov, A. Zair, P. Gill, and M. Schapira, ``Measuring and mitigating AS-level adversaries against Tor'', Tech. rep., arxiv.org, December 2015.
N. Kamiyama, ``Analyzing impact of introducing CCN on profit of ISPs'', IEEE Trans. on Network and Service Management, vol. 12, no. 2, pp. 176--187, June 2015.
N. Kamiyama, ``CCN economics: Can ISPs profit by introducing CCN?'', in Conf. on Network and Service Management (CNSM) and Workshop, November 2014, pp. 242--247.
Topology with Archipelago
Arnold Todd, Jia He, Weifan Jiang, Matt Calder, Italo Cunha, Vasileios Giotsas, and Ethan Katz-Bassett, ``Cloud Provider Connectivity in the Flat Internet'', in Internet Measurement Conf. (IMC), October 2020, pp. 230--246.
Lars Prehn, Franziska Lichtblau, and Anja Feldmann, ``When wells run dry: the 2020 IPv4 address market'', in CoNEXT 20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, October 2020, p. (9 pages).
Zinan Lin, Alankar Jain, Chen Wang, Giulia Fanti, and Vyas Sekar, ``Using GANs for Sharing Networked Time Series Data:Challenges, Initial Promise, and Open Questions'', in IMC 20: Proceedings of the ACM Internet Measurement Conference, October 2020, p. (20 pages).
Yuchen Huang, Michael Rabinovich, and Rami Al-Dalky, ``FlashRoute: Efficient Traceroute on a Massive Scale'', in IMC 20: Proceedings of the ACM Internet Measurement Conference, October 2020, p. (13 pages).
Vasileios Giotsas, George Nomikos, Vasileios Kotronis, Pavlos Serpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stravros Konstantaras, and Xenofontas Dimitropoulos, ``O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs'', IEEE/ACM Transactions on Networking, p. (16 pages), October 2020.
Vasileios Giotsas, Thomas Koch, Elverton Fazzion, Italo Cunha, Matt Calder, Harsha Madhyastha, and Ethan Katz-Bassett, ``Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale Traceroutes'', in IMC 20: Proceedings of the ACM Internet Measurement Conference, October 2020, p. (19 pages).
Saeed Osat, Filippo Radicchi, and Fragkiskos Papadopoulos, ``k-core structure of real multiplex networks'', Phys. Rev. Research 2, p. (14 pages), May 2020.
Di Chen, Yang Ba, Han Qiu, Junhu Zhu, and Qingxian Wang, ``ISRchain: Achieving efficient interdomain secure routing with blockchain'', Computers and Electrical Engineering, vol. 83, pp. (14 pages), May 2020.
Shailendra Sing~Tomar, Anil Rawat, Prakash~D Vyavahare, and Sanjiv Tokebar, ``Conceptual model for comparison of IPv6 ISPs based on IPv4 traffic profiles'', International Journal of Information Technology, vol. 2, pp. 1171--1182, April 2020.
Xiangyu Ke, Arijit Khan, Mohommad Al~Hasan, and Rojin Rezvansangsari, ``Reliability Maximization in Uncertain Graphs'', IEEE Transactions on Knowledge and Data Engineering, p. (18 pages), April 2020.
Manaf Gharaeibeh, Christos Papadopoulos, John Heidemann, and Craig Partridge, ``Delay-based Identification of Internet Block Movement'', Tech. rep., Colorado State University, Computer Science, April 2020.
E. Rye and R. Beverly, ``Discovering the IPv6 Network Periphery'', in International Conference on Passive and Active Network Measurement, March 2020, vol. 12048 of Lecture Notes in Computer Science, p. (15 pages).
Sareena Karapoola, Prasanna~Karthik Vairam, Shankar Raman, and V. Kamakoti, ``Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks'', Computer Communications, vol. 150, pp. 483--454, January 2020.
Erik C.~Rye and Robert Beverly, ``Discovering the IPv6 Network Periphery'', Tech. rep., arXiv, January 2020.
J.R. Luttringer, Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``Let there be light: Revealing hidden MPLS tunnels with TNT'', Trans. on Network and Service Management (TNSM), vol. 0, pp. 1--1, December 2019.
Nikita Ivkin, Zhuolong Yu, Vladimir Braverman, and Xin Jin, ``QPipe: quantiles sketch fully in the data plane'', in CoNEXT 19: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, December 2019, p. (7 pages).
Y. Sun, M. Li, S. Su, Z. Tian, W. Shi, and M. Han, ``Secure data sharing framework via hierarchical greedy embedding in darknets'', Mobile Networks and Applications, p. (9 pages), August 2019.
T. Bottger, G. Antichi, E.L. Fernandes, R. di Lallo, M. Bruyere, S. Uhlig, G. Tyson, and C. Ignacio, ``Shaping the Internet: 10 years of IXP growth'', Tech. rep., arxiv.org, July 2019.
Y. Vanaubel, J.R. Luttringer, P. Merindol, J.J. Pansiot, and B. Donnet, ``TNT, watch me explode: A light in the dark for revealing MPLS tunnels'', Tech. rep., IEEE, June 2019.
I. Sfirakis and V. Kotronis, ``Validating IP prefixes and AS-paths with Blockchains'', Tech. rep., arxiv.org, June 2019.
A. Berg and D. Forsberg, ``Identifying DNS-tunneled traffic with predictive models'', Tech. rep., arxiv.org, June 2019.
J. Holland, J. Smith, and M. Schuchard, ``Measuring irregular geographic exposure on the Internet'', Tech. rep., arxiv.org, May 2019.
E.C. Rye, J. Martin, and R. Beverly, ``EUI-64 considered harmful'', Tech. rep., arxiv.org, February 2019.
A. Funel, ``The graph structure of the Internet at the Autonomous Systems level during ten years'', Tech. rep., arxiv.org, February 2019.
X. Wu, X. Gong, Q. Wu, X. Que, and Y. Tian, ``Hierarchical Forwarding Bit Index Explicit Replication (HF-BIER) in Multicast'', in IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), January 2019, vol. 8, p. (5 pages).
D. Tolpin, ``Population anomaly detection through deep gaussianization'', in ACM/SIGAPP Symp. on Applied Computing, January 2019, p. (6 pages).
I. Papp, L. Varga, M. Afifi, I. Gere, and Z. Neda, ``Scaling in the space-time of the Internet'', Scientific Reports, vol. 9, pp. (9 pages), January 2019.
F. Papadopoulos and K.~K. Kleineberg, ``Link persistence and conditional distances in multiplex networks'', Physics Review E, vol. 99, pp. (18 pages), January 2019.
A. Milolidakis, R. Fontugne, and X. Dimitropoulos, ``Detecting Network Disruptions At Colocation Facilities'', in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, January 2019, p. (9 pages).
M. Li, B. Zong, C. Lumezanu, and H. Chen, ``Learning IP network representations'', ACM SIGCOMM Computer Communication Review, vol. 48, pp. (6 pages), January 2019.
M. Iodice, M. Candela, and G. Di~Battista, ``Periodic Path Changes in RIPE Atlas'', IEEE Access, vol. 7, pp. (9 pages), January 2019.
D. Frigioni, M. DEmidio, and G. DAngelo, ``Fully Dynamic 2-Hop Cover Labeling'', Journal of Experimental Algorithmics (JEA), vol. 24, pp. (36 pages), January 2019.
O.~E. Elejla, M. Anbar, B. Belaton, B. Alabsi, and A.~K. Al-Ani, ``Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection'', Computational Science and Technology, p. (10 pages), January 2019.
M. DEmidio and D. Frigioni, ``Distributed Shortest Paths on Power Law Networks in the Generalized Linear Preference Model: An Experimental Study'', in International Conference on Computational Science and Its Applications, January 2019, p. (9 pages).
V. Chepoi, F.~F. Dragan, M. Habib, Y. Vaxes, and H. Alrasheed, ``Fast approximation of eccentricities and distances in hyperbolic graphs'', Journal of Graph Algorithms and Applications, vol. 23, pp. (41 pages), January 2019.
R.~C. Baishya and D.~K. Bhattacharyya, ``A Complete Detection and Mitigation Framework to Protect a Network from DDoS Attacks'', IETE Journal of Research, p. (19 pages), January 2019.
L. Basheir, ``Power-law degree distribution consistency in the AS-level Internet topology'', in Intl Conf. on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), November 2018, p. (5 pages).
S. Sigloch, Mobile Internet connectivity, exploring structural bottlenecks in Tamil Nadu using active Internet periphery measurements, Ph.D. thesis, Anglia Ruskin University, October 2018.
R. Barik, M. Welzl, A.~M. Elmokashfi, T. Dreibholz, and S. Gjessing, ``Can WebRTC QoS Work? A DSCP measurement study'', Intl Teletraffic Congress, vol. 30, pp. (9 pages), October 2018.
S. Yan and A. Khan, ``Composite hashing for data stream sketches'', Tech. rep., arxiv.org, August 2018.
P.~J. Pearce, Methods and systems for understanding large-scale Internet threats, Ph.D. thesis, Univ. of California, Berkeley, August 2018.
M. Apostolaki, G. Marti, J. Muller, and L. Vanbever, ``SABRE: Protecting bitcoin against routing attacks'', Tech. rep., arxiv.org, August 2018.
F. Wang, L. Gao, S. Xiaozhe, H. Hirai, and K. Fujikawa, ``Efficient handling of excessive locators in hierarchical addressing'', in IEEE Conf. on Computer Communications, July 2018, p. (6 pages).
B. Fabian, T. Ermakova, and Z. Ghazaryan, ``Internet connectivity of financial services - A graph-based analysis'', SSRN Electronic J., p. (31 pages), July 2018.
A. Singh, S. Garg, S. Batra, N. Kumar, and J.~J. Rodrigues, ``Bloom filter based optimization scheme for massive data handling in IoT environment'', Future Generation Computer Systems, vol. 82, pp. 440--449, May 2018.
V. Kirilin and S. Gorinsky, ``A protocol-ignorance perspective on incremental deployability of routing protocols'', in IFIP Networking Conf. (NETWORKING), May 2018, p. (9 pages).
J.A. Holland, ``Quantifying irregular geographic exposure on the Internet'', M.S. thesis, Univ. of Tennessee, May 2018.
P. Mell, A. Gueye, and C. Schanzle, ``Quantifying information exposure in Internet routing'', in Conf. on Trust, Security And Privacy In Computing And Communications/Big Data Science And Engineering (TrustCom/BigDataSE), April 2018.
D. Griffin, T. Phan, E. Maini, M. Rio, and P. Simoens, ``On the feasibility of using current data centre infrastructure for latency-sensitive applications'', IEEE Trans. on Cloud Computing, p. (14 pages), April 2018.
J.H. Wang and C. An, ``A study on geographic properties of Internet routing'', Computer Networks, vol. 133, pp. 183--194, March 2018.
A. Gueye and B. Mbaye, ``On the prevalence of boomerang routing in Africa: Analysis and potential solutions'', in Innovations and Interdisciplinary Solutions for Underserved Areas (InterSol), March 2018, pp. 3--12.
D. Glasser, Longitudinal study of large-scale traceroute results, Ph.D. thesis, Naval Postgraduate School, March 2018.
A.Y. Nur and M.E. Tozal, ``Cross-AS (X-AS) Internet topology mapping'', Computer Networks, vol. 132, pp. 53--67, February 2018.
L. Xue, X. Ma, X. Luo, E.W.W. Chang, T.T.N. Miu, and G. Gu, ``LinkScope: Toward detecting target link flooding attacks'', IEEE Trans. on Information Forensics and Security, vol. 13, pp. (16 pages), January 2018.
H. Qiu, H. Zhu, Y. Li, and Z. Zeng, ``FD-SP: A Method for Predicting Cascading Failures of Inter-domain Routing System'', in Intl Conf. on Computer and Communications (ICCC), January 2018, vol. 4, p. (6 pages).
A.~Y. Nur and M.~E. Tozal, ``Geography and Routing in the Internet'', ACM Transactions on Spatial Algorithms and Systems (TSAS), vol. 4, pp. (16 pages), January 2018.
S. Malliga, C.~S. Kanimozhiselvi, and S.~V. Kogilavani, ``A Logarithmic and Exponentiation Based IP Traceback Scheme with Zero Logging and Storage Overhead'', International Journal on Future Revolution in Computer Science and Communication Engineering, vol. 4, pp. (8 pages)", January 2018.
Y. Li, H. Xie, and J.~C.~S. Lui, ``Quantifying Deployability and Evolvability of Future Internet Architectures via Economic Models'', in IEEE Intl Conf. on Network Protocols (ICNP), January 2018, vol. 26, p. (11 pages).
M. Li, C. Lumensanu, B. Zong, and H. Chen, ``Deep Learning IP Network Representations'', in Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, January 2018, p. (7 pages).
Y. Lee, Improving accuracy and efficiency of network measurement by identifying homogenous IPv4 addresses, Ph.D. thesis, Univ. of Maryland, January 2018.
D. Kiedanski, E. Grampin, and J.~I. Alvarez-Hamelin, ``The Atlas Vision of IPv6 in Latin America: Topology and Latency'', in Latin America Networking Conf., January 2018, p. (8 pages).
H. Hu, W. Liu, G. Fei, S. Yang, and G. Hu, ``A Novel Method for Router-to-AS Mapping Based on Graph Community Discovery'', Information and Communications Technology, p. (15 pages), January 2018.
J. Heidemann, Y. Pradkin, and A. Nisar, ``Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended)'', Tech. rep., University of Southern California / Information Sciences Institute, January 2018.
K. Fukuda and J. Heidemann, ``Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning'', in Internet Measurement Conf. (IMC), January 2018, p. (7 pages).
Z. Fan, Z. Han, W.~K.~S. Tang, and D. Lin, ``Relay-based information broadcast in complex networks'', Physica A: Statistical Mechanics and its Applications, vol. 495, pp. (13 pages), January 2018.
Z. Fan and W. Tang, ``Interplay of ICP and IXP over the Internet with power-law features'', Intl J. of Modern Physics C, vol. 29, no. 1, pp. (17 pages), January 2018.
B. Fabian, S. Kelkel, T. Ermakova, and A. Baumann, ``Attacking Internet Border Routers - A Graph-Based Analysis of Strategies'', Tech. rep., ssrn.com, January 2018.
O.~E. Elejla, M. Anbar, B. Belaton, and S. Hamouda, ``Labeled flow-based dataset of ICMPv6-based DDoS attacks'', Tech. rep., arxiv.org, January 2018.
G. DAngelo, M. DEmidio, and D. Frigioni, ``Distance-Vector Algorithms for Distributed Shortest Paths Computation in Dynamic Networks'', Shortest Path Solvers. From Software to Wetware, p. (45 pages), January 2018.
D. Cicalese and D. Rossi, ``A longitudinal study of IP Anycast'', ACM SIGCOMM Computer Communication Review, vol. 48, pp. (9 pages), January 2018.
C.~O. Camargo, E.~R. Faria, B.~B. Zarpelao, and R.~S. Miani, ``Qualitative evaluation of denial of service datasets'', in Brazilian Symp. on Information Systems, January 2018, p. (8 pages).
R. Beverly, R. Duraiajan, D. Plonka, and J.~P. Roherer, ``In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery'', in Internet Measurement Conf. (IMC), January 2018, p. (14 pages).
P. Barford, ``Diverse Data Sets for Impact'', Tech. rep., Univ. of Wisconsin System Madison United States, January 2018.
B. Al-Musawi, Detecting BGP anomalies using recurrence quantification analysis, Ph.D. thesis, Swinburne Univ. of Technology, January 2018.
G. Aceto, A. Botta, P. Marchetta, V. Persico, and A. Pescape, ``A comprehensive survey on internet outages'', J. of Network and Computer Applications, p. (48 pages), January 2018.
T. Xu, D. Gao, P. Dong, C. Foh, and H. Zhang, ``Mitigating the table-overflow attack in Software-Defined Networking'', IEEE Trans. on Network and Service Management, vol. 14, no. 4, pp. 1086--1097, December 2017.
K.-K. Kleineberg, ``Metric clusters in evolutionary games on scale-free networks'', Nature Communications, vol. 8, pp. (8 pages), December 2017.
Y. Vanaubel, P. Merindol, J. Pansiot, and B. Donnet, ``Through the wormhole: Tracking invisible MPLS tunnels'', in Internet Measurement Conf. (IMC), November 2017, pp. 29--42.
A. Murdock, F. Li, P. Bramsen, Z. Durumeric, and V. Paxson, ``Target generation for Internet-wide IPv6 scanning'', in Internet Measurement Conf. (IMC), November 2017, p. (12 pages).
S. Mukherjee, S. Sriram, T. Vu, and D. Raychaudhuri, ``EIR: Edge-aware inter-domain routing protocol for the future mobile internet'', Computer Networks, vol. 127, pp. 13--30, November 2017.
F. Lichtblau, F. Streibeld, T. Kruger, P. Richter, and A. Feldmann, ``Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).
J. Chavula, Improving Pan-African research and education networks through traffic engineering: A LISP/SDN approach, Ph.D. thesis, Univ. of Cape Town, October 2017.
F. Wang, X. Shao, L. Gao, H. Hirai, and K. Fujikawa, ``Labelling and encoding hierarchical addressing for scalable Internet routing'', in Adv. in Computer and Computational Sciences, September 2017, vol. 554 of Adv. in Intelligent Systems and Computing (AISC), pp. 287--292.
R. Mayer, L. Graser, H. Gupta, E. Saurez, and U. Ramachandran, ``EmuFog: Extensible and scalable emulation of large-scale fog computing infrastructures'', Tech. rep., arxiv.org, September 2017.
K. Edeline and B. Donnet, ``A first look at the prevalence and persistence of middleboxes in the wild'', in Intl Teletraffic Congress, September 2017, pp. 161--168.
M. Ando, M. Okada, and A. Kanaoka, ``Simulation study of BGP origin validation effect against mis-origination with Internet topology'', in Asia Joint Conf. on Information Security, September 2017, pp. 75--82.
F.A.F. Silveira, ``Minimizing the number of observers required for traffic matrix generation'', M.S. thesis, Fed. Univ. of Espirito Santo, August 2017.
H. Luo, Z. Chen, J. Li, and A.V. Vasilakos, ``Preventing distributed Denial-of-Service flooding attacks with dynamic path identifiers'', IEEE Trans. on Information Forensics and Security, vol. 12, no. 8, pp. 1801--1815, August 2017.
F. Bronzino, S. Mukherjee, and D. Raychaudhuri, ``The named-object abstraction for realizing advanced mobility services in the future Internet'', in Proc. of the Workshop on Mobility in the Evolving Internet Architecture, August 2017, pp. 37--42.
A. Muscoloni and C.V. Cannistraci, ``Local-ring network automata and the impact of hyperbolic geometry in complex network link-prediction'', Tech. rep., arxiv.org, July 2017.
S. Mukherjee, S. Sriram, and D. Raychaudhuri, ``Edge-aware inter-domain routing for realizing next-generation mobility services'', in IEEE Conf. on Communications (ICC), July 2017, p. (6 pages).
G. Hu, W. Chen, Q. Li, Y. Jiang, and K. Xu, ``TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code'', Future Generation Computer Systems, vol. 72, pp. 219--226, July 2017.
M. DEmidio and D. Frigioni, ``Distance-vector algorithms for distributed shortest paths on dynamic power-law networks'', Tech. rep., preprints.org, July 2017.
M. Candela, M. Bartolomeo, G. Battista, and C. Squarcella, ``Radian: Visual exploration of traceroutes'', in IEEE Trans. Visualization and Computer Graphics, July 2017.
Q. Scheitle, O. Gasser, P. Sattler, and G. Carle, ``HLOC: Hints-based geolocation leveraging multiple measurement frameworks'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).
S. Cho, R. Nithyanand, A. Razaghpanah, and P. Gill, ``A churn for the better: Localizing censorship using network-level path churn and network tomography'', Tech. rep., arxiv.org, June 2017.
M. Apostolaki, A. Zohar, and L. Vanbever, ``Hijacking bitcoin: Routing attacks on cryptocurrencies'', in Symp. on Security and Privacy, June 2017, pp. 375--392.
L.F. Ren, Z. Wang, X. Liu, Q. Li, and Z. Chen, ``The design and implementation of a covering MDN-complete-life-cycle malicious domain detection framework'', in Intl Conf. on Computer Science and Technology (CST), May 2017, p. (15 pages).
R. Motamedi, Measurement-based characterization of large-scale networked systems, Ph.D. thesis, Univ. of Oregon, May 2017.
Q. Jiang, H. Hu, and G. Hu, ``Two-type information fusion based IP-to-AS mapping table refining'', J. of Computer Science and Technology, vol. 32, no. 3, pp. 571--584, May 2017.
B. Fabian, A. Baumann, M. Ehlert, V. Vasilis, and T. Ermakova, ``CORIA - Analyzing Internet connectivity risks using network graphs'', in IEEE Conf. on Communications (ICC), May 2017, p. (6 pages).
S. Ciavarella, N. Bartolini, H. Khamfroush, and T. La~Porta, ``Progressive damage assessment and network recovery after massive failures'', in Computer Communications, May 2017, p. (9 pages).
K. Kleineberg and D. Helbing, ``Collective navigation of complex networks: Participatory greedy routing'', Scientific Reports, p. (9 pages), April 2017.
E.W. Gaston, ``High-frequency mapping of the IPv6 Internet using Yarrp'', M.S. thesis, Naval Postgraduate School, March 2017.
M. Schuchard, J. Geddes, M. Schliep, and N. Hopper, ``The cost of the path not taken'', in IEEE Global Communications Conf. (GLOBECOM), February 2017, p. (6 pages).
R. Almeida, O. Fonseca, E. Fazzion, D. Guedes, W. Meira, and I. Cunha, ``A characterization of load balancing on the IPv6 Internet'', in Conf. on Passive and Active Network Measurement, February 2017, vol. 10176 of Lecture Notes in Computer Science (LNCS), pp. 242--254.
X. Zhang, G. Xu, and Y. Xia, ``Optimal defense resource allocation in scale-free networks'', Physica A: Statistical Mechanics and its Applications, vol. 492, pp. 2198--2204, January 2017.
C. Zhang, G. Hu, G. Chen, A.~K. Sangaiah, P. Zhang, X. Yan, and W. Jiang, ``Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack'', IEEE Access, vol. 6, pp. (14 pages), January 2017.
D.~Z. Tootaghaj, T. He, and T. La~Porta, ``Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring'', ACM SIGMETRICS Performance Evaluation Review, vol. 45, pp. (13 pages), January 2017.
Y. Sun, Y. Zhang, B. Fang, and H. Zhang, ``Succinct and practical greedy embedding for geometric routing'', Computer Communications, p. (11 pages), January 2017.
P. Pearce, R. Ensalfi, F. Li, N. Feamster, and V. Paxson, ``Augur: Internet-wide detection of connectivity disruptions'', in IEEE Symp. on Security and Privacy, January 2017, pp. 427--443.
Y. Lee and N. Spring, ``Identifying and Analyzing Broadband Internet Reverse DNS Names'', in Intl Conf. on emerging Networking EXperiments and Technologies, January 2017, p. (5 pages).
S. Fernandes, ``Performance evaluation for network services, systems and protocols '', Tech. rep., arxiv.org, January 2017.
S. Ciavarella, Network analysis and algorithm solutions in critical emergency scenarios, Ph.D. thesis, Sapienza Univ. of Rome, January 2017.
S. Cho, R. Nithyanand, P. Gill, and A. Razaghpanah, ``A Churn for the Better'', in CoNEXT 2017, January 2017, p. (7 pages).
M.~A. Canbaz, J. Thom, and M.~H. Gunes, ``Comparative analysis of internet topology data sets'', in Conf. on Computer Communications Workshops (INFOCOM WKSHPS), January 2017, p. (6 pages).
D.S.F. Alves and K. Obraczka, ``An empirical characterization of Internet round-trip times'', in ACM Symp. on QoS and Security for Wireless and Mobile Networks, January 2017, vol. 13, p. (7 pages).
F. Wang, X. Shao, L. Gao, H. Harai, and K. Fujikawa, ``Towards variable length addressing for scalable Internet routing'', in IEEE Performance Computing and Communications Conf. (IPCCC), December 2016, p. (9 pages).
Q. Jacquemart, Towards uncovering BGP hijacking attacks, Ph.D. thesis, ParisTech, December 2016.
Q. Xu, X. Zhang, J. Zhao, X. Wang, and T. Wolf, ``Fast shortest-path queries on large-scale graphs'', in International Conference on Network Protocols, November 2016, vol. 24, p. (10 pages).
P. Richter, G. Smaragdakis, D. Plonka, and A. Berger, ``Beyond counting: New perspectives on the active IPv4 address space'', in Internet Measurement Conf. (IMC), November 2016, pp. 135--149.
A. Marder and J.M. Smith, ``MAP-IT: Multipass accurate passive inferences from traceroute'', in Internet Measurement Conf. (IMC), November 2016, pp. 397--411.
C. Liaskos, X. Dimitropoulos, and L. Tassiulas, ``Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach'', IEEE Trans. on Network and Service Management, vol. 0, no. 0, pp. (15 pages), November 2016.
T. Krenc and A. Feldmann, ``BGP prefix delegations: A deep dive'', in Internet Measurement Conf. (IMC), November 2016, pp. 469--475.
R. Beverly, ``Yarrping the Internet: Randomized high-speed active topology discovery'', in Internet Measurement Conf. (IMC), November 2016, pp. 413--420.
A. Gueye, P. Mell, D. Banse, and F. Congo, ``On the Internet connectivity in Africa'', in EAI Conf. on e-Infrastructure and e-Services for developing countries, October 2016, vol. 171 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pp. 70--77.
B. Chandrasekaran, Head into the cloud: An analysis of the emerging cloud infrastructure, Ph.D. thesis, Duke Univ., September 2016.
Z. Wang, Q. Li, F. Jin, W. Xiong, and Y. Wu, ``Hyperbolic mapping of complex networks based on community information'', Physica A: Statistical Mechanics and its Applications, vol. 455, pp. 104--119, August 2016.
F. Li, Z. Durumeric, J. Czyz, M. Karami, M. Bailey, D. McCoy, S. Savage, and V. Paxson, ``Youve got vulnerability: Exploring effective vulnerability notifications'', in USENIX Security Symp., August 2016, p. (18 pages).
H. Tan, M. Sherr, and W. Zhou, ``Data-plane defenses against routing attacks on Tor'', in Privacy Enhancing Technologies, July 2016, vol. 2016 (4), pp. 276--293.
J. Rohrer, B. LaFever, and R. Beverly, ``Empirical study of router IPv6 interface address distributions'', IEEE Internet Computing, vol. 20, no. 4, pp. 36--45, July 2016.
C. Lin, Y. Bi, H. Zhao, and W. Cai, ``Research on bottleneck-delay in internet based on IP united mapping'', Peer-to-Peer Networking and Applications, pp. 1--13, July 2016.
K.-K. Kleineberg, M. Boguna, A. Serrano, and F. Papadopoulos, ``Hidden geometric correlations in real multiplex networks'', Nature Physics, vol. 12, pp. 1076--1081, July 2016.
T.H. Kim, D.S. Kim, and H.Y. Jung, ``Defending against DDoS attacks under IP spoofing using image processing approach'', IEICE Trans. on Communications, vol. E99-B, no. 7, pp. 1511--1522, July 2016.
A. Barton and M. Wright, ``DeNASA: Destination-naive AS-awareness in anonymous communications'', Proc. on Privacy Enhancing Technologies, vol. 2016, no. 4, pp. 356--372, July 2016.
Y. Wang and K. Zhang, ``Quantifying the flattening of Internet topology'', in Conf. on Future Internet Technologies, June 2016, pp. 113--117.
A. Shah, R. Fontunge, and C. Papadopoulos, ``Towards characterizing international routing detours'', Tech. rep., arxiv.org, June 2016.
M. De~Mol and G. Feuillen, ``Toward realistic network topologies'', M.S. thesis, Univ. de Louvain, June 2016.
J.J. Czyz, A brave new world: Studies on the deployment and security of the emerging IPv6 Internet, Ph.D. thesis, Univ. of Michigan, Ann Arbor, MI, US, June 2016.
Z. Wang, Y. Wu, Q. Li, F. Jin, and W. Xiong, ``Link prediction based on hyperbolic mapping with community structure for complex networks'', Physica A: Statistical Mechanics and its Applications, vol. 450, pp. 609--623, May 2016.
R. Nithyanand, R. Singh, S. Cho, and P. Gill, ``Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client design'', Tech. rep., arxiv.org, May 2016.
Q. Li, Reducing short flows latency in the Internet, Ph.D. thesis, Univ. of Illinois at Urbana-Champaign, May 2016.
A. Baumann and B. Fabian, ``Vulnerability against Internet disruptions - A graph-based perspective'', Lecture Notes in Computer Science, vol. 9578, pp. 120--131, May 2016.
J.S. Varghese and L. Ruan, ``A machine learning approach to edge type inference in Internet AS graphs'', in Computer Comm.s Workshops (INFOCOM WKSHPS), April 2016, p. (6 pages).
Z.D.H. Tan, Network level attacks and defenses against anonymity networks, Ph.D. thesis, Georgetown Univ., April 2016.
E.C. Rye, J.P. Rohrer, and R. Beverly, ``Revisiting AS-level graph reduction'', in Computer Communications Workshops (INFOCOM WKSHPS), April 2016, p. (6 pages).
Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing resilience of inter-domain routing system under regional failures'', KSII Trans. on Internet and Information Systems, vol. 10, no. 4, pp. 1630--1642, April 2016.
Q. Li, Reducing short flows latency in the internet, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, April 2016.
M.A. Canbaz, ``Data-driven large scale network-layer Internet simulation'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), April 2016, p. (2 pages).
D. Veitch and K. Vijayalayan, ``Network timing and the 2015 leap second'', in Passive and Active Measurement (PAM), March 2016, vol. 9631 of Lecture Notes in Computer Science (LNCS), pp. 385--396.
Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``A brief history of MPLS usage in IPv6'', in Passive and Active Measurement (PAM), March 2016, Lecture Notes in Computer Science.
G. Nomikos and X. Dimitropoulos, ``traIXroute: Detecting IXPs in traceroute paths'', Lecture Notes in Computer Science (LNCS), vol. 9631, pp. 346--358, March 2016.
S. Marcisak, ``Correlating inferred data plane IPv6 reboot events with control plane BGP activity'', M.S. thesis, Naval Postgraduate School, Monterey, CA, US, March 2016.
B. Jiao and J.-M. Shi, ``Graph perturbations and corresponding spectral changes in Internet topologies'', Computer Communications, vol. 76, pp. 77--86, February 2016.
K. Kleineberg, M. Boguna, M. Serrano, and F. Papadopoulos, ``Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigation'', Tech. rep., arxiv.org, January 2016.
Q. Gao, F. Wang, and L. Gao, ``Quantifying AS path inflation by routing policies'', Intl J. of Future Generation Communication and Networking, vol. 9, no. 1, pp. 167--186, January 2016.
J. Chen, V.S.A. Kumar, M.V. Marathe, R. Sundaram, M. Thakur, and S. Thulasidasan, ``A study of the structure and vulnerabilities of metropolitan area networks'', in Intl. Conf. on Communication Systems and Networks (COMSNETS), January 2016.
Y. Sun, Y. Zhang, H. Zhang, B. Fang, and X. Du, ``Geometric Routing on Flat Names for ICN'', in IEEE Global Comm. Conference, December 2015, p. (6 pages).
W. Liu, Q. Jiang, G. Fei, M. Yuan, and G. Hu, ``A novel methodology of router-to-AS mapping inspired by community discovery'', Tech. rep., arxiv.org, December 2015.
M. DEmidio, D. Frigioni, and A. Navarra, ``Explore and repair graphs with black holes using mobile entities'', Theoretical Computer Science, vol. 605, no. C, pp. 129--145, November 2015.
Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``MPLS under the microscope: Revealing actual transit path diversity'', in Internet Measurement Conf. (IMC), October 2015, pp. 49--62.
S. Sriram, ``Edge-aware inter-domain routing protocol for the MobilityFirst Future Internet Architecture'', M.S. thesis, Rutgers, The State Univ. of New Jersey, October 2015.
J.P.S. Medeiros, P.S. Motta~Pires, J.B. Borges~Neto, and A.A.F. Loureiro, ``Minimization and placement of sensors in structurally observable networks'', in Conf. on Computer and Information Technology (CIT), October 2015, pp. 75--82.
B. Fabian, A. Baumann, and J. Lackner, ``Topological analysis of cloud service connectivity'', Computers and Industrial Engineering, vol. 88, pp. 151--165, October 2015.
M. Vijayalakshmi and S.M. Shalinie, ``Single packet ICMP traceback technique using router interface'', J. of Information Science and Engineering, vol. 31, no. 5, pp. 1757--1778, September 2015.
W. Phua, ``Detection of active topology probing deception'', M.S. thesis, Naval Postgraduate School, September 2015.
X. Li, H. Wu, C. Scoglio, and D. Gruenbacher, ``Robust allocation of weighted dependency links in cyber-physical networks'', Physica A: Statistical Mechanics and its Applications, vol. 433, pp. 316--327, September 2015.
M.D. Gray, ``Discovery of IPv6 router interface addresses via heuristic methods'', M.S. thesis, Naval Postgraduate School, September 2015.
F. Papadopoulos, R. Aldecoa, and D. Krioukov, ``Network geometry inference using common neighbors'', Phys. Rev. E, vol. 92, pp. (16 pages), August 2015.
Q. Gao, F. Wang, and L. Gao, ``Routing-policy aware peering for large content providers'', Computer Comm., vol. 67, pp. 23--33, August 2015.
M.G. Beiro, S.P. Grynberg, and J.I. Alvarez-Hamelin, ``Router-level community structure of the Internet Autonomous Systems'', EPJ Data Science, vol. 4, no. 12, pp. (22 pages), August 2015.
S. Yanbin, Z. Yu, S. Shen, Z. Hongli, and F. Binxing, ``Geometric name routing for ICN in dynamic world'', China Comm., vol. 12, no. 7, pp. 47--59, July 2015.
V. Kotronis, A. Gamperli, and X. Dimitropoulos, ``Routing centralization across domains via SDN: A model and emulation framework for BGP evolution'', Computer Networks, vol. 92, no. 2, pp. 227--239, July 2015.
K. Katsaros, X. Vasilakos, T. Okwii, G. Xylomenos, G. Pavlou, and G. Polyzos, ``On the inter-domain scalability of route-by-name information-centric network architectures'', in IFIP Networking Conf., July 2015, p. (9 pages).
A. DAndrea, M. DEmidio, D. Frigioni, S. Leucci, and G. Proietti, ``Dynamic maintenance of a shortest-path tree on homogeneous batches of updates: New algorithms and experiments'', J. Experimental Algorithmics, vol. 20, no. 1, pp. (33 pages), July 2015.
J. Juen, A. Johnson, A. Das, N. Borisov, and M. Caesar, ``Defending Tor from network adversaries: A case study of network path prediction'', in Privacy Enhancing Technologies, June 2015, vol. 2015, pp. 171--187.
P. Simoens, L.V. Herzeele, F. Vandeputte, and L. Vermoesen, ``Challenges for orchestration and instance selection of composite services in distributed edge clouds'', in Intl. Symp. on Integrated Network Management (IM), May 2015, pp. 1196--1201.
M.S. Siddiqui, D. Montero, R. Serral-Gracia, and M. Yannuzzi, ``Self-reliant detection of route leaks in inter-domain routing'', Computer Networks, vol. 82, pp. 135--155, May 2015.
A.D. Jaggard, A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, ``20,000 in league under the sea: Anonymous communication, trust, MLATs, and undersea cables'', Proc. on Privacy Enhancing Technologies, vol. 2015, no. 1, pp. 4--24, April 2015.
K. Edeline and B. Donnet, ``Towards a middlebox policy taxonomy: Path impairments'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), April 2015.
J. Chavula, N. Fearnster, A. Bagula, and H. Suleman, ``Quantifying the effects of circuitous routes on the latency of intra-Africa Internet traffic: A study of research and education networks'', Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 147, pp. 64--73, April 2015.
A. West, ``Toward a robust method of presenting a rich, interconnected deceptive network topology'', M.S. thesis, Naval Postgraduate School, March 2015.
R. Padmanabhan, Z. Li, D. Levin, and N. Spring, ``UAv6: Alias Resolution in IPv6 Using Unused Addresses'', in Intl Conf. on Passive and Active Network Measurement, March 2015, vol. 8995 of Lecture Notes in Computer Science book series (LNCS), pp. 136--148.
B. LaFever, ``Methods for intelligent mapping of the IPv6 address space'', M.S. thesis, Naval Postgraduate School, March 2015.
M. Wachs, A secure and resilient communication infrastructure for decentralized networking applications, Ph.D. thesis, Technical Univ. of Munich, February 2015.
P. Mell, R. Harang, and A. Gueye, ``The resilience of the Internet to colluding country induced connectivity disruptions'', in Network and Distributed System Security Symp. (NDSS), February 2015.
B. Chandrasekaran, M. Bai, M. Schoenfield, A. Berger, N. Caruso, G. Economou, S. Gilliss, B. Maggs, K. Moses, D. Duff, K.C. Ng, E.G. Sirer, R. Weber, and B. Wong, ``Alidade: IP geolocation without active probing'', Tech. rep., Duke Univ., January 2015.
M.S. Siddiqui, D. Montero, M. Yannuzzi, R. Serral-Gracia, X. Masip-Bruin, and W. Ramirez, ``Route leak detection using real-time analytics on local BGP information'', in IEEE Global Communications Conf., December 2014, pp. 1942--1948.
D. Hric, R.K. Darst, and S. Fortunato, ``Community detection in networks: Structural communities versus ground truth'', Phys. Rev. E, vol. 90, December 2014.
M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet: Causes, exploits, and countermeasures'', in Conf. on Computer and Communications Security, November 2014, pp. 321--333.
J Fowler, T Johnson, P Simonetto, P Lazos, S. Kobourov, M. Schneider, and C. Aceda, ``IMap: Visualizing network activity over Internet maps'', in Visualization for Cyber Security (VizSec), November 2014, p. (8 pages).
R. Durairajan, J. Sommers, and P. Barford, ``Layer 1-informed Internet topology measurement'', in Internet Measurement Conf. (IMC), November 2014, p. (14 pages).
A.R. Kiremire, M.R. Brust, and V.V. Phoha, ``Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes'', Computer Networks, vol. 72, pp. 14--32, October 2014.
R. Craven, R. Beverly, and M. Allman, ``A middlebox-cooperative TCP for a non end-to-end internet'', ACM SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 151--162, October 2014.
D. Reed, D. Warbritton, and D. Sicker, ``Current trends and controversies in Internet peering and transit: Implications for the future evolution of the Internet'', in Conf. on Communication, Information and Internet Policy (TPRC), September 2014, p. (25 pages).
G. Nomikos, P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``Comparative assessment of centrality indices and implications on the vulnerability of ISP networks'', in Intl Teletraffic Congress (ITC), September 2014, p. (9 pages).
L.D. Mosley, ``IPv6 network infrastructure and stability inference'', M.S. thesis, Naval Postgraduate School, September 2014.
B. Maggs, ``Mapping the whole Internet'', Tech. rep., Duke Univ., August 2014.
J. Czyz, M. Allman, J. Zhang, S. Iekel-Johnson, E. Osterweil, and M. Bailey, ``Measuring IPv6 adoption'', in Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), August 2014, pp. 87--98.
S.R. Burnett, Empowering bystanders to facilitate Internet censorship measurement and circumvention, Ph.D. thesis, Georgia Tech, July 2014.
J.E. Wright, ``Temporal comparisons of Internet topology'', M.S. thesis, Naval Postgraduate School, June 2014.
B. Landry, ``Comparing internet probing methodologies through an analysis of large dynamic graphs'', M.S. thesis, Naval Postgraduate School, June 2014.
A.D. Jaggard, A. Johnson, P. Syverson, and J. Feigenbaum, ``Representing network trust and using it to improve anonymous communication'', Tech. rep., arxiv.org, June 2014.
M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet - causes, exploits, and countermeasures'', Tech. rep., Carnegie Mellon Univ., May 2014.
T.V.H. Tran, ``IPv6 geolocation using latency constraints'', M.S. thesis, Naval Postgraduate School, March 2014.
G. Baltra, R. Beverly, and G.G. Xie, ``Ingress point spreading: A new primitive for adaptive active network mapping'', in Passive and Active Measurement (PAM), March 2014, vol. 8362 of Lecture Notes in Computer Science (LNCS), pp. 56--66.
Y. Xu and W. Ma, ``Robustness analyses of Internet topology with power-law features'', Intl J. of Future Generation Communication and Networking, vol. 7, no. 1, pp. 19--28, January 2014.
S.-N. Orzen, ``Domain relations in trees arborescence for interaction search on persistent routing availability'', in Symp. on Applied Machine Intelligence and Informatics (SAMI), January 2014.
E.R. Gansner, B. Krishnamurthy, W. Willinger, F.E. Bustamante, and M.A. Sanchez, ``Demo abstract: towards extracting semantics by visualizing large traceroute datasets'', Computing, vol. 96, no. 1, pp. 81--83, January 2014.
A.L. Verigin, ``Evaluating the effectiveness of Sybil attacks against peer-to-peer botnets'', M.S. thesis, Univ. of Victoria, Victoria, CA, December 2013.
G. Nomikos, P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``The multiple instances of node centrality and their implications on the vulnerability of ISP networks'', Tech. rep., arxiv.org, December 2013.
A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson, ``Users get routed: Traffic correlation on Tor by realistic adversaries'', in ACM SIGSAC Conf. on Computer and Communications Security (CCS), November 2013, pp. 337--348.
Y. Vanaubel, J.-J. Pansiot, P. Merindol, and B. Donnet, ``Network fingerprinting: TTL-based router signatures'', in Internet Measurement Conf. (IMC), October 2013, pp. 369--376.
L. Ma, T. He, K.K. Leung, A. Swami, and D. Towsley, ``Identifiability of link metrics based on end-to-end path measurements'', in Internet Measurement Conf. (IMC), October 2013, pp. 391--404.
A. Khan, T. Kwon, H. Kim, and Y. Choi, ``AS-level topology collection through looking glass servers'', in Internet Measurement Conf. (IMC), October 2013, pp. 245--242.
A. Sapegin and S. Uhlig, ``On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events'', Computer Communications, vol. 36, no. 15-16, pp. 1592--1605, September 2013.
L.H.A. Daryl, ``Toward large-graph comparison measures to understand Internet topology dynamics'', M.S. thesis, Naval Postgraduate School, Monterey, CA, US, September 2013.
J. Chabarek and P. Barford, ``Whats in a name?: decoding router interface names'', in ACM workshop on HotPlanet, August 2013, pp. 3--8.
N. Lu, Y. Wang, S. Su, F. Yang, and R. Han, ``Filtering location optimization for the reactive packet filtering'', Security and Communication Networks, vol. XX, no. X, pp. X, July 2013.
P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ``On the local approximations of node centrality in Internet router-level topologies'', in Workshop on Self-Organizing Systems (IWSOS), May 2013, vol. 8221 of Lecture Notes in Computer Science (LNCS), pp. 115--126.
A. Chen, E.W.W. Chan, X. Luo, W.W.T. Fok, and R.K.C. Chang, ``An efficient approach to multi-level route analytics'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2013, pp. 101--108.
B. Yang, H. Zhao, J. Zhang, J. Ai, S. Jia, x. Ge, and W. Liu, ``Analysis of interlayer connection catastrophe characteristics in Internet AS level topology'', Telkomnika, vol. 11, no. 2, pp. 567--576, February 2013.
C. Wacek, H. Tan, K. Bauer, and M. Sherr, ``An empirical evaluation of relay selection in Tor'', in Network and Distributed System Security Symp. (NDSS), February 2013, p. (17 pages).
Y. Wang, J. Bi, and J. Wu, ``Revisiting the rich club of the Internet AS-level topology'', IEICE Trans. on Communications, vol. E96-B, no. 3, pp. 900--904, January 2013.
M. Yu, W. Jiang, H. Li, and I. Stoica, ``Tradeoffs in CDN designs for throughput oriented traffic'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2012, pp. 145--156.
J. Sherry, ``Future architectures for middlebox processing services on the Internet and in the Cloud'', M.S. thesis, UC Berkeley, December 2012.
D. Ren, W. Wong, and S.-H. Gary~Chan, ``Toward continuous push-based P2P live streaming'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2012, pp. 1969--1974.
M.Z. Ahmad and R. Guha, ``Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation'', J. Supercomputing, vol. 62, no. 3, pp. 1425--1450, December 2012.
G. DAngelo, M. DEmidio, D. Frigioni, and D. Romano, ``Enhancing the computation of distributed shortest paths on real dynamic networks'', in Mediterranean Conf. on Algorithms, November 2012, vol. 7659 of Lecture Notes in Computer Science, pp. 148--158.
M. Wachs, C. Grothoff, and R. Thurimella, ``Partitioning the Internet'', in Conf. on Risks and Security of Internet and Systems (CRiSIS), October 2012, p. (8 pages).
M.Z. Ahmad and R. Guha, ``Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks'', in IEEE Conf. on Local Computer Networks (LCN), October 2012, p. (8 pages).
G. Tyson, S. Kaune, S. Miles, Y. El-khatib, A. Mauthe, and A. Taweel, ``A trace-driven analysis of caching in content-centric networks'', in IEEE Conf. on Computer Communications and Networks (ICCCN), August 2012, pp. 1--7.
V. Kambhampati, C. Papadopolous, and D. Massey, ``Epiphany: A location hiding architecture for protecting critical services from DDoS attacks'', in IEEE/IFIP Conf. on Dependable Systems and Networks (DSN), June 2012, p. (12 pages).
A. Fiorese, P. Simoes, and F. Boavida, ``Peer selection in P2P service overlays using geographical location criteria'', in Computational Science and Its Applications (ICCSA), June 2012, vol. 7334 of Lecture Notes in Computer Science, pp. 234--248.
Y. Xu and X. Zhang, ``Analysis of Internet robustness in attacks'', in Conf. on Systems and Informatics (ICSAI), May 2012, pp. 1494--1497.
R. Schlegel and D.S. Wong, ``Anonymous overlay network supporting authenticated routing'', Information Sciences, vol. 210, pp. 99--117, May 2012.
D. Ren and S.G. Chan, ``Achieving high-bitrate overlay live streaming with proxy helpers'', in Packet Video Workshop (PV), May 2012, pp. 7--12.
H. Papadakis, P. Fragopoulou, E. Markatos, and M. Roussopoulos, ``ITA: Innocuous topology awareness for unstructured P2P networks'', IEEE Trans. on Parallel and Distributed Systems, vol. PP, no. 99, May 2012.
A. Faggiani, E. Gregori, L. Lenzini, S. Mainardi, and A. Vecchio, ``On the feasibility of measuring the internet through smartphone-based crowdsourcing'', in Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), May 2012, pp. 318--323.
Y. Xu and Z. Wang, ``Collapse by cascading failures in hybrid attacked regional Internet'', J. Security and Its Applications, vol. 6, no. 2, pp. 287--292, April 2012.
L. Jacquin, V. Roca, M.A. Kaafar, F. Schuler, and J.-L. Roch, ``IBTrack: an ICMP black holes tracker'', Tech. rep., hal.archives-ouvertes.fr, March 2012.
H. Huang, B. Zhang, S.-H.G. Chan, G. Cheung, and P. Frossard, ``Coding and replication co-design for interactive multiview video streaming'', in IEEE INFOCOM, March 2012, pp. 2791--2795.
S. Cicerone, G. DAngelo, G. Di~Stefano, D. Frigioni, and V. Maurizio, ``Engineering a new algorithm for distributed shortest paths on dynamic networks'', Algorithmica, vol. online, pp. (36 pages), March 2012.
Y. Wang, S. Su, Y. Yang, and J. Ren, ``A more efficient hybrid approach for single-packet IP traceback'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2012, pp. 275--282.
G. DAngelo, M. DEmidio, D. Frigioni, and V. Maurizio, ``Engineering a new loop-free shortest paths routing algorithm'', in Symp. on Experimental Algorithms (SEA), January 2012, vol. 7276 of Lecture Notes in Computer Science, pp. 123--134.
J. Sommers, B. Erikson, and P. Barford, ``On the prevalence and characteristics of MPLS deployments in the open Internet'', in Internet Measurement Conf. (IMC), November 2011, pp. 445--458.
Y. Zhang, R. Oliveira, Y. Wang, S. Su, B. Zhang, J. Bi, H. Zhang, and L. Zhang, ``A framework to quantify the pitfalls of using traceroute in AS-level topology measurement'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1822--1836, October 2011.
P. Marchetta, P. Merindol, B. Donnet, A. Pescape, and J.-J. Pansiot, ``Topology discovery at the router level: a new hybrid tool targeting ISP networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 6, pp. 1776--1787, October 2011.
V. Jesus, R.L. Aguiar, and P. Steenkiste, ``Topological implications of cascading interdomain bilateral traffic agreements'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1848--1862, October 2011.
M.Z. Ahmad and R. Guha, ``Internet exchange points and Internet routing'', in Conf. on Network Protocols (ICNP), October 2011, pp. 292--294.
M.D.D. Moreira, R. Laufer, N.C. Fernandes, and O.C.M.B. Duarte, ``A stateless traceback technique for identifying the origin of attacks from a single packet'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).
E. Gregori, L. Lenzini, and C. Orsini, ``k-clique communities in the Internet AS-level topology graph'', in Distributed Computing Systems Workshops (ICDCSW), June 2011, pp. 134--139.
J. Tomasik and M.-A. Weisser, ``Internet topology on as-level: Model, generation methods and tool'', in IEEE Performance Computing and Communications Conf. (IPCC), January 2011, pp. 263--270.
E. Gregori, L Lenzini, and C. Orsini, ``k-dense communities in the internet AS-level topology'', in Conf. on Communication Systems and Networks (COMSNETS), January 2011, p. (10 pages).
E. Gregori, A. Improta, L. Lenzini, and C. Orsini, ``The impact of IXPs on the AS-level topology structure of the Internet'', Computer Communications, vol. 34, pp. 68--82, January 2011.
X. Fan and J. Heidemann, ``Selecting representative IP addresses for internet topology studies'', in Internet Measurement Conf. (IMC), November 2010, pp. 411--423.
R. Beverly, A. Berger, and G.G. Xie, ``Primitives for active internet topology mapping: toward high-frequency characterization'', in Internet Measurement Conf. (IMC), November 2010, pp. 165--171.
M.Z. Ahmad and R. Guha, ``Impact of Internet exchange points on Internet topology evolution'', in Conf. on Local Computer Networks (LCN), October 2010, pp. 332--335.
J. Tomasik and M.-A. Weisser, ``aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2010, pp. 388--390.
A. Knauf, G. Hege, T.C. Schmidt, and M. Wahlisch, ``A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP'', in Principles, Systems and Applications of IP Telecommunications (IPTComm), August 2010.
D. Fenacci and B. Franke, ``Empirical evaluation of data transformations for network infrastructure applications'', in Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X), July 2010, pp. 55--62.
Y. Zhang, R. Oliveira, H. Zhang, and L. Zhang, ``Quantifying the pitfalls of traceroute in AS connectivity inference'', in Passive and Active Measurement (PAM), A. Krishnamurthy and B. Plattner, Eds. April 2010, vol. 6032 of Lecture Notes in Computer Science (LNCS), pp. 91--100, Springer.
S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, ``Spotter: a model based active geolocation service'', in IEEE Conf. on Computer Communications (INFOCOM), April 2010, p. (9).
A. King, ``Efficient internet topology discovery techniques'', M.S. thesis, Univ. Waikato, New Zealand, February 2010.
S. Ciceronea, G. DAngelo, G. Di~Stefanoa, and D. Frigioni, ``Partially dynamic efficient algorithms for distributed shortest paths'', Theoretical Computer Science, vol. 411, no. 7-9, pp. 1013--1037, February 2010.
G.-Q. Zhang, G.-Q. Zhang, S.-Q. Cheng, and T. Zhou, ``Symbiotic effect: A guideline for network modeling'', EPL (Europhysics Letters), vol. 87, pp. 68002 (5--pages), September 2009.
G. Germoglio, B. Dias, and P. Sousa, ``Automated and distributed network service monitoring'', in Asia-Pacific Network Operations and Management Symp. (APNOMS), September 2009, vol. 5787 of Lecture Notes in Computer Science (LNCS), pp. 143--150.
D. Saucez, B. Donnet, and O. Bonaventure, ``On the impact of clustering on measurement reduction'', in IFIP Networking Conf. May 2009, vol. 5550 of Lecture Notes in Computer Science (LNCS), pp. 835--846, Springer.
L Dai, Y. Cao, Y. Cui, and Y. Xue, ``On scalability of proximity-aware peer-to-peer streaming'', Computer Communications, vol. 32, no. 1, pp. 144--153, January 2009.
M.-F. Wu, T.M. Jiang, and A. Wu, ``A virtual service framework for service composition QoS based on active measurement'', in Symp. on Service-Oriented System Engineering (SOSE), December 2008, pp. 68--72.
M. Dramburg, ``Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien'', M.S. thesis, Hochschule fuer Angewandte Wissenschaften Hamburg, Germany, August 2008.
M. Wahlisch, T.C. Schmidt, and W. Spalt, ``What is happening from behind?: Making the impact of internet topology visible'', Campus-Wide Information Systems, vol. 25, no. 5, pp. 392--406, January 2008.
C. Li, H. Zhao, X. Zhang, and X. Ge, ``Research on the distribution of network nodes based on multiple measurement points'', Computer Science, vol. 35, no. 10, pp. 98--137, January 2008.
C. Li, H. Zhao, X. Zhang, and S. Yuan, ``Analysis on traveling time of internet'', China Institute of Communications, vol. 28, no. 7, pp. 54--60, January 2007.
H. Chan, D. Dash, A. Perrig, and H. Zhang, ``Modeling adoptability of secure BGP protocols'', in Joint Conf. on Measurement and Modeling of Computer Systems, September 2006, pp. 389--390.
W.-J. Su, H. Zhao, Y. Xu, and W.-B. Zhang, ``Internet complex network separation degree analysis based on hops'', J. China Inst. of Communications, vol. 26, no. 9, pp. 1--8, September 2005.
Topology with BGP
Maria Apostolaki, Cedric Maire, and Laurent Vanbever, ``PERIMETER: A network-layer attack on the anonymity of cryptocurrencies'', Tech. rep., ETH Zurich, March 2021.
Arnold Todd, Jia He, Weifan Jiang, Matt Calder, Italo Cunha, Vasileios Giotsas, and Ethan Katz-Bassett, ``Cloud Provider Connectivity in the Flat Internet'', in Internet Measurement Conf. (IMC), October 2020, pp. 230--246.
Thomas Krenc, Robert Beverly, and Georgios Smaragdakis, ``Keep your Communities Clean: Exploring the Routing MessageImpact of BGP Communities'', in CoNEXT 20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, October 2020, p. (8 pages).
Zitong Jin, Xingang Shi, Yan Yang, Xia Yin, Zhiliang Wang, and Jianping Wu, ``TopoScope: Recover AS Relationships From Fragmentary Observations'', in IMC 20: Proceedings of the ACM Internet Measurement Conference, October 2020, p. (15 pages).
Vasileios Giotsas, George Nomikos, Vasileios Kotronis, Pavlos Serpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stravros Konstantaras, and Xenofontas Dimitropoulos, ``O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs'', IEEE/ACM Transactions on Networking, p. (16 pages), October 2020.
X. Shao and L Gao, ``Verifying Policy-based Routing at Internet Scale'', in IEEE INFOCOM 2020-IEEE Conference on Computer Communications. July 2020, pp. 2293--2302, IEEE.
Yibo Pi, Sugih Jamin, Peter Danzig, and Feng Qian, ``Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric View'', Proceedings of the ACM on Measurement and Analysis of Computing Systems, p. (29 pages), June 2020.
Jean-Francois Grailet and Benoit Donnet, ``Virtual Insanity: Linear Subnet Discovery'', IEEE Transactions on Network and Service Management, vol. 17, pp. 1268--1281, June 2020.
Di Chen, Yang Ba, Han Qiu, Junhu Zhu, and Qingxian Wang, ``ISRchain: Achieving efficient interdomain secure routing with blockchain'', Computers and Electrical Engineering, vol. 83, pp. (14 pages), May 2020.
Runa Barik, Michael Welzl, Gorry Fairhurst, Ahmed Elmokashfi, Thomas Dreibholz, and Stein Gjessing, ``On the usability of transport protocols other than TCP: A home gateway and internet path traversal study'', Computer Networks, vol. 173, pp. (15 pages), May 2020.
T. Shapira and Y. Shavitt, ``Unveiling the type of relationship between Autonomous Systems using deep learning'', in IEEE/IFIP Intl Workshop on Analytics for Network and Service Management (AnNet), April 2020.
E. Rye and R. Beverly, ``Discovering the IPv6 Network Periphery'', in International Conference on Passive and Active Network Measurement, March 2020, vol. 12048 of Lecture Notes in Computer Science, p. (15 pages).
V. Giotsas, I. Livadariu, and P. Gigis, ``A first look at the misuse and abuse of the IPv4 Transfer Market'', in Intl Conf. on Passive and Active Network Measurement. March 2020, pp. 88--103, Springer.
T. Witono and S. Yazid, ``Portrait of Indonesia Internet Topology at the Autonomous System Level'', Computational Science and Technology. Lecture Notes in Electrical Engineering, vol. 603, pp. 237--246, January 2020.
Karthika Subramani, Roberto Perdisci, and Maria Konte, ``IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points'', Tech. rep., arxiv, January 2020.
Jotte Sonneveld, ``A Gravitational Approach for Ranking Autonomous Systems in Large Autonomous System Networks'', Tech. rep., University of Twente, January 2020.
Matteo Pariset, Bryan Ford, and Cristina Basescu, ``Applying Approximate Distance Oracles to Internet Routing'', Tech. rep., Swiss Federal Institute of Technology Lausanne, January 2020.
Sareena Karapoola, Prasanna~Karthik Vairam, Shankar Raman, and V. Kamakoti, ``Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks'', Computer Communications, vol. 150, pp. 483--454, January 2020.
Hanyue He, ``Relationship between Network Traffic Topology Map and Degree of Competition'', Journal of Physics: Conference Series, vol. 1449, pp. (5 pages), January 2020.
Erik C.~Rye and Robert Beverly, ``Discovering the IPv6 Network Periphery'', Tech. rep., arXiv, January 2020.
Palma London, Shai Vardi, and Adam Wierman, ``Logarithmic Communication for DistributedOptimization in Multi-Agent Systems'', Proceedings of the ACM on Measurement and Analysis of Computing Systems, p. (29 pages), December 2019.
L. Liquori, R. Gaeta, and M. Sereno, ``A network aware resource discovery service'', Tech. rep., ParisTech, November 2019.
Bahador Yeganah, Ramakrishnan Durairajan, Reza Rejaie, and Walter Willinger, ``How Cloud Traffic Goes Hiding:A Study of Amazon Peering Fabric'', in IMC 19: Proceedings of the Internet Measurement Conference, October 2019, p. (15 pages).
Aravindh Raman, Sagar Joglekar, Emiliano De~Cristofaro, Nishanth Sastry, and Gareth Tyson, ``Challenges in the Decentralised Web:The Mastodon Case'', in IMC 19: Proceedings of the Internet Measurement Conference, October 2019, p. (13 pages).
M. Vos, ``Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints'', Tech. rep., Univ. of Twente, July 2019.
A.A. Niaki, S. Cho, Z. Weinberg, N.P. Hoang, A. Razaghpanah, N. Christin, and P. Gill, ``ICLab: A global, longitudinal Internet censorship measurement platform'', Tech. rep., arxiv.org, July 2019.
T. Bottger, G. Antichi, E.L. Fernandes, R. di Lallo, M. Bruyere, S. Uhlig, G. Tyson, and C. Ignacio, ``Shaping the Internet: 10 years of IXP growth'', Tech. rep., arxiv.org, July 2019.
E.G. Tajeuna, M. Bouguessa, and S. Wang, ``Modeling and predicting community structure changes in time-evolving social networks'', IEEE Trans. on Knowledge and Data Engineering, vol. 31, no. 6, pp. 1166--1180, June 2019.
I. Sfirakis and V. Kotronis, ``Validating IP prefixes and AS-paths with Blockchains'', Tech. rep., arxiv.org, June 2019.
A.M. Rehman, S. Goldberg, and D. Choffnes, ``Passport: Enabling accurate country-level router geolocation using inaccurate sources'', Tech. rep., arxiv.org, May 2019.
T. McDaniel, J.M. Smith, and M. Schuchard, ``The Maestro attack: Orchestrating malicious flows with BGP'', Tech. rep., arxiv.org, May 2019.
B.Z.H. Zhao, M. Ikram, H.J. Asghar, M.A. Kaafar, A. Chaabane, and K. Thilakarathna, ``A decade of mal-activity reporting: A retrospective analysis of Internet malicious activity blacklists'', Tech. rep., arxiv.org, April 2019.
T. Liu, J. Lui, D. Lin, and D. Hui, ``On the feasibility of inter-domain routing via a small broker set'', IEEE Trans. on Parallel and Distributed Systems, vol. 30, no. 2, pp. 415--427, February 2019.
Y. Yang, X. Yin, X. Shi, Z. Wang, J. He, T.~Z.~J. Fu, and M. Winslett, ``Inter-domain routing bottlenecks and their aggravation'', Computer Networks, vol. 162, January 2019.
Q. Xiang, J.~J. Zhang, X.~T. Wang, Y.~J. Liu, C. Guok, F. Le, H. Newman, Y.~R. Yang, and J. MacAuley, ``Toward Fine-Grained, Privacy-Preserving, Efficient Multi-Domain Network Resource Discovery'', IEEE Journal on Selected Areas in Communications, vol. 37, pp. (16 pages), January 2019.
M. Tran, M.~S. Kang, H.~C. Hsiao, W.~H. Chiang, S.~P. Tung, and Y.~S. Wang, ``On the Feasibility of Rerouting-based DDoS Defenses'', in IEEE Symp. on Security and Privacy, January 2019, p. (16 pages).
Z. Tian, S. Su, W. Shi, X. Du, M. Guizani, and X. Yu, ``A data-driven method for future Internet route decision modeling'', Future Generation Computer Systems, vol. 95, pp. (8 pages), January 2019.
P. Sermpezis and V. Kotronis, ``Inferring Catchment in Internet Routing'', in ACM on Measurement and Analysis of Computing Systems, January 2019, vol. 3, p. (31 pages).
M. Pulfer, ``Multi-path routing'', M.S. thesis, Swiss Fed. Inst. of Technology Zurich, January 2019.
Z. Lin and C. Wang, ``An Efficient Approximation of Betweenness Centrality for Uncertain Graphs'', IEEE Access, vol. 7, January 2019.
K.~G. Leyba, B. Edwards, C. Freeman, J.~R. Crandall, and S. Forrest, ``Borders and gateways: measuring and analyzing national as chokepoints'', in ACM SIGCAS Conf. on Computing and Sustainable Societies, January 2019, vol. 2, p. (11 pages).
L. Jiao, X. Lin, R. Zhou, and X. Chen, ``Online Scheduling of Traffic Diversion and Cloud Scrubbing with Uncertainty in Current Inputs'', in ACM Intl Symp. on Mobile Ad Hoc Networking and Computing (Mobihoc), January 2019, vol. 20, p. (10 pages).
J. Jiang, S. Wen, S. Yu, B. Liu, Y. Xiang, and W. Zhou, ``Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator'', Malicious Attack Propagation and Source Identification, p. (8 pages), January 2019.
D. Gong, M. Tran, S. Shinde, H. Jin, V. Sekar, P. Saxena, and M.S. Kang, ``Practical verifiable in-network filtering for DDoS defense'', Tech. rep., arxiv.org, January 2019.
N. Ghose, L. Lazos, J. Rozenblit, and R. Breiger, ``Multimodal Graph Analysis of Cyber Attacks'', in Spring Simulation Conference (SpringSim), January 2019, p. (12 pages).
D. Garay, ``Network Peering Dashboard for SURFnet'', Tech. rep., Univ. of Amsterdam, January 2019.
A. Dwaraki, R. Freedman, S. Zilberstein, and T. Wolf, ``Using Natural Language Constructs and Concepts to Aid Network Management'', in 2019 International Conference on Computing, Networking and Communications (ICNC), January 2019.
J.~M. Del~Fiore, P. Merindol, V. Persico, C. Pelsser, and A. Pescape, ``Filtering the noise to reveal inter-domain lies'', in Network Traffic Measurement and Analysis Conference (TMA), January 2019, p. (8 pages).
V. Chepoi, F.~F. Dragan, M. Habib, Y. Vaxes, and H. Alrasheed, ``Fast approximation of eccentricities and distances in hyperbolic graphs'', Journal of Graph Algorithms and Applications, vol. 23, pp. (41 pages), January 2019.
K. Bakhshaliyev, M.~A. Canbaz, and M.~H. Gunes, ``Investigating Characteristics of Internet Paths'', Transactions on Modeling and Performance Evaluation of Computing Systems, vol. 0, pp. (24 pages), January 2019.
Z. Weinberg, Toward automated worldwide monitoring of network-level censorship, Ph.D. thesis, Carnegie Mellon Univ., December 2018.
S. Ramanathan, J. Mirkovic, M. Yu, and Y. Zhang, ``SENSS against volumetric DDoS attacks'', in Computer Security Applications Conf. (CSAC), December 2018, pp. 266--277.
Y. Pi, S. Jamin, P. Danzig, and J. Shaha, ``AP-atoms: A high-accuracy data-driven client aggregation for global load balancing'', IEEE/ACM Trans. on Networking, vol. 26, no. 6, pp. 2748--2761, December 2018.
A. Mani, D. Dworken, T. Vaidya, and M. Sherr, ``An extensive evaluation of the Internets open proxies'', in Annual Computer Security Applications Conf., December 2018, pp. 252--265.
R. Jansen, M. Traudt, J. Geddes, C. Wacek, M. Sherr, and P. Syverson, ``KIST: Kernel-informed socket transport for Tor'', ACM Trans. on Privacy and Security (TOPS), vol. 22, no. 1, pp. (37 pages), December 2018.
Q. Xiang, J.J. Zhang, X.T. Wang, Y.J. Liu, C. Guok, F. Le, J. MacAuley, H. Newman, and Y.R. Yang, ``Fine-grained, multi-domain network resource abstraction as a fundamental primitive to enable high-performance, collaborative data sciences'', in Intl Conf. for High Performance Computing, Networking, Storage and Analysis, November 2018, p. (13 pages).
J.M. Smith, K. Birkeland, T. McDaniel, and M. Schuchard, ``Withdrawing the BGP re-routing curtain: Understanding the security impact of BGP poisoning via real-world measurements'', Tech. rep., arxiv.org, November 2018.
K. Semertzidis, E. Pitoura, E. Terzi, and P. Tsaparas, ``Finding lasting dense subgraphs'', Data Mining and Knowledge Discovery, vol. 33, no. 5, pp. 1417--1445, November 2018.
A.Y. Nur, The implications of the Internets topological structure for its efficiency, security, and reliability, Ph.D. thesis, Univ. of Louisiana at Lafayette (ProQuest Publ.), November 2018.
L. Levenburg, ``On interdisciplinary studies of physical information infrastructure'', in Research Methods for the Digital Humanities, Ch. 2, November 2018, pp. 15--30.
Y. Gilad, T. Hlavacek, A. Herzberg, M. Schapira, and H. Shulman, ``Perfect is the enemy of good: Setting realistic goals for interdomain routing security'', in ACM Workshop on Hot Topics in Networks, November 2018, p. (9 pages).
T.V. Doan, L. Pajevic, V. Bajpai, and J. Ott, ``Tracing the path to YouTube: A quantification of path lengths and latencies toward content caches'', IEEE Communications Magazine, vol. 57, no. 1, pp. 80--86, November 2018.
M. Brandt, H. Shulman, and M. Waidner, ``Internet as a source of randomness'', in ACM Workshop on Hot Topics in Networks, November 2018, pp. 64--70.
S. Wassermann and P. Casas, ``Distributed Internet paths performance analysis through machine learning'', in Network Traffic Measurement and Analysis Conf. (TMA), October 2018, p. (2 pages).
F. Streibelt, F. Lichtblau, R. Beverly, A.~F. Max, C. Pelsser, G. Smaragdakis, and R. Bush, ``BGP communities: Even more worms in the routing can'', in Internet Measurement Conf. (IMC), October 2018, pp. 279--292.
R. Singh, A. Dunna, and P. Gill, ``Characterizing the deployment and performance of multi-CDNs'', in Internet Measurement Conference (IMC), October 2018, p. (7 pages).
S. Sigloch, Mobile Internet connectivity, exploring structural bottlenecks in Tamil Nadu using active Internet periphery measurements, Ph.D. thesis, Anglia Ruskin University, October 2018.
A. Nur and M. Tozal, ``Identifying critical autonomous systems in the Internet'', J. of Supercomputing, vol. 74, no. 10, pp. 4965--4985, October 2018.
K. Nomikos, G. Nomikos, V. Kotronis, P. Sermpezise, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos, and V. Giotsas, ``O peer, where art thou?: Uncovering remote peering interconnections at IXPs'', in Internet Measurement Conf. (IMC), October 2018, pp. 265--278.
N. Hegde, Q. Chang, and M. Kulkarni, ``D2P: Automatically creating distributed dynamic programming codes'', Tech. rep., Purdue Univ., October 2018.
P. Ekparinya, V. Gramoli, and G. Jourjon, ``Impact of man-in-the-middle attacks on Ethereum'', in Symp. on Reliable Distributed Systems (SRDS), October 2018, p. (10 pages).
M. Brandt, T. Dai, A. Klein, H. Shulman, and M. Waidner, ``Domain validation++ for MitM-resilient PKI'', in ACM SIGSAC Conf. on Computer and Communications Security, October 2018, pp. 2060--2076.
X. Shao, H. Asaeda, M. Dong, and Z Ma, ``Cooperative inter-domain cache sharing for information-centric networking via a bargaining game approach'', IEEE Trans. on Network Science and Engineering, vol. 6, no. 4, pp. 698--710, September 2018.
B. Marczak, J. Scott-Railton, S. McKune, B.A. Razzak, and R. Deibert, ``HIDE AND SEEK - Tracking NSO Group Pegasus spyware to operations in 45 countries'', Tech. rep., Univ. of Toronto, September 2018.
E. Yuce and A.A. Selcuk, ``Server notaries: A complementary approach to the Web PKI trust model'', IET Information Security, vol. 12, no. 5, pp. 455--461, August 2018.
N. Spring, Z. Li, D. Levin, and B. Bhattacharjee, ``Internet anycast: performance, problems, and potential'', in ACM SIGCOMM, August 2018, pp. 59--73.
L. Sikos, M. Stumptner, W. Mayer, C. Howard, S. Voigt, and D. Philp, ``Automated reasoning over provenance-aware communication network knowledge in support of cyber-situational awareness'', in Intl Conf. on Knowledge Science, Engineering and Management, August 2018, vol. 11062 of Lecture Notes in Computer Science (LNCS), pp. 132--143.
Z. Liu, H. Jin, Y.~C. Hu, and M. Bailey, ``Practical proactive DDoS-attack mitigation via endpoint-driven in-network traffic control'', IEEE/ACM Trans. on Networking, vol. 26, no. 4, pp. 1948--1961, August 2018.
B. Liu, C. Lu, H. Duan, Y. Liu, Z. Li, S. Hao, and M. Yang, ``Who is answering my queries: Understanding and characterizing interception of the DNS resolution path'', in USENIX Security Symp., August 2018, p. (17 pages).
J. Jin, ``BGP route leak prevention based on BGPsec'', in Vehicular Technology Conf. (VTC-Fall), August 2018, p. (6 pages).
A. Dethise, M. Chiesa, and M. Canini, ``Prelude: Ensuring inter-domain loop-freedom in SDN-enabled networks'', in Asia-Pacific Workshop on Networking, August 2018, pp. 50--56.
C. Chen, Infrastructure-based anonymous communication protocols in future internet architectures, Ph.D. thesis, Carnegie Mellon Univ, August 2018.
M.A. Canbaz, Internet topology mining: From Big Data to Network Science, Ph.D. thesis, Univ. of Nevada, Reno, August 2018.
J. Smith and M. Schuchard, ``Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing'', in IEEE Symp. on Security and Privacy, July 2018, p. (19 pages).
N. Krohnke, J. Jansen, and H. Vranken, ``Resilience of the Domain Name System: A case study of the .nl-domain'', Computer Networks, vol. 139, pp. 136--150, July 2018.
P.K. Dey, M.A. Canbaz, M. Yuksel, and M.H. Gunes, ``On correlating ISP topologies to their businesses'', in Intl Conf. on Communications (ICC), July 2018, p. (7 pages).
T. Bottger, F. Cuadrado, and S. Uhlig, ``Looking for hypergiants in PeeringDB'', in ACM SIGCOMM Computer Communication Review, July 2018, vol. 48 (3), pp. 13--19.
Y. Sun, L. Yin, Z. Wang, Y. Guo, and B. Fang, ``Identifying the propagation sources of stealth worms'', in Intl Conf. on Computational Science, June 2018, vol. 10862 of Lecture Notes in Computer Science (LNCS), pp. 811--817.
S. Gao, S. Shrivastava, K. Ogan, Y. Xin, and I. Baldin, ``Evaluating path query mechanisms as a foundation for SDN network control'', in IEEE Conf. on Network Softwarization and Workshops (NetSoft), June 2018, p. (9 pages).
R. Dahlberg, T. Pulls, J. Vestin, T. Hoiland-Jorgensen, and A. Kassler, ``Aggregation-based certificate transparency gossip'', Tech. rep., arxiv.org, June 2018.
A. Baumann, Network Science - Applications in technology, business and social media, Ph.D. thesis, Humboldt Univ. of Berlin, June 2018.
M. Alessandro and C.C. Vittorio, ``Leveraging the nonuniform PSO network model as a benchmark for performance evaluation in community detection and link prediction'', New J. of Physics, vol. 20, pp. (23 pages), June 2018.
W.J.A. Silva and D.F.H. Sadok, ``A survey on efforts to evolve the control plane of inter-domain routing'', MDPI J., vol. 9, no. 5, pp. (26 pages), May 2018.
H.V. Lierde, T.W.S. Chow, and J.C. Delvenne, ``Spectral clustering algorithms for the detection of clusters in block-cyclic and block-acyclic graphs'', J. of Complex Networks, vol. 7, no. 1, pp. 1--53, May 2018.
P. Ekparinya, V. Gramoli, and G. Jourjon, ``Double-spending risk quantification in private, consortium and public Ethereum blockchains'', Tech. rep., arxiv.org, May 2018.
H. Alrashed, ``Delta hyperbolicity and the core-periphery structure in graphs'', Lecture Notes in Social Networks (LNSN), pp. 23--43, May 2018.
W.J.A. Silva, ``An architecture to manage incoming traffic of inter-domain routing using OpenFlow networks'', Information, vol. 9, no. 4, pp. (23 pages), April 2018.
M. Siddula, L. Li, and Y. Li, ``An empirical study on the privacy preservation of online social networks'', IEEE Access, vol. 6, pp. 19912--19922, April 2018.
A. Shah, Systems for characterizing Internet routing, Ph.D. thesis, Colorado State Univ., April 2018.
J.R. Mendoza, R. Ocampo, I. Montes, and C.A. Festin, ``Efficient feature extraction for Internet data analysis using AS2Vec'', in ACM Symp. on Applied Computing, April 2018, pp. 1006--1013.
P. Mell, A. Gueye, and C. Schanzle, ``Quantifying information exposure in Internet routing'', in Conf. on Trust, Security And Privacy In Computing And Communications/Big Data Science And Engineering (TrustCom/BigDataSE), April 2018.
X. Ma, J. Li, Y. Tang, B. An, and X. Guan, ``Protecting internet infrastructure against link flooding attacks: A techno-economic perspective'', Information Sciences, vol. 479, pp. 486--502, April 2018.
R. Birkner, D. Drachsler-Cohen, L. Vanbever, and M. Vechev, ``Net2Text: query-guided summarization of network forwarding behaviors'', in USENIX Symp. on Networked Systems Design and Implementation (NSDI), April 2018, pp. 609--623.
S. Berenguer and F. Pintor, ``Radiography of Internet autonomous systems interconnection in Latin America and the Caribbean'', Computer Comm., vol. 119, pp. 15--28, April 2018.
M.E. Tozal, ``Policy-preferred paths in AS-level Internet topology graphs'', Theory and Applications of Graphs, vol. 5, no. 1, pp. (27 pages), March 2018.
K. Shin, T. Rad, and C. Faloutsos, ``Patterns and anomalies in k-cores of real-world graphs with applications'', Knowledge and Information Systems, vol. 54, no. 3, pp. 677--710, March 2018.
D. Glasser, Longitudinal study of large-scale traceroute results, Ph.D. thesis, Naval Postgraduate School, March 2018.
J. Wu, J. Zhong, Z. Chen, and B. Chen, ``Optimal coupling patterns in interconnected communication networks'', IEEE Trans. on Circuits and Systems, vol. 65, no. 8, pp. 1109--1113, February 2018.
A.Y. Nur and M.E. Tozal, ``Cross-AS (X-AS) Internet topology mapping'', Computer Networks, vol. 132, pp. 53--67, February 2018.
L. He, Y. Jia, G. Ren, and Y. Liu, ``RISP: An RPKI-based inter-AS source protection mechanism'', Tsinghua Science and Technology, vol. 23, no. 1, pp. 1--12, February 2018.
C. Chen, D. Asoni, A. Perrig, D. Barrera, G. Danezis, and C. Troncoso, ``TARANET: Traffic-analysis resistant anonymity at the NETwork layer'', Tech. rep., arxiv.org, February 2018.
M.A. Canbaz, K. Bakhshaliyev, and M.H. Gunes, ``Router-level topologies of Autonomous Systems'', Springer Proc. in Complexity, vol. IX, pp. 243--257, February 2018.
J. Xue, J. Wang, S. Liu, X. Ma, and H. Wang, ``Dissecting persistent instability of web service: A joint perspective of server schedule dynamics and path latency'', International Journal of Communication Systems, p. (11 pages), January 2018.
R. Wails, Y. Sun, A. Johnson, M. Chiang, and P. Mittal, ``Tempest: Temporal dynamics in anonymity systems'', Tech. rep., arxiv.org, January 2018.
M. Syamkumar, S.~K. Mani, R. Durairajan, P. Barford, and J. Sommers, ``Wrinkles in Time: Detecting Internet-wide Events via NTP'', in 2018 IFIP Networking Conference (IFIP Networking) and Workshops, January 2018, p. (9 pages).
Q. Shi, X. Wang, and W. Lin, ``Placement Strategy for Replicated Servers in CDN'', in Chinese Control Conf. (CCC), January 2018, vol. 37, p. (7 pages).
A.~Y. Nur and M.~E. Tozal, ``Geography and Routing in the Internet'', ACM Transactions on Spatial Algorithms and Systems (TSAS), vol. 4, pp. (16 pages), January 2018.
F. Michelinakis, H. Doroud, A. Razaghpanah, A. Lutu, N. Vallina-Rodriguez, P. Gill, and J. Widmer, ``The cloud that runs the mobile Internet: A measurement study of mobile cloud services'', in Conf. on Computer Communications, January 2018, vol. 37, p. (9 pages).
A. Marzano, D. Alexander, E. Fontesca, C. Hoepers, K. Steeding-Jessen, M.~H. P.~c. Chaves, I. Cunha, and D. Guedes, ``The Evolution of Bashlite and Mirai IoT Botnets'', IEEE Symp. on Computers and Communications (ISCC), p. (6 pages), January 2018.
A. Mani, T. Wilson-Brown, R. Jansen, A. Johnson, and M. Sherr, ``Understanding Tor Usage with Privacy-Preserving Measurement'', in Internet Measurement Conf. (IMC), January 2018, p. (13 pages).
G. Kontaxis, Reducing third parties in the network through client-side intelligence, Ph.D. thesis, Columbia Univ., January 2018.
M Imani, A. Barton, and M. Wright, ``Guard Sets in Tor using AS Relationships'', in Proc. on Privacy Enhancing Technologies, January 2018, vol. 2018 (1), pp. 145--165.
W.~B. de Vries, R.~V. Rijswijk-Deij, P.~T. de Boer, and A. Pras, ``Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google'', in Network Traffic Measurement and Analysis Conf. (TMA), January 2018, p. (8 pages).
D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Mori, and S. Goto, ``DomainProfiler: toward accurate and early discovery of domain names abused in future'', International Journal of Information Security (2018), p. (20 pages), January 2018.
T. Bottger, F. Cuadrado, G. Tyson, I. Castro, and S. Uhlig, ``Open connect everywhere: A glimpse at the Internet ecosystem through the lens of the Netflix CDN'', Tech. rep., arxiv.org, January 2018.
G. Aceto, A. Botta, P. Marchetta, V. Persico, and A. Pescape, ``A comprehensive survey on internet outages'', J. of Network and Computer Applications, p. (48 pages), January 2018.
Z. Zhang, L. Ma, K.~K. Leung, F. Le, S. Kompella, and L. Tassiulas, ``How better is distributed SDN? An analytical approach'', Tech. rep., arxiv.org, December 2017.
J.M. Smith, ``Taking back the Internet: Defeating DDoS and adverse network conditions via reactive BGP routing'', M.S. thesis, Univ. of Tennessee, December 2017.
D. Gosain, A. Agarwal, S. Chakravarty, and H.B. Acharya, ``The devils in the details: Placing decoy routers in the Internet'', in Computer Security Applications Conf., December 2017, pp. 577--589.
J. Rula, F. Bustamente, and M. Steiner, ``Cell spotting: Studying the role of cellular networks in the Internet'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).
A. Murdock, F. Li, P. Bramsen, Z. Durumeric, and V. Paxson, ``Target generation for Internet-wide IPv6 scanning'', in Internet Measurement Conf. (IMC), November 2017, p. (12 pages).
B. Goodchild, Y. Chiu, R. Hansen, H. Lu, M. Calder, M. Luckie, W. Lloyd, D. Choffnes, and E. Katz-Bassett, ``The record route option is an option!'', in Internet Measurement Conf. (IMC), November 2017, pp. 311--317.
V. Giotsas, G. Smaragdakis, C. Dietzel, P. Richter, A. Feldmann, and A. Berger, ``Inferring BGP blackholing activity in the Internet'', in Internet Measurement Conf. (IMC), November 2017, p. (14 pages).
X. Zhang, C. Moore, and M.E.J. Newman, ``Random graph models for dynamic networks'', Eur. Physical J., vol. 90, pp. (15 pages), October 2017.
H. Yang and S.S. Lam, ``Scalable verification of networks with packet transformers using atomic predicates'', IEEE/ACM Trans. on Networking (TON), vol. 25, no. 5, pp. 2900--2915, October 2017.
G. Tilch, T. Ermakova, and B. Fabian, ``A multilayer graph model of the Internet topology'', Tech. rep., zenodo.org, October 2017.
M. Nasr, H. Zolfaghari, and A. Houmansadr, ``The waterfall of liberty: Decoy routing circumvention that resists routing attacks'', in Conf. on Computer and Communications Security (SIGSAC), October 2017, p. (16 pages).
V. Kotronis, G. Nomikos, L. Manassakis, D. Mavrommatis, and X. Dimitropoulos, ``Shortcuts through colocation facilities'', Tech. rep., arxiv.org, October 2017.
O. Gasser, Q. Scheitle, B. Rudolph, C. Denis, N. Schriker, and G. Carle, ``The amplification threat posed by publicly reachable BACnet devices'', J. of Cyber Security and Mobility, vol. 6, no. 1, pp. 77--104, October 2017.
H.B. Acharya, S. Chakravarty, and D. Gosain, ``Few throats to choke: On the current structure of the Internet'', in Conf. on Local Computer Networks (LCN), October 2017, p. (8 pages).
Z. Liu, H. Jin, Y. Hu, and M. Bailey, ``MiddlePolice: Fine-grained endpoint-driven in-network traffic control for proactive DDoS attack mitigation'', Tech. rep., arxiv.org, September 2017.
N. Haghtalab, A. Laszka, A. Procaccia, Y. Vorobeychik, and X. Koutsoukos, ``Monitoring stealthy diffusion'', Knowledge and Information Systems, vol. 52, no. 3, pp. 657--685, September 2017.
A. Canbaz, K. Bakhshaliyev, and M. Gunes, ``Analysis of path stability within autonomous systems'', in Workshop on Measurement and Networking, September 2017, p. (6 pages).
M. Ando, M. Okada, and A. Kanaoka, ``Simulation study of BGP origin validation effect against mis-origination with Internet topology'', in Asia Joint Conf. on Information Security, September 2017, pp. 75--82.
E. Gregori, L. Lenzini, and V. Luconi, ``AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systems'', Computer Communications, vol. 112, pp. 47--57, August 2017.
V. Burger, Performance evaluation and optimization of Content Delivery Networks, Ph.D. thesis, Julius-Maximilians-Univ. Wurzburg, August 2017.
M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, X. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou, ``Understanding the Mirai botnet'', in USENIX Security Symp., August 2017, p. (18 pages).
Z. Liu, Minimal deployable endpoint-driven network forwarding: principle, designs and applications, Ph.D. thesis, Univ. of Illinois at Urbana-Champaign, July 2017.
S. Kuenzer, A. Ivanov, F. Manco, J. Mendes, Y. Volchkov, F. Schmidt, K. Yasukata, M. Honda, and F. Huici, ``Unikernels everywhere: The case for elastic CDNs'', in Intl Conf. on Virtual Execution Environments (SIGPLAN), July 2017, vol. 52 (7) of ACM SIGPLAN Notices - VEE 17, pp. 15--29.
G. Hu, W. Chen, Q. Li, Y. Jiang, and K. Xu, ``TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code'', Future Generation Computer Systems, vol. 72, pp. 219--226, July 2017.
R. Hiran, N. Carlsson, and N. Shahmehri, ``Collaborative framework for protection against attacks targeting BGP and edge networks'', Computer Networks, vol. 122, pp. 120--137, July 2017.
R. Fanou, P. Francois, E. Aben, M. Mwangi, N. Goburdhan, and F. Valera, ``Four years tracking unrevealed topological changes in the African interdomain'', Computer Communications, vol. 106, pp. 117--135, July 2017.
G. Asharov, D. Demmler, M. Schapira, T. Schneider, G. Segev, S. Shenker, and M. Zohner, ``Privacy-preserving interdomain routing at Internet scale'', Proc. on Privacy Enhancing Technologies, vol. 2017, no. 3, pp. 147--167, July 2017.
M. Wachs, Q. Scheitle, and G. Carle, ``Push away your privacy: Precise user tracking based on TLS client certificate authentication'', in Network Traffic Measurement and Analysis Conf., June 2017, p. (9 pages).
N. Tata, ``MicroCuckoo hash engine for high-speed IP lookup'', M.S. thesis, Virginia Polytechnic Inst. and State Univ., June 2017.
P. Sermpezis, G. Nomikos, and X. Dimitropoulos, ``Re-mapping the Internet: Bring the IXPs into play'', Tech. rep., arxiv.org, June 2017.
A. Reuter, R. Bush, I. Cunha, E. Katz-Bassett, T. Schmidt, and M. Wahlisch, ``Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering'', Tech. rep., arxiv.org, June 2017.
P. London, ``Distributed optimization and data market design'', M.S. thesis, California Inst. of Technology, June 2017.
M. Imani, A. Barton, and M. Wright, ``Forming guard sets using AS relationships'', Proc. on Privacy Enhancing Technologies, vol. 2017, no. 3, pp. 1--20, June 2017.
J.F. Grailet and B. Donnet, ``Towards a renewed alias resolution with space search reduction and IP fingerprinting'', in Network Traffic Measurement and Analysis Conf. (TMA), June 2017, p. (9 pages).
S. Cho, R. Nithyanand, A. Razaghpanah, and P. Gill, ``A churn for the better: Localizing censorship using network-level path churn and network tomography'', Tech. rep., arxiv.org, June 2017.
P. Bangera and S. Gorinsky, ``Ads versus regular contents: Dissecting the web hosting ecosystem'', in IFIP Networking Conf., June 2017, p. (9 pages).
D.~A. Vega-Oliveros, L.~d.~F. Costa, and F.~A. Rodrigues, ``Influence maximization on correlated networks through community identification'', Tech. rep., arxiv.org, May 2017.
J.Y. Suen and S. Navlakha, ``Using inspiration from synaptic plasticity rules to optimize traffic flow in distributed engineered networks'', Neural Computation, vol. 29, no. 5, pp. 1204--1228, May 2017.
R. Motamedi, Measurement-based characterization of large-scale networked systems, Ph.D. thesis, Univ. of Oregon, May 2017.
Q. Jiang, H. Hu, and G. Hu, ``Two-type information fusion based IP-to-AS mapping table refining'', J. of Computer Science and Technology, vol. 32, no. 3, pp. 571--584, May 2017.
J. Jancicka, ``Automatic classification of network entities'', Tech. rep., Charles Univ., May 2017.
B. Fabian, A. Baumann, M. Ehlert, V. Vasilis, and T. Ermakova, ``CORIA - Analyzing Internet connectivity risks using network graphs'', in IEEE Conf. on Communications (ICC), May 2017, p. (6 pages).
J.M.M. Domingos, ``Characterization and monitoring of critical systems on national Internet'', M.S. thesis, Tecnico Lisboa, May 2017.
A. Al-Baghdadi, ``Computing top-k closeness centrality in unweighted undirected graphs revisited'', M.S. thesis, Kent State Univ., May 2017.
Y. Wang, J. Bi, and K. Zhang, ``A SDN-based framework for fine-grainedinter-domain routing diversity'', Mobile Networks and Applications, vol. 22, no. 5, pp. 1--12, April 2017.
G. Tyson, S. Huang, F. Cuadrado, T. Castro, V. Perta, A. Sathiaseelan, and S. Uhlig, ``Exploring HTTP header manipulation in-the-wild'', in Conf. on World Wide Web, April 2017, vol. 26, pp. 451--458.
M.E. Tozal, ``Autonomous system ranking by topological characteristics: A comparative study'', in IEEE Systems Conf. (SysCon), April 2017, p. (8 pages).
Y. Sun, A. Edmundson, N. Feamster, M. Chiang, and P. Mittal, ``Counter-RAPTOR: Safeguarding Tor against active routing attacks'', Tech. rep., arxiv.org, April 2017.
R. Birkner, A. Gupta, N. Feamster, and L. Vanbever, ``SDX-based flexibility or Internet correctness?: Pick two!'', in Symp. on SDN Research (SOSR), April 2017, p. (7 pages).
P. Sermpezis and X. Dimitropoulos, ``Can SDN accelerate BGP convergence? A performance analysis of inter-domain routing centralization'', Tech. rep., arxiv.org, February 2017.
V. Pacifici and G. Dan, ``Distributed caching algorithms for interconnected operator CDNs'', IEEE J. on Selected Areas in Communications, vol. 35, no. 2, pp. 380--391, February 2017.
S. Matsumoto, R.M. Reischuk, P. Szalachowski, T.H. Kim, and A. Perrig, ``Authentication challenges in a global environment'', ACM Trans. on Privacy and Security (TOPS), vol. 20, no. 1, pp. 1--34, February 2017.
Y. Gilad, A. Cohen, A. Herzberg, M. Schapira, and H. Shulman, ``Are we there yet? On RPKIs deployment and security'', in The Network and Distributed System Security Symp., February 2017, p. (15 pages).
W. Dong, Y. Gao, W. Wu, J. Bu, C. Chen, and X. Li, ``Optimal monitor assignment for preferential link tomography in communication networks'', IEEE/ACM Trans. on Networking (TON), vol. 25, no. 1, pp. 210--223, February 2017.
R. Almeida, O. Fonseca, E. Fazzion, D. Guedes, W. Meira, and I. Cunha, ``A characterization of load balancing on the IPv6 Internet'', in Conf. on Passive and Active Network Measurement, February 2017, vol. 10176 of Lecture Notes in Computer Science (LNCS), pp. 242--254.
Y. Tanaka and A. Goto, ``Suspicious FQDN evaluation based on variations in malware download URLs'', in IEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining, January 2017, p. (7 pages).
K. Sakuma, H. Asahina, S. Haruta, and I. Sasase, ``Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination'', in 2017 23rd Asia-Pacific Conference on Communications (APCC), January 2017, vol. 23, p. (6 pages).
Y. Nozaki, E. Golen, and N. Shenoy, ``A modular architecture for scalable inter-domain routing'', in IEEE Computing and Communication Workshop and Conf. (CCWC), January 2017, p. (6 pages).
P. Moriano, S. Achar, and L.~J. Camp, ``Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies'', Computers and Security, p. (15 pages), January 2017.
J. Mirkovic, E. Kline, and P. Reiher, ``RESECT: Self-Learning Traffic Filters for IP Spoofing Defense'', in Annual Computer Security Applications Conf., January 2017, vol. 33, p. (9 pages).
M.~J. Mirchev, ``On the Spectra of Scale-free and Small-World Networks'', in Telecom 2017, January 2017, p. (8 pages).
J. Liu, B. Yang, J. Liu, Y. Lu, and K. Zhu, ``Forwarding degree-based AS relationship recognition algorithm'', in IEEE Advanced Information Technology, Electronic and Automation Control Conf. (IAEAC), January 2017, vol. 2, p. (5 pages).
Z. Li, D. Levin, N. Spring, and B. Bhattacharjee, ``Longitudinal analysis of root server anycast inefficiencies'', Tech. rep., Univ. of Maryland, January 2017.
Y. Lee and N. Spring, ``Identifying and Analyzing Broadband Internet Reverse DNS Names'', in Intl Conf. on emerging Networking EXperiments and Technologies, January 2017, p. (5 pages).
M. Huth and B. Fabian, ``Inferring business relationships in the internet backbone'', Intl J. of Networking and Virtual Organisations, vol. 16, no. 4, pp. 315--345, January 2017.
J. Holland and M. Schuchard, ``POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States'', in ACM SIGSAC Conf. on Computer and Communications Security, January 2017, p. (2 pages).
J.~L.~G. Gomez, R. Wang, M.~H. Chen, and C.~F. Chou, ``ETMP-BGP: Effective tunnel-based multi-path BGP routing using software-defined networking'', in 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), January 2017, p. (6 pages).
A. Finamore, M. Varvello, and K. Papagiannaki, ``Mind the Gap Between HTTP and HTTPS in Mobile Networks'', in Intl Conf. on Passive and Active Network Measurement, January 2017, p. (11 pages).
S. Fernandes, ``Performance evaluation for network services, systems and protocols '', Tech. rep., arxiv.org, January 2017.
S. Cho, R. Nithyanand, P. Gill, and A. Razaghpanah, ``A Churn for the Better'', in CoNEXT 2017, January 2017, p. (7 pages).
G. Cakmak and M.~N. Aydin, ``A country-specific analysis on internet interconnection ecosystems'', in Intl Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), January 2017, vol. 9, p. (6 pages).
S. Bublitz, ``Towards a BitTorrent weather forecast'', M.S. thesis, Univ. of Zurich, January 2017.
A. Ali and M.~A.~U. Rahman, ``A Efficient Privacy Based Multi User Computation Using Inter Domain Routing Decision'', Intl J. of Scientific Research in Computer Science, Engineering and Information Technology, vol. 2, pp. (8 pages), January 2017.
A. Ahmad, Y. Jaradat, and M.~Z. Maoud, ``Machine Learning Approach for Categorizing Internet Autonomous Systems Links'', in Intl Conf. on Green and Human Information Technology 2017, January 2017, p. (5 pages).
J.L. Sobrinho, L. Vanbever, F. Le, A. Sousa, and J. Rexford, ``Scaling the Internet routing system through distributed route aggregation'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 6, pp. 3462--3476, December 2016.
K. Semertzidis, E. Pitoura, E. Terzi, and P. Tsaparas, ``Best friends forever (BFF): Finding lasting dense subgraphs'', Tech. rep., arxiv.org, December 2016.
V. Pacifici and G. Dan, ``Coordinated selfish distributed caching for peering content-centric networks'', Trans. on Networking (TON), vol. 24, no. 6, pp. 3690--3701, December 2016.
M. Chen, M. Xu, Q. Li, and Y. Yang, ``Measurement of large-scale BGP events: Definition, detection, and analysis'', Computer Networks, vol. 110, no. C, pp. 31--45, December 2016.
C. Chen and A. Perrig, ``PHI: Path-hidden lightweight anonymity protocol at network layer'', Proc. on Privacy Enhancing Technologies, vol. 2017, no. 1, pp. 100--117, December 2016.
M.R. Anwar, ``Investigating interdomain routing in the wild'', M.S. thesis, Stony Brook Univ., December 2016.
M. Wuebbeling and M. Meier, ``Improved calculation of AS resilience against IP prefix hijacking'', in IEEE Conf. on Local Computer Networks Workshops (LCN Workshops), November 2016, pp. 121--128.
S. Wassermann and P. Casas, ``Reverse traceroute with DisNETPerf, a distributed Internet paths performance analyzer'', in IEEE Conf. on Local Computer Networks (LCN), November 2016, p. (3 pages).
S. Wassermann, P. Casas, B. Donnet, G. Leduc, and M. Mellia, ``On the analysis of Internet paths with DisNETPerf, a distributed paths performance analyzer'', in IEEE Conf. on Local Computer Networks Workshops (LCN Workshops), November 2016, pp. 72--79.
A. Marder and J.M. Smith, ``MAP-IT: Multipass accurate passive inferences from traceroute'', in Internet Measurement Conf. (IMC), November 2016, pp. 397--411.
C. Liaskos, X. Dimitropoulos, and L. Tassiulas, ``Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach'', IEEE Trans. on Network and Service Management, vol. 0, no. 0, pp. (15 pages), November 2016.
T. Krenc and A. Feldmann, ``BGP prefix delegations: A deep dive'', in Internet Measurement Conf. (IMC), November 2016, pp. 469--475.
J. Klick, S. Lau, M. Wahlisch, and V. Roth, ``Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selection'', in Internet Measurement Conf. (IMC), November 2016, pp. 421--427.
M. Jonker, A. Sperotto, R. van Rijswijk-Deij, R. Sadre, and A. Pras, ``Measuring the adoption of DDoS protection services'', in Internet Measurement Conf. (IMC), November 2016, pp. 279--285.
G. Comarela, E. Terzi, and M. Crovella, ``Detecting unusually-routed ASes: Methods and applications'', in Internet Measurement Conf. (IMC), November 2016, pp. 445--459.
T. Chung, D. Choffnes, and A. Mislove, ``Tunneling for transparency: A large-scale analysis of end-to-end violations in the Internet'', in Internet Measurement Conf. (IMC), November 2016, pp. 199--213.
T. Chung, Y. Liu, D. Choffnes, D. Levin, B.M. Maggs, A. Mislove, and C. Wilson, ``Measuring and applying invalid SSL certificates: The silent majority'', in Internet Measurement Conf. (IMC), November 2016, pp. 527--541.
A. Chatterjee, A. Chakraborty, S. Pal, A. Mukherjee, and M. Naskar, ``Non-autonomous dynamic network model involving growth and decay'', in Intl Conf. on Advanced Networks and Telecommunications Systems, November 2016, p. (6 pages).
P. Bangera, Alternative revenue sources for Internet service providers, Ph.D. thesis, Univ. Carlos III de Madrid, November 2016.
M. Syamkumar, R. Durairajan, and P. Barford, ``Bigfoot: A geo-based visualization methodology for detecting BGP threats'', in IEEE Symp. on Visualization for Cyber Security (VizSec), October 2016, p. (8 pages).
M. Nasr and A. Houmansadr, ``Game of decoys: Optimal decoy routing through game theory'', in Conf. on Computer and Communications Security (SIGSAC), October 2016, pp. 1727--1738.
Z. Liu, H. Jin, Y.C. Hu, and M. Bailey, ``MiddlePolice: Toward enforcing destination-defined policies in the middle of the Internet'', in Conf. on Computer and Communications Security (SIGSAC), October 2016, pp. 1268--1279.
F. Cangialosi, T. Chung, D. Choffnes, D. Levin, B. Maggs, A. Mislove, and C. Wilson, ``Measurement and analysis of private key sharing in the HTTPS ecosystem'', in ACM SIGSAC Conf. on Computer and Communications Security, October 2016, pp. 628--640.
C. Wang, Z. Li, X. Huang, and P. Zhang, ``Inferring the average as path length of the Internet'', in IEEE Conf. on Network Infrastructure and Digital Content (IC-NIDC), September 2016, pp. 391--395.
M.E. Tozal, ``Enumerating single destination, policy-preferred paths in AS-level Internet topology maps'', in IEEE Sarnoff Symp., September 2016, p. (6 pages).
A. Noroozian, M. Korczynski, C.H. Ganan, G. Makita, K. Yoshioka, and M. van Eeten, ``Who gets the boot? Analyzing victimization by DDoS-as-a-Service'', in RAID 2016: Intl Symp. on Research in Attacks, Intrusions, and Defenses, September 2016, vol. 9854 of Lecture Notes in Computer Science (LNCS), pp. 368--389.
L. Liquori and M. Sereno, ``LogNet: Extending Internet with a network aware discovery service'', Tech. rep., Inria-French Inst. for Research in Computer Science, September 2016.
D. Gosain, A. Agarwal, H.B. Acharya, and S. Chakravarty, ``Qi points: placing decoy routers in the internet'', Tech. rep., Indraprastha Inst. of Information Technology Delhi (IIITD), September 2016.
B. Chandrasekaran, Head into the cloud: An analysis of the emerging cloud infrastructure, Ph.D. thesis, Duke Univ., September 2016.
Y. Yang, X. Shi, X. Yin, and Z. Wang, ``The power of prefix hijackings in the Internet hierarchy'', in IEEE Trustcom/BigDataSE/ISPA, August 2016, pp. 228--235.
N.P. Hoang, ``Towards an autonomous system monitor for mitigating correlation attacks in the Tor network'', M.S. thesis, Kyoto Univ., August 2016.
A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira, ``Jumpstarting BGP security with path-end validation'', in ACM SIGCOMM, August 2016, pp. 342--355.
L. Bade, ``Resilience of the Domain Name System: A case study for .nl'', M.S. thesis, Radboud Univ., August 2016.
Y. Wang, J. Bi, K. Zhang, and Y. Wu, ``A framework for fine-grained inter-domain routing diversity via SDN'', in Conf. on Ubiquitous and Future Networks (ICUFN), July 2016, pp. 751--756.
J.S. Varghese and L. Ruan, ``Computing customer cones of peering networks'', in Applied Networking Research Workshop, July 2016, pp. 35--37.
H. Tan, M. Sherr, and W. Zhou, ``Data-plane defenses against routing attacks on Tor'', in Privacy Enhancing Technologies, July 2016, vol. 2016 (4), pp. 276--293.
E. Bergamini, M. Wegner, D. Lukarski, and H. Meyerhenke, ``Estimating current-flow closeness centrality with a multigrid Laplacian solver'', Tech. rep., arxiv.org, July 2016.
A. Barton and M. Wright, ``DeNASA: Destination-naive AS-awareness in anonymous communications'', Proc. on Privacy Enhancing Technologies, vol. 2016, no. 4, pp. 356--372, July 2016.
Y. Zhang, X. Wang, A. Perrig, and Z. Zheng, ``Tumbler: Adaptable link access in the bots-infested Internet'', Computer Networks, vol. 105, pp. 180--193, June 2016.
Y. Wang and K. Zhang, ``Quantifying the flattening of Internet topology'', in Conf. on Future Internet Technologies, June 2016, pp. 113--117.
R. Singh, H. Koo, N. Miramirkhani, Akoglu Miraj~F., and Gill~P. L., ``The politics of routing: Investigating the relationship between AS connectivity and Internet freedom'', Tech. rep., arxiv.org, June 2016.
X. Shao, F. Wang, L. Gao, K. Fujikawa, and H. Harai, ``Distributed encoding for multiple-inherited locators to accommodate billions of objects in the Internet'', in IEEE Conf. on Distributed Computing Systems (ICDCS), June 2016, pp. 751--752.
A. Shah, R. Fontunge, and C. Papadopoulos, ``Towards characterizing international routing detours'', Tech. rep., arxiv.org, June 2016.
M.J. Schuchard, Adversarial degradation of the availability of routing infrastructures and other Internet-scale distributed systems, Ph.D. thesis, Univ. of Minnesota, June 2016.
M. Schuchard and N. Hopper, ``E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentives'', Tech. rep., arxiv.org, June 2016.
P. Kriegel, ``Determining the location of autonomous system relations among top tier Internet Service Providers in the United States'', Tech. rep., Univ. of Oregon, June 2016.
S.A.U. Hasan, The role of topology and contracts in Internet content delivery, Ph.D. thesis, Univ. of Carlos III de Madrid, June 2016.
B. Greunke, ``Distributed emulation in support of large networks'', M.S. thesis, Naval Postgraduate School, June 2016.
D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Yada, T. Mori, and S. Goto, ``DomainProfiler: Discovering domain names abused in future'', in Conf. on Dependable Systems and Networks, June 2016, pp. 491--502.
J.C. Cardona, Inter-domain traffic management in an evolving Internet peering ecosystem, Ph.D. thesis, Univ. Carlos III de Madrid, June 2016.
N. Teneva, P.K. Mudrakarta, and R. Kondor, ``Multiresolution matrix compression'', in Conf. on Artificial Intelligence and Statistics, May 2016, vol. 51 of Proc. Machine Learning Research (PMLR), pp. 1441--1449.
S. Li, H. Duan, Z. Wang, J. Liang, and X. Li, ``An accurate distributed scheme for detection of prefix interception'', Science China Information Sciences, vol. 59, pp. (17 pages), May 2016.
Q. Li, Reducing short flows latency in the Internet, Ph.D. thesis, Univ. of Illinois at Urbana-Champaign, May 2016.
Z. Feng, M. Xu, and Y. Yang, ``Revolutionizing the inter-domain business model by information-centric thinking'', in IEEE Conf. on Communications (ICC), May 2016, p. (6 pages).
D. Eppstein, M.T. Goodrich, J. Lam, N. Mamano, M. Mitzenmacher, and M. Torres, ``Models and algorithms for graph watermarking'', Tech. rep., arxiv.org, May 2016.
A. Baumann and B. Fabian, ``Vulnerability against Internet disruptions - A graph-based perspective'', Lecture Notes in Computer Science, vol. 9578, pp. 120--131, May 2016.
M. Zhao, W. Zhou, A.J.T. Gurney, A. Haeberlen, M. Sherr, and B.T. Loo, ``Private and verifiable interdomain routing decisions'', IEEE/ACM Trans. on Networking (TON), vol. 24, no. 2, pp. 1011--1024, April 2016.
J.S. Varghese and L. Ruan, ``A machine learning approach to edge type inference in Internet AS graphs'', in Computer Comm.s Workshops (INFOCOM WKSHPS), April 2016, p. (6 pages).
M.E. Tozal, ``The Internet: A system of interconnected autonomous systems'', in IEEE Systems Conf. (SysCon), April 2016, p. (8 pages).
Z.D.H. Tan, Network level attacks and defenses against anonymity networks, Ph.D. thesis, Georgetown Univ., April 2016.
D. Revelo, M.A. Ricci, B. Donnet, and J.I. Alvarez-Hamlin, ``Unveiling the MPLS structure on Internet topology'', in Workshop on Traffic Monitoring and Analysis (TMA), April 2016, p. (8 pages).
Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing resilience of inter-domain routing system under regional failures'', KSII Trans. on Internet and Information Systems, vol. 10, no. 4, pp. 1630--1642, April 2016.
Q. Li, Reducing short flows latency in the internet, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, April 2016.
C. Guo and M. Karsten, ``On the feasibility of core-rooted path addressing'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 306--314.
K. Giotis, M. Apostolaki, and V. Maglaris, ``A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 495--501.
Y. Vanaubel, P. Merindol, J.-J. Pansiot, and B. Donnet, ``A brief history of MPLS usage in IPv6'', in Passive and Active Measurement (PAM), March 2016, Lecture Notes in Computer Science.
G. Sukrit, P. Rami, and K. Konstantin, ``Comparative network analysis using KronFit'', in Complex Networks, March 2016, vol. 644 of Studies in Computational Intelligence, pp. 363--375.
G. Nomikos and X. Dimitropoulos, ``traIXroute: Detecting IXPs in traceroute paths'', Lecture Notes in Computer Science (LNCS), vol. 9631, pp. 346--358, March 2016.
M. Niemela, ``Estimating Internet-scale Quality of Service parameters for VoIP'', M.S. thesis, Linkoping Univ., March 2016.
V. Kotronis, R. Kloti, M. Rost, P. Georgopoulos, B. Ager, S. Schmid, and X. Dimitropoulos, ``Stitching inter-domain paths over IXPs'', in Symp. on SDN Research, March 2016, p. (12 pages).
S. Frey, Y. Elkhatib, A. Rashid, K. Follis, J. Vidler, N. Race, and C. Edwards, ``It bends but would it break? Topological analysis of BGP infrastructures in Europe'', in IEEE European Symp. on Security and Privacy (EuroSP), March 2016, pp. 423--438.
J.C. Cardona, S. Vissicchio, P. Lucente, and P. Francois, ``I cant get no satisfaction: Helping autonomous systems identify their unsatisfied interdomain interests'', IEEE Trans. on Network and Service Management, vol. 13, no. 1, pp. 43--57, March 2016.
A. Agache, G. Antichi, F. Eberhardt, L. Eggert, P. Hasselmeyer, O. Hohlfeld, M. Honda, A. Ivanov, M. Kimmerlin, S. Klauck, J. Kommeri, G. Lettieri, S. Oechsner, M. Plauth, C. Raiciu, A. Ripke, P. Sarolahti, L. Schulte, E. Tsolakou, and M. Wojcik, ``Initial design of cloud infrastructure and federation mechanisms'', Tech. rep., SSICLOPS, February 2016.
M. Zhao, Accountability in distributed systems with incomplete information, Ph.D. thesis, Univ. of Pennsylvania, January 2016.
F.F. Machado, ``Analysis of the degree ranking stability in scale-free networks'', M.S. thesis, Federal Univ. of Rio de Janeiro, January 2016.
K. Kleineberg, M. Boguna, M. Serrano, and F. Papadopoulos, ``Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigation'', Tech. rep., arxiv.org, January 2016.
A. Garcia-Robledo, A. Diaz-Perez, and G. Morales-Luna, ``Characterization and coarsening of Autonomous System networks: Measuring and simplifying the Internet'', in Advanced Methods for Complex Network Analysis, N. Meghanathan, Ed., January 2016, pp. 148--179.
W. Eberle and L. Holder, ``Identifying anomalies in graph streams using change detection'', in Workshop on Mining and Learning with Graphs, January 2016, p. (8 pages).
K. Benson, Leveraging Internet background radiation for opportunistic network analysis, Ph.D. thesis, Univ. of California San Diego, January 2016.
S. Wassermann, P. Casas, and B. Donnet, ``Towards DisNETPerf: a distributed Internet paths performance analyzer'', in ACM CoNEXT Student Workshop, December 2015, p. (3 pages).
M. Wang, H. Zhou, and J. Chen, ``OpenISMA: An approach of achieving a scalable OpenFlow network by identifiers separating and mapping'', in Symp. on Parallel Architectures, Algorithms and Programming (PAAP), December 2015, pp. 26--33.
Y. Miyao, ``Network operation system, network operation method and network operation program'', Tech. rep., Nec Corp., December 2015.
S. Li, H. Duan, and X. Li, ``Real-time system for detecting inter-domain routing man-in-the-middle attacks'', J. of Tsinghua Univ., vol. 55, no. 11, pp. 1229--1234, December 2015.
M. Konte, Understanding and defending against internet infrastructures supporting cybecrime operations, Ph.D. thesis, Georgia Inst. of Technology, December 2015.
X. Yin, D. Wu, Z. Wang, X. Shi, and J. Wu, ``DIMR: Disjoint Interdomain Multipath Routing'', Computer Networks, vol. 91, no. C, pp. 356--375, November 2015.
A. Sosnovich, O. Grumberg, and G. Nakibly, ``Analyzing Internet routing security using model checking'', Lecture Notes in Computer Science, vol. 9450, pp. 112--129, November 2015.
A. Shah and C. Papadopoulos, ``Characterizing international BGP detours'', Tech. rep., Colorado State Univ. Technical Report, November 2015.
Y. Miyao, ``Network designing system, network designing method, data transfer path determination method and network designing program'', Tech. rep., Nec Corp., November 2015.
S. Meiling, T.C. Schmidt, and T. Steinbach, ``On performance and robustness of Internet-based smart grid communication: A case study for Germany'', in Conf. on Smart Grid Communications (SmartGridComm), November 2015, pp. 295--300.
A. Johnson, R. Jansen, A.D. Jaggard, J. Feigenbaum, and P. Syverson, ``Avoiding the Man on the Wire: Improving Tors security with trust-aware path selection'', Tech. rep., arxiv.org, November 2015.
T. Hirayama, K. Toyoda, and I. Sasase, ``Fast target link flooding attack detection scheme by analyzing traceroute packets flow'', in Workshop on Information Forensics and Security (WIFS), November 2015, p. (6 pages).
A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira, ``One hop for RPKI, one giant leap for BGP security'', in Workshop on Hot Topics in Networks, November 2015, p. (7 pages).
Z. Chen, J. Bi, Y. Fu, Y. Wang, and A. Xu, ``MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDN'', in Conf. on Network Protocols (ICNP), November 2015, pp. 438--445.
J. Cardona, Inter-domain traffic management in and evolving Internet peering eco-system, Ph.D. thesis, Univ. Carlos III de Madrid, November 2015.
D. Szabo, A. Korosi, J. Biro, and A. Gulyas, ``Deductive way of reasoning about the Internet AS level topology'', Chin. Phys. B, vol. 24, no. 11, October 2015.
M.A.S. Meslmawy, Efficient resources management in a distributed computer system, modeled as a dynamic complex system, Ph.D. thesis, Le Havre Univ., October 2015.
M.A.S. Meslmawy, Efficient resources management in a ditributed computer system, modeled as a dynamic complex system, Ph.D. thesis, Univ. du Havre, October 2015.
S. Li, H. Duan, Z. Wang, and X. Li, ``Route leaks identification by detecting routing loops'', in Conf. on Security and Privacy in Communication Systems (SecureComm), October 2015, vol. 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 313--329.
A. Lareida, G. Petropoulos, V. Burger, M. Seufert, S. Soursos, and B. Stiller, ``Augmenting home routers for socially-aware traffic management'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 347--355.
M. Konte, R. Perdisci, and N. Feamster, ``ASwatch: An AS reputation system to expose bulletproof hosting ASes'', ACM SIGCOMM Computer Communication Review, vol. 45, no. 4, pp. 625--638, October 2015.
X.Y. Hu and J. Gong, ``Multipath inter-domain routing for named data networking'', J. on Communications, vol. 36, no. 10, pp. (13 pages), October 2015.
Z. Feng, M. Xu, Y. Yang, Q. Li, Y. Wang, Q. Li, B. Ohlman, and M. Chen, ``Joint optimization of content replication and traffic engineering in ICN'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 55--63.
B. Fabian, A. Baumann, and J. Lackner, ``Topological analysis of cloud service connectivity'', Computers and Industrial Engineering, vol. 88, pp. 151--165, October 2015.
Y.-C. Chiu, B. Schlinker, A.B. Radhakrishnan, E. Katz-Bassett, and R. Govindan, ``Are we one hop away from a better Internet?'', in Internet Measurement Conf. (IMC), October 2015, pp. 523--529.
C. Chen, D.E. Asoni, D. Barrera, G. Danezis, and A. Perrig, ``HORNET: High-speed onion routing at the network layer'', in Conf. on Computer and Communications Security (CCS), October 2015, pp. 1441--1454.
C. Basescu, R.M. Reischuk, P. Szalachowski, A. Perrig, Y. Zhang, H.-C. Hsiao, A. Kubota, and J. Urakawa, ``SIBRA: Scalable Internet Bandwidth Reservation Architecture'', Tech. rep., arxiv.org, October 2015.
R. Anwar, H. Niaz, D. Choffnes, I. Cunha, P. Gill, and E. Katz-Bassett, ``Investigating interdomain routing policies in the wild'', in Internet Measurement Conf. (IMC), October 2015, pp. 71--77.
N. Ahmed and K. Sarac, ``An experimental study on inter-domain routing dynamics using IP-level path traces'', in Conf. on Local Computer Networks (LCN), October 2015, pp. 510--517.
B. Liu and J. Bi, ``DISCS: A DIStributed Collaboration System for inter-AS spoofing defense'', in Intl Conf. on Parallel Processing (ICPP), September 2015, pp. 160--169.
Z. Sha, Decision-centric foundations for complex systems engineering and design, Ph.D. thesis, Purdue Univ., August 2015.
T. Lee, P. Szalachowski, D. Barrera, A. Perrig, H. Lee, and D. Watrin, ``Bootstrapping real-world deployment of future Internet architectures'', Tech. rep., arxiv.org, August 2015.
B. Kurar and R. Tahboub, ``Internet scale DoS attacks'', Intl J. of Applied Mathematics, Electronics and Computers, vol. 3, no. 2, pp. 83--89, August 2015.
R. Kloti, V. Kotronis, B. Ager, and X. Dimitropoulos, ``Policy-compliant path diversity and bisection bandwidth'', in IEEE Conf. on Computer Communications (INFOCOM), August 2015, p. (9 pages).
E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, ``Eclipse attacks on bitcoins peer-to-peer network'', in Usenix Security Symp., August 2015.
N. Cohen, D. Coudert, and A. Lancin, ``On computing the Gromov hyperbolicity'', J. of Experimental Algorithmics, vol. 20, pp. (18 pages), August 2015.
M. Abu-Ata and F.F. Dragan, ``Metric tree-like structures in real-world networks: an empirical study'', Networks, vol. 67, no. 1, pp. 49--68, August 2015.
J.S. Varghese and L. Ruan, ``A machine learning approach to edge type prediction in Internet AS graphs'', Tech. rep., Iowa State Univ., July 2015.
N.P. Hoang, Y. Asano, and M. Yoshikawa, ``Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable Tor'', in Conf. on Advanced Communication Technology (ICACT), July 2015, pp. 147--154.
C. Gavoille, C. Glacet, N. Hanusse, and D. Ilcinkas, ``Brief announcement: Routing the Internet with very few entries'', in Symp. on Principles of Distributed Computing (PODC), July 2015, pp. 33--35.
E.C. Rye, ``Evaluating the limits of network topology inference via virtualized network emulation'', M.S. thesis, Naval Postgraduate School, June 2015.
S. Matsumoto, R.M. Reischuk, P. Szalachowski, T.H.-J. Kim, and A. Perrig, ``Designing a global authentication infrastructure'', Tech. rep., arxiv.org, June 2015.
N. Kamiyama, ``Analyzing impact of introducing CCN on profit of ISPs'', IEEE Trans. on Network and Service Management, vol. 12, no. 2, pp. 176--187, June 2015.
C. Gavoille, C. Glacet, N. Hanusse, and D. Ilcinkas, ``Routing the Internet with fifteen entries'', in Meeting on Algorithmic Aspects of Telecommunications (ALGOTEL), June 2015, p. (5 pages).
B. Eikema, ``BGP routing security and deployment strategies'', Tech. rep., Univ. of Amsterdam, June 2015.
T.N. Dinh and M.T. Thai, ``Network under joint node and link attacks: Vulnerability assessment methods and analysis'', IEEE/ACM Trans. on Networking (TON), vol. 23, no. 3, pp. 1001--1011, June 2015.
C. Chen, S. Matsumoto, and A. Perrig, ``ECO-DNS: Expected consistency optimization for DNS'', in Intl. Conf. on Distributed Computing Systems (ICDCS), June 2015, pp. 256--267.
N. Tao, X. Chen, and X. Fu, ``AS path inference: From complex network perspective'', in Networking Conf. (IFIP), May 2015, p. (9 pages).
M. Niaz, ``Measuring routing policies on the Internet'', M.S. thesis, Stony Brook Univ., May 2015.
J.Y. Lee and J.C. Oh, ``A node-centric reputation computation algorithm on online social networks'', in Applications of Social Media and Social Network Analysis, May 2015, Lecture Notes in Social Networks, pp. 1--22.
O. Fonseca, E. Fazzion, I. Cunha, P. Las-Casas, D. Guedes, W. Meira, C. Hoepers, K. Steding-Jessen, and M.H.P.C. Chaves, ``A spam traffic cost analysis for network operators'', in Brazilian Symp. on Computer Networks and Distributed Systems (SBRC), May 2015, pp. 41--49.
A. DIgnazio and E. Giovannetti, ``Predicting internet commercial connectivity wars: The impact of trust and operators asymmetry'', Intl J. of Forecasting, vol. 31, pp. 1127--1137, May 2015.
A.D. Jaggard, A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, ``20,000 in league under the sea: Anonymous communication, trust, MLATs, and undersea cables'', Proc. on Privacy Enhancing Technologies, vol. 2015, no. 1, pp. 4--24, April 2015.
E. Rye and J. Rohrer, ``Graph reduction for emulated network experimentation'', Tech. rep., Naval Postgraduate School, March 2015.
R. Fanou, P. Francois, and E. Aben, ``On the diversity of interdomain routing in Africa'', Lecture Notes in Computer Science (LNCS), vol. 8895, pp. 41--54, March 2015.
O. Erunika, K. Kaneko, and F. Taraoka, ``Performance evaluation of host-based mobility management schemes in the Internet'', in Intl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU), March 2015, pp. 173--178.
H. Wang, W. Cui, Y. Xiao, and H. Tong, ``Robust network construction against intentional attacks'', in Conf. on Big Data and Smart Computing (BIGCOMP), February 2015, pp. 279--286.
Y. Nakata, S. Arakawa, and M. Murata, ``A provider and peer selection policy for the future sustainable internet'', Intl J. of Management and Network Economics, vol. 3, no. 3, pp. 238--256, January 2015.
V. Kotronis, Centralizing routing control across domains: Architectural approach and prominent use cases, Ph.D. thesis, ETH Zurich, January 2015.
W. Eberle and L. Holder, ``Scalable anomaly detection in graphs'', Intelligent Data Analysis, vol. 19, no. 1, pp. 57--74, January 2015.
B. Chandrasekaran, M. Bai, M. Schoenfield, A. Berger, N. Caruso, G. Economou, S. Gilliss, B. Maggs, K. Moses, D. Duff, K.C. Ng, E.G. Sirer, R. Weber, and B. Wong, ``Alidade: IP geolocation without active probing'', Tech. rep., Duke Univ., January 2015.
M.O. Ascigil, Design of a scalable path service for the Internet, Ph.D. thesis, Univ. of Kentucky, January 2015.
J.C. Acedo, ``Evolution of the Internet topology from a regional perspective'', M.S. thesis, Univ. of Arizona, January 2015.
M. Palacin, A. Bikfalvi, and M. Oliver, ``Mercury: Revealing hidden interconnections between access ISPs and content providers'', in EUNICE, December 2014, vol. 8846 of Lecture Notes in Computer Science (LNCS), pp. 147--159.
T. Johnson and L. Lazos, ``Network anomaly detection using autonomous system flow aggregates'', in IEEE Global Telecommunications Conf. (GLOBECOM), December 2014, p. (8 pages).
D. Hric, R.K. Darst, and S. Fortunato, ``Community detection in networks: Structural communities versus ground truth'', Phys. Rev. E, vol. 90, December 2014.
N. Ahmed and Sarac Kamil, ``Measuring path divergence in the Internet'', in Conf. on Performance Computing and Communications (IPCCC), December 2014, pp. 1--8.
A.H. Lodhi, The economics of internet peering interconnections, Ph.D. thesis, Georgia Inst. of Technology, November 2014.
M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet: Causes, exploits, and countermeasures'', in Conf. on Computer and Communications Security, November 2014, pp. 321--333.
N. Kamiyama, ``CCN economics: Can ISPs profit by introducing CCN?'', in Conf. on Network and Service Management (CNSM) and Workshop, November 2014, pp. 242--247.
R. Hiran, N. Carlsson, and N. Shahmehri, ``PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based security'', in ACM Workshop on Information Sharing and Collaborative Security, November 2014, pp. 3--12.
H. Yang and S.S. Lam, ``Collaborative verification of forward and reverse reachability in the Internet data plane'', in IEEE Conf. on Network Protocol (ICNP), October 2014, p. (12 pages).
A.C.M. Sousa, ``Scaling the Internet routing system through route aggregation'', M.S. thesis, Tecnico Lisboa, October 2014.
Z. Sha and J. Panchal, ``Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice mode'', in Conf. on Systems, Man, and Cybernetics (SMC), October 2014, p. (7 pages).
G. Retvari, D. Szabo, A. Gulyas, A. Korosi, and J. Tapolcai, ``An information-theoretic approach to routing scalability'', in Workshop on Hot Topics in Networks (HotNets), October 2014, p. (7 pages).
A. Gamperli, V. Kotronis, and X. Dimitropoulos, ``Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework'', SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 369--370, October 2014.
W. Eberle and L. Holder, ``A partitioning approach to scaling anomaly detection in graph streams'', in Intl. Conf. on Big Data, October 2014.
M. Antikainen, T. Aura, and M. Sarela, ``Denial-of-service attacks in bloom-filter-based forwarding'', IEEE/ACM Trans. on Networking (TON), vol. 22, pp. 1463--1476, October 2014.
J.M. Wang, X. Dai, and B. Bensaou, ``Content peering in content centric networks'', in IEEE Conf. on Local Computer Networks, September 2014, pp. 10--18.
X. Wu and J. Griffioen, ``Supporting application-based route selection'', in Conf. on Computer Communication and Networks (ICCCN), August 2014, p. (8 pages).
Y. Nozaki, Tiered based addressing in internetwork routing protocols for the future Internet, Ph.D. thesis, Rochester Inst. of Technology, August 2014.
B. Maggs, ``Mapping the whole Internet'', Tech. rep., Duke Univ., August 2014.
Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing the impact of cascading failures on the interdomain routing system of the Internet'', New Generation Computing, vol. 32, no. 3-4, pp. 237--255, August 2014.
J. Sankey and M. Wright, ``Dovetail: stronger anonymity in next-generation Internet routing'', in Symp. on Privacy Enhancing Technologies (PETS), July 2014, vol. 8555 of Lecture Notes in Computer Science (LNCS), pp. 283--303.
A.D. Jaggard, A. Johnson, P. Syverson, and J. Feigenbaum, ``Representing network trust and using it to improve anonymous communication'', Tech. rep., arxiv.org, June 2014.
H.-C. Hsiao, Toward a highly available future Internet, Ph.D. thesis, Carnegie Mellon Univ., June 2014.
S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, ``How secure are secure interdomain routing protocols?'', Computer Networks, vol. 70, pp. 260--287, June 2014.
J. Gersch, D. Massey, and C. Papadopoulos, ``Incremental deployment strategies for effective detection and prevention of BGP origin hijacks'', in Conf. on Distributed Computing Systems (ICDCS), June 2014, pp. 670--679.
P. Bangera and G. Gorinsky, ``Economics of traffic attraction by transit providers'', in IFIP Networking Conf., June 2014, p. (9 pages).
O. Ascigil, K.L. Calvert, and J.N. Griffioen, ``On the scalability of interdomain path computations'', in Networking Conf. (IFIP), June 2014, pp. 1--9.
P. Amaral, L. Bernardo, and P.F. Pinto, ``Multipath policy routing for the inter-domain scenario'', in Intl Conf. on Communications (ICC), June 2014, pp. 2215--3221.
M. Zhu, Y. Liu, J. Li, and J. Wu, ``CCOF: Congestion control on the fly for inter-domain routing'', in Workshop on Local and Metropolitan Area Networks (LANMAN), May 2014, pp. 1--2.
M. Zhu, J. Li, Y. Liu, D. Li, and J. Wu, ``TED: Inter-domain traffic engineering via deflection'', in Symp. of Quality of Service (IWQoS), May 2014, pp. 117--122.
S. Qazi and T. Moors, ``Disjoint-path selection in Internet: What traceroutes tell us?'', Tech. rep., arxiv.org, May 2014.
M. Li, H. Wang, J. Yang, and C. Li, ``A value based framework for provider selection of regional ISPs'', in Symp. on Network Operations and Management (NOMS), May 2014, pp. 1--8.
M.S. Kang and V.D. Gligor, ``Routing bottlenecks in the Internet - causes, exploits, and countermeasures'', Tech. rep., Carnegie Mellon Univ., May 2014.
A. Borici and A. Thomo, ``Semantic graph compression with hypergraphs'', in Conf. on Advanced Information Networking and Applications (AINA), May 2014, pp. 1097--1104.
M.M. Abu-Ata, Tree-like structure in graphs and embedability to trees, Ph.D. thesis, Kent State Univ., May 2014.
K. Visala, A. Keating, and R.H. Khan, ``Models and tools for the high-level simulation of a name-based interdomain routing architecture'', in Computer Communications Workshops (INFOCOM WKSHPS), April 2014, pp. 55--60.
Z. Sha and J.H. Panchal, ``Estimating local decision-making behavior in complex evolutionary systems'', J. of Mechanical Design, vol. 136, no. 8, pp. (11 pages), April 2014.
S. Sahhaf, W. Tavernier, D. Colle, M. Pickavet, and P. Demeester, ``Availability analysis of resilient geometric routing on Internet topology'', in Conf. on Design of Reliable Communication Networks (DRCN), April 2014, p. (8 pages).
S. Hasan, S. Gorinsky, C. Dovrolis, and R.K. Sitaraman, ``Trade-offs in optimizing the cache deployments of CDNs'', in IEEE Conf. on Computer Communications (INFOCOM), April 2014, p. (9 pages).
K. Chen, D.R. Fhoffnes, R. Potharaju, Y. Chen, F.E. Bustamante, D. Pei, and Y. Zhao, ``Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users'', IEEE Trans. on Computers, vol. 63, no. 4, pp. 1021--1036, April 2014.
R. Mazloum, M.-O. Buob, J. Auge, B. Baynat, D. Ross, and T. Friedman, ``Violation of interdomain routing assumptions'', in Passive and Active Measurement (PAM), March 2014, p. (10 pages).
A. Laszka, B. Johnson, J. Grossklags, and M. Felegyhazi, ``Estimating systematic risk in real-world networks'', in Conf. on Financial Cryptography and Data Security, March 2014, p. (18 pages).
J. Shi and B. Zhang, ``Making inter-domain routing power-aware?'', in Conf. on Computing, Networking and Communications (ICNC), February 2014, pp. 932--938.
A. Houmansadr, E.L. Wong, and V. Shmatikov, ``No direction home: The true cost of routing around decoys'', in Network and Distributed System Security Symp. (NDSS), February 2014, p. (14 pages).
F Tan, J. Wu, Y. Xia, and C.K. Tse, ``Traffic congestion in interconnected complex networks'', Tech. rep., arxiv.org, January 2014.
M. Geva, A. Herzberg, and Y. Gev, ``Bandwidth Distributed Denial of Service: Attacks and defenses'', IEEE Security and Privacy, vol. 12, no. 1, pp. 54--61, January 2014.
S.B. Lee, M.S. Kang, and V.D. Gligor, ``CoDef: Collaborative defense against large-scale link-flooding attacks'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2013, pp. 417--428.
B Eriksson, R. Durairajan, and P. Barford, ``RiskRoute: A framework for mitigating network outage threats'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2013, pp. 405--416.
W. Eberle and L. Holder, ``Incremental anomaly detection in graphs'', in Conf. on Data Mining Workshops, December 2013, pp. 521--528.
A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson, ``Users get routed: Traffic correlation on Tor by realistic adversaries'', in ACM SIGSAC Conf. on Computer and Communications Security (CCS), November 2013, pp. 337--348.
J. Gersch and D. Massey, ``Characterizing vulnerability to IP hijack attempts'', in IEEE Conf. on Technologies for Homeland Security (HST), November 2013, pp. 328--333.
M. Zhao, P. Aditya, A. Chen, Y. Lin, A. Haeberlen, P. Druschel, B. Maggs, B. Wishon, and M. Ponec, ``Peer-assisted content distribution in Akamai NetSession'', in Internet Measurement Conf. (IMC), October 2013, pp. 31--42.
S. Papadopoulos, G. Theodoridis, and D. Tzovaras, ``BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies'', in Visualization for Cyber Security (VizSec), October 2013, pp. 57--64.
E. Karaarslan, A.G. Perez, and C. Siaterlis, ``Recreating a large-scale BGP incident in a realistic environment'', in Information Sciences and Systems 2013, Proc Symp. on Computer and Information Sciences, October 2013, vol. 264 of Lecture Notes in Electrical Engineering, pp. 349--357.
P. Bangera and S. Gorinsky, ``An economic perspective on traffic attraction by Internet transit providers'', in IEEE Conf. on Network Protocols (ICNP), October 2013, p. (2 pages).
K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack'', Tech. rep., Hong Kong Univ. of Science and Technology, September 2013.
E.A. Meirom, S. Mannor, and A. Orda, ``Network formation games and the Internet structure'', Tech. rep., arxiv.org, August 2013.
W. Lian, E. Rescorla, H. Shacham, and S. Savage, ``Measuring the practical impact of DNSSEC deploymen'', in Usenix Security Conf. (SEC), August 2013, pp. 573--588.
J.Y. Lee and J.C. Oh, ``A model for recursive propagations of reputations in social networks'', in IEEE/ACM Conf. on Advances in Social Networks Analysis and Mining (ASONAM), August 2013, pp. 666--670.
Y. Wang, Z. Wang, and L. Zhang, ``An epidemic-dynamics-based model for CXPST spreading in inter-domain routing system'', in Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA), July 2013, vol. 212 of Advances in Intelligent Systems and Computing, pp. 485--493.
A. Nappa, M.Z. Rafique, and J. Caballero1, ``Driving in the cloud: An analysis of drive-by download operations and abuse reporting'', in Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), July 2013, vol. 7967 of Lecture Notes in Computer Science, pp. 1--20.
Y. Liu, W. Peng, J. Su, and Z. Wang, ``Assessing survivability of inter-domain routing system under cascading failures'', in Frontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC), July 2013, vol. 401 of Communications in Computer and Information Science, pp. 97--108.
B. Kaur, K.S. Kahlon, and S. Sharma, ``Inter-domain routing with shielded infrastructure and buzzer technique'', Intl J. of Computer Applications, vol. 74, no. 15, pp. 29--32, July 2013.
V. Pacifici and G. Dan, ``Stable content-peering of autonomous systems in a content-centric network'', in Swedish National Computer Networking Workshop (SNCNW), June 2013, p. (4 pages).
X. Misseri, I. Gojmerac, and J.-L. Rougier, ``IDRD: Enabling inter-domain route diversity'', in IEEE Conf. on Communications (ICC), June 2013, pp. 3536--3541.
F. Lehrieder, Performance evaluation and optimization of content distribution using overlay networks, Ph.D. thesis, Julius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE, June 2013.
J.M Sankey, ``Dovetail: stronger anonymity in next-generation Internet routing'', M.S. thesis, Univ. Texas, Arlington, TX, US, May 2013.
J. Jiang, J. Luo, W. Li, and Y. Lu, ``Constraint conditions to eliminate AS incentive of lying in interdomain routing'', in Symp. on Integrated Network Management (IM), May 2013, pp. 650--656.
H.-C. Hsiao, T.H. Kim, S. Yoo, X. Zhang, S.B. Lee, V. Gligor, and A. Perrig, ``STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapment'', in ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS), May 2013, pp. 415--426.
V. Pacifici and G. Dan, ``Content-peering dynamics of autonomous caches in a content-centric network'', in IEEE INFOCOM, April 2013, pp. 1079--1087.
L. Neudorfer, Y. Shavitt, and N. Zilberman, ``Improving AS relationship inference using PoPs'', in IEEE INFOCOM, April 2013, pp. 3483--3488.
D. Miyamoto, T. Miyachi, Y. Taenaka, and H. Hazeyama, ``PhishCage: reproduction of fraudulent websites in the emulated Internet'', in ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 242--247.
D. Miyamoto and T. Miyachi, ``COSMO - Emulation of Internet traffic (poster abstract)'', in ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 274--276.
T. Miyachi and S. Miwa, ``Design and implementation of XBurner'', in ICST Conf. on Simulation Tools and Techniques (SimuTools), March 2013, pp. 227--234.
P. Marchetta, W. de Donato, and A. Pescape, ``Detecting third-party addresses in traceroute traces with IP timestamp option'', in Passive and Active Measurement (PAM), March 2013, vol. 7799 of Lecture Notes in Computer Science (LNCS), pp. 21--30.
J.M. Camacho, A. Garcia-Martinez, M. Bagnulo, and F. Valera, ``BGP-XM: BGP eXtended multipath for transit Autonomous Systems'', Computer Networks, vol. 57, pp. 954--975, March 2013.
C. Wacek, H. Tan, K. Bauer, and M. Sherr, ``An empirical evaluation of relay selection in Tor'', in Network and Distributed System Security Symp. (NDSS), February 2013, p. (17 pages).
K. Matsuda, G. Hasegawa, S. Kamei, and M. Murata, ``A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurement'', IEICE Trans. on Information and Systems, vol. E96-D, no. 2, pp. 289--302, February 2013.
Y. Liu, W. Peng, and J. Su, ``A study of IP prefix hijacking in cloud computing networks'', Security Comm. Networks, vol. XX, no. X, pp. X, February 2013.
D. Qin, J. Yang, and H. Wang, ``Experimental study on diversity and novelty of interdomain paths'', Chinese J. of Electronics, vol. 22, no. 1, pp. 160--166, January 2013.
M. Palacin, M. Oliver, J. Infante, S. Oechsner, and A. Bikfalvi, ``The impact of content delivery networks on the Internet ecosystem'', J. of Information Policy, vol. 3, pp. 304--330, January 2013.
K.V. Moses, ``Improving IP-based geo-location through Internet topology and geospatial datasets'', M.S. thesis, Duke Univ., Durham, NC, US, January 2013.
A. Mislove, H.S. Koppula, K.P. Gummadi, P. Druschel, and B. Bhattacharjee, ``An empirical validation of growth models for complex networks'', in Dynamics On and Of Complex Networks, January 2013, vol. 2, pp. 19--40.
P. Erola, S. Gomez, and A. Arenas, ``On the routability of the Internet'', in Dynamics On and Of Complex Networks, January 2013, vol. 2, pp. 41--54.
T.N. Dhin, Complex networks under attacks: Vulnerability assessment and optimization, Ph.D. thesis, Florida Univ., January 2013.
W.H. Chong, W.S.B. Toh, and L.N. Teow, ``Efficient extraction of high-Betweenness vertices from heterogeneous networks'', in The Influence of Technology on Social Network Analysis and Mining, Ch. 11, January 2013, vol. 6 of Lecture Notes in Social Networks, pp. 255--273.
X. Vasilakos, K. Katsaros, and G. Xylomenos, ``Cloud computing for global name-resolution in information-centric networks'', in IEEE Symp. on Network Cloud Computing and Applications (NCCA), December 2012, p. (7 pages).
J. Sherry, ``Future architectures for middlebox processing services on the Internet and in the Cloud'', M.S. thesis, UC Berkeley, December 2012.
S. Meyer, M. Wahlisch, and T.C. Schmidt, ``Exploring reachability via settlement-free peering'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2012, p. 49.
H.R. Ekbatani, Investigating the mutual impact of the P2P overlay and the AS-level underlay, Ph.D. thesis, Univ. Oregon, Eugene, OR, US, December 2012.
M. Wachs, C. Grothoff, and R. Thurimella, ``Partitioning the Internet'', in Conf. on Risks and Security of Internet and Systems (CRiSIS), October 2012, p. (8 pages).
M. Schuchard, J. Geddes, C. Thompson, and N. Hopper, ``Routing around decoys'', in ACM Conf. on Computer and Communications Security (CCS), October 2012, pp. 85--96.
T.N. Dinh, Y. Shen, and M.T. Thai, ``An efficient spectral bound for link vulnerability assessment in large-scale networks'', in IEEE Military Communications Conf. (MILCOM), October 2012.
M.Z. Ahmad and R. Guha, ``A tale of nine Internet exchange points: studying path latencies through major regional IXPs'', in IEEE Conf. on Local Computer Networks (LCN), October 2012, p. (8 pages).
M. Li, H. Wang, and J. Yang, ``Flattening and preferential attachment in the Internet evolution'', in Network Operations and Management Symp. (APNOMS), September 2012, p. (8 pages).
J. Juen, ``Protecting anonymity in the presence of autonomous system and internet exchange level adversaries'', M.S. thesis, Univ. Illinois, Urbana-Champaign, September 2012.
N. Cohen, D. Couderty, and A. Lancin, ``Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs'', Tech. rep., Project-Team MASCOTTE, INRIA, September 2012.
V. Burger, F. Lehrieder, T. Hossfeld, and J. Seedorf, ``Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms'', in Teletraffic Congress (ITC), September 2012, pp. 1--8.
J. Rajahalma, Inter-domain incentives and Internet architecture, Ph.D. thesis, Aalto Univ., FI, August 2012.
G.K. Orman, V. Labatut, and H. Cherifi, ``Comparative evaluation of community detection algorithms: a topological approach'', J. Stat. Mechanics: Theory and Experiment, vol. 2012, pp. P08001, August 2012.
M. Gjoka, M. Kurant, and A. Markopoulou, ``2.5K-graphs: from sampling to generation'', Tech. rep., arxiv.org, August 2012.
A. Beben, J.M. Batalla, W.K. Chai, and J. Sliwinski, ``Multi-criteria decision algorithms for efficient content delivery in content networks'', Ann. Telecommunications, p. (13 pages), August 2012.
B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger, ``Anatomy of a large European IXP'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2012, pp. 163--174.
J. Sherry, D. Kim, S. Mahalingam, A. Tang, S. Wang, and S. Ratnasamy, ``Netcalls: End host function calls to network traffic processing services'', Tech. rep., UC Berkeley, July 2012.
K. Fujikawa, H. Tazaki, and H. Harai, ``Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network'', in Symp. on Applications and the Internet (SAINT), July 2012, pp. 68--73.
M.Z. Ahmad and R. Guha, ``Evaluating end-user network benefits of peering with path latencies'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2012, pp. 1--7.
J. Tomasik and M.-A. Weisser, ``The inter-domain hierarchy in measured and randomly generated AS-level topologies'', in IEEE Conf. on Communications (ICC), June 2012, pp. 1448--1453.
J.L. Sobrinho and T. Tiago~Quelhas, ``A theory for the connectivity discovered by routing protocols'', IEEE/ACM Trans. on Networking (TON), vol. 20, no. 3, pp. 677--689, June 2012.
A. Keating, ``Models for the simulation of a name-based interdomain routing architecture'', M.S. thesis, Aalto Univ., FI, June 2012.
H.-C. Hsiao, T. Kim, S. Yoo, X. Zhang, S.B. Lee, V.D. Gligor, and A. Perrig, ``Sanctuary trail: refuge from Internet DDoS entrapment'', Tech. rep., Carnegie Mellon Univ., June 2012.
W. Deng, W. Muhlbauer, Y. Yang, P. Zhu, X. Lu, and B. Plattner, ``Shedding light on the use of AS relationships for path inference'', J. Communications and Networks, vol. 14, no. 3, pp. 336--345, June 2012.
J. Cesareo, ``Optimizing implicit proxy placement to evade traffic filters'', M.S. thesis, Princeton Univ., June 2012.
J. Cesareo, J. Karlin, M. Schapira, and J. Rexford, ``Optimizing the placement of implicit proxies'', Tech. rep., Princeton Univ., June 2012.
M.E. Tozal and K. Sarac, ``Estimating network layer subnet characteristics via statistical sampling'', in IFIP TC 6 Networking Conf., May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 274--288.
J. Seibert, Security and economic implications of localizing traffic in overlay networks, Ph.D. thesis, Purdue Univ., May 2012.
D. Saucez and B. Donnet, ``On the dynamics of locators in LISP'', in Networking 2012, May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 385--396.
H. Papadakis, P. Fragopoulou, E. Markatos, and M. Roussopoulos, ``ITA: Innocuous topology awareness for unstructured P2P networks'', IEEE Trans. on Parallel and Distributed Systems, vol. PP, no. 99, May 2012.
Y. Nozaki, H. Tuncer, and N. Shenoy, ``ISP tiered model based architecture for routing scalability'', in IEEE Conf. on Communications (ICC), May 2012, pp. 5817--5821.
Y. Liu, J. Su, and R.K.C. Chang, ``LDC: Detecting BGP prefix hijacking by load distribution change'', in Parallel and Distributed Processing Symp. Workshops (IPDPSW), May 2012, pp. 1197--1203.
S. Hasan and S. Gorinsky, ``Obscure giants: detecting the provider-free ASes'', in Networking 2012, May 2012, vol. 7290 of Lecture Notes in Computer Science, pp. 149--160.
A. Chaudhury, P. Basuchowdhuri, and S. Majumder, ``Spread of information in a social network using influential nodes'', in Advances in Knowledge Discovery and Data Mining, May 2012, vol. 7302 of Lecture Notes in Computer Science, pp. 121--132.
W.K. Chai, D. He, I. Psaras, and G. Pavlou, ``Cache less for more in information-centric networks'', in Networking 2012, May 2012, vol. 7289 of Lecture Notes in Computer Science, pp. 27--40.
R. Pasquini, F.L. Verdi, and M.F. Magalhaes, ``Towards local routing state in the future internet'', in WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC), April 2012.
H. Liu, X. Hu, D. Zhao, and X. Lu, ``Failure isolation based defense against Internet CXPST-like attack'', J. Hybrid Information Technology, vol. 5, no. 2, pp. 175--180, April 2012.
S.D. Strowes and C. Perkins, ``Harnessing Internet topological stability in Thorup-Zwick compact routing'', in IEEE INFOCOM, March 2012, pp. 2551--2555.
J.L. Sobrinho and F. Le, ``A fresh look at inter-domain route aggregation'', in IEEE INFOCOM, March 2012, pp. 2556--2560.
B. Ribeiro, P. Basu, and D. Towsley, ``Multiple random walks to uncover short paths in power law networks'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), March 2012, pp. 250--255.
D. Qin, J. Yang, Z. Liu, H. Wang, B. Zhang, and W. Zhang, ``AMIR: Another multipath interdomain routing'', in IEEE Conf. on Advanced Information Networking and Applications (AINA), March 2012, pp. 581--588.
A. Lutu, M. Bagnulo, and R. Stanojevic, ``An economic side-effect for prefix deaggregation'', in IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), March 2012, pp. 190--195.
M. Grey, M. Rossberg, and G. Schaefer, ``Automatic creation of VPN backup paths for improved resilience against BGP-attackers'', in ACM Symp. on Applied Computing (SAC), March 2012, pp. 613--620.
D. Qin, J. Yang, H. Wang, B. Zhang, L. Gao, and Z. Liu, ``Multipath interdomain routing via deviation from primary path'', in Conf. on Information Networking (ICOIN), February 2012, pp. 222--227.
B. Edwards, S. Hofmeyr, G. Stelle, and S. Forrest, ``Internet topology over time'', Tech. rep., arxiv.org, February 2012.
W. Wei, X. Yingjie, and D. Yabo, ``ASTVA: DDoS-limiting architecture for Next Generation Internet'', Adv. Materials Research, vol. 542-543, pp. 1275--1281, January 2012.
Y. Chen, E. Le~Merrer, Z. Li, Y. Yaning~Liu, and G. Simon, ``OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV'', Computer Networks, vol. 56, no. 1, pp. 365--377, January 2012.
A.A. Drivere, ``Can we study the topology of the Internet from the vantage points of large and small content providers?'', M.S. thesis, Youngstown State Univ., December 2011.
J. Sommers, B. Erikson, and P. Barford, ``On the prevalence and characteristics of MPLS deployments in the open Internet'', in Internet Measurement Conf. (IMC), November 2011, pp. 445--458.
Y. Liu, W. Peng, and J. Su, ``Study on IP prefix hijacking in cloud computing networks based on attack planning'', in Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), November 2011, pp. 922--926.
M. Chen, L. Yu, and H. Bai, ``Two propositions about geographical distributions of BitTorrent file resources'', in Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE). November 2011, vol. 110 of Advances in Intelligent and Soft Computing, pp. 361--368, Springer.
Y. Takahashi and K. Ishibashi, ``Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic'', in Conf. on Network Games, Control and Optimization (NetGCooP), October 2011, p. (6 pages).
M. Kurant and A. Markopoulou, ``Towards unbiased BFS sampling'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1799--1809, October 2011.
M. Gjoka, M. Kurant, C.T. Butts, and A. Markopoulou, ``Practical recommendations on crawling online social networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 9, pp. 1872--1892, October 2011.
B.-F. Zhang, Y. Li, Y.-J. Liu, and J.-S. Su, ``Analysis of prefix hijacking based on AS hierarchical model'', in Conf. on Network and System Security (NSS), September 2011, pp. 322--326.
A. Szekeres, ``Multi-path inter-domain routing: The impact on BGPs scalability, stability and resilience to link failures'', M.S. thesis, Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam, August 2011.
J.I. Alvarez-Hamelin, D. Anunziata, M.G. Beiro, A. Barrat, L. DallAsta, and A. Vespignani, ``http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool)'', Tech. rep., Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires, July 2011.
E.L. Wong and V. Shmatikov, ``Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing'', in Conf. on Dependable Systems and Networks (DSN), June 2011, pp. 233--244.
S.D. Strowes, G. Mooney, and C. Perkins, ``Compact routing on the Internet AS-graph'', in IEEE Conf. on Computer Communications (INFOCOM), June 2011, pp. 852--857.
Y. Liu, B. Dai, P. Zhu, and J. Su, ``Whom to convince? It really matters in BGP prefix hijacking attack and defense'', in Future Information Technology, June 2011, vol. 184 (1) of Communications in Computer and Information Science, pp. 1--10.
H.T. Karaoglu, M. Yuksel, and M.H. Gunes, ``On the scalability of path exploration using opportunistic path-vector routing'', in IEEE Conf. on Communications (ICC), June 2011, p. (5 pages).
M. Helminger, ``Interactive visualization of global routing dynamics'', Tech. rep., Technische Univ. Muenchen, Faculty of Informatics, June 2011.
P. Amaral, E. Silva, L. Bernardo, and P. Pinto, ``Inter-domain traffic engineering using an AS-level multipath routing architecture'', in IEEE Conf. on Communications (ICC), June 2011, p. (6 pages).
H. Siritana, S. Kitisin, and S. Gertphol, ``A study of autonomous system relationships within Thailand'', in Conf. on Computer Science and Software Engineering (JCSSE), May 2011, pp. 7--11.
O. Akashi, ``Analysis of cooperative management strategies against route-hijacking'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2011, pp. 1164--1171.
J. Scholz and M. Greiner, ``Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics'', EPL (Europhysics Letters), vol. 94, no. 2, pp. 28008, April 2011.
W. Deng, M. Karaliopoulos, W. Muehlbauer, P. Zhu, X. Lu, and B. Plattner, ``k-Fault tolerance of the Internet AS graph'', Computer Networks, vol. 55, no. 10, pp. 2492--2503, April 2011.
W. Deng, P. Zhu, N. Xiong, Y. Xiao, and H. Xiaofeng, ``How resilient are individual ASes against AS-level link failures?'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 982--987.
H. Wu and G. Kvizhinadze, ``Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies'', Statistics and Probability Letters, vol. 81, no. 8, pp. 1128--1135, March 2011.
S. Melnik, A. Hackett, M.A. Porter, P.J. Mucha, and J.P. Gleeson, ``The unreasonable effectiveness of tree-based theory for networks with clustering'', Phys. Rev. E, vol. 83, March 2011.
J. Tomasik and M.-A. Weisser, ``Internet topology on as-level: Model, generation methods and tool'', in IEEE Performance Computing and Communications Conf. (IPCC), January 2011, pp. 263--270.
P. Bangera and S. Gorinsky, ``Impact of prefix hijacking on payments of providers'', in Conf. on Communication Systems and Networks (COMSNETS), January 2011, p. (10 pages).
L. Yujing, Z. Bofeng, W. Fei, and S. Jinshu, ``Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system'', J. of Next Generation Information Technology, vol. 1, no. 3, pp. 96--105, November 2010.
A.H. Rasti, N. Magharei, R. Rejaie, and W. Willinger, ``Eyeball ASes: from geography to connectivity'', in Internet Measurement Conf. (IMC), November 2010, pp. 192--198.
D. Huang, J. Zhao, and X. Wang, ``Trading bandwidth for playback lag: Can active peers help?'', in Multi-media Conf., October 2010, pp. 791--794.
S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, ``How secure are secure interdomain routing protocols?'', ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 87--98, October 2010.
H. Asai and H. Esaki, ``Towards interdomain transit traffic reduction in peer-assisted content delivery networks'', in Symp. on Telecommunications Network Strategy and Planning (NETWORKS), September 2010.
H. Asai and H. Esaki, ``Estimating AS relationships for application-layer traffic optimization'', in Workshop on Incentives, Overlays, and Economic Traffic Control (ETM), September 2010, vol. 6236 of Lecture Notes in Computer Science (LNCS), pp. 51--63.
S. Hanif, ``Impact of topology on BGP convergence'', M.S. thesis, Dept. Computer Science, VU Univ. Amsterdam, August 2010.
T. Guo, N. Wang, R. Tafazolli, and K. Moessner, ``Policy-aware virtual relay placement for inter-domain path diversity'', in IEEE Symp. on Computers and Communications (ISCC), August 2010, pp. 38--43.
W.H. Chong, W.S.B. Toh, and L.N. Teow, ``Efficient extraction of high-betweenness vertices'', in Conf. on Advances in Social Networks Analysis and Mining (ASONAM), August 2010, pp. 286--290.
E. Elena, J. Rougier, and S. Secci, ``Characterisation of AS-level path deviations and multipath in Internet routing'', in EURO-NF Conf. on Next Generation Internet (NGI), July 2010, pp. 1--7.
A. Vilhar, R. Novak, and G. Kandus, ``The impact of network topology on the performance of MAP selection algorithms'', Computer Networks, vol. 54, no. 7, pp. 1197--1209, May 2010.
S. Tarkoma and M. Antikainen, ``Canopy: publish/subscribe with upgraph combination'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, pp. 1--6.
J. Rajahalme, ``Incentive-informed inter-domain multicast'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 6 pp.
C. Hu, K. Chen, Y. Chen, and B. Liu, ``Evaluating potential routing diversity for internet failure recovery'', in IEEE Conf. on Computer Communications (INFOCOM), May 2010, p. 5 pp.
B-L Dou, X-G Wang, and S-Y Zhang, ``Robustness of networks against cascading failures'', Physica A: Statistical Mechanics and its Applications, vol. 389, no. 11, pp. 2310--2317, May 2010.
Q. Xuan, F. Du, and T-J Wu, ``Partially ordered sets in complex networks'', J. Phys. A: Math. Theor., vol. 43, pp. 185001 (13 pp), April 2010.
J.-J. Pansiot, P. Merindol, B. Donnet, and O. Bonaventura, ``Extracting intra-domain topology from mrinfo probing'', in Passive and Active Measurement (PAM), A. Krishnamurthy and B. Plattner, Eds. April 2010, vol. 6032 of Lecture Notes in Computer Science (LNCS), pp. 81--90, Springer.
S. DiBenedetto, A. Stone, M. Strout, and D. Massey, ``Simulating internet scale topologies with metarouting'', Tech. rep., Colorado State Univ., March 2010.
K. Chen, C. Hu, W. Zhang, Y. Chen, and B. Liu, ``On the eyeshots of BGP vantage points'', in IEEE Global Telecommunications Conf. (GLOBECOM), March 2010, p. 6 pp.
P. Amaral, F. Ganhao, C. Assuncao, L. Bernardo, and P. Pinto, ``Scalable multi-region routing at inter-domain level'', in IEEE Global Telecommunications Conf. (GLOBECOM), March 2010, p. 8 pp.
L. Yujing, Z. Bofeng, W. Fei, and S. Jinshu, ``A study of hinge-transmit property of BGP routing system'', in Forum on Computer Science-Technology and Applications (IFCSTA), January 2010, vol. 1, pp. 462--465.
S.D. Strowes and C. Perkins, ``Deterministic, reduced-visibility inter-domain forwarding'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2009, pp. 9--10.
J. Rajahalme, M. Sarela, K. Visala, and J. Riihijarvi, ``Inter-domain rendezvous service architecture'', Tech. rep., PSIRP (TR09-003), December 2009.
K. Miller and T. Eliassi-Rad, ``Continuous time group discovery in dynamic graphs'', in Workshop on Analyzing Networks and Learning with Graphs (NIPS), December 2009.
K. Chen, D.R. Choffnes, R. Potharaju, Y. Chen, F.E. Bustamante, D. Pei, and Y. Zhao, ``Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2009.
P. Merindol, V. Van~den Schrieck, B. Donnet, O. Bonaventure, and J.-J. Pansiot, ``Quantifying ASes multiconnectivity using multicast information'', in Internet Measurement Conf. (IMC), November 2009, pp. 370--376.
A. Studer and A. Perrig, ``The coremelt attack'', in Symp. on Research in Computer Security (ESORICS), September 2009, vol. 5789 of Lecture Notes in Computer Science (LNCS), pp. 37--52.
W. Shu and C. Changjia, ``Backup routing for BGP: Virtual ring routing scheme'', in IEEE Conf. on Computer Science and Information Technology (ICCSIT), September 2009, pp. 603--607.
I. Avramopoulos and M. Suchara, ``Protecting DNS from routing attacks: a comparison of two alternative anycast implementations'', IEEE Security and Privacy, vol. 7, no. 5, pp. 14--20, September 2009.
S. Miwa, M. Suzuki, H. Hazeyama, S. Uda, T. Miyachi, Y. Kadobayashi, and Y. Shinoda, ``Experiences in emulating 10K AS topology with massive VM multiplexing'', in ACM workshop on Virtualized infrastructure systems and architectures, August 2009, pp. 97--104.
Y. Guoqiang and D. Wenhua, ``An efficient algorithm for AS path inferring'', in Conf. on Hybrid Information Technology, August 2009, vol. 321, pp. 151--154.
L. Cittadini, M. Rimondini, M. Corea, and G. Di~Battista, ``On the feasibility of static analysis for BGP convergence'', in IFIP/IEEE Symp. on Integrated Network Management (IM), August 2009, pp. 521--528.
H. Asai and H. Esaki, ``AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs'', in Asia Future Internet summer school, Jeju, Korea, August 2009.
P. Amaral, L. Bernardo, and P. Pinto, ``DTIA: An Architecture for Inter-Domain Routing'', in IEEE Conf. on Communications (ICC), August 2009, pp. 1--7.
Q.D. Bui and A. Jennings, ``Relay node selection in large-scale VoIP overlay networks'', in Conf. on Ubiquitous and Future Networks (ICUFN), July 2009, pp. 56--61.
Y. Xu and W. Zhang, ``A power-law approach on router-level internet macroscopic topology modeling'', in Fuzzy Information and Engineering, Volume 2, B. Cao, T.-F. Li, and C.-Y. Zhang, Eds., June 2009, vol. 62 of Advances in Soft Computing (ASC), pp. 1471--1479.
Y. Shavitt, E. Shir, and U. Weinsberg, ``Near-deterministic inference of AS relationships'', in Conf. on Telecommunications (ConTEL), June 2009, pp. 191--198.
H. Asai and H. Esaki, ``A methodology for magnitude-based inter-AS distance estimation'', in WIT2009, Hokkaido, Japan, June 2009.
A. DIgnazio and E. Giovannetti, ``Asymmetry and discrimination in Internet peering: evidence from the LINX'', J. Industrial Organization, vol. 27, no. 3, pp. 441--448, May 2009.
A. Di~Menna, T. Refice, L. Cittadini, and G. Di~Battista, ``Measuring route diversity in the internet from remote vantage points'', in IEEE Conf. on Networking (ICN), May 2009, pp. 24--29.
U. Weinsberg, Y. Shavitt, and E. Shir, ``Near-deterministic inference of AS relationships'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009, pp. 1--2.
B. Liu, Y. Cui, Y. Lu, and Y. Xue, ``Locality-awareness in BitTorrent-like P2P applications'', IEEE Trans. on Multimedia, vol. 11, no. 3, pp. 361--371, April 2009.
G. Hasegawa, Y. Hiraoka, and M. Murata, ``Evaluation of free-riding traffic problem in overlay routing and its mitigation method'', in Conf. on Networking and Services (ICNS), April 2009, pp. 210--215.
A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel, ``NetReview: detecting when interdomain routing goes wrong'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI). April 2009, pp. 437--452, Usenix Ass. Berkeley, CA, US.
W. Eberle, L. Holder, and D. Cook, ``Identifying threats using graph-based anomaly detection'', in Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4, J.J.P Tsai and P.S. Yu, Eds. April 2009, pp. 73--108, Springer.
G. Zhang, ``Measuring the impacts of sampling bias on internet AS-level topology inference'', in WRI Conf. on Communications and Mobile Computing (CMC), March 2009, pp. 181--188.
C. Lumezanu, R. Baden, N. Spring, and B. Bhattacharjee, ``Triangle inequality and routing policy violations in the internet'', in Passive and Active Measurement (PAM), March 2009, vol. 5448 of Lecture Notes in Computer Science (LNCS), pp. 45--54.
J. Leskovec, K.J. Lang, A. Dasgupta, and M.W. Mahoney, ``Large-scale community structure in social and information networks'', Tech. rep., Carnegie Mellon Univ., March 2009.
R. Puzis, D. Yagil, Y. Elovici, and D. Braha, ``Collaborative attack on internet users anonymity'', Internet Research, vol. 19, no. 1, pp. 60--77, January 2009.
L Dai, Y. Cao, Y. Cui, and Y. Xue, ``On scalability of proximity-aware peer-to-peer streaming'', Computer Communications, vol. 32, no. 1, pp. 144--153, January 2009.
U. Kang, C. Tsourakakis, A.P. Appel, C. Faloutsos, and J. Leskovec, ``HADI: Fast diameter estimation and mining in massive graphs with Hadoop'', Tech. rep., Carnegie Mellon Univ., December 2008.
Y. Hei, A. Nakao, T. Hasegawa, T. Ogishi, and S. Yamamoto, ``AS alliance: cooperatively improving resilience of intra-alliance communication'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2008, p. (6 pages).
M.A. Serrano and P. De~Los~Rios, ``Structural efficiency of percolated landscapes in flow networks'', Plos One, vol. 3, no. 11, November 2008.
B.D. MacArthur, R.J. Sanchez-Garcia, and J.W. Anderson, ``Symmetry in complex networks'', Discrete Applied Mathematics, vol. 156, no. 18, pp. 3525--3531, November 2008.
A. Vilhar and R. Novak, ``Policy relationship annotations of predefined AS-level topologies'', Computer Networks, vol. 52, no. 15, pp. 2859--2871, October 2008.
M. Wojciechowski, ``Border Gateway modeling and simulation'', M.S. thesis, Dep. Computer Science, VU Univ. Amsterdam, September 2008.
V. Raghavan, G. Riley, and T. Jaafar, ``Realistic topology modeling for the internet BGP infrastructure'', in IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2008, pp. 1--8.
H. Hazeyama, M. Suzuki, S. Miwa, D. Miyamoto, and Y. Kadobayashi, ``Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures'', in Conf. on Cyber Security Experimentation and Test, July 2008.
G.J. Katz and J.T. Kider, ``All-pairs shortest-paths for large graphs on the GPU'', in ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware, June 2008, pp. 47--55.
L. Li and C. Chen, ``Exploring possible strategies for competitions between Autonomous Systems'', in IEEE Conf. on Communications (ICC), May 2008, pp. 5919--5923.
J.P. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, and A. Venkataramani, ``Consensus routing: the internet as a distributed system'', in Usenix Symp. on Networked Systems Design and Implementation (NSDI), April 2008, pp. 351--364.
Y. Xiao, B.D. MacArthur, H. Wang, M. Xiong, and W. Wang, ``Network quotients: structural skeletons of complex systems'', Phys. Rev. E, vol. 78, pp. 046102 (7 pages), January 2008.
S. Qazi and T. Moors, ``Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2007, pp. 2602--2606.
W. Muehlbauer, S. Uhlig, B. Fu, M. Meulle, and O. Maennel, ``In search for an appropriate granularity to model routing policies'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, October 2007, vol. 37 (4), pp. 145--156.
H. Ballani, P. Francis, and X. Zhang, ``A study of prefix hijacking and interception in the internet'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, October 2007, vol. 37 (4).
J. Wu, Y. Zhang, Z.M. Mao, and K.G. Shin, ``Internet routing resilience to failures: analysis and implications'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), January 2007, p. 25.
C. Huang, J. Li, and K.W. Ross, ``Can internet video-on-demand be profitable?'', in ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications, January 2007, pp. 133--144.
J.G. Restrepo, E. Ott, and B.R. Hunt, ``Characterizing the dynamical importance of network nodes and links'', Phys. Rev. Lett., vol. 97, pp. 094102 (4 pages), September 2006.
A. DIgnazio and E. Giovannetti, ``Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach'', J. Competition Law and Economics, vol. 2, no. 1, pp. 43--69, February 2006.
Topology with Skitter
Bahador Yeganeh, Ramakrishnan Durairajan, Reza Rejale, and Walter Willinger, ``A First Comparative Characterization of Multi-cloud Connectivity in Today Internet'', in Passive and Active Measurement, March 2020, Passive and Active Measurement, p. (17 pages).
L. Basheir, ``Power-law degree distribution consistency in the AS-level Internet topology'', in Intl Conf. on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), November 2018, p. (5 pages).
S. Sigloch, Mobile Internet connectivity, exploring structural bottlenecks in Tamil Nadu using active Internet periphery measurements, Ph.D. thesis, Anglia Ruskin University, October 2018.
K. Qiu, Y. Zhu, J. Yuan, J. Zhao, X. Wang, and T. Wolf, ``ParaPLL: Fast parallel shortest-path distance query on large-scale weighted graphs'', in Intl Conf. on Parallel Processing, August 2018, p. (10 pages).
V. Murugesan, M. Shalini, and M.H. Yang, ``Design and analysis of hybrid single packet IP traceback scheme'', IET Networks, vol. 7, no. 3, pp. 141--151, May 2018.
A. Rezvanian, A.~M. Saghiri, S.~M. Vahidipour, M. Esnaashari, and M.~R. Meybodi, ``Learning Automata for Cognitive Peer-to-Peer Networks'', Recent Advances in Learning Automata, p. (58 pages), January 2018.
V. Murugesan, M.~S. Selvaraj, and M.~H. Yang, ``HPSIPT: A high-precision single-packet IP traceback scheme'', Computer Networks, vol. 143, pp. (14 pages), January 2018.
V. Murugesan and M. Selvaraj, ``UDP based IP Traceback for Flooding DDoS Attack'', The International Arab Journal of Information Technology, p. (9 pages), January 2018.
S. Malliga, C.~S. Kanimozhiselvi, and S.~V. Kogilavani, ``A Logarithmic and Exponentiation Based IP Traceback Scheme with Zero Logging and Storage Overhead'', International Journal on Future Revolution in Computer Science and Communication Engineering, vol. 4, pp. (8 pages)", January 2018.
J. Cai, J.~Z. Luo, Y. Liu, W. Wei, and F. Lei, ``A network community restructuring mechanism for transport efficiency improvement in scale-free complex networks'', Concurrency and Computation Practice and Experience, vol. 30, pp. (11 pages), January 2018.
H. Alrasheed, ``On the Eccentricity Function in Graphs'', in Intl Workshop on Complex Networks, January 2018, p. (11 pages).
J.S. Gilmore and H.A. Engelbrecht, ``Pithos: Distributed storage for nassive nulti-user virtual environments'', ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM), vol. 13, no. 3, pp. (33 pages), July 2017.
D. Eppstein, M.T. Goodrich, M. Mitzenmacher, and M.R. Torres, ``2-3 Cuckoo filters for faster triangle listing and set intersection'', in ACM SIGMOD-SIGACT-SIGAI Symp. on Principles of Database Systems, May 2017, pp. 247--260.
J.N. Luo and M.H. Yang, ``Improved single packet traceback scheme with Bloom filters'', in Intl Conf. on Internet of Things as a Service, January 2017, p. (7 pages).
H. An, H. Lee, and A. Perrig, ``Coordination of anti-spoofing mechanisms in partial deployments'', J. of Communications and Networks, vol. 18, no. 6, pp. 948--961, December 2016.
Q. Xu, X. Zhang, J. Zhao, X. Wang, and T. Wolf, ``Fast shortest-path queries on large-scale graphs'', in International Conference on Network Protocols, November 2016, vol. 24, p. (10 pages).
V.A. Foroushani, A security framework based on flow marking IP-traceback techniques, Ph.D. thesis, Dalhousie Univ., Halifax, CA, July 2016.
Y. Wang and K. Zhang, ``Quantifying the flattening of Internet topology'', in Conf. on Future Internet Technologies, June 2016, pp. 113--117.
D. Eppstein, M.T. Goodrich, J. Lam, N. Mamano, M. Mitzenmacher, and M. Torres, ``Models and algorithms for graph watermarking'', Tech. rep., arxiv.org, May 2016.
O. Bhardwaj, E. Anschelevich, and K. Kar, ``Coalitionally stable pricing schemes for inter-domain forwarding'', Computer Networks, vol. 97, pp. 128--146, April 2016.
V. Aghaei-Foroushani and A.N. Zincir-Heywood, ``Autonomous system based flow marking scheme for IP-Traceback'', in IEEE/IFIP Network Operations and Management Symp. (NOMS), April 2016, pp. 121--128.
S. Malliga, C. Selvi, and S. Kogilavani, ``Low storage and traceback overhear IP traceback system'', J. of Information Science and Engineering, vol. 32, pp. 27--45, January 2016.
J. Chen, V.S.A. Kumar, M.V. Marathe, R. Sundaram, M. Thakur, and S. Thulasidasan, ``A study of the structure and vulnerabilities of metropolitan area networks'', in Intl. Conf. on Communication Systems and Networks (COMSNETS), January 2016.
K. Kloster and D.F. Gleich, ``Seeded PageRank solution paths'', Tech. rep., arxiv.org, December 2015.
G. Francois and O. Festor, ``Anomaly traceback using software defined networking'', in Intl. Workshop on Information Forensics and Security (WIFS), December 2015, pp. 203--208.
C.L. Staudt, A. Sazonovs, and H. Meyerhenke, ``NetworKit: A tool suite for large-scale complex network analysis'', Tech. rep., arxiv.org, November 2015.
S. Saha, Efficient methods on reducing data redundancy in the Internet, Ph.D. thesis, Aalto Univ., FI, October 2015.
T.T. Huang and B.Q. Sun, ``The impact of the Internet on global industry: New evidence of Internet measurement'', Research in Intl Business and Finance, vol. 37, pp. 93--112, September 2015.
M. Abu-Ata and F.F. Dragan, ``Metric tree-like structures in real-world networks: an empirical study'', Networks, vol. 67, no. 1, pp. 49--68, August 2015.
D. Li and W. Sha, ``Dynamic ring for seamless mobility in identity centric networks'', in Computers and Communication (ISCC), July 2015, pp. 930--935.
A. Pares~Palacin, ``Random graphs and applications'', Tech. rep., Univ. of Barcelona, June 2015.
M.H. Yang, ``Storage-efficient 16-bit hybrid IP traceback with single packet'', The Scientific World J., vol. 2014, October 2014.
M.H. Yang, M.C. Yang, J.-N. Luo, and W.C. Hsu, ``High accuracy and low storage hybrid IP traceback'', in Conf. on Computer, Information and Telecommunication Systems (CITS), July 2014, p. (5 pages).
A.G. Medrano-Chavez, E. Perez-Cortes, and M. Lopez-Guerrero, ``A performance comparison of Chord and Kademlia DHTs in high churn scenarios'', Peer-to-Peer Networking and Applications, vol. 8, pp. 807--821, June 2014.
H.-C. Hsiao, Toward a highly available future Internet, Ph.D. thesis, Carnegie Mellon Univ., June 2014.
J. Zhang, Statistical inference on network data, Ph.D. thesis, Univ. Illinois, Urbana-Champaign, May 2014.
M. Li, H. Wang, J. Yang, and C. Li, ``A value based framework for provider selection of regional ISPs'', in Symp. on Network Operations and Management (NOMS), May 2014, pp. 1--8.
D. Arora, A. Verigin, T. Godkin, and S.W. Neville, ``Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnets'', in Conf. on Advanced Information Networking and Applications (AINA), May 2014, p. (8 pages).
M.S. Fallah and N. Kahani, ``TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks'', Security and Communication Networks, vol. 7, no. 2, pp. 245--264, February 2014.
D. Dundjerski and M. Tomasevic, ``Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols'', Concurrency Computation: Practice and Experience, vol. XX, no. X, pp. X, February 2014.
A. Freno, M. Keller, and M. Tommasi, ``Probability estimation over large-scale random networks via the Fiedler delta statistic'', J. of Machine Learning Research, vol. XX, no. X, pp. X, December 2013.
D. Seo, H. Lee, and A. Perrig, ``APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks'', Computers and Security, vol. 39, no. Part B, pp. 366--385, November 2013.
V.M. Preciado and A. Jadbabaie, ``Moment-based spectral analysis of large-scale networks using local structural information'', IEEE/ACM Trans. on Networking (TON), vol. 21, no. 2, pp. 373--382, April 2013.
T. Godkin, ``Statistical assessment of peer-to-peer botnet features'', M.S. thesis, Univ. of Victoria, Victoria, CA, April 2013.
A.W. Fu, H. Wu, J. Cheng, and R.C. Wong, ``IS-Label: an independent-set based labeling scheme for point-to-point distance querying'', VLDB Endowment, vol. 6, no. 6, pp. 457--468, April 2013.
I. Nikolaevskiy, A. Lukyanenko, T. Polishchuk, V. Polishchuk, and A. Gurtov, ``isBF: scalable in-packet Bloom filter based multicast'', in ACM Symp. on Applied Computing (SAC), March 2013, pp. 646--648.
Y. Chen, V. Kawadia, and R. Urgaonkar, ``Detecting overlapping temporal community structure in time-evolving networks'', Tech. rep., arxiv.org, March 2013.
M. Tang, G. Zhang, T. Lin, and J. Liu, ``HDLBR: A name-independent compact routing scheme for power-law networks'', Computer Communications, vol. 36, no. 3, pp. 351--359, February 2013.
Y. Wang, J. Bi, and J. Wu, ``Revisiting the rich club of the Internet AS-level topology'', IEICE Trans. on Communications, vol. E96-B, no. 3, pp. 900--904, January 2013.
C. Ni and G. Jin, ``CTFPi: A new method for packet filtering of firewall'', in Conf. on Information Technology and Software Engineering, Ch. 48, January 2013, vol. 210 of Lecture Notes in Electrical Engineering, pp. 465--475.
T. Karasawa, M. Soshi, and A. Miyaji, ``A novel hybrid IP traceback scheme with packet counters'', in Conf. on Internet and Distributed Computing Systems (IDCS). November 2012, vol. 7646 of Lecture Notes in Computer Science, pp. 71--84, Springer.
B. Parno, Z. Zhou, and A. Perrig, ``Using trustworthy host-based information in the network'', in Workshop on Scalable trusted computing (STC), October 2012, pp. 33--44.
V.M. Preciado, M. Draief, and A. Jadbabaie, ``Structural analysis of viral spreading processes in social and communication networks using egonets'', Tech. rep., arxiv.org, September 2012.
A.V. Goltsev, S.N. Dorogovtsev, J.G. Oliveira, and J.F.F. Mendes, ``Localization and spreading of diseases in complex networks'', Phys. Rev. Lett., vol. 109, pp. 128702, September 2012.
D. Fay, H. Haddadi, A.W. Moore, R. Mortier, A.G. Thomason, and S. Uhlig, ``Weighted spectral distribution: A metric for structural analysis of networks'', in Statistical and Machine Learning Approaches for Network Analysis, Ch. 6, June 2012, p. (38 pages).
M.-H. Yang and M.-C. Yang, ``RIHT: A novel hybrid IP traceback scheme'', IEEE Trans. on Information Forensics and Security, vol. 7, no. 2, pp. 789--797, April 2012.
K. Wehmuth and A. Ziviani, ``Distributed assessment of the closeness centrality ranking in complex networks'', in Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX), April 2012, pp. 43--48.
Y. Wang, S. Su, Y. Yang, and J. Ren, ``A more efficient hybrid approach for single-packet IP traceback'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2012, pp. 275--282.
A. Mukaddam and I. ELHajj, ``Hop count variability'', in Conf. for Internet Technology and Secured Transactions (ICITST), December 2011, pp. 240--244.
K. Wehmuth and A. Ziviani, ``Distributed location of the critical nodes to network robustness based on spectral analysis'', in Latin American Network Operations and Management Symp. (LANOMS), October 2011, p. (8 pages).
P. Marchetta, P. Merindol, B. Donnet, A. Pescape, and J.-J. Pansiot, ``Topology discovery at the router level: a new hybrid tool targeting ISP networks'', IEEE J. Selected Areas in Communications, vol. 29, no. 6, pp. 1776--1787, October 2011.
C. Bell, ``Examining change in Internet topology in terms of external events, April 2001 - April 2002'', M.S. thesis, Univ. Nebraska at Omaha, August 2011.
O. Akashi, ``Analysis of cooperative management strategies against route-hijacking'', in IFIP/IEEE Symp. on Integrated Network Management (IM), May 2011, pp. 1164--1171.
J. Scholz and M. Greiner, ``Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics'', EPL (Europhysics Letters), vol. 94, no. 2, pp. 28008, April 2011.
M. Youssef, R. Kooij, and C. Scoglio, ``Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics'', J. Computational Science, vol. 61, pp. (13 pages), March 2011.
S. Melnik, A. Hackett, M.A. Porter, P.J. Mucha, and J.P. Gleeson, ``The unreasonable effectiveness of tree-based theory for networks with clustering'', Phys. Rev. E, vol. 83, March 2011.
J.I. Alvarez-Hamelin, M.G. Beiro, and J.R. Busch, ``Understanding edge connectivity in the Internet through core decomposition'', Internet Mathematics, vol. 7, no. 1, pp. 45--66, March 2011.
J. Song, H. Zhao, B. Yang, and H. Sun, ``AS-level Internet macroscopic topology centralization evolvement analysis'', J. Software Engineering and Applications, vol. 3, pp. 901--905, October 2010.
F. de Montgolfier, M. Soto, and L. Viennot, ``Autour du caractere arborescent dInternet'', in MajecSTIC 2010, October 2010, p. (8 pages).
M.Z. Ahmad and R. Guha, ``Impact of Internet exchange points on Internet topology evolution'', in Conf. on Local Computer Networks (LCN), October 2010, pp. 332--335.
Y. Xu and Z. Wang, ``On an IBA topology model for internet topology structure'', in Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), June 2010, vol. 2, pp. 114--117.
G. Yan, S. Eidenbenz, S. Thulasidasan, P. Datta, and V. Ramaswamy, ``Criticality analysis of Internet infrastructure'', Computer Networks, vol. 54, pp. 1169--1182, May 2010.
I. Scholtes, J. Botev, M. Esch, A. Hohfeld, H. Schloss, and B. Zech, ``TopGen - internet router-level topology generation based on technology constraints'', in Conf. on Simulation Tools and Techniques for Communications, Networks and Systems, May 2010, p. (10 pages).
D. Fay, H. Haddadi, A. Thomason, A.W. Moore, R. Mortier, A. Jamakovic, S. Uhlig, and M. Rio, ``Weighted spectral distribution for Internet topology analysis: Theory and applications'', IEEE/ACM Trans. on Networking, vol. 18, no. 1, pp. 164--176, February 2010.
B. Augustin, B. Krishnamurthy, and W. Willinger, ``IXPs: mapped?'', in Internet Measurement Conf. (IMC), November 2009, pp. 336--349.
G. Jin, F. Zhang, Y. Li, H. Zhang, and J. Qian, ``A hash-based path identification scheme for DDoS attacks defense'', in Conf. on Computer and Information Technology, October 2009, pp. 219--224.
H. Haddadi, D. Fay, S. Uhlig, A. Moore, A. Jamakovic, and R. Mortier, ``Analysis of the Internets structural evolution'', Tech. rep., Univ. of Cambridge, September 2009.
H. Haddadi, D. Fay, A. Jamakovic, O. Maennel, A. Moore, R. Mortier, and S. Uhlig, ``On the importance of local connectivity for Internet topology models'', in Intl Teletraffic Congress, September 2009, p. (8 pages).
M.S. Andreou, Message traceback systems. Dancing with the devil, Ph.D. thesis, Univ. Newcastle upon Tyne, September 2009.
T. Erlebach, L.S. Moonen, F.C.R. Spieksma, and D. Vukadinovic, ``Connectivity measures for internet topologies on the level of autonomous systems'', Operations Research, vol. 57, no. 4, pp. 1006--1025, July 2009.
A. Korn, A. Schubert, and A. Telcs, ``Lobby index in networks'', Physica A: Statistical Mechanics and its Applications, vol. 388, no. 11, pp. 2221--2226, June 2009.
Y. Xu and H. Zhao, ``An improved BA model for router-level internet macroscopic topology'', IAENG J. Computer Science, vol. 36, no. 2, pp. 122--128, May 2009.
H.V. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, ``iPlane Nano: path prediction for peer-to-peer applications'', in USENIX Symp. on Networked Systems Design and Implementation (NSDI), April 2009, pp. 137--152.
J. Leskovec, K.J. Lang, A. Dasgupta, and M.W. Mahoney, ``Large-scale community structure in social and information networks'', Tech. rep., Carnegie Mellon Univ., March 2009.
M.H. Gunes and K. Sarac, ``Analyzing router responsiveness to active measurement probes'', in Passive and Active Measurement (PAM), March 2009, vol. 5448 of Lecture Notes in Computer Science (LNCS), pp. 23--32.
A. Durresi, V. Paruchuri, and L. Barolli, ``Fast autonomous system traceback'', J. Network and Computer Applications, vol. 32, no. 2, pp. 448--454,, March 2009.
B. Xiao, L. Liu, X. Guo, and K. Xu, ``Modeling the IPv6 internet AS-level topology'', Physica A: Statistical Mechanics and its Applications, vol. 388, no. 4, pp. 529--540, February 2009.
S. Kaune, K. Pussep, C. Leng, A. Kovacevic, G. Tyson, and R. Steinmetz, ``Modelling the internet delay space based on geographical locations'', in Conf. on Parallel, Distributed and Network-based Processing, February 2009, pp. 301--310.
M. Sung, J. Xu, J. Li, and L. Li, ``Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation'', IEEE/ACM Trans. on Networking (TON), vol. 16, no. 6, pp. 1253--1266, December 2008.
Z. Qu, C. Huang, and N. Liu, ``A novel two-step traceback scheme for DDoS attacks'', in Intl. Symp. on Intelligent Information Technology Application, December 2008, pp. 879--883.
V. Paruchuri, A. Durresi, and S. Chellappan, ``TTL based Packet Marking for IP traceback'', in Global Telecommunications Conf., December 2008, p. (5 pages).
L. Liu and K. Xu, ``Time series of Internet AS-level topology graphs: four patterns and one model'', Tech. rep., arxiv.org, December 2008.
M.G. Beiro, J.I. Alvarez-Hamelin, and J.R. Busch, ``A low complexity visualization tool that helps to perform complex systems analysis'', New J. Physics, vol. 10, no. 12, pp. 125003, December 2008.
G. Jin, Y. Li, H. Zhang, and J. Qian, ``A Pi2HC mechanism against DDoS attacks'', in Conf. on Communications and Networking in China, November 2008, p. (5 pages).
C. Li, H. Zhao, X. Zhang, and L. Wang, ``Correctness of sampling bias on Internet router-level topology'', in Conf. on Wireless Communications, Networking and Mobile Computing, October 2008, p. (4 pages).
X. Bi, W. Tan, and R. Xiao, ``A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems'', in Symp. on Computer and Computational Sciences (IMSCSS), October 2008, pp. 132--135.
W. Wei, Y. Dong, D. Lu, and G. Jin, ``Optimal control of DDoS defense with multi-resource max-min fairness'', in Conf. on Cybernetics and Intelligent Systems, September 2008, pp. 1285--1293.
M. Andreou and A. Moorsel, ``COTraSE: Connection Oriented Traceback in Switched Ethernet'', in Conf. on Information Assurance and Security, September 2008, pp. 198--204.
N. Kahani, S. Shiry, and M. Bagherzadeh, ``Detecting Denial of Service attacks utilizing machine learning methods'', in Conf. on the Applications of Digital Information and Web Technologies, August 2008, p. (7 pages).
M. Dramburg, ``Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien'', M.S. thesis, Hochschule fuer Angewandte Wissenschaften Hamburg, Germany, August 2008.
X. Zhang, H. Zhao, L. Wang, and C. Li, ``On the Internet AS-level topology evolution basing on hierarchy characteristic'', in Chinese Control and Decision Conf., July 2008, p. (6 pages).
J. Zhang, H. Zhao, and Y. Zhou, ``The study on characteristics of the coreness of router-level internet nodes'', in Chinese Control and Decision Conf. (CCDC), July 2008, pp. 4803--4808.
H. Haddadi, D. Fay, A. Jamakovic, O. Maennel, A. Moore, R. Mortier, M. Rio, and S. Uhlig, ``Beyond node degree: Evaluating AS topology models'', Tech. rep., arxiv.org, July 2008.
M. Muthuprasanna and G. Manimaran, ``Distributed divide-and-conquer techniques for effective DDoS attack defenses'', in Conf. on Distributed Computing Systems, June 2008, p. (10 pages).
A. Jamakovic and S. Uhlig, ``On the relationships between topological measures in real-world networks'', Networks and Heterogeneous Media, vol. 3, no. 2, pp. 349--355, June 2008.
H. Haddadi, D. Fay, S. Uhlig, A. Moore, R. Mortier, A. Jamakovic, and M. Rio, ``Tuning topology generators using spectral distributions'', in Intl Performance Evaluation Workshop (SPEC), June 2008, vol. 5119 of Lecture Notes in Computer Science (LNCS), pp. 154--173.
M. Latapy and C. Magnien, ``Complex network measurements: estimating the relevance of observed properties'', in IEEE Conf. on Computer Communications (INFOCOM), April 2008, pp. 1660--1668.
P. Fraigniaud, E. Febhar, and F. Viennot, ``The inframetric model for the internet'', in IEEE Conf. on Computer Communications (INFOCOM), April 2008, pp. 1085--1093.
R. Kooij, A. Jamakovic, F. Van~Kesteren, T. De~Koning, I. Theisler, and P. Veldhoven, ``Het Nederlands elftal als complex netwerk'', Tech. rep., Delft Univ., March 2008.
L. Cheng, N. Hutchinson, and M. Ito, ``RealNet: A topology generator based on real Internet topology'', in Conf. on Advanced Information Networking and Applications Workshops (AINA), March 2008, pp. 526--532.
M. Wahlisch, T.C. Schmidt, and W. Spalt, ``What is happening from behind?: Making the impact of internet topology visible'', Campus-Wide Information Systems, vol. 25, no. 5, pp. 392--406, January 2008.
S. Amr, M. El-Beltagy, and M. Helmy, ``Analyzing Internet connectivity data using modified k-shell analysis'', in Intl Conf. on Informatics and Systems (INFOS), January 2008, pp. 40--45.
A. Flaxman and J. Vera, ``Bias reduction in traceroute sampling - Towards a more accurate map of the Internet'', in Algorithms and Models for the Web-Graph, December 2007, vol. 4863 of Lecture Notes in Computer Science (LNCS), pp. 1--15.
M. Abdelhafez, Modeling and simulations of worms and mitigation techniques, Ph.D. thesis, Georgia Inst. of Technology, December 2007.
V. Paruchuri, A. Durresi, and R. Jain, ``On the (in)effectiveness of probabilistic marking for IP traceback under DDoS attacks'', in Global Telecommunications Conf., November 2007, pp. 1965--1970.
O Akashi, K. Fukuda, T. Hirotsu, and T. Sugawara, ``Analysis of diagnostic capability for hijacked route problem'', in Intl Workshop on IP Operations and Management, October 2007, vol. 4786 of Lecture Notes in Computer Science (LCNS), pp. 37--48.
R. Oliveira, B. Zhang, and L. Zhang, ``Observing the evolution of internet as topology'', in Conf. on Applications, technologies, architectures, and protocols for computer communications, August 2007, vol. 37 (4) of ACM SIGCOMM Computer Communication Review, pp. 313--324.
R. Bush, J. Hiebert, O. Maennel, M. Roughan, and S. Uhlig, ``Testing the reachability of (new) address space'', in SIGCOMM workshop on Internet network management, August 2007, pp. 236--241.
A. Jackson, W. Milliken, C. Santivanez, M. Condell, and T. Strayer, ``A topological analysis of monitor placement'', in Int. Symp. on Network Computing and Applications (NCA), July 2007, p. (11 pages).
B. Choi, S. Moon, R. Cruz, Z. Zhang, and C. Diot, ``Quantile sampling for practical delay monitoring in Internet backbone networks'', Computer Networks, vol. 51, no. 10, pp. 2701--2716, July 2007.
J. Leguay, M. Latapy, T. Friedman, and K. Salamatiana, ``Describing and simulating internet routes'', Computer Networks, vol. 51, no. 8, pp. 2067--2085, June 2007.
F. Viger, A. Barrat, L. Dallasta, C. Zhang, and E. Kolaczyk, ``What is the real size of a sampled network? The case of the Internet'', Physical Review, vol. 75, no. 5, pp. (10 pages), May 2007.
M. Sung, J. Chiang, and J. Xu, ``Scalable hash-based IP traceback using rate-limited Probabilistic Packet Marking'', Tech. rep., Georgia Inst. of Technology, May 2007.
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation'', Tech. rep., UC Riverside, May 2007.
D. Ha and H. Ngo, ``On the trade-off between the expected number of infected nodes and expected propagation time of malcodes'', Tech. rep., State Univ. of New York at Buffalo, May 2007.
S. Zhou and G.-Q. Zhang, ``Chinese Internet AS-level topology'', IET Communications, vol. 1, no. 2, pp. 209--214, April 2007.
T.C. Schmidt, M. Wahlisch, and Y. Zhang, ``On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing'', in IEEE Conf. on Networking (ICN), April 2007, pp. 94--94.
G. Kunzmann, R. Nagel, T. Hossfeld, A. Binzenhofer, and K. Eger, ``Efficient simulation of large-scale P2P networks: modeling network transmission times'', in EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP), February 2007, pp. 475--481.
Z. Gao and N. Ansari, ``A practical and robust inter-domain marking scheme for IP traceback'', Computer Networks, vol. 51, no. 3, pp. 732--750, February 2007.
P. Mahadevan, Mechanisms for generating realistic annotated Internet topologies, Ph.D. thesis, Univ. of California, San Diego, January 2007.
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, ``Network monitoring using traffic dispersion graphs (TDGs)'', in Internet Measurement Conf. (IMC), January 2007, pp. 315--320.
K. Khanmohammadi and M. Fallah, ``Distributed packet filtering based on IP traceback'', Tech. rep., Cairo Univ., December 2006.
B. Donnet, P. Raoult, T. Friedman, and M. Crovella, ``Deployment of an algorithm for large-scale topology discovery'', IEEE J. Selected Areas in Communications, vol. 24, no. 12, pp. 2210--2220, December 2006.
B. Donnet, B. Bayant, and T. Friedman, ``Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives'', in ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT), December 2006, p. 13.
Z. Li, Y. Xiang, and D. He, ``Simulation and analysis of DDoS in Active Defense Environment'', in Conf. on Computational and Information Science, November 2006, vol. 4456 of Lecture Notes in Computer Science book series (LNCS), pp. 878--886.
Z. Li and Y. Xiang, ``Mathematical analysis of active DDoS defense systems'', in Conf. on Computational Intelligence and Security, November 2006, pp. 1563--1566.
J.-L. Guillaume, M. Latapy, and D. Magoni, ``Relevance of massively distributed explorations of the internet topology: qualitative results'', Computer Networks, vol. 50, no. 16, pp. 3197--3224, November 2006.
A. Yaar, A. Perrig, and D. Song, ``StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense'', IEEE J. Selected Areas in Communications, vol. 24, no. 10, pp. 1853--1863, October 2006.
M. Latapy and C. Magnien, ``Measuring fundamental properties of real-world complex networks'', Tech. rep., arxiv.org, September 2006.
H. Farhat, ``Protecting TCP services from denial of service attacks'', in SIGCOMM workshop on Large-Scale Attack Defense (LSAD), September 2006, pp. 155--160.
L. Zhang and Y. Guan, ``TOPO: a topology-aware single packet attack traceback scheme'', in Securecomm and Workshops, August 2006, pp. 1--10.
S. Zhou, ``Characterising and modelling the internet topology - The rich-club phenomenon and the PFP model'', BT Technology J., vol. 24, no. 3, pp. 108--115, July 2006.
B. Donnet and T. Friedman, ``Topology discovery using an address prefix based stopping rule'', in UNICE 2005: Networks and Applications Towards a Ubiquitously Connected World. June 2006, vol. 196 of IFIP Federation for Information Processing, pp. 119--130, Springer.
L. Dallasta, Dynamical phenomena on complex networks, Ph.D. thesis, Univ. Paris Sud, June 2006.
B. Donnet, P. Raoult, and T. Friedman, ``Efficient route tracing from a single source'', Tech. rep., arxiv.org, May 2006.
S. Srinivasan and E. Zegura, ``RouteSeer: Topological placement of nodes in service overlays'', Tech. rep., Georgia Inst. of Technology, April 2006.
S. Jin and A. Bestavros, ``Small-world characteristics of internet topologies and implications on multicast scaling'', Computer Networks, vol. 50, no. 5, pp. 648--666, April 2006.
A. Dhamdhere and C. Dovrolis, ``ISP and egress path selection for multihomed networks'', in Conf. on Computer Communications, April 2006, p. (12 pages).
P. Yan and M. Lee, ``Towards an adaptive packet marking scheme for IP traceback'', in e-Business and Telecommunication Networks, January 2006, pp. 141--148.
Y. He, G. Siganos, M. Faloutsos, and S. Krishnamurthy, ``Putting the links together: Measurements and impact'', Tech. rep., Univ. of California Riverside, January 2006.
G. Chen, Z. Fan, and X. Li, ``Modelling the complex Internet topology'', in Complex Dynamics in Communication Networks, January 2006, vol. 5 of Understanding Complex Systems (UCS), pp. 213--234.
U. Tariq, M. Hong, and K. Lhee, ``PMS an expeditious marking scheme to combat with the DDoS attack'', in Pakistan Section Multitopic Conf., December 2005, p. (4 pages).
T. Erlebach, L.S. Moonen, F. Spieksma, and D. Vukadinovic, ``Connectivity measures for internet topologies'', Tech. rep., K.U. Leuven, December 2005.
Y. Xiang and W. Zhou, ``Mark-aided distributed filtering by using neural network for DDoS defense'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2005, p. (5 pages).
M. Janic and P. Van~Mieghem, ``On properties of multicast routing trees'', J. Communication Systems, vol. 19, no. 1, pp. 95--114, November 2005.
T. Hossfeld, A. Binzenhoefer, D. Schlosser, K. Eger, J. Oberender, I. Dedinski, and G. Kunzmann, ``Towards efficient simulation of large scale P2P networks'', Tech. rep., Univ. of Wuerzburg, October 2005.
R. Chen and J.-M. Park, ``Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources'', in IEEE Conf. on Computer Communications and Networks (ICCCN), October 2005, pp. 275--280.
M.S. Kim, Building and maintaining overlay networks for bandwidth-demanding applications, Ph.D. thesis, Univ. of Texas at Austin, August 2005.
O.A. Martins, ``Affecting IP traceback with recent Internet topology maps'', M.S. thesis, Iowa State Univ., June 2005.
B. Donnet, P. Raoult, T. Friedman, and M. Crovella, ``Efficient algorithms for large-scale topology discovery'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2005, pp. 327--338.
B. Donnet and T. Friedman, ``A CIDR stopping rule for topology discovery'', in Algotel, May 2005.
B. Andreopoulos, A. Aijun, and X. Wang, ``Multi-layer increasing coherence clustering of Autonomous Systems with MULICsoft'', Tech. rep., York Univ., April 2005.
A. Yaar, A. Perrig, and D. Song, ``FIT: Fast Internet Traceback'', in IEEE Conf. on Computer Communications (INFOCOM), March 2005, vol. 2 of IEEE INFOCOM 2005, pp. 1395--1406.
B. Donnet, T. Friedman, and M. Crovella, ``Improved algorithms for network topology discovery'', in Passive and Active Measurement (PAM), March 2005, vol. 3431 of Lecture Notes in Computer Science (LNCS), pp. 149--162.
C. Panse, Visualizing geo-related data using cartograms, Ph.D. thesis, Univ. of Konstanz, February 2005.
B. Yip, S. Goyette, and C. Madden, ``Visualising Internet traffic data with three-dimensional spherical display'', in Asia-Pacific Symp. on Information visualisation (APVis), January 2005, vol. 45, pp. 153--158.
Y. Xiang and W. Zhou, ``Safeguard information infrastructure against DDos attacks: Experiments and modeling'', in Intl Conf. on Cryptology and Network Security, January 2005, vol. 3810 of Lecture Notes in Computer Science, pp. 320--333.
G. Lee, H. Lim, M. Hong, and D. Lee, ``A dynamic path identification mechanism to defend against DDoS attacks'', in Intl Conf. on Information Networking (ICOIN), January 2005, vol. 3391 of Lecture Notes in Computer Science (LNCS), pp. 806--813.
C. Prince and D. Wyatt, ``Confidence-weighted marginal utility analyses for improved internet mapping'', Tech. rep., Univ. Washington, CSE Dept., December 2004.
R. Dube, ``Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking'', M.S. thesis, Texas A and M Univ., December 2004.
X. Wang and M. Reiter, ``Mitigating bandwidth-exhaustion attacks using congestion puzzles'', in ACM Conf. on Computer and Communications Security (CCS), October 2004, pp. 257--267.
D. Veitch, S. Babu, and A. Pasztor, ``Robust synchronization of software clocks across the Internet'', in Internet Measurement Conf. (IMC), October 2004, pp. 219--232.
A. Yaar, A. Perrig, and D. Song, ``SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacks'', in IEEE Symp. on Security and Privacy, May 2004, pp. 130--143.
L. Tang and M. Crovella, ``Geometric exploration of the landmark selection problem'', in Passive and Active Measurement (PAM), May 2004, vol. 3015 of Lecture Notes in Computer Science (LNCS), pp. 63--72.
S. Kim, M. Hong, and D. Kim, ``A study on marking bit size for path identification method: Deploying the Pi filter at the end host'', in Conf. on Computational Science and Its Applications, May 2004, vol. 3046 of Lecture Notes in Computer Science (LNCS), pp. 611--616.
M. Collins and M. Reiter, ``An empirical analysis of target-resident DoS filters'', in IEEE Symp. on Security and Privacy, May 2004, p. (12 pages).
K. Xu, Z. Duan, Z.-L. Zhang, and J. Chandrashekar, ``On properties of Internet Exchange Points and their impact on AS topology and relationship'', in IFIP-TC6 Networking Conf. (NETWORKING), April 2004, vol. 3042 of Lecture Notes in Computer Science (LNCS), pp. 284--295.
J. Leguay, ``An analysis on the Internet topology'', M.S. thesis, Linkoping Univ., March 2004.
L. Amini, A. Shaikh, and H. Schulzrinne, ``Effective peering for multi-provider content delivery services'', in Conf. of the IEEE Computer and Communications Societies (INFOCOM), March 2004, pp. 850--861.
S. Zhou and R.J. Mondragon, ``Redundancy and robustness of AS-level Internet topology and its models'', Electronics Letters, vol. 40, no. 2, pp. 151--152, February 2004.
S. Kettner, C. Madden, and R. Ziegler, ``Direct rotational interaction with a spherical projection'', Tech. rep., TUM, Muenchen, January 2004.
L. Tang and M. Crovella, ``Virtual landmarks for the internet'', in Internet Measurement Conf. (IMC), October 2003, pp. 143--152.
S. Jin and A. Bestavros, ``Small-world characteristics of the Internet and multicast scaling'', in Intl Symp. on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS), October 2003, p. (9 pages).
M. Sung and J. Xu, ``IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks'', IEEE Trans. on Parallel and Distributed Systems, vol. 14, no. 9, pp. 861--872, September 2003.
A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, ``On the geographic location of internet resources'', J. on Selected Areas in Communications, vol. 21, no. 6, pp. 934--947, August 2003.
K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica, ``The impact of DHT routing geometry on resilience and proximity'', in ACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications, August 2003, pp. 381--394.
S. Zhou and R. Mondragon, ``Analyzing and modelling the AS-level Internet topology'', Tech. rep., arxiv.org, June 2003.
T. Teixeira, K. Marzullo, S. Savage, and G.M. Voelker, ``Characterizing and measuring path diversity of internet topologies'', in ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2003, vol. 31 (1) of ACM SIGMETRICS Performance Evaluation Review, pp. 304--305.
A. Yaar, A. Perrig, and D. Song, ``Pi: a path identification mechanism to defend against DDoS attacks'', in IEEE Symp. on Security and Privacy, May 2003, pp. 93--107.
M. Fayed, P. Krapivsky, J.W. Byers, M. Crovella, D. Finkel, and S. Redner, ``On the emergence of highly variable distributions in the autonomous system topology'', ACM SIGCOMM Computer Communication Review, vol. 33, no. 2, pp. 41--49, April 2003.
R. Mahajan, D. Wetherall, and T. Anderson, ``Understanding BGP misconfiguration'', in Proc. SIGCOMM Conf., October 2002, vol. 32 (4) of Computer Communication Review, pp. 3--16.
UCSD Network Telescope
Deepak Prashar and Sudan Jha, ``A novel approach for Spam Email Filtering Using Machine Learning'', Journal of Cybersecurity and Information Management (JCIM), vol. 2, pp. 44--57, May 2020.
S. Torabi, E. Bou-Harb, C. Assi, and M. Debbabi, ``A scalable platform for investigating exploited IoT devices and fingerprinting unsolicited activities'', Forensic Sci. Int.: Digital Investigation, vol. 32, no. suppl, April 2020.
M.S. Pour, A. Mangino, K. Friday, M. Rathbun, E. Bou-Harb, F. Iqbal, S. Samtani, J. Crichigno, and N. Ghani, ``On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild'', Computers and Security, vol. 91, April 2020.
A. Mangino, M.S. Pour, and E. Bou-Harb, ``Internet-scale insecurity of consumer Internet of Things: An empirical measurements perspective'', in ACM Transactions on Management Information Systems (TMIS), April 2020, vol. 0 of Trans. on Management Information Systems (TMIS), pp. 1--1.
S. Torabi, E. Bou-Harb, C. Assi, E. Karbab, A. Boukhtouta, and M. Debbabi, ``Inferring and investigating IoT-generated scanning campaigns targeting a large Network Telescope'', Trans. on Dependable and Secure Computing, vol. 0, pp. 1--16, March 2020.
M.S. Pour, A. Mangino, K. Friday, M. Rathbun, E. Bou-Harb, F. Iqbal, K. Shaban, and A. Erradi, ``Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild'', in Intl Conf. on Availability, Reliability and Security, August 2019, pp. 1--10.
R. Niranjana, V. Kumar, and Shina Sheen, ``Darknet Traffic Analysis and Classification Using Numerical AGM and Mean Shift Clustering Algorithm'', SN Computer Science, vol. 1, pp. (10 pages), August 2019.
N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, ``Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations'', Comm. Surveys and Tutorials, vol. 21, no. 3, pp. 2702--2733, April 2019.
L. Zhou, K. Sood, and Y. Xiang, ``ERM: An Accurate Approach to Detect DDoS Attacks using Entropy Rate Measurement'', IEEE Communications Letters, p. (4 pages), January 2019.
K.~M. Prasad, V.~S. Siva, K. Kishore, and M. Sreenivasulu, ``DITFEC: Drift Identification in Traffic-Flow Streams for DDoS Attack Defense Through Ensemble Classifier'', Computing and Network Sustainability, vol. 75, pp. (8 pages), January 2019.
M.~S. Pour, E. Bou-Harb, K. Varma, N. Neshenko, D.~A. Pados, and K.~K.~R. Choo, ``Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns'', Digital Investigation, vol. 28, pp. (9 pages), January 2019.
J. Jiang, S. Wen, B. Liu, S. Yu, Y. Xiang, and W. Zhou, ``Malicious Attack Propagation and Source Identification'', Advances in Information Security, vol. 73, pp. (192 pages), January 2019.
A. Iliev, N. Kyurkchiev, A. Rahnev, and T. Terzieva, ``Some New Approaches for Modelling Large-scale Worm Spreading on the Internet. II'', Neural, Parallel and Scientific Computations, vol. 27, pp. (13 pages), January 2019.
G.~F. Ciocarlie, A. Stavrou, S.~J. Stolfo, and A.~D. Keromytis, ``Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models'', Tech. rep., Google Patents, January 2019.
M. Husak, J. Komarkova, E. Bou-Harb, and P. Celeda, ``Survey of attack projection, prediction, and forecasting in cyber security'', IEEE Communications Surveys and Tutorials, vol. 21, no. 1, pp. 640--660, September 2018.
N. Rastogi, A Network Intrusion Detection System (NIDS) based on information centrality to identify systemic cyber attacks in large systems, Ph.D. thesis, Rensselaer Polytechnic Inst. (ProQuest Publ.), August 2018.
N. Neshenko, ``A Network Telescope approach for inferring and characterizing IoT exploitations'', M.S. thesis, Florida Atlantic Univ., August 2018.
S. Torabi, E. Bou-Harb, C. Assi, M. Galluscio, A. Boukhtouta, and M. Debbabi, ``Inferring, characterizing, and investigating Internet-scale malicious IoT device activities: A Network Telescope perspective'', in Int. Conf. on Dependable Systems and Networks (DSN), June 2018, p. (13 pages).
Q. Ezzahra, B. Khaled, E. Bou-Harb, C. Fachkha, and B. Zouari, ``On the collaborative inference of DDoS: An information-theoretic distributed approach'', in Intl Wireless Comm. and Mobile Computing Conf. (IWCMC), June 2018, pp. 518--523.
K.~M. Prasad, A.~R.~M. Reddy, and K.~V. Rao, ``DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment'', Cluster Computing, vol. 21, pp. 1765--1783, May 2018.
A. Shah, Systems for characterizing Internet routing, Ph.D. thesis, Colorado State Univ., April 2018.
M. Galluscio, N. Neshenko, E. Bou-Harb, Y. Huang, N. Ghani, J. Crichigno, and G. Kaddoum, ``A first empirical look on internet-scale exploitations of IoT devices'', in Intl Symp. on Personal, Indoor, and Mobile Radio Communications (PIMRC), February 2018, pp. 1--7.
N. Vichaidis, H. Tsunoda, and G.~M. Keeni, ``Analyzing darknet TCP traffic stability at different timescales'', in Intl Conf. on Information Networking (ICOIN), January 2018, p. (6 pages).
R. Sridharan, R.~R. Maiti, and N.~O. Tippenhauer, ``WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic'', in ACM Conf. on Security and Privacy in Wireless and Mobile Networks, January 2018, vol. 11, p. (12 pages).
F. Shaikh, E. Bou-Harb, J. Crichigno, and N. Ghani, ``A machine learning model for classifying unsolicited IoT devices by observing Network Telescopes'', in Intl Wireless Comm. and Mobile Computing Conf. (IWCMC), January 2018, vol. 14, p. (6 pages).
F. Shaikh, E. Bou-Harb, N. Neshenko, A.~P. Wright, and N. Ghani, ``Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices'', IEEE Communications Magazine, vol. 56, pp. (8 pages), January 2018.
S. Saurabh and A.~S. Sairam, ``Inferring the deployment of source address validation filtering using silence of path-backscatter'', in Natl Conf. on Communications (NCC), January 2018, p. (6 pages).
P.~A.~A. Resende and A.~C. Drummond, ``A Survey of Random Forest Based Methods for Intrusion Detection Systems'', ACM Computing Surveys (CSUR), vol. 51, pp. (36 pages), January 2018.
M.~S. Pour and E. Bou-Harb, ``Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation'', in 2018 IEEE International Conference on Communications (ICC), January 2018, p. (8 pages).
N. Neshenko, M. Husak, E. Bou-Harb, P. Celeda, S. Al-Mulla, and C. Fachkha, ``Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations'', in 2018 IEEE Globecom Workshops (GC Wkshps), January 2018, p. (6 pages).
M. Husak, N. Neshenko, E. Bou-Harb, and P. Celeda, ``Assessing Internet-wide Cyber Situational Awareness of Critical Sectors'', in Intl Conf. on Availability, Reliability and Security, January 2018, vol. 13, p. (6 pages.
O. Gupta, ``Identifying traffic anomalies interfering with IBR based outage detection'', M.S. thesis, Univ. of California, San Diego, January 2018.
N. Ghani and E. Bou-Harb, ``Passive Inference of Attacks on CPS Communication Protocols'', Journal of Information Security and Applications, p. (39 pages), January 2018.
F. Iglesias and T. Zseby, ``Pattern discovery in Internet background radiation'', IEEE Trans. on Big Data, vol. PP, no. 99, pp. (14 pages), July 2017.
E. Bou-Harb, M. Husak, M. Debbabi, and C. Assi, ``Big data sanitization and cyber situational awareness: A Network Telescope perspective'', IEEE Trans. on Big Data, vol. 99, pp. (16 pages), July 2017.
F. Haddadi and A. Heywood, ``Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?'', Intl J. of Network Management, vol. 27, no. 4, pp. (19 pages), May 2017.
N. Ochieng, A. Ismail, M. Waweru, and J. Orero, ``Detecting scanning computer worms using machine learning and darkspace network traffic'', in Pan African Conf. on Science, Computing and Telecommunications (PACT), March 2017, p. (6 pages).
J. Dauxois and A. Nucit, ``Some estimation problems in epidemic modeling'', Communications in Statistics - Simulation and Computation, vol. 47, no. 4, pp. 1066--1087, March 2017.
H. Polat, H. Mehr, and A. Cetin, ``Diagnosis of chronic kidney disease based on Support Vector Machine by Feature Selection Methods'', J. of Medical Systems, vol. 41, no. 55, pp. (11 pages), February 2017.
L. Zhou, M. Liao, C. Yuan, and H. Zhang, ``Low-Rate DDoS Attack Detection Using Expectation of Packet Size'', Security and Communication Networks, p. (14 pages), January 2017.
W. Chen, Distributed data streaming algorithms for network anomaly detection, Ph.D. thesis, Iowa State Univ., January 2017.
A. Cenedese, F. Tramarin, and S. Vitturi, ``An energy efficient ethernet strategy based on traffic prediction and shaping'', IEEE Trans. on Communications, vol. 65, no. 1, pp. 270--282, January 2017.
H.S. Alharbi, Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networks, Ph.D. thesis, Univ. of Stirling, January 2017.
M. Xu, L. Hua, and S. Xu, ``A vine copula model for predicting the effectiveness of cyber defense early-warning'', Technometrics, vol. 0, pp. (42), November 2016.
P. Chen, M. Xu, S. Xu, and T. Hu, ``Modeling and predicting extreme cyber attack rates via marked point processes'', J. Applied Statistics, vol. 0, pp. 0, November 2016.
C. Lin, C. Wu, M. Huang, Z. Wen, and Q. Cheng, ``Adaptive IP mutation: A proactive approach for defending against worm propagation'', in IEEE Symp. onReliable Distributed Systems Workshops (SRDSW), September 2016, pp. 61--66.
F. Haddadi, Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithms, Ph.D. thesis, Dalhousie Univ., September 2016.
K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attack'', Management Information Systems Quarterly, vol. 41, pp. (28 pages), May 2016.
C. Fachkha and M. Debbabi, ``Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization'', IEEE Communications Surveys and Tutorials, vol. 18, pp. 1197--1227, May 2016.
A. Marnerides and A. Mauthe, ``Analysis and characterisation of botnet scan traffic'', in Conf. on Computing, Networking and Communications (ICNC), March 2016.
A. Kolesnichenko, B. Haverkort, A. Remke, and P. de Boer, ``Fitting a code-red virus spread model: An account of putting theory into practice'', in Conf. on the Design of Reliable Communication Networks (DRCN), March 2016, pp. 39--46.
G. Kirubavathi and R. Anitha, ``Botnet detection via mining of traffic flow characteristics'', Computers and Electrical Engineering, vol. 50, pp. 91--101, February 2016.
L. Zheng, J. Li, H. Wang, and X. Zeng, ``Improving accuracy and automation of anomaly detectors based on self-correlation'', J. Internet Technology (JIT), vol. 17, no. 1, pp. 39--51, January 2016.
Z. Chen and C. Chen, ``Characterising heterogeneity in vulnerable hosts on worm propagation'', Intl J. Security and Networks, vol. 11, no. 4, January 2016.
K. Benson, Leveraging Internet background radiation for opportunistic network analysis, Ph.D. thesis, Univ. of California San Diego, January 2016.
R.R.R. Robinson and C. Thomas, ``Ranking of machine learning algorithms based on the performance in classifying DDoS attacks'', in 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), December 2015, pp. 185--190.
Y. Haga, A. Saso, T. Mori, and S. Goto, ``Increasing the darkness of darknet traffic'', in Global Communications Conf. (GLOBECOM), December 2015, pp. 1--7.
X.-F. Chen and S.-Z. Yu, ``CIPA: A collaborative intrusion prevention architecture for programmable network and SDN'', Computers and Security, vol. 58, pp. 1--19, December 2015.
C. Fachkha, Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacks, Ph.D. thesis, Concordia Univ., November 2015.
N. Donoghue, B. Hahn, H. Xu, T. Kroeger, D. Zage, and R. Johnson, ``Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Database'', Tech. rep., arxiv.org, November 2015.
E. Balkanli, A.N. Zincir-Heywood, and M.I. Heywood, ``Feature selection for robust backscatter DDoS detection'', in Local Computer Networks Conf. Workshops (LCNW), October 2015, pp. 611--618.
S. Gupta and B.B. Gupta, ``Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art'', Intl J. System Assurance Engineering and Management, pp. 1--19, September 2015.
Z. Zhan, M. Xu, and S. Xu, ``Predicting cyber attack rates with extreme values'', IEEE Trans. on Information Forensics and Security, vol. 10, no. 8, pp. 1666--1677, August 2015.
T. Vaidya, ``2001-2013: Survey and analysis of major cyberattacks'', Tech. rep., arxiv.org, July 2015.
C. Zhang, S. Zhou, and B. Chain, ``Hybrid epidemics - A case study on computer worm Conficker'', Plos One, vol. 10, no. 5, May 2015.
F. Haddadi, D. Le~Cong, L. Porter, and A. Zincir-Heywood, ``On the effectiveness of different botnet detection approaches'', in Information Security Practice and Experience (ISPE), May 2015, vol. 9065 of Lecture Notes in Computer Science, pp. 121--135.
E. Balkanli and A.N. Zincir-Heywood, ``Highlights on analyzing one-way traffic using different tools'', in IEEE Symp. on Computational Intelligence for Security and Defense Applications (CISDA), May 2015, pp. 1--8.
C. Zhang, S. Zhou, J. Miller, I. Cox, and B. Chain, ``Optimizing hybrid spreading in metapopulations'', Nature Scientific Reports, vol. 5, April 2015.
E. Balkanli, ``A comprehensive study on one-way backscatter traffic analysis'', M.S. thesis, Dalhousie Univ., Halifax, CA, April 2015.
G. Yao, J. Bi, and A.V. Vasilakos, ``Passive IP Traceback: disclosing the locations of IP spoofers from path backscatter'', IEEE Trans. on Information Forensics and Security, vol. 10, pp. 471--484, January 2015.
Y. Lai, Y. Chen, Z. Liu, Z. Yang, and X. Li, ``On monitoring and predicting mobile network traffic abnormality'', Simulation Modelling Practice and Theory, vol. 50, pp. 176--188, January 2015.
H. Chen, Toward hardware-oriented defensive network infrastructure, Ph.D. thesis, Binghamton Univ., January 2015.
Z. Zhan, M. Xu, and S. Xu, ``A characterization of cybersecurity posture from Network Telescope data'', in Conf. on Trustworthy Systems (InTrust), December 2014, vol. 9473 of Lecture Notes in Computer Science (LNCS), pp. 105--126.
A. Kolesnichenko, Model-checking mean-field models: algorithms and applications, Ph.D. thesis, Univ. of Twente, December 2014.
F. Iglesias and T. Zseby, ``Entropy-based characterization of Internet background radiation'', Entropy, vol. 17, no. 1, pp. 74--101, December 2014.
E. Balkanli, J. Alves, and A.N. Zincir-Heywood, ``Supervised learning to detect DDoS attacks'', in IEEE Computational Intelligence in Cyber Security (CICS), December 2014.
J Fowler, T Johnson, P Simonetto, P Lazos, S. Kobourov, M. Schneider, and C. Aceda, ``IMap: Visualizing network activity over Internet maps'', in Visualization for Cyber Security (VizSec), November 2014, p. (8 pages).
S. Yang, H. Du, J. Holsopple, and M. Sudit, ``Attack Projection'', Advances in Information Security, vol. 62, pp. 239--261, October 2014.
F. Iglesias and T. Zseby, ``Modelling IP darkspace traffic by means of clustering techniques'', in Communications and Network Security (CNS), October 2014, pp. 166--174.
S. Garcia, M. Grill, J. Stiborek, and A. Zunino, ``An empirical comparison of botnet detection methods'', Computers and Security, vol. 45, pp. 100--123, September 2014.
E. Balkanli and A.N. Zincir-Heywood, ``On the analysis of backscatter traffic'', in IEEE Local Computer Networks Workshops (LCN Workshops), September 2014.
H. Du, Probabilistic modeling and inference for obfuscated network attack sequences, Ph.D. thesis, Rochester Inst. of Technology, August 2014.
M. Kale and D.M. Choudhari, ``DDOS attack detection based on an ensemble of neural classifier'', Intl J. Computer Science and Network Security (IJCSNS), vol. 14, no. 7, pp. 122--129, July 2014.
S.R. Burnett, Empowering bystanders to facilitate Internet censorship measurement and circumvention, Ph.D. thesis, Georgia Tech, July 2014.
C. Gonzalez, ``Information theoretic measures for the detection of anomalies in IP darkspace traffic'', M.S. thesis, Barcelona Tech, June 2014.
H. Du and S.J. Yang, ``Probabilistic Inference for Obfuscated Network Attack Sequences'', in Conf. on Dependable Systems and Networks, June 2014, pp. 57--67.
Z. Zhan, A statistical framework for analyzing cyber attacks, Ph.D. thesis, Univ. Texas, San Antonio, TX, US, May 2014.
P. Wang, X. Guan, J. Zhao, J. Tao, and T. Qin, ``A new sketch method for measuring host connection degree distribution'', IEEE Trans. on Information Forensics and Security, vol. 9, pp. 948--960, April 2014.
S. Strapp and S. Yang, ``Segmenting large-scale cyber attacks for online behavior model generation'', in Social Computing, Behavioral-Cultural Modeling and Prediction (SBP), April 2014, vol. 8393 of Lecture Notes in Computer Science (LNCS), pp. 169--177.
F. Khan, N. Hosein, S. Ghiasi, C. Chuah, and P. Sharma, ``Streaming solutions for fine-grained network traffic measurements and analysis'', in IEEE/ACM Trans. on Networking (TON), April 2014, vol. 22 (2), pp. 377--390.
K. Singh, S.C. Guntuku, A. Thakur, and C. Hota, ``Big data analytics framework for peer-to-peer botnet detection using random forests'', Information Sciences, vol. 278, pp. 488--497, March 2014.
T. Kudo and T. Takin, ``On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling'', Intl J. of Network Management, vol. 24, no. 1, pp. 28--47, January 2014.
S. Ko, K. Kim, Y. Lee, and J. Song, ``A classification method of darknet traffic for advanced security monitoring and response'', Lecture Notes in Computer Science, vol. 8836, pp. 357--364, January 2014.
P. Chatziadam, I.G. Askoxylakis, and A. Fragkiadakis, ``A Network Telescope for Early Warning Intrusion Detection'', Lecture Notes in Computer Science, vol. 8533, pp. 11--22, January 2014.
Huang~Y. Huang~S.Y., ``Network forensic analysis using growing hierarchical SOM'', in IEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov), December 2013, pp. 536--543.
H. Du and S.J. Yang, ``Temporal and spatial analyses for large-scale cyber attacks'', in Handbook of Computational Approaches to Counterterrorism, November 2013, pp. 559--578.
L.J. Tidy, S. Woodhead, and J. Wetherall, ``Simulation of zero-day worm epidemiology in the dynamic, heterogeneous Internet'', J. Defense Modeling and Simulation: Applications, Methodology, Technology, p. (17 pages), October 2013.
K.-L. Hui, S.H. Kim, and Q.-H. Wang, ``Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack'', Tech. rep., Hong Kong Univ. of Science and Technology, September 2013.
S. Strapp, ``Segmentation and model generation for large-scale cyber attacks'', M.S. thesis, Rochester Inst. of Technology, August 2013.
S. Guntuku, P. Narang, and C. Hota, ``Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural network'', Tech. rep., arxiv.org, July 2013.
B. Irwin, ``A source analysis of the Conficker outbreak from a Network Telescope'', SAIEE Africa Research J., vol. 104, no. 2, pp. 38--88, June 2013.
C. Ma, Y. Yang, and X. Guo, ``Improved SEIR viruses propagation model and the patchs impact on the propagation of the virus'', J. of Computational Information Systems, vol. 9, no. 8, pp. 3243--3251, April 2013.
W. Chen, Y. Liu, and Y. Guan, ``Cardinality change-based early detection of large-scale cyber-attacks'', in IEEE INFOCOM, April 2013, pp. 1788--1796.
L. Tidy, S. Woodhead, and J. Wetherall, ``A large-scale zero-day worm simulator for cyber-epidemiological analysis'', in Conf. on Advances in Computer Science and Electronics Engineering (CSEE), February 2013, pp. 230--234.
P.A.R. Kumar and S. Selvakumar, ``Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems'', Computer Communications, vol. 36, no. 3, pp. 303--319, February 2013.
F. Wang, Y. Zhang, H. Guo, and C. Wang, ``Combating good point set scanning-based self-learning worms by using predators'', J. Network Security, vol. 15, no. 3, pp. 171--178, January 2013.
T. Andrysiak, L. Saganowski, and M. Choras, ``DDoS attacks detection by means of greedy algorithms'', in Image Processing and Communications Challenges 4, R.S. Choras, Ed., January 2013, vol. 184 of Advances in Intelligent Systems and Computing, pp. 303--310.
E. Xu, W. Hsu, M.L. Lee, and D. Patel, ``Top-k maximal influential paths in network data'', in Database and Expert Systems Applications, September 2012, vol. 7446 of Lecture Notes in Computer Science, pp. 369--383.
S. Martin, L. Chiarello, and G. Leduc, ``DISco: A distributed information store for network challenges and their outcome'', in IEEE Network Operations and Management Symp. (NOMS), May 2012, pp. 1221--1226.
L. Zheng, P. Zou, Y. Jia, and W. Han, ``Traffic anomaly detection improvement based on spatial-temporal characteristics'', Advanced Science Lett., vol. 7, pp. 456--462, March 2012.
L. Zheng, P. Zou, Y. Jia, and W. Han, ``Traffic anomaly detection and containment using Filter-Ary-Sketch'', Procedia Engineering, vol. 29, pp. 4297--4306, January 2012.
H. Du and S.J. Yang, ``Characterizing transition behaviors in Internet attack sequences'', in IEEE Conf. on Computer Communications and Networks (ICCCN), July 2011, p. (6 pages).
M. Suresh and R. Anitha, ``Evaluating machine learning algorithms for detecting DDoS attacks'', in Advances in Network Security and Applications (CNSA), D.C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, and D. Nagamalai, Eds., June 2011, vol. 196 of Communications in Computer and Information Science, pp. 441--452.
K. Xu, F. Wang, and L. Gu, ``Network-aware behavior clustering of Internet end hosts'', in IEEE Conf. on Computer Communications (INFOCOM), April 2011, pp. 2078--2086.
N.S. Abouzakhar, H. Chen, and B. Christianson, ``An enhanced fuzzy ARM approach for intrusion detection'', J. Digital Crime and Forensics, vol. 3, no. 2, pp. 41--61, April 2011.
M. Narita, T. Katoh, B.B. Bista, and T. Takata, ``Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace'', in Advanced Information Networking and Applications (WAINA), March 2011, pp. 341--348.
H. Du and S.J. Yang, ``Discovering collaborative cyber attack patterns using social network analysis'', in Conf. on Social computing, behavioral-cultural modeling and prediction (SBP), March 2011, vol. 6589 of Lecture Notes in Computer Science, pp. 129--136.
L. Saganowski, T. Andrysiak, M. Choras, and R. Renk, ``Expansion of matching pursuit methodology for anomaly detection in computer networks'', Advances in Intelligent and Soft Computing, vol. 95, pp. 727--736, January 2011.
M. Choras, L. Saganowski, R. Renk, and W. Holubowicz, ``Statistical and signal-based network traffic recognition for anomaly detection'', Expert Systems, p. (14 pages), January 2011.
G. Yao, J. Bi, and Z. Zhou, ``Passive IP traceback: capturing the origin of anonymous traffic through network telescopes'', ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 413--414, October 2010.
N.S. Abouzakhar and A. Bakar, ``A chi-square testing-based intrusion detection model'', in Conf. on Cybercrime Forensics Education and Training (CFET 2010), September 2010.
Z.M. Fadlullah, T. Taleb, A.V. Vasilakos, M. Guizani, and N. Kato, ``DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis'', IEEE/ACM Trans. on Networking (TON), vol. 18, no. 4, pp. 1234--1247, August 2010.
J. Bi, P. Hu, and P. Li, ``Study on classification and characteristics of source address spoofing attacks in the Internet'', in IEEE Conf. on Networking (ICN), April 2010, pp. 226--230.
R. Gupta, K. Ramamritham, and M. Mohania, ``Ratio threshold queries over distributed data sources'', Conf. on Data Engineering (ICDE), pp. 581--584, March 2010.
K.G. Kyriakopoulos and D.J. Parish, ``Using wavelets for compression and detecting events in anomalous network traffic'', in Conf. on Systems and Networks Communication, September 2009, pp. 195--200.
H. Rahmani, N. Sahli, and F. Kamoun, ``Joint entropy analysis model for DDoS attack detection'', in Conf. on Information Assurance and Security (IAS), August 2009, pp. 267--271.
H. Rahmani, N. Sahli, and F. Kamoun, ``A traffic coherence analysis model for DDoS attack detection'', in Conf. on Security and Cryptography (SECRYPT), E. Fernandez-Medina, M. Malek, and J. Hernando, Eds. July 2009, pp. 148--154, INSTICC Press.
J. Riihijarvi, P. Mahonen, and M. Wellens, ``Measuring complexity and predictability in networks with multiscale entropy analysis'', in IEEE Conf. on Computer Communications (INFOCOM), April 2009.
X. He and S. Parameswaran, ``MCAD: Multiple connection based anomaly detection'', in IEEE Conf. on Communication Systems (ICCS), November 2008, pp. 999--1004.
H. Choi, H. Lee, and H. Kim, ``Fast detection and visualization of network attacks on parallel coordinates'', Computers and Security, vol. 28, no. 5, pp. 276--288, July 2008.
J. Riihijarvi, P. Mahonen, and M. Wellens, ``Metrics for characterizing complexity of network traffic'', in Conf. on Telecommunications (ICT), June 2008, pp. 1--6.
B. Irwin and N. Pilkington, ``High level internet scale traffic visualization using Hilbert curve mapping'', in Visualization for Computer Security (VizSec), J.R. Goodall, G. Conti, and K.-L. Ma, Eds., May 2008, Mathematics and Visualization, pp. 147--158.
S. Wei and J. Mirkovic, ``Correcting congestion-based error in network telescopes observations of worm dynamics'', in Internet Measurement Conf. (IMC), January 2008, pp. 125--130.
P. Li, J. Bi, and Z. Zhou, ``A backscatter technology based study on source address spoofing'', Periodical of Ocean Univ. of China, vol. 38, pp. 125--128, January 2008.
J. Francois, R. State, and O. Festor, ``Activity monitoring for large honeynets and network telescopes'', J. Advances in Systems and Measurements, vol. 1, pp. 1--13, January 2008.
A. Dainotti, A. Pescape, and G. Ventre, ``Worm traffic analysis and characterization'', in IEEE Conf. on Communications (ICC), June 2007, pp. 1435--1442.
Z. Chen and C. Ji, ``Measuring network-aware worm spreading ability'', in IEEE Conf. on Computer Communications (INFOCOM), May 2007, pp. 116--124.
M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis, ``Sampling strategies for epidemic-style information dissemination'', in IEEE Conf. on Computer Communications (INFOCOM), April 2007, pp. 1678--1686.
Z. Chen and C. Ji, ``Optimal worm-scanning method using vulnerable-host distributions'', J. Security and Networks, vol. 2, no. 1/2, pp. 71--80, January 2007.
M. Rajab, F. Monrose, and A. Terzis, ``Fast and evasive attacks: highlighting the challenges ahead'', in Symp. on Recent Advances in Intrusion Detection (RAID). September 2006, vol. 4219 of Lecture Notes in Computer Science, pp. 206--225, Springer.
J. Francois, R. State, and O. Festor, ``Tracking global wide configuration errors'', in IEEE Workshop on Monitoring, Attack Detection and Mitigation, September 2006.
I. Hamadeh and G. Kesidis, ``Toward a framework for forensic analysis of scanning worms'', in Emerging Trends in Information and Communication Security (ETRICS), June 2006, vol. 3995 of Lecture Notes in Computer Science (LNCS), pp. 282--297.
Y. Peng, J. Gong, W. Yang, and W. Liu, ``Disclosing the element distribution of Bloom filter'', in Conf. on Computational Science (ICCS). May 2006, vol. 3991 of Lecture Notes in Computer Science (LNCS), pp. 1022--1025, Springer.
M. Rajab, F. Monrose, and A. Terzis, ``Worm evolution tracking via timing analysis'', in ACM workshop on Rapid Malcode (WORM), November 2005, pp. 52--59.
Z. Chen and C. Ji, ``Importance-scanning worm using vulnerable-host distribution'', in IEEE Global Telecommunications Conf. (GLOBECOM), November 2005, p. (6 pages).
Z. Chen, C. Lin, J. Ni, D.-H. Ruan, B. Zheng, Y.-X. Jiang, X. Peng, Y. Wang, A. Luo, B. Zhu, Y. Yue, and F.-Y. Ren, ``Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN'', in IEEE Conf. on Local Computer Networks (LCN), November 2005, pp. 748--755.
A. Kumar, V. Paxson, and N. Weaver, ``Exploiting underlying structure for detailed reconstruction of an internet-scale event'', in Internet Measurement Conf. (IMC), October 2005, pp. 33--33.
M. Rajab, F. Monrose, and A. Terzis, ``On the effectiveness of distributed worm monitoring'', in Usenix Security Conf. (SEC), July 2005, pp. 15--15.
P. Chhabra, A. John, and H. Saran, ``PISA: Automatic extraction of traffic signatures'', in IFIP Networking Conf. May 2005, vol. 3462 of Lecture Notes in Computer Science (LNCS), pp. 730--742, Springer.