Gaborone, BW | Traffic prediction in cloud computing using time series mode ... | Mokgolodi, K. | Anonymized Internet Traces | 2016-08 |
Pittsburgh, PA, US | SIFF: a Stateless Internet Flow Filter to mitigate DDoS floo ... | Yaar, A., Perrig, A., et al. | Topology with Skitter | 2004-05 |
San Diego, CA, US | Characterizing and measuring path diversity of internet topo ... | Teixeira, T., Marzullo, K., et al. | Topology with Skitter | 2003-06 |
Monterey, CA, US | Distributed Emulation in Support of Large Networks | Greunke, B. | Topology with BGP | 2016 |
Hawthorne, NY, US | Effective peering for multi-provider content delivery servic ... | Amini, L., Shaikh, A., et al. | Topology with Skitter | 2004 |
Ankara, TR | Server Notaries: A Complementary Approach to the Web PKI Tru ... | Yuce, E., Selcuk, A.A. | Topology with BGP | 2016 |
Aalto, FI | Inter-domain incentives and Internet architecture | Rajahalma, J. | Topology with BGP | 2012-08 |
Washington, DC, US | Network Level Attacks and Defenses Against Anonymity Network ... | Tan, Z.D.H. | Topology with Archipelago, Topology with BGP | 2016 |
Delft, NL | On the relationships between topological measures in real-wo ... | Jamakovic, A., Uhlig, S., et al. | Topology with Skitter | 2007-09 |
San Diego, CA, US | A distributed mechanism to protect against DDoS attacks | Mosharraf, N., Jayasumana, A., et al. | Denial of Service Attacks | 2017-06 |
Vigo, ES | Frame coalescing in dual-mode EEE | Herreria-Alonso, S., Rodriguez-Perez, M., et al. | Anonymized Internet Traces | 2015-10 |
Enschede, NL | Impact of packet sampling on link dimensioning | de Oliviera Schmidt, R., Sadre, R., et al. | Anonymized Internet Traces | 2015-09 |
College Park, MD, US | Longitudinal analysis of root server anycast inefficiencies | Li, Z., Levin, D., et al. | Topology with BGP | 2017-00 |
Waterloo, CA | Turbo covert channel: An iterative framework for covert comm ... | Ahmadzadeh, S.A., Agnew, G. | Anonymized Internet Traces | 2013-04 |
Enschede, NL | Lightweight link dimensioning using sFlow sampling | Schmidt, R., Sadre, R., et al. | Anonymized Internet Traces | 2013-10 |
Bradford, UK | Dynamic OBS offset allocation in WDM networks | Mouchos, C., Tsokanos, A., et al. | Anonymized Internet Traces | 2010-11 |
Atlanta, GA, US | Exploiting underlying structure for detailed reconstruction ... | Kumar, A., Paxson, V., et al. | UCSD Network Telescope | 2005-10 |
Irvine, CA, US | 2.5K-graphs: from sampling to generation | Gjoka, M., Kurant, M., et al. | Topology with BGP | 2012-08 |
Beijing, CN | Flow-level traffic engineering in conventional networks with ... | Geng, N., Yang, Y., et al. | Anonymized Internet Traces | 2018-01 |
West Lafayette, IN, US | Opportunistic flow-level latency estimation using consistent ... | Lee, M., Duffield, N., et al. | Anonymized Internet Traces | 2012-02 |
Haifa, IL | Maximizing the throughput of cuckoo hashing in network devic ... | Kanizo, Y., Hay, D., et al. | Anonymized Internet Traces | 2012-02 |
Chania, GR | Sketching distributed sliding-window data streams | Papapetrou, O., Garofalakis, M., et al. | Anonymized Internet Traces | 2015-03 |
Brooklyn, NY, US | Efficient buffering and scheduling for a single-chip crosspo ... | Cao, Z., Panwar, S.S. | Anonymized Internet Traces | 2012-10 |
Nathan, AU | Intelligent Sampling Using an Optimized Neural Network | Jadidi, Z., Muthukkumarasamy, V., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2016-01 |
Seoul, KR | APFS: Adaptive Probabilistic Filter Scheduling against distr ... | Seo, D., Lee, H., et al. | Topology with Skitter | 2013-11 |
Lubbock, TX, US | Applying big data analytics on integrated cybersecurity data ... | Juturu, L.S. | Denial of Service Attacks | 2015-05 |
Shenyang, CN | Research on bottleneck-delay in internet based on IP united ... | Lin, C., Bi, Y., et al. | Topology with Archipelago | 2016-07 |
Eugene, OR, US | Eyeball ASes: from geography to connectivity | Rasti, A.H., Magharei, N., et al. | Topology with BGP | 2010-11 |
Princeton, NJ, US | Optimizing the placement of implicit proxies | Cesareo, J., Karlin, J., et al. | Topology with BGP | 2012-06 |
Barcelona, ES | The impact of content delivery networks on the Internet ecos ... | Palacin, M., Oliver, M., et al. | Topology with BGP | 2013-00 |
Buenos Aires, AR | Understanding edge connectivity in the Internet through core ... | Alvarez-Hamelin, J.I., Beiro, M.G., et al. | Topology with Skitter | 2011-03 |
Budapest, HU | Compressing IP forwarding tables: Realizing information-theo ... | Korosi, A., Tapolcai, J., et al. | Anonymized Internet Traces | 2014-10 |
Tempe, AZ, US | Network-aware behavior clustering of Internet end hosts | Xu, K., Wang, F., et al. | UCSD Network Telescope, Anonymized Internet Traces | 2011-04 |
Xiamen, CN | A novel network flow watermark embedding model for efficient ... | Chen, Y., Wang, S. | Anonymized Internet Traces | 2016-00 |
Granville, OH, US | Divergence in network traffic | Takahashi, E.K., Chen, Y., et al. | Denial of Service Attacks | 2011-11 |
Hong Kong, CN | An efficient approach to multi-level route analytics | Chen, A., Chan, E.W.W., et al. | Topology with Archipelago | 2013-05 |
Lubeck, DE | DynaCORE - dynamically reconfigurable coprocessor for networ ... | Albrecht, C., Foag, J., et al. | Anonymized Internet Traces | 2010-03 |
Ann Arbor, MI, US | Measuring IPv6 adoption | Czyz, J., Allman, M., et al. | Topology with Archipelago | 2013-08 |
Zhengzhou, CN | An epidemic-dynamics-based model for CXPST spreading in inte ... | Wang, Y., Wang, Z., et al. | Topology with BGP | 2013-07 |
Trivandrum, IN | Ranking of machine learning algorithms based on the performa ... | Robinson, R.R.R., Thomas, C. | UCSD Network Telescope, Denial of Service Attacks | 2015-12 |
Karlsruhe, DE | Estimating current-flow closeness centrality with a multigri ... | Bergamini, E., Wegner, M., et al. | Topology with BGP | 2016-07 |
Melbourne, AU | Robust synchronization of software clocks across the Interne ... | Veitch, D., Babu, S., et al. | Topology with Skitter | 2004-00 |
Guangzhou, CN | Self-similarity and heavy-tail of ICMP traffic | Liu, W., Yan, Y., et al. | Anonymized Internet Traces | 2012-12 |
Belgrade, RS | Graphical processing unit-based parallelization of the Open ... | Dundjerski, D., Tomasevic, M. | Topology with Skitter | 2014-02 |
Ljubljana, SI | The impact of network topology on the performance of MAP sel ... | Vilhar, A., Novak, R., et al. | Topology with BGP | 2010-05 |
Beijing, CN | Tumbler: Adaptable link access in the bots-infested Internet | Zhang, Y., Wang, X., et al. | Topology with BGP | 2016-06 |
Buenos Aires, AR | An empirical comparison of botnet detection methods | Garcia, S., Grill, M., et al. | UCSD Network Telescope | 2014-09 |
Aachen, DE | Measuring complexity and predictability in networks with mul ... | Riihijarvi, J., Mahonen, P., et al. | UCSD Network Telescope | 2009-04 |
Liege, BE | A brief history of MPLS usage in IPv6 | Vanaubel, Y., Merindol, P., et al. | Topology with Archipelago, Topology with BGP | 2016-03 |
Delft, NL | On properties of multicast routing trees | Janic, M., Van Mieghem, P. | Topology with Skitter | 2005-11 |
Durham, NC, US | Improving IP-based geo-location through Internet topology an ... | Moses, K.V. | Topology with BGP | 2013-00 |
Beijing, CN | Analysis of UDP traffic usage on internet backbone links | Zhang, M., Dusi, M., et al. | Anonymized Internet Traces | 2009-09 |
Shenyang, CN | Analysis of Internet robustness in attacks | Xu, Y., Zhang, X. | Topology with Archipelago | 2012-05 |
Minneapolis, MN, US | On properties of Internet Exchange Points and their impact o ... | Xu, K., Duan, Z., et al. | Topology with Skitter | 2004-04 |
Leuven, BE | Retouched Bloom filters: allowing networked applications to ... | Donnet, B., Bayant, B., et al. | Topology with Skitter | 2006-12 |
Stonybrook, NY, US | The politics of routing: Investigating the relationship betw ... | Singh, R., Koo, H., et al. | Topology with BGP | 2016-06 |
Brest, FR | Application-centric energy-efficient Ethernet with quality o ... | Popescu, I.; Miyazaki, T.; Chino, M.; Wang, et al. | Anonymized Internet Traces | 2015-07 |
Hebron, PS | Internet scale DoS attacks | Kurar, B., Tahboub, R. | Topology with BGP | 2015-08 |
Rennes, FR | PTPv2-based network load estimation and its application to Q ... | Frangoudis, P.A., Hadjadj-Aoul, Y., et al. | Anonymized Internet Traces | 2014-07 |
Redmond, WA, US | Sampling strategies for epidemic-style information dissemina ... | Vojnovic, M., Gupta, V., et al. | UCSD Network Telescope | 2007-04 |
Seoul, KR | A Distributed Self-Organizing Map for DoS Attack Detection | Kim, M., Jung, S., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2012-00 |
Hong Kong, CN | Performance evaluation and service rate provisioning for a q ... | Chen, J., Addie, R.G., et al. | Anonymized Internet Traces | 2013-11 |
San Diego, CA, US | Detecting evasion attacks at high speeds without reassembly | Varghese, G., Fingerhut, J., et al. | Anonymized Internet Traces | 2006-10 |
Ithaca, NY, US | A study of prefix hijacking and interception in the internet | Ballani, H., Francis, P., et al. | Topology with BGP | 2007-10 |
Washington DC, US | An empirical evaluation of relay selection in Tor | Wacek, C., Tan, H., et al. | Topology with Archipelago, Topology with BGP | 2013-02 |
New York City, NY, US | Ensemble-based model for DDoS attack detection and flash eve ... | Bhatia, S. | Denial of Service Attacks | 2016-12 |
Burlington, MA, US | Inter-domain rendezvous service architecture | Rajahalme, J., Sarela, M., et al. | Topology with BGP | 2009-12 |
Minneapolis, MN, US | Forming Guard Sets using AS Relationships | Imani, M., Barton, A., et al. | Topology with Archipelago, Topology with BGP | 2017 |
Cambridge, MA, US | A new approach to dimensionality reduction for anomaly detec ... | Huang, T., Sethu, H., et al. | Anonymized Internet Traces | 2016-06 |
Aachen, DE | Metrics for characterizing complexity of network traffic | Riihijarvi, J., Mahonen, P., et al. | UCSD Network Telescope | 2008-06 |
Philadelphia, PA, US | Moment-based spectral analysis of large-scale networks using ... | Preciado, V.M., Jadbabaie, A. | Topology with Skitter | 2013-04 |
Hanoi, VN | OpenFlowSIA: An optimized protection scheme for software-def ... | Phan, T., Toan, T., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2016-07 |
Champaign, IL, US | Reducing short flows' latency in the internet | Li, Q. | Topology with Archipelago, Topology with BGP | 2016-04 |
Rochester, NY, US | Segmentation and model generation for large-scale cyber atta ... | Strapp, S. | UCSD Network Telescope | 2013-08 |
Rio de Janeiro, BR | Caracterizacao e identificacao de papeis e vertices em redes ... | Spinelli, L.P. | Anonymized Internet Traces | 2011-08 |
New York, NY, US | A SDN-Based Framework for Fine-Grained Inter-domain Routing ... | Wang, Y., Bi, J., et al. | Topology with BGP | 2017 |
Glasgow, UK | Compact routing on the Internet AS-graph | Strowes, S.D., Mooney, G., et al. | Topology with BGP | 2011-06 |
Haifa, IL | Optimal elephant flow detection | Basat, R., Einziger, G., et al. | Anonymized Internet Traces | 2017-15 |
Ithaca, NY, US | Timing is everything: Accurate, minumum overhead, available ... | Wang, H., Lee, K.S., et al. | Anonymized Internet Traces | 2014-11 |
Princeton, NJ, US | Online measurement of large traffic aggregates on commodity ... | Jose, L., Yu, M., et al. | Anonymized Internet Traces | 2011-03 |
Los Angeles, CA, US | The record route option is an option! | Goodchild, B., Chiu, Y., et al. | Topology with BGP | 2017-11 |
Marina Del Rey, CA, US | Selecting representative IP addresses for internet topology ... | Fan, X., Heidemann, J. | Topology with Archipelago | 2010-11 |
Urbana, IL, US | Defending Tor from network adversaries: A case study of netw ... | Juen, J., Das, A., et al. | Topology with Archipelago | 2014-10 |
Beijing, CN | Preventing DDoS attacks by identifier/locator separation | Luo, H., Lin, Y., et al. | Denial of Service Attacks | 2013-11 |
Zurich, CH | HORNET: High-speed onion routing at the network layer | Chen, C., Asoni, D.E., et al. | Topology with BGP, Anonymized Internet Traces | 2015-10 |
Zhengzhou, CN | ASTVA: DDoS-limiting architecture for Next Generation Intern ... | Wei, W., Yingjie, X., et al. | Topology with BGP | 2012-01 |
Delft, NL | Het Nederlands elftal als complex netwerk | Kooij, R., Jamakovic, A., et al. | Topology with Skitter | 2008-03 |
Aalto, FI | Community detection in networks: Structural communities vers ... | Hric, D., Darst, R.K., et al. | Topology with Archipelago, Topology with BGP | 2014-12 |
Harbin, CN | A framework to quantify the pitfalls of using traceroute in ... | Zhang, Y., Oliveira, R., et al. | Topology with Archipelago | 2011-10 |
Kaiserslautern, DE | On the importance of local connectivity for Internet topolog ... | Haddadi, H., Fay, D., et al. | Topology with Skitter | 2009-09 |
London, UK | A trace-driven analysis of caching in content-centric networ ... | Tyson, G., Kaune, S., et al. | Topology with Archipelago | 2012-08 |
Berlin, DE | BGP prefix delegations: A deep dive | Krenc, T., Feldmann, A. | Topology with Archipelago, Topology with BGP, Paper Data Supplements | 2016-11 |
Chennai, IN | Congestion avoidance algorithm using ARIMA(2,1,1) model-base ... | Jeyasekar, A., Kasmir Raja, S., et al. | DNS RTT | 2017-05 |
London, UK | Tuning topology generators using spectral distributions | Haddadi, H., Fay, D., et al. | Topology with Skitter | 2008-06 |
Anhui, CN | Modeling and predicting extreme cyber attack rates via marke ... | Chen, P., Xu, M., et al. | UCSD Network Telescope | 2016-11 |
Athens, GR | Categorization of Network Attacks with Machine Learning meth ... | Alpos, O. | Denial of Service Attacks | 2017_08 |
Davis, CA, US | The quantitative comparison of computer networks | Brugger, S.T. | Anonymized Internet Traces | 2009-06 |
Forth, GR | Shortcuts through colocation facilities | Kotronis, V., Nomikos, G., et al. | Topology with BGP | 2017-10 |
Aydin, TR | Using genetic algorithms to optimise dynamic power saving in ... | Abaci, H., Parr, G., et al. | Anonymized Internet Traces | 2016-01 |
Palo Alto, CA, US | RiskRoute: A framework for mitigating network outage threats | Eriksson, B, Durairajan, R., et al. | Topology with BGP | 2013-12 |
Budapest, HU | Spotter: a model based active geolocation service | Laki, S., Matray, P., et al. | Topology with Archipelago | 2010-04 |
Coimbra, PT | Peer selection in P2P service overlays using geographical lo ... | Fiorese, A., Simoes, P., et al. | Topology with Archipelago | 2012-06 |
Jinan, CN | Identifying heavy-hitter flows fast and accurately | Zhang, N., Wang, F., et al. | Anonymized Internet Traces | 2010-06 |
Munich, DE | The amplification threat posed by publicly reachable BACnet ... | Gasser, O., Scheitle, Q., et al. | Topology with BGP | 2017-01 |
Beijing, CN | Reducing power of traffic manager in routers via dynamic on/ ... | Fan, J., Hu, C., et al. | Anonymized Internet Traces | 2012-05 |
West Lafayette, IN, US | Anonymizing network traces with temporal pseudonym consisten ... | Qardaji, W., Li, N. | Anonymized Internet Traces | 2012-06 |
Montreal, CA | Darknet as a source of cyber threat intelligence: Investigat ... | Fachkha, C. | UCSD Network Telescope | 2015-11 |
Zurich, CH | Evaluating the effect of centralization on routing convergen ... | Gamperli, A., Kotronis, V., et al. | Topology with BGP | 2014-10 |
Madrid, ES | Wire-speed statistical classification of network traffic on ... | Santiago del Rio, P.M., Rossi, D., et al. | Anonymized Internet Traces | 2012-11 |
Tel-Aviv, IL | CBTree: A practical concurrent self-adjusting search tree | Afek, Y., Kaplan, H., et al. | Anonymized Internet Traces | 2012-10 |
Boston, MA, US | On the cost of supporting multihoming and mobility | Ishakian, V., Akinwumi, J., et al. | Anonymized Internet Traces | 2009-06 |
Beijing, CN | Time series of Internet AS-level topology graphs: four patte ... | Liu, L., Xu, K. | Topology with Skitter | 2008-12 |
Seattle, WA, US | Symbiotic network simulation and emulation | Erazo, M.A., Rong, R., et al. | Anonymized Internet Traces | 2015-10 |
Baltimore, MD, US | On the effectiveness of distributed worm monitoring | Rajab, M., Monrose, F., et al. | UCSD Network Telescope | 2005-07 |
Tucson, AZ, US | Evolution of the Internet topology from a regional perspecti ... | Acedo, J.C. | Topology with BGP | 2015-00 |
Beijing, CN | Traffic Aware Energy Efficient Router: Architecture, Prototy ... | Song, T., Jiang, Z., et al. | Anonymized Internet Traces | 2016-08 |
Durham, NC, US | Alidade: IP Geolocation without Active Probing | Chandrasekaran, B., Bai, M., et al. | Topology with Archipelago, Topology with BGP | 2015 |
Leicester, UK | Connectivity measures for internet topologies on the level o ... | Erlebach, T., Moonen, L.S., et al. | Topology with Skitter | 2009-07 |
Glasgow, UK | Harnessing Internet topological stability in Thorup-Zwick co ... | Strowes, S.D., Perkins, C. | Topology with BGP | 2012-03 |
Ottawa, CA | A TCP connection establishment filter: symmetric connection ... | Whitehead, B., Lung, C.-H., et al. | Anonymized Internet Traces | 2007-06 |
Gainesville, FL, US | Per-flow cardinality measurement | Chen, S., Chen, M., et al. | Anonymized Internet Traces | 2017-00 |
Princeton, NJ, US | Counter-RAPTOR: Safeguarding Tor against active routing atta ... | Sun, Y., Edmundson, A., et al. | Topology with Archipelago | 2017-04 |
Beijing, CN | Backup routing for BGP: Virtual ring routing scheme | Shu, W., Changjia, C. | Topology with BGP | 2009-09 |
Cookeville, TN, US | A partitioning approach to scaling anomaly detection in grap ... | Eberle, W., Holder, L. | Topology with BGP | 2014-10 |
Lisboa, PT | A theory for the connectivity discovered by routing protocol ... | Sobrinho, J.L., Tiago Quelhas, T. | Topology with BGP | 2012-06 |
Princeton, NJ, US | Building efficient and reliable software-defined networks | Katta, N. | Anonymized Internet Traces | 2016-11 |
Changchun, CN | Improved SEIR viruses propagation model and the patch's impa ... | Ma, C., Yang, Y., et al. | UCSD Network Telescope | 2013-04 |
Hamburg, DE | Mobilitaet und Proximitaet in strukturierten Overlay-Netzen ... | Dramburg, M. | Topology with Skitter, Topology with Archipelago | 2008-08 |
Reno, NV, US | On the scalability of path exploration using opportunistic p ... | Karaoglu, H.T., Yuksel, M., et al. | Topology with BGP | 2011-06 |
Austin, TX, US | No direction home: The true cost of routing around decoys | Houmansadr, A., Wong, E.L., et al. | Topology with BGP | 2014-02 |
Liverpool, UK | Analysis and characterisation of botnet scan traffic | Marnerides, A., Mauthe, A. | UCSD Network Telescope | 2016-03 |
Hong Kong, CN | Toward high-performance distributed stream processing via ap ... | Huang, Q., Lee, P. | Anonymized Internet Traces | 2016-11 |
Halifax, CA | Botnet behaviour analysis: How would a data analytics-based ... | Haddadi, F., Heywood, A. | UCSD Network Telescope | 2017-05 |
Madrid, ES | Adaptive artificial immune networks for mitigating DoS flood ... | Vidal, J., Orozco, A., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2017-06 |
Boston, MA, US | An empirical validation of growth models for complex network ... | Mislove, A., Koppula, H.S., et al. | Topology with BGP | 2013-00 |
Zurich, CH | Bootstrapping real-world deployment of future Internet archi ... | Lee, T., Szalachowski, P., et al. | Topology with BGP | 2015-08 |
Hanoi, VN | Software defined networking-based one-packet DDoS mitigation ... | Huong, T., Thanh, N. | Anonymized Internet Traces | 2017-01 |
Vienna, AT | Modelling IP darkspace traffic by means of clustering techni ... | Iglesias, F., Zseby, T. | UCSD Network Telescope | 2014-10 |
Boston, MA, US | Detecting unusually-routed ASes: Methods and applications | Comarela, G., Terzi, E., et al. | Topology with BGP | 2016-11 |
Braga, PT | Multiadaptive sampling for lightweight network measurements | Silva, J.M.C., Lima, S.R. | Anonymized Internet Traces | 2012-07 |
Darmstadt, DE | Correlating network events and transferring labels in the pr ... | Abt, S., Baier, H. | Anonymized Internet Traces | 2016-10 |
Kent, OH, US | Metric tree-like structures in real-world networks: an empir ... | Abu-Ata, M., Dragan, F.F. | Topology with Skitter, Topology with BGP | 2015-08 |
Beijing, CN | Preventing Distributed Denial-of-Service Flooding Attacks Wi ... | Luo, H., Chen, Z., et al. | Topology with Archipelago, Anonymized Internet Traces | 2017 |
Debrecen, HU | Does the internet still demonstrate fractal nature? | Terdik, G., Gyires, T. | Anonymized Internet Traces | 2009-03 |
Rome, IT | On-the-fly statistical classification of internet traffic at ... | Baiocchi, A., Maiolini, G., et al. | Anonymized Internet Traces | 2008-10 |
Toulouse, FR | Some estimation problems in epidemic modeling | Dauxois, J., Nucit, A. | UCSD Network Telescope | 2017-03 |
Chungli, TW | RIHT: A novel hybrid IP traceback scheme | Yang, M.-H., Yang, M.-C. | Topology with Skitter | 2012-04 |
Baltimore, MD, US | One sketch to rule them all: Rethinking network flow monitor ... | Liu, Z., Manousis, A., et al. | Anonymized Internet Traces | 2016-08 |
Rochester, NY, US | Discovering collaborative cyber attack patterns using social ... | Du, H., Yang, S.J. | UCSD Network Telescope | 2011-03 |
Shenyang, CN | AS-level Internet macroscopic topology centralization evolve ... | Song, J., Zhao, H., et al. | Topology with Skitter | 2010-10 |
Los Angeles, CA, US | Are we one hop away from a better Internet? | Chiu, Y.-C., Schlinker, B., et al. | Topology with BGP | 2015-10 |
Victoria, BC, CA | Statistical assessment of sybil-placement strategies within ... | Arora, D., Verigin, A., et al. | Topology with Skitter | 2014-05 |
Barcalona, ES | Self-reliant detection of route leaks in inter-domain routin ... | Siddiqui, M.S., Montero, D., et al. | Topology with Archipelago | 2015-03 |
Sophia Antipolis, FR | On the dynamics of locators in LISP | Saucez, D., Donnet, B. | Topology with BGP | 2012-05 |
Fukuoka, JP | Research on Performance and Security Improvements by Softwar ... | Sahri, N. | Anonymized Internet Traces | 2016-04 |
Wright Patterson AFB, OH, US | Scalable wavelet-based active network stepping stone detecti ... | Gilbert, J. | Anonymized Internet Traces | 2012-03 |
Paderborn, DE | Picky: efficient and reproducible sharing of large datasets ... | Hintze, D, Rice, A. | Anonymized Internet Traces | 2016-09 |
Ramat-Gan, IL | Fragmentation considered vulnerable | Gilad, Y., Herzberg, A. | Anonymized Internet Traces | 2013-04 |
OR, US | A Survey of Techniques for Internet Topology Discovery | Motamedi, R., Rejaie, R., et al. | Topology with Skitter, Topology with Archipelago | 2015-05 |
Urbana, IL, US | SWIRL: A scalable watermark to detect correlated network flo ... | Houmansadr, A., Borisov, N. | Anonymized Internet Traces | 2011-02 |
Fort Collins, CO, US | Characterizing vulnerability to IP hijack attempts | Gersch, J., Massey, D. | Topology with BGP | 2013-11 |
Osaka, JP | Analyses of core-periphery structure in Internet's AS-level ... | Satake, K., Arakawa, S., et al. | Topology with BGP | 2016 |
Beijing, CN | FL-GUARD: A detection and defense system for DDoS attack in ... | Liu, J., Lai, Y., et al. | Denial of Service Attacks | 2017-03 |
Jorhat, IN | A systematic hands-on approach to generate real-life intrusi ... | Bhuyan, M., Bhattacharyya, D., et al. | Denial of Service Attacks | 2017-09 |
Orlando, FL, US | Impact of Internet exchange points on Internet topology evol ... | Ahmad, M.Z., Guha, R. | Topology with Skitter | 2010-10 |
Beijing, CN | Robust TCP reassembly with a hardware-based solution for bac ... | Yuan, R., Weibing, Y., et al. | Anonymized Internet Traces | 2010-07 |
Pullman, WA, US | TrustGuard: A flow-level reputation-based DDoS defense syste ... | Liu, H., Sun, Y., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2011-01 |
Paris, FR | Towards uncovering BGP hijacking attacks | Jacquement, Q. | Topology with Archipelago, Topology with BGP | 2015 |
Daejeon, KR | Unmasking the growing UDP traffic in a campus network | Lee, C., Lee, D.K., et al. | Anonymized Internet Traces | 2012-03 |
Rio de Janeiro, BR | A stateless traceback technique for identifying the origin o ... | Moreira, M.D.D., Laufer, R., et al. | Topology with Archipelago | 2011-06 |
Tokyo, JP | Towards interdomain transit traffic reduction in peer-assist ... | Asai, H., Esaki, H. | Topology with BGP | 2010-09 |
Berlin, DE | Towards better Internet citizenship: Reducing the footprint ... | Klick, J., Lau, S., et al. | Topology with BGP | 2016-11 |
North Brunswick, NJ, US | Edge-aware inter-domain routing for realizing next-generatio ... | Mukherjee, S., Sriram, S., et al. | Topology with Archipelago | 2017-07 |
Eugene, OR, US | https://onrg.cs.uoregon.edu/pub/CIS-TR-2014-02.pdf | Motamedi, R., Chandrasekaran, B., et al. | Topology with Skitter, Topology with Archipelago | 2014 |
Zhengzhou, CN | Network watermarking model based on optimization theory | Lei, C., Zhang, H., et al. | Anonymized Internet Traces | 2015-11 |
Hong Kong, CN | SketchVisor: Robust Network Measurement for Software Packet ... | Huang, Q., Lee, P., et al. | Anonymized Internet Traces | 2017-08 |
Belo Horizonte, BR | A Characterization of Load Balancing on the IPv6 Internet | Almeida, R., Fonseca, O., et al. | Topology with BGP | 2017 |
Philadelphia, PA, US | A fast algorithm for detecting anomalous changes in network ... | Huang, T., Sethu, H., et al. | Anonymized Internet Traces | 2015-11 |
Brisbane, AU | Ensemble-based DDoS detection and mitigation model | Bhatia, S., Schmidt, D., et al. | Denial of Service Attacks | 2012-10 |
Tehran, IR | Detecting Denial of Service attacks utilizing machine learni ... | Kahani, N., Shiry, S., et al. | Topology with Skitter | 2008-08 |
Pilani, IN | Big data analytics framework for peer-to-peer botnet detecti ... | Singh, K., Guntuku, S.C., et al. | UCSD Network Telescope | 2014-03 |
Toulouse, FR | Non-intrusive scheduling of TCP flows | Ayesta, U.; Bertaux, L.; Carvin, D. | Anonymized Internet Traces | 2015-05 |
Madrid, ES | Sistema de Deteccion de Ataques DDoS en Tor | Martin, J. | Denial of Service Attacks, Anonymized Internet Traces | 2015-00 |
Madrid, ES | BGP-XM: BGP eXtended multipath for transit Autonomous System ... | Camacho, J.M., Garcia-Martinez, A., et al. | Topology with BGP | 2013-03 |
Haifa, IL | Efficient detection of flow anomalies with limited monitorin ... | Moraney, J., Raz, D. | Anonymized Internet Traces | 2016-11 |
Berlin, DE | A multilayer graph model of the Internet topology | Tilch, G., Ermakova, T., et al. | Topology with Archipelago, Topology with BGP | 2017-10 |
Newcastle, UK | COTraSE Connection Oriented Traceback in Switched Ethernet | Andreou, M.S., van Moorsel, A. | Anonymized Internet Traces | 2009-00 |
Urbana, IL, US | Protecting anonymity in the presence of autonomous system an ... | Juen, J. | Topology with BGP | 2012-09 |
Newcastle upon Tyne, UK | COTraSE: Connection Oriented Traceback in Switched Ethernet | Andreou, M., Moorsel, A. | Topology with Skitter, Anonymized Internet Traces | 2008-09 |
Vigo, ES | A GI/G/1 model for 10 Gb/s energy efficient ethernet links | Herreria-Alonso, S., Rodriguez-Perez, M., et al. | Anonymized Internet Traces | 2012-11 |
Rome, IT | On the fly application flows identification by exploiting K- ... | Maiolini, G., Molina, G., et al. | Anonymized Internet Traces | 2009-00 |
Pohang, KR | Traffic dispersion graph based anomaly detection | Le, D.Q., Jeong, T., et al. | Denial of Service Attacks | 2011-10 |
Younstown, OH, US | Can we study the topology of the Internet from the vantage p ... | Drivere, A.A. | Topology with BGP | 2011-12 |
Baltimore, MD, US | Enabling a 'RISC' approach for Software-Defined Monitoring u ... | Liu, Z., Vorsanger, G., et al. | Anonymized Internet Traces | 2015-11 |
Beijing, CN | CCOF: Congestion control on the fly for inter-domain routing | Zhu, M., Liu, Y., et al. | Topology with BGP | 2014-05 |
Karachi, PK | Disjoint-path selection in Internet: What traceroutes tell u ... | Qazi, S., Moors, T. | Topology with BGP | 2014-05 |
Pisa, IT | DPI over commodity hardware: implementation of a scalable fr ... | De Sensi, D. | Anonymized Internet Traces | 2013-02 |
Madrid, ES | Towards high-performance network processing in virtualized e ... | Moreno, V., Leira, R., et al. | Anonymized Internet Traces | 2015-08 |
Toledo, OH, US | Distributed network traffic feature extraction for a real-ti ... | Karimi, A., Niyaz, Q., et al. | Denial of Service Attacks | 2016-05 |
Redmond, WA, US | How secure are secure interdomain routing protocols? | Goldberg, S., Schapira, M., et al. | Topology with BGP | 2010-10 |
Paris, FR | The named-object abstraction for realizing advanced mobility ... | Bronzino, F., Mukherjee, S., et al. | Topology with Archipelago | 2017-08 |
Tokyo, JP | Monitoring the dynamics of network traffic by recursive mult ... | Kato, M., Cho, K., et al. | Anonymized Internet Traces | 2012-10 |
Zurich, CH | Hijacking Bitcoin: Routing attacks on cryptocurrencies | Apostolaki, M., Zohar, A., et al. | Topology with Archipelago | 2017-06 |
Austin, TX, US | Flow migration on multicore network processors: Load balanci ... | Iqbal, M.F., Holt, J., et al. | Anonymized Internet Traces | 2013-10 |
Lexington, KY, US | The virtual network function placement problem | Li, X., Qian, C. | Anonymized Internet Traces | 2015-08 |
Athens, GR | Leveraging SDN for Efficient Anomaly Detection and Mitigatio ... | Giotis, K., Androulidakis, G., et al. | Denial of Service Attacks | 2014-09 |
Yokohama, JP | Fast target link flooding attack detection scheme by analyzi ... | Hirayama, T., Toyoda, K., et al. | Topology with BGP | 2015-11 |
Rochester, NY, US | Characterizing transition behaviors in Internet attack seque ... | Du, H., Yang, S.J. | UCSD Network Telescope | 2011-07 |
Singapore, SG | Top-k maximal influential paths in network data | Xu, E., Hsu, W., et al. | UCSD Network Telescope | 2012-09 |
Newark, DE, US | Transport layer reneging | Ekiz, N. | Anonymized Internet Traces | 2012-11 |
Shanghai, CN | Robustness of networks against cascading failures | Dou, B-L, Wang, X-G, et al. | Topology with BGP | 2010-05 |
Berlin, UK | Detection, classification, and analysis of inter-domain traf ... | Lichtblau, F., Streibeld, F., et al. | Topology with Archipelago | 2017-11 |
Newcastle, UK | Message traceback systems. Dancing with the devil | Andreou, M.S. | Topology with Skitter, Anonymized Internet Traces | 2009-09 |
Stony Brook, NY, US | Pipelining multicast scheduling in all-optical packet switch ... | Guo, Z., Yang, Y. | Anonymized Internet Traces | 2011-09 |
Stanford, CA, US | Using packet histories to troubleshoot networks | Handigol, N.A. | Anonymized Internet Traces | 2013-06 |
Fredericton, CA | An Evaluation Framework for Intrusion Detection Dataset | Gharib, A., Sharafaldin, I., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2016-12 |
St. Louis, MO, US | Exploiting locality to ameliorate packet queue contention an ... | Kumar, S., Maschmeyer, J., et al. | Anonymized Internet Traces | 2006-05 |
Gjovik, NO | Slow port scanning with Bro | Larsen, R. | Anonymized Internet Traces | 2013-11 |
Strasbourg, FR | Extracting intra-domain topology from mrinfo probing | Pansiot, J.-J., Merindol, P., et al. | Topology with BGP | 2010-04 |
Madrid, ES | The role of topology and contracts in Internet content deliv ... | Hasan, S.A.U. | Topology with BGP | 2016-06 |
Los Angeles, CA, US | Observing the evolution of internet as topology | Oliveira, R., Zhang, B., et al. | Topology with Skitter | 2007-08 |
Bogota, CO | Evaluacion de desempeno de diversas arquitecturas de commuta ... | Moreno, S.D.B. | Anonymized Internet Traces | 2011-12 |
London, UK | Revisiting the issues on netflow sample and export performan ... | Haddadi, H., Landa, R., et al. | Anonymized Internet Traces | 2007-04 |
Paris, FR | Deployment of an algorithm for large-scale topology discover ... | Donnet, B., Raoult, P., et al. | Topology with Skitter | 2006-12 |
San Francisco, CA, US | Data-driven large scale network-layer Internet simulation | Canbaz, M.A. | Topology with Archipelago | 2016 |
Beijing, CN | AMIR: Another multipath interdomain routing | Qin, D., Yang, J., et al. | Topology with BGP | 2012-03 |
Livermore, CA, US | Tracking network events with Write Optimized Data Structures ... | Donoghue, N., Hahn, B., et al. | UCSD Network Telescope | 2015-11 |
Paris, FR | Towards Uncovering BGP Hijacking Attacks | Jacquemart, Q. | Topology with Archipelago | 2016 |
Haifa, IL | The Bloom paradox: When not to use a Bloom filter? | Rottenstreich, O., Keslassy, I. | Anonymized Internet Traces | 2012-03 |
Doha, QA | Design and implementation of a stateful network packet proce ... | Vasiliadis, G., Koromilas, L., et al. | Anonymized Internet Traces | 2017-02 |
Tel-Aviv, IL | Near-deterministic inference of AS relationships | Shavitt, Y., Shir, E., et al. | Topology with BGP | 2009-06 |
Edinburgh, UK | Empirical evaluation of data transformations for network inf ... | Fenacci, D., Franke, B. | Topology with Archipelago, Anonymized Internet Traces | 2010-07 |
Pittsburgh, PA | Routing bottlenecks in the Internet - causes, exploits, and ... | Kang, M.S., Gligor, V.D. | Topology with Archipelago, Topology with BGP | 2014-05 |
Changsha, CN | Evaluation of prefix hijacking impact based on hinge-transmi ... | Yujing, L., Bofeng, Z., et al. | Topology with BGP | 2010-11 |
Botanicka, CZ | A performance benchmark for NetFlow data analysis on distrib ... | Cermak, M., Tovarnak, D., et al. | Anonymized Internet Traces | 2016-07 |
Pittsburgh, PA, US | Toward representative Internet measurements | Akella, A., Seshan, S., et al. | Topology with Skitter | 2004-00 |
Lyon, FR | Evaluation of an end-to-end delay estimation in the case of ... | Nguyen, H., Begin, T., et al. | Anonymized Internet Traces | 2016-10 |
Paris, FR | Autour du caractere arborescent d'Internet | de Montgolfier, F., Soto, M., et al. | Topology with Skitter | 2010-10 |
Ramat-Gan, IL | Off-path hacking: the illusion of challenge-response authent ... | Gilad, Y., Herzberg, A., et al. | Anonymized Internet Traces | 2013-10 |
Santa Maria, BR | Deteccao de DDoS Atraves da Analise da Recorrencia Baseada n ... | Righi, M., Nunes, R. | Denial of Service Attacks, Anonymized Internet Traces | 2015-11 |
Berlin, DE | Topological analysis of cloud service connectivity | Fabian, B., Baumann, A., et al. | Topology with Archipelago | 2015-06 |
Melbourne, AU | Mark-aided distributed filtering by using neural network for ... | Xiang, Y., Zhou, W. | Topology with Skitter | 2005-11 |
Melbourne, AU | Relay node selection in large-scale VoIP overlay networks | Bui, Q.D., Jennings, A. | Topology with BGP | 2009-07 |
Coimbatore, IN | Evaluating machine learning algorithms for detecting DDoS at ... | Suresh, M., Anitha, R. | UCSD Network Telescope | 2011-06 |
Singapore, SG | Labeling and Encoding Hierarchical Addressing for Scalable I ... | Wang, F., Shao, X., et al. | Topology with Archipelago | 2017 |
Tokyo, JP | Cache-based network processor architecture: evaluation with ... | Okuno, M., Nishimura, S., et al. | Anonymized Internet Traces | 2006-11 |
Yogakarta, ID | Deteksi serangan DDoS menggunakan neural network dengan fung ... | Muhammad, A., Riadi, I., et al. | Denial of Service Attacks | 2017-01 |
Berlin, DE | Protecting DNS from routing attacks: a comparison of two alt ... | Avramopoulos, I., Suchara, M. | Topology with BGP | 2009-09 |
Stanford, CA, US | I know what your packet did last hop: Using packet histories ... | Handigol, N., Heller, B., et al. | Anonymized Internet Traces | 2014-04 |
Hong Kong, CN | Towards an adaptive packet marking scheme for IP traceback | Yan, P., Lee, M. | Topology with Skitter | 2006-00 |
Nanjing, CN | Equalized Interval Centroid Based Watermarking Scheme for St ... | Xu, X., Zhang, J., et al. | Anonymized Internet Traces | 2016-06 |
Rome, IT | Supporting the Web with an information centric network that ... | Detti, A., Pomposini, M., et al. | Anonymized Internet Traces | 2012-08 |
Hamburg, DE | On the correlation of geographic and network proximity at in ... | Schmidt, T.C., Wahlisch, M., et al. | Topology with Skitter | 2007-04 |
Amarah, IQ | Social network behaviour inferred from O-D pair traffic | Albdair, M., Addie, R., et al. | Anonymized Internet Traces | 2017-06 |
Beijing, CN | Experimental study on diversity and novelty of interdomain p ... | Qin, D., Yang, J., et al. | Topology with BGP | 2013-01 |
Munich, DE | Interactive visualization of global routing dynamics | Helminger, M. | Topology with BGP | 2011-06 |
West Lafayette, IN, US | Security and economic implications of localizing traffic in ... | Seibert, J. | Topology with BGP | 2012-05 |
Beijing, CN | Inferring the average as path length of the Internet | Wang, C., Li, Z., et al. | Topology with BGP | 2016 |
Pasadena, CA, US | Distributed Optimization and Data Market Design | London, P. | Topology with BGP | 2017 |
Newark, NJ, US | A practical and robust inter-domain marking scheme for IP tr ... | Gao, Z., Ansari, N. | Topology with Skitter | 2007_02 |
New Haven, CT, US | A flow- and packet-level model of the Internet | Venkataramanan, R., Jeong, M.-W., et al. | Anonymized Internet Traces | 2011-07 |
Caparica, PT | Inter-domain traffic engineering using an AS-level multipath ... | Amaral, P., Silva, E., et al. | Topology with BGP | 2011-06 |
Stockholm, SE | Coordinated selfish distributed caching for peering content- ... | Pacifici, V., Dan, G. | Topology with BGP | 2016 |
New Delhi, IN | Ratio threshold queries over distributed data sources | Gupta, R., Ramamritham, K., et al. | UCSD Network Telescope | 2010-03 |
Munich, DE | A hardware packet re-sequencer unit for network processors | Meitinger, M., Ohlendorf, R., et al. | Anonymized Internet Traces | 2008-02 |
Los Angeles, CA, US | Tradeoffs in CDN designs for throughput oriented traffic | Yu, M., Jiang, W., et al. | Topology with Archipelago | 2012-12 |
Rochester, NY, US | ISP tiered model based architecture for routing scalability | Nozaki, Y., Tuncer, H., et al. | Topology with BGP | 2012-05 |
Waterford, IE | QoSPlan: A measurement based quality of service aware networ ... | Davy, A., Jennings, B., et al. | Anonymized Internet Traces | 2012-06 |
Atlanta, GA, US | RouteSeer: Topological placement of nodes in service overlay ... | Srinivasan, S., Zegura, E. | Topology with Skitter | 2006-00 |
Pittsburgh, PA, US | Pi: a path identification mechanism to defend against DDoS a ... | Yaar, A., Perrig, A., et al. | Topology with Skitter | 2003-05 |
Rome, IT | Progressive damage assessment and network recovery after mas ... | Ciavarella, S., Bartolini, N., et al. | Topology with Archipelago | 2017-05 |
Blacksburg, VA, US | Attack diagnosis: throttling distributed denial-of-service a ... | Chen, R., Park, J.-M. | Topology with Skitter | 2005-10 |
Madrid, ES | Multi-granular, multi-purpose and multi-Gb/s monitoring on ... | Moreno, V., Santiado del Rio, P.M., et al. | Anonymized Internet Traces | 2014-07 |
Paris, FR | Relevance of massively distributed explorations of the inter ... | Guillaume, J.-L., Latapy, M., et al. | Topology with Skitter | 2006-11 |
Davis, CA, US | Characterizing and improving distributed Network-based Intru ... | Proebstel, E. | Anonymized Internet Traces | 2008-00 |
Shenzhen, CN | Dynamic ring for seamless mobility in identity centric netwo ... | Li, D., Sha, W. | Topology with Skitter | 2015-07 |
La Jolla, CA, US | Mechanisms for generating realistic annotated Internet topol ... | Mahadevan, P. | Topology with Skitter | 2007-01 |
Cookeville, TN, US | Incremental anomaly detection in graphs | Eberle, W., Holder, L. | Topology with BGP | 2013-12 |
Amherst, MA, US | Quantifying AS Path Inflation by Routing Policies | Gao, Q., Wang, F., et al. | Topology with Archipelago | 2016 |
Ikoma, JP | An implementation of a hierarchical IP traceback architectur ... | Oe, M., Kadobayashi, Y., et al. | Topology with Skitter | 2004-01 |
Louvain-la-Neuve, BE | Unveiling the MPLS Structure on Internet Topology | Revelo, D., Ricci, M.A., et al. | Topology with BGP | 2016 |
Manouba, TN | A traffic coherence analysis model for DDoS attack detection | Rahmani, H., Sahli, N., et al. | UCSD Network Telescope, Anonymized Internet Traces | 2009-07 |
Bloomington, IN, US | Mitigating bandwidth-exhaustion attacks using congestion puz ... | Wang, X., Reiter, M. | Topology with Skitter | 2004-00 |
Zhongli, TW | Toward hardware support for a flexible sketch-based network ... | Wellem, T., Lai, Y.-K., et al. | Anonymized Internet Traces | 2016-05 |
Tokyo, JP | COSMO - Emulation of Internet traffic (poster abstract) | Miyamoto, D., Miyachi, T. | Topology with BGP | 2013-03 |
Beijing, CN | Exploring possible strategies for competitions between Auton ... | Li, L., Chen, C. | Topology with BGP | 2008-05 |
Rennes, FR | PTPv2-based metwork load estimation | Frangoudis, P.A., Ksentini, A., et al. | Anonymized Internet Traces | 2013-09 |
Evanston, IL, US | Where the sidewalk ends: extending the internet as graph usi ... | Chen, K., Choffnes, D.R., et al. | Topology with BGP | 2009-12 |
Enschede, NL | A hybrid procedure for efficient link dimensioning | Schmidt, R., Sadre, R., et al. | Anonymized Internet Traces | 2014-07 |
Los Angeles, CA, US | Re-evaluating measurement algorithms in software | Alipourfard, O., Moshref, M., et al. | Anonymized Internet Traces | 2015-11 |
Austin, TX, US | Building and maintaining overlay networks for bandwidth-dema ... | Kim, M.S. | Topology with Skitter | 2005-08 |
Beijing, CN | Detecting flooding DDoS under flash crowds based on Mondrian ... | Sun, D., Yang, K., et al. | Denial of Service Attacks | 2017-00 |
Seoul, KR | A Novel Hybrid Flow-Based Handler with DDoS Attacks in Softw ... | Phan, T., Bao, N., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2016-07 |
Fukuoka, JP | Adaptive Query Rate for Anomaly Detection with SDN | Sahri, N., Okamura, K. | Anonymized Internet Traces | 2016-06 |
Madrid, ES | Towards an energy efficient 10 Gb/s optical ethernet: Perfor ... | Larrabeiti, D., Reviriego, P., et al. | Anonymized Internet Traces | 2011-07 |
Rio de Janeiro, BR | ANALYSIS OF THE DEGREE RANKING STABILITY IN SCALE-FREE NETWO ... | Machado, F.F. | Topology with BGP | 2016 |
Tel-Aviv, IL | Near-deterministic inference of AS relationships | Weinsberg, U., Shavitt, Y., et al. | Topology with BGP | 2009-04 |
Newark, NJ, US | A proactive test based differentiation to mitigate low rate ... | Shevtekar, A., Ansari, N. | Anonymized Internet Traces | 2007-08 |
Barcelona, ES | Hidden geometric correlations in real multiplex networks | Kleineberg, K.-K., Boguna, M., et al. | Topology with Archipelago | 2016-07 |
Beijing, CN | Ultra-Fast Bloom Filters using SIMD techniques | Lu, J., Wan, Y., et al. | Anonymized Internet Traces | 2017-06 |
Changsha, CN | Assessing resilience of inter-domain routing system under re ... | Liu, Y., Peng, W., et al. | Topology with Archipelago, Topology with BGP | 2016-04 |
Osaka, JP | CCN economics: Can ISPs profit by introducing CCN? | Kamiyama, N. | Topology with BGP | 2014-11 |
Shenyang, CN | A power-law approach on router-level internet macroscopic to ... | Xu, Y., Zhang, W. | Topology with BGP | 2009-06 |
Jiangsu, CN | Sample and Fetch-Based Large Flow Detection Mechanism in Sof ... | Xing, C; Ding, K., Hu, et al. | Anonymized Internet Traces | 2016-06 |
Darling Heights, AU | Inference of social network behavior from Internet traffic t ... | Albdair, M., Addie, R., et al. | Anonymized Internet Traces | 2016-12 |
Boston, MA, US | On the geographic location of internet resources | Lakhina, A., Byers, J.W., et al. | Topology with Skitter | 2003-08 |
Tianjin, CN | An efficient framework for parallel and continuous frequent ... | Zhang, Y., Sun, Y., et al. | Anonymized Internet Traces | 2013-12 |
Beijing, CN | Power-proportional router: Architectural design and experime ... | Liu, B., Lu, J., et al. | Anonymized Internet Traces | 2014-05 |
Albuquerque, NM, US | Internet topology over time | Edwards, B., Hofmeyr, S., et al. | Topology with BGP | 2012-02 |
Miami, FL, US | Leveraging symbiotic relationship between simulation and emu ... | Erazo, M.A., Liu, J. | Anonymized Internet Traces | 2013-05 |
Kyoto, JP | Anti-RAPTOR: Anti routing attack on privacy for a securer an ... | Hoang, N.P., Asano, Y., et al. | Topology with BGP | 2015-07 |
Palo Alto, CA, US | Hey, you darned counters!: get off my ASIC! | Mogul, J.C., Congdon, P. | Anonymized Internet Traces | 2012-08 |
Shenyang, CN | On an IBA topology model for internet topology structure | Xu, Y., Wang, Z. | Topology with Skitter | 2010-06 |
Urbana, IL, US | Per-flow cardinality estimation based on virtual LogLog sket ... | Zhou, Z. | Anonymized Internet Traces | 2016-00 |
Liaoning, CN | Routing-policy aware peering for large content providers | Gao, Q., Wang, F., et al. | Topology with Archipelago | 2015 |
Brescia, IT | An SMV-based approach to traffic classification | Este, A., Gringoli, F., et al. | Anonymized Internet Traces | 2008-00 |
Torino, IT | ICE buckets: improved counter estimation for network measure ... | Einziger, G., Fellman, B., et al. | Anonymized Internet Traces | 2016-06 |
Dresden, DE | Local-ring network automata and the impact of hyperbolic geo ... | Muscoloni, A., Cannistraci, C.V. | Topology with BGP | 2017 |
Harbin, CN | Feature selection for optimizing traffic classification | Zhang, H., Lu, G., et al. | Anonymized Internet Traces | 2012-04 |
Cleveland, OH, US | Small-world characteristics of internet topologies and impli ... | Jin, S., Bestavros, A. | Topology with Skitter | 2006-04 |
Paris, FR | Measuring fundamental properties of real-world complex netwo ... | Latapy, M., Magnien, C. | Topology with Skitter | 2006-09 |
Reno, NV, US | Analyzing router responsiveness to active measurement probes | Gunes, M.H., Sarac, K. | Topology with Skitter | 2009-03 |
Haifa, IL | Hash tables with finite buckets are less resistant to deleti ... | Kanizo, Y., Hay, D., et al. | Anonymized Internet Traces | 2010-09 |
Madrid, ES | Efficient implementation of error correction codes in hash t ... | Reviriego, P., Pontarelli, S., et al. | Anonymized Internet Traces | 2014-01 |
Madrid, ES | Energy efficient exact matching for flow identification with ... | Reviriego, P., Pontarelli, S., et al. | Anonymized Internet Traces | 2014-05 |
Beijing, CN | Modeling the IPv6 internet AS-level topology | Xiao, B., Liu, L., et al. | Topology with Skitter | 2009-02 |
Haifa, IL | The Bloom paradox: When not to use a Bloom filter | Rottenstreich, O., Keslassy, I. | Anonymized Internet Traces | 2011-06 |
Barcelona, ES | Tight bounds for sketches in traffic validation | Lopez, E., Navarro, L. | Anonymized Internet Traces | 2017-05 |
Arlington, TX, US | Dovetail: stronger anonymity in next-generation Internet rou ... | Sankey, J., Wright, M. | Topology with BGP | 2014-07 |
Paris, FR | Violation of interdomain routing assumptions | Mazloum, R., Buob, M.-O., et al. | Topology with BGP | 2014-03 |
Monterey, CA, US | High-frequency mapping of the IPv6 Internet using Yarrp | Gaston, E.W. | Topology with Archipelago | 2017 |
Haifa, IL | Analyzing Internet routing security using model checking | Sosnovich, A., Grumberg, O., et al. | Topology with BGP | 2015-11 |
Hong Kong, CN | Achieving high-bitrate overlay live streaming with proxy hel ... | Ren, D., Chan, S.G. | Topology with Archipelago | 2012-05 |
Richardson, TX, US | An experimental study on inter-domain routing dynamics using ... | Ahmed, N., Sarac, K. | Topology with BGP | 2015-10 |
Irvine, CA, US | Towards unbiased BFS sampling | Kurant, M., Markopoulou, A. | Topology with BGP | 2011-10 |
Enschede, NL | A study of impacts of flow timeouts on link provisioning | Fokkema, J. | Anonymized Internet Traces | 2013-06 |
Rome, IT | The CONET solution for information centric networking | Blefari-Melazzi, N., Cancellieri, M., et al. | Anonymized Internet Traces | 2012-01 |
Olso, NO | Development and experimentation of TCP initial window functi ... | Barik, R., Divakaran, D.M. | Anonymized Internet Traces | 2014-12 |
Santa Clara, CA, US | Dapper: Data plane performance diagnosis of TCP | Ghasemi, M., Benson, T., et al. | Anonymized Internet Traces | 2017-04 |
Pittsburgh, PA, US | Designing a global authentication infrastructure | Matsumoto, S., Reischuk, R.M., et al. | Topology with BGP | 2015-06 |
Durgapur, IN | MLP-GA based algorithm to detect application layer DDoS atta ... | Singh, K., De, T. | Denial of Service Attacks | 2017-10 |
Monterey, CA, US | Toward a robust method of presenting a rich, interconnected ... | West, A. | Topology with Archipelago | 2015-03 |
London, UK | Identifiability of link metrics based on end-to-end path mea ... | Ma, L., He, T., et al. | Topology with Archipelago | 2013-10 |
Enschede, NL | Gaussian traffic revisited | Schmidt, R., Sadre, R., et al. | Anonymized Internet Traces | 2013-05 |
Assam, IN | Information metrics for low-rate DDoS attack detection: A co ... | Bhuyan, M.H., Bhattacharyya, D.K., et al. | Denial of Service Attacks | 2014-08 |
Ghaziabad, IN | IPv4 to IPv6 shift: major challenges | Verma, H., Yadav, B., et al. | Anonymized Internet Traces | 2012-04 |
Amritsar, IN | Inter-domain routing with shielded infrastructure and buzzer ... | Kaur, B., Kahlon, K.S., et al. | Topology with BGP | 2013-07 |
Washington, DC, US | Avoiding the Man on the Wire: Improving Tor's security with ... | Johnson, A., Jansen, R., et al. | Topology with BGP | 2015-11 |
Massachusetts, US | Botnet detection using social graph analysis | Wang, J., Paschalidis, I.C. | Denial of Service Attacks | 2014-07-08 |
Jilin City, CN | A novel two-step traceback scheme for DDoS attacks | Qu, Z., Huang, C., et al. | Topology with Skitter | 2008-12 |
Zaragoza, ES | Improving network efficiency with Simplemux | Saldana, J., Forcen, I., et al. | Anonymized Internet Traces | 2015-10 |
Brisbane, AU | Parametric differences between a real-world Distributed Deni ... | Bhatia, S., Mohay, G., et al. | Denial of Service Attacks | 2011-08 |
Monterey, CA, US | Log analysis using Splunk Hadoop Connect | Chainourov, B. | Anonymized Internet Traces | 2017-06 |
Madrid, ES | Four years tracking unrevealed topological changes in the af ... | Fanou, R., Francois, P., et al. | Topology with BGP | 2017 |
Beijing, CN | Evaluating and optimizing IP lookup on many core processors | He, P., Guan, H., et al. | Anonymized Internet Traces | 2012-08 |
West Lafayette, IN, US | A framework for efficient class-based sampling | Saxena, M., Kompella, R. | Anonymized Internet Traces | 2009-04 |
Beijing, CN | A backscatter technology based study on source address spoof ... | Li, P., Bi, J., et al. | UCSD Network Telescope | 2008-00 |
Bandung, IN | Statistical analysis on aggregate and flow based traffic fea ... | Purwanto, Y., Kuspriyanto, Hendrawan, et al. | Denial of Service Attacks | 2015-11 |
Hong Kong, CN | Performance evaluation of a queue fed by a Poisson Lomax bur ... | Chen, J., Addie, R.G., et al. | Anonymized Internet Traces | 2015-03 |
Austin, TX, US | Efficient traffic aware power management in multicore commun ... | Iqbal, M.F., John, L.K. | Anonymized Internet Traces | 2012-10 |
London, UK | Criticisms of modelling packet traffic using long-range depe ... | Clegg, R., Landa, R., et al. | Anonymized Internet Traces | 2011-09 |
Takizawa, JP | A defense method against Distributed Slow HTTP DoS attack | Hirakawa, T., Ogura, K., et al. | UCSD Network Telescope | 2016-09 |
Santa Clara, CA, US | Stitching Inter-Domain Paths over IXPs | Kotronis, V., Kloti, R., et al. | Topology with BGP | 2016 |
Los Angeles, CA, US | DREAM: Dynamic Resource Allocation for Software-defined Meas ... | Moshref, M., Yu, M., et al. | Anonymized Internet Traces | 2014-08 |
Seoul, KR | AS-level topology collection through looking glass servers | Khan, A., Kwon, T., et al. | Topology with Archipelago | 2013-10 |
Goettingen, DE | AS path inference: From complex network perspective | Tao, N., Chen, X., et al. | Topology with BGP | 2015-05 |
Zurich, CH | Augmenting home routers for socially-aware traffic managemen ... | Lareida, A., Petropoulos, G., et al. | Topology with BGP | 2015-10 |
Tirupati, IN | A Model for Generating Synthetic Network Flows and Accuracy ... | Rao, M., Naidu, M. | Anonymized Internet Traces | 2017-04 |
Darmstadt, DE | DeNASA: Destination-Naive AS-Awareness in Anonymous Communic ... | Barton, A., Wright, M. | Topology with BGP | 2016 |
Pittsburgh, PA, US | StackPi : a new defense mechanism against IP spoofing and DD ... | Motamedi, R., Chandrasekaran, B., et al. | Topology with Skitter | 2003-00 |
New Delhi, IN | Qi points : placing decoy routers in the internet | Gosain, D., Agarwal, A., et al. | Topology with Archipelago, Topology with BGP | 2016 |
Gif sur Yvette, FR | Internet topology on as-level: Model, generation methods and ... | Tomasik, J., Weisser, M.-A. | Topology with Archipelago, Topology with BGP | 2011-01 |
London, UK | Analyzing and modelling the AS-level Internet topology | Zhou, S., Mondragon, R. | Topology with Skitter | 2003-06 |
Syracuse, NY, US | A model for recursive propagations of reputations in social ... | Lee, J.Y., Oh, J.C. | Topology with BGP | 2013-08 |
Conway, AR, US | TTL based Packet Marking for IP traceback | Paruchuri, V., Durresi, A., et al. | Topology with Skitter | 2008-12 |
Seoul, KR | Scalable Bandwidth Shaping Scheme via Adaptively Managed Par ... | Kim, T., Lim, J., et al. | Anonymized Internet Traces | 2017-07 |
Boston, MA, US | Virtual landmarks for the internet | Tang, L., Crovella, M. | Topology with Skitter | 2003-10 |
London, UK | Forecasting full-path network congestion using one bit signa ... | Woldeselassie, M., Clegg, R., et al. | Anonymized Internet Traces | 2010-07 |
Rourkela, IN | Shuffling based mechanism for DDoS prevention on cloud envir ... | Sharma, S. | Denial of Service Attacks, Anonymized Internet Traces | 2015-05 |
Barcelona, ES | Reinventing NetFlow for OpenFlow Software-Defined Networks | Varela, J., Ros, P. | Anonymized Internet Traces | 2017-02 |
Hong Kong, CN | Coding and replication co-design for interactive multiview v ... | Huang, H., Zhang, B., et al. | Topology with Archipelago | 2012-03 |
Boston, MA, US | Hardware-Software Co-Design for Network Performance Measurem ... | Narayana, S., Sivaraman, A., et al. | Anonymized Internet Traces | 2016-11 |
North Brunswick, NJ, US | PISA: Automatic extraction of traffic signatures | Chhabra, P., John, A., et al. | UCSD Network Telescope | 2005-05 |
Minneapolis, MN, US | Privacy-Preserving Interdomain Routing at Internet Scale | Asharov, G., Demmler, D., et al. | Topology with BGP | 2017 |
Ottawa, CA | Resource optimization of TCAM-based SDN measurements via dim ... | Abada, A. | Anonymized Internet Traces | 2016-06 |
Changsha, CN | Whom to convince? It really matters in BGP prefix hijacking ... | Liu, Y., Dai, B., et al. | Topology with BGP | 2011-06 |
Lexington, KY, US | On the scalability of interdomain path computations | Ascigil, O., Calvert, K.L., et al. | Topology with BGP | 2014-06 |
Orlando, FL, US | Evaluating end-user network benefits of peering with path la ... | Ahmad, M.Z., Guha, R. | Topology with BGP | 2012-07 |
Irbid, JO | Identifying cyber-attacks on software defined networks: An i ... | AlEroud, A., Alsmadi, I. | Denial of Service Attacks | 2017-02 |
Toledo, OH, US | Normal and anomalous traffic flow pattern analysis for organ ... | Rahmat, S., Niyaz, Q., et al. | Denial of Service Attacks | 2017-04 |
Tokyo, JP | Analysis of diagnostic capability for hijacked route problem | Akashi, O; Fukuda, K., Hirotsu, et al. | Topology with Skitter | 2007-10 |
Tokyo, JP | Incentive mechanism for prompting ISPs to implement outbound ... | Takahashi, Y., Ishibashi, K. | Topology with BGP | 2011-10 |
Kansas City, MO, US | Quantile sampling for practical delay monitoring in Internet ... | Choi, B., Moon, S., et al. | Topology with Skitter | 2007-07 |
Leipzig, DE | CORIA - Analyzing internet connectivity risks using network ... | Fabian, B., Baumann, A., et al. | Topology with Archipelago | 2017-05 |
Haifa, IL | The variable-increment counting Bloom filter | Rottenstreich, O., Keslassy, I. | Anonymized Internet Traces | 2010-00 |
Pisa, IT | Energy driven adaptivity in stream parallel computations | Danelutto, M., De Sensi, D., et al. | Anonymized Internet Traces | 2015-00 |
Pittsburgh, PA, US | Modeling adoptability of secure BGP protocols | Chan, H., Dash, D., et al. | Topology with Archipelago | 2006-09 |
Urbana, IL, US | Preventing encrypted traffic analysis | Schear, N. | Anonymized Internet Traces | 2011-01 |
Redmond, WA, US | Bias reduction in traceroute sampling - Towards a more accur ... | Flaxman, A., Vera, J. | Topology with Skitter | 2007-12 |
Forth, GR | Re-mapping the Internet: Bring the IXPs into Play | Sermpezis, P., Nomikos, G., et al. | Topology with Archipelago, Topology with BGP | 2017 |
Austin, TX, US | Detecting overlapping temporal community structure in time-e ... | Chen, Y., Kawadia, V., et al. | Topology with Skitter | 2013-03 |
Ipswich, UK | Chinese Internet AS-level topology | Zhou, S., Zhang, G.-Q. | Topology with Skitter | 2007-04 |
Barcelona, ES | Self-managed resources in network virtualisation environment ... | Mijumbi, R., Serrat, J., et al. | Anonymized Internet Traces | 2015-05 |
Jinan, CN | An Entropy-Based Distributed DDoS Detection Mechanism in Sof ... | Wang, R., Jia, Z., et al. | Denial of Service Attacks | 2015-08 |
Beijing, CN | Flattening and preferential attachment in the Internet evolu ... | Li, M., Wang, H., et al. | Topology with BGP | 2012-09 |
Nara, JP | A Proposal of Estimation Method of Consumed Memory Amount by ... | Masatoshi, E., Hayama, H., et al. | Topology with BGP | 2015 |
Shenyang, CN | The study on characteristics of the coreness of router-level ... | Zhang, J., Zhao, H., et al. | Topology with Skitter | 2008-07 |
Jorhat, IN | Practical tools for attackers and defenders | Bhuyan, M., Bhattacharyya, D., et al. | Denial of Service Attacks | 2015-09 |
Budapest, HU | Adaptive IP mutation: A proactive approach for defending aga ... | Lin, C., Wu, C., et al. | UCSD Network Telescope | 2016-09 |
Ann Arbor, MI, US | A brave new world: Studies on the deployment and security of ... | Czyz, J.J. | Topology with Archipelago | 2016-06 |
Vigo, ES | Optimizing Dual-Mode EEE Interfaces: Deep-Sleep is Healthy | Alonso, S., Perez, M., et al. | Anonymized Internet Traces | 2017-05 |
Beijing, CN | BAH: A Bitmap Index Compression Algorithm for Fast Data Retr ... | Li, C., Chen, Z., et al. | Anonymized Internet Traces | 2016-11 |
Assam, IN | An empirical evaluation of information metrics for low-rate ... | Bhuyan, M.H., Bhattacharyya, D.K., et al. | Denial of Service Attacks | 2014-08 |
Montreal, CA | Fingerprinting Internet DNS Amplification DDoS Activities | Fachkha, C., Bou-Harb, E., et al. | Denial of Service Attacks | 2014-03-04 |
Munich, DE | FlexPath NP - flexible, dynamically reconfigurable processin ... | Ohlendorf, R., Meitinger, M., et al. | Anonymized Internet Traces | 2010-03 |
Manouba, TN | Joint entropy analysis model for DDoS attack detection | Rahmani, H., Sahli, N., et al. | UCSD Network Telescope, Anonymized Internet Traces | 2009-08 |
Beijing, CN | DIMR: Disjoint Interdomain Multipath Routing | Yin, X., Wu, D., et al. | Topology with BGP | 2015-07 |
Victoria, BC, CA | Statistical assessment of peer-to-peer botnet features | Godkin, T. | Topology with Skitter | 2013-04 |
Nathan, AU | Flow-based anomaly detection using semisupervised learning | Jadidi, Z., Muthukkumarasamy, V., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2015-12 |
Paris, FR | IDRD: Enabling inter-domain route diversity | Misseri, X., Gojmerac, I., et al. | Topology with BGP | 2013-06 |
Kyoto, JP | Towards an Autonomous System Monitor for Mitigating Correlat ... | Hoang, N.P. | Topology with BGP | 2016 |
San Diego, CA, US | Automatically inferring patterns of resource consumption in ... | Estan, C., Savage, S., et al. | Anonymized Internet Traces | 2003-08 |
Beijing, CN | Revisiting the rich club of the Internet AS-level topology | Wang, Y., Bi, J., et al. | Topology with Skitter, Topology with Archipelago | 2013-01 |
Pullman, WA, US | A collaborative defense framework against DDoS attacks in ne ... | Liu, H. | Denial of Service Attacks, Anonymized Internet Traces | 2013-05 |
Zhongli, TW | Hardware-assisted estimation of entropy norm for high-speed ... | Lai, Y., Wellem, T., et al. | Anonymized Internet Traces | 2014-11 |
Linkoping, SE | PrefiSec: A distributed alliance framework for collaborative ... | Hiran, R., Carlsson, N., et al. | Topology with BGP | 2014 |
Tezpur, IN | UDP Flooding attack detection using information metric measu ... | Boro, D., Basumatary, H., et al. | Anonymized Internet Traces | 2016-02 |
Paris, FR | Exact and approximate algorithms for computing the hyperboli ... | Cohen, N., Couderty, D., et al. | Topology with BGP | 2012-09 |
Pittsburgh, PA | Sanctuary trail: refuge from Internet DDoS entrapment | Hsiao, H.-C., Kim, T., et al. | Topology with BGP | 2012-06 |
Baghdad, IQ | A modified DBSCAN clustering algorithm for proactive detecti ... | Al-mamory, S., Algelal, S. | Denial of Service Attacks | 2017-03 |
Monteluco di Roio, IT | Partially dynamic efficient algorithms for distributed short ... | Ciceronea, S., D'Angelo, G., et al. | Topology with Archipelago | 2010-02 |
Stockholm, SE | Ads versus Regular Contents: Dissecting the Web Hosting Ecos ... | Bangera, P., Gorinsky, S. | Topology with BGP | 2017 |
Chatham Maritime, UK | Simulation of zero-day worm epidemiology in the dynamic, het ... | Tidy, L.J., Woodhead, S., et al. | UCSD Network Telescope | 2013-10 |
Ithaca, NY, US | Towards precise network measurements | Lee, K. | Anonymized Internet Traces | 2017-01 |
Babil, IQ | A proactive DDoS detection approach using data mining cluste ... | Bhaya, W., Manaa, M.E. | Denial of Service Attacks | 2014-11 |
Atlanta, GA, US | Non-crypto hardware hash functions for high performance netw ... | Hua, N., Norige, E., et al. | Anonymized Internet Traces | 2011-10 |
Redmond, WA, US | Can internet video-on-demand be profitable? | Huang, C., Li, J., et al. | Topology with BGP | 2007-00 |
Budapest, HU | Deductive way of reasoning about the Internet AS level topol ... | Szabo, D., Korosi, A., et al. | Topology with BGP | 2015-10 |
Aalto, FI | Efficient methods on reducing data redundancy in the Interne ... | Saha, S. | Topology with Skitter | 2015-10 |
Dubai, AE | Improved Calculation of aS Resilience against IP Prefix Hija ... | Wubbeling, M., Meier, M. | Topology with BGP | 2016 |
San Diego, CA, US | Realistic and responsive network traffic generation | Vishwanath, K., Vahdat, A. | Anonymized Internet Traces | 2006-10 |
Beijing, CN | CAMP: A New Bitmap Index for Data Retrieval in Traffic Archi ... | Wu, Y., Chen, Z., et al. | Anonymized Internet Traces | 2016-04 |
Pittsburgh, PA, US | NetMemex: Providing full-fidelity traffic archival | Lim, H., Sekar, V., et al. | Anonymized Internet Traces | 2016-03 |
San Antonio, TX, US | A statistical framework for analyzing cyber attacks | Zhan, Z. | UCSD Network Telescope | 2014-05 |
Halifax, CA | On the analysis of backscatter traffic | Balkanli, E., Zincir-Heywood, A.N. | UCSD Network Telescope | 2014-09 |
Ames, IO, US | Techniques for online analysis of large distributed data | Singh, S.A. | Anonymized Internet Traces | 2015-00 |
Lancaster, UK | It Bends But Would It Break? Topological Analysis of BGP Inf ... | Frey, S., Elkhatib, Y., et al. | Topology with BGP | 2016-03 |
Orlando, FL, US | CAR: Cloud-Assisted Routing | Dey, P., Yuksel, M. | Anonymized Internet Traces | 2016-11 |
Sydney, AU | MCAD: Multiple connection based anomaly detection | He, X., Parameswaran, S. | UCSD Network Telescope | 2008-11 |
Changsha, CN | Analysis of prefix hijacking based on AS hierarchical model | Zhang, B.-F., Li, Y., et al. | Topology with BGP | 2011-09 |
St. Louis, MO, US | Machine learning for anomaly detection and categorization in ... | Salman, T., Bhamare, D., et al. | Denial of Service Attacks | 2017-06 |
Yokohama, JP | Performance evaluation of host-based mobility management sch ... | Erunika, O., Kaneko, K., et al. | Topology with BGP | 2015-03 |
Atlanta, GA, US | Empowering bystanders to facilitate Internet censorship meas ... | Burnett, S.R. | Topology with Archipelago, UCSD Network Telescope | 2014-07 |
Halifax, CA | Supervised learning to detect DDoS attacks | Balkanli, E., Alves, J., et al. | UCSD Network Telescope | 2014-12 |
Orlando, FL, US | Analysing global triangle inequality violations due to Inter ... | Ahmad, M.Z., Guha, R. | Topology with Archipelago | 2012-10 |
London, UK | A large-scale zero-day worm simulator for cyber-epidemiologi ... | Tidy, L., Woodhead, S., et al. | UCSD Network Telescope | 2013-02 |
Rome, IT | Measuring route diversity in the internet from remote vantag ... | Di Menna, A., Refice, T., et al. | Topology with BGP | 2009-05 |
Bangkok, TH | A study of autonomous system relationships within Thailand | Siritana, H., Kitisin, S., et al. | Topology with BGP | 2011-05 |
Beijing, CN | A lightweight DDoS flooding attack detection algorithm based ... | Li, C., Yang, J., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2015-12 |
Southampton, UK | Symmetry in complex networks | MacArthur, B.D., Sanchez-Garcia, R.J., et al. | Topology with BGP | 2008-11 |
Guildford, UK | Policy-aware virtual relay placement for inter-domain path d ... | Guo, T., Wang, N., et al. | Topology with BGP | 2010-08 |
Ghent, BE | Availability analysis of resilient geometric routing on Inte ... | Sahhaf, S., Tavernier, W., et al. | Topology with BGP | 2014-04 |
Minneapolis, MI, US | New attacks on timing-based network flow watermarks | Lin, Z, Hopper, N. | Anonymized Internet Traces | 2012-08 |
Fort Collins, CO, US | Characterizing International BGP Detours | Shah, A., Papadopoulos, C. | Topology with BGP | 2015 |
Beijing, CN | Mitigating the table-overflow attack in Software-Defined Net ... | Xu, T., Gao, D., et al. | Topology with Archipelago, Anonymized Internet Traces | 2017-10 |
Kuala Lumpur, MY | Revolutionizing the inter-domain business model by informati ... | Feng, Z., Xu, M., et al. | Topology with BGP | 2016 |
Beijing, CN | On monitoring and predicting mobile network traffic abnormal ... | Lai, Y., Chen, Y., et al. | UCSD Network Telescope, Denial of Service Attacks | 2015-01 |
Delft, NL | Quantifying the spectrum of Denial-of-Service attacks throug ... | Blenn, N., Ghiette, V., et al. | UCSD Network Telescope | 2017-08 |
Shenyang, CN | Collapse by cascading failures in hybrid attacked regional I ... | Xu, Y., Wang, Z. | Topology with Archipelago | 2012-04 |
Halifax, NS, CA | Feature selection for robust backscatter DDoS detection | Balkanli, E., Zincir-Heywood, A.N., et al. | UCSD Network Telescope, Denial of Service Attacks | 2015-10 |
Leuven, BE | On the impact of clustering on measurement reduction | Saucez, D., Donnet, B., et al. | Topology with Archipelago | 2009-05 |
Beijing, CN | Measuring the impacts of sampling bias on internet AS-level ... | Zhang, G. | Topology with BGP | 2009-03 |
San Diego, CA, US | New directions in traffic measurement and accounting | Estan, C., Varghese, G. | Anonymized Internet Traces | 2002-10 |
Kapurthala, IN | Discriminating flash events from DDoS Attacks: A comprehensi ... | Behal, S., Kumar, K., et al. | Denial of Service Attacks | 2017-09 |
Warsaw, PL | On the design of energy-efficient service rate control mecha ... | Karpowicz, M. | Anonymized Internet Traces | 2013-09 |
Barcelona, ES | Adaptive shared-state sampling | Raspall, F., Sallent, S. | Anonymized Internet Traces | 2008-00 |
Melbourne, AU | Adapting router buffers for energy efficiency | Vishwanath, A., Sivaraman, V., et al. | Anonymized Internet Traces | 2011-12 |
Halifax, NS, CA | Deterministic flow marking for IPv6 traceback (DFM6) | Aghaei-Foroushani, V., Zincir-Heywood, A.N. | Anonymized Internet Traces | 2015-11 |
Madrid, ES | Obscure giants: detecting the provider-free ASes | Hasan, S., Gorinsky, S. | Topology with BGP | 2012-05 |
Dubai, AE | On the Analysis of Internet Paths with DisNETPerf, a Distrib ... | Wassermann, S., Casas, P., et al. | Topology with BGP | 2016 |
Budapest, HU | An information-theoretic approach to routing scalability | Retvari, G., Szabo, D., et al. | Topology with BGP | 2014-10 |
Atlanta, GA | Graph analysis combining numerical, statistical, and streami ... | Fairbanks, J. | Anonymized Internet Traces | 2016-05 |
Berlin, DE | In search for an appropriate granularity to model routing po ... | Muehlbauer, W., Uhlig, S., et al. | Topology with BGP | 2007-10 |
Nantes, FR | Efficiently summarizing data streams over sliding windows | Rivetti, N., Busnel, Y., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2015-09 |
Indore, IN | An event based technique for detecting spoofed IP packets | Hubballi, N., Tripathi, N. | Denial of Service Attacks | 2016-08 |
Seoul, KR | Adaptive suspicious prevention for defending DoS attacks in ... | Dao, N.-N., Kim, J., et al. | Anonymized Internet Traces | 2016-08 |
Harbin, CN | Parallelizing weighted frequency counting in high-speed netw ... | Zhang, Y., Fang, B.X., et al. | Anonymized Internet Traces | 2010-04 |
Cape Town, ZA | DDoS defence for service availability in cloud computing | Osanaiye, O.A. | Denial of Service Attacks | 2016-07 |
Monterey, CA, US | IPv6 network infrastructure and stability inference | Mosley, L.D. | Topology with Archipelago | 2014-09 |
Ningbo, CN | A hash-based path identification scheme for DDoS attacks def ... | Jin, G., Zhang, F., et al. | Topology with Skitter | 2009-10 |
Osaka, JP | A provider and peer selection policy for the future sustaina ... | Nakata, Y., Arakawa, S., et al. | Topology with BGP | 2015-01 |
Trier, DE | TopGen - internet router-level topology generation based on ... | Scholtes, I., Botev, J., et al. | Topology with Skitter | 2008-03 |
Stuttgart, DE | EmuFog: Extensible and scalable emulation of large-scale fog ... | Mayer, R., Graser, L., et al. | Topology with Archipelago | 2017-09 |
Braga, PT | Automated and distributed network service monitoring | Germoglio, G., Dias, B., et al. | Topology with Archipelago | 2009-09 |
Atlanta, GA, US | Scalable hash-based IP traceback using rate-limited Probabil ... | Sung, M., Chiang, J., et al. | Topology with Skitter | 2006-00 |
Riverside, CA, US | Long-range dependence: ten years of Internet traffic modelin ... | Karagiannis, T., Molle, M., et al. | Anonymized Internet Traces | 2004-09 |
Changsha, CN | Study on IP prefix hijacking in cloud computing networks bas ... | Liu, Y., Peng, W., et al. | Topology with BGP | 2011-11 |
Paris, FR | A TCP delay-based mechanism for detecting congestion in the ... | Dassouki, K., Debar, H., et al. | Denial of Service Attacks | 2013-06 |
Fujimino, JP | AS alliance: cooperatively improving resilience of intra-all ... | Hei, Y., Nakao, A., et al. | Topology with BGP | 2008-12 |
Berkeley, CA, US | Future architectures for middlebox processing services on th ... | Sherry, J. | Topology with Archipelago, Topology with BGP | 2012-12 |
Halifax, CA | TDFA: Traceback-based defense against DDoS flooding attacks | Aghaei-Foroushani, V., Zincir-Heywood, A.N. | Denial of Service Attacks, Anonymized Internet Traces | 2014-05 |
Montreal, CA | Darknet as a source of cyber intelligence: Survey, taxonomy, ... | Fachkha, C., Debbabi, M. | UCSD Network Telescope | 2016-05 |
Berlin, DE | Beyond counting: New perspectives on the active IPv4 address ... | Richter, P., Smaragdakis, G., et al. | Topology with Archipelago | 2016-11 |
Munich, DE | Efficient simulation of large-scale P2P networks: modeling n ... | Kunzmann, G., Nagel, R., et al. | Topology with Skitter | 2007-02 |
Anandapur, IN | Spread of information in a social network using influential ... | Chaudhury, A., Basuchowdhuri, P., et al. | Topology with BGP | 2012-05 |
Berkeley, CA, US | Bridging the software/hardware forwarding divide | Moon, D., Naous, J., et al. | Anonymized Internet Traces | 2010-00 |
Durgapur, IN | Mathematical modelling of DDoS attack and detection using co ... | Singh, K.J., De, T. | Denial of Service Attacks | 2017-09 |
San Diego, CA, US | iPlane Nano: path prediction for peer-to-peer applications | Madhyastha, H.V., Katz-Bassett, E., et al. | Topology with Skitter | 2009-04 |
Baltimore, MD, US | Fast and evasive attacks: highlighting the challenges ahead | Rajab, M., Monrose, F., et al. | UCSD Network Telescope | 2006-09 |
Beaune, FR | Router in Internet with fifteen entries | Gavoille, C., Glacet, C., et al. | Topology with BGP | 2015 |
Minneapolis, MN, US | E-embargoes: Discouraging the deployment of traffic manipula ... | Schuchard, M., Hopper, N. | Topology with BGP | 2016-06 |
Baghdad, IQ | DDoS attack detection approach using an efficient cluster an ... | Bhaya, W., Manaa, M.E. | Denial of Service Attacks, Anonymized Internet Traces | 2017-03 |
Chapel Hill, NC, US | Empirical study of the impact of sampling timescales and str ... | Shriram, A., Kaur, J. | Anonymized Internet Traces | 2006-04 |
Wuhan, CN | Safeguard information infrastructure against DDos attacks: E ... | Zhu, X., Wang, S., et al. | Topology with Skitter | 2005-12 |
Grahamstown, ZA | High level internet scale traffic visualization using Hilber ... | Irwin, B., Pilkington, N. | UCSD Network Telescope | 2008-05 |
Brescia, IT | IP traffic classification for QoS guarantees: the independen ... | Dusi, M., Gringoli, F., et al. | Anonymized Internet Traces | 2008-08 |
Aalto, FI | Predictive models of network traffic load | Pouzols, F.M., Lopez, D.R., et al. | Anonymized Internet Traces | 2011-00 |
Louvain, BE | Revisiting flow-based load balancing: Stateless path selecti ... | Detal, G., Paasch, C., et al. | Anonymized Internet Traces | 2012-12 |
Munich, DE | Reducing data center resource over-provisioning through dyna ... | Oeldemann, A., Wild, T., et al. | Anonymized Internet Traces | 2017-04 |
Paris, FR | Efficient route tracing from a single source | Donnet, B., Raoult, P., et al. | Topology with Skitter | 2006-05 |
Pisa, IT | AS-Level Topology Discovery: Measurement strategies tailored ... | Gregori, E., Lenzini, L., et al. | Topology with BGP | 2017-08 |
Poznan, PL | Statistical and signal-based network traffic recognition for ... | Choras, M., Saganowski, L., et al. | UCSD Network Telescope | 2011-01 |
Barcelona, ES | Towards a NetFlow implementation for OpenFlow software-Defin ... | Varela, J., Ros, P. | Anonymized Internet Traces | 2017-09 |
Enschede, NL | Model-checking mean-field models: algorithms and application ... | Kolesnichenko, A. | UCSD Network Telescope | 2014-12 |
University Park, PA, US | Estimating systematic risk in real-world networks | Laszka, A., Johnson, B., et al. | Topology with BGP | 2014-03 |
Beijing, CN | A hardware-based TCP stream state tracking and reassembly so ... | Zhao, Y., Yuan, R., et al. | Anonymized Internet Traces | 2012-06 |
Minhsiung, TW | A virtual service framework for service composition QoS base ... | Wu, M.-F., Jiang, T.M., et al. | Topology with Archipelago | 2008-12 |
Florianopolis, BR | Jumpstarting BGP Security with Path-End Validation | Cohen, A., Gilad, Y., et al. | Topology with BGP | 2016 |
Joondalup WA, AU | Intelligent network intrusion detection using an evolutionar ... | Rastegari, S. | Denial of Service Attacks | 2015-12 |
Madrid, ES | Increasing the MTU size for energy efficiency in ethernet | Reviriego, P., Sanchez-Macian, A., et al. | Anonymized Internet Traces | 2010-06 |
Dubai, AE | Reverse Traceroute with DisNETPerf, a Distributed Internet P ... | Wassermann, S., Casas, P. | Topology with BGP | 2016 |
Boston, MA, US | Measuring and applying invalid SSL certificates: The silent ... | Chung, T., Liu, Y., et al. | Topology with BGP | 2016-11 |
Beijing, CN | Stream data analysis for backbone network intrusion detectio ... | Xiaojuan, S., Bin, L. | Anonymized Internet Traces | 2012-09 |
Princeton, NJ, US | CacheFlow: Dependency-Aware Rule-Caching for Software-Define ... | Katta, N., Alipourfard, O., et al. | Anonymized Internet Traces | 2016-03 |
Ningbo, CN | A Pi2HC mechanism against DDoS attacks | Jin, G., Li, Y., et al. | Topology with Skitter | 2008-08 |
Zurich, CH | SIBRA: Scalable Internet Bandwidth Reservation Architecture | Basescu, C., Reischuk, R.M., et al. | Topology with BGP, Anonymized Internet Traces | 2015-10 |
San Diego, CA, US | The power of slicing in internet flow measurement | Kompella, R., Estan, C. | Anonymized Internet Traces | 2005-10 |
Hatfield, UK | A chi-square testing-based intrusion detection model | Abouzakhar, N.S., Bakar, A. | UCSD Network Telescope | 2010-09 |
Zurich, CH | Towards a BitTorrent Weather Forecast | Bublitz, S. | Topology with BGP | 2017 |
Liege, BE | Through the Wormhole: Tracking Invisible MPLS Tunnels | Vanaubel, Y., Merindol, P., et al. | Topology with Archipelago | 2017-11 |
Cadiz, ES | Multiresolution Matrix Compression | Teneva, N., Mudrakarta, P.K., et al. | Topology with BGP | 2016 |
Atlanta, GA, US | ISP and egress path selection for multihomed networks | Dhamdhere, A., Dovrolis, C. | Topology with Skitter | 2006-00 |
Syracuse, NY, US | A node-centric reputation computation algorithm on online so ... | Lee, J.Y., Oh, J.C. | Topology with BGP | 2015-05 |
Monterey, CA, US | Discovery of IPv6 router interface addresses via heuristic m ... | Gray, M.D. | Topology with Archipelago | 2015-09 |
London, UK | Redundancy and robustness of AS-level Internet topology and ... | Zhou, S., Mondragon, R.J. | Topology with Skitter | 2004-02 |
London, UK | On the relationship between fundamental measurements in TCP ... | Clegg, R.G., Araujo, J.T., et al. | Anonymized Internet Traces | 2013-06 |
Liege, BE | Network fingerprinting: TTL-based router signatures | Vanaubel, Y., Pansiot, J.-J., et al. | Topology with Archipelago | 2013-10 |
Washington DC, US | Users get routed: Traffic correlation on Tor by realistic ad ... | Johnson, A., Wacek, C., et al. | Topology with Archipelago, Topology with BGP | 2013-11 |
Boston, MA, US | Characterization of Evolving Networks for Cybersecurity | Namayanja, J., Janeja, V. | Anonymized Internet Traces | 2016-10 |
Aveiro, PT | Topological implications of cascading interdomain bilateral ... | Jesus, V., Aguiar, R.L., et al. | Topology with Archipelago | 2011-10 |
Atlanta, GA, US | Understanding the Mirai Botnet | Antonakakis, M., April, T., et al. | Topology with BGP | 2017-08 |
Seoul, KR | Fast detection and visualization of network attacks on paral ... | Choi, H., Lee, H., et al. | UCSD Network Telescope | 2008-07 |
Sevilla, ES | Linguistic summarization of network traffic flows | Pouzols, F.M., Barriga, A., et al. | Anonymized Internet Traces | 2008-06 |
Seoul, KR | A dynamic path identification mechanism to defend against DD ... | Lee, G., Lim, H., et al. | Topology with Skitter | 2004-00 |
Princeton, NJ, US | Inter-AS traffic patterns and there implications | Fang, W., Peterson, L. | Anonymized Internet Traces | 1999-12 |
Lyon, FR | Traffic classification techniques supporting semantic networ ... | Gremillet, O., Goncalves, P., et al. | Anonymized Internet Traces | 2010-06 |
Riverside, CA, US | Traffic-aware power optimization for network applications on ... | Kuang, J., Bhuyan, L., et al. | Anonymized Internet Traces | 2012-06 |
Cambridge, MA, US | Integrated Information as a Metric for Group Interaction: An ... | Engel, D., Malone, W. | Anonymized Internet Traces | 2017-02 |
Kuala Lumpur, MY | Co-FQL: Anomaly detection using cooperative fuzzy Q-learning ... | Shamshirband, S., Daghighi, B., et al. | Denial of Service Attacks | 2015-01 |
Evanston, IL, US | On the eyeshots of BGP vantage points | Chen, K., Hu, C., et al. | Topology with BGP | 2010-03 |
Halifax, NS, CA | Probabilistic flow marking for IP traceback (PFM) | Aghaei-Foroushani, V., Zincir-Heywood, A.N. | Denial of Service Attacks, Anonymized Internet Traces | 2015-10 |
Los Angeles, CA, US | Reducing dynamic power dissipation in pipelined forwarding e ... | Jiang, W., Prasanna, V.K. | Anonymized Internet Traces | 2009-10 |
College Station, TX, US | Stream Aggregation Through Order Sampling | Duffield, N., Xu, Y., et al. | Anonymized Internet Traces | 2017-03 |
Richardson, TX, US | Measuring path divergence in the Internet | Ahmed, N., Kamil, Sarac | Topology with BGP | 2014-12 |
Wellington, NZ | Martingale limit theorems of divisible statistics in a multi ... | Wu, H., Kvizhinadze, G. | Topology with BGP | 2011-03 |
Atlanta, GA, US | The economics of internet peering interconnections | Lodhi, A.H. | Topology with BGP | 2014-11 |
College Park, MD, US | Characterizing the dynamical importance of network nodes and ... | Restrepo, J.G., Ott, E., et al. | Topology with BGP | 2006-09 |
Washington, DC, US | Representing network trust and using it to improve anonymous ... | Jaggard, A.D., Johnson, A., et al. | Topology with Archipelago, Topology with BGP | 2014-06 |
Queensland, AR | A framework for generating realistic traffic for Distributed ... | Bhatia, S., Schmidt, D., et al. | Denial of Service Attacks | 2014-02 |
Natal, BR | Minimization and placement of sensors in structurally observ ... | Medeiros, J.P.S., Motta Pires, P.S., et al. | Topology with Archipelago | 2015-10 |
Beijing, CN | Passive IP Traceback: disclosing the locations of IP spoofer ... | Yao, G., Bi, J., et al. | UCSD Network Telescope | 2015-01 |
Haifa, IL | Randomized Admission Policy for Efficient Top-k and Frequenc ... | Basat, R., Einziger, G., et al. | Anonymized Internet Traces | 2016-12 |
Pisa, IT | The impact of the access point power model on the energy-eff ... | Garroppo, R.G., Nencioni, G., et al. | Anonymized Internet Traces | 2016-01 |
Brno, CZ | Evolution of cache replacement policies to track heavy-hitte ... | Zadnik, M., Canini, M. | Anonymized Internet Traces | 2010-10 |
College Station, TX, US | Stochastic pre-classification for Software Defined Firewalls | Ghoshal, P., Casey, C.J., et al. | Anonymized Internet Traces | 2013-07 |
Beijing, CN | A2C: Anti-attack counters for traffic measurement | He, K., Hu, C., et al. | Anonymized Internet Traces | 2010-12 |
Monterey, CA, US | Yarrp'ing the Internet: Randomized high-speed active topolog ... | Beverly, R. | Topology with Archipelago | 2016-11 |
Berkeley, CA, US | Netcalls: End host function calls to network traffic process ... | Sherry, J., Kim, D., et al. | Topology with BGP | 2012-07 |
Urbana, IL, US | Cirripede: Circumvention Infrastructure using Router Redirec ... | Houmansadr, A., Nguyen, G.T.K., et al. | Anonymized Internet Traces | 2011-10 |
Wenzhou, CN | A DDoS-oriented distributed defense framework based on edge ... | Bi, X., Tan, W., et al. | Topology with Skitter | 2008-10 |
Beijing, CN | Anonymity-Based Privacy Preserving Network Data Publication | Liu, P., Li, Y., et al. | Anonymized Internet Traces | 2016-08 |
New Delhi, IN | Statistical-based filtering system against DDOS attacks in c ... | Shamsolmoali, P., Zareapoor, M. | Denial of Service Attacks | 2014-07 |
London, UK | Patterns and anomalies in k-cores of real-world graphs with ... | Shin, K., Rad, T., et al. | Topology with BGP | 2017 |
Philadelphia, PA, US | Accountability in distributed systems with incomplete inform ... | Zhao, M. | Topology with BGP | 2016 |
Berkeley, CA, US | Towards an accurate AS-level traceroute tool | Mao, Z., Rexford, J., et al. | Topology with Skitter | 2003-08 |
Wuhan, CN | Hyperbolic mapping of complex networks based on community in ... | Wang, Z., Li, Q., et al. | Topology with Archipelago | 2016 |
London, UK | BGPfuse: using visual feature fusion for the detection and a ... | Papadopoulos, S., Theodoridis, G., et al. | Topology with BGP | 2013-10 |
Heraklion, GR | ITA: Innocuous topology awareness for unstructured P2P netwo ... | Papadakis, H., Fragopoulou, P., et al. | Topology with Archipelago, Topology with BGP | 2012-05 |
Beer-Sheva, IL | Collaborative attack on internet users' anonymity | Puzis, R., Yagil, D., et al. | Topology with BGP | 2009-00 |
Vigo, ES | Bounded energy consumption with dynamic packet coalescing | Herreria-Alonso, S., Rodriguez-Perez, M., et al. | Anonymized Internet Traces | 2012-06 |
Iztapalapa, MX | A performance comparison of Chord and Kademlia DHTs in high ... | Medrano-Chavez, A.G., Perez-Cortes, E., et al. | Topology with Skitter | 2014-06 |
Beirut, LB | Hop count variability | Mukaddam, A., ELHajj, I. | Topology with Skitter | 2011-12 |
Turin, IT | Router-level community structure of the Internet Autonomous ... | Beiro, M.G.; Grynberg, S.P.; Alvarez-Hamelin, J.I. | Topology with Archipelago | 2015-08 |
Mobile, AL, US | Measuring the variability of CAIDA internet traffic traces | Lazarou, G., Alam, M., et al. | Anonymized Internet Traces | 2016-12 |
Urbana, IL, US | Non-blind watermarking of network flows | Houmansadr, A., Kiyavash, N., et al. | Anonymized Internet Traces | 2012-03 |
Shenyang, CN | Analysis on traveling time of internet | Li, C., Zhao, H., et al. | Topology with Archipelago | 2007-00 |
Potsdam, GE | On the extent of correlation in BGP updates in the Internet ... | Sapegin, A., Uhlig, S. | Topology with Archipelago | 2013-09 |
Ultimo, AU | Network timing and the 2015 leap second | Veitch, D., Vijayalayan, K. | Topology with Archipelago | 2016-03 |
Newark, DE, US | Misbehaviors in TCP SACK generation | Ekiz, N., Rahman, A.H., et al. | Anonymized Internet Traces | 2011-04 |
Nairobi, KE | Detecting scanning computer worms using machine learning and ... | Ochieng, N., Ismail, A., et al. | UCSD Network Telescope | 2017-03 |
Haifa, IL | Tapping into the Router's Unutilized Processing Power | Radan, M., Keslassy, I. | Anonymized Internet Traces | 2015 |
Barcelona, ES | Latency estimation of IP flows using NetFlow | Santiago, S.S. | Anonymized Internet Traces | 2013-06 |
Paris, FR | The inframetric model for the internet | Fraigniaud, P., Febhar, E., et al. | Topology with Skitter | 2008-04 |
Shijiazhuang, CN | Combating good point set scanning-based self-learning worms ... | Wang, F., Zhang, Y., et al. | UCSD Network Telescope | 2013-01 |
Nanjing, CN | Estimating the persistent spreads in high-speed networks | Xiao, Q., Qiao, Y., et al. | Anonymized Internet Traces | 2014-10 |
Paris, FR | What is the real size of a sampled network? The case of the ... | Viger, F., Barrat, A., et al. | Topology with Skitter | 2007-05 |
Xiamen, CN | A blind detection method for tracing the real source of DDoS ... | Chen, Y., Chen, X., et al. | Denial of Service Attacks | 2016-06 |
New York, NY, US | On the emergence of highly variable distributions in the aut ... | Fayed, M., Krapivsky, P., et al. | Topology with BGP | 2003 |
Atlanta, GA, US | A topological analysis of monitor placement | Jackson, A., Milliken, W., et al. | Topology with Skitter | 2007-06 |
Atlanta, GA, US | Measuring network-aware worm spreading ability | Chen, Z., Ji, C. | UCSD Network Telescope | 2007-05 |
Changsha, CN | An efficient algorithm for AS path inferring | Yang, G., Dou, W. | Topology with BGP | 2009-08 |
Pittsburgh, PA, US | StegoTorus: a camouflage proxy for the Tor anonymity system | Weinberg, Z., Wang, J., et al. | Anonymized Internet Traces | 2012-10 |
Hampton, VA, US | A fluid-based approach for modeling network activities | Hu, Y.-H. | Anonymized Internet Traces | 2013-08 |
Seattle, WA, US | Confidence-weighted marginal utility analyses for improved i ... | Prince, C., Wyatt, D. | Topology with Skitter | 2004-12 |
Pittsburgh, PA, US | Toward a highly available future Internet | Hsiao, H.-C. | Topology with Skitter, Topology with BGP, Anonymized Internet Traces | 2014-06 |
Rochester, NY, US | Probabilistic modeling and inference for obfuscated network ... | Du, H. | UCSD Network Telescope | 2014-08 |
Newark, NJ, US | A router-based technique to mitigate reduction of quality (R ... | Shevtekar, A., Ansari, N. | Anonymized Internet Traces | 2008-04 |
Buenos Aires, AR | A low complexity visualization tool that helps to perform co ... | Beiro, M.G., Alvarez-Hamelin, J.I., et al. | Topology with Skitter | 2008-12 |
Washington, DC, US | 2001-2013: Survey and analysis of major cyberattacks | Vaidya, T. | UCSD Network Telescope | 2015-07 |
Belgaum, IN | DDOS attack detection based on an ensemble of neural classif ... | Kale, M., Choudhari, D.M. | UCSD Network Telescope | 2014-07 |
Victoria, CA | Anomaly detection systems for Distributed Denial of Service ... | Raza, A. | Denial of Service Attacks | 2017-02 |
Ithaca, NY, US | Random graph models for dynamic networks | Zhang, X., Moore, C., et al. | Topology with BGP | 2016 |
Riverside, CA, US | Putting the links together: Measurements and impact | He, Y., Siganos, G., et al. | Topology with Skitter | 2006-00 |
London, UK | Challenges in the capture and dissemination of measurements ... | Clegg, R.G., Withall, M.S., et al. | Anonymized Internet Traces | 2009-06 |
Rio de Janeiro, BR | ECO-ALOC: Energy-efficient resource allocation for cluster-b ... | Fragni, C., Costa, L.H.M.K. | Anonymized Internet Traces | 2012-06 |
Brno, CZ | Performance measurement of stream data processing in Apache ... | Halas, F. | Anonymized Internet Traces | 2017-00 |
Athens, GR | Comparative assessment of centrality indices and implication ... | Nomikos, G., Pantazopoulos, P., et al. | Topology with Archipelago | 2014-09 |
Amherst, MA, US | Multiple random walks to uncover short paths in power law ne ... | Ribeiro, B., Basu, P., et al. | Topology with BGP | 2012-03 |
Urbana, IL, US | Preventing SSL traffic analysis with realistic cover traffic | Schear, N., Borisov, N. | Anonymized Internet Traces | 2009-11 |
Paris, FR | Describing and simulating internet routes | Leguay, J., Latapy, M., et al. | Topology with Skitter | 2007-06 |
Wurzburg, DE | Wurzburger Beitrage zur Leistungsbewertung Verteilter System ... | Burger, V. | Topology with BGP | 2017-08 |
Cambridge, MA, US | Distributed Caching Algorithms for Interconnected Operator C ... | Pacifici, V., Dan, G. | Topology with BGP | 2017 |
Madrid, ES | Reducing the cost of implementing error correction codes in ... | Reviriego, P., Pontarelli, S., et al. | Anonymized Internet Traces | 2013-07 |
Beijing, CN | Security technologies of SINET | Zhang, H., Su, W., et al. | Denial of Service Attacks | 2016-10 |
Kent, OH, US | COMPUTING TOP-K CLOSENESS CENTRALITY IN UNWEIGHTED UNDIRECTE ... | Al-Baghdadi, A. | Topology with BGP | 2017 |
Madrid, ES | Economics of traffic attraction by transit providers | Bangera, P., Gorinsky, G. | Topology with BGP | 2014-06 |
Ramat-Gan, IL | Bandwidth Distributed Denial of Service: Attacks and defense ... | Geva, M., Herzberg, A., et al. | Topology with BGP | 2014-01 |
Madrid, ES | Internet traffic classification for high-performance and off ... | Santiago del Rio, P.M. | Anonymized Internet Traces | 2013-05 |
Monterey, CA, US | Correlating inferred data plane IPv6 reboot events with cont ... | Marcisak, S. | Topology with Archipelago | 2016-03 |
Brescia, IT | Quantifying the accuracy of the ground truth associated with ... | Dusi, M., Gringoli, F., et al. | Anonymized Internet Traces | 2011-04 |
Tucson, AZ, US | IMap: Visualizing network activity over Internet maps | Fowler, J; Johnson, T; Simonetto, P; Lazos, et al. | Topology with Archipelago, UCSD Network Telescope | 2014-11 |
Gent, BE | Challenges for orchestration and instance selection of compo ... | Simoens, P., Herzeele, L.V., et al. | Topology with Archipelago | 2015-05 |
Nanjing, CN | Online identification of Tor anonymous communication traffic | He, G.-F., Yang, M., et al. | Anonymized Internet Traces | 2013-03 |
Athens, GR | A reputation-based collaborative schema for the mitigation o ... | Giotis, K., Apostolaki, M., et al. | Topology with BGP, Denial of Service Attacks | 2016-04 |
Philadelphia, PA, US | MAP-IT: Multipass accurate passive inferences from tracerout ... | Marder, A., Smith, J.M. | Topology with Archipelago, Topology with BGP | 2016-11 |
Ilmenau, DE | Automatic creation of VPN backup paths for improved resilien ... | Grey, M., Rossberg, M., et al. | Topology with BGP | 2012-03 |
Seattle, WA, US | Understanding BGP misconfiguration | Mahajan, R., Wetherall, D., et al. | Topology with Skitter | 2002-10 |
Edinburgh, UK | High-fidelity per-flow delay measurements with reference lat ... | Lee, M., Duffield, N., et al. | Anonymized Internet Traces | 2013-10 |
Paris, FR | Efficient algorithms for large-scale topology discovery | Donnet, B., Raoult, P., et al. | Topology with Skitter | 2005-06 |
Paris, FR | Characterisation of AS-level path deviations and multipath i ... | Elena, E., Rougier, J., et al. | Topology with BGP | 2010-07 |
Trondheim, NO | Reliable broadcast contribution over the public Internet | Markman, M.A.J., Tokheim, S. | Anonymized Internet Traces | 2012-06 |
Haifa, IL | Estimators also need shared values to grow together | Tsidon, E., Hanniel, I., et al. | Anonymized Internet Traces | 2012-03 |
Hamburg, DE | What is happening from behind?: Making the impact of interne ... | Wahlisch, M., Schmidt, T.C., et al. | Topology with Skitter, Topology with Archipelago | 2008-00 |
Kista, SE | Observing software-defined networks using a decentralized li ... | Steinert, R., Hess, A. | Anonymized Internet Traces | 2015-04 |
Pittsburgh, PA, US | Monitoring stealthy diffusion | Haghtalab, N., Laszka, A., et al. | Topology with BGP | 2017-09 |
Barcalona, ES | Route leak detection using real-time analytics on local BGP ... | Siddiqui, M.S., Montero, D., et al. | Topology with Archipelago | 2014-12 |
Seattle, WA, US | The impact of DHT routing geometry on resilience and proximi ... | Gummadi, K., Gummadi, R., et al. | Topology with Skitter | 2003-08 |
Beijing, CN | An accurate distributed scheme for detection of prefix inter ... | Li, S., Duan, H., et al. | Topology with BGP | 2016-05 |
Kansas City, MO, US | Practical delay monitoring for ISPs | Choi, B., Moon, S., et al. | Topology with Skitter | 2005-00 |
Chennai, IN | Suspicious score based mechanism to protect web servers agai ... | Saravanan, R., Loganathan, S., et al. | Denial of Service Attacks | 2017-04 |
Ames, IA, US | Affecting IP traceback with recent Internet topology maps | Martins, O.A. | Topology with Skitter | 2005-06 |
Ramat-Gan, IL | Socket overloading for fun and cache-poisoning | Herzberg, A., Shulman, H. | Anonymized Internet Traces | 2013-12 |
Durgapur, IN | Entropy-based application layer DDoS attack detection using ... | Singh, K., Thongam, K., et al. | Denial of Service Attacks | 2016-08 |
Arlington, TX, US | Dovetail: stronger anonymity in next-generation Internet rou ... | Sankey, J.M | Topology with BGP | 2013-05 |
Beijing, CN | A Survey of Network Traffic Visualization in Detecting Netwo ... | Liu, X., Sun, Y., et al. | Topology with Skitter | 2015-06 |
Davis, CA, US | ProgME: towards programmable network measurement | Yuan, L., Chuah, C., et al. | Anonymized Internet Traces | 2007-00 |
Birmingham, UK | On the reliability of network measurement techniques Used fo ... | Gardiner, J., Nagaraja, S. | Anonymized Internet Traces | 2014-10 |
Munich, DE | HLOC: Hints-based geolocation leveraging multiple measuremen ... | Scheitle, Q., Gasser, O., et al. | Topology with Archipelago | 2017-06 |
Enschede, NL | Linking network usage patterns to traffic Gaussianity | Schmidt, R., Sadre, R., et al. | Anonymized Internet Traces | 2014-06 |
Urbana, IL, US | Assuring network service with bandwidth and integrity based ... | Khan, F.M. | Denial of Service Attacks | 2011-00 |
Heraklion, GR | Backpressure on the backbone: A lightweight, non-intrusive t ... | Liaskos, C., Dimitropoulos, X., et al. | Topology with Archipelago, Topology with BGP | 2016-11 |
Rome, IT | Predicting internet commercial connectivity wars: The impact ... | D'Ignazio, A., Giovannetti, E. | Topology with BGP | 2015-05 |
Lafayette, LA | Policy-preferred paths in AS-level Internet topology graphs | Tozal, M.E. | Topology with BGP | 2018-03 |
Madison, WI, US | CLAMP: Efficient class-based sampling for flexible flow moni ... | Saxena, M., Kompella, R. | Anonymized Internet Traces | 2010-10 |
Brescia, IT | Comparing traffic classifiers | Salgarelli, L., Gringoli, F., et al. | Anonymized Internet Traces | 2007-00 |
Budapest, HU | Lobby index in networks | Korn, A., Schubert, A., et al. | Topology with Skitter | 2009-06 |
Berlin, DE | Search and analysis of backbone traffic measurements in the ... | Idzikowski, F. | Anonymized Internet Traces | 2009-03 |
Madrid, ES | Improving energy efficiency in IEEE 802.3ba high-rate ethern ... | Reviriego, P., Huiszoon, B., et al. | Anonymized Internet Traces | 2011-03 |
Tel Aviv, IL | Detecting Heavy Flows in the SDN Match and Action Model | Afek, Y., Barr, A., et al. | Anonymized Internet Traces | 2017-02 |
Stony Brook, NY, US | Measuring and mitigating AS-level adversaries against Tor | Nithyanand, R., Starov, O., et al. | Paper Data Supplements | 2015-12 |
Rochester, NY, US | Probabilistic Inference for Obfuscated Network Attack Sequen ... | Du, H., Yang, S.J. | UCSD Network Telescope | 2014-06 |
Tokyo, JP | Testing the reachability of (new) address space | Bush, R., Hiebert, J., et al. | Topology with Skitter | 2007-08 |
Nancy, FR | Activity monitoring for large honeynets and network telescop ... | Francois, J., State, R., et al. | UCSD Network Telescope | 2008-00 |
University Park, PA, US | Toward a framework for forensic analysis of scanning worms | Hamadeh, I., Kesidis, G. | UCSD Network Telescope | 2006-06 |
Irvine, CA, US | Practical recommendations on crawling online social networks | Gjoka, M., Kurant, M., et al. | Topology with BGP | 2011-10 |
Ames, IA, US | TOPO: a topology-aware single packet attack traceback scheme | Zhang, L., Guan, Y. | Topology with Skitter | 2006-08 |
Halifax, CA | Investigating a behaviour analysis-based early warning syste ... | Haddadi, F. | UCSD Network Telescope | 2016-09 |
Glasgow, UK | Deterministic, reduced-visibility inter-domain forwarding | Strowes, S.D., Perkins, C. | Topology with BGP | 2009-12 |
Calgary, CA | Data structures, algorithms and applications for Big Data an ... | Xylogiannopoulos, K. | Denial of Service Attacks | 2017-04 |
Madrid, ES | Estudio De Captura y Almacenamiento De Trafico En Redes Fisi ... | Osuna, R. | Anonymized Internet Traces | 2015-06 |
Normal, IL, US | A vine copula model for predicting the effectiveness of cybe ... | Xu, M., Hua, L., et al. | UCSD Network Telescope | 2016-11 |
Beersheba, IL | Comparative network analysis using KronFit | Sukrit, G., Rami, P., et al. | Topology with BGP | 2016-03 |
Hyderabad, IN | Real-time peer-to-peer botnet detection framework based on B ... | Guntuku, S., Narang, P., et al. | UCSD Network Telescope | 2013-07 |
Irvine, CA, US | Models and algorithms for graph watermarking | Eppstein, D., Goodrich, M.T., et al. | Topology with Skitter, Topology with BGP | 2016-05 |
Beijing, CN | Improving network security by dynamically changing path iden ... | Chen, Z., Luo, H., et al. | Anonymized Internet Traces | 2015-12 |
Barcalona, ES | Mercury: Revealing hidden interconnections between access IS ... | Palacin, M., Bikfalvi, A., et al. | Topology with BGP | 2014-12 |
Aalto, FI | isBF: scalable in-packet Bloom filter based multicast | Nikolaevskiy, I., Lukyanenko, A., et al. | Topology with Skitter | 2013-03 |
Yogakarta, ID | Integrasi Metode Normalized Reelative Network Entropy dan Ne ... | Muhammad, A., Alameka, F. | Denial of Service Attacks, Anonymized Internet Traces | 2017-06 |
Al Ain, AE | A data driven firewall for faster packet filtering | Masud, M.M., Mustafa, U., et al. | Anonymized Internet Traces | 2014-03 |
Naples, IT | Detecting third-party addresses in traceroute traces with IP ... | Marchetta, P., de Donato, W., et al. | Topology with BGP | 2013-03 |
Torino, IT | Router-level community structure of the Internet autonomous ... | Beiro, M.G., Grynberg, S.P., et al. | Topology with Archipelago | 2015-03 |
Riverside, CA, US | Network monitoring using traffic dispersion graphs (TDGs) | Iliofotou, M., Pappu, P., et al. | Topology with Skitter, Anonymized Internet Traces | 2007-00 |
Monterey, CA, US | Evaluating the limits of network topology inference via virt ... | Rye, E.C. | Topology with BGP | 2015-06 |
Palma de Mallorca, ES | Structural efficiency of percolated landscapes in flow netwo ... | Serrano, M.A., De Los Rios, P. | Topology with BGP | 2008-11 |
Gothenburg, SE | Multifaceted defense against Distributed Denial of Service a ... | Fu, Z. | Denial of Service Attacks | 2012-08 |
Charlottesville, VA, US | Hobbits: Hadoop and Hive based Internet traffic analysis | Hendawi, A., Alali, F., et al. | Anonymized Internet Traces | 2016-12 |
Beijing, CN | A more efficient hybrid approach for single-packet IP traceb ... | Wang, Y., Su, S., et al. | Topology with Skitter, Topology with Archipelago | 2012-02 |
Xiangtan, CN | HDLBR: A name-independent compact routing scheme for power-l ... | Tang, M., Zhang, G., et al. | Topology with Skitter | 2013-02 |
Amherst, NY, US | On the trade-off between the expected number of infected nod ... | Ha, D., Ngo, H. | Topology with Skitter | 2007-05 |
Conway, AR, US | On the (in)effectiveness of Probabilistic Marking for IP tra ... | Paruchuri, V., Durresi, A., et al. | Topology with Skitter | 2007-11 |
Tiruchirappalli, IN | Detection of distributed denial of service attacks using an ... | Kumar, P.A.R., Selvakumar, S. | UCSD Network Telescope, Denial of Service Attacks | 2013-02 |
Vienna, AT | GAME OF DECOYS: Optimal Decoy Routing Through Game Theory | Nasr, M., Houmansadr, A. | Topology with BGP | 2016 |
East Lansing, MI, US | Hardware algorithms for high-speed packet processing | Norige, E. | Anonymized Internet Traces | 2017-00 |
Rochester, NY, US | Temporal and spatial analyses for large-scale cyber attacks | Du, H., Yang, S.J. | UCSD Network Telescope | 2013-00 |
Naples, IT | Topology discovery at the router level: a new hybrid tool ta ... | Marchetta, P., Merindol, P., et al. | Topology with Skitter, Topology with Archipelago | 2011-10 |
Suita, JP | Analyzing Impact of Introducing CCN on Profit of ISPs | Kamiyama, N. | Topology with BGP | 2015-06 |
Los Angeles, CA, US | Software defined traffic measurement with OpenSketch | Yu, M., Jose, L., et al. | Anonymized Internet Traces | 2013-04 |
Brescia, IT | MTCLASS: Enabling statistical traffic classification of mult ... | Gringoli, F., Nava, L., et al. | Anonymized Internet Traces | 2012-08 |
Champaign, IL, US | TorPolice: Towards enforcing service-defined access policies ... | Liu, Z., Liu, Y., et al. | DNS RTT | 2017-12 |
Brno, CZ | Detecting advanced network threats using a similarity search | Cermak, M., Celeda, P. | Anonymized Internet Traces | 2016-06 |
Rochester, NY, US | Attack Projection | Yang, S., Du, H., et al. | UCSD Network Telescope | 2014-10 |
Tucson, AZ, US | Network anomaly detection using autonomous system flow aggre ... | Johnson, T., Lazos, L. | Topology with BGP | 2014-12 |
Melbourne, AU | Multifractality in TCP/IP traffic: the case against | Veitch, D., Hohna, N., et al. | Anonymized Internet Traces | 2005-06 |
Tel Aviv, IL | The CB tree: a practical concurrent self-adjusting search tr ... | Afek, Y., Kaplan, H., et al. | Anonymized Internet Traces | 2014-12 |
London, UK | Towards informative statistical flow inversion | Clegg, R., Haddadi, H., et al. | Anonymized Internet Traces | 2007-05 |
Washington, DC, US | The Cost of the Path Not Taken | Schuchard, M., Geddes, J., et al. | Topology with Archipelago | 2016 |
Forth, GR | Can SDN Accelerate BGP Convergence? A Performance Analysis o ... | Sermpezis, P., Dimitropoulos, X. | Topology with BGP | 2017 |
Beijing, CN | Filtering location optimization for the reactive packet filt ... | Lu, N., Wang, Y., et al. | Topology with Archipelago | 2013-07 |
Tokyo, JP | Proposal and evaluation of network-processor acceleration ar ... | Okuno, M., Nishi, H. | Anonymized Internet Traces | 2004-03 |
San Francisco, CA, US | Identifying Anomalies in Graph Streams Using Change Detectio ... | Eberle, W., Holder, L. | Topology with BGP | 2016 |
Halifax, CA | Highlights on analyzing one-way traffic using different tool ... | Balkanli, E., Zincir-Heywood, A.N. | UCSD Network Telescope | 2015-05 |
Beijing, CN | CLUE: Achieving fast update over compressed table for parall ... | Yang, T., Duan, R., et al. | Anonymized Internet Traces | 2012-06 |
Kaiserslautern, DE | NetReview: detecting when interdomain routing goes wrong | Haeberlen, A., Avramopoulos, I., et al. | Topology with BGP | 2009-04 |
Darmstadt, DE | Modelling the internet delay space based on geographical loc ... | Kaune, S., Pussep, K., et al. | Topology with Skitter | 2009-02 |
Madison, WI, US | What's in a name?: decoding router interface names | Chabarek, J., Barford, P. | Topology with Archipelago | 2013-08 |
Tokyo, JP | Estimating AS relationships for application-layer traffic op ... | Asai, H., Esaki, H. | Topology with BGP | 2010-09 |
Singapore, SG | Efficient extraction of high-betweenness vertices | Chong, W.H., Toh, W.S.B., et al. | Topology with BGP | 2010-08 |
Hong Kong, CN | Anonymous overlay network supporting authenticated routing | Schlegel, R., Wong, D.S. | Topology with Archipelago | 2012-05 |
Enschede, NL | Measurement artifacts in NetFlow data | Hofstede, R., Drago, I., et al. | Anonymized Internet Traces | 2013-03 |
Shenyang, CN | Robustness analyses of Internet topology with power-law feat ... | Xu, Y., Ma, W. | Topology with Archipelago | 2014-00 |
Manouba, TN | DDoS flooding attack detection scheme based on F-divergence | Rahmani, H., Sahli, N., et al. | Denial of Service Attacks | 2012-04 |
Tianjin, CN | The Power of Prefix Hijackings in the Internet Hierarchy | Yang, Y., Shi, X., et al. | Topology with BGP | 2016 |
Hong Kong, CN | Policy-compliant path diversity and bisection bandwidth | Kloti, R., Kotronis, V., et al. | Topology with BGP | 2015 |
Hong Kong, CN | Modelling the complex Internet topology | Chen, G., Fan, Z., et al. | Topology with Skitter | 2006-01 |
San Francisco, CA, US | A machine learning approach to edge type inference in Intern ... | Varghese, J.S., Ruan, L. | Topology with Archipelago, Topology with BGP | 2016 |
Nashville, TN, US | On scalability of proximity-aware peer-to-peer streaming | Dai, L, Cao, Y., et al. | Topology with Archipelago, Topology with BGP | 2009-01 |
Brno, CZ | Optimization of network flow monitoring | Zadnik, M. | Anonymized Internet Traces | 2013-05 |
Zurich, CH | Communication based on per-packet One-Time Addresses | Lee, T., Pappas, C., et al. | Anonymized Internet Traces | 2016-11 |
Paris, FR | Enhancing the computation of distributed shortest paths on r ... | D'Angelo, G., D'Emidio, M., et al. | Topology with Archipelago | 2012-11 |
Nathan, AU | Performance of Flow-based Anomaly Detection in Sampled Traff ... | Jadidi, Z., Muthukkumarasamy, V., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2015-09 |
Istanbul, TR | Statistical measures: Promising features for time series bas ... | Fouladi, R., Kayatas, C., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2018-01 |
Madrid, ES | Multimedia flow classification at 10 Gbps using acceleration ... | Leira, R., Gomez, P., et al. | Anonymized Internet Traces | 2013-06 |
Changsha, CN | A study of hinge-transmit property of BGP routing system | Yujing, L., Bofeng, Z., et al. | Topology with BGP | 2010-01 |
Hannover, DE | Measurement-based flow characterization in centrally control ... | Bozakov, Z., Rizk, A., et al. | Anonymized Internet Traces | 2016-04 |
Changsha, CN | How resilient are individual ASes against AS-level link fail ... | Deng, W., Zhu, P., et al. | Topology with BGP | 2011-04 |
Stonybrook, NY, US | Bounded-reorder packet scheduling in optical cut-through swi ... | Zhang, Z., Guo, Z., et al. | Anonymized Internet Traces | 2015-11 |
Petropolis, RJ, BR | Distributed location of the critical nodes to network robust ... | Wehmuth, K., Ziviani, A. | Topology with Skitter | 2011-10 |
Madison, WI, US | Layer 1-informed Internet topology measurement | Durairajan, R., Sommers, J., et al. | Topology with Archipelago | 2014-11 |
London, UK | Cache 'less for more' in information-centric networks | Chai, W.K., He, D., et al. | Topology with BGP | 2012-05 |
Corvallis, OR, US | Spatialization of Web sites using a weighted frequency model ... | Reitsma, R., Thabane, L., et al. | Topology with Skitter | 2004-01 |
Daegu, KR | Adaptive load shedding via fuzzy control in data stream mana ... | Basaran, C., Kang, K.-D., et al. | Anonymized Internet Traces | 2012-12 |
Beijing, CN | Fine-grained power scaling algorithms for energy efficient r ... | Song, T., Shi, X., et al. | Anonymized Internet Traces | 2014-10 |
Osaka, JP | A method to reduce inter-ISP transit cost caused by overlay ... | Matsuda, K., Hasegawa, G., et al. | Topology with BGP | 2013-02 |
Omaha, NE, US | Examining change in Internet topology in terms of external e ... | Bell, C. | Topology with Skitter | 2011-08 |
Reno, NV, US | Analysis of path stability within autonomous systems | Canbaz, A., Bakhshaliyev, K., et al. | Topology with BGP | 2017-09 |
Beijing, CN | Optimal defense resource allocation in scale-free networks | Zhang, X., Xu, G., et al. | Topology with Archipelago | 2017-00 |
Pittsburgh, PA, US | An empirical analysis of target-resident DoS filters | Collins, M., Reiter, M. | Topology with Skitter | 2004-00 |
Xiamen, CN | Simulation and analysis of DDoS in Active Defense Environmen ... | Li, Z., Xiang, Y., et al. | Topology with Skitter | 2006-00 |
Beijing, CN | A distinction method of flooding DDoS and flash crowds based ... | Sun, D., Yang, K., et al. | Denial of Service Attacks | 2017-08 |
Konstanz, DE | Visualizing geo-related data using cartograms | Panse, C. | Topology with Skitter | 2005-02 |
Santa Cruz, CA, US | Characterizing per-application network traffic using entropy | Petkov, V., Rajagopal, R., et al. | Anonymized Internet Traces | 2013-05 |
Hong Kong, CN | A new sketch method for measuring host connection degree dis ... | Wang, P., Guan, X., et al. | UCSD Network Telescope | 2014-04 |
Berlin, DE | Computing Customer Cones of Peering Networks | Varghese, J.S., Ruan, L. | Topology with BGP | 2016 |
Hamilton, NZ | Efficient internet topology discovery techniques | King, A. | Topology with Archipelago | 2010-02 |
Cambridge, MA, US | Identifying known and unknown peer-to-peer traffic | Constantinou, F., Mavrommatis, P. | Anonymized Internet Traces | 2006-07 |
Parma, IT | A statistical blind technique for recognition of internet tr ... | Pecori, R, Veltri, L. | Anonymized Internet Traces | 2014-08 |
Pittsburgh, PA, US | HADI: Fast diameter estimation and mining in massive graphs ... | Kang, U., Tsourakakis, C., et al. | Topology with BGP | 2008-12 |
Nathan, AU | A probabilistic sampling method for efficient flow-based ana ... | Jadidi, Z., Muthukkumarasamy, V., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2016-11 |
Shenyang, CN | Analysis of interlayer connection catastrophe characteristic ... | Yang, B., Zhao, H., et al. | Topology with Archipelago | 2013-02 |
Changsha, CN | Shedding light on the use of AS relationships for path infer ... | Deng, W., Muhlbauer, W., et al. | Topology with BGP | 2012-06 |
Austin, TX, US | Scalable verification of networks with packet transformers u ... | Yang, H., Lam, S.S. | Topology with BGP | 2015-08 |
West Lafayette, IN, US | Seeded PageRank solution paths | Kloster, K., Gleich, D.F. | Topology with Skitter | 2015-12 |
Hong Kong, CN | IS-Label: an independent-set based labeling scheme for point ... | Fu, A.W., Wu, H., et al. | Topology with Skitter | 2013-04 |
Taoyuan City, TW | A software defined sketch system for traffic monitoring | Wellem, T., Lai, Y.-K., et al. | Anonymized Internet Traces | 2015-05 |
Brisbane, AU | Detecting Distributed Denial-of-Service attacks and flash ev ... | Bhatia, S. | Denial of Service Attacks | 2013-08 |
Paris, FR | IXP's: mapped? | Augustin, B., Krishnamurthy, B., et al. | Topology with Skitter | 2009-11 |
Stockholm, SE | Content-peering dynamics of autonomous caches in a content-c ... | Pacifici, V., Dan, G. | Topology with BGP | 2013-04 |
Waterloo, ON, CA | On the feasibility of core-rooted path addressing | Guo, C., Karsten, M. | Topology with BGP | 2016-04 |
Fort Collins, CO, US | Simulating internet scale topologies with metarouting | DiBenedetto, S., Stone, A., et al. | Topology with BGP | 2010-03 |
Xian, CN | Unikernels Everywhere: The Case for Elastic CDNs | Kuenzer, S., Ivanov, A., et al. | Topology with BGP | 2017 |
Atlanta, GA, US | IP traceback-based intelligent packet filtering: a novel tec ... | Sung, M., Xu, J. | Topology with Skitter | 2003-09 |
Athens, GR | Virtual Network Services for the Monitoring and Security of ... | Giotis, K. | Topology with BGP, Denial of Service Attacks | 2016 |
Madrid, ES | Driving in the cloud: An analysis of drive-by download opera ... | Nappa, A., Rafique, M.Z., et al. | Topology with BGP | 2013-07 |
Austin, TX, US | Power and performance analysis of network traffic prediction ... | Iqbal, M.F., John, L.K. | Anonymized Internet Traces | 2012-04 |
Pittsburgh, PA, US | ECO-DNS: Expected consistency optimization for DNS | Chen, C., Matsumoto, S., et al. | Topology with BGP | 2015-06 |
Madrid, ES | Trade-offs in optimizing the cache deployments of CDNs | Hasan, S., Gorinsky, S., et al. | Topology with BGP | 2014-04 |
Boston, MA, US | How secure are secure interdomain routing protocols? | Goldberg, S., Schapira, M., et al. | Topology with BGP | 2014-06 |
Stony Brook, NY, US | High speed multicast scheduling in hybrid optical packet swi ... | Guo, Z., Yang, Y. | Anonymized Internet Traces | 2012-06 |
Paris, FR | Topology discovery using an address prefix based stopping ru ... | Donnet, B., Friedman, T. | Topology with Skitter | 2006-06 |
PA, US | Routing Bottlenecks in the Internet: Causes, Exploits, and C ... | Kang, M.S., Gligor, V.D. | Topology with Archipelago, Topology with BGP | 2014 |
East Lansing, MI, US | Noise can help: Accurate and efficient per-flow latency meas ... | Shahzad, M., Liu, A.X. | Anonymized Internet Traces | 2014-06 |
Tezpur, IN | Self-similarity based DDoS attack detection using Hurst para ... | Deka, R., Bhattacharya, D. | Denial of Service Attacks | 2016-11 |
Madrid, ES | An economic side-effect for prefix deaggregation | Lutu, A., Bagnulo, M., et al. | Topology with BGP | 2012-03 |
Valparaiso, CL | Comparison in power consumption of static and dynamic WDM ne ... | Leiva, A., Finochietto, J.M., et al. | Anonymized Internet Traces | 2011-07 |
Montreal, CA | Gaussian Process Regression Based Traffic Modeling and Predi ... | Bayati, A., Asghari, V., et al. | Anonymized Internet Traces | 2016-12 |
Charlotte, NC, US | Cross-layer TCP flow aware model for energy efficient use of ... | Haider, A., Acharya, K., et al. | Anonymized Internet Traces | 2010-12 |
Singapore, SG | FACT: A framework for authentication in cloud-based IP trace ... | Cheng, L., Divakaran, D., et al. | Denial of Service Attacks | 2017_03 |
Ames, IA, US | Cardinality change-based early detection of large-scale cybe ... | Chen, W., Liu, Y., et al. | UCSD Network Telescope, Denial of Service Attacks | 2013-04 |
Zurich, CH | Anatomy of a large European IXP | Ager, B., Chatzis, N., et al. | Topology with BGP | 2012-08 |
Munich, DE | An application-aware load balancing strategy for network pro ... | Ohlendorf, R., Meitinger, M., et al. | Anonymized Internet Traces | 2010-01 |
Shenyang, CN | Research on the distribution of network nodes based on multi ... | Li, C., Zhao, H., et al. | Topology with Archipelago | 2008-00 |
Shenyang, CN | An improved BA model for router-level internet macroscopic t ... | Xu, Y., Zhao, H. | Topology with Skitter | 2009-05 |
Barcelona, ES | Design and evaluation of learning algorithms for dynamic res ... | Mijumbi, R., Gorricho, J.-L., et al. | Anonymized Internet Traces | 2014-05 |
Florham Park, NJ, US | Demo abstract: towards extracting semantics by visualizing l ... | Gansner, E.R., Krishnamurthy, B., et al. | Topology with Archipelago | 2014-01 |
Aalto, FI | Models for the simulation of a name-based interdomain routin ... | Keating, A. | Topology with BGP | 2012-06 |
Victoria, CA | Evaluating the effectiveness of Sybil attacks against peer-t ... | Verigin, A.L. | Topology with Archipelago | 2013-12 |
Bydgoszcz, PL | Expansion of matching pursuit methodology for anomaly detect ... | Saganowski, L., Andrysiak, T., et al. | UCSD Network Telescope | 2011-00 |
Nanjing, CN | Multipath inter-domain routing for named data networking | Hu, X.Y., Gong, J. | Topology with BGP | 2015 |
Aizu, JP | An intelligent DDoS attack detection system using packet ana ... | Kato, K., Klyuev, V. | Denial of Service Attacks | 2014-09 |
Cairo, EG | Analyzing Internet connectivity data using modified k-shell ... | Amr, S., El-Beltagy, M., et al. | Topology with Skitter | 2008-01 |
Gothenburg, SE | Characterization and classification of internet backbone tra ... | John, W. | Anonymized Internet Traces | 2010-02 |
San Diego, CA, US | CoDef: Collaborative defense against large-scale link-floodi ... | Lee, S.B., Kang, M.S., et al. | Topology with BGP | 2013-12 |
Sydney, AU | Using type-of-relationship (ToR) graphs to select disjoint p ... | Qazi, S., Moors, T. | Topology with BGP | 2007-11 |
Amherst, MA, US | The waterfall of liberty: Decoy routing circumvention that r ... | Nasr, M., Zolfaghari, H., et al. | Topology with BGP | 2017-10 |
St. Petersburg, RU | Generation of source data for experiments with network attac ... | Kotenko, I., Chechulin, A., et al. | Denial of Service Attacks | 2017-00 |
Zaragoza, ES | What to do With the Wi-Fi Wild West | Saldana, J. | Anonymized Internet Traces | 2016-12 |
Glasgow, UK | Distributed, Multi-Level Network Anomaly Detection for Datac ... | Iordache, M., Jouet, S., et al. | Anonymized Internet Traces | 2017-00 |
Los Alamos, NM, US | Criticality analysis of Internet infrastructure | Yan, G., Eidenbenz, S., et al. | Topology with Skitter | 2010-05 |
Berlin, DE | Inferring business relationships in the internet backbone | Huth, M., Fabian, B. | Topology with BGP | 2017-01 |
Ithaca, NY, US | HFTraC: High-frequency traffic control | Wu, N., Bi, Y., et al. | Anonymized Internet Traces | 2017-06 |
Beijing, CN | Fast Content Store Lookup Using Locality-Aware Skip List in ... | Pan, T., Huang, T., et al. | Anonymized Internet Traces | 2016-04 |
San Diego, CA, US | Measuring the practical impact of DNSSEC deploymen | Lian, W., Rescorla, E., et al. | Topology with BGP | 2013-08 |
Beijing, CN | Study on classification and characteristics of source addres ... | Bi, J., Hu, P., et al. | UCSD Network Telescope | 2010-04 |
Hong Kong, CN | LightBox: SGX-assisted Secure Network Functions at Near-nati ... | Duan, H., Yuan, X., et al. | Anonymized Internet Traces | 2017-06 |
Beijing, CN | A behavior-based method for distinction of flooding DDoS and ... | Sun, D., Yang, K., et al. | Denial of Service Attacks | 2017-06 |
Madrid, ES | STONE: A stream-based DDoS defense framework | Callau-Zori, M., Jimenez-Peris, R., et al. | Denial of Service Attacks | 2013-03 |
Caparica, PT | Scalable multi-region routing at inter-domain level | Amaral, P., Ganhao, F., et al. | Topology with BGP | 2010-03 |
Redmond, WA, US | Using trustworthy host-based information in the network | Parno, B., Zhou, Z., et al. | Topology with Skitter | 2012-10 |
Bucharest, HU | Multi-path inter-domain routing: The impact on BGP's scalabi ... | Szekeres, A. | Topology with BGP | 2011-08 |
Riverside, CA, US | Inferential time-decaying Bloom filters | Dautrich Jr, J.L., Ravishankar, C.V. | Anonymized Internet Traces | 2013-03 |
Amsterdam, NL | Impact of topology on BGP convergence | Hanif, S. | Topology with BGP | 2010-08 |
Budapest, HU | Compressing IP forwarding tables: towards entropy bounds and ... | Retvari, G., Tapolcai, J., et al. | Anonymized Internet Traces | 2013-10 |
Ann Arbor, MI, US | Internet routing resilience to failures: analysis and implic ... | Wu, J., Zhang, Y., et al. | Topology with BGP | 2007-00 |
Cookeville, TN, US | Identifying threats using graph-based anomaly detection | Eberle, W., Holder, L., et al. | Topology with BGP | 2009-04 |
Bari, IT | Spectral models for bitrate measurement from packet sampled ... | Grieco, L.A., Barakat, C., et al. | Anonymized Internet Traces | 2011-06 |
Vienna, AT | Entropy-based characterization of Internet background radiat ... | Iglesias, F., Zseby, T. | UCSD Network Telescope | 2014-12 |
Daejeon, KR | A classification method of darknet traffic for advanced secu ... | Ko, S., Kim, K., et al. | UCSD Network Telescope | 2014-01 |
Padua, IT | An Energy Efficient Ethernet Strategy Based on Traffic Predi ... | Cenedese, A., Tramarin, F., et al. | UCSD Network Telescope, Anonymized Internet Traces | 2017-01 |
Brescia, IT | Support Vector Machines for TCP traffic classification | Este, A., Gringoli, F., et al. | Anonymized Internet Traces | 2009-09 |
Tokyo, JP | AURORA: Autonomous System relationships-aware overlay routin ... | Asai, H., Esaki, H. | Topology with BGP | 2009-08 |
San Diego, CA, US | Swing: Realistic and responsive network traffic generation | Vishwanath, K.V., Vahdat, A. | Anonymized Internet Traces | 2009-06 |
Lexington, KY, US | A Concise Forwarding Information Base for Scalable and Fast ... | Yu, Y., Belazzougui, D., et al. | Anonymized Internet Traces | 2016-08 |
Caparica, PT | DTIA: An Architecture for Inter-Domain Routing | Amaral, P., Bernardo, L., et al. | Topology with BGP | 2009-08 |
Mugla, TR | Recreating a large-scale BGP incident in a realistic environ ... | Karaarslan, E., Perez, A.G., et al. | Topology with BGP | 2013-10 |
CO, US | Incremental Deployment Strategies for Effective Detection an ... | Gersch, J., Massey, D., et al. | Topology with Archipelago, Topology with BGP | 2014-06-07 |
Ankara, TR | Diagnosis of Chronic Kidney Disease Based on Support Vector ... | Polat, H., Mehr, H., et al. | UCSD Network Telescope | 2017-02 |
Colchester, UK | Optimising rule order for a packet filtering firewall | Mothersole, I., Reed, M.J. | Anonymized Internet Traces | 2011-05 |
Atlanta, GA, US | Why is the internet traffic bursty in short (sub-RTT) timesc ... | Jiang, H., Dovrolis, C. | Anonymized Internet Traces | 2005-06 |
L'Aquila, IT | Engineering a new algorithm for distributed shortest paths o ... | Cicerone, S., D'Angelo, G., et al. | Topology with Archipelago | 2012-03 |
Valencia, ES | A histogram-based stochastic process for finite buffer occup ... | Hernandez-Orallo, E., Vila-Carbo, J. | Anonymized Internet Traces | 2007-00 |
Pisa, IT | k-dense communities in the internet AS-level topology | Gregori, E., Lenzini, L, et al. | Topology with Archipelago | 2011-01 |
Budapest, HU | Analysis of elephant users in broadband network traffic | Megyesi, P., Molnar, S. | Anonymized Internet Traces | 2013-08 |
Nanjing, CN | Constraint conditions to eliminate AS incentive of lying in ... | Jiang, J., Luo, J., et al. | Topology with BGP | 2013-05 |
Samara, RU | Analysis and simulation of WAN traffic by self-similar traff ... | Privalov, A.Y., Tsarev, A. | Anonymized Internet Traces | 2014-08 |
Carthage, TN | Back to Results Random Linear Network Coding Schemes for Red ... | Taghouti, M., Lucani, D., et al. | Anonymized Internet Traces | 2017-05 |
Charlottesville, VA, US | A measurement-based study of big-data movement | Addanki, R., Maji, S., et al. | Anonymized Internet Traces | 2015-06 |
Indianapolis, IN, US | Fast autonomous system traceback | Durresi, A., Paruchuri, V., et al. | Topology with Skitter | 2009-03 |
Athens, GR | A Network Telescope for Early Warning Intrusion Detection | Chatziadam, P., Askoxylakis, I.G., et al. | UCSD Network Telescope | 2014-01 |
Zurich, CH | Collective navigation of complex networks: Participatory gre ... | Kleineberg, K. ,Helbing, D. | Topology with Archipelago | 2017-04 |
Monterey, CA, US | Passive TCP reconstruction and forensic analysis with tcpflo ... | Garfinkel, S.L., Shick, M. | Anonymized Internet Traces | 2013-09 |
Burlington, MA, US | Incentive-informed inter-domain multicast | Rajahalme, J. | Topology with BGP | 2010-05 |
Beijing, CN | A value based framework for provider selection of regional I ... | Li, M., Wang, H., et al. | Topology with Skitter, Topology with BGP | 2014-05 |
Hong Kong, CN | SAND: A fault-tolerant streaming architecture for network tr ... | Liu, Q., Lui, J.C.S., et al. | Anonymized Internet Traces | 2015-08 |
Tezpur, IN | DDoS attack detection using unique source IP deviation | Baishya, R., Hoque, N., et al. | Denial of Service Attacks | 2017-11 |
Ningbo, CN | CTFPi: A new method for packet filtering of firewall | Ni, C., Jin, G. | Topology with Skitter | 2013-01 |
Orlando, FL, US | Analysis of large scale traceroute datasets in Internet rout ... | Ahmad, M.Z., Guha, R. | Topology with Archipelago | 2012-12 |
Hangzhou, CN | Optimal control of DDoS defense with multi-resource max-min ... | Wei, W., Dong, Y., et al. | Topology with Skitter | 2008-09 |
Hong Kong, CN | Marginal deterrence in the enforcement of law: Evidence from ... | Hui, K.-L., Kim, S.H., et al. | Topology with BGP, UCSD Network Telescope | 2013-09 |
Gainesville, FL, US | Exploring Netflow data using Hadoop | Zhou, X., Petrovic, M., et al. | Anonymized Internet Traces | 2014-05 |
Atlanta, GA, US | Large-scale IP traceback in high-speed internet: practical t ... | Sung, M., Xu, J., et al. | Topology with Skitter | 2008-12 |
Le Havre, FR | Efficient resources management in a ditributed computer syst ... | Meslmawy, M.A.S. | Topology with BGP | 2015-10 |
Hakodate, JP | Distributed denial of service (DDoS) attack detection system ... | Takahashi, R. | Denial of Service Attacks | 2014-01 |
San Antonio, TX, US | A characterization of cybersecurity posture from Network Tel ... | Zhan, Z., Xu, M., et al. | UCSD Network Telescope | 2014-12 |
Beijing, CN | Evaluating potential routing diversity for internet failure ... | Hu, C., Chen, K., et al. | Topology with BGP | 2010-05 |
Singapore, SG | Opportunistic Piggyback Marking for IP Traceback | Cheng, L., Divakaran, D.M., et al. | Denial of Service Attacks | 2015-12 |
Paris, FR | Fitting a code-red virus spread model: An account of putting ... | Kolesnichenko, A., Haverkort, B., et al. | UCSD Network Telescope | 2016-03 |
Tokyo, JP | A methodology for magnitude-based inter-AS distance estimati ... | Asai, H., Esaki, H. | Topology with BGP | 2009-06 |
Baltimore, MD, US | Bigfoot: A geo-based visualization methodology for detecting ... | Syamkumar, M., Durairajan, R., et al. | Topology with BGP | 2016 |
Liege, BE | A first look at the prevalence and persistence of middleboxe ... | Edeline, K., Donnet, B. | Topology with Archipelago | 2017-09 |
Philadelphia, PA, US | Peer-assisted content distribution in Akamai NetSession | Zhao, M., Aditya, P., et al. | Topology with BGP | 2013-10 |
Marina Del Rey, CA, US | Do you see me now? Sparsity in passive observations of addre ... | Mirkovic, J., Bartlett, G., et al. | Anonymized Internet Traces | 2017-06 |
Stockholm, SE | Stable content-peering of autonomous systems in a content-ce ... | Pacifici, V., Dan, G. | Topology with BGP | 2013-06 |
North Brunswick, NJ, US | EIR: Edge-aware inter-domain routing protocol for the future ... | Mukherjee, S., Sriram, S., et al. | Topology with Archipelago | 2017 |
Los Angeles, CA, US | SCREAM: Sketch Resource Allocation for Software-defined Meas ... | Moshref, M., Yu, M., et al. | Anonymized Internet Traces | 2015-12 |
Minneapolis, MN, US | Adversarial Degradation of the Availability of Routing Infra ... | Schuchard, M.J. | Topology with BGP | 2016 |
Ljubljana, SI | Policy relationship annotations of predefined AS-level topol ... | Vilhar, A., Novak, R. | Topology with BGP | 2008-10 |
Madrid, ES | An economic perspective on traffic attraction by Internet tr ... | Bangera, P., Gorinsky, S. | Topology with BGP | 2013-10 |
Ithaca, NY, US | Large-scale community structure in social and information ne ... | Leskovec, J., Lang, K.J., et al. | Topology with BGP | 2015 |
Changsha, CN | LDC: Detecting BGP prefix hijacking by load distribution cha ... | Liu, Y., Su, J., et al. | Topology with BGP | 2012-05 |
Dresden, DE | IncApprox: A Data Analytics System for Incremental Approxima ... | Krishnan, D., Quoc, D., et al. | Anonymized Internet Traces | 2016-04 |
Nanjing, CN | Comparative research on internet flows characteristics | Zhang, X., Ding, W. | Anonymized Internet Traces | 2012-10 |
Atlanta, GA, US | Importance-scanning worm using vulnerable-host distribution | Chen, Z., Ji, C. | UCSD Network Telescope | 2005-11 |
Coimbatore, IN | A real time detection of Distributed Denial of Service attac ... | Anitha, R., Karthik, R., et al. | Denial of Service Attacks | 2012-05 |
Tezpur, IN | Real-time DDoS attack detection using FPGA | Hoque, N., Kashyap, H., et al. | Denial of Service Attacks | 2017-09 |
Monterey, CA, US | Primitives for active internet topology mapping: toward high ... | Beverly, R., Berger, A., et al. | Topology with Archipelago | 2010-11 |
Ankara, TR | Mapping time-varying IP traffic to flexible optical paths in ... | Tunc, C., Akar, N. | Anonymized Internet Traces | 2014-08 |
Rome, IT | CONET: a content centric inter-networking architecture | Detti, A., Melazzi, N.B., et al. | Anonymized Internet Traces | 2011-08 |
Austin, TX, US | Workload-aware network processors: improving performance whi ... | Iqbal, M.F. | Anonymized Internet Traces | 2013-08 |
Hong Kong, CN | Where the sidewalk ends: Extending the Internet AS graph usi ... | Chen, K., Fhoffnes, D.R., et al. | Topology with BGP | 2014-04 |
Austin, TX, US | Get off my prefix! the need for dynamic, gerontocratic polic ... | Wong, E.L., Shmatikov, V. | Topology with BGP | 2011-06 |
Zhengzhou, CN | Net-flow fingerprint model based on optimization theory | Lei, C., Zhang, H., et al. | Anonymized Internet Traces | 2016-03 |
Athens, GR | Cloud computing for global name-resolution in information-ce ... | Vasilakos, X., Katsaros, K., et al. | Topology with BGP | 2012-12 |
Aveiro, PT | Profiling de trafego inter-operador baseado em analise multi ... | Coelho, N.M.M. | Anonymized Internet Traces | 2012-12 |
Madras, IN | Adaptive network intrusion detection system using a hybrid a ... | Karthick, R.R., Hattiwale, V.P., et al. | Denial of Service Attacks | 2012-01 |
Zurich, CH | Metric clusters in evolutionary games on scale-free networks | Kleineberg, K. | Topology with Archipelago | 2017 |
Shenyang, CN | Internet complex network separation degree analysis based on ... | Su, W.-J., Zhao, H., et al. | Topology with Archipelago | 2005-09 |
Los Angeles, CA, US | Collaborative change detection of DDoS attacks on community ... | Chen, Y., Hwang, K. | Anonymized Internet Traces | 2006-05 |
Athens, GR | On the local approximations of node centrality in Internet r ... | Pantazopoulos, P., Karaliopoulos, M., et al. | Topology with Archipelago | 2013-05 |
Harbin, CN | Quantifying the pitfalls of traceroute in AS connectivity in ... | Zhang, Y., Oliveira, R., et al. | Topology with Archipelago | 2010-04 |
Atlanta, GA, US | Behavioral clusters in dynamic graphs | Fairbanks, J., Kannan, R., et al. | Anonymized Internet Traces | 2015-03 |
Beijing, CN | TCP stretch acknowledgements and timestamps: Findings and im ... | Ding, H.; Rabinovich, M. | Anonymized Internet Traces | 2015-07 |
Tarragona, ES | On the routability of the Internet | Erola, P., Gomez, S., et al. | Topology with BGP | 2013-00 |
Tokyo, JP | DNS-based defense against IP spoofing attacks | Moriyama, E., Takahashi, T., et al. | Anonymized Internet Traces | 2012-11 |
Baltimore, MD, US | Change detection in temporally evolving computer networks: A ... | Namayanja, J.M., Janeja, V.P. | Anonymized Internet Traces | 2014-10 |
London, UK | Hybrid epidemics - A case study on computer worm Conficker | Zhang, C., Zhou, S., et al. | UCSD Network Telescope | 2015-05 |
Monterey, CA, US | Temporal comparisons of Internet topology | Wright, J.E. | Topology with Archipelago | 2014-06 |
Nara, JP | Distributed Encoding for Multiple-Inherited Locators to Acco ... | Shao, X., Wang, F., et al. | Topology with BGP | 2016 |
Barcelona, ES | Contributions to efficient resource management in virtual ne ... | Mijumbi, R., Gorricho, J.-L., et al. | Anonymized Internet Traces | 2014-06 |
Rennes, FR | Identifying global icebergs in distributed streams | Anceaume, E., Busnel, Y., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2015-09 |
Newark, DE, US | Correcting congestion-based error in network telescope's obs ... | Wei, S., Mirkovic, J. | UCSD Network Telescope | 2008-00 |
West Lafayette, IN, US | Estimating linking preferences and behaviors of autonomous s ... | Sha, Z., Panchal, J. | Topology with BGP | 2014-10 |
London, UK | Simulating internet traffic with Markov-modulated processes | Clegg, R. | Anonymized Internet Traces | 2007-00 |
Pernambuco, BR | An orchestration approach for unwanted Internet traffic iden ... | Feitosa, E., Souto, E., et al. | Denial of Service Attacks | 2012-05 |
Seoul, KR | Multiple machine learning for Software Defined Networking co ... | Kim, Y., Choi, D., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2017-08 |
Washington DC, US | A High-Performance Algorithm for Identifying Frequent Items ... | Anderson, D., Bevan, P., et al. | Anonymized Internet Traces | 2017-05 |
West Lafayette, IN, US | Estimating TCP latency approximately with passive measuremen ... | Gangam, S., Chandrashekar, J., et al. | Anonymized Internet Traces | 2013-03 |
Berlin, DE | Probability estimation over large-scale random networks via ... | Freno, A., Keller, M., et al. | Topology with Skitter | 2013-12 |
Beijing, CN | Modeling and understanding burst transmission for energy eff ... | Meng, J., Ren, F., et al. | Anonymized Internet Traces | 2017-07 |
Orlando, FL, US | A tale of nine Internet exchange points: studying path laten ... | Ahmad, M.Z., Guha, R. | Topology with BGP | 2012-10 |
Tezpur, IN | DyProSD: a dynamic protocol specific defense for high-rate D ... | Boro, D., Bhattacharyya, D.K | Denial of Service Attacks, Anonymized Internet Traces | 2017-03 |
Blacksburg, VA, US | A study of the structure and vulnerabilities of metropolitan ... | Chen, J., Kumar, V.S.A., et al. | Topology with Skitter, Topology with Archipelago | 2016-01 |
Madrid, ES | On the diversity of interdomain routing in Africa | Fanou, R., Francois, P., et al. | Topology with BGP | 2015-03 |
Champaign, IL, US | MiddlePolice: Fine-grained endpoint-driven in-network traffi ... | Liu, Z., Jin, H., et al. | Topology with BGP | 2017-09 |
Grenoble, FR | IBTrack: an ICMP black holes tracker | Jacquin, L., Roca, V., et al. | Topology with Archipelago | 2012-03 |
Cairo, EG | Distributed packet filtering based on IP traceback | Khanmohammadi, K., Fallah, M. | Topology with Skitter | 2006-00 |
Warsaw, PL | Multi-criteria decision algorithms for efficient content del ... | Beben, A., Batalla, J.M., et al. | Topology with BGP | 2012-08 |
Manipur, IN | Detection of DDoS DNS amplification attack using classificat ... | Meitei, I., Singh, K., et al. | Anonymized Internet Traces | 2016-08 |
Wurzburg, DE | Towards efficient simulation of large scale P2P networks | Hobfeld, T., Binzenhofer, A., et al. | Topology with Skitter | 2005-10 |
Sydney, AU | Visualising Internet traffic data with three-dimensional sph ... | Yip, B., Goyette, S., et al. | Topology with Skitter | 2005-00 |
Seoul, KR | Distributed-SOM: A novel performance bottleneck handler for ... | Phan, T., Bao, N., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2017-08 |
Gaithersburg, MD, US | The resilience of the Internet to colluding country induced ... | Mell, P., Harang, R., et al. | Topology with Archipelago | 2015-02 |
Eugene, OR, US | Measurement-Based Characterization of Large-Scale Networked ... | Motamedi, R. | Topology with BGP | 2016 |
Pullman, WA, US | Netshuffle: Improving traffic trace anonymization through gr ... | Valgenti, V.C., Paul, R.R., et al. | Anonymized Internet Traces | 2011-06 |
Beijing, CN | Multipath interdomain routing via deviation from primary pat ... | Qin, D., Yang, J., et al. | Topology with BGP | 2012-02 |
Munich, DE | Partitioning the Internet | Wachs, M., Grothoff, C., et al. | Topology with Archipelago, Topology with BGP | 2012-10 |
Pisa, IT | On the feasibility of measuring the internet through smartph ... | Faggiani, A., Gregori, E., et al. | Topology with Archipelago | 2012-05 |
Hong Kong, CN | Cybercrime deterrence and international legislation: Evidenc ... | Hui, K.-L., Kim, S.H., et al. | UCSD Network Telescope | 2016-05 |
College Station, TX, US | Denial of Service attacks: path reconstruction for IP traceb ... | Dube, R. | Topology with Skitter | 2004-12 |
Naples, IT | Worm traffic analysis and characterization | Dainotti, A., Pescape, A., et al. | UCSD Network Telescope | 2007-06 |
Nanjing, CN | Disclosing the element distribution of Bloom filter | Peng, Y., Gong, J., et al. | UCSD Network Telescope | 2006-05 |
Montreal, QC, CA | Autonomous system ranking by topological characteristics: A ... | Tozal, M.E. | Topology with BGP | 2017 |
Helsinki, FI | Canopy: publish/subscribe with upgraph combination | Tarkoma, S., Antikainen, M. | Topology with BGP | 2010-05 |
Hamburg, DE | On performance and robustness of Internet-based smart grid c ... | Meiling, S., Schmidt, T.C., et al. | Topology with BGP | 2015-11 |
Barcelona, ES | Neural network-based autonomous allocation of resources in v ... | Mijumbi, R., Gorricho, J.-L., et al. | Anonymized Internet Traces | 2014-06 |
Stony Brook, NY, US | High-speed multicast scheduling for all-optical packet switc ... | Guo, Z., Yang, Y. | Anonymized Internet Traces | 2013-07 |
Petropolis, RJ, BR | Distributed assessment of the closeness centrality ranking i ... | Wehmuth, K., Ziviani, A. | Topology with Skitter | 2012-04 |
Milan, IT | Relaxing state-access constraints in stateful programmable d ... | Cascone, C., Bifulco, R., et al. | Anonymized Internet Traces | 2017-03 |
Baltimore, MD, US | Discovery of persistent threat structures through temporal a ... | Namayanja, J.M., Janeja, V.P. | Anonymized Internet Traces | 2013-06 |
Los Angeles, CA, US | MPLS under the microscope: Revealing actual transit path div ... | Vanaubel, Y., Merindol, P., et al. | Topology with Archipelago | 2015-10 |
Urbana-Champaign, IL, US | Efficient large flow detection over arbitrary windows: an ex ... | Wu, H. | Anonymized Internet Traces | 2015-10 |
Haifa, IL | Heavy hitters in streams and sliding windows | Ben-Basat, R., Einziger, G., et al. | Anonymized Internet Traces | 2016-04 |
Fort Collins, CO, US | Cooperative defense mechanism for detection, identification, ... | Ghahfarokhi, N. | Denial of Service Attacks | 2016-08 |
Kaiserslautern, DE | Analysis of the Internet's structural evolution | Haddadi, H., Fay, D., et al. | Topology with Skitter | 2009-09 |
Hempstead, NY, US | ADL: Active dictionary learning for sparse representation | Tang, B., Xu, J., et al. | Topology with BGP | 2017-05 |
Hong Kong, CN | Toward continuous push-based P2P live streaming | Ren, D., Wong, W., et al. | Topology with Archipelago | 2012-12 |
Hamburg, DE | A virtual and distributed control layer with proximity aware ... | Knauf, A., Hege, G., et al. | Topology with Archipelago | 2010-08 |
Nanjing, CN | Two propositions about geographical distributions of BitTorr ... | Chen, M., Yu, L., et al. | Topology with BGP | 2011-11 |
Wuhan, CN | Locality-awareness in BitTorrent-like P2P applications | Liu, B., Cui, Y., et al. | Topology with BGP | 2009-04 |
FR | On Computing the Gromov Hyperbolicity | Cohen, N., Coudert, D., et al. | Topology with BGP | 2015-08 |
Princeton, NJ, US | Optimizing implicit proxy placement to evade traffic filters | Cesareo, J. | Topology with BGP | 2012-06 |
Guangzhou, CN | Mathematical analysis of active DDoS defense systems | Li, Z., Xiang, Y. | Topology with Skitter | 2006-11 |
Halifax, NS, CA | Investigating unique flow marking for tracing back DDoS atta ... | Aghaei-Foroushani, V., Zincir-Heywood, A.N. | Denial of Service Attacks, Anonymized Internet Traces | 2015-05 |
College Park, MD, US | Triangle inequality and routing policy violations in the int ... | Lumezanu, C., Baden, R., et al. | Topology with BGP | 2009-03 |
Espoo, FI | Denial-of-service attacks in bloom-filter-based forwarding | Antikainen, M., Aura, T., et al. | Topology with BGP | 2014-10 |
Gif sur Yvette, FR | aSHIIP: Autonomous generator of random internet-like topolog ... | Tomasik, J., Weisser, M.-A. | Topology with Archipelago | 2010-09 |
Kyushu, JP | Adaptive anomaly detection for SDN | Sahri, N.M., Okamura, K. | Anonymized Internet Traces | 2015-00 |
Shanghai, CN | Robust network construction against intentional attacks | Wang, H., Cui, W., et al. | Topology with BGP | 2015-02 |
New York, NY, US | Authentication Challenges in a Global Environment | Matsumoto, S., Reischuk, R.M., et al. | Topology with BGP | 2017 |
Gif sur Yvette, FR | The inter-domain hierarchy in measured and randomly generate ... | Tomasik, J., Weisser, M.-A. | Topology with BGP | 2012-06 |
Boulder, CO, US | Current trends and controversies in Internet peering and tra ... | Reed, D., Warbritton, D., et al. | Topology with Archipelago | 2014-09 |
Paris, FR | Can MPTCP Secure Internet Communications from Man-in-the-Mid ... | Nguyen, H., Phung, C., et al. | Topology with Archipelago | 2017 |
Munich, DE | Push away your privacy: Precise user tracking based on TLS c ... | Wachs, M., Scheitle, Q., et al. | Topology with BGP | 2017-06 |
Pittsburgh, PA, US | STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapme ... | Hsiao, H.-C., Kim, T.H., et al. | Topology with BGP | 2013-05 |
Tehran, IR | TDPF: a traceback-based distributed packet filter to mitigat ... | Fallah, M.S., Kahani, N. | Topology with Skitter | 2014-02 |
Lisbon, PT | Scaling the Internet routing system through route aggregatio ... | Sousa, A.C.M. | Topology with BGP | 2014-10 |
West Lafayette, IN, US | Camouflaging timing channels in web traffic | Sellke, H., Wang, C.-C., et al. | Anonymized Internet Traces | 2009-12 |
Hong Kong, CN | Content peering in content centric networks | Wang, J.M., Dai, X., et al. | Topology with BGP | 2014-09 |
Buenos Aires, AR | http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsuali ... | Alvarez-Hamelin, J.I., Anunziata, D., et al. | Topology with BGP | 2011-07 |
Austin, TX, US | Stochastic pre-classification for SDN data plane matching | McHale, L., Casey, C.J., et al. | Anonymized Internet Traces | 2014-08 |
Madison, WI, US | Bitmap algorithms for counting active flows on high speed li ... | Estan, C., Varghese, G., et al. | Anonymized Internet Traces | 2006-10 |
Monterey, CA, US | Revisiting AS-level graph reduction | Rye, E.C., Rohrer, J.P., et al. | Topology with Archipelago | 2016-04 |
Aveiro, PT | Localization and spreading of diseases in complex networks | Goltsev, A.V., Dorogovtsev, S.N., et al. | Topology with Skitter | 2012-09 |
Beijing, CN | Measurement of large-scale BGP events: Definition, detection ... | Chen, M., Xu, M., et al. | Topology with BGP | 2016 |
Halifax, CA | On evaluating IP traceback schemes: a practical perspective | Aghaei-Foroushani, V., Zincir-Heywood, A.N. | Anonymized Internet Traces | 2013-05 |
Bucharest, RO | Initial design of cloud infrastructure and federation mechan ... | Agache, A., Antichi, G., et al. | Topology with BGP | 2016-02 |
Stonybrook, NY, US | Holding all the ASes: Identifying and circumventing the pitf ... | Nithyanand, R., Singh, R., et al. | Topology with Archipelago | 2016-05 |
Beijing, CN | On the applicability of software defined networking to large ... | Luao, H.; Cui, J.; Chen, G.; Chen, et al. | Anonymized Internet Traces | 2014-08 |
Linkoping, SE | Estimating Internet-scale Quality of Service parameters for ... | Niemela, M. | Topology with BGP | 2016-03 |
Monterey, CA, US | IPv6 geolocation using latency constraints | Tran, T.V.H. | Topology with Archipelago | 2014-03 |
Halifax, CA | A comprehensive study on one-way backscatter traffic analysi ... | Balkanli, E. | UCSD Network Telescope, Denial of Service Attacks, Anonymized Internet Traces | 2015-04 |
Hamilton, NY, US | On the prevalence and characteristics of MPLS deployments in ... | Sommers, J., Erikson, B., et al. | Topology with Archipelago, Topology with BGP | 2011-11 |
Osaka, JP | On-line detection of persistently high packet-rate flows via ... | Kudo, T., Takin, T. | UCSD Network Telescope, Anonymized Internet Traces | 2014-01 |
Tokyo, JP | A novel hybrid IP traceback scheme with packet counters | Karasawa, T., Soshi, M., et al. | Topology with Skitter | 2012-11 |
Eugene, OR, US | Investigating the mutual impact of the P2P overlay and the A ... | Ekbatani, H.R. | Topology with BGP | 2012-12 |
Jerusalem, IL | One hop for RPKI, one giant leap for BGP security | Cohen, A., Gilad, Y., et al. | Topology with BGP | 2015-11 |
Aalto, FI | Models and tools for the high-level simulation of a name-bas ... | Visala, K., Keating, A., et al. | Topology with BGP | 2014-04 |
Zurich, CH | The Case for In-Network Replay Suppression | Lee, T., Pappas, C., et al. | Anonymized Internet Traces | 2017-04 |
Sendai, JP | DTRAB: Combating against attacks on encrypted protocols thro ... | Fadlullah, Z.M., Taleb, T., et al. | UCSD Network Telescope | 2010-08 |
Boca Raton, FL, US | Big data sanitization and cyber situational awareness: A Net ... | Bou-Harb, E., Husak, M., et al. | UCSD Network Telescope | 2017-07 |
Koganei, JP | Experiences in emulating 10K AS topology with massive VM mul ... | Miwa, S., Suzuki, M., et al. | Topology with BGP | 2009-08 |
Vienna, AT | Pattern discovery in Internet background radiation | Iglesias, F., Zseby, T. | UCSD Network Telescope | 2017-07 |
Nancy, FR | Tracking global wide configuration errors | Francois, J., State, R., et al. | UCSD Network Telescope | 2006-09 |
Wurzburg, DE | Who profits from peer-to-peer file-sharing? Traffic optimiza ... | Burger, V., Lehrieder, F., et al. | Topology with BGP | 2012-09 |
Halifax, CA | On the effectiveness of different botnet detection approache ... | Haddadi, F., Le Cong, D., et al. | UCSD Network Telescope | 2015-05 |
Indore, IN | An Experience Report on Scalable Implementation of DDoS Atta ... | Dorbala, S.Y., Hubballi, N. | Denial of Service Attacks | 2015-05 |
Paris, FR | Improved algorithms for network topology discovery | Donnet, B., Friedman, T., et al. | Topology with Skitter | 2005-03 |
Vienna, AT | MiddlePolice: Toward Enforcing Destination-Defined Policies ... | Liu, Z., Jin, H., et al. | Topology with BGP | 2016 |
Leganes, ES | 'I can't get no satisfaction': Helping autonomous systems id ... | Cardona, J.C., Vissicchio, S., et al. | Topology with BGP | 2016-03 |
Beijing, CN | Route leaks identification by detecting routing loops | Li, S., Duan, H., et al. | Topology with BGP | 2015-10 |
Phoenix, AZ, US | Behavioral graph analysis of Internet applications | Xu, K., Wang, F. | Anonymized Internet Traces | 2011-12 |
Uberlandia, BR | Performance comparison of forecasting models applied to LAN/ ... | Matias, R., Carvalho, A.M.M., et al. | Anonymized Internet Traces | 2011-10 |
Newark, NJ, US | Enumerating single destination, policy-preferred paths in AS ... | Tozal, M.E. | Topology with BGP | 2016 |
Tezpur, IN | Applying data mining techniques in anomaly based network int ... | Bhuyan, M.H. | Denial of Service Attacks | 2013-09 |
Suwon, KR | PMS an expeditious marking scheme to combat with the DDoS at ... | Tariq, U., Hong, M., et al. | Topology with Skitter | 2005-12 |
Richland, WA, US | Massive scale cyber traffic analysis: A driver for graph dat ... | Joslyn, C., Choudhury, S., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2013-06 |
Johannesburg, ZA | A source analysis of the Conficker outbreak from a Network T ... | Irwin, B. | UCSD Network Telescope | 2013-06 |
Jorhat, IR | Low-Rate and High-Rate Distributed DoS Attack Detection Usin ... | Bhuyan, M.H., Kalwar, A., et al. | Denial of Service Attacks | 2015-04 |
Haifa, IL | Network formation games and the Internet structure | Meirom, E.A., Mannor, S., et al. | Topology with BGP | 2013-08 |
Shenyang, CN | On the Internet AS-level topology evolution basing on hierar ... | Zhang, X., Zhao, H., et al. | Topology with Skitter | 2008-12 |
Wurzburg, DE | Performance evaluation and optimization of Content Delivery ... | Burger, V. | Topology with BGP | 2017-05 |
Johor, MA | An Evaluation on KNN-SVM Algorithm for Detection and Predict ... | Yusof, A.R., Udzir, N.I., et al. | Denial of Service Attacks | 2016-07 |
Riverside, CA, US | Public real data repositories and measurement tools | Faloutsos, M. | Topology with Skitter | 2006-04 |
Assam, IN | Rank correlation for low-rate DDoS attack detection: An empi ... | Ain, A., Bhuyan, M.H., et al. | Denial of Service Attacks | 2014-11 |
Philadelphia, PA, US | All-pairs shortest-paths for large graphs on the GPU | Katz, G.J., Kider, J.T. | Topology with BGP | 2008-06 |
Cookeville, TN, US | Scalable anomaly detection in graphs | Eberle, W., Holder, L. | Topology with BGP | 2015 |
Halifax, CA | IP traceback through (authenticated) deterministic flow mark ... | Aghaei-Foroushani, V., Zincir-Heywood, A.N. | Anonymized Internet Traces | 2013-11 |
Ottawa, CA | On Improving DREAM Framework with Estimations and ProgME | Remedios, R. | Anonymized Internet Traces | 2017-00 |
Loughborough, UK | Using wavelets for compression and detecting events in anoma ... | Kyriakopoulos, K.G., Parish, D.J. | UCSD Network Telescope | 2009-09 |
Iwate, JP | Evaluation of a distributed detecting method for SYN flood a ... | Narita, M., Katoh, T., et al. | UCSD Network Telescope | 2011-03 |
Kochi, IN | DDoS Attack Detection Using Fast Entropy Approach on Flow- B ... | David, J., Thomas, C. | Denial of Service Attacks | 2015-05 |
Jorhat, IN | E-LDAT: a lightweight system for DDoS flooding attack detect ... | Bhuyan, M., Bhattacharyya, D., et al. | Denial of Service Attacks | 2016-07 |
Madrid, ES | A simple analytical model for energy efficient ethernet | Marsan, M.A., Fernandez Anta, A., et al. | Anonymized Internet Traces | 2011-07 |
Valbonne, FR | LogNet: Extending Internet with a network aware discovery se ... | Liquori, L., Sereno, M. | Topology with BGP | 2016-09 |
Ramat-Gan, IL | Vulnerable delegation of DNS resolution | Herzberg, A., Shulman, H. | Anonymized Internet Traces | 2013-09 |
Amsterdam, NL | Border Gateway modeling and simulation | Wojciechowski, M. | Topology with BGP | 2008-09 |
Haifa, IL | The variable-increment counting Bloom filter | Rottenstreich, O., Kanizo, Y., et al. | Anonymized Internet Traces | 2012-03 |
Tokyo, JP | Analysis of cooperative management strategies against route- ... | Akashi, O. | Topology with Skitter, Topology with BGP | 2011-05 |
Valencia, ES | Network performance analysis based on histogram workload mod ... | Hernandez-Orallo, E., Vila-Carbo, J. | Anonymized Internet Traces | 2007-10 |
Madrid, ES | A synergetic use of Bloom filters for error detection and co ... | Reviriego, P., Pontarelli, S., et al. | Anonymized Internet Traces | 2015-03 |
Santa Clara, CA, US | SDX-Based Flexibility or Internet Correctness?: Pick Two! | Birkner, R., Gupta, A., et al. | Topology with BGP, Anonymized Internet Traces | 2017 |
San Diego, CA, US | New directions in traffic measurement and accounting: focusi ... | Estan, C., Varghese, G. | Anonymized Internet Traces | 2003-08 |
Harbin, CN | Identifying heavy hitters in high-speed network monitoring | Zhang, Y., Fang, B.X., et al. | Anonymized Internet Traces | 2010-03 |
Hatfield, UK | An enhanced fuzzy ARM approach for intrusion detection | Abouzakhar, N.S., Chen, H., et al. | UCSD Network Telescope | 2011-04 |
Jalandhar, IN | DDoS attack's simulation using legitimate and attack real da ... | Singh, J., Kumar, K., et al. | Denial of Service Attacks | 2012-06 |
Eugene, OR, US | DETERMINING THE LOCATION OF AUTONOMOUS SYSTEM RELATIONS AMON ... | Kriegel, P. | Topology with BGP | 2016 |
Fukushima, JP | Large-scale network packet analysis for intelligent DDoS att ... | Kato, K., Klyuev, V. | Denial of Service Attacks | 2014-12 |
Singapore, SG | Efficient extraction of high-Betweenness vertices from heter ... | Chong, W.H., Toh, W.S.B., et al. | Topology with BGP | 2013-00 |
Los Angeles, CA, US | GA-based internet traffic classification technique for QoS p ... | Park, J., Tyan, H.-R., et al. | Anonymized Internet Traces | 2006-12 |
Palo Alto, CA, US | Rethinking packet forwarding hardware | Casado, M., Koponen, T., et al. | Anonymized Internet Traces | 2008-11 |
Kapurthala, IN | Computer Networks Detection of DDoS attacks and flash events ... | Behal, S., Kumar, K. | Denial of Service Attacks | 2017-04 |
Madrid, ES | Inter-domain traffic management in an evolving Internet peer ... | Cardona, J.C. | Topology with BGP | 2016-06 |
Vienna, AT | A framework for fine-grained inter-domain routing diversity ... | Wang, Y., Bi, J., et al. | Topology with BGP | 2016 |
Pisa, IT | k-clique communities in the Internet AS-level topology graph | Gregori, E., Lenzini, L., et al. | Topology with Archipelago | 2011-06 |
Piscalaway, NJ, US | Optimal Monitor Assignment for Preferential Link Tomography ... | Dong, W., Gao, Y., et al. | Topology with Archipelago, Topology with BGP | 2017 |
Boston, MA, US | Tunneling for transparency: A large-scale analysis of end-to ... | Chung, T., Choffnes, D., et al. | Topology with BGP | 2016-11 |
Durham, NC, US | Head into the Cloud: An Analysis of the Emerging Cloud Infra ... | Chandrasekaran, B. | Topology with Archipelago, Topology with BGP | 2016 |
Xiamen, CN | A novel botnet detection method based on preprocessing data ... | Kong, X., Chen, Y., et al. | Denial of Service Attacks | 2016-10 |
Yorktown Heights, NY, US | Coalitionally stable pricing schemes for inter-domain forwar ... | Bhardwaj, O., Anschelevich, E., et al. | Topology with Skitter | 2016 |
Boston, MA, US | Using Inspiration from Synaptic Plasticity Rules to Optimize ... | Suen, J.Y., Navlakha, S. | Topology with BGP | 2017 |
Athens, GR | The multiple instances of node centrality and their implicat ... | Nomikos, G., Pantazopoulos, P., et al. | Topology with Archipelago | 2013-12 |
Seattle, WA, US | Consensus routing: the internet as a distributed system | John, J.P., Katz-Bassett, E., et al. | Topology with BGP | 2008-04 |
Ann Arbor, MI, US | Measuring IPv6 adoption | Czyz, J., Allman, M., et al. | Topology with Archipelago | 2014-08 |
Austin, TX, US | Collaborative verification of forward and reverse reachabili ... | Yang, H., Lam, S.S. | Topology with BGP | 2014-10 |
Stanford, CA, US | Tiny buffers for electronic and optical routers | Beheshti-Zavareh, N. | Anonymized Internet Traces | 2009-12 |
Pittsburgh, PA, US | PHI: Path-Hidden Lightweight Anonymity Protocol at Network L ... | Chen, C., Perrig, A. | Topology with BGP, Anonymized Internet Traces | 2016 |
Boston, MA, US | On supporting mobility and multihoming in recursive internet ... | Ishakian, V., Akinwumi, J., et al. | Anonymized Internet Traces | 2012-07 |
Beijing, CN | Towards high-performance network application identification ... | He, F., Xiang, F., et al. | Anonymized Internet Traces | 2011-05 |
Guangzhou, CN | A General Collaborative Framework for Modeling and Perceivin ... | Xie, Y., Wang, Y., et al. | Anonymized Internet Traces | 2016-01 |
Oslo, NO | Resource adaptive distributed information sharing | Hansen, H.V., Goebel, V., et al. | Anonymized Internet Traces | 2010-06 |
Istanbul, TR | Comparative evaluation of community detection algorithms: a ... | Orman, G.K., Labatut, V., et al. | Topology with BGP | 2012-08 |
Minneapolis, MN, US | Routing around decoys | Schuchard, M., Geddes, J., et al. | Topology with BGP | 2012-10 |
Coimbatore, IN | DDoS detection system using wavelet features and semi-superv ... | Srihari, V., Anitha, R. | Denial of Service Attacks | 2014-09 |
Haifa, IL | Optimal dynamic hash tables | Kanizo, Y., Hay, D., et al. | Anonymized Internet Traces | 2009-00 |
Mountain View, CA, US | Scalable Verification of Networks With Packet Transformers U ... | Yang, H., Lam, S.S. | Topology with BGP | 2017 |
Las Vegas, NV, US | A modular architecture for scalable inter-domain routing | Nozaki, Y., Golen, E., et al. | Topology with BGP | 2017 |
Berkeley, CA, US | Achieving flexibility and performance for packet forwarding ... | Moon, D. | Anonymized Internet Traces | 2010-05 |
Berkeley, CA, US | Target generation for Internet-wide IPv6 scanning | Murdock, A., Li, F., et al. | Topology with BGP | 2017-11 |
Havana, CU | A novel rule generator for intrusion detection based on freq ... | Semenets, V., Alonso, A. | Denial of Service Attacks | 2017-00 |
Imphal, IN | Distributed denial of service attack detection using Naive B ... | Singh, N., Singh, K., et al. | Denial of Service Attacks | 2016-08 |
Vienna, AT | Towards DisNETPerf: a distributed Internet paths performance ... | Wassermann, S., Casas, P., et al. | Topology with BGP | 2015-12 |
Gainesville, FL, US | An efficient spectral bound for link vulnerability assessmen ... | Dinh, T.N., Shen, Y., et al. | Topology with BGP | 2012-10 |
Bydgoszcz, PL | DDoS attacks detection by means of greedy algorithms | Andrysiak, T., Saganowski, L., et al. | UCSD Network Telescope | 2013-00 |
Waterloo, CA | Performance analysis of TCAMs in switches | Tawakol, A. | Anonymized Internet Traces | 2012-04 |
Barcelona, ES | A neuro-fuzzy approach to self-management of virtual network ... | Mijumbi, R., Gorricho, J.-L., et al. | Anonymized Internet Traces | 2015-02 |
Atlanta, GA, US | Realistic topology modeling for the internet BGP infrastruct ... | Raghavan, V., Riley, G., et al. | Topology with BGP | 2008-09 |
Zhengzhou, CN | Identifying elephant flows in internet backbone traffic with ... | Zhang, Z.; Wang, B.; Lan, J. | Anonymized Internet Traces | 2015-05 |
London, UK | Techniques for flow inversion on sampled data | Clegg, R., Landa, R., et al. | Anonymized Internet Traces | 2008-04 |
Madrid, ES | Development and evaluation of a low-cost scalable architectu ... | Martinez, V.M. | Anonymized Internet Traces | 2012-00 |
Pittsburgh, PA, US | The coremelt attack | Studer, A., Perrig, A. | Topology with BGP | 2009-09 |
Assam, IN | A novel measure for low-rate and high-rate DDoS attack detec ... | Hoque, N., Bhattacharyya, D.K., et al. | Denial of Service Attacks | 2016-01 |
Seattle, WA, US | Transport layer reneging | Ekiz, N., Amer, P.D. | Anonymized Internet Traces | 2014-10 |
Pittsburgh, PA, US | The impact of the Internet on global industry: New evidence ... | Huang, T.T., Sun, B.Q. | Topology with Skitter | 2015-09 |
Serdang, MY | Distributed Denial of Service detection using hybrid machine ... | Barati, M.; Abdullah, A.; Udzir, N.I.; Mahmod, et al. | Denial of Service Attacks, Anonymized Internet Traces | 2014-08 |
Changsha, CN | Failure isolation based defense against Internet CXPST-like ... | Liu, H., Hu, X., et al. | Topology with BGP | 2012-04 |
Tokyo, JP | Low-power network-packet-processing architecture using proce ... | Okuno, M., Ishida, S., et al. | Anonymized Internet Traces | 2005-04 |
San Antonio, TX, US | Predicting cyber attack rates with extreme values | Zhan, Z., Xu, M., et al. | UCSD Network Telescope | 2015-08 |
AZ, US | Making inter-domain routing power-aware? | Shi, J., Zhang, B. | Topology with BGP | 2014-02 |
London, UK | Looking for hypergiants in PeeringDB | Bottger, T., Cuadrado, F., et al. | Topology with BGP | 2017-01 |
Ikoma, JP | Outfitting an inter-AS topology to a network emulation testb ... | Hazeyama, H., Suzuki, M., et al. | Topology with BGP | 2008-07 |
Changsha, CN | k-Fault tolerance of the Internet AS graph | Deng, W., Karaliopoulos, M., et al. | Topology with BGP | 2011-04 |
Boston, MA, US | On supporting mobility and multihoming in recursive internet ... | Ishakian, V., Akinwumi, J., et al. | Anonymized Internet Traces | 2010-10 |
Beijing, CN | Quantifying the flattening of Internet topology | Wang, Y., Zhang, K. | Topology with Skitter, Topology with Archipelago, Topology with BGP | 2016-06 |
Coimbatore, IN | Botnet detection via mining of traffic flow characteristics | Kirubavathi, G., Anitha, R. | UCSD Network Telescope | 2016-02 |
Stony Brook, NY, US | A Churn for the Better: Localizing Censorship using Network- ... | Cho, S., Nithyanand, R., et al. | Topology with Archipelago, Topology with BGP | 2017 |
Madison, WI, US | Learning network structure from passive measurements | Eriksson, B., Barford, P., et al. | Topology with Skitter | 2007-10 |
Paris, FR | Complex network measurements: estimating the relevance of ob ... | Latapy, M., Magnien, C. | Topology with Skitter | 2008-04 |
Paris, FR | A CIDR stopping rule for topology discovery | Donnet, B., Friedman, T. | Topology with Skitter | 2005-05 |
Caparica, PT | Multipath policy routing for the inter-domain scenario | Amaral, P., Bernardo, L., et al. | Topology with BGP | 2014-06 |
Boston, MA, US | Geometric exploration of the landmark selection problem | Tang, L., Crovella, M. | Topology with Skitter | 2004-05 |
Aarhus, DK | Self-organizing weights for Internet AS-graphs and surprisin ... | Scholz, J., Greiner, M. | Topology with Skitter, Topology with BGP | 2011-04 |
Leicester, UK | Connectivity measures for internet topologies | Erlebach, T., Moonen, L.S., et al. | Topology with Skitter | 2005-12 |
Tel-Aviv, IL | Improving AS relationship inference using PoPs | Neudorfer, L., Shavitt, Y., et al. | Topology with BGP | 2013-04 |
Baltimore, MD, US | Worm evolution tracking via timing analysis | Rajab, M., Monrose, F., et al. | UCSD Network Telescope | 2005-11 |
Beijing, CN | CIDS: Adapting Legacy Intrusion Detection Systems to the Clo ... | Xia, Q., Chen, T., et al. | Anonymized Internet Traces | 2016-12 |
Limerick, IE | The unreasonable effectiveness of tree-based theory for netw ... | Melnik, S., Hackett, A., et al. | Topology with Skitter, Topology with BGP | 2011-03 |
Fort Wayne, IN, US | Characterising heterogeneity in vulnerable hosts on worm pro ... | Chen, Z., Chen, C. | UCSD Network Telescope | 2016-01 |
Lexington, KY, US | Low-complexity multi-resource packet scheduling for network ... | Li, X., Qian, C. | Anonymized Internet Traces | 2015-08 |
Amsterdam, NL | BGP Routing Security and Deployment Strategies | Eikema, B. | Topology with BGP | 2015 |
Ames, IA, US | A machine learning approach to edge type prediction in Inter ... | Varghese, J.S., Ruan, L. | Topology with BGP | 2015-07 |
Liege, BE | Towards a middlebox policy taxonomy: Path impairments | Edeline, K., Donnet, B. | Topology with Archipelago | 2015-04 |
Ishikawa, JP | Design and implementation of XBurner | Miyachi, T., Miwa, S. | Topology with BGP | 2013-03 |
Minneapolis, MI, US | Toward building practical privacy enhancing technologies | Lin, Z. | Anonymized Internet Traces | 2012-07 |
Hangzhou, CN | Partially ordered sets in complex networks | Xuan, Q., Du, F., et al. | Topology with BGP | 2010-04 |
Madrid, ES | Batch to the future: analyzing timestamp accuracy of high-pe ... | Moreno, V., Santiago del Rio, P.M., et al. | Anonymized Internet Traces | 2012-10 |
Monterey, CA, US | Ingress point spreading: A new primitive for adaptive active ... | Baltra, G., Beverly, R., et al. | Topology with Archipelago | 2014-03 |
Vancouver, CA | RealNet: A topology generator based on real Internet topolog ... | Cheng, L., Hutchinson, N., et al. | Topology with Skitter | 2008-03 |
Rome, IT | Investigating the trade-off between overhead and delay for f ... | Iacovazzi, A., Baiocchi, A. | Anonymized Internet Traces | 2013-06 |
Bandung, IN | Traffic anomaly detection in DDos flooding attack | Purwanto, Y., Kuspriyanto, Hendrawan, et al. | Denial of Service Attacks | 2014-10 |
Buenos Aires, AR | Estudio del Trafico Autosimilar Orientado a la Simulacion Me ... | Scappini, R. | Anonymized Internet Traces | 2010-08 |
Toronto, CA | Multi-layer increasing coherence clustering of Autonomous Sy ... | Andreopoulos, B., Aijun, A., et al. | Topology with Skitter | 2005-04 |
Chung-Li, TW | Sketch-guided filtering support for detecting superspreaders ... | Wellem, T., Lai, Y.-K. | Anonymized Internet Traces | 2016-08 |
Lexington, KY, US | Distributed and collaborative traffic monitoring in software ... | Yu, Y., Qian, C., et al. | Anonymized Internet Traces | 2014-08 |
Berkeley, CA, US | Continuous time group discovery in dynamic graphs | Miller, K., Eliassi-Rad, T. | Topology with BGP | 2009-12 |
Rome, IT | Efficient flow sampling with back-annotated cuckoo hashing | Pontarelli, S., Reviriego, P., et al. | Anonymized Internet Traces | 2014-10 |
Vigo, ES | Optimal configuration of energy-efficient ethernet | Herreria-Alonso, S., Rodriguez-Perez, M., et al. | Anonymized Internet Traces | 2012-03 |
Gyeongsan, KR | A long range dependent Internet traffic model using unbounde ... | Kim, S., Nam, S.Y. | Anonymized Internet Traces | 2013-01 |
Maynooth, Dublin, IE | Towards a Renewed Alias Resolution with Space Search Reducti ... | Grailet, J.F., Donnet, B. | Topology with BGP | 2017 |
Tempe, AZ, US | On the Safety and Efficiency of Virtual Firewall Elasticity ... | Deng, J., Li, H., et al. | Anonymized Internet Traces | 2017-06 |
Victoria, BC, CA | Semantic graph compression with hypergraphs | Borici, A., Thomo, A. | Topology with BGP | 2014-05 |
Stonybrook, NY, US | Investigating interdomain routing policies in the wild | Anwar, R., Niaz, H., et al. | Topology with BGP | 2015-10 |
Ruston, LA, US | Using network motifs to investigate the influence of network ... | Kiremire, A.R., Brust, M.R., et al. | Topology with Archipelago | 2014-10 |
Amsterdam, NL | Radian: Visual exploration of traceroutes | Candela, M., Bartolomeo, M., et al. | Topology with Archipelago | 2017-06 |
Istanbul, TR | Resource Mapping Optimization for Distributed Cloud Services | Aral, A. | Anonymized Internet Traces | 2016-11 |
Beijing, CN | Tracking millions of flows in high speed networks for applic ... | Pan, T., Guo, X., et al. | Anonymized Internet Traces | 2012-03 |
Los Angeles, CA, US | Resource/accuracy tradeoffs in software-defined measurement | Moshref, M., Yu, M., et al. | Anonymized Internet Traces | 2013-08 |
Madrid, ES | Application of Internet traffic characterization to all-opti ... | Santiago del Rio, P.M., Ramos, J., et al. | Anonymized Internet Traces | 2010-08 |
Beijing, CN | Passive IP traceback: capturing the origin of anonymous traf ... | Yao, G., Bi, J., et al. | UCSD Network Telescope | 2010-10 |
Haifa, IL | Reducing the reordering delay in multi-core network processo ... | Shpiner, A., Keslassy, I., et al. | Anonymized Internet Traces | 2012-01 |
Halifax, CA | A security framework based on flow marking IP-traceback tech ... | Foroushani, V.A. | Topology with Skitter, Denial of Service Attacks, Anonymized Internet Traces | 2016-07 |
Cape Town, ZA | Change-point cloud DDoS detection using packet inter-arrival ... | Osanaiye, O., Choo, K., et al. | Denial of Service Attacks | 2016-09 |
Mountain View, CA, US | Distributed divide-and-conquer techniques for effective DDoS ... | Muthuprasanna, M., Manimaran, G. | Topology with Skitter | 2008-06 |
Barcelona, ES | Information theoretic measures for the detection of anomalie ... | Gonzalez, C. | UCSD Network Telescope | 2014-06 |
Nanjing, CN | OpenISMA: An Approach of Achieving a Scalable OpenFlow Netwo ... | Wang, M., Zhou, H., et al. | Topology with BGP | 2015 |
Davis, CA, US | Streaming solutions for fine-grained network traffic measure ... | Khan, F., Hosein, N., et al. | UCSD Network Telescope | 2014-04 |
Durham, NC | Mapping the whole Internet | Maggs, B. | Topology with Archipelago, Topology with BGP | 2014-08 |
Shanghai, CN | Benchmarking modern distributed streaming platforms | Qian, S., Wu, G., et al. | Anonymized Internet Traces | 2016-03 |
Urbana, IL, US | Statistical inference on network data | Zhang, J. | Topology with Skitter | 2014-05 |
Tokyo, JP | PhishCage: reproduction of fraudulent websites in the emulat ... | Miyamoto, D., Miyachi, T., et al. | Topology with BGP | 2013-03 |
Braga, PT | A modular traffic sampling architecture for flexible network ... | Silva, J.M.C. | Anonymized Internet Traces | 2016-01 |
Cambridge, MA, US | Adaptive cuckoo filters | Mitzenmacher, M., Pontarelli, S., et al. | Anonymized Internet Traces | 2017-04 |
Boston, MA, US | Small-world characteristics of the Internet and multicast sc ... | Jin, S., Bestavros, A. | Topology with Skitter | 2004-05 |
Berlin, DE | Towards a rigorous methodology for measuring adoption of RPK ... | Reuter, A., Bush, R., et al. | Topology with BGP | 2017-06 |
Talence, FR | Brief announcement: Routing the Internet with very few entri ... | Gavoille, C., Glacet, C., et al. | Topology with BGP | 2015-07 |
London, UK | Optimizing hybrid spreading in metapopulations | Zhang, C., Zhou, S., et al. | UCSD Network Telescope | 2015-04 |
Cambridge, MA, US | Measuring the effects of internet path faults on reactive ro ... | Feamster, N., Anderson, D., et al. | Topology with Skitter | 2003-06 |
York, UK | Markov-modulated on/off processes for long-range dependent i ... | Clegg, R. | Anonymized Internet Traces | 2006-10 |
Beijing, CN | Antiworm NPU-based parallel Bloom filters for TCP/IP content ... | Chen, Z., Lin, C., et al. | UCSD Network Telescope | 2005-11 |
Shenyang, CN | Correctness of sampling bias on Internet router-level topolo ... | Li, C., Zhao, H., et al. | Topology with Skitter | 2008-10 |
Fort Collins, CO, US | Epiphany: A location hiding architecture for protecting crit ... | Kambhampati, V., Papadopolous, C., et al. | Topology with Archipelago | 2012-06 |
Zurich, CH | On building onion routing into future Internet architectures | Asoni, D.E., Chen, C., et al. | Anonymized Internet Traces | 2016-05 |
Cambridge, UK | Antitrust analysis for the internet upstream market: a Borde ... | D'Ignazio, A., Giovannetti, E. | Topology with BGP | 2006-02 |
Shanghai, CN | Trading bandwidth for playback lag: Can active peers help? | Huang, D., Zhao, J., et al. | Topology with BGP | 2010-10 |
Kapurthala, IN | Characterizing DDoS attacks and flash events: Review, resear ... | Behal, S., Kumar, K., et al. | Denial of Service Attacks | 2017-08 |
Lafayette, LA, US | Cross-AS (X-AS) Internet topology mapping | Nur, A.Y., Tozal, M.E. | Topology with BGP | 2018-02 |
Madrid, ES | Would energy efficient ethernet be effective on 10Gbps optic ... | Reviriego, P., Larrabeiti, D., et al. | Anonymized Internet Traces | 2010-07 |
Ithaca, NY, US | PHY convert channels: Can you see the idles? | Wang, H., Lee, K.S., et al. | Anonymized Internet Traces | 2014-04 |
Tezpur, IN | Denial of Service attack detection using multivariate correl ... | Hoque, N., Bhattacharyya, D., et al. | Denial of Service Attacks | 2016-03 |
Tokyo, JP | Simulation study of BGP origin validation effect against mis ... | Ando, M., Okada, M., et al. | Topology with Archipelago, Topology with BGP | 2017-09 |
Madrid, ES | A method to protect Bloom filters from soft errors | Reviriego, P., Pontarelli, S., et al. | Anonymized Internet Traces | 2015-10 |
Urbana, IL, US | Design, analysis, and implementation of effective network fl ... | Houmansadr, A. | Anonymized Internet Traces | 2012-00 |
Kaunas, LT | Paskirstyto prievadu skenavimo ataku aptikimas tinklo srautu ... | Kulbis, A. | Anonymized Internet Traces | 2015-00 |
College Station, TX, US | Eliminating network protocol vulnerabilities through abstrac ... | Casey, C.J., Sutton, A., et al. | Anonymized Internet Traces | 2013-10 |
Shanghai, CN | StreamBench: Towards benchmarking modern distributed stream ... | Lu, R., Wu, G., et al. | Anonymized Internet Traces | 2014-12 |
Liege, BE | DISco: A distributed information store for network challenge ... | Martin, S., Chiarello, L., et al. | UCSD Network Telescope | 2012-05 |
Wuerzburg, DE | Performance evaluation and optimization of content distribut ... | Lehrieder, F. | Topology with BGP | 2013-06 |
Linkoping, SE | An analysis on the Internet topology | Leguay, J. | Topology with Skitter | 2004-03 |
Guangzhou, CN | CIPA: A collaborative intrusion prevention architecture for ... | Chen, X.-F., Yu, S.-Z. | UCSD Network Telescope, Denial of Service Attacks, Anonymized Internet Traces | 2015-12 |
Beijing, CN | MLV: A Multi-dimension Routing Information Exchange Mechanis ... | Chen, Z., Bi, J., et al. | Topology with BGP | 2015-11 |
Suwon, KR | A study on marking bit size for path identification method: ... | Kim, S., Hong, M., et al. | Topology with Skitter | 2004-00 |
Lexington, KY, US | Supporting application-based route selection | Wu, X., Griffioen, J. | Topology with BGP | 2014-08 |
Zouk Mosbeh, LB | Protecting TCP services from denial of service attacks | Farhat, H. | Topology with Skitter | 2006-09 |
Nagercoil, IN | A new ontology?based multi agent framework for intrusion det ... | Retnaswamy, B., Ponniah, K. | Anonymized Internet Traces | 2016-09 |
Seoul, KR | Bitmap-based prefix caching for fast IP lookup | Kim, J.-S., Ko, M.-C., et al. | Anonymized Internet Traces | 2014-03 |
Philadelphia, PA, US | Structural analysis of viral spreading processes in social a ... | Preciado, V.M., Draief, M., et al. | Topology with Skitter | 2012-09 |
Atlanta, GA, US | NetTimeView: Applying spatio-temporal data visualization tec ... | Shrestha, A.; Zhu, Y.; Manandhar, K. | Denial of Service Attacks | 2014-12 |
Paris, FR | Engineering a new loop-free shortest paths routing algorithm | D'Angelo, G., D'Emidio, M., et al. | Topology with Archipelago | 2012-00 |
Tokyo, JP | Increasing the darkness of darknet traffic | Haga, Y., Saso, A., et al. | UCSD Network Telescope | 2015-12 |
Ioannina, GR | Best Friends Forever (BFF): Finding Lasting Dense Subgraphs | Semertzidis, K., Pitoura, E., et al. | Topology with BGP | 2016 |
Prague, CZ | Automatic classification of network entities | Jancicka, J. | Topology with BGP | 2017-05 |
Enschede, NL | Flow-based compromise detection | Hofstede, R. | Anonymized Internet Traces | 2016-06 |
Debrecen, HU | Levy flights and fractal modeling of internet traffic | Terdik, G., Gyires, T. | Anonymized Internet Traces | 2009-02 |
London, UK | Modelling internet traffic using Markov chains | Clegg, R. | Anonymized Internet Traces | 2006-00 |
Coimbra, PT | Expedite feature extraction for enhanced cloud anomaly detec ... | Dalmazo, B.L., Vilela, J.P., et al. | Denial of Service Attacks | 2016-04 |
Hanoi, VN | An enhanced deterministic flow marking technique to efficien ... | Tuyen, D.V., Truong, T.H., et al. | Anonymized Internet Traces | 2014-10 |
Jinan, CN | A Novel OpenFlow-Based DDoS Flooding Attack Detection and Re ... | Wang, R., Zhang, Z., et al. | Denial of Service Attacks | 2015 |
Tokyo, JP | Inter-AS locator allocation of hierarchical automatic number ... | Fujikawa, K., Tazaki, H., et al. | Topology with BGP | 2012-07 |
Atlanta, GA, US | Modeling and simulations of worms and mitigation techniques | Abdelhafez, M. | Topology with Skitter | 2007-12 |
Kurukshetra, IN | Cross-site scripting (XSS) attacks and defense mechanisms: c ... | Gupta, S., Gupta, B.B. | UCSD Network Telescope | 2015-09 |
Bangalore, IN | BotSpot: fast graph based identification of structured P2P b ... | Venkatesh, B., Choudhury, S.H., et al. | Anonymized Internet Traces | 2015-11 |
Braga, PT | Optimizing network measurements through self-adaptive sampli ... | Silva, J.M.C., Lima, S.R. | Anonymized Internet Traces | 2012-06 |
Tel-Aviv, IL | CBTree: A practical concurrent self-adjusting search tree | Korenfeld, B. | Anonymized Internet Traces | 2012-05 |
Pisa, IT | The impact of IXPs on the AS-level topology structure of the ... | Gregori, E., Improta, A., et al. | Topology with Archipelago | 2011-01 |
Pasadena, CA, US | Understanding Internet topology: Principles, models, and val ... | Alderson, D., Li, L., et al. | Topology with Skitter | 2005-12 |
Changsha, CN | Design and implementation of Software Defined Hardware Count ... | Zhao, T., Li, T., et al. | Anonymized Internet Traces | 2016-03 |
Monterey, CA, US | Comparing internet probing methodologies through an analysis ... | Landry, B. | Topology with Archipelago | 2014-06 |
Pittsburgh, PA, US | StackPi: new packet marking and filtering mechanisms for DDo ... | Yaar, A., Perrig, A., et al. | Topology with Skitter | 2006-10 |
Las Vegas, NV, US | Towards variable length addressing for scalable Internet rou ... | Wang, F., Shao, X., et al. | Topology with Archipelago | 2016 |
San Diego, CA, US | Bitmap algorithms for counting active flows on high speed li ... | Estan, C., Varghese, G., et al. | Anonymized Internet Traces | 2003-10 |
PA, US | Private and Verifiable Interdomain Routing Decisions | Zhao, M., Zhou, W., et al. | Topology with BGP | 2016-04 |
Nancy, FR | Anomaly traceback using software defined networking | Francois, G., Festor, O. | Topology with Skitter | 2015-12 |
Rome, IT | Scalability measurements in an information-centric network | Melazzi, N.B., A. Detti, A., et al. | Anonymized Internet Traces | 2012-05 |
Beijing, CN | Catching popular prefixes at AS border routers with a predic ... | Zhang, W., Bi, J., et al. | Anonymized Internet Traces | 2012-03 |
Rome, IT | On the feasibility of static analysis for BGP convergence | Cittadini, L., Rimondini, M., et al. | Topology with BGP | 2009-08 |
Orlando, FL, US | Internet exchange points and Internet routing | Ahmad, M.Z., Guha, R. | Topology with Archipelago | 2011-10 |
Madison, WI, US | Network discovery from passive measurements | Eriksson, B., Barford, P., et al. | Topology with Skitter | 2008-08 |
Timisoara, RO | Domain relations in trees arborescence for interaction searc ... | Orzen, S.-N. | Topology with Archipelago | 2014-01 |
Beer-Sheba, IL | On network neutrality measurements | Maltinsky, A., Giladi, R.; Shavitt, et al. | Anonymized Internet Traces | 2017-06 |
Berlin, DE | Exploring reachability via settlement-free peering | Meyer, S., Wahlisch, M., et al. | Topology with BGP | 2012-12 |
Madrid, ES | Impact of prefix hijacking on payments of providers | Bangera, P., Gorinsky, S. | Topology with BGP | 2011-01 |
New York, NY, US | Two-Type Information Fusion Based IP-to-AS Mapping Table Ref ... | Jiang, Q., Hu, H., et al. | Topology with Archipelago, Topology with BGP | 2017 |
Beijing, CN | Symbiotic effect: A guideline for network modeling | Zhang, G.-Q., Zhang, G.-Q., et al. | Topology with Archipelago | 2009-09 |
Manhattan, KS, US | Viral conductance: Quantifying the robustness of networks wi ... | Youssef, M., Kooij, R., et al. | Topology with Skitter | 2011-03 |
Beijing, CN | Easily-implemented adaptive packet sampling for high speed n ... | Wang, H., Lin, Y., et al. | Anonymized Internet Traces | 2006-05 |
West Lafayette, IN, US | Two samples are enough: Opportunistic flow-level latency est ... | Lee, M., Duffield, N., et al. | Anonymized Internet Traces | 2010-05 |
Changsha, CN | A study of IP prefix hijacking in cloud computing networks | Liu, Y., Peng, W., et al. | Topology with BGP | 2013-02 |
Rochester, NY, US | Segmenting large-scale cyber attacks for online behavior mod ... | Strapp, S., Yang, S. | UCSD Network Telescope | 2014-04 |
Shanghai, CN | Network quotients: structural skeletons of complex systems | Xiao, Y., MacArthur, B.D., et al. | Topology with BGP | 2008-00 |
Lisboa, PT | A fresh look at inter-domain route aggregation | Sobrinho, J.L., Le, F. | Topology with BGP | 2012-03 |
Leuven, BE | Quantifying ASes multiconnectivity using multicast informati ... | Merindol, P., Van den Schrieck, V., et al. | Topology with BGP | 2009-11 |
Belo Horizonte, BR | A spam traffic cost analysis for network operators | Fonseca, O., Fazzion, E., et al. | Topology with BGP | 2015-05 |
Zaragoza, ES | Small-packet flows in Software Defined Networks: Traffic pro ... | Saldana, J., de Hoz, D., et al. | Anonymized Internet Traces | 2015-04 |
Luoyang, CN | Graph perturbations and corresponding spectral changes in In ... | Jiao, B., Shi, J.-M. | Topology with Archipelago | 2016-02 |
Enschede, NL | Measuring the adoption of DDoS protection services | Jonker, M., Sperotto, A., et al. | Topology with BGP | 2016-11 |
Hangzhou, CN | Traffic congestion in interconnected complex networks | Tan, F, Wu, J., et al. | Topology with BGP | 2014-01 |
Aveiro, PT | Inter-operator traffic differentiation based on multiscale a ... | Coelho, N., Salvador, P., et al. | Anonymized Internet Traces | 2013-08 |
Fort Collins, CO, US | Towards characterizing international routing detours | Shah, A., Fontunge, R., et al. | Topology with Archipelago, Topology with BGP | 2016-06 |
Amherst, MA, US | Saving energy and improving TCP throughput with rate adaptat ... | Hanay, Y.S., Li, W., et al. | Anonymized Internet Traces | 2012-06 |
Berlin, DE | Inferring BGP blackholing activity in the Internet | Giotsas, V., Smaragdakis, G., et al. | Topology with BGP | 2017-11 |
Auckland, NZ | Observations of UDP to TCP ratio and port numbers | Lee, D., Carpenter, B.E., et al. | Anonymized Internet Traces | 2010-06 |
Princeton, NJ, US | Heavy-Hitter Detection Entirely in the Data Plane | Sivaraman, V., Narayana, S., et al. | Anonymized Internet Traces | 2017-04 |
Heraklion, GR | traIXroute: Detecting IXPs in traceroute paths | Nomikos, G., Dimitropoulos, X. | Topology with Archipelago, Topology with BGP | 2016-03 |
Richardson, TX, US | Estimating network layer subnet characteristics via statisti ... | Tozal, M.E., Sarac, K. | Topology with BGP | 2012-05 |
Muenchen, DE | Using Looking Glasses to Understand the Internet's Structure | Singh, J. | Topology with Archipelago | 2016 |
Hong Kong, CN | Entropy based flow aggregation | Hu, Y., Chiu, D.-M., et al. | Anonymized Internet Traces | 2006-04 |
Pittsburgh, PA, US | FIT: Fast Internet Traceback | Yaar, A., Perrig, A., et al. | Topology with Skitter | 2005-03 |
Riverside, CA, US | Network traffic analysis using traffic dispersion graphs (TD ... | Iliofotou, M., Pappu, P., et al. | Topology with Skitter, Anonymized Internet Traces | 2007-05 |
Paris, FR | Dynamical phenomena on complex networks | Dallasta, L. | Topology with Skitter | 2006-09 |
Atlanta, GA, US | ASwatch: An AS reputation system to expose bulletproof hosti ... | Konte, M., Perdisci, R., et al. | Topology with BGP | 2015-10 |
Cesson-Sevigne, FR | OAZE: A network-friendly distributed zapping system for peer ... | Chen, Y., Le Merrer, E., et al. | Topology with BGP | 2012-01 |
Ferozeper, IN | Trends in Validation of DDoS Research | Behal, S., Kumar, K. | Denial of Service Attacks | 2016-06 |
Nova Scotia, CA | Autonomous system based flow marking scheme for IP-Traceback | Aghaei-Foroushani, V., Zincir-Heywood, A.N. | Denial of Service Attacks | 2016-04 |
Ciudad Victoria, MX | Characterization and Coarsening of Autonomous System Network ... | Garcia-Robledo, A., Diaz-Perez, A., et al. | Topology with BGP | 2016 |
Linkoping, SE | Collaborative framework for protection against attacks targe ... | Hiran, R., Carlsson, N., et al. | Topology with BGP | 2017 |
Uberlandia, BR | Towards local routing state in the future internet | Pasquini, R., Verdi, F.L., et al. | Topology with BGP | 2012-04 |
Cambridge, UK | Asymmetry and discrimination in Internet peering: evidence f ... | D'Ignazio, A., Giovannetti, E. | Topology with BGP | 2009-05 |
Toyonaka, JP | Evaluation of free-riding traffic problem in overlay routing ... | Hasegawa, G., Hiraoka, Y., et al. | Topology with BGP | 2009-04 |
Changsha, CN | Assessing survivability of inter-domain routing system under ... | Liu, Y., Peng, W., et al. | Topology with BGP | 2013-07 |
Fredericton, CA | Towards a Reliable Intrusion Detection Benchmark Dataset | Sharafaldin, I., Gharib, A., et al. | Denial of Service Attacks, Anonymized Internet Traces | 2017-01 |
Bandung, IN | Traffic anomaly based detection: Anomaly detection by self-s ... | Nurohman, H., Purwanto, Y., et al. | Denial of Service Attacks | 2015-08 |
Atlanta, GA, US | Optimal worm-scanning method using vulnerable-host distribut ... | Chen, Z., Ji, C. | UCSD Network Telescope | 2007-00 |
Madrid, ES | Commodity packet capture engines: tutorial, cookbook and app ... | Moreno, V., Ramos, J., et al. | Anonymized Internet Traces | 2015-08 |
Baltimore, MD, US | Change detection in evolving computer networks: Changes in d ... | Namayanja, J.M., Janeja, V.P. | Anonymized Internet Traces | 2015-05 |
Monterey, CA, US | A middlebox-cooperative TCP for a non end-to-end internet | Craven, R., Beverly, R., et al. | Topology with Archipelago | 2014-10 |
Orlando, FL, US | The Internet: A system of interconnected autonomous systems | Tozal, M.E. | Topology with BGP | 2016 |
Monterey, CA, US | Toward large-graph comparison measures to understand Interne ... | Daryl, L.H.A. | Topology with Archipelago | 2013-09 |