Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications : bylocation
Non-CAIDA Publications using CAIDA data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of our datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    dataset    location   |

This map shows a geographic distribution of the institutional affiliations of the first author of papers published by non-CAIDA researchers that used one or more of the datasets distributed by CAIDA.

Could not load the interactive version of this Google map,
possibly due to browser settings (no javascript) or unsupported browser

CityTitleAuthorsDatasetDate
Gaborone, BWTraffic prediction in cloud computing using time series mode ...Mokgolodi, K.Anonymized Internet Traces2016-08
Pittsburgh, PA, USSIFF: a Stateless Internet Flow Filter to mitigate DDoS floo ...Yaar, A., Perrig, A., et al.Topology with Skitter2004-05
San Diego, CA, USCharacterizing and measuring path diversity of internet topo ...Teixeira, T., Marzullo, K., et al.Topology with Skitter2003-06
Monterey, CA, USDistributed Emulation in Support of Large NetworksGreunke, B.Topology with BGP2016
Hawthorne, NY, USEffective peering for multi-provider content delivery servic ...Amini, L., Shaikh, A., et al.Topology with Skitter2004
Ankara, TRServer Notaries: A Complementary Approach to the Web PKI Tru ...Yuce, E., Selcuk, A.A.Topology with BGP2016
Aalto, FIInter-domain incentives and Internet architectureRajahalma, J.Topology with BGP2012-08
Washington, DC, USNetwork Level Attacks and Defenses Against Anonymity Network ...Tan, Z.D.H.Topology with Archipelago, Topology with BGP2016
Delft, NLOn the relationships between topological measures in real-wo ...Jamakovic, A., Uhlig, S., et al.Topology with Skitter2007-09
San Diego, CA, USA distributed mechanism to protect against DDoS attacksMosharraf, N., Jayasumana, A., et al.Denial of Service Attacks2017-06
Vigo, ESFrame coalescing in dual-mode EEEHerreria-Alonso, S., Rodriguez-Perez, M., et al.Anonymized Internet Traces2015-10
Enschede, NLImpact of packet sampling on link dimensioningde Oliviera Schmidt, R., Sadre, R., et al.Anonymized Internet Traces2015-09
College Park, MD, USLongitudinal analysis of root server anycast inefficienciesLi, Z., Levin, D., et al.Topology with BGP2017-00
Waterloo, CATurbo covert channel: An iterative framework for covert comm ...Ahmadzadeh, S.A., Agnew, G.Anonymized Internet Traces2013-04
Enschede, NLLightweight link dimensioning using sFlow samplingSchmidt, R., Sadre, R., et al.Anonymized Internet Traces2013-10
Bradford, UKDynamic OBS offset allocation in WDM networksMouchos, C., Tsokanos, A., et al.Anonymized Internet Traces2010-11
Atlanta, GA, USExploiting underlying structure for detailed reconstruction ...Kumar, A., Paxson, V., et al.UCSD Network Telescope2005-10
Irvine, CA, US2.5K-graphs: from sampling to generationGjoka, M., Kurant, M., et al.Topology with BGP2012-08
Beijing, CNFlow-level traffic engineering in conventional networks with ...Geng, N., Yang, Y., et al.Anonymized Internet Traces2018-01
West Lafayette, IN, USOpportunistic flow-level latency estimation using consistent ...Lee, M., Duffield, N., et al.Anonymized Internet Traces2012-02
Haifa, ILMaximizing the throughput of cuckoo hashing in network devic ...Kanizo, Y., Hay, D., et al.Anonymized Internet Traces2012-02
Chania, GRSketching distributed sliding-window data streamsPapapetrou, O., Garofalakis, M., et al.Anonymized Internet Traces2015-03
Brooklyn, NY, USEfficient buffering and scheduling for a single-chip crosspo ...Cao, Z., Panwar, S.S.Anonymized Internet Traces2012-10
Nathan, AUIntelligent Sampling Using an Optimized Neural NetworkJadidi, Z., Muthukkumarasamy, V., et al.Denial of Service Attacks, Anonymized Internet Traces2016-01
Seoul, KRAPFS: Adaptive Probabilistic Filter Scheduling against distr ...Seo, D., Lee, H., et al.Topology with Skitter2013-11
Lubbock, TX, USApplying big data analytics on integrated cybersecurity data ...Juturu, L.S.Denial of Service Attacks2015-05
Shenyang, CNResearch on bottleneck-delay in internet based on IP united ...Lin, C., Bi, Y., et al.Topology with Archipelago2016-07
Eugene, OR, USEyeball ASes: from geography to connectivityRasti, A.H., Magharei, N., et al.Topology with BGP2010-11
Princeton, NJ, USOptimizing the placement of implicit proxiesCesareo, J., Karlin, J., et al.Topology with BGP2012-06
Barcelona, ESThe impact of content delivery networks on the Internet ecos ...Palacin, M., Oliver, M., et al.Topology with BGP2013-00
Buenos Aires, ARUnderstanding edge connectivity in the Internet through core ...Alvarez-Hamelin, J.I., Beiro, M.G., et al.Topology with Skitter2011-03
Budapest, HUCompressing IP forwarding tables: Realizing information-theo ...Korosi, A., Tapolcai, J., et al.Anonymized Internet Traces2014-10
Tempe, AZ, USNetwork-aware behavior clustering of Internet end hostsXu, K., Wang, F., et al.UCSD Network Telescope, Anonymized Internet Traces2011-04
Xiamen, CNA novel network flow watermark embedding model for efficient ...Chen, Y., Wang, S.Anonymized Internet Traces2016-00
Granville, OH, USDivergence in network trafficTakahashi, E.K., Chen, Y., et al.Denial of Service Attacks2011-11
Hong Kong, CNAn efficient approach to multi-level route analyticsChen, A., Chan, E.W.W., et al.Topology with Archipelago2013-05
Lubeck, DEDynaCORE - dynamically reconfigurable coprocessor for networ ...Albrecht, C., Foag, J., et al.Anonymized Internet Traces2010-03
Ann Arbor, MI, USMeasuring IPv6 adoptionCzyz, J., Allman, M., et al.Topology with Archipelago2013-08
Zhengzhou, CNAn epidemic-dynamics-based model for CXPST spreading in inte ...Wang, Y., Wang, Z., et al.Topology with BGP2013-07
Trivandrum, INRanking of machine learning algorithms based on the performa ...Robinson, R.R.R., Thomas, C.UCSD Network Telescope, Denial of Service Attacks2015-12
Karlsruhe, DEEstimating current-flow closeness centrality with a multigri ...Bergamini, E., Wegner, M., et al.Topology with BGP2016-07
Melbourne, AURobust synchronization of software clocks across the Interne ...Veitch, D., Babu, S., et al.Topology with Skitter2004-00
Guangzhou, CNSelf-similarity and heavy-tail of ICMP trafficLiu, W., Yan, Y., et al.Anonymized Internet Traces2012-12
Belgrade, RSGraphical processing unit-based parallelization of the Open ...Dundjerski, D., Tomasevic, M.Topology with Skitter2014-02
Ljubljana, SIThe impact of network topology on the performance of MAP sel ...Vilhar, A., Novak, R., et al.Topology with BGP2010-05
Beijing, CNTumbler: Adaptable link access in the bots-infested InternetZhang, Y., Wang, X., et al.Topology with BGP2016-06
Buenos Aires, ARAn empirical comparison of botnet detection methodsGarcia, S., Grill, M., et al.UCSD Network Telescope2014-09
Aachen, DEMeasuring complexity and predictability in networks with mul ...Riihijarvi, J., Mahonen, P., et al.UCSD Network Telescope2009-04
Liege, BEA brief history of MPLS usage in IPv6Vanaubel, Y., Merindol, P., et al.Topology with Archipelago, Topology with BGP2016-03
Delft, NLOn properties of multicast routing treesJanic, M., Van Mieghem, P.Topology with Skitter2005-11
Durham, NC, USImproving IP-based geo-location through Internet topology an ...Moses, K.V.Topology with BGP2013-00
Beijing, CNAnalysis of UDP traffic usage on internet backbone linksZhang, M., Dusi, M., et al.Anonymized Internet Traces2009-09
Shenyang, CNAnalysis of Internet robustness in attacksXu, Y., Zhang, X.Topology with Archipelago2012-05
Minneapolis, MN, USOn properties of Internet Exchange Points and their impact o ...Xu, K., Duan, Z., et al.Topology with Skitter2004-04
Leuven, BERetouched Bloom filters: allowing networked applications to ...Donnet, B., Bayant, B., et al.Topology with Skitter2006-12
Stonybrook, NY, USThe politics of routing: Investigating the relationship betw ...Singh, R., Koo, H., et al.Topology with BGP2016-06
Brest, FRApplication-centric energy-efficient Ethernet with quality o ...Popescu, I.; Miyazaki, T.; Chino, M.; Wang, et al.Anonymized Internet Traces2015-07
Hebron, PSInternet scale DoS attacksKurar, B., Tahboub, R.Topology with BGP2015-08
Rennes, FRPTPv2-based network load estimation and its application to Q ...Frangoudis, P.A., Hadjadj-Aoul, Y., et al.Anonymized Internet Traces2014-07
Redmond, WA, USSampling strategies for epidemic-style information dissemina ...Vojnovic, M., Gupta, V., et al.UCSD Network Telescope2007-04
Seoul, KRA Distributed Self-Organizing Map for DoS Attack DetectionKim, M., Jung, S., et al.Denial of Service Attacks, Anonymized Internet Traces2012-00
Hong Kong, CNPerformance evaluation and service rate provisioning for a q ...Chen, J., Addie, R.G., et al.Anonymized Internet Traces2013-11
San Diego, CA, USDetecting evasion attacks at high speeds without reassemblyVarghese, G., Fingerhut, J., et al.Anonymized Internet Traces2006-10
Ithaca, NY, USA study of prefix hijacking and interception in the internetBallani, H., Francis, P., et al.Topology with BGP2007-10
Washington DC, USAn empirical evaluation of relay selection in TorWacek, C., Tan, H., et al.Topology with Archipelago, Topology with BGP2013-02
New York City, NY, USEnsemble-based model for DDoS attack detection and flash eve ...Bhatia, S.Denial of Service Attacks2016-12
Burlington, MA, USInter-domain rendezvous service architectureRajahalme, J., Sarela, M., et al.Topology with BGP2009-12
Minneapolis, MN, USForming Guard Sets using AS RelationshipsImani, M., Barton, A., et al.Topology with Archipelago, Topology with BGP2017
Cambridge, MA, USA new approach to dimensionality reduction for anomaly detec ...Huang, T., Sethu, H., et al.Anonymized Internet Traces2016-06
Aachen, DEMetrics for characterizing complexity of network trafficRiihijarvi, J., Mahonen, P., et al.UCSD Network Telescope2008-06
Philadelphia, PA, USMoment-based spectral analysis of large-scale networks using ...Preciado, V.M., Jadbabaie, A.Topology with Skitter2013-04
Hanoi, VNOpenFlowSIA: An optimized protection scheme for software-def ...Phan, T., Toan, T., et al.Denial of Service Attacks, Anonymized Internet Traces2016-07
Champaign, IL, USReducing short flows' latency in the internetLi, Q.Topology with Archipelago, Topology with BGP2016-04
Rochester, NY, USSegmentation and model generation for large-scale cyber atta ...Strapp, S.UCSD Network Telescope2013-08
Rio de Janeiro, BRCaracterizacao e identificacao de papeis e vertices em redes ...Spinelli, L.P.Anonymized Internet Traces2011-08
New York, NY, USA SDN-Based Framework for Fine-Grained Inter-domain Routing ...Wang, Y., Bi, J., et al.Topology with BGP2017
Glasgow, UKCompact routing on the Internet AS-graphStrowes, S.D., Mooney, G., et al.Topology with BGP2011-06
Haifa, ILOptimal elephant flow detectionBasat, R., Einziger, G., et al.Anonymized Internet Traces2017-15
Ithaca, NY, USTiming is everything: Accurate, minumum overhead, available ...Wang, H., Lee, K.S., et al.Anonymized Internet Traces2014-11
Princeton, NJ, USOnline measurement of large traffic aggregates on commodity ...Jose, L., Yu, M., et al.Anonymized Internet Traces2011-03
Los Angeles, CA, USThe record route option is an option!Goodchild, B., Chiu, Y., et al.Topology with BGP2017-11
Marina Del Rey, CA, USSelecting representative IP addresses for internet topology ...Fan, X., Heidemann, J.Topology with Archipelago2010-11
Urbana, IL, USDefending Tor from network adversaries: A case study of netw ...Juen, J., Das, A., et al.Topology with Archipelago2014-10
Beijing, CNPreventing DDoS attacks by identifier/locator separationLuo, H., Lin, Y., et al.Denial of Service Attacks2013-11
Zurich, CHHORNET: High-speed onion routing at the network layerChen, C., Asoni, D.E., et al.Topology with BGP, Anonymized Internet Traces2015-10
Zhengzhou, CNASTVA: DDoS-limiting architecture for Next Generation Intern ...Wei, W., Yingjie, X., et al.Topology with BGP2012-01
Delft, NLHet Nederlands elftal als complex netwerkKooij, R., Jamakovic, A., et al.Topology with Skitter2008-03
Aalto, FICommunity detection in networks: Structural communities vers ...Hric, D., Darst, R.K., et al.Topology with Archipelago, Topology with BGP2014-12
Harbin, CNA framework to quantify the pitfalls of using traceroute in ...Zhang, Y., Oliveira, R., et al.Topology with Archipelago2011-10
Kaiserslautern, DEOn the importance of local connectivity for Internet topolog ...Haddadi, H., Fay, D., et al.Topology with Skitter2009-09
London, UKA trace-driven analysis of caching in content-centric networ ...Tyson, G., Kaune, S., et al.Topology with Archipelago2012-08
Berlin, DEBGP prefix delegations: A deep diveKrenc, T., Feldmann, A.Topology with Archipelago, Topology with BGP, Paper Data Supplements2016-11
Chennai, INCongestion avoidance algorithm using ARIMA(2,1,1) model-base ...Jeyasekar, A., Kasmir Raja, S., et al.DNS RTT2017-05
London, UKTuning topology generators using spectral distributionsHaddadi, H., Fay, D., et al.Topology with Skitter2008-06
Anhui, CNModeling and predicting extreme cyber attack rates via marke ...Chen, P., Xu, M., et al.UCSD Network Telescope2016-11
Athens, GRCategorization of Network Attacks with Machine Learning meth ...Alpos, O.Denial of Service Attacks2017_08
Davis, CA, USThe quantitative comparison of computer networksBrugger, S.T.Anonymized Internet Traces2009-06
Forth, GRShortcuts through colocation facilitiesKotronis, V., Nomikos, G., et al.Topology with BGP2017-10
Aydin, TRUsing genetic algorithms to optimise dynamic power saving in ...Abaci, H., Parr, G., et al.Anonymized Internet Traces2016-01
Palo Alto, CA, USRiskRoute: A framework for mitigating network outage threatsEriksson, B, Durairajan, R., et al.Topology with BGP2013-12
Budapest, HUSpotter: a model based active geolocation serviceLaki, S., Matray, P., et al.Topology with Archipelago2010-04
Coimbra, PTPeer selection in P2P service overlays using geographical lo ...Fiorese, A., Simoes, P., et al.Topology with Archipelago2012-06
Jinan, CNIdentifying heavy-hitter flows fast and accuratelyZhang, N., Wang, F., et al.Anonymized Internet Traces2010-06
Munich, DEThe amplification threat posed by publicly reachable BACnet ...Gasser, O., Scheitle, Q., et al.Topology with BGP2017-01
Beijing, CNReducing power of traffic manager in routers via dynamic on/ ...Fan, J., Hu, C., et al.Anonymized Internet Traces2012-05
West Lafayette, IN, USAnonymizing network traces with temporal pseudonym consisten ...Qardaji, W., Li, N.Anonymized Internet Traces2012-06
Montreal, CADarknet as a source of cyber threat intelligence: Investigat ...Fachkha, C.UCSD Network Telescope2015-11
Zurich, CHEvaluating the effect of centralization on routing convergen ...Gamperli, A., Kotronis, V., et al.Topology with BGP2014-10
Madrid, ESWire-speed statistical classification of network traffic on ...Santiago del Rio, P.M., Rossi, D., et al.Anonymized Internet Traces2012-11
Tel-Aviv, ILCBTree: A practical concurrent self-adjusting search treeAfek, Y., Kaplan, H., et al.Anonymized Internet Traces2012-10
Boston, MA, USOn the cost of supporting multihoming and mobilityIshakian, V., Akinwumi, J., et al.Anonymized Internet Traces2009-06
Beijing, CNTime series of Internet AS-level topology graphs: four patte ...Liu, L., Xu, K.Topology with Skitter2008-12
Seattle, WA, USSymbiotic network simulation and emulationErazo, M.A., Rong, R., et al.Anonymized Internet Traces2015-10
Baltimore, MD, USOn the effectiveness of distributed worm monitoringRajab, M., Monrose, F., et al.UCSD Network Telescope2005-07
Tucson, AZ, USEvolution of the Internet topology from a regional perspecti ...Acedo, J.C.Topology with BGP2015-00
Beijing, CNTraffic Aware Energy Efficient Router: Architecture, Prototy ...Song, T., Jiang, Z., et al.Anonymized Internet Traces2016-08
Durham, NC, USAlidade: IP Geolocation without Active ProbingChandrasekaran, B., Bai, M., et al.Topology with Archipelago, Topology with BGP2015
Leicester, UKConnectivity measures for internet topologies on the level o ...Erlebach, T., Moonen, L.S., et al.Topology with Skitter2009-07
Glasgow, UKHarnessing Internet topological stability in Thorup-Zwick co ...Strowes, S.D., Perkins, C.Topology with BGP2012-03
Ottawa, CAA TCP connection establishment filter: symmetric connection ...Whitehead, B., Lung, C.-H., et al.Anonymized Internet Traces2007-06
Gainesville, FL, USPer-flow cardinality measurementChen, S., Chen, M., et al.Anonymized Internet Traces2017-00
Princeton, NJ, USCounter-RAPTOR: Safeguarding Tor against active routing atta ...Sun, Y., Edmundson, A., et al.Topology with Archipelago2017-04
Beijing, CNBackup routing for BGP: Virtual ring routing schemeShu, W., Changjia, C.Topology with BGP2009-09
Cookeville, TN, USA partitioning approach to scaling anomaly detection in grap ...Eberle, W., Holder, L.Topology with BGP2014-10
Lisboa, PTA theory for the connectivity discovered by routing protocol ...Sobrinho, J.L., Tiago Quelhas, T.Topology with BGP2012-06
Princeton, NJ, USBuilding efficient and reliable software-defined networksKatta, N.Anonymized Internet Traces2016-11
Changchun, CNImproved SEIR viruses propagation model and the patch's impa ...Ma, C., Yang, Y., et al.UCSD Network Telescope2013-04
Hamburg, DEMobilitaet und Proximitaet in strukturierten Overlay-Netzen ...Dramburg, M.Topology with Skitter, Topology with Archipelago2008-08
Reno, NV, USOn the scalability of path exploration using opportunistic p ...Karaoglu, H.T., Yuksel, M., et al.Topology with BGP2011-06
Austin, TX, USNo direction home: The true cost of routing around decoysHoumansadr, A., Wong, E.L., et al.Topology with BGP2014-02
Liverpool, UKAnalysis and characterisation of botnet scan trafficMarnerides, A., Mauthe, A.UCSD Network Telescope2016-03
Hong Kong, CNToward high-performance distributed stream processing via ap ...Huang, Q., Lee, P.Anonymized Internet Traces2016-11
Halifax, CABotnet behaviour analysis: How would a data analytics-based ...Haddadi, F., Heywood, A.UCSD Network Telescope2017-05
Madrid, ESAdaptive artificial immune networks for mitigating DoS flood ...Vidal, J., Orozco, A., et al.Denial of Service Attacks, Anonymized Internet Traces2017-06
Boston, MA, USAn empirical validation of growth models for complex network ...Mislove, A., Koppula, H.S., et al.Topology with BGP2013-00
Zurich, CHBootstrapping real-world deployment of future Internet archi ...Lee, T., Szalachowski, P., et al.Topology with BGP2015-08
Hanoi, VNSoftware defined networking-based one-packet DDoS mitigation ...Huong, T., Thanh, N.Anonymized Internet Traces2017-01
Vienna, ATModelling IP darkspace traffic by means of clustering techni ...Iglesias, F., Zseby, T.UCSD Network Telescope2014-10
Boston, MA, USDetecting unusually-routed ASes: Methods and applicationsComarela, G., Terzi, E., et al.Topology with BGP2016-11
Braga, PTMultiadaptive sampling for lightweight network measurementsSilva, J.M.C., Lima, S.R.Anonymized Internet Traces2012-07
Darmstadt, DECorrelating network events and transferring labels in the pr ...Abt, S., Baier, H.Anonymized Internet Traces2016-10
Kent, OH, USMetric tree-like structures in real-world networks: an empir ...Abu-Ata, M., Dragan, F.F.Topology with Skitter, Topology with BGP2015-08
Beijing, CNPreventing Distributed Denial-of-Service Flooding Attacks Wi ...Luo, H., Chen, Z., et al.Topology with Archipelago, Anonymized Internet Traces2017
Debrecen, HUDoes the internet still demonstrate fractal nature?Terdik, G., Gyires, T.Anonymized Internet Traces2009-03
Rome, ITOn-the-fly statistical classification of internet traffic at ...Baiocchi, A., Maiolini, G., et al.Anonymized Internet Traces2008-10
Toulouse, FRSome estimation problems in epidemic modelingDauxois, J., Nucit, A.UCSD Network Telescope2017-03
Chungli, TWRIHT: A novel hybrid IP traceback schemeYang, M.-H., Yang, M.-C.Topology with Skitter2012-04
Baltimore, MD, USOne sketch to rule them all: Rethinking network flow monitor ...Liu, Z., Manousis, A., et al.Anonymized Internet Traces2016-08
Rochester, NY, USDiscovering collaborative cyber attack patterns using social ...Du, H., Yang, S.J.UCSD Network Telescope2011-03
Shenyang, CNAS-level Internet macroscopic topology centralization evolve ...Song, J., Zhao, H., et al.Topology with Skitter2010-10
Los Angeles, CA, USAre we one hop away from a better Internet?Chiu, Y.-C., Schlinker, B., et al.Topology with BGP2015-10
Victoria, BC, CAStatistical assessment of sybil-placement strategies within ...Arora, D., Verigin, A., et al.Topology with Skitter2014-05
Barcalona, ESSelf-reliant detection of route leaks in inter-domain routin ...Siddiqui, M.S., Montero, D., et al.Topology with Archipelago2015-03
Sophia Antipolis, FROn the dynamics of locators in LISPSaucez, D., Donnet, B.Topology with BGP2012-05
Fukuoka, JPResearch on Performance and Security Improvements by Softwar ...Sahri, N.Anonymized Internet Traces2016-04
Wright Patterson AFB, OH, USScalable wavelet-based active network stepping stone detecti ...Gilbert, J.Anonymized Internet Traces2012-03
Paderborn, DEPicky: efficient and reproducible sharing of large datasets ...Hintze, D, Rice, A.Anonymized Internet Traces2016-09
Ramat-Gan, ILFragmentation considered vulnerableGilad, Y., Herzberg, A.Anonymized Internet Traces2013-04
OR, USA Survey of Techniques for Internet Topology DiscoveryMotamedi, R., Rejaie, R., et al.Topology with Skitter, Topology with Archipelago2015-05
Urbana, IL, USSWIRL: A scalable watermark to detect correlated network flo ...Houmansadr, A., Borisov, N.Anonymized Internet Traces2011-02
Fort Collins, CO, USCharacterizing vulnerability to IP hijack attemptsGersch, J., Massey, D.Topology with BGP2013-11
Osaka, JPAnalyses of core-periphery structure in Internet's AS-level ...Satake, K., Arakawa, S., et al.Topology with BGP2016
Beijing, CNFL-GUARD: A detection and defense system for DDoS attack in ...Liu, J., Lai, Y., et al.Denial of Service Attacks2017-03
Jorhat, INA systematic hands-on approach to generate real-life intrusi ...Bhuyan, M., Bhattacharyya, D., et al.Denial of Service Attacks2017-09
Orlando, FL, USImpact of Internet exchange points on Internet topology evol ...Ahmad, M.Z., Guha, R.Topology with Skitter2010-10
Beijing, CNRobust TCP reassembly with a hardware-based solution for bac ...Yuan, R., Weibing, Y., et al.Anonymized Internet Traces2010-07
Pullman, WA, USTrustGuard: A flow-level reputation-based DDoS defense syste ...Liu, H., Sun, Y., et al.Denial of Service Attacks, Anonymized Internet Traces2011-01
Paris, FRTowards uncovering BGP hijacking attacksJacquement, Q.Topology with Archipelago, Topology with BGP2015
Daejeon, KRUnmasking the growing UDP traffic in a campus networkLee, C., Lee, D.K., et al.Anonymized Internet Traces2012-03
Rio de Janeiro, BRA stateless traceback technique for identifying the origin o ...Moreira, M.D.D., Laufer, R., et al.Topology with Archipelago2011-06
Tokyo, JPTowards interdomain transit traffic reduction in peer-assist ...Asai, H., Esaki, H.Topology with BGP2010-09
Berlin, DETowards better Internet citizenship: Reducing the footprint ...Klick, J., Lau, S., et al.Topology with BGP2016-11
North Brunswick, NJ, USEdge-aware inter-domain routing for realizing next-generatio ...Mukherjee, S., Sriram, S., et al.Topology with Archipelago2017-07
Eugene, OR, UShttps://onrg.cs.uoregon.edu/pub/CIS-TR-2014-02.pdfMotamedi, R., Chandrasekaran, B., et al.Topology with Skitter, Topology with Archipelago2014
Zhengzhou, CNNetwork watermarking model based on optimization theoryLei, C., Zhang, H., et al.Anonymized Internet Traces2015-11
Hong Kong, CNSketchVisor: Robust Network Measurement for Software Packet ...Huang, Q., Lee, P., et al.Anonymized Internet Traces2017-08
Belo Horizonte, BRA Characterization of Load Balancing on the IPv6 InternetAlmeida, R., Fonseca, O., et al.Topology with BGP2017
Philadelphia, PA, USA fast algorithm for detecting anomalous changes in network ...Huang, T., Sethu, H., et al.Anonymized Internet Traces2015-11
Brisbane, AUEnsemble-based DDoS detection and mitigation modelBhatia, S., Schmidt, D., et al.Denial of Service Attacks2012-10
Tehran, IRDetecting Denial of Service attacks utilizing machine learni ...Kahani, N., Shiry, S., et al.Topology with Skitter2008-08
Pilani, INBig data analytics framework for peer-to-peer botnet detecti ...Singh, K., Guntuku, S.C., et al.UCSD Network Telescope2014-03
Toulouse, FRNon-intrusive scheduling of TCP flowsAyesta, U.; Bertaux, L.; Carvin, D.Anonymized Internet Traces2015-05
Madrid, ESSistema de Deteccion de Ataques DDoS en TorMartin, J.Denial of Service Attacks, Anonymized Internet Traces2015-00
Madrid, ESBGP-XM: BGP eXtended multipath for transit Autonomous System ...Camacho, J.M., Garcia-Martinez, A., et al.Topology with BGP2013-03
Haifa, ILEfficient detection of flow anomalies with limited monitorin ...Moraney, J., Raz, D.Anonymized Internet Traces2016-11
Berlin, DEA multilayer graph model of the Internet topologyTilch, G., Ermakova, T., et al.Topology with Archipelago, Topology with BGP2017-10
Newcastle, UKCOTraSE Connection Oriented Traceback in Switched EthernetAndreou, M.S., van Moorsel, A.Anonymized Internet Traces2009-00
Urbana, IL, USProtecting anonymity in the presence of autonomous system an ...Juen, J.Topology with BGP2012-09
Newcastle upon Tyne, UKCOTraSE: Connection Oriented Traceback in Switched EthernetAndreou, M., Moorsel, A.Topology with Skitter, Anonymized Internet Traces2008-09
Vigo, ESA GI/G/1 model for 10 Gb/s energy efficient ethernet linksHerreria-Alonso, S., Rodriguez-Perez, M., et al.Anonymized Internet Traces2012-11
Rome, ITOn the fly application flows identification by exploiting K- ...Maiolini, G., Molina, G., et al.Anonymized Internet Traces2009-00
Pohang, KRTraffic dispersion graph based anomaly detectionLe, D.Q., Jeong, T., et al.Denial of Service Attacks2011-10
Younstown, OH, USCan we study the topology of the Internet from the vantage p ...Drivere, A.A.Topology with BGP2011-12
Baltimore, MD, USEnabling a 'RISC' approach for Software-Defined Monitoring u ...Liu, Z., Vorsanger, G., et al.Anonymized Internet Traces2015-11
Beijing, CNCCOF: Congestion control on the fly for inter-domain routingZhu, M., Liu, Y., et al.Topology with BGP2014-05
Karachi, PKDisjoint-path selection in Internet: What traceroutes tell u ...Qazi, S., Moors, T.Topology with BGP2014-05
Pisa, ITDPI over commodity hardware: implementation of a scalable fr ...De Sensi, D.Anonymized Internet Traces2013-02
Madrid, ESTowards high-performance network processing in virtualized e ...Moreno, V., Leira, R., et al.Anonymized Internet Traces2015-08
Toledo, OH, USDistributed network traffic feature extraction for a real-ti ...Karimi, A., Niyaz, Q., et al.Denial of Service Attacks2016-05
Redmond, WA, USHow secure are secure interdomain routing protocols?Goldberg, S., Schapira, M., et al.Topology with BGP2010-10
Paris, FRThe named-object abstraction for realizing advanced mobility ...Bronzino, F., Mukherjee, S., et al.Topology with Archipelago2017-08
Tokyo, JPMonitoring the dynamics of network traffic by recursive mult ...Kato, M., Cho, K., et al.Anonymized Internet Traces2012-10
Zurich, CHHijacking Bitcoin: Routing attacks on cryptocurrenciesApostolaki, M., Zohar, A., et al.Topology with Archipelago2017-06
Austin, TX, USFlow migration on multicore network processors: Load balanci ...Iqbal, M.F., Holt, J., et al.Anonymized Internet Traces2013-10
Lexington, KY, USThe virtual network function placement problemLi, X., Qian, C.Anonymized Internet Traces2015-08
Athens, GRLeveraging SDN for Efficient Anomaly Detection and Mitigatio ...Giotis, K., Androulidakis, G., et al.Denial of Service Attacks2014-09
Yokohama, JPFast target link flooding attack detection scheme by analyzi ...Hirayama, T., Toyoda, K., et al.Topology with BGP2015-11
Rochester, NY, USCharacterizing transition behaviors in Internet attack seque ...Du, H., Yang, S.J.UCSD Network Telescope2011-07
Singapore, SGTop-k maximal influential paths in network dataXu, E., Hsu, W., et al.UCSD Network Telescope2012-09
Newark, DE, USTransport layer renegingEkiz, N.Anonymized Internet Traces2012-11
Shanghai, CNRobustness of networks against cascading failuresDou, B-L, Wang, X-G, et al.Topology with BGP2010-05
Berlin, UKDetection, classification, and analysis of inter-domain traf ...Lichtblau, F., Streibeld, F., et al.Topology with Archipelago2017-11
Newcastle, UKMessage traceback systems. Dancing with the devilAndreou, M.S.Topology with Skitter, Anonymized Internet Traces2009-09
Stony Brook, NY, USPipelining multicast scheduling in all-optical packet switch ...Guo, Z., Yang, Y.Anonymized Internet Traces2011-09
Stanford, CA, USUsing packet histories to troubleshoot networksHandigol, N.A.Anonymized Internet Traces2013-06
Fredericton, CAAn Evaluation Framework for Intrusion Detection DatasetGharib, A., Sharafaldin, I., et al.Denial of Service Attacks, Anonymized Internet Traces2016-12
St. Louis, MO, USExploiting locality to ameliorate packet queue contention an ...Kumar, S., Maschmeyer, J., et al.Anonymized Internet Traces2006-05
Gjovik, NOSlow port scanning with BroLarsen, R.Anonymized Internet Traces2013-11
Strasbourg, FRExtracting intra-domain topology from mrinfo probingPansiot, J.-J., Merindol, P., et al.Topology with BGP2010-04
Madrid, ESThe role of topology and contracts in Internet content deliv ...Hasan, S.A.U.Topology with BGP2016-06
Los Angeles, CA, USObserving the evolution of internet as topologyOliveira, R., Zhang, B., et al.Topology with Skitter2007-08
Bogota, COEvaluacion de desempeno de diversas arquitecturas de commuta ...Moreno, S.D.B.Anonymized Internet Traces2011-12
London, UKRevisiting the issues on netflow sample and export performan ...Haddadi, H., Landa, R., et al.Anonymized Internet Traces2007-04
Paris, FRDeployment of an algorithm for large-scale topology discover ...Donnet, B., Raoult, P., et al.Topology with Skitter2006-12
San Francisco, CA, USData-driven large scale network-layer Internet simulationCanbaz, M.A.Topology with Archipelago2016
Beijing, CNAMIR: Another multipath interdomain routingQin, D., Yang, J., et al.Topology with BGP2012-03
Livermore, CA, USTracking network events with Write Optimized Data Structures ...Donoghue, N., Hahn, B., et al.UCSD Network Telescope2015-11
Paris, FRTowards Uncovering BGP Hijacking AttacksJacquemart, Q.Topology with Archipelago2016
Haifa, ILThe Bloom paradox: When not to use a Bloom filter?Rottenstreich, O., Keslassy, I.Anonymized Internet Traces2012-03
Doha, QADesign and implementation of a stateful network packet proce ...Vasiliadis, G., Koromilas, L., et al.Anonymized Internet Traces2017-02
Tel-Aviv, ILNear-deterministic inference of AS relationshipsShavitt, Y., Shir, E., et al.Topology with BGP2009-06
Edinburgh, UKEmpirical evaluation of data transformations for network inf ...Fenacci, D., Franke, B.Topology with Archipelago, Anonymized Internet Traces2010-07
Pittsburgh, PARouting bottlenecks in the Internet - causes, exploits, and ...Kang, M.S., Gligor, V.D.Topology with Archipelago, Topology with BGP2014-05
Changsha, CNEvaluation of prefix hijacking impact based on hinge-transmi ...Yujing, L., Bofeng, Z., et al.Topology with BGP2010-11
Botanicka, CZA performance benchmark for NetFlow data analysis on distrib ...Cermak, M., Tovarnak, D., et al.Anonymized Internet Traces2016-07
Pittsburgh, PA, USToward representative Internet measurementsAkella, A., Seshan, S., et al.Topology with Skitter2004-00
Lyon, FREvaluation of an end-to-end delay estimation in the case of ...Nguyen, H., Begin, T., et al.Anonymized Internet Traces2016-10
Paris, FRAutour du caractere arborescent d'Internetde Montgolfier, F., Soto, M., et al.Topology with Skitter2010-10
Ramat-Gan, ILOff-path hacking: the illusion of challenge-response authent ...Gilad, Y., Herzberg, A., et al.Anonymized Internet Traces2013-10
Santa Maria, BRDeteccao de DDoS Atraves da Analise da Recorrencia Baseada n ...Righi, M., Nunes, R.Denial of Service Attacks, Anonymized Internet Traces2015-11
Berlin, DETopological analysis of cloud service connectivityFabian, B., Baumann, A., et al.Topology with Archipelago2015-06
Melbourne, AUMark-aided distributed filtering by using neural network for ...Xiang, Y., Zhou, W.Topology with Skitter2005-11
Melbourne, AURelay node selection in large-scale VoIP overlay networksBui, Q.D., Jennings, A.Topology with BGP2009-07
Coimbatore, INEvaluating machine learning algorithms for detecting DDoS at ...Suresh, M., Anitha, R.UCSD Network Telescope2011-06
Singapore, SGLabeling and Encoding Hierarchical Addressing for Scalable I ...Wang, F., Shao, X., et al.Topology with Archipelago2017
Tokyo, JPCache-based network processor architecture: evaluation with ...Okuno, M., Nishimura, S., et al.Anonymized Internet Traces2006-11
Yogakarta, IDDeteksi serangan DDoS menggunakan neural network dengan fung ...Muhammad, A., Riadi, I., et al.Denial of Service Attacks2017-01
Berlin, DEProtecting DNS from routing attacks: a comparison of two alt ...Avramopoulos, I., Suchara, M.Topology with BGP2009-09
Stanford, CA, USI know what your packet did last hop: Using packet histories ...Handigol, N., Heller, B., et al.Anonymized Internet Traces2014-04
Hong Kong, CNTowards an adaptive packet marking scheme for IP tracebackYan, P., Lee, M.Topology with Skitter2006-00
Nanjing, CNEqualized Interval Centroid Based Watermarking Scheme for St ...Xu, X., Zhang, J., et al.Anonymized Internet Traces2016-06
Rome, ITSupporting the Web with an information centric network that ...Detti, A., Pomposini, M., et al.Anonymized Internet Traces2012-08
Hamburg, DEOn the correlation of geographic and network proximity at in ...Schmidt, T.C., Wahlisch, M., et al.Topology with Skitter2007-04
Amarah, IQSocial network behaviour inferred from O-D pair trafficAlbdair, M., Addie, R., et al.Anonymized Internet Traces2017-06
Beijing, CNExperimental study on diversity and novelty of interdomain p ...Qin, D., Yang, J., et al.Topology with BGP2013-01
Munich, DEInteractive visualization of global routing dynamicsHelminger, M.Topology with BGP2011-06
West Lafayette, IN, USSecurity and economic implications of localizing traffic in ...Seibert, J.Topology with BGP2012-05
Beijing, CNInferring the average as path length of the InternetWang, C., Li, Z., et al.Topology with BGP2016
Pasadena, CA, USDistributed Optimization and Data Market DesignLondon, P.Topology with BGP2017
Newark, NJ, USA practical and robust inter-domain marking scheme for IP tr ...Gao, Z., Ansari, N.Topology with Skitter2007_02
New Haven, CT, USA flow- and packet-level model of the InternetVenkataramanan, R., Jeong, M.-W., et al.Anonymized Internet Traces2011-07
Caparica, PTInter-domain traffic engineering using an AS-level multipath ...Amaral, P., Silva, E., et al.Topology with BGP2011-06
Stockholm, SECoordinated selfish distributed caching for peering content- ...Pacifici, V., Dan, G.Topology with BGP2016
New Delhi, INRatio threshold queries over distributed data sourcesGupta, R., Ramamritham, K., et al.UCSD Network Telescope2010-03
Munich, DEA hardware packet re-sequencer unit for network processorsMeitinger, M., Ohlendorf, R., et al.Anonymized Internet Traces2008-02
Los Angeles, CA, USTradeoffs in CDN designs for throughput oriented trafficYu, M., Jiang, W., et al.Topology with Archipelago2012-12
Rochester, NY, USISP tiered model based architecture for routing scalabilityNozaki, Y., Tuncer, H., et al.Topology with BGP2012-05
Waterford, IEQoSPlan: A measurement based quality of service aware networ ...Davy, A., Jennings, B., et al.Anonymized Internet Traces2012-06
Atlanta, GA, USRouteSeer: Topological placement of nodes in service overlay ...Srinivasan, S., Zegura, E.Topology with Skitter2006-00
Pittsburgh, PA, USPi: a path identification mechanism to defend against DDoS a ...Yaar, A., Perrig, A., et al.Topology with Skitter2003-05
Rome, ITProgressive damage assessment and network recovery after mas ...Ciavarella, S., Bartolini, N., et al.Topology with Archipelago2017-05
Blacksburg, VA, USAttack diagnosis: throttling distributed denial-of-service a ...Chen, R., Park, J.-M.Topology with Skitter2005-10
Madrid, ESMulti-granular, multi-purpose and multi-Gb/s monitoring on ...Moreno, V., Santiado del Rio, P.M., et al.Anonymized Internet Traces2014-07
Paris, FRRelevance of massively distributed explorations of the inter ...Guillaume, J.-L., Latapy, M., et al.Topology with Skitter2006-11
Davis, CA, USCharacterizing and improving distributed Network-based Intru ...Proebstel, E.Anonymized Internet Traces2008-00
Shenzhen, CNDynamic ring for seamless mobility in identity centric netwo ...Li, D., Sha, W.Topology with Skitter2015-07
La Jolla, CA, USMechanisms for generating realistic annotated Internet topol ...Mahadevan, P.Topology with Skitter2007-01
Cookeville, TN, USIncremental anomaly detection in graphsEberle, W., Holder, L.Topology with BGP2013-12
Amherst, MA, USQuantifying AS Path Inflation by Routing PoliciesGao, Q., Wang, F., et al.Topology with Archipelago2016
Ikoma, JPAn implementation of a hierarchical IP traceback architectur ...Oe, M., Kadobayashi, Y., et al.Topology with Skitter2004-01
Louvain-la-Neuve, BEUnveiling the MPLS Structure on Internet TopologyRevelo, D., Ricci, M.A., et al.Topology with BGP2016
Manouba, TNA traffic coherence analysis model for DDoS attack detectionRahmani, H., Sahli, N., et al.UCSD Network Telescope, Anonymized Internet Traces2009-07
Bloomington, IN, USMitigating bandwidth-exhaustion attacks using congestion puz ...Wang, X., Reiter, M.Topology with Skitter2004-00
Zhongli, TWToward hardware support for a flexible sketch-based network ...Wellem, T., Lai, Y.-K., et al.Anonymized Internet Traces2016-05
Tokyo, JPCOSMO - Emulation of Internet traffic (poster abstract)Miyamoto, D., Miyachi, T.Topology with BGP2013-03
Beijing, CNExploring possible strategies for competitions between Auton ...Li, L., Chen, C.Topology with BGP2008-05
Rennes, FRPTPv2-based metwork load estimationFrangoudis, P.A., Ksentini, A., et al.Anonymized Internet Traces2013-09
Evanston, IL, USWhere the sidewalk ends: extending the internet as graph usi ...Chen, K., Choffnes, D.R., et al.Topology with BGP2009-12
Enschede, NLA hybrid procedure for efficient link dimensioningSchmidt, R., Sadre, R., et al.Anonymized Internet Traces2014-07
Los Angeles, CA, USRe-evaluating measurement algorithms in softwareAlipourfard, O., Moshref, M., et al.Anonymized Internet Traces2015-11
Austin, TX, USBuilding and maintaining overlay networks for bandwidth-dema ...Kim, M.S.Topology with Skitter2005-08
Beijing, CNDetecting flooding DDoS under flash crowds based on Mondrian ...Sun, D., Yang, K., et al.Denial of Service Attacks2017-00
Seoul, KRA Novel Hybrid Flow-Based Handler with DDoS Attacks in Softw ...Phan, T., Bao, N., et al.Denial of Service Attacks, Anonymized Internet Traces2016-07
Fukuoka, JPAdaptive Query Rate for Anomaly Detection with SDNSahri, N., Okamura, K.Anonymized Internet Traces2016-06
Madrid, ESTowards an energy efficient 10 Gb/s optical ethernet: Perfor ...Larrabeiti, D., Reviriego, P., et al.Anonymized Internet Traces2011-07
Rio de Janeiro, BRANALYSIS OF THE DEGREE RANKING STABILITY IN SCALE-FREE NETWO ...Machado, F.F.Topology with BGP2016
Tel-Aviv, ILNear-deterministic inference of AS relationshipsWeinsberg, U., Shavitt, Y., et al.Topology with BGP2009-04
Newark, NJ, USA proactive test based differentiation to mitigate low rate ...Shevtekar, A., Ansari, N.Anonymized Internet Traces2007-08
Barcelona, ESHidden geometric correlations in real multiplex networksKleineberg, K.-K., Boguna, M., et al.Topology with Archipelago2016-07
Beijing, CNUltra-Fast Bloom Filters using SIMD techniquesLu, J., Wan, Y., et al.Anonymized Internet Traces2017-06
Changsha, CNAssessing resilience of inter-domain routing system under re ...Liu, Y., Peng, W., et al.Topology with Archipelago, Topology with BGP2016-04
Osaka, JPCCN economics: Can ISPs profit by introducing CCN?Kamiyama, N.Topology with BGP2014-11
Shenyang, CNA power-law approach on router-level internet macroscopic to ...Xu, Y., Zhang, W.Topology with BGP2009-06
Jiangsu, CNSample and Fetch-Based Large Flow Detection Mechanism in Sof ...Xing, C; Ding, K., Hu, et al.Anonymized Internet Traces2016-06
Darling Heights, AUInference of social network behavior from Internet traffic t ...Albdair, M., Addie, R., et al.Anonymized Internet Traces2016-12
Boston, MA, USOn the geographic location of internet resourcesLakhina, A., Byers, J.W., et al.Topology with Skitter2003-08
Tianjin, CNAn efficient framework for parallel and continuous frequent ...Zhang, Y., Sun, Y., et al.Anonymized Internet Traces2013-12
Beijing, CNPower-proportional router: Architectural design and experime ...Liu, B., Lu, J., et al.Anonymized Internet Traces2014-05
Albuquerque, NM, USInternet topology over timeEdwards, B., Hofmeyr, S., et al.Topology with BGP2012-02
Miami, FL, USLeveraging symbiotic relationship between simulation and emu ...Erazo, M.A., Liu, J.Anonymized Internet Traces2013-05
Kyoto, JPAnti-RAPTOR: Anti routing attack on privacy for a securer an ...Hoang, N.P., Asano, Y., et al.Topology with BGP2015-07
Palo Alto, CA, USHey, you darned counters!: get off my ASIC!Mogul, J.C., Congdon, P.Anonymized Internet Traces2012-08
Shenyang, CNOn an IBA topology model for internet topology structureXu, Y., Wang, Z.Topology with Skitter2010-06
Urbana, IL, USPer-flow cardinality estimation based on virtual LogLog sket ...Zhou, Z.Anonymized Internet Traces2016-00
Liaoning, CNRouting-policy aware peering for large content providersGao, Q., Wang, F., et al.Topology with Archipelago2015
Brescia, ITAn SMV-based approach to traffic classificationEste, A., Gringoli, F., et al.Anonymized Internet Traces2008-00
Torino, ITICE buckets: improved counter estimation for network measure ...Einziger, G., Fellman, B., et al.Anonymized Internet Traces2016-06
Dresden, DELocal-ring network automata and the impact of hyperbolic geo ...Muscoloni, A., Cannistraci, C.V.Topology with BGP2017
Harbin, CNFeature selection for optimizing traffic classificationZhang, H., Lu, G., et al.Anonymized Internet Traces2012-04
Cleveland, OH, USSmall-world characteristics of internet topologies and impli ...Jin, S., Bestavros, A.Topology with Skitter2006-04
Paris, FRMeasuring fundamental properties of real-world complex netwo ...Latapy, M., Magnien, C.Topology with Skitter2006-09
Reno, NV, USAnalyzing router responsiveness to active measurement probesGunes, M.H., Sarac, K.Topology with Skitter2009-03
Haifa, ILHash tables with finite buckets are less resistant to deleti ...Kanizo, Y., Hay, D., et al.Anonymized Internet Traces2010-09
Madrid, ESEfficient implementation of error correction codes in hash t ...Reviriego, P., Pontarelli, S., et al.Anonymized Internet Traces2014-01
Madrid, ESEnergy efficient exact matching for flow identification with ...Reviriego, P., Pontarelli, S., et al.Anonymized Internet Traces2014-05
Beijing, CNModeling the IPv6 internet AS-level topologyXiao, B., Liu, L., et al.Topology with Skitter2009-02
Haifa, ILThe Bloom paradox: When not to use a Bloom filterRottenstreich, O., Keslassy, I.Anonymized Internet Traces2011-06
Barcelona, ESTight bounds for sketches in traffic validationLopez, E., Navarro, L.Anonymized Internet Traces2017-05
Arlington, TX, USDovetail: stronger anonymity in next-generation Internet rou ...Sankey, J., Wright, M.Topology with BGP2014-07
Paris, FRViolation of interdomain routing assumptionsMazloum, R., Buob, M.-O., et al.Topology with BGP2014-03
Monterey, CA, USHigh-frequency mapping of the IPv6 Internet using YarrpGaston, E.W.Topology with Archipelago2017
Haifa, ILAnalyzing Internet routing security using model checkingSosnovich, A., Grumberg, O., et al.Topology with BGP2015-11
Hong Kong, CNAchieving high-bitrate overlay live streaming with proxy hel ...Ren, D., Chan, S.G.Topology with Archipelago2012-05
Richardson, TX, USAn experimental study on inter-domain routing dynamics using ...Ahmed, N., Sarac, K.Topology with BGP2015-10
Irvine, CA, USTowards unbiased BFS samplingKurant, M., Markopoulou, A.Topology with BGP2011-10
Enschede, NLA study of impacts of flow timeouts on link provisioningFokkema, J.Anonymized Internet Traces2013-06
Rome, ITThe CONET solution for information centric networkingBlefari-Melazzi, N., Cancellieri, M., et al.Anonymized Internet Traces2012-01
Olso, NODevelopment and experimentation of TCP initial window functi ...Barik, R., Divakaran, D.M.Anonymized Internet Traces2014-12
Santa Clara, CA, USDapper: Data plane performance diagnosis of TCPGhasemi, M., Benson, T., et al.Anonymized Internet Traces2017-04
Pittsburgh, PA, USDesigning a global authentication infrastructureMatsumoto, S., Reischuk, R.M., et al.Topology with BGP2015-06
Durgapur, INMLP-GA based algorithm to detect application layer DDoS atta ...Singh, K., De, T.Denial of Service Attacks2017-10
Monterey, CA, USToward a robust method of presenting a rich, interconnected ...West, A.Topology with Archipelago2015-03
London, UKIdentifiability of link metrics based on end-to-end path mea ...Ma, L., He, T., et al.Topology with Archipelago2013-10
Enschede, NLGaussian traffic revisitedSchmidt, R., Sadre, R., et al.Anonymized Internet Traces2013-05
Assam, INInformation metrics for low-rate DDoS attack detection: A co ...Bhuyan, M.H., Bhattacharyya, D.K., et al.Denial of Service Attacks2014-08
Ghaziabad, INIPv4 to IPv6 shift: major challengesVerma, H., Yadav, B., et al.Anonymized Internet Traces2012-04
Amritsar, INInter-domain routing with shielded infrastructure and buzzer ...Kaur, B., Kahlon, K.S., et al.Topology with BGP2013-07
Washington, DC, USAvoiding the Man on the Wire: Improving Tor's security with ...Johnson, A., Jansen, R., et al.Topology with BGP2015-11
Massachusetts, USBotnet detection using social graph analysisWang, J., Paschalidis, I.C.Denial of Service Attacks2014-07-08
Jilin City, CNA novel two-step traceback scheme for DDoS attacksQu, Z., Huang, C., et al.Topology with Skitter2008-12
Zaragoza, ESImproving network efficiency with SimplemuxSaldana, J., Forcen, I., et al.Anonymized Internet Traces2015-10
Brisbane, AUParametric differences between a real-world Distributed Deni ...Bhatia, S., Mohay, G., et al.Denial of Service Attacks2011-08
Monterey, CA, USLog analysis using Splunk Hadoop ConnectChainourov, B.Anonymized Internet Traces2017-06
Madrid, ESFour years tracking unrevealed topological changes in the af ...Fanou, R., Francois, P., et al.Topology with BGP2017
Beijing, CNEvaluating and optimizing IP lookup on many core processorsHe, P., Guan, H., et al.Anonymized Internet Traces2012-08
West Lafayette, IN, USA framework for efficient class-based samplingSaxena, M., Kompella, R.Anonymized Internet Traces2009-04
Beijing, CNA backscatter technology based study on source address spoof ...Li, P., Bi, J., et al.UCSD Network Telescope2008-00
Bandung, INStatistical analysis on aggregate and flow based traffic fea ...Purwanto, Y., Kuspriyanto, Hendrawan, et al.Denial of Service Attacks2015-11
Hong Kong, CNPerformance evaluation of a queue fed by a Poisson Lomax bur ...Chen, J., Addie, R.G., et al.Anonymized Internet Traces2015-03
Austin, TX, USEfficient traffic aware power management in multicore commun ...Iqbal, M.F., John, L.K.Anonymized Internet Traces2012-10
London, UKCriticisms of modelling packet traffic using long-range depe ...Clegg, R., Landa, R., et al.Anonymized Internet Traces2011-09
Takizawa, JPA defense method against Distributed Slow HTTP DoS attackHirakawa, T., Ogura, K., et al.UCSD Network Telescope2016-09
Santa Clara, CA, USStitching Inter-Domain Paths over IXPsKotronis, V., Kloti, R., et al.Topology with BGP2016
Los Angeles, CA, USDREAM: Dynamic Resource Allocation for Software-defined Meas ...Moshref, M., Yu, M., et al.Anonymized Internet Traces2014-08
Seoul, KRAS-level topology collection through looking glass serversKhan, A., Kwon, T., et al.Topology with Archipelago2013-10
Goettingen, DEAS path inference: From complex network perspectiveTao, N., Chen, X., et al.Topology with BGP2015-05
Zurich, CHAugmenting home routers for socially-aware traffic managemen ...Lareida, A., Petropoulos, G., et al.Topology with BGP2015-10
Tirupati, INA Model for Generating Synthetic Network Flows and Accuracy ...Rao, M., Naidu, M.Anonymized Internet Traces2017-04
Darmstadt, DEDeNASA: Destination-Naive AS-Awareness in Anonymous Communic ...Barton, A., Wright, M.Topology with BGP2016
Pittsburgh, PA, USStackPi : a new defense mechanism against IP spoofing and DD ...Motamedi, R., Chandrasekaran, B., et al.Topology with Skitter2003-00
New Delhi, INQi points : placing decoy routers in the internetGosain, D., Agarwal, A., et al.Topology with Archipelago, Topology with BGP2016
Gif sur Yvette, FRInternet topology on as-level: Model, generation methods and ...Tomasik, J., Weisser, M.-A.Topology with Archipelago, Topology with BGP2011-01
London, UKAnalyzing and modelling the AS-level Internet topologyZhou, S., Mondragon, R.Topology with Skitter2003-06
Syracuse, NY, USA model for recursive propagations of reputations in social ...Lee, J.Y., Oh, J.C.Topology with BGP2013-08
Conway, AR, USTTL based Packet Marking for IP tracebackParuchuri, V., Durresi, A., et al.Topology with Skitter2008-12
Seoul, KRScalable Bandwidth Shaping Scheme via Adaptively Managed Par ...Kim, T., Lim, J., et al.Anonymized Internet Traces2017-07
Boston, MA, USVirtual landmarks for the internetTang, L., Crovella, M.Topology with Skitter2003-10
London, UKForecasting full-path network congestion using one bit signa ...Woldeselassie, M., Clegg, R., et al.Anonymized Internet Traces2010-07
Rourkela, INShuffling based mechanism for DDoS prevention on cloud envir ...Sharma, S.Denial of Service Attacks, Anonymized Internet Traces2015-05
Barcelona, ESReinventing NetFlow for OpenFlow Software-Defined NetworksVarela, J., Ros, P.Anonymized Internet Traces2017-02
Hong Kong, CNCoding and replication co-design for interactive multiview v ...Huang, H., Zhang, B., et al.Topology with Archipelago2012-03
Boston, MA, USHardware-Software Co-Design for Network Performance Measurem ...Narayana, S., Sivaraman, A., et al.Anonymized Internet Traces2016-11
North Brunswick, NJ, USPISA: Automatic extraction of traffic signaturesChhabra, P., John, A., et al.UCSD Network Telescope2005-05
Minneapolis, MN, USPrivacy-Preserving Interdomain Routing at Internet ScaleAsharov, G., Demmler, D., et al.Topology with BGP2017
Ottawa, CAResource optimization of TCAM-based SDN measurements via dim ...Abada, A.Anonymized Internet Traces2016-06
Changsha, CNWhom to convince? It really matters in BGP prefix hijacking ...Liu, Y., Dai, B., et al.Topology with BGP2011-06
Lexington, KY, USOn the scalability of interdomain path computationsAscigil, O., Calvert, K.L., et al.Topology with BGP2014-06
Orlando, FL, USEvaluating end-user network benefits of peering with path la ...Ahmad, M.Z., Guha, R.Topology with BGP2012-07
Irbid, JOIdentifying cyber-attacks on software defined networks: An i ...AlEroud, A., Alsmadi, I.Denial of Service Attacks2017-02
Toledo, OH, USNormal and anomalous traffic flow pattern analysis for organ ...Rahmat, S., Niyaz, Q., et al.Denial of Service Attacks2017-04
Tokyo, JPAnalysis of diagnostic capability for hijacked route problemAkashi, O; Fukuda, K., Hirotsu, et al.Topology with Skitter2007-10
Tokyo, JPIncentive mechanism for prompting ISPs to implement outbound ...Takahashi, Y., Ishibashi, K.Topology with BGP2011-10
Kansas City, MO, USQuantile sampling for practical delay monitoring in Internet ...Choi, B., Moon, S., et al.Topology with Skitter2007-07
Leipzig, DECORIA - Analyzing internet connectivity risks using network ...Fabian, B., Baumann, A., et al.Topology with Archipelago2017-05
Haifa, ILThe variable-increment counting Bloom filterRottenstreich, O., Keslassy, I.Anonymized Internet Traces2010-00
Pisa, ITEnergy driven adaptivity in stream parallel computationsDanelutto, M., De Sensi, D., et al.Anonymized Internet Traces2015-00
Pittsburgh, PA, USModeling adoptability of secure BGP protocolsChan, H., Dash, D., et al.Topology with Archipelago2006-09
Urbana, IL, USPreventing encrypted traffic analysisSchear, N.Anonymized Internet Traces2011-01
Redmond, WA, USBias reduction in traceroute sampling - Towards a more accur ...Flaxman, A., Vera, J.Topology with Skitter2007-12
Forth, GRRe-mapping the Internet: Bring the IXPs into PlaySermpezis, P., Nomikos, G., et al.Topology with Archipelago, Topology with BGP2017
Austin, TX, USDetecting overlapping temporal community structure in time-e ...Chen, Y., Kawadia, V., et al.Topology with Skitter2013-03
Ipswich, UKChinese Internet AS-level topologyZhou, S., Zhang, G.-Q.Topology with Skitter2007-04
Barcelona, ESSelf-managed resources in network virtualisation environment ...Mijumbi, R., Serrat, J., et al.Anonymized Internet Traces2015-05
Jinan, CNAn Entropy-Based Distributed DDoS Detection Mechanism in Sof ...Wang, R., Jia, Z., et al.Denial of Service Attacks2015-08
Beijing, CNFlattening and preferential attachment in the Internet evolu ...Li, M., Wang, H., et al.Topology with BGP2012-09
Nara, JPA Proposal of Estimation Method of Consumed Memory Amount by ...Masatoshi, E., Hayama, H., et al.Topology with BGP2015
Shenyang, CNThe study on characteristics of the coreness of router-level ...Zhang, J., Zhao, H., et al.Topology with Skitter2008-07
Jorhat, INPractical tools for attackers and defendersBhuyan, M., Bhattacharyya, D., et al.Denial of Service Attacks2015-09
Budapest, HUAdaptive IP mutation: A proactive approach for defending aga ...Lin, C., Wu, C., et al.UCSD Network Telescope2016-09
Ann Arbor, MI, USA brave new world: Studies on the deployment and security of ...Czyz, J.J.Topology with Archipelago2016-06
Vigo, ESOptimizing Dual-Mode EEE Interfaces: Deep-Sleep is HealthyAlonso, S., Perez, M., et al.Anonymized Internet Traces2017-05
Beijing, CNBAH: A Bitmap Index Compression Algorithm for Fast Data Retr ...Li, C., Chen, Z., et al.Anonymized Internet Traces2016-11
Assam, INAn empirical evaluation of information metrics for low-rate ...Bhuyan, M.H., Bhattacharyya, D.K., et al.Denial of Service Attacks2014-08
Montreal, CAFingerprinting Internet DNS Amplification DDoS ActivitiesFachkha, C., Bou-Harb, E., et al.Denial of Service Attacks2014-03-04
Munich, DEFlexPath NP - flexible, dynamically reconfigurable processin ...Ohlendorf, R., Meitinger, M., et al.Anonymized Internet Traces2010-03
Manouba, TNJoint entropy analysis model for DDoS attack detectionRahmani, H., Sahli, N., et al.UCSD Network Telescope, Anonymized Internet Traces2009-08
Beijing, CNDIMR: Disjoint Interdomain Multipath RoutingYin, X., Wu, D., et al.Topology with BGP2015-07
Victoria, BC, CAStatistical assessment of peer-to-peer botnet featuresGodkin, T.Topology with Skitter2013-04
Nathan, AUFlow-based anomaly detection using semisupervised learningJadidi, Z., Muthukkumarasamy, V., et al.Denial of Service Attacks, Anonymized Internet Traces2015-12
Paris, FRIDRD: Enabling inter-domain route diversityMisseri, X., Gojmerac, I., et al.Topology with BGP2013-06
Kyoto, JPTowards an Autonomous System Monitor for Mitigating Correlat ...Hoang, N.P.Topology with BGP2016
San Diego, CA, USAutomatically inferring patterns of resource consumption in ...Estan, C., Savage, S., et al.Anonymized Internet Traces2003-08
Beijing, CNRevisiting the rich club of the Internet AS-level topologyWang, Y., Bi, J., et al.Topology with Skitter, Topology with Archipelago2013-01
Pullman, WA, USA collaborative defense framework against DDoS attacks in ne ...Liu, H.Denial of Service Attacks, Anonymized Internet Traces2013-05
Zhongli, TWHardware-assisted estimation of entropy norm for high-speed ...Lai, Y., Wellem, T., et al.Anonymized Internet Traces2014-11
Linkoping, SEPrefiSec: A distributed alliance framework for collaborative ...Hiran, R., Carlsson, N., et al.Topology with BGP2014
Tezpur, INUDP Flooding attack detection using information metric measu ...Boro, D., Basumatary, H., et al.Anonymized Internet Traces2016-02
Paris, FRExact and approximate algorithms for computing the hyperboli ...Cohen, N., Couderty, D., et al.Topology with BGP2012-09
Pittsburgh, PASanctuary trail: refuge from Internet DDoS entrapmentHsiao, H.-C., Kim, T., et al.Topology with BGP2012-06
Baghdad, IQA modified DBSCAN clustering algorithm for proactive detecti ...Al-mamory, S., Algelal, S.Denial of Service Attacks2017-03
Monteluco di Roio, ITPartially dynamic efficient algorithms for distributed short ...Ciceronea, S., D'Angelo, G., et al.Topology with Archipelago2010-02
Stockholm, SEAds versus Regular Contents: Dissecting the Web Hosting Ecos ...Bangera, P., Gorinsky, S.Topology with BGP2017
Chatham Maritime, UKSimulation of zero-day worm epidemiology in the dynamic, het ...Tidy, L.J., Woodhead, S., et al.UCSD Network Telescope2013-10
Ithaca, NY, USTowards precise network measurementsLee, K.Anonymized Internet Traces2017-01
Babil, IQA proactive DDoS detection approach using data mining cluste ...Bhaya, W., Manaa, M.E.Denial of Service Attacks2014-11
Atlanta, GA, USNon-crypto hardware hash functions for high performance netw ...Hua, N., Norige, E., et al.Anonymized Internet Traces2011-10
Redmond, WA, USCan internet video-on-demand be profitable?Huang, C., Li, J., et al.Topology with BGP2007-00
Budapest, HUDeductive way of reasoning about the Internet AS level topol ...Szabo, D., Korosi, A., et al.Topology with BGP2015-10
Aalto, FIEfficient methods on reducing data redundancy in the Interne ...Saha, S.Topology with Skitter2015-10
Dubai, AEImproved Calculation of aS Resilience against IP Prefix Hija ...Wubbeling, M., Meier, M.Topology with BGP2016
San Diego, CA, USRealistic and responsive network traffic generationVishwanath, K., Vahdat, A.Anonymized Internet Traces2006-10
Beijing, CNCAMP: A New Bitmap Index for Data Retrieval in Traffic Archi ...Wu, Y., Chen, Z., et al.Anonymized Internet Traces2016-04
Pittsburgh, PA, USNetMemex: Providing full-fidelity traffic archivalLim, H., Sekar, V., et al.Anonymized Internet Traces2016-03
San Antonio, TX, USA statistical framework for analyzing cyber attacksZhan, Z.UCSD Network Telescope2014-05
Halifax, CAOn the analysis of backscatter trafficBalkanli, E., Zincir-Heywood, A.N.UCSD Network Telescope2014-09
Ames, IO, USTechniques for online analysis of large distributed dataSingh, S.A.Anonymized Internet Traces2015-00
Lancaster, UKIt Bends But Would It Break? Topological Analysis of BGP Inf ...Frey, S., Elkhatib, Y., et al.Topology with BGP2016-03
Orlando, FL, USCAR: Cloud-Assisted RoutingDey, P., Yuksel, M.Anonymized Internet Traces2016-11
Sydney, AUMCAD: Multiple connection based anomaly detectionHe, X., Parameswaran, S.UCSD Network Telescope2008-11
Changsha, CNAnalysis of prefix hijacking based on AS hierarchical modelZhang, B.-F., Li, Y., et al.Topology with BGP2011-09
St. Louis, MO, USMachine learning for anomaly detection and categorization in ...Salman, T., Bhamare, D., et al.Denial of Service Attacks2017-06
Yokohama, JPPerformance evaluation of host-based mobility management sch ...Erunika, O., Kaneko, K., et al.Topology with BGP2015-03
Atlanta, GA, USEmpowering bystanders to facilitate Internet censorship meas ...Burnett, S.R.Topology with Archipelago, UCSD Network Telescope2014-07
Halifax, CASupervised learning to detect DDoS attacksBalkanli, E., Alves, J., et al.UCSD Network Telescope2014-12
Orlando, FL, USAnalysing global triangle inequality violations due to Inter ...Ahmad, M.Z., Guha, R.Topology with Archipelago2012-10
London, UKA large-scale zero-day worm simulator for cyber-epidemiologi ...Tidy, L., Woodhead, S., et al.UCSD Network Telescope2013-02
Rome, ITMeasuring route diversity in the internet from remote vantag ...Di Menna, A., Refice, T., et al.Topology with BGP2009-05
Bangkok, THA study of autonomous system relationships within ThailandSiritana, H., Kitisin, S., et al.Topology with BGP2011-05
Beijing, CNA lightweight DDoS flooding attack detection algorithm based ...Li, C., Yang, J., et al.Denial of Service Attacks, Anonymized Internet Traces2015-12
Southampton, UKSymmetry in complex networksMacArthur, B.D., Sanchez-Garcia, R.J., et al.Topology with BGP2008-11
Guildford, UKPolicy-aware virtual relay placement for inter-domain path d ...Guo, T., Wang, N., et al.Topology with BGP2010-08
Ghent, BEAvailability analysis of resilient geometric routing on Inte ...Sahhaf, S., Tavernier, W., et al.Topology with BGP2014-04
Minneapolis, MI, USNew attacks on timing-based network flow watermarksLin, Z, Hopper, N.Anonymized Internet Traces2012-08
Fort Collins, CO, USCharacterizing International BGP DetoursShah, A., Papadopoulos, C.Topology with BGP2015
Beijing, CNMitigating the table-overflow attack in Software-Defined Net ...Xu, T., Gao, D., et al.Topology with Archipelago, Anonymized Internet Traces2017-10
Kuala Lumpur, MYRevolutionizing the inter-domain business model by informati ...Feng, Z., Xu, M., et al.Topology with BGP2016
Beijing, CNOn monitoring and predicting mobile network traffic abnormal ...Lai, Y., Chen, Y., et al.UCSD Network Telescope, Denial of Service Attacks2015-01
Delft, NLQuantifying the spectrum of Denial-of-Service attacks throug ...Blenn, N., Ghiette, V., et al.UCSD Network Telescope2017-08
Shenyang, CNCollapse by cascading failures in hybrid attacked regional I ...Xu, Y., Wang, Z.Topology with Archipelago2012-04
Halifax, NS, CAFeature selection for robust backscatter DDoS detectionBalkanli, E., Zincir-Heywood, A.N., et al.UCSD Network Telescope, Denial of Service Attacks2015-10
Leuven, BEOn the impact of clustering on measurement reductionSaucez, D., Donnet, B., et al.Topology with Archipelago2009-05
Beijing, CNMeasuring the impacts of sampling bias on internet AS-level ...Zhang, G.Topology with BGP2009-03
San Diego, CA, USNew directions in traffic measurement and accountingEstan, C., Varghese, G.Anonymized Internet Traces2002-10
Kapurthala, INDiscriminating flash events from DDoS Attacks: A comprehensi ...Behal, S., Kumar, K., et al.Denial of Service Attacks2017-09
Warsaw, PLOn the design of energy-efficient service rate control mecha ...Karpowicz, M.Anonymized Internet Traces2013-09
Barcelona, ESAdaptive shared-state samplingRaspall, F., Sallent, S.Anonymized Internet Traces2008-00
Melbourne, AUAdapting router buffers for energy efficiencyVishwanath, A., Sivaraman, V., et al.Anonymized Internet Traces2011-12
Halifax, NS, CADeterministic flow marking for IPv6 traceback (DFM6)Aghaei-Foroushani, V., Zincir-Heywood, A.N.Anonymized Internet Traces2015-11
Madrid, ESObscure giants: detecting the provider-free ASesHasan, S., Gorinsky, S.Topology with BGP2012-05
Dubai, AEOn the Analysis of Internet Paths with DisNETPerf, a Distrib ...Wassermann, S., Casas, P., et al.Topology with BGP2016
Budapest, HUAn information-theoretic approach to routing scalabilityRetvari, G., Szabo, D., et al.Topology with BGP2014-10
Atlanta, GAGraph analysis combining numerical, statistical, and streami ...Fairbanks, J.Anonymized Internet Traces2016-05
Berlin, DEIn search for an appropriate granularity to model routing po ...Muehlbauer, W., Uhlig, S., et al.Topology with BGP2007-10
Nantes, FREfficiently summarizing data streams over sliding windowsRivetti, N., Busnel, Y., et al.Denial of Service Attacks, Anonymized Internet Traces2015-09
Indore, INAn event based technique for detecting spoofed IP packetsHubballi, N., Tripathi, N.Denial of Service Attacks2016-08
Seoul, KRAdaptive suspicious prevention for defending DoS attacks in ...Dao, N.-N., Kim, J., et al.Anonymized Internet Traces2016-08
Harbin, CNParallelizing weighted frequency counting in high-speed netw ...Zhang, Y., Fang, B.X., et al.Anonymized Internet Traces2010-04
Cape Town, ZADDoS defence for service availability in cloud computingOsanaiye, O.A.Denial of Service Attacks2016-07
Monterey, CA, USIPv6 network infrastructure and stability inferenceMosley, L.D.Topology with Archipelago2014-09
Ningbo, CNA hash-based path identification scheme for DDoS attacks def ...Jin, G., Zhang, F., et al.Topology with Skitter2009-10
Osaka, JPA provider and peer selection policy for the future sustaina ...Nakata, Y., Arakawa, S., et al.Topology with BGP2015-01
Trier, DETopGen - internet router-level topology generation based on ...Scholtes, I., Botev, J., et al.Topology with Skitter2008-03
Stuttgart, DEEmuFog: Extensible and scalable emulation of large-scale fog ...Mayer, R., Graser, L., et al.Topology with Archipelago2017-09
Braga, PTAutomated and distributed network service monitoringGermoglio, G., Dias, B., et al.Topology with Archipelago2009-09
Atlanta, GA, USScalable hash-based IP traceback using rate-limited Probabil ...Sung, M., Chiang, J., et al.Topology with Skitter2006-00
Riverside, CA, USLong-range dependence: ten years of Internet traffic modelin ...Karagiannis, T., Molle, M., et al.Anonymized Internet Traces2004-09
Changsha, CNStudy on IP prefix hijacking in cloud computing networks bas ...Liu, Y., Peng, W., et al.Topology with BGP2011-11
Paris, FRA TCP delay-based mechanism for detecting congestion in the ...Dassouki, K., Debar, H., et al.Denial of Service Attacks2013-06
Fujimino, JPAS alliance: cooperatively improving resilience of intra-all ...Hei, Y., Nakao, A., et al.Topology with BGP2008-12
Berkeley, CA, USFuture architectures for middlebox processing services on th ...Sherry, J.Topology with Archipelago, Topology with BGP2012-12
Halifax, CATDFA: Traceback-based defense against DDoS flooding attacksAghaei-Foroushani, V., Zincir-Heywood, A.N.Denial of Service Attacks, Anonymized Internet Traces2014-05
Montreal, CADarknet as a source of cyber intelligence: Survey, taxonomy, ...Fachkha, C., Debbabi, M.UCSD Network Telescope2016-05
Berlin, DEBeyond counting: New perspectives on the active IPv4 address ...Richter, P., Smaragdakis, G., et al.Topology with Archipelago2016-11
Munich, DEEfficient simulation of large-scale P2P networks: modeling n ...Kunzmann, G., Nagel, R., et al.Topology with Skitter2007-02
Anandapur, INSpread of information in a social network using influential ...Chaudhury, A., Basuchowdhuri, P., et al.Topology with BGP2012-05
Berkeley, CA, USBridging the software/hardware forwarding divideMoon, D., Naous, J., et al.Anonymized Internet Traces2010-00
Durgapur, INMathematical modelling of DDoS attack and detection using co ...Singh, K.J., De, T.Denial of Service Attacks2017-09
San Diego, CA, USiPlane Nano: path prediction for peer-to-peer applicationsMadhyastha, H.V., Katz-Bassett, E., et al.Topology with Skitter2009-04
Baltimore, MD, USFast and evasive attacks: highlighting the challenges aheadRajab, M., Monrose, F., et al.UCSD Network Telescope2006-09
Beaune, FRRouter in Internet with fifteen entriesGavoille, C., Glacet, C., et al.Topology with BGP2015
Minneapolis, MN, USE-embargoes: Discouraging the deployment of traffic manipula ...Schuchard, M., Hopper, N.Topology with BGP2016-06
Baghdad, IQDDoS attack detection approach using an efficient cluster an ...Bhaya, W., Manaa, M.E.Denial of Service Attacks, Anonymized Internet Traces2017-03
Chapel Hill, NC, USEmpirical study of the impact of sampling timescales and str ...Shriram, A., Kaur, J.Anonymized Internet Traces2006-04
Wuhan, CNSafeguard information infrastructure against DDos attacks: E ...Zhu, X., Wang, S., et al.Topology with Skitter2005-12
Grahamstown, ZAHigh level internet scale traffic visualization using Hilber ...Irwin, B., Pilkington, N.UCSD Network Telescope2008-05
Brescia, ITIP traffic classification for QoS guarantees: the independen ...Dusi, M., Gringoli, F., et al.Anonymized Internet Traces2008-08
Aalto, FIPredictive models of network traffic loadPouzols, F.M., Lopez, D.R., et al.Anonymized Internet Traces2011-00
Louvain, BERevisiting flow-based load balancing: Stateless path selecti ...Detal, G., Paasch, C., et al.Anonymized Internet Traces2012-12
Munich, DEReducing data center resource over-provisioning through dyna ...Oeldemann, A., Wild, T., et al.Anonymized Internet Traces2017-04
Paris, FREfficient route tracing from a single sourceDonnet, B., Raoult, P., et al.Topology with Skitter2006-05
Pisa, ITAS-Level Topology Discovery: Measurement strategies tailored ...Gregori, E., Lenzini, L., et al.Topology with BGP2017-08
Poznan, PLStatistical and signal-based network traffic recognition for ...Choras, M., Saganowski, L., et al.UCSD Network Telescope2011-01
Barcelona, ESTowards a NetFlow implementation for OpenFlow software-Defin ...Varela, J., Ros, P.Anonymized Internet Traces2017-09
Enschede, NLModel-checking mean-field models: algorithms and application ...Kolesnichenko, A.UCSD Network Telescope2014-12
University Park, PA, USEstimating systematic risk in real-world networksLaszka, A., Johnson, B., et al.Topology with BGP2014-03
Beijing, CNA hardware-based TCP stream state tracking and reassembly so ...Zhao, Y., Yuan, R., et al.Anonymized Internet Traces2012-06
Minhsiung, TWA virtual service framework for service composition QoS base ...Wu, M.-F., Jiang, T.M., et al.Topology with Archipelago2008-12
Florianopolis, BRJumpstarting BGP Security with Path-End ValidationCohen, A., Gilad, Y., et al.Topology with BGP2016
Joondalup WA, AUIntelligent network intrusion detection using an evolutionar ...Rastegari, S.Denial of Service Attacks2015-12
Madrid, ESIncreasing the MTU size for energy efficiency in ethernetReviriego, P., Sanchez-Macian, A., et al.Anonymized Internet Traces2010-06
Dubai, AEReverse Traceroute with DisNETPerf, a Distributed Internet P ...Wassermann, S., Casas, P.Topology with BGP2016
Boston, MA, USMeasuring and applying invalid SSL certificates: The silent ...Chung, T., Liu, Y., et al.Topology with BGP2016-11
Beijing, CNStream data analysis for backbone network intrusion detectio ...Xiaojuan, S., Bin, L.Anonymized Internet Traces2012-09
Princeton, NJ, USCacheFlow: Dependency-Aware Rule-Caching for Software-Define ...Katta, N., Alipourfard, O., et al.Anonymized Internet Traces2016-03
Ningbo, CNA Pi2HC mechanism against DDoS attacksJin, G., Li, Y., et al.Topology with Skitter2008-08
Zurich, CHSIBRA: Scalable Internet Bandwidth Reservation ArchitectureBasescu, C., Reischuk, R.M., et al.Topology with BGP, Anonymized Internet Traces2015-10
San Diego, CA, USThe power of slicing in internet flow measurementKompella, R., Estan, C.Anonymized Internet Traces2005-10
Hatfield, UKA chi-square testing-based intrusion detection modelAbouzakhar, N.S., Bakar, A.UCSD Network Telescope2010-09
Zurich, CHTowards a BitTorrent Weather ForecastBublitz, S.Topology with BGP2017
Liege, BEThrough the Wormhole: Tracking Invisible MPLS TunnelsVanaubel, Y., Merindol, P., et al.Topology with Archipelago2017-11
Cadiz, ESMultiresolution Matrix CompressionTeneva, N., Mudrakarta, P.K., et al.Topology with BGP2016
Atlanta, GA, USISP and egress path selection for multihomed networksDhamdhere, A., Dovrolis, C.Topology with Skitter2006-00
Syracuse, NY, USA node-centric reputation computation algorithm on online so ...Lee, J.Y., Oh, J.C.Topology with BGP2015-05
Monterey, CA, USDiscovery of IPv6 router interface addresses via heuristic m ...Gray, M.D.Topology with Archipelago2015-09
London, UKRedundancy and robustness of AS-level Internet topology and ...Zhou, S., Mondragon, R.J.Topology with Skitter2004-02
London, UKOn the relationship between fundamental measurements in TCP ...Clegg, R.G., Araujo, J.T., et al.Anonymized Internet Traces2013-06
Liege, BENetwork fingerprinting: TTL-based router signaturesVanaubel, Y., Pansiot, J.-J., et al.Topology with Archipelago2013-10
Washington DC, USUsers get routed: Traffic correlation on Tor by realistic ad ...Johnson, A., Wacek, C., et al.Topology with Archipelago, Topology with BGP2013-11
Boston, MA, USCharacterization of Evolving Networks for CybersecurityNamayanja, J., Janeja, V.Anonymized Internet Traces2016-10
Aveiro, PTTopological implications of cascading interdomain bilateral ...Jesus, V., Aguiar, R.L., et al.Topology with Archipelago2011-10
Atlanta, GA, USUnderstanding the Mirai BotnetAntonakakis, M., April, T., et al.Topology with BGP2017-08
Seoul, KRFast detection and visualization of network attacks on paral ...Choi, H., Lee, H., et al.UCSD Network Telescope2008-07
Sevilla, ESLinguistic summarization of network traffic flowsPouzols, F.M., Barriga, A., et al.Anonymized Internet Traces2008-06
Seoul, KRA dynamic path identification mechanism to defend against DD ...Lee, G., Lim, H., et al.Topology with Skitter2004-00
Princeton, NJ, USInter-AS traffic patterns and there implicationsFang, W., Peterson, L.Anonymized Internet Traces1999-12
Lyon, FRTraffic classification techniques supporting semantic networ ...Gremillet, O., Goncalves, P., et al.Anonymized Internet Traces2010-06
Riverside, CA, USTraffic-aware power optimization for network applications on ...Kuang, J., Bhuyan, L., et al.Anonymized Internet Traces2012-06
Cambridge, MA, USIntegrated Information as a Metric for Group Interaction: An ...Engel, D., Malone, W.Anonymized Internet Traces2017-02
Kuala Lumpur, MYCo-FQL: Anomaly detection using cooperative fuzzy Q-learning ...Shamshirband, S., Daghighi, B., et al.Denial of Service Attacks2015-01
Evanston, IL, USOn the eyeshots of BGP vantage pointsChen, K., Hu, C., et al.Topology with BGP2010-03
Halifax, NS, CAProbabilistic flow marking for IP traceback (PFM)Aghaei-Foroushani, V., Zincir-Heywood, A.N.Denial of Service Attacks, Anonymized Internet Traces2015-10
Los Angeles, CA, USReducing dynamic power dissipation in pipelined forwarding e ...Jiang, W., Prasanna, V.K.Anonymized Internet Traces2009-10
College Station, TX, USStream Aggregation Through Order SamplingDuffield, N., Xu, Y., et al.Anonymized Internet Traces2017-03
Richardson, TX, USMeasuring path divergence in the InternetAhmed, N., Kamil, SaracTopology with BGP2014-12
Wellington, NZMartingale limit theorems of divisible statistics in a multi ...Wu, H., Kvizhinadze, G.Topology with BGP2011-03
Atlanta, GA, USThe economics of internet peering interconnectionsLodhi, A.H.Topology with BGP2014-11
College Park, MD, USCharacterizing the dynamical importance of network nodes and ...Restrepo, J.G., Ott, E., et al.Topology with BGP2006-09
Washington, DC, USRepresenting network trust and using it to improve anonymous ...Jaggard, A.D., Johnson, A., et al.Topology with Archipelago, Topology with BGP2014-06
Queensland, ARA framework for generating realistic traffic for Distributed ...Bhatia, S., Schmidt, D., et al.Denial of Service Attacks2014-02
Natal, BRMinimization and placement of sensors in structurally observ ...Medeiros, J.P.S., Motta Pires, P.S., et al.Topology with Archipelago2015-10
Beijing, CNPassive IP Traceback: disclosing the locations of IP spoofer ...Yao, G., Bi, J., et al.UCSD Network Telescope2015-01
Haifa, ILRandomized Admission Policy for Efficient Top-k and Frequenc ...Basat, R., Einziger, G., et al.Anonymized Internet Traces2016-12
Pisa, ITThe impact of the access point power model on the energy-eff ...Garroppo, R.G., Nencioni, G., et al.Anonymized Internet Traces2016-01
Brno, CZEvolution of cache replacement policies to track heavy-hitte ...Zadnik, M., Canini, M.Anonymized Internet Traces2010-10
College Station, TX, USStochastic pre-classification for Software Defined FirewallsGhoshal, P., Casey, C.J., et al.Anonymized Internet Traces2013-07
Beijing, CNA2C: Anti-attack counters for traffic measurementHe, K., Hu, C., et al.Anonymized Internet Traces2010-12
Monterey, CA, USYarrp'ing the Internet: Randomized high-speed active topolog ...Beverly, R.Topology with Archipelago2016-11
Berkeley, CA, USNetcalls: End host function calls to network traffic process ...Sherry, J., Kim, D., et al.Topology with BGP2012-07
Urbana, IL, USCirripede: Circumvention Infrastructure using Router Redirec ...Houmansadr, A., Nguyen, G.T.K., et al.Anonymized Internet Traces2011-10
Wenzhou, CNA DDoS-oriented distributed defense framework based on edge ...Bi, X., Tan, W., et al.Topology with Skitter2008-10
Beijing, CNAnonymity-Based Privacy Preserving Network Data PublicationLiu, P., Li, Y., et al.Anonymized Internet Traces2016-08
New Delhi, INStatistical-based filtering system against DDOS attacks in c ...Shamsolmoali, P., Zareapoor, M.Denial of Service Attacks2014-07
London, UKPatterns and anomalies in k-cores of real-world graphs with ...Shin, K., Rad, T., et al.Topology with BGP2017
Philadelphia, PA, USAccountability in distributed systems with incomplete inform ...Zhao, M.Topology with BGP2016
Berkeley, CA, USTowards an accurate AS-level traceroute toolMao, Z., Rexford, J., et al.Topology with Skitter2003-08
Wuhan, CNHyperbolic mapping of complex networks based on community in ...Wang, Z., Li, Q., et al.Topology with Archipelago2016
London, UKBGPfuse: using visual feature fusion for the detection and a ...Papadopoulos, S., Theodoridis, G., et al.Topology with BGP2013-10
Heraklion, GRITA: Innocuous topology awareness for unstructured P2P netwo ...Papadakis, H., Fragopoulou, P., et al.Topology with Archipelago, Topology with BGP2012-05
Beer-Sheva, ILCollaborative attack on internet users' anonymityPuzis, R., Yagil, D., et al.Topology with BGP2009-00
Vigo, ESBounded energy consumption with dynamic packet coalescingHerreria-Alonso, S., Rodriguez-Perez, M., et al.Anonymized Internet Traces2012-06
Iztapalapa, MXA performance comparison of Chord and Kademlia DHTs in high ...Medrano-Chavez, A.G., Perez-Cortes, E., et al.Topology with Skitter2014-06
Beirut, LBHop count variabilityMukaddam, A., ELHajj, I.Topology with Skitter2011-12
Turin, ITRouter-level community structure of the Internet Autonomous ...Beiro, M.G.; Grynberg, S.P.; Alvarez-Hamelin, J.I.Topology with Archipelago2015-08
Mobile, AL, USMeasuring the variability of CAIDA internet traffic tracesLazarou, G., Alam, M., et al.Anonymized Internet Traces2016-12
Urbana, IL, USNon-blind watermarking of network flowsHoumansadr, A., Kiyavash, N., et al.Anonymized Internet Traces2012-03
Shenyang, CNAnalysis on traveling time of internetLi, C., Zhao, H., et al.Topology with Archipelago2007-00
Potsdam, GEOn the extent of correlation in BGP updates in the Internet ...Sapegin, A., Uhlig, S.Topology with Archipelago2013-09
Ultimo, AUNetwork timing and the 2015 leap secondVeitch, D., Vijayalayan, K.Topology with Archipelago2016-03
Newark, DE, USMisbehaviors in TCP SACK generationEkiz, N., Rahman, A.H., et al.Anonymized Internet Traces2011-04
Nairobi, KEDetecting scanning computer worms using machine learning and ...Ochieng, N., Ismail, A., et al.UCSD Network Telescope2017-03
Haifa, ILTapping into the Router's Unutilized Processing PowerRadan, M., Keslassy, I.Anonymized Internet Traces2015
Barcelona, ESLatency estimation of IP flows using NetFlowSantiago, S.S.Anonymized Internet Traces2013-06
Paris, FRThe inframetric model for the internetFraigniaud, P., Febhar, E., et al.Topology with Skitter2008-04
Shijiazhuang, CNCombating good point set scanning-based self-learning worms ...Wang, F., Zhang, Y., et al.UCSD Network Telescope2013-01
Nanjing, CNEstimating the persistent spreads in high-speed networksXiao, Q., Qiao, Y., et al.Anonymized Internet Traces2014-10
Paris, FRWhat is the real size of a sampled network? The case of the ...Viger, F., Barrat, A., et al.Topology with Skitter2007-05
Xiamen, CNA blind detection method for tracing the real source of DDoS ...Chen, Y., Chen, X., et al.Denial of Service Attacks2016-06
New York, NY, USOn the emergence of highly variable distributions in the aut ...Fayed, M., Krapivsky, P., et al.Topology with BGP2003
Atlanta, GA, USA topological analysis of monitor placementJackson, A., Milliken, W., et al.Topology with Skitter2007-06
Atlanta, GA, USMeasuring network-aware worm spreading abilityChen, Z., Ji, C.UCSD Network Telescope2007-05
Changsha, CNAn efficient algorithm for AS path inferringYang, G., Dou, W.Topology with BGP2009-08
Pittsburgh, PA, USStegoTorus: a camouflage proxy for the Tor anonymity systemWeinberg, Z., Wang, J., et al.Anonymized Internet Traces2012-10
Hampton, VA, USA fluid-based approach for modeling network activitiesHu, Y.-H.Anonymized Internet Traces2013-08
Seattle, WA, USConfidence-weighted marginal utility analyses for improved i ...Prince, C., Wyatt, D.Topology with Skitter2004-12
Pittsburgh, PA, USToward a highly available future InternetHsiao, H.-C.Topology with Skitter, Topology with BGP, Anonymized Internet Traces2014-06
Rochester, NY, USProbabilistic modeling and inference for obfuscated network ...Du, H.UCSD Network Telescope2014-08
Newark, NJ, USA router-based technique to mitigate reduction of quality (R ...Shevtekar, A., Ansari, N.Anonymized Internet Traces2008-04
Buenos Aires, ARA low complexity visualization tool that helps to perform co ...Beiro, M.G., Alvarez-Hamelin, J.I., et al.Topology with Skitter2008-12
Washington, DC, US2001-2013: Survey and analysis of major cyberattacksVaidya, T.UCSD Network Telescope2015-07
Belgaum, INDDOS attack detection based on an ensemble of neural classif ...Kale, M., Choudhari, D.M.UCSD Network Telescope2014-07
Victoria, CAAnomaly detection systems for Distributed Denial of Service ...Raza, A.Denial of Service Attacks2017-02
Ithaca, NY, USRandom graph models for dynamic networksZhang, X., Moore, C., et al.Topology with BGP2016
Riverside, CA, USPutting the links together: Measurements and impactHe, Y., Siganos, G., et al.Topology with Skitter2006-00
London, UKChallenges in the capture and dissemination of measurements ...Clegg, R.G., Withall, M.S., et al.Anonymized Internet Traces2009-06
Rio de Janeiro, BRECO-ALOC: Energy-efficient resource allocation for cluster-b ...Fragni, C., Costa, L.H.M.K.Anonymized Internet Traces2012-06
Brno, CZPerformance measurement of stream data processing in Apache ...Halas, F.Anonymized Internet Traces2017-00
Athens, GRComparative assessment of centrality indices and implication ...Nomikos, G., Pantazopoulos, P., et al.Topology with Archipelago2014-09
Amherst, MA, USMultiple random walks to uncover short paths in power law ne ...Ribeiro, B., Basu, P., et al.Topology with BGP2012-03
Urbana, IL, USPreventing SSL traffic analysis with realistic cover trafficSchear, N., Borisov, N.Anonymized Internet Traces2009-11
Paris, FRDescribing and simulating internet routesLeguay, J., Latapy, M., et al.Topology with Skitter2007-06
Wurzburg, DEWurzburger Beitrage zur Leistungsbewertung Verteilter System ...Burger, V.Topology with BGP2017-08
Cambridge, MA, USDistributed Caching Algorithms for Interconnected Operator C ...Pacifici, V., Dan, G.Topology with BGP2017
Madrid, ESReducing the cost of implementing error correction codes in ...Reviriego, P., Pontarelli, S., et al.Anonymized Internet Traces2013-07
Beijing, CNSecurity technologies of SINETZhang, H., Su, W., et al.Denial of Service Attacks2016-10
Kent, OH, USCOMPUTING TOP-K CLOSENESS CENTRALITY IN UNWEIGHTED UNDIRECTE ...Al-Baghdadi, A.Topology with BGP2017
Madrid, ESEconomics of traffic attraction by transit providersBangera, P., Gorinsky, G.Topology with BGP2014-06
Ramat-Gan, ILBandwidth Distributed Denial of Service: Attacks and defense ...Geva, M., Herzberg, A., et al.Topology with BGP2014-01
Madrid, ESInternet traffic classification for high-performance and off ...Santiago del Rio, P.M.Anonymized Internet Traces2013-05
Monterey, CA, USCorrelating inferred data plane IPv6 reboot events with cont ...Marcisak, S.Topology with Archipelago2016-03
Brescia, ITQuantifying the accuracy of the ground truth associated with ...Dusi, M., Gringoli, F., et al.Anonymized Internet Traces2011-04
Tucson, AZ, USIMap: Visualizing network activity over Internet mapsFowler, J; Johnson, T; Simonetto, P; Lazos, et al.Topology with Archipelago, UCSD Network Telescope2014-11
Gent, BEChallenges for orchestration and instance selection of compo ...Simoens, P., Herzeele, L.V., et al.Topology with Archipelago2015-05
Nanjing, CNOnline identification of Tor anonymous communication trafficHe, G.-F., Yang, M., et al.Anonymized Internet Traces2013-03
Athens, GRA reputation-based collaborative schema for the mitigation o ...Giotis, K., Apostolaki, M., et al.Topology with BGP, Denial of Service Attacks2016-04
Philadelphia, PA, USMAP-IT: Multipass accurate passive inferences from tracerout ...Marder, A., Smith, J.M.Topology with Archipelago, Topology with BGP2016-11
Ilmenau, DEAutomatic creation of VPN backup paths for improved resilien ...Grey, M., Rossberg, M., et al.Topology with BGP2012-03
Seattle, WA, USUnderstanding BGP misconfigurationMahajan, R., Wetherall, D., et al.Topology with Skitter2002-10
Edinburgh, UKHigh-fidelity per-flow delay measurements with reference lat ...Lee, M., Duffield, N., et al.Anonymized Internet Traces2013-10
Paris, FREfficient algorithms for large-scale topology discoveryDonnet, B., Raoult, P., et al.Topology with Skitter2005-06
Paris, FRCharacterisation of AS-level path deviations and multipath i ...Elena, E., Rougier, J., et al.Topology with BGP2010-07
Trondheim, NOReliable broadcast contribution over the public InternetMarkman, M.A.J., Tokheim, S.Anonymized Internet Traces2012-06
Haifa, ILEstimators also need shared values to grow togetherTsidon, E., Hanniel, I., et al.Anonymized Internet Traces2012-03
Hamburg, DEWhat is happening from behind?: Making the impact of interne ...Wahlisch, M., Schmidt, T.C., et al.Topology with Skitter, Topology with Archipelago2008-00
Kista, SEObserving software-defined networks using a decentralized li ...Steinert, R., Hess, A.Anonymized Internet Traces2015-04
Pittsburgh, PA, USMonitoring stealthy diffusionHaghtalab, N., Laszka, A., et al.Topology with BGP2017-09
Barcalona, ESRoute leak detection using real-time analytics on local BGP ...Siddiqui, M.S., Montero, D., et al.Topology with Archipelago2014-12
Seattle, WA, USThe impact of DHT routing geometry on resilience and proximi ...Gummadi, K., Gummadi, R., et al.Topology with Skitter2003-08
Beijing, CNAn accurate distributed scheme for detection of prefix inter ...Li, S., Duan, H., et al.Topology with BGP2016-05
Kansas City, MO, USPractical delay monitoring for ISPsChoi, B., Moon, S., et al.Topology with Skitter2005-00
Chennai, INSuspicious score based mechanism to protect web servers agai ...Saravanan, R., Loganathan, S., et al.Denial of Service Attacks2017-04
Ames, IA, USAffecting IP traceback with recent Internet topology mapsMartins, O.A.Topology with Skitter2005-06
Ramat-Gan, ILSocket overloading for fun and cache-poisoningHerzberg, A., Shulman, H.Anonymized Internet Traces2013-12
Durgapur, INEntropy-based application layer DDoS attack detection using ...Singh, K., Thongam, K., et al.Denial of Service Attacks2016-08
Arlington, TX, USDovetail: stronger anonymity in next-generation Internet rou ...Sankey, J.MTopology with BGP2013-05
Beijing, CNA Survey of Network Traffic Visualization in Detecting Netwo ...Liu, X., Sun, Y., et al.Topology with Skitter2015-06
Davis, CA, USProgME: towards programmable network measurementYuan, L., Chuah, C., et al.Anonymized Internet Traces2007-00
Birmingham, UKOn the reliability of network measurement techniques Used fo ...Gardiner, J., Nagaraja, S.Anonymized Internet Traces2014-10
Munich, DEHLOC: Hints-based geolocation leveraging multiple measuremen ...Scheitle, Q., Gasser, O., et al.Topology with Archipelago2017-06
Enschede, NLLinking network usage patterns to traffic GaussianitySchmidt, R., Sadre, R., et al.Anonymized Internet Traces2014-06
Urbana, IL, USAssuring network service with bandwidth and integrity based ...Khan, F.M.Denial of Service Attacks2011-00
Heraklion, GRBackpressure on the backbone: A lightweight, non-intrusive t ...Liaskos, C., Dimitropoulos, X., et al.Topology with Archipelago, Topology with BGP2016-11
Rome, ITPredicting internet commercial connectivity wars: The impact ...D'Ignazio, A., Giovannetti, E.Topology with BGP2015-05
Lafayette, LAPolicy-preferred paths in AS-level Internet topology graphsTozal, M.E.Topology with BGP2018-03
Madison, WI, USCLAMP: Efficient class-based sampling for flexible flow moni ...Saxena, M., Kompella, R.Anonymized Internet Traces2010-10
Brescia, ITComparing traffic classifiersSalgarelli, L., Gringoli, F., et al.Anonymized Internet Traces2007-00
Budapest, HULobby index in networksKorn, A., Schubert, A., et al.Topology with Skitter2009-06
Berlin, DESearch and analysis of backbone traffic measurements in the ...Idzikowski, F.Anonymized Internet Traces2009-03
Madrid, ESImproving energy efficiency in IEEE 802.3ba high-rate ethern ...Reviriego, P., Huiszoon, B., et al.Anonymized Internet Traces2011-03
Tel Aviv, ILDetecting Heavy Flows in the SDN Match and Action ModelAfek, Y., Barr, A., et al.Anonymized Internet Traces2017-02
Stony Brook, NY, USMeasuring and mitigating AS-level adversaries against TorNithyanand, R., Starov, O., et al.Paper Data Supplements2015-12
Rochester, NY, USProbabilistic Inference for Obfuscated Network Attack Sequen ...Du, H., Yang, S.J.UCSD Network Telescope2014-06
Tokyo, JPTesting the reachability of (new) address spaceBush, R., Hiebert, J., et al.Topology with Skitter2007-08
Nancy, FRActivity monitoring for large honeynets and network telescop ...Francois, J., State, R., et al.UCSD Network Telescope2008-00
University Park, PA, USToward a framework for forensic analysis of scanning wormsHamadeh, I., Kesidis, G.UCSD Network Telescope2006-06
Irvine, CA, USPractical recommendations on crawling online social networksGjoka, M., Kurant, M., et al.Topology with BGP2011-10
Ames, IA, USTOPO: a topology-aware single packet attack traceback schemeZhang, L., Guan, Y.Topology with Skitter2006-08
Halifax, CAInvestigating a behaviour analysis-based early warning syste ...Haddadi, F.UCSD Network Telescope2016-09
Glasgow, UKDeterministic, reduced-visibility inter-domain forwardingStrowes, S.D., Perkins, C.Topology with BGP2009-12
Calgary, CAData structures, algorithms and applications for Big Data an ...Xylogiannopoulos, K.Denial of Service Attacks2017-04
Madrid, ESEstudio De Captura y Almacenamiento De Trafico En Redes Fisi ...Osuna, R.Anonymized Internet Traces2015-06
Normal, IL, USA vine copula model for predicting the effectiveness of cybe ...Xu, M., Hua, L., et al.UCSD Network Telescope2016-11
Beersheba, ILComparative network analysis using KronFitSukrit, G., Rami, P., et al.Topology with BGP2016-03
Hyderabad, INReal-time peer-to-peer botnet detection framework based on B ...Guntuku, S., Narang, P., et al.UCSD Network Telescope2013-07
Irvine, CA, USModels and algorithms for graph watermarkingEppstein, D., Goodrich, M.T., et al.Topology with Skitter, Topology with BGP2016-05
Beijing, CNImproving network security by dynamically changing path iden ...Chen, Z., Luo, H., et al.Anonymized Internet Traces2015-12
Barcalona, ESMercury: Revealing hidden interconnections between access IS ...Palacin, M., Bikfalvi, A., et al.Topology with BGP2014-12
Aalto, FIisBF: scalable in-packet Bloom filter based multicastNikolaevskiy, I., Lukyanenko, A., et al.Topology with Skitter2013-03
Yogakarta, IDIntegrasi Metode Normalized Reelative Network Entropy dan Ne ...Muhammad, A., Alameka, F.Denial of Service Attacks, Anonymized Internet Traces2017-06
Al Ain, AEA data driven firewall for faster packet filteringMasud, M.M., Mustafa, U., et al.Anonymized Internet Traces2014-03
Naples, ITDetecting third-party addresses in traceroute traces with IP ...Marchetta, P., de Donato, W., et al.Topology with BGP2013-03
Torino, ITRouter-level community structure of the Internet autonomous ...Beiro, M.G., Grynberg, S.P., et al.Topology with Archipelago2015-03
Riverside, CA, USNetwork monitoring using traffic dispersion graphs (TDGs)Iliofotou, M., Pappu, P., et al.Topology with Skitter, Anonymized Internet Traces2007-00
Monterey, CA, USEvaluating the limits of network topology inference via virt ...Rye, E.C.Topology with BGP2015-06
Palma de Mallorca, ESStructural efficiency of percolated landscapes in flow netwo ...Serrano, M.A., De Los Rios, P.Topology with BGP2008-11
Gothenburg, SEMultifaceted defense against Distributed Denial of Service a ...Fu, Z.Denial of Service Attacks2012-08
Charlottesville, VA, USHobbits: Hadoop and Hive based Internet traffic analysisHendawi, A., Alali, F., et al.Anonymized Internet Traces2016-12
Beijing, CNA more efficient hybrid approach for single-packet IP traceb ...Wang, Y., Su, S., et al.Topology with Skitter, Topology with Archipelago2012-02
Xiangtan, CNHDLBR: A name-independent compact routing scheme for power-l ...Tang, M., Zhang, G., et al.Topology with Skitter2013-02
Amherst, NY, USOn the trade-off between the expected number of infected nod ...Ha, D., Ngo, H.Topology with Skitter2007-05
Conway, AR, USOn the (in)effectiveness of Probabilistic Marking for IP tra ...Paruchuri, V., Durresi, A., et al.Topology with Skitter2007-11
Tiruchirappalli, INDetection of distributed denial of service attacks using an ...Kumar, P.A.R., Selvakumar, S.UCSD Network Telescope, Denial of Service Attacks2013-02
Vienna, ATGAME OF DECOYS: Optimal Decoy Routing Through Game TheoryNasr, M., Houmansadr, A.Topology with BGP2016
East Lansing, MI, USHardware algorithms for high-speed packet processingNorige, E.Anonymized Internet Traces2017-00
Rochester, NY, USTemporal and spatial analyses for large-scale cyber attacksDu, H., Yang, S.J.UCSD Network Telescope2013-00
Naples, ITTopology discovery at the router level: a new hybrid tool ta ...Marchetta, P., Merindol, P., et al.Topology with Skitter, Topology with Archipelago2011-10
Suita, JPAnalyzing Impact of Introducing CCN on Profit of ISPsKamiyama, N.Topology with BGP2015-06
Los Angeles, CA, USSoftware defined traffic measurement with OpenSketchYu, M., Jose, L., et al.Anonymized Internet Traces2013-04
Brescia, ITMTCLASS: Enabling statistical traffic classification of mult ...Gringoli, F., Nava, L., et al.Anonymized Internet Traces2012-08
Champaign, IL, USTorPolice: Towards enforcing service-defined access policies ...Liu, Z., Liu, Y., et al.DNS RTT2017-12
Brno, CZDetecting advanced network threats using a similarity searchCermak, M., Celeda, P.Anonymized Internet Traces2016-06
Rochester, NY, USAttack ProjectionYang, S., Du, H., et al.UCSD Network Telescope2014-10
Tucson, AZ, USNetwork anomaly detection using autonomous system flow aggre ...Johnson, T., Lazos, L.Topology with BGP2014-12
Melbourne, AUMultifractality in TCP/IP traffic: the case againstVeitch, D., Hohna, N., et al.Anonymized Internet Traces2005-06
Tel Aviv, ILThe CB tree: a practical concurrent self-adjusting search tr ...Afek, Y., Kaplan, H., et al.Anonymized Internet Traces2014-12
London, UKTowards informative statistical flow inversionClegg, R., Haddadi, H., et al.Anonymized Internet Traces2007-05
Washington, DC, USThe Cost of the Path Not TakenSchuchard, M., Geddes, J., et al.Topology with Archipelago2016
Forth, GRCan SDN Accelerate BGP Convergence? A Performance Analysis o ...Sermpezis, P., Dimitropoulos, X.Topology with BGP2017
Beijing, CNFiltering location optimization for the reactive packet filt ...Lu, N., Wang, Y., et al.Topology with Archipelago2013-07
Tokyo, JPProposal and evaluation of network-processor acceleration ar ...Okuno, M., Nishi, H.Anonymized Internet Traces2004-03
San Francisco, CA, USIdentifying Anomalies in Graph Streams Using Change Detectio ...Eberle, W., Holder, L.Topology with BGP2016
Halifax, CAHighlights on analyzing one-way traffic using different tool ...Balkanli, E., Zincir-Heywood, A.N.UCSD Network Telescope2015-05
Beijing, CNCLUE: Achieving fast update over compressed table for parall ...Yang, T., Duan, R., et al.Anonymized Internet Traces2012-06
Kaiserslautern, DENetReview: detecting when interdomain routing goes wrongHaeberlen, A., Avramopoulos, I., et al.Topology with BGP2009-04
Darmstadt, DEModelling the internet delay space based on geographical loc ...Kaune, S., Pussep, K., et al.Topology with Skitter2009-02
Madison, WI, USWhat's in a name?: decoding router interface namesChabarek, J., Barford, P.Topology with Archipelago2013-08
Tokyo, JPEstimating AS relationships for application-layer traffic op ...Asai, H., Esaki, H.Topology with BGP2010-09
Singapore, SGEfficient extraction of high-betweenness verticesChong, W.H., Toh, W.S.B., et al.Topology with BGP2010-08
Hong Kong, CNAnonymous overlay network supporting authenticated routingSchlegel, R., Wong, D.S.Topology with Archipelago2012-05
Enschede, NLMeasurement artifacts in NetFlow dataHofstede, R., Drago, I., et al.Anonymized Internet Traces2013-03
Shenyang, CNRobustness analyses of Internet topology with power-law feat ...Xu, Y., Ma, W.Topology with Archipelago2014-00
Manouba, TNDDoS flooding attack detection scheme based on F-divergenceRahmani, H., Sahli, N., et al.Denial of Service Attacks2012-04
Tianjin, CNThe Power of Prefix Hijackings in the Internet HierarchyYang, Y., Shi, X., et al.Topology with BGP2016
Hong Kong, CNPolicy-compliant path diversity and bisection bandwidthKloti, R., Kotronis, V., et al.Topology with BGP2015
Hong Kong, CNModelling the complex Internet topologyChen, G., Fan, Z., et al.Topology with Skitter2006-01
San Francisco, CA, USA machine learning approach to edge type inference in Intern ...Varghese, J.S., Ruan, L.Topology with Archipelago, Topology with BGP2016
Nashville, TN, USOn scalability of proximity-aware peer-to-peer streamingDai, L, Cao, Y., et al.Topology with Archipelago, Topology with BGP2009-01
Brno, CZOptimization of network flow monitoringZadnik, M.Anonymized Internet Traces2013-05
Zurich, CHCommunication based on per-packet One-Time AddressesLee, T., Pappas, C., et al.Anonymized Internet Traces2016-11
Paris, FREnhancing the computation of distributed shortest paths on r ...D'Angelo, G., D'Emidio, M., et al.Topology with Archipelago2012-11
Nathan, AUPerformance of Flow-based Anomaly Detection in Sampled Traff ...Jadidi, Z., Muthukkumarasamy, V., et al.Denial of Service Attacks, Anonymized Internet Traces2015-09
Istanbul, TRStatistical measures: Promising features for time series bas ...Fouladi, R., Kayatas, C., et al.Denial of Service Attacks, Anonymized Internet Traces2018-01
Madrid, ESMultimedia flow classification at 10 Gbps using acceleration ...Leira, R., Gomez, P., et al.Anonymized Internet Traces2013-06
Changsha, CNA study of hinge-transmit property of BGP routing systemYujing, L., Bofeng, Z., et al.Topology with BGP2010-01
Hannover, DEMeasurement-based flow characterization in centrally control ...Bozakov, Z., Rizk, A., et al.Anonymized Internet Traces2016-04
Changsha, CNHow resilient are individual ASes against AS-level link fail ...Deng, W., Zhu, P., et al.Topology with BGP2011-04
Stonybrook, NY, USBounded-reorder packet scheduling in optical cut-through swi ...Zhang, Z., Guo, Z., et al.Anonymized Internet Traces2015-11
Petropolis, RJ, BRDistributed location of the critical nodes to network robust ...Wehmuth, K., Ziviani, A.Topology with Skitter2011-10
Madison, WI, USLayer 1-informed Internet topology measurementDurairajan, R., Sommers, J., et al.Topology with Archipelago2014-11
London, UKCache 'less for more' in information-centric networksChai, W.K., He, D., et al.Topology with BGP2012-05
Corvallis, OR, USSpatialization of Web sites using a weighted frequency model ...Reitsma, R., Thabane, L., et al.Topology with Skitter2004-01
Daegu, KRAdaptive load shedding via fuzzy control in data stream mana ...Basaran, C., Kang, K.-D., et al.Anonymized Internet Traces2012-12
Beijing, CNFine-grained power scaling algorithms for energy efficient r ...Song, T., Shi, X., et al.Anonymized Internet Traces2014-10
Osaka, JPA method to reduce inter-ISP transit cost caused by overlay ...Matsuda, K., Hasegawa, G., et al.Topology with BGP2013-02
Omaha, NE, USExamining change in Internet topology in terms of external e ...Bell, C.Topology with Skitter2011-08
Reno, NV, USAnalysis of path stability within autonomous systemsCanbaz, A., Bakhshaliyev, K., et al.Topology with BGP2017-09
Beijing, CNOptimal defense resource allocation in scale-free networksZhang, X., Xu, G., et al.Topology with Archipelago2017-00
Pittsburgh, PA, USAn empirical analysis of target-resident DoS filtersCollins, M., Reiter, M.Topology with Skitter2004-00
Xiamen, CNSimulation and analysis of DDoS in Active Defense Environmen ...Li, Z., Xiang, Y., et al.Topology with Skitter2006-00
Beijing, CNA distinction method of flooding DDoS and flash crowds based ...Sun, D., Yang, K., et al.Denial of Service Attacks2017-08
Konstanz, DEVisualizing geo-related data using cartogramsPanse, C.Topology with Skitter2005-02
Santa Cruz, CA, USCharacterizing per-application network traffic using entropyPetkov, V., Rajagopal, R., et al.Anonymized Internet Traces2013-05
Hong Kong, CNA new sketch method for measuring host connection degree dis ...Wang, P., Guan, X., et al.UCSD Network Telescope2014-04
Berlin, DEComputing Customer Cones of Peering NetworksVarghese, J.S., Ruan, L.Topology with BGP2016
Hamilton, NZEfficient internet topology discovery techniquesKing, A.Topology with Archipelago2010-02
Cambridge, MA, USIdentifying known and unknown peer-to-peer trafficConstantinou, F., Mavrommatis, P.Anonymized Internet Traces2006-07
Parma, ITA statistical blind technique for recognition of internet tr ...Pecori, R, Veltri, L.Anonymized Internet Traces2014-08
Pittsburgh, PA, USHADI: Fast diameter estimation and mining in massive graphs ...Kang, U., Tsourakakis, C., et al.Topology with BGP2008-12
Nathan, AUA probabilistic sampling method for efficient flow-based ana ...Jadidi, Z., Muthukkumarasamy, V., et al.Denial of Service Attacks, Anonymized Internet Traces2016-11
Shenyang, CNAnalysis of interlayer connection catastrophe characteristic ...Yang, B., Zhao, H., et al.Topology with Archipelago2013-02
Changsha, CNShedding light on the use of AS relationships for path infer ...Deng, W., Muhlbauer, W., et al.Topology with BGP2012-06
Austin, TX, USScalable verification of networks with packet transformers u ...Yang, H., Lam, S.S.Topology with BGP2015-08
West Lafayette, IN, USSeeded PageRank solution pathsKloster, K., Gleich, D.F.Topology with Skitter2015-12
Hong Kong, CNIS-Label: an independent-set based labeling scheme for point ...Fu, A.W., Wu, H., et al.Topology with Skitter2013-04
Taoyuan City, TWA software defined sketch system for traffic monitoringWellem, T., Lai, Y.-K., et al.Anonymized Internet Traces2015-05
Brisbane, AUDetecting Distributed Denial-of-Service attacks and flash ev ...Bhatia, S.Denial of Service Attacks2013-08
Paris, FRIXP's: mapped?Augustin, B., Krishnamurthy, B., et al.Topology with Skitter2009-11
Stockholm, SEContent-peering dynamics of autonomous caches in a content-c ...Pacifici, V., Dan, G.Topology with BGP2013-04
Waterloo, ON, CAOn the feasibility of core-rooted path addressingGuo, C., Karsten, M.Topology with BGP2016-04
Fort Collins, CO, USSimulating internet scale topologies with metaroutingDiBenedetto, S., Stone, A., et al.Topology with BGP2010-03
Xian, CNUnikernels Everywhere: The Case for Elastic CDNsKuenzer, S., Ivanov, A., et al.Topology with BGP2017
Atlanta, GA, USIP traceback-based intelligent packet filtering: a novel tec ...Sung, M., Xu, J.Topology with Skitter2003-09
Athens, GRVirtual Network Services for the Monitoring and Security of ...Giotis, K.Topology with BGP, Denial of Service Attacks2016
Madrid, ESDriving in the cloud: An analysis of drive-by download opera ...Nappa, A., Rafique, M.Z., et al.Topology with BGP2013-07
Austin, TX, USPower and performance analysis of network traffic prediction ...Iqbal, M.F., John, L.K.Anonymized Internet Traces2012-04
Pittsburgh, PA, USECO-DNS: Expected consistency optimization for DNSChen, C., Matsumoto, S., et al.Topology with BGP2015-06
Madrid, ESTrade-offs in optimizing the cache deployments of CDNsHasan, S., Gorinsky, S., et al.Topology with BGP2014-04
Boston, MA, USHow secure are secure interdomain routing protocols?Goldberg, S., Schapira, M., et al.Topology with BGP2014-06
Stony Brook, NY, USHigh speed multicast scheduling in hybrid optical packet swi ...Guo, Z., Yang, Y.Anonymized Internet Traces2012-06
Paris, FRTopology discovery using an address prefix based stopping ru ...Donnet, B., Friedman, T.Topology with Skitter2006-06
PA, USRouting Bottlenecks in the Internet: Causes, Exploits, and C ...Kang, M.S., Gligor, V.D.Topology with Archipelago, Topology with BGP2014
East Lansing, MI, USNoise can help: Accurate and efficient per-flow latency meas ...Shahzad, M., Liu, A.X.Anonymized Internet Traces2014-06
Tezpur, INSelf-similarity based DDoS attack detection using Hurst para ...Deka, R., Bhattacharya, D.Denial of Service Attacks2016-11
Madrid, ESAn economic side-effect for prefix deaggregationLutu, A., Bagnulo, M., et al.Topology with BGP2012-03
Valparaiso, CLComparison in power consumption of static and dynamic WDM ne ...Leiva, A., Finochietto, J.M., et al.Anonymized Internet Traces2011-07
Montreal, CAGaussian Process Regression Based Traffic Modeling and Predi ...Bayati, A., Asghari, V., et al.Anonymized Internet Traces2016-12
Charlotte, NC, USCross-layer TCP flow aware model for energy efficient use of ...Haider, A., Acharya, K., et al.Anonymized Internet Traces2010-12
Singapore, SGFACT: A framework for authentication in cloud-based IP trace ...Cheng, L., Divakaran, D., et al.Denial of Service Attacks2017_03
Ames, IA, USCardinality change-based early detection of large-scale cybe ...Chen, W., Liu, Y., et al.UCSD Network Telescope, Denial of Service Attacks2013-04
Zurich, CHAnatomy of a large European IXPAger, B., Chatzis, N., et al.Topology with BGP2012-08
Munich, DEAn application-aware load balancing strategy for network pro ...Ohlendorf, R., Meitinger, M., et al.Anonymized Internet Traces2010-01
Shenyang, CNResearch on the distribution of network nodes based on multi ...Li, C., Zhao, H., et al.Topology with Archipelago2008-00
Shenyang, CNAn improved BA model for router-level internet macroscopic t ...Xu, Y., Zhao, H.Topology with Skitter2009-05
Barcelona, ESDesign and evaluation of learning algorithms for dynamic res ...Mijumbi, R., Gorricho, J.-L., et al.Anonymized Internet Traces2014-05
Florham Park, NJ, USDemo abstract: towards extracting semantics by visualizing l ...Gansner, E.R., Krishnamurthy, B., et al.Topology with Archipelago2014-01
Aalto, FIModels for the simulation of a name-based interdomain routin ...Keating, A.Topology with BGP2012-06
Victoria, CAEvaluating the effectiveness of Sybil attacks against peer-t ...Verigin, A.L.Topology with Archipelago2013-12
Bydgoszcz, PLExpansion of matching pursuit methodology for anomaly detect ...Saganowski, L., Andrysiak, T., et al.UCSD Network Telescope2011-00
Nanjing, CNMultipath inter-domain routing for named data networkingHu, X.Y., Gong, J.Topology with BGP2015
Aizu, JPAn intelligent DDoS attack detection system using packet ana ...Kato, K., Klyuev, V.Denial of Service Attacks2014-09
Cairo, EGAnalyzing Internet connectivity data using modified k-shell ...Amr, S., El-Beltagy, M., et al.Topology with Skitter2008-01
Gothenburg, SECharacterization and classification of internet backbone tra ...John, W.Anonymized Internet Traces2010-02
San Diego, CA, USCoDef: Collaborative defense against large-scale link-floodi ...Lee, S.B., Kang, M.S., et al.Topology with BGP2013-12
Sydney, AUUsing type-of-relationship (ToR) graphs to select disjoint p ...Qazi, S., Moors, T.Topology with BGP2007-11
Amherst, MA, USThe waterfall of liberty: Decoy routing circumvention that r ...Nasr, M., Zolfaghari, H., et al.Topology with BGP2017-10
St. Petersburg, RUGeneration of source data for experiments with network attac ...Kotenko, I., Chechulin, A., et al.Denial of Service Attacks2017-00
Zaragoza, ESWhat to do With the Wi-Fi Wild WestSaldana, J.Anonymized Internet Traces2016-12
Glasgow, UKDistributed, Multi-Level Network Anomaly Detection for Datac ...Iordache, M., Jouet, S., et al.Anonymized Internet Traces2017-00
Los Alamos, NM, USCriticality analysis of Internet infrastructureYan, G., Eidenbenz, S., et al.Topology with Skitter2010-05
Berlin, DEInferring business relationships in the internet backboneHuth, M., Fabian, B.Topology with BGP2017-01
Ithaca, NY, USHFTraC: High-frequency traffic controlWu, N., Bi, Y., et al.Anonymized Internet Traces2017-06
Beijing, CNFast Content Store Lookup Using Locality-Aware Skip List in ...Pan, T., Huang, T., et al.Anonymized Internet Traces2016-04
San Diego, CA, USMeasuring the practical impact of DNSSEC deploymenLian, W., Rescorla, E., et al.Topology with BGP2013-08
Beijing, CNStudy on classification and characteristics of source addres ...Bi, J., Hu, P., et al.UCSD Network Telescope2010-04
Hong Kong, CNLightBox: SGX-assisted Secure Network Functions at Near-nati ...Duan, H., Yuan, X., et al.Anonymized Internet Traces2017-06
Beijing, CNA behavior-based method for distinction of flooding DDoS and ...Sun, D., Yang, K., et al.Denial of Service Attacks2017-06
Madrid, ESSTONE: A stream-based DDoS defense frameworkCallau-Zori, M., Jimenez-Peris, R., et al.Denial of Service Attacks2013-03
Caparica, PTScalable multi-region routing at inter-domain levelAmaral, P., Ganhao, F., et al.Topology with BGP2010-03
Redmond, WA, USUsing trustworthy host-based information in the networkParno, B., Zhou, Z., et al.Topology with Skitter2012-10
Bucharest, HUMulti-path inter-domain routing: The impact on BGP's scalabi ...Szekeres, A.Topology with BGP2011-08
Riverside, CA, USInferential time-decaying Bloom filtersDautrich Jr, J.L., Ravishankar, C.V.Anonymized Internet Traces2013-03
Amsterdam, NLImpact of topology on BGP convergenceHanif, S.Topology with BGP2010-08
Budapest, HUCompressing IP forwarding tables: towards entropy bounds and ...Retvari, G., Tapolcai, J., et al.Anonymized Internet Traces2013-10
Ann Arbor, MI, USInternet routing resilience to failures: analysis and implic ...Wu, J., Zhang, Y., et al.Topology with BGP2007-00
Cookeville, TN, USIdentifying threats using graph-based anomaly detectionEberle, W., Holder, L., et al.Topology with BGP2009-04
Bari, ITSpectral models for bitrate measurement from packet sampled ...Grieco, L.A., Barakat, C., et al.Anonymized Internet Traces2011-06
Vienna, ATEntropy-based characterization of Internet background radiat ...Iglesias, F., Zseby, T.UCSD Network Telescope2014-12
Daejeon, KRA classification method of darknet traffic for advanced secu ...Ko, S., Kim, K., et al.UCSD Network Telescope2014-01
Padua, ITAn Energy Efficient Ethernet Strategy Based on Traffic Predi ...Cenedese, A., Tramarin, F., et al.UCSD Network Telescope, Anonymized Internet Traces2017-01
Brescia, ITSupport Vector Machines for TCP traffic classificationEste, A., Gringoli, F., et al.Anonymized Internet Traces2009-09
Tokyo, JPAURORA: Autonomous System relationships-aware overlay routin ...Asai, H., Esaki, H.Topology with BGP2009-08
San Diego, CA, USSwing: Realistic and responsive network traffic generationVishwanath, K.V., Vahdat, A.Anonymized Internet Traces2009-06
Lexington, KY, USA Concise Forwarding Information Base for Scalable and Fast ...Yu, Y., Belazzougui, D., et al.Anonymized Internet Traces2016-08
Caparica, PTDTIA: An Architecture for Inter-Domain RoutingAmaral, P., Bernardo, L., et al.Topology with BGP2009-08
Mugla, TRRecreating a large-scale BGP incident in a realistic environ ...Karaarslan, E., Perez, A.G., et al.Topology with BGP2013-10
CO, USIncremental Deployment Strategies for Effective Detection an ...Gersch, J., Massey, D., et al.Topology with Archipelago, Topology with BGP2014-06-07
Ankara, TRDiagnosis of Chronic Kidney Disease Based on Support Vector ...Polat, H., Mehr, H., et al.UCSD Network Telescope2017-02
Colchester, UKOptimising rule order for a packet filtering firewallMothersole, I., Reed, M.J.Anonymized Internet Traces2011-05
Atlanta, GA, USWhy is the internet traffic bursty in short (sub-RTT) timesc ...Jiang, H., Dovrolis, C.Anonymized Internet Traces2005-06
L'Aquila, ITEngineering a new algorithm for distributed shortest paths o ...Cicerone, S., D'Angelo, G., et al.Topology with Archipelago2012-03
Valencia, ESA histogram-based stochastic process for finite buffer occup ...Hernandez-Orallo, E., Vila-Carbo, J.Anonymized Internet Traces2007-00
Pisa, ITk-dense communities in the internet AS-level topologyGregori, E., Lenzini, L, et al.Topology with Archipelago2011-01
Budapest, HUAnalysis of elephant users in broadband network trafficMegyesi, P., Molnar, S.Anonymized Internet Traces2013-08
Nanjing, CNConstraint conditions to eliminate AS incentive of lying in ...Jiang, J., Luo, J., et al.Topology with BGP2013-05
Samara, RUAnalysis and simulation of WAN traffic by self-similar traff ...Privalov, A.Y., Tsarev, A.Anonymized Internet Traces2014-08
Carthage, TNBack to Results Random Linear Network Coding Schemes for Red ...Taghouti, M., Lucani, D., et al.Anonymized Internet Traces2017-05
Charlottesville, VA, USA measurement-based study of big-data movementAddanki, R., Maji, S., et al.Anonymized Internet Traces2015-06
Indianapolis, IN, USFast autonomous system tracebackDurresi, A., Paruchuri, V., et al.Topology with Skitter2009-03
Athens, GRA Network Telescope for Early Warning Intrusion DetectionChatziadam, P., Askoxylakis, I.G., et al.UCSD Network Telescope2014-01
Zurich, CHCollective navigation of complex networks: Participatory gre ...Kleineberg, K. ,Helbing, D.Topology with Archipelago2017-04
Monterey, CA, USPassive TCP reconstruction and forensic analysis with tcpflo ...Garfinkel, S.L., Shick, M.Anonymized Internet Traces2013-09
Burlington, MA, USIncentive-informed inter-domain multicastRajahalme, J.Topology with BGP2010-05
Beijing, CNA value based framework for provider selection of regional I ...Li, M., Wang, H., et al.Topology with Skitter, Topology with BGP2014-05
Hong Kong, CNSAND: A fault-tolerant streaming architecture for network tr ...Liu, Q., Lui, J.C.S., et al.Anonymized Internet Traces2015-08
Tezpur, INDDoS attack detection using unique source IP deviationBaishya, R., Hoque, N., et al.Denial of Service Attacks2017-11
Ningbo, CNCTFPi: A new method for packet filtering of firewallNi, C., Jin, G.Topology with Skitter2013-01
Orlando, FL, USAnalysis of large scale traceroute datasets in Internet rout ...Ahmad, M.Z., Guha, R.Topology with Archipelago2012-12
Hangzhou, CNOptimal control of DDoS defense with multi-resource max-min ...Wei, W., Dong, Y., et al.Topology with Skitter2008-09
Hong Kong, CNMarginal deterrence in the enforcement of law: Evidence from ...Hui, K.-L., Kim, S.H., et al.Topology with BGP, UCSD Network Telescope2013-09
Gainesville, FL, USExploring Netflow data using HadoopZhou, X., Petrovic, M., et al.Anonymized Internet Traces2014-05
Atlanta, GA, USLarge-scale IP traceback in high-speed internet: practical t ...Sung, M., Xu, J., et al.Topology with Skitter2008-12
Le Havre, FREfficient resources management in a ditributed computer syst ...Meslmawy, M.A.S.Topology with BGP2015-10
Hakodate, JPDistributed denial of service (DDoS) attack detection system ...Takahashi, R.Denial of Service Attacks2014-01
San Antonio, TX, USA characterization of cybersecurity posture from Network Tel ...Zhan, Z., Xu, M., et al.UCSD Network Telescope2014-12
Beijing, CNEvaluating potential routing diversity for internet failure ...Hu, C., Chen, K., et al.Topology with BGP2010-05
Singapore, SGOpportunistic Piggyback Marking for IP TracebackCheng, L., Divakaran, D.M., et al.Denial of Service Attacks2015-12
Paris, FRFitting a code-red virus spread model: An account of putting ...Kolesnichenko, A., Haverkort, B., et al.UCSD Network Telescope2016-03
Tokyo, JPA methodology for magnitude-based inter-AS distance estimati ...Asai, H., Esaki, H.Topology with BGP2009-06
Baltimore, MD, USBigfoot: A geo-based visualization methodology for detecting ...Syamkumar, M., Durairajan, R., et al.Topology with BGP2016
Liege, BEA first look at the prevalence and persistence of middleboxe ...Edeline, K., Donnet, B.Topology with Archipelago2017-09
Philadelphia, PA, USPeer-assisted content distribution in Akamai NetSessionZhao, M., Aditya, P., et al.Topology with BGP2013-10
Marina Del Rey, CA, USDo you see me now? Sparsity in passive observations of addre ...Mirkovic, J., Bartlett, G., et al.Anonymized Internet Traces2017-06
Stockholm, SEStable content-peering of autonomous systems in a content-ce ...Pacifici, V., Dan, G.Topology with BGP2013-06
North Brunswick, NJ, USEIR: Edge-aware inter-domain routing protocol for the future ...Mukherjee, S., Sriram, S., et al.Topology with Archipelago2017
Los Angeles, CA, USSCREAM: Sketch Resource Allocation for Software-defined Meas ...Moshref, M., Yu, M., et al.Anonymized Internet Traces2015-12
Minneapolis, MN, USAdversarial Degradation of the Availability of Routing Infra ...Schuchard, M.J.Topology with BGP2016
Ljubljana, SIPolicy relationship annotations of predefined AS-level topol ...Vilhar, A., Novak, R.Topology with BGP2008-10
Madrid, ESAn economic perspective on traffic attraction by Internet tr ...Bangera, P., Gorinsky, S.Topology with BGP2013-10
Ithaca, NY, USLarge-scale community structure in social and information ne ...Leskovec, J., Lang, K.J., et al.Topology with BGP2015
Changsha, CNLDC: Detecting BGP prefix hijacking by load distribution cha ...Liu, Y., Su, J., et al.Topology with BGP2012-05
Dresden, DEIncApprox: A Data Analytics System for Incremental Approxima ...Krishnan, D., Quoc, D., et al.Anonymized Internet Traces2016-04
Nanjing, CNComparative research on internet flows characteristicsZhang, X., Ding, W.Anonymized Internet Traces2012-10
Atlanta, GA, USImportance-scanning worm using vulnerable-host distributionChen, Z., Ji, C.UCSD Network Telescope2005-11
Coimbatore, INA real time detection of Distributed Denial of Service attac ...Anitha, R., Karthik, R., et al.Denial of Service Attacks2012-05
Tezpur, INReal-time DDoS attack detection using FPGAHoque, N., Kashyap, H., et al.Denial of Service Attacks2017-09
Monterey, CA, USPrimitives for active internet topology mapping: toward high ...Beverly, R., Berger, A., et al.Topology with Archipelago2010-11
Ankara, TRMapping time-varying IP traffic to flexible optical paths in ...Tunc, C., Akar, N.Anonymized Internet Traces2014-08
Rome, ITCONET: a content centric inter-networking architectureDetti, A., Melazzi, N.B., et al.Anonymized Internet Traces2011-08
Austin, TX, USWorkload-aware network processors: improving performance whi ...Iqbal, M.F.Anonymized Internet Traces2013-08
Hong Kong, CNWhere the sidewalk ends: Extending the Internet AS graph usi ...Chen, K., Fhoffnes, D.R., et al.Topology with BGP2014-04
Austin, TX, USGet off my prefix! the need for dynamic, gerontocratic polic ...Wong, E.L., Shmatikov, V.Topology with BGP2011-06
Zhengzhou, CNNet-flow fingerprint model based on optimization theoryLei, C., Zhang, H., et al.Anonymized Internet Traces2016-03
Athens, GRCloud computing for global name-resolution in information-ce ...Vasilakos, X., Katsaros, K., et al.Topology with BGP2012-12
Aveiro, PTProfiling de trafego inter-operador baseado em analise multi ...Coelho, N.M.M.Anonymized Internet Traces2012-12
Madras, INAdaptive network intrusion detection system using a hybrid a ...Karthick, R.R., Hattiwale, V.P., et al.Denial of Service Attacks2012-01
Zurich, CHMetric clusters in evolutionary games on scale-free networksKleineberg, K.Topology with Archipelago2017
Shenyang, CNInternet complex network separation degree analysis based on ...Su, W.-J., Zhao, H., et al.Topology with Archipelago2005-09
Los Angeles, CA, USCollaborative change detection of DDoS attacks on community ...Chen, Y., Hwang, K.Anonymized Internet Traces2006-05
Athens, GROn the local approximations of node centrality in Internet r ...Pantazopoulos, P., Karaliopoulos, M., et al.Topology with Archipelago2013-05
Harbin, CNQuantifying the pitfalls of traceroute in AS connectivity in ...Zhang, Y., Oliveira, R., et al.Topology with Archipelago2010-04
Atlanta, GA, USBehavioral clusters in dynamic graphsFairbanks, J., Kannan, R., et al.Anonymized Internet Traces2015-03
Beijing, CNTCP stretch acknowledgements and timestamps: Findings and im ...Ding, H.; Rabinovich, M.Anonymized Internet Traces2015-07
Tarragona, ESOn the routability of the InternetErola, P., Gomez, S., et al.Topology with BGP2013-00
Tokyo, JPDNS-based defense against IP spoofing attacksMoriyama, E., Takahashi, T., et al.Anonymized Internet Traces2012-11
Baltimore, MD, USChange detection in temporally evolving computer networks: A ...Namayanja, J.M., Janeja, V.P.Anonymized Internet Traces2014-10
London, UKHybrid epidemics - A case study on computer worm ConfickerZhang, C., Zhou, S., et al.UCSD Network Telescope2015-05
Monterey, CA, USTemporal comparisons of Internet topologyWright, J.E.Topology with Archipelago2014-06
Nara, JPDistributed Encoding for Multiple-Inherited Locators to Acco ...Shao, X., Wang, F., et al.Topology with BGP2016
Barcelona, ESContributions to efficient resource management in virtual ne ...Mijumbi, R., Gorricho, J.-L., et al.Anonymized Internet Traces2014-06
Rennes, FRIdentifying global icebergs in distributed streamsAnceaume, E., Busnel, Y., et al.Denial of Service Attacks, Anonymized Internet Traces2015-09
Newark, DE, USCorrecting congestion-based error in network telescope's obs ...Wei, S., Mirkovic, J.UCSD Network Telescope2008-00
West Lafayette, IN, USEstimating linking preferences and behaviors of autonomous s ...Sha, Z., Panchal, J.Topology with BGP2014-10
London, UKSimulating internet traffic with Markov-modulated processesClegg, R.Anonymized Internet Traces2007-00
Pernambuco, BRAn orchestration approach for unwanted Internet traffic iden ...Feitosa, E., Souto, E., et al.Denial of Service Attacks2012-05
Seoul, KRMultiple machine learning for Software Defined Networking co ...Kim, Y., Choi, D., et al.Denial of Service Attacks, Anonymized Internet Traces2017-08
Washington DC, USA High-Performance Algorithm for Identifying Frequent Items ...Anderson, D., Bevan, P., et al.Anonymized Internet Traces2017-05
West Lafayette, IN, USEstimating TCP latency approximately with passive measuremen ...Gangam, S., Chandrashekar, J., et al.Anonymized Internet Traces2013-03
Berlin, DEProbability estimation over large-scale random networks via ...Freno, A., Keller, M., et al.Topology with Skitter2013-12
Beijing, CNModeling and understanding burst transmission for energy eff ...Meng, J., Ren, F., et al.Anonymized Internet Traces2017-07
Orlando, FL, USA tale of nine Internet exchange points: studying path laten ...Ahmad, M.Z., Guha, R.Topology with BGP2012-10
Tezpur, INDyProSD: a dynamic protocol specific defense for high-rate D ...Boro, D., Bhattacharyya, D.KDenial of Service Attacks, Anonymized Internet Traces2017-03
Blacksburg, VA, USA study of the structure and vulnerabilities of metropolitan ...Chen, J., Kumar, V.S.A., et al.Topology with Skitter, Topology with Archipelago2016-01
Madrid, ESOn the diversity of interdomain routing in AfricaFanou, R., Francois, P., et al.Topology with BGP2015-03
Champaign, IL, USMiddlePolice: Fine-grained endpoint-driven in-network traffi ...Liu, Z., Jin, H., et al.Topology with BGP2017-09
Grenoble, FRIBTrack: an ICMP black holes trackerJacquin, L., Roca, V., et al.Topology with Archipelago2012-03
Cairo, EGDistributed packet filtering based on IP tracebackKhanmohammadi, K., Fallah, M.Topology with Skitter2006-00
Warsaw, PLMulti-criteria decision algorithms for efficient content del ...Beben, A., Batalla, J.M., et al.Topology with BGP2012-08
Manipur, INDetection of DDoS DNS amplification attack using classificat ...Meitei, I., Singh, K., et al.Anonymized Internet Traces2016-08
Wurzburg, DETowards efficient simulation of large scale P2P networksHobfeld, T., Binzenhofer, A., et al.Topology with Skitter2005-10
Sydney, AUVisualising Internet traffic data with three-dimensional sph ...Yip, B., Goyette, S., et al.Topology with Skitter2005-00
Seoul, KRDistributed-SOM: A novel performance bottleneck handler for ...Phan, T., Bao, N., et al.Denial of Service Attacks, Anonymized Internet Traces2017-08
Gaithersburg, MD, USThe resilience of the Internet to colluding country induced ...Mell, P., Harang, R., et al.Topology with Archipelago2015-02
Eugene, OR, USMeasurement-Based Characterization of Large-Scale Networked ...Motamedi, R.Topology with BGP2016
Pullman, WA, USNetshuffle: Improving traffic trace anonymization through gr ...Valgenti, V.C., Paul, R.R., et al.Anonymized Internet Traces2011-06
Beijing, CNMultipath interdomain routing via deviation from primary pat ...Qin, D., Yang, J., et al.Topology with BGP2012-02
Munich, DEPartitioning the InternetWachs, M., Grothoff, C., et al.Topology with Archipelago, Topology with BGP2012-10
Pisa, ITOn the feasibility of measuring the internet through smartph ...Faggiani, A., Gregori, E., et al.Topology with Archipelago2012-05
Hong Kong, CNCybercrime deterrence and international legislation: Evidenc ...Hui, K.-L., Kim, S.H., et al.UCSD Network Telescope2016-05
College Station, TX, USDenial of Service attacks: path reconstruction for IP traceb ...Dube, R.Topology with Skitter2004-12
Naples, ITWorm traffic analysis and characterizationDainotti, A., Pescape, A., et al.UCSD Network Telescope2007-06
Nanjing, CNDisclosing the element distribution of Bloom filterPeng, Y., Gong, J., et al.UCSD Network Telescope2006-05
Montreal, QC, CAAutonomous system ranking by topological characteristics: A ...Tozal, M.E.Topology with BGP2017
Helsinki, FICanopy: publish/subscribe with upgraph combinationTarkoma, S., Antikainen, M.Topology with BGP2010-05
Hamburg, DEOn performance and robustness of Internet-based smart grid c ...Meiling, S., Schmidt, T.C., et al.Topology with BGP2015-11
Barcelona, ESNeural network-based autonomous allocation of resources in v ...Mijumbi, R., Gorricho, J.-L., et al.Anonymized Internet Traces2014-06
Stony Brook, NY, USHigh-speed multicast scheduling for all-optical packet switc ...Guo, Z., Yang, Y.Anonymized Internet Traces2013-07
Petropolis, RJ, BRDistributed assessment of the closeness centrality ranking i ...Wehmuth, K., Ziviani, A.Topology with Skitter2012-04
Milan, ITRelaxing state-access constraints in stateful programmable d ...Cascone, C., Bifulco, R., et al.Anonymized Internet Traces2017-03
Baltimore, MD, USDiscovery of persistent threat structures through temporal a ...Namayanja, J.M., Janeja, V.P.Anonymized Internet Traces2013-06
Los Angeles, CA, USMPLS under the microscope: Revealing actual transit path div ...Vanaubel, Y., Merindol, P., et al.Topology with Archipelago2015-10
Urbana-Champaign, IL, USEfficient large flow detection over arbitrary windows: an ex ...Wu, H.Anonymized Internet Traces2015-10
Haifa, ILHeavy hitters in streams and sliding windowsBen-Basat, R., Einziger, G., et al.Anonymized Internet Traces2016-04
Fort Collins, CO, USCooperative defense mechanism for detection, identification, ...Ghahfarokhi, N.Denial of Service Attacks2016-08
Kaiserslautern, DEAnalysis of the Internet's structural evolutionHaddadi, H., Fay, D., et al.Topology with Skitter2009-09
Hempstead, NY, USADL: Active dictionary learning for sparse representationTang, B., Xu, J., et al.Topology with BGP2017-05
Hong Kong, CNToward continuous push-based P2P live streamingRen, D., Wong, W., et al.Topology with Archipelago2012-12
Hamburg, DEA virtual and distributed control layer with proximity aware ...Knauf, A., Hege, G., et al.Topology with Archipelago2010-08
Nanjing, CNTwo propositions about geographical distributions of BitTorr ...Chen, M., Yu, L., et al.Topology with BGP2011-11
Wuhan, CNLocality-awareness in BitTorrent-like P2P applicationsLiu, B., Cui, Y., et al.Topology with BGP2009-04
FROn Computing the Gromov HyperbolicityCohen, N., Coudert, D., et al.Topology with BGP2015-08
Princeton, NJ, USOptimizing implicit proxy placement to evade traffic filtersCesareo, J.Topology with BGP2012-06
Guangzhou, CNMathematical analysis of active DDoS defense systemsLi, Z., Xiang, Y.Topology with Skitter2006-11
Halifax, NS, CAInvestigating unique flow marking for tracing back DDoS atta ...Aghaei-Foroushani, V., Zincir-Heywood, A.N.Denial of Service Attacks, Anonymized Internet Traces2015-05
College Park, MD, USTriangle inequality and routing policy violations in the int ...Lumezanu, C., Baden, R., et al.Topology with BGP2009-03
Espoo, FIDenial-of-service attacks in bloom-filter-based forwardingAntikainen, M., Aura, T., et al.Topology with BGP2014-10
Gif sur Yvette, FRaSHIIP: Autonomous generator of random internet-like topolog ...Tomasik, J., Weisser, M.-A.Topology with Archipelago2010-09
Kyushu, JPAdaptive anomaly detection for SDNSahri, N.M., Okamura, K.Anonymized Internet Traces2015-00
Shanghai, CNRobust network construction against intentional attacksWang, H., Cui, W., et al.Topology with BGP2015-02
New York, NY, USAuthentication Challenges in a Global EnvironmentMatsumoto, S., Reischuk, R.M., et al.Topology with BGP2017
Gif sur Yvette, FRThe inter-domain hierarchy in measured and randomly generate ...Tomasik, J., Weisser, M.-A.Topology with BGP2012-06
Boulder, CO, USCurrent trends and controversies in Internet peering and tra ...Reed, D., Warbritton, D., et al.Topology with Archipelago2014-09
Paris, FRCan MPTCP Secure Internet Communications from Man-in-the-Mid ...Nguyen, H., Phung, C., et al.Topology with Archipelago2017
Munich, DEPush away your privacy: Precise user tracking based on TLS c ...Wachs, M., Scheitle, Q., et al.Topology with BGP2017-06
Pittsburgh, PA, USSTRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapme ...Hsiao, H.-C., Kim, T.H., et al.Topology with BGP2013-05
Tehran, IRTDPF: a traceback-based distributed packet filter to mitigat ...Fallah, M.S., Kahani, N.Topology with Skitter2014-02
Lisbon, PTScaling the Internet routing system through route aggregatio ...Sousa, A.C.M.Topology with BGP2014-10
West Lafayette, IN, USCamouflaging timing channels in web trafficSellke, H., Wang, C.-C., et al.Anonymized Internet Traces2009-12
Hong Kong, CNContent peering in content centric networksWang, J.M., Dai, X., et al.Topology with BGP2014-09
Buenos Aires, ARhttp://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsuali ...Alvarez-Hamelin, J.I., Anunziata, D., et al.Topology with BGP2011-07
Austin, TX, USStochastic pre-classification for SDN data plane matchingMcHale, L., Casey, C.J., et al.Anonymized Internet Traces2014-08
Madison, WI, USBitmap algorithms for counting active flows on high speed li ...Estan, C., Varghese, G., et al.Anonymized Internet Traces2006-10
Monterey, CA, USRevisiting AS-level graph reductionRye, E.C., Rohrer, J.P., et al.Topology with Archipelago2016-04
Aveiro, PTLocalization and spreading of diseases in complex networksGoltsev, A.V., Dorogovtsev, S.N., et al.Topology with Skitter2012-09
Beijing, CNMeasurement of large-scale BGP events: Definition, detection ...Chen, M., Xu, M., et al.Topology with BGP2016
Halifax, CAOn evaluating IP traceback schemes: a practical perspectiveAghaei-Foroushani, V., Zincir-Heywood, A.N.Anonymized Internet Traces2013-05
Bucharest, ROInitial design of cloud infrastructure and federation mechan ...Agache, A., Antichi, G., et al.Topology with BGP2016-02
Stonybrook, NY, USHolding all the ASes: Identifying and circumventing the pitf ...Nithyanand, R., Singh, R., et al.Topology with Archipelago2016-05
Beijing, CNOn the applicability of software defined networking to large ...Luao, H.; Cui, J.; Chen, G.; Chen, et al.Anonymized Internet Traces2014-08
Linkoping, SEEstimating Internet-scale Quality of Service parameters for ...Niemela, M.Topology with BGP2016-03
Monterey, CA, USIPv6 geolocation using latency constraintsTran, T.V.H.Topology with Archipelago2014-03
Halifax, CAA comprehensive study on one-way backscatter traffic analysi ...Balkanli, E.UCSD Network Telescope, Denial of Service Attacks, Anonymized Internet Traces2015-04
Hamilton, NY, USOn the prevalence and characteristics of MPLS deployments in ...Sommers, J., Erikson, B., et al.Topology with Archipelago, Topology with BGP2011-11
Osaka, JPOn-line detection of persistently high packet-rate flows via ...Kudo, T., Takin, T.UCSD Network Telescope, Anonymized Internet Traces2014-01
Tokyo, JPA novel hybrid IP traceback scheme with packet countersKarasawa, T., Soshi, M., et al.Topology with Skitter2012-11
Eugene, OR, USInvestigating the mutual impact of the P2P overlay and the A ...Ekbatani, H.R.Topology with BGP2012-12
Jerusalem, ILOne hop for RPKI, one giant leap for BGP securityCohen, A., Gilad, Y., et al.Topology with BGP2015-11
Aalto, FIModels and tools for the high-level simulation of a name-bas ...Visala, K., Keating, A., et al.Topology with BGP2014-04
Zurich, CHThe Case for In-Network Replay SuppressionLee, T., Pappas, C., et al.Anonymized Internet Traces2017-04
Sendai, JPDTRAB: Combating against attacks on encrypted protocols thro ...Fadlullah, Z.M., Taleb, T., et al.UCSD Network Telescope2010-08
Boca Raton, FL, USBig data sanitization and cyber situational awareness: A Net ...Bou-Harb, E., Husak, M., et al.UCSD Network Telescope2017-07
Koganei, JPExperiences in emulating 10K AS topology with massive VM mul ...Miwa, S., Suzuki, M., et al.Topology with BGP2009-08
Vienna, ATPattern discovery in Internet background radiationIglesias, F., Zseby, T.UCSD Network Telescope2017-07
Nancy, FRTracking global wide configuration errorsFrancois, J., State, R., et al.UCSD Network Telescope2006-09
Wurzburg, DEWho profits from peer-to-peer file-sharing? Traffic optimiza ...Burger, V., Lehrieder, F., et al.Topology with BGP2012-09
Halifax, CAOn the effectiveness of different botnet detection approache ...Haddadi, F., Le Cong, D., et al.UCSD Network Telescope2015-05
Indore, INAn Experience Report on Scalable Implementation of DDoS Atta ...Dorbala, S.Y., Hubballi, N.Denial of Service Attacks2015-05
Paris, FRImproved algorithms for network topology discoveryDonnet, B., Friedman, T., et al.Topology with Skitter2005-03
Vienna, ATMiddlePolice: Toward Enforcing Destination-Defined Policies ...Liu, Z., Jin, H., et al.Topology with BGP2016
Leganes, ES'I can't get no satisfaction': Helping autonomous systems id ...Cardona, J.C., Vissicchio, S., et al.Topology with BGP2016-03
Beijing, CNRoute leaks identification by detecting routing loopsLi, S., Duan, H., et al.Topology with BGP2015-10
Phoenix, AZ, USBehavioral graph analysis of Internet applicationsXu, K., Wang, F.Anonymized Internet Traces2011-12
Uberlandia, BRPerformance comparison of forecasting models applied to LAN/ ...Matias, R., Carvalho, A.M.M., et al.Anonymized Internet Traces2011-10
Newark, NJ, USEnumerating single destination, policy-preferred paths in AS ...Tozal, M.E.Topology with BGP2016
Tezpur, INApplying data mining techniques in anomaly based network int ...Bhuyan, M.H.Denial of Service Attacks2013-09
Suwon, KRPMS an expeditious marking scheme to combat with the DDoS at ...Tariq, U., Hong, M., et al.Topology with Skitter2005-12
Richland, WA, USMassive scale cyber traffic analysis: A driver for graph dat ...Joslyn, C., Choudhury, S., et al.Denial of Service Attacks, Anonymized Internet Traces2013-06
Johannesburg, ZAA source analysis of the Conficker outbreak from a Network T ...Irwin, B.UCSD Network Telescope2013-06
Jorhat, IRLow-Rate and High-Rate Distributed DoS Attack Detection Usin ...Bhuyan, M.H., Kalwar, A., et al.Denial of Service Attacks2015-04
Haifa, ILNetwork formation games and the Internet structureMeirom, E.A., Mannor, S., et al.Topology with BGP2013-08
Shenyang, CNOn the Internet AS-level topology evolution basing on hierar ...Zhang, X., Zhao, H., et al.Topology with Skitter2008-12
Wurzburg, DEPerformance evaluation and optimization of Content Delivery ...Burger, V.Topology with BGP2017-05
Johor, MAAn Evaluation on KNN-SVM Algorithm for Detection and Predict ...Yusof, A.R., Udzir, N.I., et al.Denial of Service Attacks2016-07
Riverside, CA, USPublic real data repositories and measurement toolsFaloutsos, M.Topology with Skitter2006-04
Assam, INRank correlation for low-rate DDoS attack detection: An empi ...Ain, A., Bhuyan, M.H., et al.Denial of Service Attacks2014-11
Philadelphia, PA, USAll-pairs shortest-paths for large graphs on the GPUKatz, G.J., Kider, J.T.Topology with BGP2008-06
Cookeville, TN, USScalable anomaly detection in graphsEberle, W., Holder, L.Topology with BGP2015
Halifax, CAIP traceback through (authenticated) deterministic flow mark ...Aghaei-Foroushani, V., Zincir-Heywood, A.N.Anonymized Internet Traces2013-11
Ottawa, CAOn Improving DREAM Framework with Estimations and ProgMERemedios, R.Anonymized Internet Traces2017-00
Loughborough, UKUsing wavelets for compression and detecting events in anoma ...Kyriakopoulos, K.G., Parish, D.J.UCSD Network Telescope2009-09
Iwate, JPEvaluation of a distributed detecting method for SYN flood a ...Narita, M., Katoh, T., et al.UCSD Network Telescope2011-03
Kochi, INDDoS Attack Detection Using Fast Entropy Approach on Flow- B ...David, J., Thomas, C.Denial of Service Attacks2015-05
Jorhat, INE-LDAT: a lightweight system for DDoS flooding attack detect ...Bhuyan, M., Bhattacharyya, D., et al.Denial of Service Attacks2016-07
Madrid, ESA simple analytical model for energy efficient ethernetMarsan, M.A., Fernandez Anta, A., et al.Anonymized Internet Traces2011-07
Valbonne, FRLogNet: Extending Internet with a network aware discovery se ...Liquori, L., Sereno, M.Topology with BGP2016-09
Ramat-Gan, ILVulnerable delegation of DNS resolutionHerzberg, A., Shulman, H.Anonymized Internet Traces2013-09
Amsterdam, NLBorder Gateway modeling and simulationWojciechowski, M.Topology with BGP2008-09
Haifa, ILThe variable-increment counting Bloom filterRottenstreich, O., Kanizo, Y., et al.Anonymized Internet Traces2012-03
Tokyo, JPAnalysis of cooperative management strategies against route- ...Akashi, O.Topology with Skitter, Topology with BGP2011-05
Valencia, ESNetwork performance analysis based on histogram workload mod ...Hernandez-Orallo, E., Vila-Carbo, J.Anonymized Internet Traces2007-10
Madrid, ESA synergetic use of Bloom filters for error detection and co ...Reviriego, P., Pontarelli, S., et al.Anonymized Internet Traces2015-03
Santa Clara, CA, USSDX-Based Flexibility or Internet Correctness?: Pick Two!Birkner, R., Gupta, A., et al.Topology with BGP, Anonymized Internet Traces2017
San Diego, CA, USNew directions in traffic measurement and accounting: focusi ...Estan, C., Varghese, G.Anonymized Internet Traces2003-08
Harbin, CNIdentifying heavy hitters in high-speed network monitoringZhang, Y., Fang, B.X., et al.Anonymized Internet Traces2010-03
Hatfield, UKAn enhanced fuzzy ARM approach for intrusion detectionAbouzakhar, N.S., Chen, H., et al.UCSD Network Telescope2011-04
Jalandhar, INDDoS attack's simulation using legitimate and attack real da ...Singh, J., Kumar, K., et al.Denial of Service Attacks2012-06
Eugene, OR, USDETERMINING THE LOCATION OF AUTONOMOUS SYSTEM RELATIONS AMON ...Kriegel, P.Topology with BGP2016
Fukushima, JPLarge-scale network packet analysis for intelligent DDoS att ...Kato, K., Klyuev, V.Denial of Service Attacks2014-12
Singapore, SGEfficient extraction of high-Betweenness vertices from heter ...Chong, W.H., Toh, W.S.B., et al.Topology with BGP2013-00
Los Angeles, CA, USGA-based internet traffic classification technique for QoS p ...Park, J., Tyan, H.-R., et al.Anonymized Internet Traces2006-12
Palo Alto, CA, USRethinking packet forwarding hardwareCasado, M., Koponen, T., et al.Anonymized Internet Traces2008-11
Kapurthala, INComputer Networks Detection of DDoS attacks and flash events ...Behal, S., Kumar, K.Denial of Service Attacks2017-04
Madrid, ESInter-domain traffic management in an evolving Internet peer ...Cardona, J.C.Topology with BGP2016-06
Vienna, ATA framework for fine-grained inter-domain routing diversity ...Wang, Y., Bi, J., et al.Topology with BGP2016
Pisa, ITk-clique communities in the Internet AS-level topology graphGregori, E., Lenzini, L., et al.Topology with Archipelago2011-06
Piscalaway, NJ, USOptimal Monitor Assignment for Preferential Link Tomography ...Dong, W., Gao, Y., et al.Topology with Archipelago, Topology with BGP2017
Boston, MA, USTunneling for transparency: A large-scale analysis of end-to ...Chung, T., Choffnes, D., et al.Topology with BGP2016-11
Durham, NC, USHead into the Cloud: An Analysis of the Emerging Cloud Infra ...Chandrasekaran, B.Topology with Archipelago, Topology with BGP2016
Xiamen, CNA novel botnet detection method based on preprocessing data ...Kong, X., Chen, Y., et al.Denial of Service Attacks2016-10
Yorktown Heights, NY, USCoalitionally stable pricing schemes for inter-domain forwar ...Bhardwaj, O., Anschelevich, E., et al.Topology with Skitter2016
Boston, MA, USUsing Inspiration from Synaptic Plasticity Rules to Optimize ...Suen, J.Y., Navlakha, S.Topology with BGP2017
Athens, GRThe multiple instances of node centrality and their implicat ...Nomikos, G., Pantazopoulos, P., et al.Topology with Archipelago2013-12
Seattle, WA, USConsensus routing: the internet as a distributed systemJohn, J.P., Katz-Bassett, E., et al.Topology with BGP2008-04
Ann Arbor, MI, USMeasuring IPv6 adoptionCzyz, J., Allman, M., et al.Topology with Archipelago2014-08
Austin, TX, USCollaborative verification of forward and reverse reachabili ...Yang, H., Lam, S.S.Topology with BGP2014-10
Stanford, CA, USTiny buffers for electronic and optical routersBeheshti-Zavareh, N.Anonymized Internet Traces2009-12
Pittsburgh, PA, USPHI: Path-Hidden Lightweight Anonymity Protocol at Network L ...Chen, C., Perrig, A.Topology with BGP, Anonymized Internet Traces2016
Boston, MA, USOn supporting mobility and multihoming in recursive internet ...Ishakian, V., Akinwumi, J., et al.Anonymized Internet Traces2012-07
Beijing, CNTowards high-performance network application identification ...He, F., Xiang, F., et al.Anonymized Internet Traces2011-05
Guangzhou, CNA General Collaborative Framework for Modeling and Perceivin ...Xie, Y., Wang, Y., et al.Anonymized Internet Traces2016-01
Oslo, NOResource adaptive distributed information sharingHansen, H.V., Goebel, V., et al.Anonymized Internet Traces2010-06
Istanbul, TRComparative evaluation of community detection algorithms: a ...Orman, G.K., Labatut, V., et al.Topology with BGP2012-08
Minneapolis, MN, USRouting around decoysSchuchard, M., Geddes, J., et al.Topology with BGP2012-10
Coimbatore, INDDoS detection system using wavelet features and semi-superv ...Srihari, V., Anitha, R.Denial of Service Attacks2014-09
Haifa, ILOptimal dynamic hash tablesKanizo, Y., Hay, D., et al.Anonymized Internet Traces2009-00
Mountain View, CA, USScalable Verification of Networks With Packet Transformers U ...Yang, H., Lam, S.S.Topology with BGP2017
Las Vegas, NV, USA modular architecture for scalable inter-domain routingNozaki, Y., Golen, E., et al.Topology with BGP2017
Berkeley, CA, USAchieving flexibility and performance for packet forwarding ...Moon, D.Anonymized Internet Traces2010-05
Berkeley, CA, USTarget generation for Internet-wide IPv6 scanningMurdock, A., Li, F., et al.Topology with BGP2017-11
Havana, CUA novel rule generator for intrusion detection based on freq ...Semenets, V., Alonso, A.Denial of Service Attacks2017-00
Imphal, INDistributed denial of service attack detection using Naive B ...Singh, N., Singh, K., et al.Denial of Service Attacks2016-08
Vienna, ATTowards DisNETPerf: a distributed Internet paths performance ...Wassermann, S., Casas, P., et al.Topology with BGP2015-12
Gainesville, FL, USAn efficient spectral bound for link vulnerability assessmen ...Dinh, T.N., Shen, Y., et al.Topology with BGP2012-10
Bydgoszcz, PLDDoS attacks detection by means of greedy algorithmsAndrysiak, T., Saganowski, L., et al.UCSD Network Telescope2013-00
Waterloo, CAPerformance analysis of TCAMs in switchesTawakol, A.Anonymized Internet Traces2012-04
Barcelona, ESA neuro-fuzzy approach to self-management of virtual network ...Mijumbi, R., Gorricho, J.-L., et al.Anonymized Internet Traces2015-02
Atlanta, GA, USRealistic topology modeling for the internet BGP infrastruct ...Raghavan, V., Riley, G., et al.Topology with BGP2008-09
Zhengzhou, CNIdentifying elephant flows in internet backbone traffic with ...Zhang, Z.; Wang, B.; Lan, J.Anonymized Internet Traces2015-05
London, UKTechniques for flow inversion on sampled dataClegg, R., Landa, R., et al.Anonymized Internet Traces2008-04
Madrid, ESDevelopment and evaluation of a low-cost scalable architectu ...Martinez, V.M.Anonymized Internet Traces2012-00
Pittsburgh, PA, USThe coremelt attackStuder, A., Perrig, A.Topology with BGP2009-09
Assam, INA novel measure for low-rate and high-rate DDoS attack detec ...Hoque, N., Bhattacharyya, D.K., et al.Denial of Service Attacks2016-01
Seattle, WA, USTransport layer renegingEkiz, N., Amer, P.D.Anonymized Internet Traces2014-10
Pittsburgh, PA, USThe impact of the Internet on global industry: New evidence ...Huang, T.T., Sun, B.Q.Topology with Skitter2015-09
Serdang, MYDistributed Denial of Service detection using hybrid machine ...Barati, M.; Abdullah, A.; Udzir, N.I.; Mahmod, et al.Denial of Service Attacks, Anonymized Internet Traces2014-08
Changsha, CNFailure isolation based defense against Internet CXPST-like ...Liu, H., Hu, X., et al.Topology with BGP2012-04
Tokyo, JPLow-power network-packet-processing architecture using proce ...Okuno, M., Ishida, S., et al.Anonymized Internet Traces2005-04
San Antonio, TX, USPredicting cyber attack rates with extreme valuesZhan, Z., Xu, M., et al.UCSD Network Telescope2015-08
AZ, USMaking inter-domain routing power-aware?Shi, J., Zhang, B.Topology with BGP2014-02
London, UKLooking for hypergiants in PeeringDBBottger, T., Cuadrado, F., et al.Topology with BGP2017-01
Ikoma, JPOutfitting an inter-AS topology to a network emulation testb ...Hazeyama, H., Suzuki, M., et al.Topology with BGP2008-07
Changsha, CNk-Fault tolerance of the Internet AS graphDeng, W., Karaliopoulos, M., et al.Topology with BGP2011-04
Boston, MA, USOn supporting mobility and multihoming in recursive internet ...Ishakian, V., Akinwumi, J., et al.Anonymized Internet Traces2010-10
Beijing, CNQuantifying the flattening of Internet topologyWang, Y., Zhang, K.Topology with Skitter, Topology with Archipelago, Topology with BGP2016-06
Coimbatore, INBotnet detection via mining of traffic flow characteristicsKirubavathi, G., Anitha, R.UCSD Network Telescope2016-02
Stony Brook, NY, USA Churn for the Better: Localizing Censorship using Network- ...Cho, S., Nithyanand, R., et al.Topology with Archipelago, Topology with BGP2017
Madison, WI, USLearning network structure from passive measurementsEriksson, B., Barford, P., et al.Topology with Skitter2007-10
Paris, FRComplex network measurements: estimating the relevance of ob ...Latapy, M., Magnien, C.Topology with Skitter2008-04
Paris, FRA CIDR stopping rule for topology discoveryDonnet, B., Friedman, T.Topology with Skitter2005-05
Caparica, PTMultipath policy routing for the inter-domain scenarioAmaral, P., Bernardo, L., et al.Topology with BGP2014-06
Boston, MA, USGeometric exploration of the landmark selection problemTang, L., Crovella, M.Topology with Skitter2004-05
Aarhus, DKSelf-organizing weights for Internet AS-graphs and surprisin ...Scholz, J., Greiner, M.Topology with Skitter, Topology with BGP2011-04
Leicester, UKConnectivity measures for internet topologiesErlebach, T., Moonen, L.S., et al.Topology with Skitter2005-12
Tel-Aviv, ILImproving AS relationship inference using PoPsNeudorfer, L., Shavitt, Y., et al.Topology with BGP2013-04
Baltimore, MD, USWorm evolution tracking via timing analysisRajab, M., Monrose, F., et al.UCSD Network Telescope2005-11
Beijing, CNCIDS: Adapting Legacy Intrusion Detection Systems to the Clo ...Xia, Q., Chen, T., et al.Anonymized Internet Traces2016-12
Limerick, IEThe unreasonable effectiveness of tree-based theory for netw ...Melnik, S., Hackett, A., et al.Topology with Skitter, Topology with BGP2011-03
Fort Wayne, IN, USCharacterising heterogeneity in vulnerable hosts on worm pro ...Chen, Z., Chen, C.UCSD Network Telescope2016-01
Lexington, KY, USLow-complexity multi-resource packet scheduling for network ...Li, X., Qian, C.Anonymized Internet Traces2015-08
Amsterdam, NLBGP Routing Security and Deployment StrategiesEikema, B.Topology with BGP2015
Ames, IA, USA machine learning approach to edge type prediction in Inter ...Varghese, J.S., Ruan, L.Topology with BGP2015-07
Liege, BETowards a middlebox policy taxonomy: Path impairmentsEdeline, K., Donnet, B.Topology with Archipelago2015-04
Ishikawa, JPDesign and implementation of XBurnerMiyachi, T., Miwa, S.Topology with BGP2013-03
Minneapolis, MI, USToward building practical privacy enhancing technologiesLin, Z.Anonymized Internet Traces2012-07
Hangzhou, CNPartially ordered sets in complex networksXuan, Q., Du, F., et al.Topology with BGP2010-04
Madrid, ESBatch to the future: analyzing timestamp accuracy of high-pe ...Moreno, V., Santiago del Rio, P.M., et al.Anonymized Internet Traces2012-10
Monterey, CA, USIngress point spreading: A new primitive for adaptive active ...Baltra, G., Beverly, R., et al.Topology with Archipelago2014-03
Vancouver, CARealNet: A topology generator based on real Internet topolog ...Cheng, L., Hutchinson, N., et al.Topology with Skitter2008-03
Rome, ITInvestigating the trade-off between overhead and delay for f ...Iacovazzi, A., Baiocchi, A.Anonymized Internet Traces2013-06
Bandung, INTraffic anomaly detection in DDos flooding attackPurwanto, Y., Kuspriyanto, Hendrawan, et al.Denial of Service Attacks2014-10
Buenos Aires, AREstudio del Trafico Autosimilar Orientado a la Simulacion Me ...Scappini, R.Anonymized Internet Traces2010-08
Toronto, CAMulti-layer increasing coherence clustering of Autonomous Sy ...Andreopoulos, B., Aijun, A., et al.Topology with Skitter2005-04
Chung-Li, TWSketch-guided filtering support for detecting superspreaders ...Wellem, T., Lai, Y.-K.Anonymized Internet Traces2016-08
Lexington, KY, USDistributed and collaborative traffic monitoring in software ...Yu, Y., Qian, C., et al.Anonymized Internet Traces2014-08
Berkeley, CA, USContinuous time group discovery in dynamic graphsMiller, K., Eliassi-Rad, T.Topology with BGP2009-12
Rome, ITEfficient flow sampling with back-annotated cuckoo hashingPontarelli, S., Reviriego, P., et al.Anonymized Internet Traces2014-10
Vigo, ESOptimal configuration of energy-efficient ethernetHerreria-Alonso, S., Rodriguez-Perez, M., et al.Anonymized Internet Traces2012-03
Gyeongsan, KRA long range dependent Internet traffic model using unbounde ...Kim, S., Nam, S.Y.Anonymized Internet Traces2013-01
Maynooth, Dublin, IETowards a Renewed Alias Resolution with Space Search Reducti ...Grailet, J.F., Donnet, B.Topology with BGP2017
Tempe, AZ, USOn the Safety and Efficiency of Virtual Firewall Elasticity ...Deng, J., Li, H., et al.Anonymized Internet Traces2017-06
Victoria, BC, CASemantic graph compression with hypergraphsBorici, A., Thomo, A.Topology with BGP2014-05
Stonybrook, NY, USInvestigating interdomain routing policies in the wildAnwar, R., Niaz, H., et al.Topology with BGP2015-10
Ruston, LA, USUsing network motifs to investigate the influence of network ...Kiremire, A.R., Brust, M.R., et al.Topology with Archipelago2014-10
Amsterdam, NLRadian: Visual exploration of traceroutesCandela, M., Bartolomeo, M., et al.Topology with Archipelago2017-06
Istanbul, TRResource Mapping Optimization for Distributed Cloud ServicesAral, A.Anonymized Internet Traces2016-11
Beijing, CNTracking millions of flows in high speed networks for applic ...Pan, T., Guo, X., et al.Anonymized Internet Traces2012-03
Los Angeles, CA, USResource/accuracy tradeoffs in software-defined measurementMoshref, M., Yu, M., et al.Anonymized Internet Traces2013-08
Madrid, ESApplication of Internet traffic characterization to all-opti ...Santiago del Rio, P.M., Ramos, J., et al.Anonymized Internet Traces2010-08
Beijing, CNPassive IP traceback: capturing the origin of anonymous traf ...Yao, G., Bi, J., et al.UCSD Network Telescope2010-10
Haifa, ILReducing the reordering delay in multi-core network processo ...Shpiner, A., Keslassy, I., et al.Anonymized Internet Traces2012-01
Halifax, CAA security framework based on flow marking IP-traceback tech ...Foroushani, V.A.Topology with Skitter, Denial of Service Attacks, Anonymized Internet Traces2016-07
Cape Town, ZAChange-point cloud DDoS detection using packet inter-arrival ...Osanaiye, O., Choo, K., et al.Denial of Service Attacks2016-09
Mountain View, CA, USDistributed divide-and-conquer techniques for effective DDoS ...Muthuprasanna, M., Manimaran, G. Topology with Skitter2008-06
Barcelona, ESInformation theoretic measures for the detection of anomalie ...Gonzalez, C.UCSD Network Telescope2014-06
Nanjing, CNOpenISMA: An Approach of Achieving a Scalable OpenFlow Netwo ...Wang, M., Zhou, H., et al.Topology with BGP2015
Davis, CA, USStreaming solutions for fine-grained network traffic measure ...Khan, F., Hosein, N., et al.UCSD Network Telescope2014-04
Durham, NCMapping the whole InternetMaggs, B.Topology with Archipelago, Topology with BGP2014-08
Shanghai, CNBenchmarking modern distributed streaming platformsQian, S., Wu, G., et al.Anonymized Internet Traces2016-03
Urbana, IL, USStatistical inference on network dataZhang, J.Topology with Skitter2014-05
Tokyo, JPPhishCage: reproduction of fraudulent websites in the emulat ...Miyamoto, D., Miyachi, T., et al.Topology with BGP2013-03
Braga, PTA modular traffic sampling architecture for flexible network ...Silva, J.M.C.Anonymized Internet Traces2016-01
Cambridge, MA, USAdaptive cuckoo filtersMitzenmacher, M., Pontarelli, S., et al.Anonymized Internet Traces2017-04
Boston, MA, USSmall-world characteristics of the Internet and multicast sc ...Jin, S., Bestavros, A.Topology with Skitter2004-05
Berlin, DETowards a rigorous methodology for measuring adoption of RPK ...Reuter, A., Bush, R., et al.Topology with BGP2017-06
Talence, FRBrief announcement: Routing the Internet with very few entri ...Gavoille, C., Glacet, C., et al.Topology with BGP2015-07
London, UKOptimizing hybrid spreading in metapopulationsZhang, C., Zhou, S., et al.UCSD Network Telescope2015-04
Cambridge, MA, USMeasuring the effects of internet path faults on reactive ro ...Feamster, N., Anderson, D., et al.Topology with Skitter2003-06
York, UKMarkov-modulated on/off processes for long-range dependent i ...Clegg, R.Anonymized Internet Traces2006-10
Beijing, CNAntiworm NPU-based parallel Bloom filters for TCP/IP content ...Chen, Z., Lin, C., et al.UCSD Network Telescope2005-11
Shenyang, CNCorrectness of sampling bias on Internet router-level topolo ...Li, C., Zhao, H., et al.Topology with Skitter2008-10
Fort Collins, CO, USEpiphany: A location hiding architecture for protecting crit ...Kambhampati, V., Papadopolous, C., et al.Topology with Archipelago2012-06
Zurich, CHOn building onion routing into future Internet architecturesAsoni, D.E., Chen, C., et al.Anonymized Internet Traces2016-05
Cambridge, UKAntitrust analysis for the internet upstream market: a Borde ...D'Ignazio, A., Giovannetti, E.Topology with BGP2006-02
Shanghai, CNTrading bandwidth for playback lag: Can active peers help?Huang, D., Zhao, J., et al.Topology with BGP2010-10
Kapurthala, INCharacterizing DDoS attacks and flash events: Review, resear ...Behal, S., Kumar, K., et al.Denial of Service Attacks2017-08
Lafayette, LA, USCross-AS (X-AS) Internet topology mappingNur, A.Y., Tozal, M.E.Topology with BGP2018-02
Madrid, ESWould energy efficient ethernet be effective on 10Gbps optic ...Reviriego, P., Larrabeiti, D., et al.Anonymized Internet Traces2010-07
Ithaca, NY, USPHY convert channels: Can you see the idles?Wang, H., Lee, K.S., et al.Anonymized Internet Traces2014-04
Tezpur, INDenial of Service attack detection using multivariate correl ...Hoque, N., Bhattacharyya, D., et al.Denial of Service Attacks2016-03
Tokyo, JPSimulation study of BGP origin validation effect against mis ...Ando, M., Okada, M., et al.Topology with Archipelago, Topology with BGP2017-09
Madrid, ESA method to protect Bloom filters from soft errorsReviriego, P., Pontarelli, S., et al.Anonymized Internet Traces2015-10
Urbana, IL, USDesign, analysis, and implementation of effective network fl ...Houmansadr, A.Anonymized Internet Traces2012-00
Kaunas, LTPaskirstyto prievadu skenavimo ataku aptikimas tinklo srautu ...Kulbis, A.Anonymized Internet Traces2015-00
College Station, TX, USEliminating network protocol vulnerabilities through abstrac ...Casey, C.J., Sutton, A., et al.Anonymized Internet Traces2013-10
Shanghai, CNStreamBench: Towards benchmarking modern distributed stream ...Lu, R., Wu, G., et al.Anonymized Internet Traces2014-12
Liege, BEDISco: A distributed information store for network challenge ...Martin, S., Chiarello, L., et al.UCSD Network Telescope2012-05
Wuerzburg, DEPerformance evaluation and optimization of content distribut ...Lehrieder, F.Topology with BGP2013-06
Linkoping, SEAn analysis on the Internet topologyLeguay, J.Topology with Skitter2004-03
Guangzhou, CNCIPA: A collaborative intrusion prevention architecture for ...Chen, X.-F., Yu, S.-Z.UCSD Network Telescope, Denial of Service Attacks, Anonymized Internet Traces2015-12
Beijing, CNMLV: A Multi-dimension Routing Information Exchange Mechanis ...Chen, Z., Bi, J., et al.Topology with BGP2015-11
Suwon, KRA study on marking bit size for path identification method: ...Kim, S., Hong, M., et al.Topology with Skitter2004-00
Lexington, KY, USSupporting application-based route selectionWu, X., Griffioen, J.Topology with BGP2014-08
Zouk Mosbeh, LBProtecting TCP services from denial of service attacksFarhat, H.Topology with Skitter2006-09
Nagercoil, INA new ontology?based multi agent framework for intrusion det ...Retnaswamy, B., Ponniah, K.Anonymized Internet Traces2016-09
Seoul, KRBitmap-based prefix caching for fast IP lookupKim, J.-S., Ko, M.-C., et al.Anonymized Internet Traces2014-03
Philadelphia, PA, USStructural analysis of viral spreading processes in social a ...Preciado, V.M., Draief, M., et al.Topology with Skitter2012-09
Atlanta, GA, USNetTimeView: Applying spatio-temporal data visualization tec ...Shrestha, A.; Zhu, Y.; Manandhar, K.Denial of Service Attacks2014-12
Paris, FREngineering a new loop-free shortest paths routing algorithmD'Angelo, G., D'Emidio, M., et al.Topology with Archipelago2012-00
Tokyo, JPIncreasing the darkness of darknet trafficHaga, Y., Saso, A., et al.UCSD Network Telescope2015-12
Ioannina, GRBest Friends Forever (BFF): Finding Lasting Dense SubgraphsSemertzidis, K., Pitoura, E., et al.Topology with BGP2016
Prague, CZAutomatic classification of network entitiesJancicka, J.Topology with BGP2017-05
Enschede, NLFlow-based compromise detectionHofstede, R.Anonymized Internet Traces2016-06
Debrecen, HULevy flights and fractal modeling of internet trafficTerdik, G., Gyires, T.Anonymized Internet Traces2009-02
London, UKModelling internet traffic using Markov chainsClegg, R.Anonymized Internet Traces2006-00
Coimbra, PTExpedite feature extraction for enhanced cloud anomaly detec ...Dalmazo, B.L., Vilela, J.P., et al.Denial of Service Attacks2016-04
Hanoi, VNAn enhanced deterministic flow marking technique to efficien ...Tuyen, D.V., Truong, T.H., et al.Anonymized Internet Traces2014-10
Jinan, CNA Novel OpenFlow-Based DDoS Flooding Attack Detection and Re ...Wang, R., Zhang, Z., et al.Denial of Service Attacks2015
Tokyo, JPInter-AS locator allocation of hierarchical automatic number ...Fujikawa, K., Tazaki, H., et al.Topology with BGP2012-07
Atlanta, GA, USModeling and simulations of worms and mitigation techniquesAbdelhafez, M.Topology with Skitter2007-12
Kurukshetra, INCross-site scripting (XSS) attacks and defense mechanisms: c ...Gupta, S., Gupta, B.B.UCSD Network Telescope2015-09
Bangalore, INBotSpot: fast graph based identification of structured P2P b ...Venkatesh, B., Choudhury, S.H., et al.Anonymized Internet Traces2015-11
Braga, PTOptimizing network measurements through self-adaptive sampli ...Silva, J.M.C., Lima, S.R.Anonymized Internet Traces2012-06
Tel-Aviv, ILCBTree: A practical concurrent self-adjusting search treeKorenfeld, B.Anonymized Internet Traces2012-05
Pisa, ITThe impact of IXPs on the AS-level topology structure of the ...Gregori, E., Improta, A., et al.Topology with Archipelago2011-01
Pasadena, CA, USUnderstanding Internet topology: Principles, models, and val ...Alderson, D., Li, L., et al.Topology with Skitter2005-12
Changsha, CNDesign and implementation of Software Defined Hardware Count ...Zhao, T., Li, T., et al.Anonymized Internet Traces2016-03
Monterey, CA, USComparing internet probing methodologies through an analysis ...Landry, B.Topology with Archipelago2014-06
Pittsburgh, PA, USStackPi: new packet marking and filtering mechanisms for DDo ...Yaar, A., Perrig, A., et al.Topology with Skitter2006-10
Las Vegas, NV, USTowards variable length addressing for scalable Internet rou ...Wang, F., Shao, X., et al.Topology with Archipelago2016
San Diego, CA, USBitmap algorithms for counting active flows on high speed li ...Estan, C., Varghese, G., et al.Anonymized Internet Traces2003-10
PA, USPrivate and Verifiable Interdomain Routing DecisionsZhao, M., Zhou, W., et al.Topology with BGP2016-04
Nancy, FRAnomaly traceback using software defined networkingFrancois, G., Festor, O.Topology with Skitter2015-12
Rome, ITScalability measurements in an information-centric networkMelazzi, N.B., A. Detti, A., et al.Anonymized Internet Traces2012-05
Beijing, CNCatching popular prefixes at AS border routers with a predic ...Zhang, W., Bi, J., et al.Anonymized Internet Traces2012-03
Rome, ITOn the feasibility of static analysis for BGP convergenceCittadini, L., Rimondini, M., et al.Topology with BGP2009-08
Orlando, FL, USInternet exchange points and Internet routingAhmad, M.Z., Guha, R.Topology with Archipelago2011-10
Madison, WI, USNetwork discovery from passive measurementsEriksson, B., Barford, P., et al.Topology with Skitter2008-08
Timisoara, RODomain relations in trees arborescence for interaction searc ...Orzen, S.-N.Topology with Archipelago2014-01
Beer-Sheba, ILOn network neutrality measurementsMaltinsky, A., Giladi, R.; Shavitt, et al.Anonymized Internet Traces2017-06
Berlin, DEExploring reachability via settlement-free peeringMeyer, S., Wahlisch, M., et al.Topology with BGP2012-12
Madrid, ESImpact of prefix hijacking on payments of providersBangera, P., Gorinsky, S.Topology with BGP2011-01
New York, NY, USTwo-Type Information Fusion Based IP-to-AS Mapping Table Ref ...Jiang, Q., Hu, H., et al.Topology with Archipelago, Topology with BGP2017
Beijing, CNSymbiotic effect: A guideline for network modelingZhang, G.-Q., Zhang, G.-Q., et al.Topology with Archipelago2009-09
Manhattan, KS, USViral conductance: Quantifying the robustness of networks wi ...Youssef, M., Kooij, R., et al.Topology with Skitter2011-03
Beijing, CNEasily-implemented adaptive packet sampling for high speed n ...Wang, H., Lin, Y., et al.Anonymized Internet Traces2006-05
West Lafayette, IN, USTwo samples are enough: Opportunistic flow-level latency est ...Lee, M., Duffield, N., et al.Anonymized Internet Traces2010-05
Changsha, CNA study of IP prefix hijacking in cloud computing networksLiu, Y., Peng, W., et al.Topology with BGP2013-02
Rochester, NY, USSegmenting large-scale cyber attacks for online behavior mod ...Strapp, S., Yang, S.UCSD Network Telescope2014-04
Shanghai, CNNetwork quotients: structural skeletons of complex systemsXiao, Y., MacArthur, B.D., et al.Topology with BGP2008-00
Lisboa, PTA fresh look at inter-domain route aggregationSobrinho, J.L., Le, F.Topology with BGP2012-03
Leuven, BEQuantifying ASes multiconnectivity using multicast informati ...Merindol, P., Van den Schrieck, V., et al.Topology with BGP2009-11
Belo Horizonte, BRA spam traffic cost analysis for network operatorsFonseca, O., Fazzion, E., et al.Topology with BGP2015-05
Zaragoza, ESSmall-packet flows in Software Defined Networks: Traffic pro ...Saldana, J., de Hoz, D., et al.Anonymized Internet Traces2015-04
Luoyang, CNGraph perturbations and corresponding spectral changes in In ...Jiao, B., Shi, J.-M.Topology with Archipelago2016-02
Enschede, NLMeasuring the adoption of DDoS protection servicesJonker, M., Sperotto, A., et al.Topology with BGP2016-11
Hangzhou, CNTraffic congestion in interconnected complex networksTan, F, Wu, J., et al.Topology with BGP2014-01
Aveiro, PTInter-operator traffic differentiation based on multiscale a ...Coelho, N., Salvador, P., et al.Anonymized Internet Traces2013-08
Fort Collins, CO, USTowards characterizing international routing detoursShah, A., Fontunge, R., et al.Topology with Archipelago, Topology with BGP2016-06
Amherst, MA, USSaving energy and improving TCP throughput with rate adaptat ...Hanay, Y.S., Li, W., et al.Anonymized Internet Traces2012-06
Berlin, DEInferring BGP blackholing activity in the InternetGiotsas, V., Smaragdakis, G., et al.Topology with BGP2017-11
Auckland, NZObservations of UDP to TCP ratio and port numbersLee, D., Carpenter, B.E., et al.Anonymized Internet Traces2010-06
Princeton, NJ, USHeavy-Hitter Detection Entirely in the Data PlaneSivaraman, V., Narayana, S., et al.Anonymized Internet Traces2017-04
Heraklion, GRtraIXroute: Detecting IXPs in traceroute pathsNomikos, G., Dimitropoulos, X.Topology with Archipelago, Topology with BGP2016-03
Richardson, TX, USEstimating network layer subnet characteristics via statisti ...Tozal, M.E., Sarac, K.Topology with BGP2012-05
Muenchen, DEUsing Looking Glasses to Understand the Internet's StructureSingh, J.Topology with Archipelago2016
Hong Kong, CNEntropy based flow aggregationHu, Y., Chiu, D.-M., et al.Anonymized Internet Traces2006-04
Pittsburgh, PA, USFIT: Fast Internet TracebackYaar, A., Perrig, A., et al.Topology with Skitter2005-03
Riverside, CA, USNetwork traffic analysis using traffic dispersion graphs (TD ...Iliofotou, M., Pappu, P., et al.Topology with Skitter, Anonymized Internet Traces2007-05
Paris, FRDynamical phenomena on complex networksDallasta, L.Topology with Skitter2006-09
Atlanta, GA, USASwatch: An AS reputation system to expose bulletproof hosti ...Konte, M., Perdisci, R., et al.Topology with BGP2015-10
Cesson-Sevigne, FROAZE: A network-friendly distributed zapping system for peer ...Chen, Y., Le Merrer, E., et al.Topology with BGP2012-01
Ferozeper, INTrends in Validation of DDoS ResearchBehal, S., Kumar, K.Denial of Service Attacks2016-06
Nova Scotia, CAAutonomous system based flow marking scheme for IP-TracebackAghaei-Foroushani, V., Zincir-Heywood, A.N.Denial of Service Attacks2016-04
Ciudad Victoria, MXCharacterization and Coarsening of Autonomous System Network ...Garcia-Robledo, A., Diaz-Perez, A., et al.Topology with BGP2016
Linkoping, SECollaborative framework for protection against attacks targe ...Hiran, R., Carlsson, N., et al.Topology with BGP2017
Uberlandia, BRTowards local routing state in the future internetPasquini, R., Verdi, F.L., et al.Topology with BGP2012-04
Cambridge, UKAsymmetry and discrimination in Internet peering: evidence f ...D'Ignazio, A., Giovannetti, E.Topology with BGP2009-05
Toyonaka, JPEvaluation of free-riding traffic problem in overlay routing ...Hasegawa, G., Hiraoka, Y., et al.Topology with BGP2009-04
Changsha, CNAssessing survivability of inter-domain routing system under ...Liu, Y., Peng, W., et al.Topology with BGP2013-07
Fredericton, CATowards a Reliable Intrusion Detection Benchmark DatasetSharafaldin, I., Gharib, A., et al.Denial of Service Attacks, Anonymized Internet Traces2017-01
Bandung, INTraffic anomaly based detection: Anomaly detection by self-s ...Nurohman, H., Purwanto, Y., et al.Denial of Service Attacks2015-08
Atlanta, GA, USOptimal worm-scanning method using vulnerable-host distribut ...Chen, Z., Ji, C.UCSD Network Telescope2007-00
Madrid, ESCommodity packet capture engines: tutorial, cookbook and app ...Moreno, V., Ramos, J., et al.Anonymized Internet Traces2015-08
Baltimore, MD, USChange detection in evolving computer networks: Changes in d ...Namayanja, J.M., Janeja, V.P.Anonymized Internet Traces2015-05
Monterey, CA, USA middlebox-cooperative TCP for a non end-to-end internetCraven, R., Beverly, R., et al.Topology with Archipelago2014-10
Orlando, FL, USThe Internet: A system of interconnected autonomous systemsTozal, M.E.Topology with BGP2016
Monterey, CA, USToward large-graph comparison measures to understand Interne ...Daryl, L.H.A.Topology with Archipelago2013-09

  Last Modified: Tue Oct-13-2020 22:22:00 UTC
  Page URL: https://www.caida.org/data/publications/bylocation/index.xml