Publications
On the Characteristics and Origins of Internet Flow Rates.
Proceedings of the ACM SIGCOMM Conference. 309-322.
(2002). Characteristics of Internet Background Radiation.
Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
(2004).
(2014). Characterizing the Nature and Dynamics of Tor Exit Blocking..
Proceedings of USENIX Security 2017.
(2017).
(2011).
(2012).
(2014). On the Constancy of Internet Path Properties.
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop (IMW '01). 197-211.
(2001). Creating a Scalable Architecture for Internet Measurement.
Proceedings of the Internet Summit (INET '98).
(1998).
(2011).
(2011). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019). Detecting Backdoors.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).
(2009).
(2013). Detecting Stepping Stones.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).
(2009). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006).
(2008).
(2007). End-to-End Internet Packet Dynamics.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997). Enhancing Byte-Level Network Intrusion Detection Signatures with Context.
Proceedings of ACM CCS.
(2003). Enhancing Network Intrusion Detection With Integrated Sampling and Filtering.
Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
(2006).