Publications
(2002).
(2014).
(2012).
(2014).
Measurement and Analysis of Traffic Exchange Services.
Proceedings of ICM Internet Measurement Conference.
(2015).
(1997).
(2010).
(2011). On Modeling the Costs of Censorship.
CoRR. abs/1409.3211,
(2014). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016).
(2002).
(2010).
Netalyzr: Illuminating The Edge Network.
246-259.
(2010). Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML).
Proceedings of USENIX Security Symposium 2001.
(2001). Network Loss Tomography Using Striped Unicast Probes.
IEEE/ACM Transactions on Networking. 697-710.
(2006). The Network Oracle.
Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
(2005). Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 37-42.
(2006). The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
(2007). Observed Structure of Addresses in IP Traffic.
IEEE/ACM Transactions on Networking. 14(16), 1207-1218.
(2006). Observed Structure of Addresses in IP Traffic.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
(2002). Operational Experiences with High-Volume Network Intrusion Detection.
Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
(2004). Opportunistic Measurement: Extracting Insight from Spurious Traffic.
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
(2005).
(2010). Pktd: A Packet Capture and Injection Daemon.
Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
(2003). On the Potential Abuse of IGMP.
ACM Computer Communication Review. 47(1),
(2017).