Publications
Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium. 790-806.
(2016).
(2010). Ethane: Taking Control of the Enterprise.
ACM SIGCOMM Computer Communication Review. 37(4), 1-12.
(2007). Rethinking Enterprise Network Control.
IEEE/ACM Transactions on Networking. 17(4), 1270-1283.
(2009). Opportunistic Measurement: Extracting Insight from Spurious Traffic.
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
(2005). From ethane to SDN and beyond.
ACM SIGCOMM Computer Communication Review. 49(5), 92-95.
(2019). Ethane: Taking Control of the Enterprise.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
(2007). SANE: A Protection Architecture for Enterprise Networks.
Proceedings of the 15th USENIX Security Symposium (Security '05).
(2006).
(2012). Classifying Materials in the Real World.
Image and Vision Computing. 28(1), 150-163.
(2010). GeoMM 2014: The Third ACM Multimedia Workshop on Geotagging and its Applications in Multimedia.
1251-1252.
(2014).
(1992).
(1991). Opportunities and Challenges of Ad-based Measurements from the Edge of the Network.
Proceedings of HotNets 2017.
(2017).
(2019). A Dynamic Multilevel MPLS Protection Domain.
Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001).
(2001).
(2012).
(2012).
(2010). On Modern DNS Behavior and Properties.
ACM SIGCOMM Computer Communication Review. 43(3), 8-15.
(2013).
(1993). ROFL: Routing on Flat Labels.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
(2006). Dynamic Route Recomputation Considered Harmful.
ACM Computer Communication Review. 40(2), 66-71.
(2010).
(1989).
(1991).