Publications
End-to-End Internet Packet Dynamics.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997).
(2007).
(2008). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006).
(2009). Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Detecting Stepping Stones.
Proceedings of the Ninth USENIX Security Symposium.
(2000).
(2013).
(2009). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Detecting Backdoors.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019).
(2011).
(2011). Creating a Scalable Architecture for Internet Measurement.
Proceedings of the Internet Summit (INET '98).
(1998). On the Constancy of Internet Path Properties.
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop (IMW '01). 197-211.
(2001).
(2014).
(2012).
(2011). Characterizing the Nature and Dynamics of Tor Exit Blocking..
Proceedings of USENIX Security 2017.
(2017).
(2014). Characteristics of Internet Background Radiation.
Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
(2004). On the Characteristics and Origins of Internet Flow Rates.
Proceedings of the ACM SIGCOMM Conference. 309-322.
(2002). Censorship Arms Race: Research vs. Practice.
Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
(2015). On Calibrating Measurements of Packet Transit Times.
Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98). 11-21.
(1998).