Publications
Toward Continual Measurement of Global Network-Level Censorship.
Security and Privacy. 16(1),
(2018).
(1996).
(2013).
(2013). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016). Towards Situational Awareness of Large-Scale Botnet Probing Events.
IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
(2011).
(2013).
(2000).
Using Honeynets for Internet Situational Awareness.
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
(2005).
(2010). VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016). Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004).
(2007). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018).
(2011).
(2014). Where Mathematics Meets the Internet.
Notices of the American Mathematical Society. 45(8), 961-970.
(1998). Why We Don't Know How To Simulate The Internet.
Proceedings of the 1997 Winter Simulation Conference.
(1997). Wide-Area Traffic: The Failure of Poisson Modeling.
IEEE/ACM Transactions on Networking. 3(3), 226-244.
(1995).
(2006). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016).