Publications
(2009).
(1999).
Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).
(2009).
(2014). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Determining an Appropriate Sending Rate Over an Underutilized Network Path.
51(7), 1815-1832.
(2007). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).
(2009).
(2003).
(2007).
(2000).
(2011).
(2002).
(2003).
(2008).
Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009). Comments on DNS Robustness.
ACM Internet Measurement Conference.
(2018). Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013).
(2011).
(2009). On Building Special-Purpose Social Networks for Emergency Communication.
ACM Computer Communication Review. 40,
(2010). On Building Inexpensive Network Capabilities.
ACM SIGCOMM Computer Communication Review. 42(2), 72-79.
(2012).
(2012).