Publications
Observed Structure of Addresses in IP Traffic.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
(2002). The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
(2007). Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 37-42.
(2006). Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML).
Proceedings of USENIX Security Symposium 2001.
(2001). Netalyzr: Illuminating The Edge Network.
246-259.
(2010). Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay.
Proceedings of RAID.
(2002). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016).
(2011). Measurement and Analysis of Traffic Exchange Services.
Proceedings of ICM Internet Measurement Conference.
(2015).
(2014).
(2012).
(2014).
(2010).
(2007).
(2010).
(2007). Inferring Link Loss Using Striped Unicast Probes.
Proceedings of IEEE INFOCOM.
(2001).
(2011).
(2014). How to Own the Internet in Your Spare Time.
Proceedings of the Eleventh USENIX Security Symposium (Security '02).
(2002). Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of ACM CCS.
(2016). Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium. 3093-3110.
(2021).
(2012).
(2014). A High-level Programming Environment for Packet Trace Anonymization and Transformation.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
(2003).