Publications
Why We Don't Know How To Simulate The Internet.
Proceedings of the 1997 Winter Simulation Conference.
(1997). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.
Journal on Computer Virology. 4(1), 197-210.
(2008). Aggregate Congestion Control.
ACM SIGCOMM Computer Communication Review. 32(1), 69.
(2002).
(2001). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009). An Architecture for Large-Scale Internet Measurement.
IEEE Communications. 36(8), 48-54.
(1998). On the Characteristics and Origins of Internet Flow Rates.
ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
(2002). Controlling High Bandwidth Aggregates in the Network.
ACM SIGCOMM Computer Communication Review. 32(3), 62-73.
(2002). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Difficulties in Simulating the Internet.
IEEE/ACM Transactions on Networking. 9(4), 392-403.
(2001). Empirically-Derived Analytic Models of Wide-Area TCP Connections.
IEEE/ACM Transactions on Networking. 2,
(1994). End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking. 7(3), 277-292.
(1999). End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking. 5(5), 601-615.
(1997). Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic.
Computer Communication Review. 27(5), 5-18.
(1997). Growth Trends in Wide-Area TCP Connections.
IEEE Network. 8-17.
(1994). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003). A Large-Scale Empirical Study of Security Patches.
USENIX ;login:. 43(1),
(2018). Network Loss Tomography Using Striped Unicast Probes.
IEEE/ACM Transactions on Networking. 697-710.
(2006). The Network Oracle.
Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
(2005). Observed Structure of Addresses in IP Traffic.
IEEE/ACM Transactions on Networking. 14(16), 1207-1218.
(2006). On the Potential Abuse of IGMP.
ACM Computer Communication Review. 47(1),
(2017). A Primer on IPv4 Scarcity.
ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
(2015).