Publications
Detecting Backdoors.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).
(2009).
(2005).
(2013). Detecting Stepping Stones.
Proceedings of the Ninth USENIX Security Symposium.
(2000). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Difficulties in Simulating the Internet.
IEEE/ACM Transactions on Networking. 9(4), 392-403.
(2001). Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick.
25(5), 1805-1869.
(1997). Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).
(2009). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006).
(2008).
Empirically-Derived Analytic Models of Wide-Area TCP Connections.
IEEE/ACM Transactions on Networking. 2,
(1994).
(2007). End-to-End Internet Packet Dynamics.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997). End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking. 7(3), 277-292.
(1999). End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking. 5(5), 601-615.
(1997). Enhancing Byte-Level Network Intrusion Detection Signatures with Context.
Proceedings of ACM CCS.
(2003). Enhancing Network Intrusion Detection With Integrated Sampling and Filtering.
Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
(2006). Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
(2005).
(2008). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
(2001). Estimating Router ICMP Generation Delays.
Proceedings of Passive & Active Measurement: PAM-2002.
(2002).