Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications
Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    dataset    location   |
|   Citation Format:    abbreviated    complete   |
YearAuthor(s)TitlePublicationDataset
2017
Phan, T.
Bao, N.
Park, M.
Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacksJournal of Network and Computer Applications Anonymized Internet Traces
Denial of Service Attacks
2017
Huang, Q.
Lee, P.
Li, R.
Tang, L.
Chen, Y.
Zhang, G.
SketchVisor: Robust Network Measurement for Software Packet ProcessingACM SIGCOMM Anonymized Internet Traces
2017
Meng, J.
Ren, F.
Lin, C.
Modeling and understanding burst transmission for energy efficient ethernetComputer Networks Anonymized Internet Traces
2017
Kim, T.
Lim, J.
Kim, J.
Cho, W.
Chung, E.
Lee, H.
Scalable Bandwidth Shaping Scheme via Adaptively Managed Parallel Heaps in Manycore-Based Network ProcessorsACM Transactions on Design Automation of Electronic Systems Anonymized Internet Traces
2017
Wu, N.
Bi, Y.
Michael, N.
Tang, A.
Doyle, J.
Matni, N.
HFTraC: High-frequency traffic controlIntl Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2017
Vidal, J.
Orozco, A.
Villalba, L.
Adaptive artificial immune networks for mitigating DoS flooding attacksSwarm and Evolutionary Computation Anonymized Internet Traces
Denial of Service Attacks
2017
Muhammad, A.
Alameka, F.
Integrasi Metode Normalized Reelative Network Entropy dan Neural Network Backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoSJurnal Rekayasa Teknologi Informasi Anonymized Internet Traces
Denial of Service Attacks
2017
Mirkovic, J.
Bartlett, G.
Heidemann, J.
Shi, H.
Deng, X.
Do you see me now? Sparsity in passive observations of address livenessNetwork Traffic Measurement and Analysis Conference Anonymized Internet Traces
2017
Maltinsky, A.
Giladi, R.
Shavitt, Y.
On network neutrality measurementsACM Trans. on Intelligent Systems and Technology (TIST) Anonymized Internet Traces
2017
Lu, J.
Wan, Y.
Li, Y.
Zhang, C.
Dai, H.
Wang, Y.
Zhang, G.
Liu, B.
Ultra-Fast Bloom Filters using SIMD techniquesInternational Symposium on Quality of Service (IWQoS) Anonymized Internet Traces
2017
Duan, H.
Yuan, X.
Wang, C.
LightBox: SGX-assisted Secure Network Functions at Near-native Speedarxiv.org Anonymized Internet Traces
2017
Deng, J.
Li, H.
Wang, K.
Ahn, G.
Zhao, Z.
Han, W.
On the Safety and Efficiency of Virtual Firewall Elasticity ControlACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2017
Chainourov, B.Log analysis using Splunk Hadoop ConnectNaval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2017
Albdair, M.
Addie, R.
Fatseas, D.
Social network behaviour inferred from O-D pair trafficAustralian Journal of Telecommunications and the Digital Economy Anonymized Internet Traces
2017
Taghouti, M.
Lucani, D.
Fitzek, F.
Bouallegue, A.
Back to Results Random Linear Network Coding Schemes for Reduced Zero-Padding Overhead: Complexity and Overhead AnalysisEuropean Wireless Conference Anonymized Internet Traces
2017
Lopez, E.
Navarro, L.
Tight bounds for sketches in traffic validationInternational Conference on Networking, Sensing and Control Anonymized Internet Traces
2017
Anderson, D.
Bevan, P.
Lang, K.
Liberty, E.
Rhodes, L.
Thaler, J.
A High-Performance Algorithm for Identifying Frequent Items in Data Streamsarxiv.org Anonymized Internet Traces
2017
Alonso, S.
Perez, M.
Veiga, M.
Garcia, C.
Optimizing Dual-Mode EEE Interfaces: Deep-Sleep is HealthyIEEE Transactions on Communications Anonymized Internet Traces
2017
Sivaraman, V.
Narayana, S.
Rottenstreich, O.
Muthukrishnan, S.
Rexford, J.
Heavy-Hitter Detection Entirely in the Data PlaneProceedings of the Symposium on SDN Research Anonymized Internet Traces
2017
Oeldemann, A.
Wild, T.
Herkersdorf, H.
Reducing data center resource over-provisioning through dynamic load management for virtualized network functionsArchitecture of Computing Systems (ARCS) Anonymized Internet Traces
2017
Mitzenmacher, M.
Pontarelli, S.
Reviriego, P.
Adaptive cuckoo filtersarxiv.org Anonymized Internet Traces
2017
Lee, T.
Pappas, C.
Perrig, A.
Gligor, V.
Hu, Y.
The Case for In-Network Replay SuppressionAsia Conference on Computer and Communications Security Anonymized Internet Traces
2017
Duffield, N.
Xu, Y.
Xia, L.
Ahmed, N.
Yu, M.
Stream Aggregation Through Order Samplingarxiv.org Anonymized Internet Traces
2017
Cascone, C.
Bifulco, R.
Pontarelli, S.
Capone, A.
Relaxing state-access constraints in stateful programmable data planesarxiv.org Anonymized Internet Traces
2017
Boro, D.
Bhattacharyya, D.K
DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacksMicrosystem Technologies Anonymized Internet Traces
Denial of Service Attacks
2017
Bhaya, W.
EbadyManaa, M.
DDoS attack detection approach using an efficient cluster analysis in large data scaleNew Trends in Information and Communications Technology Applications Anonymized Internet Traces
Denial of Service Attacks
2017
Bhaya, W.
Manaa, M.E.
DDoS attack detection approach using an efficient cluster analysis in large data scaleConference on New Trends in Information and Communications Technology Applications (NTICT) Anonymized Internet Traces
Denial of Service Attacks
2017
Varela, J.
Ros, P.
Reinventing NetFlow for OpenFlow Software-Defined Networksarxiv.org Anonymized Internet Traces
2017
Engel, D.
Malone, W.
Integrated Information as a Metric for Group Interaction: Analyzing Human and Computer Groups Using a Technique Developed to Measure Consciousnessarxiv.org Anonymized Internet Traces
2017
Afek, Y.
Barr, A.
Feibish, S.
Schiff, L.
Detecting Heavy Flows in the SDN Match and Action Modelarxiv.org Anonymized Internet Traces
2017
Sharafaldin, I.
Gharib, A.
Lashkari, A.
Ghorbani, A.
Towards a Reliable Intrusion Detection Benchmark DatasetSoftware Networking Anonymized Internet Traces
Denial of Service Attacks
2017
Remedios, R.On Improving DREAM Framework with Estimations and ProgMEUniversity of Ottawa Anonymized Internet Traces
2017
Luo, H.
Chen, Z.
Li, J.
Vasilakos, A.V.
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path IdentifiersIEEE Transactions on Information Forensics and Security Anonymized Internet Traces
Topology with Archipelago
2017
Lee, K.Towards precise network measurementsCornell University Anonymized Internet Traces
2017
Iordache, M.
Jouet, S.
Marnerides, A.
Pezaros, D.
Distributed, Multi-Level Network Anomaly Detection for Datacentre NetworksIEEE ICC Next Generation Networking and Internet Symposium Anonymized Internet Traces
2017
Huong, T.
Thanh, N.
Software defined networking-based one-packet DDoS mitigation architectureProceedings of the International Conference on Ubiquitous Information Management and Communication Anonymized Internet Traces
2017
Cenedese, A.
Tramarin, F.
Vitturi, S.
An Energy Efficient Ethernet Strategy Based on Traffic Prediction and ShapingIEEE Transactions on Communications Anonymized Internet Traces
UCSD Network Telescope
2017
Birkner, R.
Gupta, A.
Feamster, N.
Vanbever, L.
SDX-Based Flexibility or Internet Correctness?: Pick Two!Proceedings of the Symposium on SDN Research Anonymized Internet Traces
Topology with BGP
2016
Xia, Q.
Chen, T.
Xu, W.
CIDS: Adapting Legacy Intrusion Detection Systems to the Cloud with Hybrid SamplingInternational Conference on Computer and Information Technology Anonymized Internet Traces
2016
Saldana, J.Specification of Smart AP solutionsWhat to do With the Wi-Fi Wild West Anonymized Internet Traces
2016
Lazarou, G.
Alam, M.
Picone, J.
Measuring the variability of CAIDA internet traffic tracesInternational Conference on Computer and Information Technology Anonymized Internet Traces
2016
Hendawi, A.
Alali, F.
Wang, X.
Guan, Y.
Zhou, T.
Liu, X.
Basit, N.
Stankovic, J.
Hobbits: Hadoop and Hive based Internet traffic analysisIEEE International Conference on Big Data Anonymized Internet Traces
2016
Gharib, A.
Sharafaldin, I.
Lashkari, A.
Ghorbani, A.
An Evaluation Framework for Intrusion Detection DatasetInternational Conference on Information Science and Security Anonymized Internet Traces
Denial of Service Attacks
2016
Bayati, A.
Asghari, V.
Nguyen, K.
Cheriet, M.
Gaussian Process Regression Based Traffic Modeling and Prediction in High-Speed NetworksGlobal Communications Conference Anonymized Internet Traces
2016
Basat, R.
Einziger, G.
Friedman, R.
Kassner, Y.
Randomized Admission Policy for Efficient Top-k and Frequency Estimationarxiv.org Anonymized Internet Traces
2016
Albdair, M.
Addie, R.
Fatseas, D.
Inference of social network behavior from Internet traffic tracesInternational Telecommunication Networks and Applications Conference Anonymized Internet Traces
2016
Narayana, S.
Sivaraman, A.
Nathan, V.
Alizadeh, M.
Walker, D.
Rexford, J.
Jeyakumar, V.
Kim, C.
Hardware-Software Co-Design for Network Performance MeasurementACM Workshop on Hot Topics in Networks Pages Anonymized Internet Traces
2016
Moraney, J.
Raz, D.
Efficient detection of flow anomalies with limited monitoring resourcesConference on Network and Service Management (CNSM) Anonymized Internet Traces
2016
Li, C.
Chen, Z.
Zheng, W.
Wu, Y.
Cao, J.
BAH: A Bitmap Index Compression Algorithm for Fast Data RetrievalConference on Local Computer Networks Anonymized Internet Traces
2016
Lee, T.
Pappas, C.
Szalachowski, P.
Perrig, A.
Communication based on per-packet One-Time AddressesIntl Conf. on Network Protocols Anonymized Internet Traces
2016
Katta, N.Building efficient and reliable software-defined networksPrinceton University Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
A probabilistic sampling method for efficient flow-based analysisJournal of Communications and Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Huang, Q.
Lee, P.
Toward high-performance distributed stream processing via approximate fault toleranceProceedings of the Very Large Data Bases Endowment Anonymized Internet Traces
2016
Dey, P.
Yuksel, M.
CAR: Cloud-Assisted RoutingConference on Network Function Virtualization and Software Defined Networks Anonymized Internet Traces
2016
Aral, A.Resource Mapping Optimization for Distributed Cloud ServicesIstanbul Technical University Anonymized Internet Traces
2016
Nguyen, H.
Begin, T.
Busson, A.
Lassous, I.
Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networksIntl Conf. on Network and Service Management Anonymized Internet Traces
2016
Namayanja, J.
Janeja, V.
Characterization of Evolving Networks for CybersecurityInformation Fusion for Cyber-Security Analytics Anonymized Internet Traces
2016
Abt, S.
Baier, H.
Correlating network events and transferring labels in the presence of IP address anonymisationInternational Conference on Network and Service Management Anonymized Internet Traces
2016
Retnaswamy, B.
Ponniah, K.
A new ontology?based multi agent framework for intrusion detectionInternational Journal of Communication Systems Anonymized Internet Traces
2016
Hintze, D
Rice, A.
Picky: efficient and reproducible sharing of large datasets using Merkle-treesSymp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2016
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
A Concise Forwarding Information Base for Scalable and Fast Flat Name Switchingarxiv.org Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Sketch-guided filtering support for detecting superspreaders in high-speed networksElectronics Letters Anonymized Internet Traces
2016
Song, T.
Jiang, Z.
Wei, Y.
Shi, X.
Ma, X.
Ormond, O.
Traffic Aware Energy Efficient Router: Architecture, Prototype and AlgorithmsIEEE J. on Selected Areas in Communications Anonymized Internet Traces
2016
Mokgolodi, K.Traffic prediction in cloud computing using time series modelsUniversity of Botswana Anonymized Internet Traces
2016
Liu, Z.
Manousis, A.
Vorsanger, X.
Sekar, V.
Braverman, V.
One sketch to rule them all: Rethinking network flow monitoring with UnivMonProc. ACM SIGCOMM Anonymized Internet Traces
2016
Liu, P.
Li, Y.
Sang, Y.
Zhang, J.
Anonymity-Based Privacy Preserving Network Data PublicationIEEE Trustcom/BigDataSE/I?SPA Anonymized Internet Traces
2016
Dao, N.-N.
Kim, J.
Park, M.
Cho, S.
Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networksPLoS One Anonymized Internet Traces
2016
Phan, T.
Bao, N.
Park, M.
A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined NetworkingConf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Anonymized Internet Traces
Denial of Service Attacks
2016
Phan, T.
Toan, T.
Tuyen, D.
Huong, T.
Nguyen, T.
OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacksInternational Conference on Communications and Electronics Anonymized Internet Traces
Denial of Service Attacks
2016
Foroushani, V.A.A security framework based on flow marking IP-traceback techniquesDalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
Topology with Skitter
2016
Cermak, M.
Tovarnak, D.
Lastovicka, M.
Caleda, P.
A performance benchmark for NetFlow data analysis on distributed stream processing systemsNetwork Operations and Management Symposium Anonymized Internet Traces
2016
Xu, X.
Zhang, J.
Li, Q.
Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone TracebackInternational Conference on Data Science in Cyberspace Anonymized Internet Traces
2016
Xing, C
Ding, K.
Hu, C.
Chen, M.
Sample and Fetch-Based Large Flow Detection Mechanism in Software Defined NetworksIEEE Communications Letters Anonymized Internet Traces
2016
Sahri, N.
Okamura, K.
Adaptive Query Rate for Anomaly Detection with SDNInternational Journal of Computer Science and Network Security Anonymized Internet Traces
2016
Papapetrou, O.
Garofalakis, M.
Deligiannakis, A.
Sketching distributed sliding-window data streamsVLDB J. Anonymized Internet Traces
2016
Huang, T.
Sethu, H.
Kandasamy, N.
A new approach to dimensionality reduction for anomaly detection in data trafficarxiv.org Anonymized Internet Traces
2016
Hofstede, R.Flow-based compromise detectionUniv. of Twente Anonymized Internet Traces
2016
Einziger, G.
Fellman, B.
Friedman, R.
Kassner, Y.
ICE buckets: improved counter estimation for network measurementarxiv.org Anonymized Internet Traces
2016
Cermak, M.
Celeda, P.
Detecting advanced network threats using a similarity searchIntl Conference on Autonomous Infrastructure, Management, and Security Anonymized Internet Traces
2016
Abada, A.Resource optimization of TCAM-based SDN measurements via diminishing-points autodetectionEuropean Conference on Networks and Communications Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Huang, C.-Y.
Chung, Y.-W.
Toward hardware support for a flexible sketch-based network traffic monitoring systemIEEE Region 10 Symposium (TENSYMP) Anonymized Internet Traces
2016
Fairbanks, J.Graph analysis combining numerical, statistical, and streaming techniquesGeorgia Inst. of Technology Anonymized Internet Traces
2016
Asoni, D.E.
Chen, C.
Barrera, D.
Perrig, A.
On building onion routing into future Internet architecturesIntl Workshop on Open Problems in Network Security (iNetSec) Anonymized Internet Traces
2016
Wu, Y.
Chen, Z.
Cao, J.
Li, H.
Li, C.
Wang, Y.
Zheng, W.
Chang, J.
Zhou, J.
Hu, Z.
Guo, J.
CAMP: A New Bitmap Index for Data Retrieval in Traffic ArchivalIEEE Communications Letters Anonymized Internet Traces
2016
Sahri, N.Research on Performance and Security Improvements by Software Defined NetworkKyushu University Anonymized Internet Traces
2016
Pan, T.
Huang, T.
Liu, J.
Zhang, J.
Yang, F.
Li, S.
Liu, Y.
Fast Content Store Lookup Using Locality-Aware Skip List in Content-Centric NetworksConference on Computer Communications Workshops Anonymized Internet Traces
2016
Krishnan, D.
Quoc, D.
Bhatotia, P.
Fetzer, C.
Rodrigues, R.
IncApprox: A Data Analytics System for Incremental Approximate ComputingProceedings of the International Conference on World Wide Web Anonymized Internet Traces
2016
Bozakov, Z.
Rizk, A.
Bhat, D.
Zink, M.
Measurement-based flow characterization in centrally controlled networksIntl Conf. on Computer Communications Anonymized Internet Traces
2016
Ben-Basat, R.
Einziger, G.
Friedman, R.
Heavy hitters in streams and sliding windowsIEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2016
Zhao, T.
Li, T.
Han, B.
Sun, Z.
Huang, J.
Design and implementation of Software Defined Hardware Counters for SDNComputer Networks Anonymized Internet Traces
2016
Qian, S.
Wu, G.
Huang, J.
Das, T.
Benchmarking modern distributed streaming platformsIntl Conference on Industrial Technology (ICIT) Anonymized Internet Traces
2016
Lim, H.
Sekar, V.
Abe, Y.
Anderson, D.G.
NetMemex: Providing full-fidelity traffic archivalarxiv.org Anonymized Internet Traces
2016
Lei, C.
Zhang, H.
Liu, Y.
Du, X.
Net-flow fingerprint model based on optimization theoryArabian J. for Science and Engineering Anonymized Internet Traces
2016
Katta, N.
Alipourfard, O.
Rexfor, J.
Walker, D.
CacheFlow: Dependency-Aware Rule-Caching for Software-Defined NetworksProceedings of the Symposium on SDN Research Anonymized Internet Traces
2016
Boro, D.
Basumatary, H.
Goswami, T.
Bhattacharyya, D.K.
UDP flooding attack detection using information metric measureProc. Intl Conference on ICT for Sustainable Development Anonymized Internet Traces
2016
Boro, D.
Basumatary, H.
Goswami, T.
Bhattacharyya, D.K.
UDP Flooding attack detection using information metric measureProc. Intl Conference on ICT for Sustainable Development Anonymized Internet Traces
2016
Zhou, Z.Per-flow cardinality estimation based on virtual LogLog sketchingUniversity of Illinois at Urbana-Champaign Anonymized Internet Traces
2016
Xie, Y.
Wang, Y.
He, H.
Xiang, Y.
Yu, S.
Liu, X.
A General Collaborative Framework for Modeling and Perceiving Distributed Network BehaviorIEEE/ACM Transactions on Networking Anonymized Internet Traces
2016
Silva, J.M.C.A modular traffic sampling architecture for flexible network measurementsUniv. do Minho, Braga, PT Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Intelligent Sampling Using an Optimized Neural NetworkJournal of Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Garroppo, R.G.
Nencioni, G.
Procissi, G.
Tavanti, L.
The impact of the access point power model on the energy-efficient management of infrastructured wireless LANsJ. Computer Networks Anonymized Internet Traces
2016
Chen, Y.
Wang, S.
A Novel Network Flow Watermark Embedding Model for Efficient Detection of Stepping-stone Intrusion Based on EntropyProceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government Anonymized Internet Traces
2016
Chen, C.
Perrig, A.
PHI: Path-Hidden Lightweight Anonymity Protocol at Network LayerProceedings on Privacy Enhancing Technologies Anonymized Internet Traces
Topology with BGP
2016
Abaci, H.
Parr, G.
McClean, S.
Moore, A.
Krug, L.
Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirementsSustainable Computing: Informatics and Systems Anonymized Internet Traces
2015
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
SCREAM: Sketch Resource Allocation for Software-defined MeasurementACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2015
Li, C.
Yang, J.
Wang, Z.
Li, F.
Yang, Y.
A lightweight DDoS flooding attack detection algorithm based on synchronous long flowsGlobal Communications Conference (GLOBECOM) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Flow-based anomaly detection using semisupervised learningIntl Conference on Signal Processing and Communication Systems (ICSPCS) Anonymized Internet Traces
Denial of Service Attacks
2015
Chen, Z.
Luo, H.
Zhang, M.
Li, J.
Improving network security by dynamically changing path identifiers in future InternetGlobal Communications Conference (GLOBECOM) Anonymized Internet Traces
2015
Chen, X.-F.
Yu, S.-Z.
CIPA: A collaborative intrusion prevention architecture for programmable network and SDNComputers and Security Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Zhang, Z.
Guo, Z.
Yang, Y.
Bounded-reorder packet scheduling in optical cut-through switchIEEE Trans. on Parallel and Distributed Systems Anonymized Internet Traces
2015
Venkatesh, B.
Choudhury, S.H.
Nagajara, S.
Balakrishnan, N.
BotSpot: fast graph based identification of structured P2P botsJ. Computer Virology and Hacking Techniques Anonymized Internet Traces
2015
Righi, M.
Nunes, R.
Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas DinamicasSimposio Brasileiro em Seguranca da Informacao e Sistemas Anonymized Internet Traces
Denial of Service Attacks
2015
Liu, Z.
Vorsanger, G.
Braverman, V.
Sekar, V.
Enabling a 'RISC' approach for Software-Defined Monitoring using universal streamingProc. ACM Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Lei, C.
Zhang, H.
Li, M.
Liu, Y.
Network watermarking model based on optimization theoryIntl Conference on Cloud Computing and Big Data (CCBD) Anonymized Internet Traces
2015
Huang, T.
Sethu, H.
Kandasamy, N.
A fast algorithm for detecting anomalous changes in network trafficIntl Conference on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Alipourfard, O.
Moshref, M.
Yu, M.
Re-evaluating measurement algorithms in softwareACM SIGCOMM HotNets Workshop Anonymized Internet Traces
2015
Alipourfard, O.
Moshref, M.
Yu, M.
Re-evaluating measurement algorithms in softwareProc. Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Deterministic flow marking for IPv6 traceback (DFM6)Intl Conference on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Wu, H.Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity regionUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2015
Saldana, J.
Forcen, I.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Improving network efficiency with SimplemuxIntl Conference on Computer and Information Technology (CIT) Anonymized Internet Traces
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A method to protect Bloom filters from soft errorsIntl Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) Anonymized Internet Traces
2015
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, M.
Frame coalescing in dual-mode EEEarxiv.org Anonymized Internet Traces
2015
Erazo, M.A.
Rong, R.
Liu, J.
Symbiotic network simulation and emulationACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2015
Chen, C.
Asoni, D.E.
Barrera, D.
Danezis, G.
Perrig, A.
HORNET: High-speed onion routing at the network layerConference on Computer and Communications Security (CCS) Anonymized Internet Traces
Topology with BGP
2015
Basescu, C.
Reischuk, R.M.
Szalachowski, P.
Perrig, A.
Zhang, Y.
Hsiao, H.-C.
Kubota, A.
Urakawa, J.
SIBRA: Scalable Internet Bandwidth Reservation Architecturearxiv.org Anonymized Internet Traces
Topology with BGP
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Probabilistic flow marking for IP traceback (PFM)Intl Workshop on Reliable Networks Design and Modeling (RNDM) Anonymized Internet Traces
Denial of Service Attacks
2015
Rivetti, N.
Busnel, Y.
Mostefaoui, A.
Efficiently Summarizing Data Streams over Sliding WindowsInternational Symposium on Network Computing and Applications Anonymized Internet Traces
Denial of Service Attacks
2015
Rivetti, N.
Busnel, Y.
Mostefaoui, A.
Efficiently summarizing data streams over sliding windowsIntl Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Performance of Flow-based Anomaly Detection in Sampled TrafficJournal of Networks Anonymized Internet Traces
Denial of Service Attacks
2015
de Oliviera Schmidt, R.
Sadre, R.
Sperotto, A.
van den Berg, H.
Pras, A.
Impact of packet sampling on link dimensioningIEEE Trans. on Network and Service Management Anonymized Internet Traces
2015
Anceaume, E.
Busnel, Y.
Rivetti, N.
Sericola, B.
Identifying global icebergs in distributed streamsSymp. on Reliable Distributed Systems (SRDS) Anonymized Internet Traces
Denial of Service Attacks
2015
Moreno, V.
Leira, R.
Gonzalez, I.
Gomez-Arribas, F.J.
Towards high-performance network processing in virtualized environmentsIntl Symp. on High Performance Computing and Communications (HPCC) Anonymized Internet Traces
2015
Moreno, V.
Ramos, J.
Santiado del Rio, P.M.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Commodity packet capture engines: tutorial, cookbook and applicabilityIEEE Communications Surveys and Tutorials Anonymized Internet Traces
2015
Liu, Q.
Lui, J.C.S.
He, C.
Pan, L.
Fan, W.
Shi, Y.
SAND: A fault-tolerant streaming architecture for network traffic analyticsJ. Systems and Software Anonymized Internet Traces
2015
Li, X.
Qian, C.
Low-complexity multi-resource packet scheduling for network function virtualizationConf. on Computer Communications Anonymized Internet Traces
2015
Li, X.
Qian, C.
The virtual network function placement problemInternational Conference on Computer Communications Student Workshops Anonymized Internet Traces
2015
Popescu, I.
Miyazaki, T.
Chino, M.
Wang, X.
Okamoto, S.
Gravey, A.
Gravey, P.
Veeraraghavan, M.
Brandt-Pearce, M.
Yamanaka, N.
Application-centric energy-efficient Ethernet with quality of service supportElectronics Letters Anonymized Internet Traces
2015
Ding, H.
Rabinovich, M.
TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2015
Osuna, R.Estudio De Captura y Almacenamiento De Trafico En Redes Fisicas y Virtuales Multi-GigabitUniversidad Autonoma de Madrid Anonymized Internet Traces
2015
Addanki, R.
Maji, S.
Veeraraghavan, M.
Tracy, C.
A measurement-based study of big-data movementConference on Networks and Communications (EuCNC) Anonymized Internet Traces
2015
Zhang, Z.
Wang, B.
Lan, J.
Identifying elephant flows in internet backbone traffic with bloom filters and LRUComputer Communications Anonymized Internet Traces
2015
Wellem, T.
Lai, Y.-K.
Chung, W.-Y.
A software defined sketch system for traffic monitoringSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2015
Sharma, S.Shuffling based mechanism for DDoS prevention on cloud environmentNational Institute of Technology, Rourkela Anonymized Internet Traces
Denial of Service Attacks
2015
Namayanja, J.M.
Janeja, V.P.
Change detection in evolving computer networks: Changes in densification and diameter over timeIntl Conference on Intelligence and Security Informatics (ISI) Anonymized Internet Traces
2015
Mijumbi, R.
Serrat, J.
Gorricho, J.-L.
Self-managed resources in network virtualisation environmentsIntl Symp. on Integrated Network Management (IM) Anonymized Internet Traces
2015
Ayesta, U.
Bertaux, L.
Carvin, D.
Non-intrusive scheduling of TCP flowsIFIP Networking Conference (IFIP Networking) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Investigating unique flow marking for tracing back DDoS attacksIntl Symp. on Integrated Network Management (IM) Anonymized Internet Traces
Denial of Service Attacks
2015
Steinert, R.
Hess, A.
Observing software-defined networks using a decentralized link monitoring approachConference on Network Softwarization (NetSoft) Anonymized Internet Traces
2015
Saldana, J.
de Hoz, D.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Pascual, F.
Lopez, D.R.
Florez, D.
Castell, J.A.
Nunez, M.
Small-packet flows in Software Defined Networks: Traffic profile optimizationJ. of Networks Anonymized Internet Traces
2015
Balkanli, E.A comprehensive study on one-way backscatter traffic analysisDalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A synergetic use of Bloom filters for error detection and correctionIEEE Trans. on Very Large Scale Integration (VLSI) Systems Anonymized Internet Traces
2015
Papapetrou, O.
Garofalakis, M.
Deligiannakis, A.
Sketching distributed sliding-window data streamsThe Very Large Data Bases Journal Anonymized Internet Traces
2015
Fairbanks, J.
Kannan, R.
Park, H.
Bader, D.
Behavioral clusters in dynamic graphsParallel Computing Anonymized Internet Traces
2015
Chen, J.
Addie, R.G.
Zukerman, M.
Neame, T.D.
Performance evaluation of a queue fed by a Poisson Lomax burst processIEEE Communications Letters Anonymized Internet Traces
2015
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Shen, M.
Xu, K.
Yang, K.
A neuro-fuzzy approach to self-management of virtual network resourcesJ. Expert Systems with Applications Anonymized Internet Traces
2015
Singh, S.A.Techniques for online analysis of large distributed dataIowa State Univ., Ames, IO, US Anonymized Internet Traces
2015
Sahri, N.M.
Okamura, K.
Adaptive anomaly detection for SDNProc. Asia-Pacific Advanced Network Anonymized Internet Traces
2015
Radan, M.
Keslassy, I.
Tapping into the Router's Unutilized Processing PowerIEEE Conference on Computer Communications Anonymized Internet Traces
2015
Martin, J.Sistema de Deteccion de Ataques DDoS en TorUniversidad Complutense de Madrid Anonymized Internet Traces
Denial of Service Attacks
2015
Kulbis, A.Paskirstyto prievadu skenavimo ataku aptikimas tinklo srautuoseKauno Technologijos Universitetas Anonymized Internet Traces
2015
Danelutto, M.
De Sensi, D.
Torquati, M.
Energy driven adaptivity in stream parallel computationsEuromicro International Conference on Parallel, Distributed, and Network-Based Processing Anonymized Internet Traces
2014
Lu, R.
Wu, G.
Xie, B.
Hu, J.
StreamBench: Towards benchmarking modern distributed stream computing frameworksIntl Conf on Utility and Cloud Computing (UCC) Anonymized Internet Traces
2014
Barik, R.
Divakaran, D.M.
Development and experimentation of TCP initial window functionIntl Conference on Network of the Future (NOF) Anonymized Internet Traces
2014
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
The CB tree: a practical concurrent self-adjusting search treeDistributed Computing Anonymized Internet Traces
2014
Wang, H.
Lee, K.S.
Li, E.
Lum, C.L.
Tang, A.
Weatherspoon, K.
Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networksInternet Measurement Conference (IMC) Anonymized Internet Traces
2014
Lai, Y.
Wellem, T.
You, H.-P.
Hardware-assisted estimation of entropy norm for high-speed network trafficIET Electronics Lett. Anonymized Internet Traces
2014
Xiao, Q.
Qiao, Y.
Zhen, M.
Chen, S.
Estimating the persistent spreads in high-speed networksIEEE Intl Conference on Network Protocols (ICNP) Anonymized Internet Traces
2014
Tuyen, D.V.
Truong, T.H.
Hung, N.T.
Puype, B.
Colle, D.
Steenhaut, K.
Thanh, N.H.
An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacksIntl Conference on Advanced Technologies for Communications (ATC) Anonymized Internet Traces
2014
Song, T.
Shi, X.
Ma, X.
Fine-grained power scaling algorithms for energy efficient routersSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2014
Pontarelli, S.
Reviriego, P.
Maestro, J.A.
Efficient flow sampling with back-annotated cuckoo hashingIEEE Communications Letters Anonymized Internet Traces
2014
Namayanja, J.M.
Janeja, V.P.
Change detection in temporally evolving computer networks: A big data frameworkConference on Big Data Anonymized Internet Traces
2014
Korosi, A.
Tapolcai, J.
Mihalka, B.
Meszaros, G.
Retvari, G.
Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneouslyIntl Conference on Network Protocols (ICNP) Anonymized Internet Traces
2014
Gardiner, J.
Nagaraja, S.
On the reliability of network measurement techniques Used for malware traffic analysisCambridge Intl Workshop on Security Protocols Anonymized Internet Traces
2014
Yu, Y.
Qian, C.
Li, X.
Distributed and collaborative traffic monitoring in software defined networksHot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2014
Tunc, C.
Akar, N.
Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networksPhotonic Network Communications Anonymized Internet Traces
2014
Privalov, A.Y.
Tsarev, A.
Analysis and simulation of WAN traffic by self-similar traffic model with OMNETWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Pecori, R
Veltri, L.
A statistical blind technique for recognition of internet traffic with dependence enforcementWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
DREAM: Dynamic Resource Allocation for Software-defined MeasurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2014
McHale, L.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for SDN data plane matchingICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN) Anonymized Internet Traces
2014
Luao, H.
Cui, J.
Chen, G.
Chen, Z.
Zhang, H.
On the applicability of software defined networking to large scale networksIntl Conference on Computer Communication and Networks (ICCCN) Anonymized Internet Traces
2014
Barati, M.
Abdullah, A.
Udzir, N.I.
Mahmod, R.
Mustapha, N.
Distributed Denial of Service detection using hybrid machine learning techniqueIntl Symp. on Biometrics and Security Technologies (ISBAST) Anonymized Internet Traces
Denial of Service Attacks
2014
Schmidt, R.
Sadre, R.
A. Sperotto, A.
van den Berg, H.
Pras, A.
A hybrid procedure for efficient link dimensioningComputer Networks Anonymized Internet Traces
2014
Moreno, V.
Santiado del Rio, P.M.
Ramos, J.
Muelas, B.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systemsIntl J. Network Management Anonymized Internet Traces
2014
Frangoudis, P.A.
Hadjadj-Aoul, Y.
Ksentini, A.
Rubino, G.
Etame, T.
Brun, C.
PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top servicesIntl Conference on Information, Intelligence, Systems and Applications (IISA) Anonymized Internet Traces
2014
Shahzad, M.
Liu, A.X.
Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stampingACM Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2014
Schmidt, R.
Sadre, R.
Melnikov, N.
Schonwalder, J.
Pras, A.
Linking network usage patterns to traffic GaussianityProc. IFIP Networking Conf. Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Contributions to efficient resource management in virtual networksIFIP Intl Conference on Autonomous Infrastructure, Management and Security (AIMS) Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
Famaey, J.
De Turck, F.
Neural network-based autonomous allocation of resources in virtual networksEuropean Conference on Networks and Communications (EuCNC) Anonymized Internet Traces
2014
Hsiao, H.-C.Toward a highly available future InternetCarnegie Mellon Univ. Anonymized Internet Traces
Topology with BGP
Topology with Skitter
2014
Zhou, X.
Petrovic, M.
Eskridge, T.
Carvalho, M.
Tao, X.
Exploring Netflow data using HadoopASE BigData/SocialCom/Cybersecurity Conf. Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Energy efficient exact matching for flow identification with cuckoo affinity hashingIEEE Communications Letters Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
De Turck, F.
Latre, S.
Design and evaluation of learning algorithms for dynamic resource management in virtual networksIEEE/IFIP Network Operations and Management Symp. (NOMS) Anonymized Internet Traces
2014
Liu, B.
Lu, J.
Kai, Y.
Wang, Y.
Pan, T.
Power-proportional router: Architectural design and experimental evaluationQuality of Service (IWQoS) Symp. Anonymized Internet Traces
2014
Ekiz, N.
Amer, P.D.
Transport layer renegingComputer Communications Anonymized Internet Traces
2014
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
TDFA: Traceback-based defense against DDoS flooding attacksIEEE Int Conference on Advanced Information Networking and Applications (AINA) Anonymized Internet Traces
Denial of Service Attacks
2014
Wang, H.
Lee, K.S.
Weatherspoon, H.
PHY convert channels: Can you see the idles?Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Handigol, N.
Heller, B.
Jeyakumar, V.
Mazieres, D.
McKeown, N.
I know what your packet did last hop: Using packet histories to troubleshoot networksUsenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Masud, M.M.
Mustafa, U.
Trabelsi, Z.
A data driven firewall for faster packet filteringIntl Conference on Communications and Networking (ComNet) Anonymized Internet Traces
2014
Kim, J.-S.
Ko, M.-C.
Nam, J.
Kim, J.
Bitmap-based prefix caching for fast IP lookupKSII Trans on Internet and Information Systems Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Efficient implementation of error correction codes in hash tablesMicroelectronics Reliability Anonymized Internet Traces
2014
Kudo, T.
Takin, T.
On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet samplingIntl J. of Network Management Anonymized Internet Traces
UCSD Network Telescope
2013
Zhang, Y.
Sun, Y.
Zhang, J.
Xu, J.
Wu, Y.
An efficient framework for parallel and continuous frequent item monitoringConcurrency Computation: Practice and Experience Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Socket overloading for fun and cache-poisoningAnnual Computer Security Applications Conference (ACSAC) Anonymized Internet Traces
2013
Larsen, R.Slow port scanning with BroGjovik Univ. College, Gjovik, Norway Anonymized Internet Traces
2013
Chen, J.
Addie, R.G.
Zukerman, M.
Performance evaluation and service rate provisioning for a queue with fractional Brownian inputPerformance Evaluation Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
IP traceback through (authenticated) deterministic flow marking: an empirical evaluationEURASIP Journal on Information Security Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Sperotto, A.
Pras, A.
Lightweight link dimensioning using sFlow samplingIntl Conference on Network and Services Management (CNSM) Anonymized Internet Traces
2013
Retvari, G.
Tapolcai, J.
Korosi, A.
Majdan, A.
Heszberger, Z.
Compressing IP forwarding tables: towards entropy bounds and beyondACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2013
Lee, M.
Duffield, N.
Kompella, R.R.
High-fidelity per-flow delay measurements with reference latency interpolationIEEE/ACM Trans. on Networking Anonymized Internet Traces
2013
Iqbal, M.F.
Holt, J.
Ryoo, J.H.
John, L.K.
de Veciana, G.
Flow migration on multicore network processors: Load balancing while minimizing packet reorderingIntl Conference on Parallel Processing (ICPP) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Shulman, H.
Off-path hacking: the illusion of challenge-response authenticationIEEE Security and Privacy Anonymized Internet Traces
2013
Casey, C.J.
Sutton, A.
Dos Reis, G.
Sprintson, A.
Eliminating network protocol vulnerabilities through abstraction and systems language designConference on Network Protocols (ICNP) Anonymized Internet Traces
2013
Karpowicz, M.On the design of energy-efficient service rate control mechanisms: CPU frequency control for LinuxTyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC) Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Vulnerable delegation of DNS resolutionEuropean Symp. on Research in Computer Security (ESORICS) Anonymized Internet Traces
2013
Garfinkel, S.L.
Shick, M.
Passive TCP reconstruction and forensic analysis with tcpflowNaval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2013
Frangoudis, P.A.
Ksentini, A.
Hadjadj-Aoul, Y.
Boime, G.
PTPv2-based metwork load estimationIntl IEEE Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS) Anonymized Internet Traces
2013
Moshref, M.
Yu, M.
Govindan, R.
Resource/accuracy tradeoffs in software-defined measurementACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2013
Megyesi, P.
Molnar, S.
Analysis of elephant users in broadband network trafficEUNICE/IFIP WG 6.6 Intl Workshop: Advances in Communication Networking Anonymized Internet Traces
2013
Iqbal, M.F.Workload-aware network processors: improving performance while minimizing power consumptionUniv. Texas, Austin, TX, US Anonymized Internet Traces
2013
Hu, Y.-H.A fluid-based approach for modeling network activitiesJ Electr Electron Syst Anonymized Internet Traces
2013
Coelho, N.
Salvador, P.
Nogueira, A.
Inter-operator traffic differentiation based on multiscale analysisThinkMind, Intl Conference on Advances in Future Internet (AFIN) Anonymized Internet Traces
2013
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Reducing the cost of implementing error correction codes in content addressable memoriesIEEE Trans. on Circuits and Systems II: Express Briefs Anonymized Internet Traces
2013
Guo, Z.
Yang, Y.
High-speed multicast scheduling for all-optical packet switchesConference on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2013
Ghoshal, P.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for Software Defined FirewallsIEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2013
Santiago, S.S.Latency estimation of IP flows using NetFlowUniv. Politecnica de Catalunya, Barcelona, Spain Anonymized Internet Traces
2013
Namayanja, J.M.
Janeja, V.P.
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networksIEEE Conference on Intelligence and Security Informatics Anonymized Internet Traces
2013
Leira, R.
Gomez, P.
Gonzalez, I.
Lopez de Vergara, J.E.
Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardwareConference on Smart Communications in Network Technologies (SaCoNeT) Anonymized Internet Traces
2013
Joslyn, C.
Choudhury, S.
Haglin, D.
Howe, B.
Nickless, B.
Olsen, B.
Massive scale cyber traffic analysis: A driver for graph database researchIntl Workshop on Graph Data Management Experiences and Systems (GRADES) Anonymized Internet Traces
Denial of Service Attacks
2013
Iacovazzi, A.
Baiocchi, A.
Investigating the trade-off between overhead and delay for full packet traffic privacyIntl Conf on Communications (ICC) Anonymized Internet Traces
2013
Handigol, N.A.Using packet histories to troubleshoot networksStanford Univ., Stanford, CA, US Anonymized Internet Traces
2013
Fokkema, J.A study of impacts of flow timeouts on link provisioningTwente Student Conference on IT Anonymized Internet Traces
2013
Clegg, R.G.
Araujo, J.T.
Landa, R.
Mykoniati, E.
Griffin, D.
Rio, M.
On the relationship between fundamental measurements in TCP flowsIEEE Conference on Communications (ICC) Anonymized Internet Traces
2013
Zadnik, M.Optimization of network flow monitoringInformation Sciences and Technologies Bulletin of the ACM Slovakia Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Pras, A.
Gaussian traffic revisitedIFIP Networking Conf. Anonymized Internet Traces
2013
Santiago del Rio, P.M.Internet traffic classification for high-performance and off-the-shelf systemsUniv. Autonoma de Madrid Anonymized Internet Traces
2013
Petkov, V.
Rajagopal, R.
Obraczka, K.
Characterizing per-application network traffic using entropyACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2013
Liu, H.A collaborative defense framework against DDoS attacks in networksWashington State Univ., Pullman, WA, US Anonymized Internet Traces
Denial of Service Attacks
2013
Erazo, M.A.
Liu, J.
Leveraging symbiotic relationship between simulation and emulation for scalable network experimentationConference on Principles of Advanced Discrete Simulation (SIGSIM-PADS) Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
On evaluating IP traceback schemes: a practical perspectiveIEEE Security and Privacy Workshops Anonymized Internet Traces
2013
Yu, M.
Jose, L.
Miao, R.
Software defined traffic measurement with OpenSketchUsenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Fragmentation considered vulnerableACM Trans. on Information and System Security (TISSEC) Anonymized Internet Traces
2013
Ahmadzadeh, S.A.
Agnew, G.
Turbo covert channel: An iterative framework for covert communication over data networksProc. IEEE INFOCOM Anonymized Internet Traces
2013
Hofstede, R.
Drago, I.
Sperotto, A.
Sadre, R.
Pras, A.
Measurement artifacts in NetFlow dataPassive and Active Measurement (PAM) Anonymized Internet Traces
2013
He, G.-F.
Yang, M.
Luo, J.-Z.
Zhang, L.
Online identification of Tor anonymous communication trafficJ. of Software Anonymized Internet Traces
2013
Gangam, S.
Chandrashekar, J.
Cunha, I.
Kurose, J.
Estimating TCP latency approximately with passive measurementsPassive and Active Measurement (PAM) Anonymized Internet Traces
2013
Dautrich Jr, J.L.
Ravishankar, C.V.
Inferential time-decaying Bloom filtersIntl Conference on Extending Database Technology (EDBT) Anonymized Internet Traces
2013
De Sensi, D.DPI over commodity hardware: implementation of a scalable framework using FastFlowUniv. Pisa, Pisa, IT Anonymized Internet Traces
2013
Kim, S.
Nam, S.Y.
A long range dependent Internet traffic model using unbounded Johnson distributionIEICE Trans. on Communications Anonymized Internet Traces
2012
Liu, W.
Yan, Y.
Dong, T.
Run-hua, T.
Self-similarity and heavy-tail of ICMP trafficJ. Computers Anonymized Internet Traces
2012
Detal, G.
Paasch, C.
van der Linden, S.
Merindol, P.
Avoine, G.
Bonaventure, O.
Revisiting flow-based load balancing: Stateless path selection in data center networksComputer Networks Anonymized Internet Traces
2012
Coelho, N.M.M.Profiling de trafego inter-operador baseado em analise multi-escalarUniv. de Aveiro Anonymized Internet Traces
2012
Basaran, C.
Kang, K.-D.
Zhou, Y.
Suzer, M.H.
Adaptive load shedding via fuzzy control in data stream management systemsIntl Conference on Service-Oriented Computing and Applications (SOCA) Anonymized Internet Traces
2012
Santiago del Rio, P.M.
Rossi, D.
Gringoli, F.
Nava, L.
Salgarelli, L.
Aracil, J.
Wire-speed statistical classification of network traffic on commodity hardwareInternet Measurement Conference (IMC) Anonymized Internet Traces
2012
Moriyama, E.
Takahashi, T.
Miyamoto, D.
DNS-based defense against IP spoofing attacksConference on Neural Information Processing Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
A GI/G/1 model for 10 Gb/s energy efficient ethernet linksIEEE Trans. on Communications Anonymized Internet Traces
2012
Ekiz, N.Transport layer renegingUniv. Delaware Anonymized Internet Traces
2012
Zhang, X.
Ding, W.
Comparative research on internet flows characteristicsConference on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics Anonymized Internet Traces
2012
Weinberg, Z.
Wang, J.
Yegneswaran, V.
Briesemeister, L.
Cheung, S.
Wang, F.
Boneh, D.
StegoTorus: a camouflage proxy for the Tor anonymity systemACM Conference on Computer and Communications Security (CCS) Anonymized Internet Traces
2012
Moreno, V.
Santiago del Rio, P.M.
Ramos, J.
Garnica, J.
Garcia-Dorado, J.L.
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O enginesIEEE Communications Lett. Anonymized Internet Traces
2012
Kim, J.
Park, M.
Han, S.
Kim, J.
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookupIEICE Trans. on Communications Anonymized Internet Traces
2012
Kato, M.
Cho, K.
Honda, M.
Tokuda, H.
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregationWorkshop on Managing Systems Automatically and Dynamically Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Efficient traffic aware power management in multicore communications processorsACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Cao, Z.
Panwar, S.S.
Efficient buffering and scheduling for a single-chip crosspoint-queued switchACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
CBTree: A practical concurrent self-adjusting search treeDistributed Computing (DISC) Anonymized Internet Traces
2012
Xiaojuan, S.
Bin, L.
Stream data analysis for backbone network intrusion detection systemConference on Oxide Materials for Electronic Engineering (OMEE) Anonymized Internet Traces
2012
Mogul, J.C.
Congdon, P.
Hey, you darned counters!: get off my ASIC!ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2012
Lin, Z
Hopper, N.
New attacks on timing-based network flow watermarksUsenix Security Conference (SEC) Anonymized Internet Traces
2012
He, P.
Guan, H.
Xie, G.
Salamatian, K.
Evaluating and optimizing IP lookup on many core processorsIEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Gringoli, F.
Nava, L.
Este, A.
Salgarelli, L.
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardwareWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2012
Detti, A.
Pomposini, M.
Blefari-Melazzi, N.
Salsano, S.
Supporting the Web with an information centric network that routes by nameComputer Networks Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Multiadaptive sampling for lightweight network measurementsIEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Lin, Z.Toward building practical privacy enhancing technologiesUniv. Minnesota Anonymized Internet Traces
2012
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architecturesComputer Communications Anonymized Internet Traces
2012
Zhao, Y.
Yuan, R.
Wang, W.
Meng, D.
Zhang, S.
Li, J.
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone trafficConference on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2012
Yang, T.
Duan, R.
Lu, J.
Zhang, S.
Dai, H.
Liu, B.
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancyConference on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Optimizing network measurements through self-adaptive samplingConference on High Performance Computing and Communication (HPCC) Anonymized Internet Traces
2012
Qardaji, W.
Li, N.
Anonymizing network traces with temporal pseudonym consistencyConference on Distributed Computing Systems Workshops (ICDCSW) Anonymized Internet Traces
2012
Markman, M.A.J.
Tokheim, S.
Reliable broadcast contribution over the public InternetNorwegian Univ. of Science and Technology Anonymized Internet Traces
2012
Kuang, J.
Bhuyan, L.
Klefstad, R.
Traffic-aware power optimization for network applications on multicore serversAnnual Design Automation Conf. Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Bounded energy consumption with dynamic packet coalescingNetworks and Optical Communications (NOC) Anonymized Internet Traces
2012
Hanay, Y.S.
Li, W.
Tessier, R.
Wolf, T.
Saving energy and improving TCP throughput with rate adaptation in EthernetIEEE Conference on Communications (ICC) Anonymized Internet Traces
2012
Guo, Z.
Yang, Y.
High speed multicast scheduling in hybrid optical packet switches with guaranteed latencyIEEE Trans. on Computers Anonymized Internet Traces
2012
Fragni, C.
Costa, L.H.M.K.
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routersComputer Networks Anonymized Internet Traces
2012
Davy, A.
Jennings, B.
Botvich, D.
QoSPlan: A measurement based quality of service aware network planning frameworkJ. Network and Systems Management Anonymized Internet Traces
2012
Melazzi, N.B.
A. Detti, A.
Pomposini, M.
Scalability measurements in an information-centric networkMeasurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project Anonymized Internet Traces
2012
Korenfeld, B.CBTree: A practical concurrent self-adjusting search treeTel-Aviv Univ., Israel Anonymized Internet Traces
2012
Fan, J.
Hu, C.
He, K.
Jiang, J.
Liuy, B.
Reducing power of traffic manager in routers via dynamic on/off-chip schedulingIEEE INFOCOM Anonymized Internet Traces
2012
Zhang, H.
Lu, G.
Qassrawi, M.T.
Zhang, Y.
Yu, X.
Feature selection for optimizing traffic classificationComputer Communications Anonymized Internet Traces
2012
Verma, H.
Yadav, B.
Bansal, P.
Raj, S.
IPv4 to IPv6 shift: major challengesJ. Engineering and Innovative Technology (IJEIT) Anonymized Internet Traces
2012
Tawakol, A.Performance analysis of TCAMs in switchesUniv. Waterloo, Ontario, CA Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Power and performance analysis of network traffic prediction techniquesIEEE Intl Symp. on Performance Analysis of Systems and Software (ISPASS) Anonymized Internet Traces
2012
Zhang, W.
Bi, J.
Wu, J.
Zhang, B.
Catching popular prefixes at AS border routers with a prediction based methodComputer Networks Anonymized Internet Traces
2012
Tsidon, E.
Hanniel, I.
Keslassy, I.
Estimators also need shared values to grow togetherIEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter?IEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Kanizo, Y.
Keslassy, I.
The variable-increment counting Bloom filterIEEE INFOCOM Anonymized Internet Traces
2012
Pan, T.
Guo, X.
Zhang, C.
Jiang, J.
Wu, H.
Liu, B.
Tracking millions of flows in high speed networks for application identificationIEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2012
Lee, C.
Lee, D.K.
Moon, S.
Unmasking the growing UDP traffic in a campus networkPassive and Active Measurement (PAM) Anonymized Internet Traces
2012
Houmansadr, A.
Kiyavash, N.
Borisov, N.
Non-blind watermarking of network flowsarxiv.org Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Optimal configuration of energy-efficient ethernetComputer Networks Anonymized Internet Traces
2012
Gilbert, J.Scalable wavelet-based active network stepping stone detectionAir Force Inst. of Technology, Air Univ, Anonymized Internet Traces
2012
Lee, M.
Duffield, N.
Kompella, R.R.
Opportunistic flow-level latency estimation using consistent NetFlowIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2012
Kanizo, Y.
Hay, D.
Keslassy, I.
Maximizing the throughput of cuckoo hashing in network devicesComNet, Technion, Israel Anonymized Internet Traces
2012
Shpiner, A.
Keslassy, I.
Cohen, R.
Reducing the reordering delay in multi-core network processorsComNet, Technion, Israel Anonymized Internet Traces
2012
Martinez, V.M.Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networksUniv. Autonoma de Madrid Anonymized Internet Traces
2012
Kim, M.
Jung, S.
Park, M.
A Distributed Self-Organizing Map for DoS Attack DetectionInternational Conference on Ubiquitous and Future Networks Anonymized Internet Traces
Denial of Service Attacks
2012
Houmansadr, A.Design, analysis, and implementation of effective network flow watermarking schemesUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2012
Blefari-Melazzi, N.
Cancellieri, M.
Detti, A.
Pomposini, M.
Salsano, S.
The CONET solution for information centric networkingUniv. Rome Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Behavioral graph analysis of Internet applicationsIEEE Global Telecommunications Conference (GLOBECOM) Anonymized Internet Traces
2011
Vishwanath, A.
Sivaraman, V.
Zhao, Z.
Russell, C.
Thottan, M.
Adapting router buffers for energy efficiencyACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2011
Moreno, S.D.B.Evaluacion de desempeno de diversas arquitecturas de commutadores opticosUniv. de los Andes, Facultad de Ingenieria, Bogota, Colombia Anonymized Internet Traces
2011
Matias, R.
Carvalho, A.M.M.
Teodoro, V.A.
Tes, D.
Araujo, L.B.
Performance comparison of forecasting models applied to LAN/MAN traffic predictionIEEE Workshop on Local and Metropolitan Area Networks (LANMAN) Anonymized Internet Traces
2011
Hua, N.
Norige, E.
Kumar, S
Lynch, B.
Non-crypto hardware hash functions for high performance networking ASICsSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2011
Houmansadr, A.
Nguyen, G.T.K.
Caesar, M.
Borisov, N.
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible DeniabilityACM Conference on Computer and Communications Security (CCS) Anonymized Internet Traces
2011
Guo, Z.
Yang, Y.
Pipelining multicast scheduling in all-optical packet switches with delay guaranteeIntl Teletraffic Congress (ITC) Anonymized Internet Traces
2011
Clegg, R.
Landa, R.
Rio, M.
Criticisms of modelling packet traffic using long-range dependence (extended version)J. Computer and System Sciences Anonymized Internet Traces
2011
Spinelli, L.P.Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatoriasUniv. Federal Do Rio de Janeiro, Brazil Anonymized Internet Traces
2011
Detti, A.
Melazzi, N.B.
Salsano, S.
Pomposini, M.
CONET: a content centric inter-networking architectureACM SIGCOMM Workshop on Information-Centric Networking (ICN) Anonymized Internet Traces
2011
Venkataramanan, R.
Jeong, M.-W.
Prabhakar, B.
A flow- and packet-level model of the InternetUniv. Michigan Anonymized Internet Traces
2011
Marsan, M.A.
Fernandez Anta, A.
Mancuso, V.
Rengarajan, B.
Vasallo, P.
Rizzo, G.
A simple analytical model for energy efficient ethernetIEEE Communications Lett. Anonymized Internet Traces
2011
Leiva, A.
Finochietto, J.M.
Huiszoon, B.
Lopez, V.
Tarifeno, M.
Aracil, J.
Beghelli, A.
Comparison in power consumption of static and dynamic WDM networksOptical Switching and Networking Anonymized Internet Traces
2011
Larrabeiti, D.
Reviriego, P.
Hernandez, J.A.
Maestro, J.A.
Uruena, M..
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viabilityOptical Switching and Networking Anonymized Internet Traces
2011
Valgenti, V.C.
Paul, R.R.
Kim, M.S.
Netshuffle: Improving traffic trace anonymization through graph distortionIEEE Conference on Communications (ICC) Anonymized Internet Traces
2011
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filterComNet, Technion, Israel Anonymized Internet Traces
2011
Grieco, L.A.
Barakat, C.
Marzulli, M.
Spectral models for bitrate measurement from packet sampled trafficIEEE Trans. on Network and Service Management Anonymized Internet Traces
2011
Mothersole, I.
Reed, M.J.
Optimising rule order for a packet filtering firewallConference on Network and Information Systems Security (SAR-SSI) Anonymized Internet Traces
2011
He, F.
Xiang, F.
Yibo Xue, Y.
Jun Li, J.
Towards high-performance network application identification with aggregate-flow cachearxiv.org Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Gu, L.
Network-aware behavior clustering of Internet end hostsIEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
UCSD Network Telescope
2011
Ekiz, N.
Rahman, A.H.
Amer, P.D.
Misbehaviors in TCP SACK generationACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2011
Dusi, M.
Gringoli, F.
Salgarelli, L.
Quantifying the accuracy of the ground truth associated with Internet traffic tracesComputer Networks Anonymized Internet Traces
2011
Reviriego, P.
Huiszoon, B.
Lopez, V.
Coenen, R.B.
Hernandez, J.A.
Maestro, J.A.
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical linksIEEE J. Selected Topics in Quantum Electronics Anonymized Internet Traces
2011
Jose, L.
Yu, M.
Rexford, J.
Online measurement of large traffic aggregates on commodity switchesUsenix Conference Hot-ICE Anonymized Internet Traces
2011
Houmansadr, A.
Borisov, N.
SWIRL: A scalable watermark to detect correlated network flowsSymp. on Network and Distributed System Security (NDSS) Anonymized Internet Traces
2011
Schear, N.Preventing encrypted traffic analysisUniv. Illinois, Urbana-Champaign Anonymized Internet Traces
2011
Pouzols, F.M.
Lopez, D.R.
Barros, A.B.
Predictive models of network traffic loadStudies in Computational Intelligence Anonymized Internet Traces
2011
Liu, H.
Sun, Y.
Valgenti, V.C.
Kim, M.S.
TrustGuard: A flow-level reputation-based DDoS defense systemConference on Consumer Communications and Networking (CCNC) Anonymized Internet Traces
Denial of Service Attacks
2010
He, K.
Hu, C.
Jiang, J.
Zhou, Y.
Liu, B.
A2C: Anti-attack counters for traffic measurementIEEE Global Telecommunications Conference (GLOBECOM) Anonymized Internet Traces
2010
Haider, A.
Acharya, K.
Raja, M.Y.A.
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networksHigh-Capacity Optical Networks and Enabling Technologies (HONET) Anonymized Internet Traces
2010
Mouchos, C.
Tsokanos, A.
Kouvatsos, D.D.
Dynamic OBS offset allocation in WDM networksComputer Communications Anonymized Internet Traces
2010
Zadnik, M.
Canini, M.
Evolution of cache replacement policies to track heavy-hitter flowsSymp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2010
Saxena, M.
Kompella, R.
CLAMP: Efficient class-based sampling for flexible flow monitoringComputer Networks Anonymized Internet Traces
2010
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architecturesBoston Univ., CS Dept. Anonymized Internet Traces
2010
Kanizo, Y.
Hay, D.
Keslassy, I.
Hash tables with finite buckets are less resistant to deletionsAllerton Conference on Communication, Control and Computing Anonymized Internet Traces
2010
Scappini, R.Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u OnditasFacultad de Informatica, Univ. Nacional de la Plata Anonymized Internet Traces
2010
Santiago del Rio, P.M.
Ramos, J.
Salvador, A.
de Vergara, J.E.L.
Aracil, J.
Cuadra, A.
Cutanda, M.
Application of Internet traffic characterization to all-optical networksConference on. Transparent Optical Networks (ICTON) Anonymized Internet Traces
2010
Yuan, R.
Weibing, Y.
Mingyu, C.
Xiaofang, Z.
Jianping, F.
Robust TCP reassembly with a hardware-based solution for backbone trafficConference on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2010
Woldeselassie, M.
Clegg, R.
Rio, M.
Forecasting full-path network congestion using one bit signallingIEEE Conference on Communications (ICC) Anonymized Internet Traces
2010
Reviriego, P.
Larrabeiti, D.
Maestro, J.A.
Would energy efficient ethernet be effective on 10Gbps optical links?OSA Photonics in Switching (PS) Anonymized Internet Traces
2010
Fenacci, D.
Franke, B.
Empirical evaluation of data transformations for network infrastructure applicationsConference on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X) Anonymized Internet Traces
Topology with Archipelago
2010
Zhang, N.
Wang, F.
Gong, B.
Li, L.
Identifying heavy-hitter flows fast and accuratelyConference on Future Computer and Communication (ICFCC) Anonymized Internet Traces
2010
Reviriego, P.
Sanchez-Macian, A.
Maestro, J.A.
Bleakley, C.J.
Increasing the MTU size for energy efficiency in ethernetIET Signals and Systems Conference (ISSC) Anonymized Internet Traces
2010
Lee, D.
Carpenter, B.E.
Brownlee, N.
Observations of UDP to TCP ratio and port numbersConference on Internet Monitoring and Protection (ICIMP) Anonymized Internet Traces
2010
Hansen, H.V.
Goebel, V.
Plagemann, T.
Siekkinen, M.
Resource adaptive distributed information sharingWorkshop on Networked Services and Applications - Engineering, Control and Management (EUNICE ) Anonymized Internet Traces
2010
Gremillet, O.
Goncalves, P.
Vicat-Blanc Primet, P.
Dupas, A.
Traffic classification techniques supporting semantic networksWireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2010
Moon, D.Achieving flexibility and performance for packet forwarding and data center managementUC Berkeley Anonymized Internet Traces
2010
Lee, M.
Duffield, N.
Kompella, R.
Two samples are enough: Opportunistic flow-level latency estimation using NetFlowIEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Parallelizing weighted frequency counting in high-speed network monitoringComputer Communications Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Identifying heavy hitters in high-speed network monitoringScience China Information Sciences Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processorsDynamically reconfigurable systems, architectures, design methods and applications, Ch. 17 Anonymized Internet Traces
2010
Albrecht, C.
Foag, J.
Koch, R.
Maehle, E.
Pionteck, T.
DynaCORE - dynamically reconfigurable coprocessor for network processorsDynamically reconfigurable systems, architectures, design methods and applications, Ch. 16 Anonymized Internet Traces
2010
John, W.Characterization and classification of internet backbone trafficChalmers Univ. of Technology, Gothenborg, Sweden Anonymized Internet Traces
2010
Rottenstreich, O.
Keslassy, I.
The variable-increment counting Bloom filterComNet, Technion, Israel Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
An application-aware load balancing strategy for network processorsConference on High performance embedded architectures and compilers (HIPEAC) Anonymized Internet Traces
2010
Moon, D.
Naous, J.
Liu, J.
Zarifis, K.
Casado, M.
Koponen, T.
Shenker, S.
Breslau, L.
Bridging the software/hardware forwarding divideanon. Anonymized Internet Traces
2009
Sellke, H.
Wang, C.-C.
Bagchi, S.
Shroff, N.B.
Camouflaging timing channels in web trafficPurdue Univ. Anonymized Internet Traces
2009
Beheshti-Zavareh, N.Tiny buffers for electronic and optical routersStanford Univ., Stanford, CA, US Anonymized Internet Traces
2009
Schear, N.
Borisov, N.
Preventing SSL traffic analysis with realistic cover trafficACM Conference on Computer and Communications Security (CCS) Anonymized Internet Traces
2009
Jiang, W.
Prasanna, V.K.
Reducing dynamic power dissipation in pipelined forwarding enginesIEEE Conference on Computer Design (ICCD) Anonymized Internet Traces
2009
Zhang, M.
Dusi, M.
John, W.
Chen, C.
Analysis of UDP traffic usage on internet backbone linksSymp. on Applications and the Internet (SAINT) Anonymized Internet Traces
2009
Este, A.
Gringoli, F.
Salgarelli, L.
Support Vector Machines for TCP traffic classificationComputer Networks Anonymized Internet Traces
2009
Andreou, M.S.Message traceback systems. Dancing with the devilUniv. Newcastle upon Tyne Anonymized Internet Traces
Topology with Skitter
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
Joint entropy analysis model for DDoS attack detectionConference on Information Assurance and Security (IAS) Anonymized Internet Traces
UCSD Network Telescope
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
A traffic coherence analysis model for DDoS attack detectionConference on Security and Cryptography (SECRYPT) Anonymized Internet Traces
UCSD Network Telescope
2009
Vishwanath, K.V.
Vahdat, A.
Swing: Realistic and responsive network traffic generationIEEE/ACM Trans. on Networking Anonymized Internet Traces
2009
Ishakian, V.
Akinwumi, J.
Matta, I.
On the cost of supporting multihoming and mobilityBoston Univ., CS Dept. Anonymized Internet Traces
2009
Clegg, R.G.
Withall, M.S.
Moore, A.W.
Phillips, I.W.
Parish, D.J.
Rio, M.
Landa, R.
Haddadi, H.
Kyriakopoulos, K.
Auge, J.
Clayton, R.
Salmon, D.
Challenges in the capture and dissemination of measurements from high-speed networksIET Communications Anonymized Internet Traces
2009
Brugger, S.T.The quantitative comparison of computer networksUC Davis Anonymized Internet Traces
2009
Saxena, M.
Kompella, R.
A framework for efficient class-based samplingIEEE Conference on Computer Communications (INFOCOM) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Does the internet still demonstrate fractal nature?IEEE Conference on Networking (ICN) Anonymized Internet Traces
2009
Idzikowski, F.Search and analysis of backbone traffic measurements in the internetTechnische Univ. Berlin (TKN-09-004) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Levy flights and fractal modeling of internet trafficIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Maiolini, G.
Molina, G.
Baiocchi, A.
Rizzi, A.
On the fly application flows identification by exploiting K-means based classifiersJ. Information Assurance and Security Anonymized Internet Traces
2009
Kanizo, Y.
Hay, D.
Keslassy, I.
Optimal dynamic hash tablesComNet, Technion, Israel Anonymized Internet Traces
2009
Andreou, M.S.
van Moorsel, A.
COTraSE Connection Oriented Traceback in Switched EthernetJ. Information Assurance and Security Anonymized Internet Traces
2008
Casado, M.
Koponen, T.
Moon, D.
Shenker, S.
Rethinking packet forwarding hardwareACM SIGCOMM HotNets Workshop Anonymized Internet Traces
2008
Baiocchi, A.
Maiolini, G.
Molina, G.
Rizzi, A.
On-the-fly statistical classification of internet traffic at application layer based on cluster analysisWorkshop on Computational Intelligence in Security for Information Systems (CISIS) Anonymized Internet Traces
2008
Dusi, M.
Gringoli, F.
Salgarelli, L.
IP traffic classification for QoS guarantees: the independence of packetsIEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2008
Pouzols, F.M.
Barriga, A.
Lopez, D.R.
Sanchez-Solano, S.
Linguistic summarization of network traffic flowsIEEE Conference on Fuzzy Systems (FUZZ-IEEE) Anonymized Internet Traces
2008
Shevtekar, A.
Ansari, N.
A router-based technique to mitigate reduction of quality (RoQ) attacksComputer Networks Anonymized Internet Traces
2008
Clegg, R.
Landa, R.
Haddadi, H.
Rio, M.
Moore, A.W.
Techniques for flow inversion on sampled dataIEEE INFOCOM Workshop Global Internet Symp. Anonymized Internet Traces
2008
Meitinger, M.
Ohlendorf, R.
Wild, T.
Herkersdorf, A.
A hardware packet re-sequencer unit for network processorsArchitecture of Computing Systems (ARCS) Anonymized Internet Traces
2008
Raspall, F.
Sallent, S.
Adaptive shared-state samplingInternet Measurement Conference (IMC) Anonymized Internet Traces
2008
Proebstel, E.Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled trafficUC Davis Anonymized Internet Traces
2008
Este, A.
Gringoli, F.
Salgarelli, L.
An SMV-based approach to traffic classificationUniv. Brescia Anonymized Internet Traces
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
Network performance analysis based on histogram workload modelsIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2007
Shevtekar, A.
Ansari, N.
A proactive test based differentiation to mitigate low rate DoS attacksIEEE Conference on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2007
Whitehead, B.
Lung, C.-H.
Rabinovitch, P.
A TCP connection establishment filter: symmetric connection detectionIEEE Conference on Communications (ICC) Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementationUC Riverside Anonymized Internet Traces
Topology with Skitter
2007
Clegg, R.
Haddadi, H.
Landa, R.
Rio, M.
Towards informative statistical flow inversionarxiv.org Anonymized Internet Traces
2007
Haddadi, H.
Landa, R.
Rio, M.
Bhatti, S.
Revisiting the issues on netflow sample and export performancearxiv.org Anonymized Internet Traces
2007
Yuan, L.
Chuah, C.
Mohapatra, P.
ProgME: towards programmable network measurementACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Salgarelli, L.
Gringoli, F.
Karagiannis, T.
Comparing traffic classifiersACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network monitoring using traffic dispersion graphs (TDGs)Internet Measurement Conference (IMC) Anonymized Internet Traces
Topology with Skitter
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
A histogram-based stochastic process for finite buffer occupancy analysisConference on Performance Evaluation Methodologies and Tools (VALUETOOLS) Anonymized Internet Traces
2007
Clegg, R.Simulating internet traffic with Markov-modulated processesUK Performance Engineering Workshop Anonymized Internet Traces
2006
Park, J.
Tyan, H.-R.
Jay Kuo, C.-C.
GA-based internet traffic classification technique for QoS provisioningConference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Anonymized Internet Traces
2006
Okuno, M.
Nishimura, S.
Ishida, S.
Nishi, H.
Cache-based network processor architecture: evaluation with real network trafficIEICE Trans. on Electronics Anonymized Internet Traces
2006
Vishwanath, K.
Vahdat, A.
Realistic and responsive network traffic generationACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Varghese, G.
Fingerhut, J.
F. Bonomi, F.
Detecting evasion attacks at high speeds without reassemblyACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed linksIEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2006
Clegg, R.Markov-modulated on/off processes for long-range dependent internet trafficarxiv.org Anonymized Internet Traces
2006
Constantinou, F.
Mavrommatis, P.
Identifying known and unknown peer-to-peer trafficIEEE Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
2006
Wang, H.
Lin, Y.
Jin, Y.
Cheng, S.
Easily-implemented adaptive packet sampling for high speed networks flow measurementConference on Computational Science (ICCS) Anonymized Internet Traces
2006
Kumar, S.
Maschmeyer, J.
Crowley, P.
Exploiting locality to ameliorate packet queue contention and serializationACM Conference on Computing Frontiers Anonymized Internet Traces
2006
Chen, Y.
Hwang, K.
Collaborative change detection of DDoS attacks on community and ISP networksIEEE Symp. on Collaborative Technologies and Systems (CTS) Anonymized Internet Traces
2006
Shriram, A.
Kaur, J.
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidthPassive and Active Measurement (PAM) Anonymized Internet Traces
2006
Hu, Y.
Chiu, D.-M.
Lui, J.
Entropy based flow aggregationIFIP-TC6 Networking Conference (NETWORKING) Anonymized Internet Traces
2006
Clegg, R.Modelling internet traffic using Markov chainsImperial College, London, UK Anonymized Internet Traces
2005
Kompella, R.
Estan, C.
The power of slicing in internet flow measurementInternet Measurement Conference (IMC) Anonymized Internet Traces
2005
Veitch, D.
Hohna, N.
Abry, P.
Multifractality in TCP/IP traffic: the case againstComputer Networks Anonymized Internet Traces
2005
Jiang, H.
Dovrolis, C.
Why is the internet traffic bursty in short (sub-RTT) timescales?ACM SIGMETRICS Performance Evaluation Review Anonymized Internet Traces
2005
Okuno, M.
Ishida, S.
Nishi, H.
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routeraIEICE Trans. on Electronics Anonymized Internet Traces
2004
Karagiannis, T.
Molle, M.
Faloutsos, M.
Long-range dependence: ten years of Internet traffic modelingIEEE Internet Computing Anonymized Internet Traces
2004
Okuno, M.
Nishi, H.
Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handlerIEICE technical report: Circuits and system Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed linksInternet Measurement Conference (IMC) Anonymized Internet Traces
2003
Estan, C.
Savage, S.
Varghese, G.
Automatically inferring patterns of resource consumption in network trafficACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the miceACM Trans. on Computer Systems (TOCS) Anonymized Internet Traces
2002
Estan, C.
Varghese, G.
New directions in traffic measurement and accountingACM SIGCOMM Computer Communication Review Anonymized Internet Traces
1999
Fang, W.
Peterson, L.
Inter-AS traffic patterns and there implicationsIEEE Global Telecommunications Conference (GLOBECOM) Anonymized Internet Traces
2016
Zhang, H.
Su, W.
Quan, W.
Security technologies of SINETSmart Collaborative Identifier Network Denial of Service Attacks
2016
Giotis, K.
Apostolaki, M.
Maglaris, V.
A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domainsIEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
Topology with BGP
2016
Zheng, L.
Li, J.
Wang, H.
Zeng, X.
Improving accuracy and automation of anomaly detectors based on self-correlationJ. Internet Technology (JIT) Denial of Service Attacks
UCSD Network Telescope
2016
Giotis, K.Virtual Network Services for the Monitoring and Security of Software-Defined NetworksNational Technical University of Athens Denial of Service Attacks
Topology with BGP
2015
Robinson, R.R.R.
Thomas, C.
Ranking of machine learning algorithms based on the performance in classifying DDoS attacksIEEE Recent Advances in Intelligent Computational Systems (RAICS) Denial of Service Attacks
UCSD Network Telescope
2015
Rastegari, S.Intelligent network intrusion detection using an evolutionary computation approachEdith Cowan Univ. Denial of Service Attacks
2015
Balkanli, E.
Zincir-Heywood, A.N.
Heywood, M.I.
Feature selection for robust backscatter DDoS detectionLocal Computer Networks Conference Workshops (LCNW) Denial of Service Attacks
UCSD Network Telescope
2015
Juturu, L.S.Applying big data analytics on integrated cybersecurity datasetsTexas Tech Univ., Lubbock, TX, US Denial of Service Attacks
2015
Shamshirband, S.
Daghighi, B.
Anuar, N.B.
Kiah, L.M.
Patel, A.
Abraham, A.
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in networkJ. Intelligent and Fuzzy Systems Denial of Service Attacks
2015
Lai, Y.
Chen, Y.
Liu, Z.
Yang, Z.
Li, X.
On monitoring and predicting mobile network traffic abnormalitySimulation Modelling Practice and Theory Denial of Service Attacks
UCSD Network Telescope
2014
Shrestha, A.
Zhu, Y.
Manandhar, K.
NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysisAdvances in Visual Computing Denial of Service Attacks
2014
Bhaya, W.
Manaa, M.E.
A proactive DDoS detection approach using data mining cluster analysisJournal of Next Generation Information Technology Denial of Service Attacks
2014
Srihari, V.
Anitha, R.
DDoS detection system using wavelet features and semi-supervised learningProc. Intl Symp. on Security in Computing and Communications Denial of Service Attacks
2014
Takahashi, R.Distributed denial of service (DDoS) attack detection system using burst detectionFuture Univ. Hakodate Denial of Service Attacks
2013
Luo, H.
Lin, Y.
Zhang, H.
Zukerman, M.
Preventing DDoS attacks by identifier/locator separationIEEE Network Denial of Service Attacks
2013
Bhuyan, M.H.Applying data mining techniques in anomaly based network intrusion detectionTezpur Univ. Denial of Service Attacks
2013
Bhatia, S.Detecting Distributed Denial-of-Service attacks and flash eventsQueensland Univ. of Technology, Brisbane, Australia Denial of Service Attacks
2013
Dassouki, K.
Debar, H.
Safa, H.
Hijazi, A.
A TCP delay-based mechanism for detecting congestion in the InternetIntl Conference on Communications and Information Technology (ICCIT) Denial of Service Attacks
2013
Chen, W.
Liu, Y.
Guan, Y.
Cardinality change-based early detection of large-scale cyber-attacksProc. IEEE INFOCOM Denial of Service Attacks
UCSD Network Telescope
2013
Callau-Zori, M.
Jimenez-Peris, R.
Gulisano, V.
Papatriantafilou, M.
Fu, Z.
Patino-Martinez, M.
STONE: A stream-based DDoS defense frameworkACM Symp. on Applied Computing (SAC) Denial of Service Attacks
2013
Kumar, P.A.R.
Selvakumar, S.
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systemsComputer Communications Denial of Service Attacks
UCSD Network Telescope
2012
Bhatia, S.
Schmidt, D.
Mohay, G.
Ensemble-based DDoS detection and mitigation modelConference on Security of Information and Networks (SIN) Denial of Service Attacks
2012
Fu, Z.Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigationChalmers Univ. of Technology, Gothenborg, Sweden Denial of Service Attacks
2012
Singh, J.
Kumar, K.
Sachdeva, M.
Sidhu, N.
DDoS attack's simulation using legitimate and attack real data setsJ. Scientific and Engineering Research Denial of Service Attacks
2012
Feitosa, E.
Souto, E.
Sadok, D.H.
An orchestration approach for unwanted Internet traffic identificationComputer Networks Denial of Service Attacks
2012
Anitha, R.
Karthik, R.
Pravin, V.
Thirugnanam, K.
A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference systemProc. Second Intl Conference on Computer Science, Engineering and Applications (ICCSEA) Denial of Service Attacks
2012
Rahmani, H.
Sahli, N.
Kamoun, F.
DDoS flooding attack detection scheme based on F-divergenceComputer Communications Denial of Service Attacks
2012
Zheng, L.
Zou, P.
Jia, Y
Han, W.
An online learning and unsupervised traffic anomaly detection systemAdvanced Science Lett. Denial of Service Attacks
2012
Karthick, R.R.
Hattiwale, V.P.
Ravindran, B.
Adaptive network intrusion detection system using a hybrid approachConference on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2011
Takahashi, E.K.
Chen, Y.
Lall, A.
Divergence in network trafficMidstates Conference on Undergraduate Research in Computer Science and Mathematics Denial of Service Attacks
2011
Le, D.Q.
Jeong, T.
Roman, H.E.
Hong, J.W.
Traffic dispersion graph based anomaly detectionSymp. on Information and Communication Technology (SolCT) Denial of Service Attacks
2011
Bhatia, S.
Mohay, G.
Tickle, A.
Ahmed, E.
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash eventConference on Availability, Reliability and Security (ARES) Denial of Service Attacks
2011
Khan, F.M.Assuring network service with bandwidth and integrity based fairnessUniv. Illinois, Urbana-Champaign Denial of Service Attacks
2016
Krenc, T.
Feldmann, A.
BGP prefix delegations: A deep diveInternet Measurement Conference (IMC) Paper Data Supplements
Topology with Archipelago
Topology with BGP
2015
Nithyanand, R.
Starov, O.
Zair, A.
Gill, P.
Schapira, M.
Measuring and mitigating AS-level adversaries against Torarxiv.org Paper Data Supplements
2017
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Labeling and Encoding Hierarchical Addressing for Scalable Internet RoutingAdvances in Computer and Computational Sciences Topology with Archipelago
2017
Sermpezis, P.
Nomikos, G.
Dimitropoulos, X.
Re-mapping the Internet: Bring the IXPs into Playarxiv.org Topology with Archipelago
Topology with BGP
2017
Nguyen, H.
Phung, C.
Secci, S.
Felix, B.
Nogueira, M.
Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks?arxiv.org Topology with Archipelago
2017
Mukherjee, S.
Sriram, S.
Vu, T.
Raychaudhuri, D.
EIR: Edge-aware inter-domain routing protocol for the future mobile internetComputer Networks Topology with Archipelago
2017
Kleineberg, K.Metric clusters in evolutionary games on scale-free networksarxiv.org Topology with Archipelago
2017
Jiang, Q.
Hu, H.
Hu, G.
Two-Type Information Fusion Based IP-to-AS Mapping Table RefiningJournal of Computer Science and Technology Topology with Archipelago
Topology with BGP
2017
Imani, M.
Barton, A.
Wright, M.
Forming Guard Sets using AS RelationshipsProceedings on Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2017
Gaston, E.W.High-frequency mapping of the IPv6 Internet using YarrpNaval Postgraduate School Topology with Archipelago
2017
Dong, W.
Gao, Y.
Wu, W.
Bu, J.
Chen, C.
Li, X.
Optimal Monitor Assignment for Preferential Link Tomography in Communication NetworksIEEE/ACM Transactions on Networking (TON) Topology with Archipelago
Topology with BGP
2017
Cho, S.
Nithyanand, R.
Razaghpanah, A.
Gill, P.
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomographyarxiv.org Topology with Archipelago
Topology with BGP
2016
Richter, P.
Smaragdakis, G.
Plonka, D.
Berger, A.
Beyond counting: New perspectives on the active IPv4 address spaceInternet Measurement Conference (IMC) Topology with Archipelago
2016
Marder, A.
Smith, J.M.
MAP-IT: Multipass accurate passive inferences from tracerouteInternet Measurement Conference (IMC) Topology with Archipelago
Topology with BGP
2016
Liaskos, C.
Dimitropoulos, X.
Tassiulas, L.
Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approachIEEE Trans. on Network and Service Management Topology with Archipelago
Topology with BGP
2016
Beverly, R.Yarrp'ing the Internet: Randomized high-speed active topology discoveryInternet Measurement Conference (IMC) Topology with Archipelago
2016
Lin, C.
Bi, Y.
Zhao, H.
Cai, W.
Research on bottleneck-delay in internet based on IP united mappingPeer-to-Peer Networking and Applications Topology with Archipelago
2016
Kleineberg, K.-K.
Boguna, M.
Serrano, A.
Papadopoulos, F.
Hidden geometric correlations in real multiplex networksNature Physics Topology with Archipelago
2016
Wang, Y.
Zhang, K.
Quantifying the flattening of Internet topologyProc. Intl Conference on Future Internet Technologies Topology with Archipelago
Topology with BGP
Topology with Skitter
2016
Shah, A.
Fontunge, R.
Papadopoulos, C.
Towards characterizing international routing detoursarxiv.org Topology with Archipelago
Topology with BGP
2016
Czyz, J.J.A brave new world: Studies on the deployment and security of the emerging IPv6 InternetUniv. of Michigan, Ann Arbor, MI, US Topology with Archipelago
2016
Nithyanand, R.
Singh, R.
Cho, S.
Gill, P.
Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client designarxiv.org Topology with Archipelago
2016
Rye, E.C.
Rohrer, J.P.
Beverly, R.
Revisiting AS-level graph reductionComputer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing resilience of inter-domain routing system under regional failuresKSII Trans. on Internet and Information Systems Topology with Archipelago
Topology with BGP
2016
Li, Q.Reducing short flows' latency in the internetUniv. Illinois, Urbana-Champaign Topology with Archipelago
Topology with BGP
2016
Veitch, D.
Vijayalayan, K.
Network timing and the 2015 leap secondPassive and Active Measurement (PAM) Topology with Archipelago
2016
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
A brief history of MPLS usage in IPv6Passive and Active Measurement (PAM) Topology with Archipelago
Topology with BGP
2016
Nomikos, G.
Dimitropoulos, X.
traIXroute: Detecting IXPs in traceroute pathsLecture Notes in Computer Science (LNCS) Topology with Archipelago
Topology with BGP
2016
Marcisak, S.Correlating inferred data plane IPv6 reboot events with control plane BGP activityNaval Postgraduate School, Monterey, CA, US Topology with Archipelago
2016
Jiao, B.
Shi, J.-M.
Graph perturbations and corresponding spectral changes in Internet topologiesComputer Communications Topology with Archipelago
2016
Wang, Z.
Li, Q.
Jin, F.
Xiong, W.
Wu, Y.
Hyperbolic mapping of complex networks based on community informationPhysica A: Statistical Mechanics and its Applications Topology with Archipelago
2016
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Towards variable length addressing for scalable Internet routingIEEE Intl Performance Computing and Communications Conference (IPCCC) Topology with Archipelago
2016
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type inference in Internet AS graphsIEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
Topology with BGP
2016
Tan, Z.D.H.Network Level Attacks and Defenses Against Anonymity NetworksGeorgetown University Topology with Archipelago
Topology with BGP
2016
Singh, J.Using Looking Glasses to Understand the Internet's StructureSeminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM) Topology with Archipelago
2016
Schuchard, M.
Geddes, J.
Schliep, M.
Hopper, N.
The Cost of the Path Not TakenIEEE Global Communications Conference (GLOBECOM) Topology with Archipelago
2016
Rye, E.C.
Rohrer, J.P.
Beverly, R.
Revisiting AS-level graph reductionIEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Jacquemart, Q.Towards Uncovering BGP Hijacking AttacksParisTech Topology with Archipelago
2016
Gosain, D.
Agarwal, A.
Acharya, H.B.
Chakravarty, S.
Qi points : placing decoy routers in the internetIndraprastha Institute of Information Technology Delhi (IIITD) Topology with Archipelago
Topology with BGP
2016
Gao, Q.
Wang, F.
Gao, L.
Quantifying AS Path Inflation by Routing PoliciesInternational Journal of Future Generation Communication and Networking Topology with Archipelago
2016
Chandrasekaran, B.Head into the Cloud: An Analysis of the Emerging Cloud InfrastructureDuke University Topology with Archipelago
Topology with BGP
2016
Canbaz, M.A.Data-driven large scale network-layer Internet simulationIEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2015
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
MPLS under the microscope: Revealing actual transit path diversityInternet Measurement Conference (IMC) Topology with Archipelago
2015
Medeiros, J.P.S.
Motta Pires, P.S.
Borges Neto, J.B.
Loureiro, A.A.F.
Minimization and placement of sensors in structurally observable networksProc. Intl Conference on Computer and Information Technology (CIT) Topology with Archipelago
2015
Gray, M.D.Discovery of IPv6 router interface addresses via heuristic methodsNaval Postgraduate School Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet Autonomous SystemsEPJ Data Science Topology with Archipelago
2015
Simoens, P.
Herzeele, L.V.
Vandeputte, F.
Vermoesen, L.
Challenges for orchestration and instance selection of composite services in distributed edge cloudsIntl. Symp. on Integrated Network Management (IM) Topology with Archipelago
2015
Edeline, K.
Donnet, B.
Towards a middlebox policy taxonomy: path impairmentsIntl Workshop on Network Science for Communication Networks (NetSciCom) Topology with Archipelago
2015
West, A.Toward a robust method of presenting a rich, interconnected deceptive network topologyNaval Postgraduate School Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet autonomous systemsarxiv.org Topology with Archipelago
2015
Mell, P.
Harang, R.
Gueye, A.
The resilience of the Internet to colluding country induced connectivity disruptionsNetwork and Distributed System Security Symp. (NDSS) Topology with Archipelago
2015
Jacquement, Q.Towards uncovering BGP hijacking attacksParisTech Topology with Archipelago
Topology with BGP
2015
Gao, Q.
Wang, F.
Gao, L.
Routing-policy aware peering for large content providersComputer Communications Topology with Archipelago
2015
Chandrasekaran, B.
Bai, M.
Schoenfield, M.
Berger, A.
Caruso, N.
Economou, G.
Gilliss, S.
Maggs, B.
Moses, K.
Duff, D.
Ng, K.C.
Sirer, E.G.
Weber, R.
Wong, B.
Alidade: IP Geolocation without Active ProbingDuke University Topology with Archipelago
Topology with BGP
2014
Hric, D.
Darst, R.K.
Fortunato, S.
Community detection in networks: Structural communities versus ground truthPhys. Rev. E Topology with Archipelago
Topology with BGP
2014
Hric, D.
Darst, R.K.
Fortunato, S.
Community detection in networks: Structural communities versus ground truthPhys. Rev. E Topology with Archipelago
Topology with BGP
2014
Fowler, J
Johnson, T
Simonetto, P
Lazos, P
Kobourov, S.
Schneider, M.
Aceda, C.
IMap: Visualizing network activity over Internet mapsVisualization for Cyber Security (VizSec) Topology with Archipelago
UCSD Network Telescope
2014
Durairajan, R.
Sommers, J.
Barford, P.
Layer 1-informed Internet topology measurementInternet Measurement Conference (IMC) Topology with Archipelago
2014
Kiremire, A.R.
Brust, M.R.
Phoha, V.V.
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemesComputer Networks Topology with Archipelago
2014
Juen, J.
Das, A.
Johnson, A.
Borisov, N.
Caesar, M.
Defending Tor from network adversaries: A case study of network path predictionarxiv.org Topology with Archipelago
2014
Craven, R.
Beverly, R.
Allman, M.
A middlebox-cooperative TCP for a non end-to-end internetACM SIGCOMM Computer Communication Review Topology with Archipelago
2014
Reed, D.
Warbritton, D.
Sicker, D.
Current trends and controversies in Internet peering and transit: Implications for the future evolution of the InternetConference on Communication, Information and Internet Policy (TPRC) Topology with Archipelago
2014
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
Comparative assessment of centrality indices and implications on the vulnerability of ISP networksIntl Teletraffic Congress (ITC) Topology with Archipelago
2014
Mosley, L.D.IPv6 network infrastructure and stability inferenceNaval Postgraduate School Topology with Archipelago
2014
Maggs, B.Mapping the whole InternetDuke Univ. Topology with Archipelago
Topology with BGP
2014
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoptionConference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) Topology with Archipelago
2014
Burnett, S.R.Empowering bystanders to facilitate Internet censorship measurement and circumventionGeorgia Tech Topology with Archipelago
UCSD Network Telescope
2014
Wright, J.E.Temporal comparisons of Internet topologyNaval Postgraduate School Topology with Archipelago
2014
Landry, B.Comparing internet probing methodologies through an analysis of large dynamic graphsNaval Postgraduate School Topology with Archipelago
2014
Jaggard, A.D.
Johnson, A.
Syverson, P.
Feigenbaum, J.
Representing network trust and using it to improve anonymous communicationarxiv.org Topology with Archipelago
Topology with BGP
2014
Kang, M.S.
Gligor, V.D.
Routing bottlenecks in the Internet - causes, exploits, and countermeasuresCarnegie Mellon Univ. Topology with Archipelago
Topology with BGP
2014
Tran, T.V.H.IPv6 geolocation using latency constraintsNaval Postgraduate School Topology with Archipelago
2014
Baltra, G.
Beverly, R.
Xie, G.G.
Ingress point spreading: A new primitive for adaptive active network mappingPassive and Active Measurement (PAM) Topology with Archipelago
2014
Xu, Y.
Ma, W.
Robustness analyses of Internet topology with power-law featuresIntl J. of Future Generation Communication and Networking Topology with Archipelago
2014
Orzen, S.-N.Domain relations in trees arborescence for interaction search on persistent routing availabilityIntl Symp. on Applied Machine Intelligence and Informatics (SAMI) Topology with Archipelago
2014
Motamedi, R.
Chandrasekaran, B.
Maggs, B.
Rejaie, R.
Willinger, W.
https://onrg.cs.uoregon.edu/pub/CIS-TR-2014-02.pdfUniversity of Oregon Topology with Archipelago
Topology with Skitter
2014
Gansner, E.R.
Krishnamurthy, B.
Willinger, W.
Bustamante, F.E.
Sanchez, M.A.
Demo abstract: towards extracting semantics by visualizing large traceroute datasetsComputing Topology with Archipelago
2013
Verigin, A.L.Evaluating the effectiveness of Sybil attacks against peer-to-peer botnetsUniv. of Victoria, Victoria, CA Topology with Archipelago
2013
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
The multiple instances of node centrality and their implications on the vulnerability of ISP networksarxiv.org Topology with Archipelago
2013
Johnson, A.
Wacek, C.
Jansen, R.
Sherr, M.
Syverson, P.
Users get routed: Traffic correlation on Tor by realistic adversariesACM SIGSAC Conference on Computer and Communications Security (CCS) Topology with Archipelago
Topology with BGP
2013
Vanaubel, Y.
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Network fingerprinting: TTL-based router signaturesInternet Measurement Conference (IMC) Topology with Archipelago
2013
Ma, L.
He, T.
Leung, K.K.
Swami, A.
Towsley, D.
Identifiability of link metrics based on end-to-end path measurementsInternet Measurement Conference (IMC) Topology with Archipelago
2013
Khan, A.
Kwon, T.
Kim, H.
Choi, Y.
AS-level topology collection through looking glass serversInternet Measurement Conference (IMC) Topology with Archipelago
2013
Sapegin, A.
Uhlig, S.
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing eventsComputer Communications Topology with Archipelago
2013
Daryl, L.H.A.Toward large-graph comparison measures to understand Internet topology dynamicsNaval Postgraduate School, Monterey, CA, US Topology with Archipelago
2013
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoptionIntl Computer Science Inst. (ICSI) Topology with Archipelago
2013
Chabarek, J.
Barford, P.
What's in a name?: decoding router interface namesProc. ACM workshop on HotPlanet Topology with Archipelago
2013
Lu, N.
Wang, Y.
Su, S.
Yang, F.
Han, R.
Filtering location optimization for the reactive packet filteringSecurity and Communication Networks Topology with Archipelago
2013
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
On the local approximations of node centrality in Internet router-level topologiesIntl Workshop on Self-Organizing Systems (IWSOS) Topology with Archipelago
2013
Chen, A.
Chan, E.W.W.
Luo, X.
Fok, W.W.T.
Chang, R.K.C.
An efficient approach to multi-level route analyticsIFIP/IEEE Symp. on Integrated Network Management Topology with Archipelago
2013
Yang, B.
Zhao, H.
Zhang, J.
Ai, J.
Jia, S.
Ge, x.
Liu, W.
Analysis of interlayer connection catastrophe characteristics in Internet AS level topologyTelkomnika Topology with Archipelago
2013
Wacek, C.
Tan, H.
Bauer, K.
Sherr, M.
An empirical evaluation of relay selection in TorNetwork and Distributed System Security Symp. (NDSS) Topology with Archipelago
Topology with BGP
2013
Wang, Y.
Bi, J.
Wu, J.
Revisiting the rich club of the Internet AS-level topologyIEICE Trans. Commun. Topology with Archipelago
Topology with Skitter
2012
Yu, M.
Jiang, W.
Li, H.
Stoica, I.
Tradeoffs in CDN designs for throughput oriented trafficACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Archipelago
2012
Sherry, J.Future architectures for middlebox processing services on the Internet and in the CloudUC Berkeley Topology with Archipelago
Topology with BGP
2012
Ren, D.
Wong, W.
Gary Chan, S.-H.
Toward continuous push-based P2P live streamingIEEE Global Telecommunications Conference (GLOBECOM) Topology with Archipelago
2012
Ahmad, M.Z.
Guha, R.
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computationJ. Supercomputing Topology with Archipelago
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Romano, D.
Enhancing the computation of distributed shortest paths on real dynamic networksMediterranean Conference on Algorithms Topology with Archipelago
2012
Wachs, M.
Grothoff, C.
Thurimella, R.
Partitioning the InternetConference on Risks and Security of Internet and Systems (CRiSIS) Topology with Archipelago
Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networksIEEE Conference on Local Computer Networks (LCN) Topology with Archipelago
2012
Tyson, G.
Kaune, S.
Miles, S.
El-khatib, Y.
Mauthe, A.
Taweel, A.
A trace-driven analysis of caching in content-centric networksIEEE Conference on Computer Communications and Networks (ICCCN) Topology with Archipelago
2012
Kambhampati, V.
Papadopolous, C.
Massey, D.
Epiphany: A location hiding architecture for protecting critical services from DDoS attacksIEEE/IFIP Conference on Dependable Systems and Networks (DSN) Topology with Archipelago
2012
Fiorese, A.
Simoes, P.
Boavida, F.
Peer selection in P2P service overlays using geographical location criteriaComputational Science and Its Applications (ICCSA) Topology with Archipelago
2012
Xu, Y.
Zhang, X.
Analysis of Internet robustness in attacksConference on Systems and Informatics (ICSAI) Topology with Archipelago
2012
Schlegel, R.
Wong, D.S.
Anonymous overlay network supporting authenticated routingInformation Sciences Topology with Archipelago
2012
Ren, D.
Chan, S.G.
Achieving high-bitrate overlay live streaming with proxy helpersPacket Video Workshop (PV) Topology with Archipelago
2012
Papadakis, H.
Fragopoulou, P.
Markatos, E.
Roussopoulos, M.
ITA: Innocuous topology awareness for unstructured P2P networksIEEE Trans. on Parallel and Distributed Systems Topology with Archipelago
Topology with BGP
2012
Faggiani, A.
Gregori, E.
Lenzini, L.
Mainardi, S.
Vecchio, A.
On the feasibility of measuring the internet through smartphone-based crowdsourcingSymp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) Topology with Archipelago
2012
Xu, Y.
Wang, Z.
Collapse by cascading failures in hybrid attacked regional InternetJ. Security and Its Applications Topology with Archipelago
2012
Jacquin, L.
Roca, V.
Kaafar, M.A.
Schuler, F.
Roch, J.-L.
IBTrack: an ICMP black holes trackerhal.archives-ouvertes.fr Topology with Archipelago
2012
Huang, H.
Zhang, B.
Chan, S.-H.G.
Cheung, G.
Frossard, P.
Coding and replication co-design for interactive multiview video streamingIEEE INFOCOM Topology with Archipelago
2012
Cicerone, S.
D'Angelo, G.
Di Stefano, G.
Frigioni, D.
Maurizio, V.
Engineering a new algorithm for distributed shortest paths on dynamic networksAlgorithmica Topology with Archipelago
2012
Wang, Y.
Su, S.
Yang, Y.
Ren, J.
A more efficient hybrid approach for single-packet IP tracebackEUROMICRO Conference on Parallel, Distributed and Network-Based Processing (PDP) Topology with Archipelago
Topology with Skitter
2012
D'Angelo, G.
D'Emidio, M.
Frigioni, D.
Maurizio, V.
Engineering a new loop-free shortest paths routing algorithmSymp. on Experimental Algorithms (SEA) Topology with Archipelago
2011
Sommers, J.
Erikson, B.
Barford, P.
On the prevalence and characteristics of MPLS deployments in the open InternetInternet Measurement Conference (IMC) Topology with Archipelago
Topology with BGP
2011
Zhang, Y.
Oliveira, R.
Wang, Y.
Su, S.
Zhang, B.
Bi, J.
Zhang, H.
Zhang, L.
A framework to quantify the pitfalls of using traceroute in AS-level topology measurementIEEE J. Selected Areas in Communications Topology with Archipelago
2011
Marchetta, P.
Merindol, P.
Donnet, B.
Pescape, A.
Pansiot, J.-J.
Topology discovery at the router level: a new hybrid tool targeting ISP networksIEEE J. Selected Areas in Communications Topology with Archipelago
Topology with Skitter
2011
Jesus, V.
Aguiar, R.L.
Steenkiste, P.
Topological implications of cascading interdomain bilateral traffic agreementsIEEE J. Selected Areas in Communications Topology with Archipelago
2011
Ahmad, M.Z.
Guha, R.
Internet exchange points and Internet routingConference on Network Protocols (ICNP) Topology with Archipelago
2011
Moreira, M.D.D.
Laufer, R.
Fernandes, N.C.
Duarte, O.C.M.B.
A stateless traceback technique for identifying the origin of attacks from a single packetIEEE Conference on Communications (ICC) Topology with Archipelago
2011
Gregori, E.
Lenzini, L.
Orsini, C.
k-clique communities in the Internet AS-level topology graphDistributed Computing Systems Workshops (ICDCSW) Topology with Archipelago
2011
Tomasik, J.
Weisser, M.-A.
Internet topology on as-level: Model, generation methods and toolIEEE Performance Computing and Communications Conference (IPCC) Topology with Archipelago
Topology with BGP
2011
Gregori, E.
Lenzini, L
Orsini, C.
k-dense communities in the internet AS-level topologyConference on Communication Systems and Networks (COMSNETS) Topology with Archipelago
2011
Gregori, E.
Improta, A.
Lenzini, L.
Orsini, C.
The impact of IXPs on the AS-level topology structure of the InternetComputer Communications Topology with Archipelago
2010
Fan, X.
Heidemann, J.
Selecting representative IP addresses for internet topology studiesInternet Measurement Conference (IMC) Topology with Archipelago
2010
Beverly, R.
Berger, A.
Xie, G.G.
Primitives for active internet topology mapping: toward high-frequency characterizationInternet Measurement Conference (IMC) Topology with Archipelago
2010
Ahmad, M.Z.
Guha, R.
Impact of Internet exchange points on Internet topology evolutionConference on Local Computer Networks (LCN) Topology with Archipelago
Topology with Skitter
2010
Tomasik, J.
Weisser, M.-A.
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchyIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with Archipelago
2010
Knauf, A.
Hege, G.
Schmidt, T.C.
Wahlisch, M.
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIPPrinciples, Systems and Applications of IP Telecommunications (IPTComm) Topology with Archipelago
2010
Zhang, Y.
Oliveira, R.
Zhang, H.
Zhang, L.
Quantifying the pitfalls of traceroute in AS connectivity inferencePassive and Active Measurement (PAM) Topology with Archipelago
2010
Laki, S.
Matray, P.
Haga, P.
Sebok, T.
Csabai, I.
Vattay, G.
Spotter: a model based active geolocation serviceIEEE Conference on Computer Communications (INFOCOM) Topology with Archipelago
2010
King, A.Efficient internet topology discovery techniquesUniv. Waikato, New Zealand Topology with Archipelago
2010
Ciceronea, S.
D'Angelo, G.
Di Stefanoa, G.
Frigioni, D.
Partially dynamic efficient algorithms for distributed shortest pathsTheoretical Computer Science Topology with Archipelago
2009
Zhang, G.-Q.
Zhang, G.-Q.
Cheng, S.-Q.
Zhou, T.
Symbiotic effect: A guideline for network modelingEPL (Europhysics Letters) Topology with Archipelago
2009
Germoglio, G.
Dias, B.
Sousa, P.
Automated and distributed network service monitoringAsia-Pacific Network Operations and Management Symp. (APNOMS) Topology with Archipelago
2009
Saucez, D.
Donnet, B.
Bonaventure, O.
On the impact of clustering on measurement reductionIFIP-TC6 Networking Conference (NETWORKING) Topology with Archipelago
2009
Dai, L
Cao, Y.
Cui, Y.
Xue, Y.
On scalability of proximity-aware peer-to-peer streamingComputer Communications Topology with Archipelago
Topology with BGP
2008
Wu, M.-F.
Jiang, T.M.
Wu, A.
A virtual service framework for service composition QoS based on active measurementSymp. on Service-Oriented System Engineering (SOSE) Topology with Archipelago
2008
Dramburg, M.Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer InternettopologienHochschule fuer Angewandte Wissenschaften Hamburg, Germany Topology with Archipelago
Topology with Skitter
2008
Wahlisch, M.
Schmidt, T.C.
Spalt, W.
What is happening from behind?: Making the impact of internet topology visibleCampus-Wide Information Systems Topology with Archipelago
Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Ge, X.
Research on the distribution of network nodes based on multiple measurement pointsComputer Science Topology with Archipelago
2007
Li, C.
Zhao, H.
Zhang, X.
Yuan, S.
Analysis on traveling time of internetChina Institute of Communications Topology with Archipelago
2006
Chan, H.
Dash, D.
Perrig, A.
Zhang, H.
Modeling adoptability of secure BGP protocolsJoint Conference on Measurement and Modeling of Computer Systems Topology with Archipelago
2005
Su, W.-J.
Zhao, H.
Xu, Y.
Zhang, W.-B.
Internet complex network separation degree analysis based on hopsJ. China Inst. of Communications Topology with Archipelago
2017
Haghtalab, N.
Laszka, A.
Procaccia, A.
Vorobeychik, Y.
Koutsoukos, X.
Monitoring stealthy diffusionKnowledge and Information Systems Topology with BGP
2017
Gregori, E.
Lenzini, L.
Luconi, V.
AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systemsComputer Communications Topology with BGP
2017
Burger, V.Wurzburger Beitrage zur Leistungsbewertung Verteilter SystemeUniv. Wurzburg Topology with BGP
2017
Yang, H.
Lam, S.S.
Scalable Verification of Networks With Packet Transformers Using Atomic PredicatesIEEE/ACM Transactions on Networking Topology with BGP
2017
Wang, Y.
Bi, J.
Zhang, K.
A SDN-Based Framework for Fine-Grained Inter-domain Routing DiversityMobile Networks and Applications Topology with BGP
2017
Tozal, M.E.Autonomous system ranking by topological characteristics: A comparative studyAnnual IEEE International Systems Conference (SysCon) Topology with BGP
2017
Suen, J.Y.
Navlakha, S.
Using Inspiration from Synaptic Plasticity Rules to Optimize Traffic Flow in Distributed Engineered NetworksNeural Computation Topology with BGP
2017
Shin, K.
Rad, T.
Faloutsos, C.
Patterns and anomalies in k-cores of real-world graphs with applicationsKnowledge and Information Systems Topology with BGP
2017
Sermpezis, P.
Dimitropoulos, X.
Can SDN Accelerate BGP Convergence? A Performance Analysis of Inter-domain Routing Centralizationarxiv.org Topology with BGP
2017
Pacifici, V.
Dan, G.
Distributed Caching Algorithms for Interconnected Operator CDNsIEEE Journal on Selected Areas in Communications Topology with BGP
2017
Nozaki, Y.
Golen, E.
Shenoy, N.
A modular architecture for scalable inter-domain routingIEEE Annual Computing and Communication Workshop and Conference (CCWC) Topology with BGP
2017
Muscoloni, A.
Cannistraci, C.V.
Local-ring network automata and the impact of hyperbolic geometry in complex network link-predictionarxiv.org Topology with BGP
2017
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.
Perrig, A.
Authentication Challenges in a Global EnvironmentACM Transactions on Privacy and Security (TOPS) Topology with BGP
2017
London, P.Distributed Optimization and Data Market DesignCalifornia Institute of Technology Topology with BGP
2017
Kuenzer, S.
Ivanov, A.
Manco, F.
Mendes, J.
Volchkov, Y.
Schmidt, F.
Yasukata, K.
Honda, M.
Huici, F.
Unikernels Everywhere: The Case for Elastic CDNsThe ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments Topology with BGP
2017
Huth, M.
Fabian, B.
Inferring business relationships in the internet backboneInternational Journal of Networking and Virtual Organisations Topology with BGP
2017
Hui, K.
Kim, S.H.
Wang, Q.
Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacksManagement Information Systems Quarterly Topology with BGP
UCSD Network Telescope
2017
Hiran, R.
Carlsson, N.
Shahmehri, N.
Collaborative framework for protection against attacks targeting BGP and edge networksComputer Networks Topology with BGP
2017
Grailet, J.F.
Donnet, B.
Towards a Renewed Alias Resolution with Space Search Reduction and IP FingerprintingNetwork Traffic Measurement and Analysis Conference (TMA) Topology with BGP
2017
Fanou, R.
Francois, P.
Aben, E.
Mwangi, M.
Goburdhan, N.
Valera, F.
Four years tracking unrevealed topological changes in the african interdomainComputer Communications Topology with BGP
2017
Bublitz, S.Towards a BitTorrent Weather ForecastUniversity of Zurich Topology with BGP
2017
Bangera, P.
Gorinsky, S.
Ads versus Regular Contents: Dissecting the Web Hosting EcosystemThe IFIP Networking Conference (NETWORKING 2017) Topology with BGP
2017
Asharov, G.
Demmler, D.
Schapira, M.
Schneider, T.
Segev, G.
Shenker, S.
Zohner, M.
Privacy-Preserving Interdomain Routing at Internet ScaleProceedings on Privacy Enhancing Technologies Topology with BGP
2017
Almeida, R.
Fonseca, O.
Fazzion, E.
Guedes, D.
Meira, W.
Cunha, I.
A Characterization of Load Balancing on the IPv6 InternetInternational Conference on Passive and Active Network Measurement Topology with BGP
2017
Al-Baghdadi, A.COMPUTING TOP-K CLOSENESS CENTRALITY IN UNWEIGHTED UNDIRECTED GRAPHS REVISITEDKent State University Topology with BGP
2016
Klick, J.
Lau, S.
Wahlisch, M.
Roth, V.
Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selectionInternet Measurement Conference (IMC) Topology with BGP
2016
Jonker, M.
Sperotto, A.
van Rijswijk-Deij, R.
Sadre, R.
Pras, A.
Measuring the adoption of DDoS protection servicesInternet Measurement Conference (IMC) Topology with BGP
2016
Comarela, G.
Terzi, E.
Crovella, M.
Detecting unusually-routed ASes: Methods and applicationsInternet Measurement Conference (IMC) Topology with BGP
2016
Chung, T.
Choffnes, D.
Mislove, A.
Tunneling for transparency: A large-scale analysis of end-to-end violations in the InternetInternet Measurement Conference (IMC) Topology with BGP
2016
Chung, T.
Liu, Y.
Choffnes, D.
Levin, D.
Maggs, B.M.
Mislove, A.
Wilson, C.
Measuring and applying invalid SSL certificates: The silent majorityInternet Measurement Conference (IMC) Topology with BGP
2016
Liquori, L.
Sereno, M.
LogNet: Extending Internet with a network aware discovery serviceInria-French Inst. for Research in Computer Science Topology with BGP
2016
Bergamini, E.
Wegner, M.
Lukarski, D.
Meyerhenke, H.
Estimating current-flow closeness centrality with a multigrid Laplacian solverarxiv.org Topology with BGP
2016
Singh, R.
Koo, H.
Miramirkhani, N.
Miraj F., Akoglu
L., Gill P.
The politics of routing: Investigating the relationship between AS connectivity and Internet freedomarxiv.org Topology with BGP
2016
Schuchard, M.
Hopper, N.
E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentivesarxiv.org Topology with BGP
2016
Hasan, S.A.U.The role of topology and contracts in Internet content deliveryUniv. of Carlos III de Madrid Topology with BGP
2016
Cardona, J.C.Inter-domain traffic management in an evolving Internet peering ecosystemUniv. Carlos III de Madrid Topology with BGP
2016
Li, S.
Duan, H.
Wang, Z.
Liang, J.
Li, X.
An accurate distributed scheme for detection of prefix interceptionScience China Information Sciences Topology with BGP
2016
Eppstein, D.
Goodrich, M.T.
Lam, J.
Mamano, N.
Mitzenmacher, M.
Torres, M.
Models and algorithms for graph watermarkingarxiv.org Topology with BGP
Topology with Skitter
2016
Guo, C.
Karsten, M.
On the feasibility of core-rooted path addressingIEEE/IFIP Network Operations and Management Symp. (NOMS) Topology with BGP
2016
Sukrit, G.
Rami, P.
Konstantin, K.
Comparative network analysis using KronFitComplex Networks Topology with BGP
2016
Niemela, M.Estimating Internet-scale Quality of Service parameters for VoIPLinkoping Univ. Topology with BGP
2016
Cardona, J.C.
Vissicchio, S.
Lucente, P.
Francois, P.
'I can't get no satisfaction': Helping autonomous systems identify their unsatisfied interdomain interestsIEEE Trans. on Network and Service Management Topology with BGP
2016
Agache, A.
Antichi, G.
Eberhardt, F.
Eggert, L.
Hasselmeyer, P.
Hohlfeld, O.
Honda, M.
Ivanov, A.
Kimmerlin, M.
Klauck, S.
Kommeri, J.
Lettieri, G.
Oechsner, S.
Plauth, M.
Raiciu, C.
Ripke, A.
Sarolahti, P.
Schulte, L.
Tsolakou, E.
Wojcik, M.
Initial design of cloud infrastructure and federation mechanismsSSICLOPS Topology with BGP
2016
Zhao, M.Accountability in distributed systems with incomplete informationUniversity of Pennsylvania Topology with BGP
2016
Zhang, X.
Moore, C.
Newman, M.E.J.
Random graph models for dynamic networksCornell University Topology with BGP
2016
Yuce, E.
Selcuk, A.A.
Server Notaries: A Complementary Approach to the Web PKI Trust ModelIACR Cryptology Topology with BGP
2016
Yang, Y.
Shi, X.
Yin, X.
Wang, Z.
The Power of Prefix Hijackings in the Internet HierarchyIEEE Trustcom/BigDataSE/ISPA Topology with BGP
2016
Wubbeling, M.
Meier, M.
Improved Calculation of aS Resilience against IP Prefix HijackingIEEE Conference on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wassermann, S.
Casas, P.
Donnet, B.
Leduc, G.
Mellia, M.
On the Analysis of Internet Paths with DisNETPerf, a Distributed Paths Performance AnalyzerIEEE Conference on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wassermann, S.
Casas, P.
Reverse Traceroute with DisNETPerf, a Distributed Internet Paths Performance AnalyzerAnnual IEEE Conference on Local Computer Networks Topology with BGP
2016
Wang, Y.
Bi, J.
Zhang, K.
Wu, Y.
A framework for fine-grained inter-domain routing diversity via SDNEighth International Conference on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2016
Wang, C.
Li, Z.
Huang, X.
Zhang, P.
Inferring the average as path length of the InternetIEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC) Topology with BGP
2016
Varghese, J.S.
Ruan, L.
Computing Customer Cones of Peering NetworksApplied Networking Research Workshop Topology with BGP
2016
Tozal, M.E.Enumerating single destination, policy-preferred paths in AS-level Internet topology mapsIEEE Sarnoff Symposium Topology with BGP
2016
Tozal, M.E.The Internet: A system of interconnected autonomous systemsAnnual IEEE Systems Conference (SysCon) Topology with BGP
2016
Teneva, N.
Mudrakarta, P.K.
Kondor, R.
Multiresolution Matrix CompressionInternational Conference on Artificial Intelligence and Statistics Topology with BGP
2016
Syamkumar, M.
Durairajan, R.
Barford, P.
Bigfoot: A geo-based visualization methodology for detecting BGP threatsIEEE Symposium on Visualization for Cyber Security (VizSec) Topology with BGP
2016
Sobrinho, J.L.
Vanbever, L.
Le, F.
Sousa, A.
Rexford, J.
Scaling the Internet Routing System Through Distributed Route AggregationIEEE/ACM Transactions on Networking Topology with BGP
2016
Shao, X.
Wang, F.
Gao, L.
Fujikawa, K.
Harai, H.
Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the InternetIEEE Intl Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2016
Semertzidis, K.
Pitoura, E.
Terzi, E.
Tsaparas, P.
Best Friends Forever (BFF): Finding Lasting Dense Subgraphsarxiv.org Topology with BGP
2016
Schuchard, M.J.Adversarial Degradation of the Availability of Routing Infrastructures and Other Internet-Scale Distributed SystemsUniversity of Minnesota Topology with BGP
2016
Satake, K.
Arakawa, S.
Murata, M.
Analyses of core-periphery structure in Internet's AS-level topologiesGraduate School of Information Science and Technology, Osaka University Topology with BGP
2016
Revelo, D.
Ricci, M.A.
Donnet, B.
Alvarez-Hamlin, J.I.
Unveiling the MPLS Structure on Internet TopologyInternational Workshop on Traffic Monitoring and Analysis (TMA) Topology with BGP
2016
Pacifici, V.
Dan, G.
Coordinated Selfish Distributed Caching for Peering Content-Centric NetworksIEEE/ACM Transactions on Networking Topology with BGP
2016
Nasr, M.
Houmansadr, A.
GAME OF DECOYS: Optimal Decoy Routing Through Game TheoryACM SIGSAC Conference on Computer and Communications Security Topology with BGP
2016
Motamedi, R.Measurement-Based Characterization of Large-Scale Networked SystemsUniversity of Oregon Topology with BGP
2016
Meghanathan, N.Advanced Methods for Complex Network AnalysisAdvances in Wireless Technologies and Telecommunication (AWTT) Topology with BGP
2016
Machado, F.F.ANALYSIS OF THE DEGREE RANKING STABILITY IN SCALE-FREE NETWORKSFederal University of Rio de Janeiro Topology with BGP
2016
Liu, Z.
Jin, H.
Hu, Y.C.
Bailey, M.
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the InternetACM SIGSAC Conference on Computer and Communications Security Topology with BGP
2016
Kriegel, P.DETERMINING THE LOCATION OF AUTONOMOUS SYSTEM RELATIONS AMONG TOP TIER INTERNET SERVICE PROVIDERS IN THE UNITED STATESUniversity of Oregon Topology with BGP
2016
Kotronis, V.
Kloti, R.
Rost, M.
Georgopoulos, P.
Ager, B.
Schmid, S.
Dimitropoulos, X.
Stitching Inter-Domain Paths over IXPsProceedings of the Symposium on SDN Research Topology with BGP
2016
Hoang, N.P.Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor NetworkGraduate School of Informatics, Kyoto University Topology with BGP
2016
Greunke, B.Distributed Emulation in Support of Large NetworksNaval Postgraduate School Topology with BGP
2016
Garcia-Robledo, A.
Diaz-Perez, A.
Morales-Luna, G.
Characterization and Coarsening of Autonomous System Networks: Measuring and Simplifying the InternetAdvanced Methods for Complex Network Analysis Topology with BGP
2016
Feng, Z.
Xu, M.
Yang, Y.
Revolutionizing the inter-domain business model by information-centric thinkingIEEE International Conference on Communications (ICC) Topology with BGP
2016
Eberle, W.
Holder, L.
Identifying Anomalies in Graph Streams Using Change DetectionInternational Workshop on Mining and Learning with Graphs Topology with BGP
2016
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
Jumpstarting BGP Security with Path-End ValidationACM SIGCOMM Conference Topology with BGP
2016
Chen, M.
Xu, M.
Li, Q.
Yang, Y.
Measurement of large-scale BGP events: Definition, detection, and analysisComputer Networks Topology with BGP
2016
Barton, A.
Wright, M.
DeNASA: Destination-Naive AS-Awareness in Anonymous CommunicationsProceedings on Privacy Enhancing Technologies Topology with BGP
2015
Wassermann, S.
Casas, P.
Donnet, B.
Towards DisNETPerf: a distributed Internet paths performance analyzerACM CoNEXT Student Workshop Topology with BGP
2015
Meiling, S.
Schmidt, T.C.
Steinbach, T.
On performance and robustness of Internet-based smart grid communication: A case study for GermanyIntl Conference on Smart Grid Communications (SmartGridComm) Topology with BGP
2015
Johnson, A.
Jansen, R.
Jaggard, A.D.
Feigenbaum, J.
Syverson, P.
Avoiding the Man on the Wire: Improving Tor's security with trust-aware path selectionarxiv.org Topology with BGP
2015
Hirayama, T.
Toyoda, K.
Sasase, I.
Fast target link flooding attack detection scheme by analyzing traceroute packets flowIntl Workshop on Information Forensics and Security (WIFS) Topology with BGP
2015
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
One hop for RPKI, one giant leap for BGP securityProc. Workshop on Hot Topics in Networks Topology with BGP
2015
Chen, Z.
Bi, J.
Fu, Y.
Wang, Y.
Xu, A.
MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDNIntl Conference on Network Protocols (ICNP) Topology with BGP
2015
Szabo, D.
Korosi, A.
Biro, J.
Gulyas, A.
Deductive way of reasoning about the Internet AS level topologyChin. Phys. B Topology with BGP
2015
Meslmawy, M.A.S.Efficient resources management in a ditributed computer system, modeled as a dynamic complex systemUniv. du Havre Topology with BGP
2015
Li, S.
Duan, H.
Wang, Z.
Li, X.
Route leaks identification by detecting routing loopsIntl Conference on Security and Privacy in Communication Systems (SecureComm) Topology with BGP
2015
Konte, M.
Perdisci, R.
Feamster, N.
ASwatch: An AS reputation system to expose bulletproof hosting ASesACM SIGCOMM Computer Communication Review Topology with BGP
2015
Chiu, Y.-C.
Schlinker, B.
Radhakrishnan, A.B.
Katz-Bassett, E.
Govindan, R.
Are we one hop away from a better Internet?Internet Measurement Conference (IMC) Topology with BGP
2015
Anwar, R.
Niaz, H.
Choffnes, D.
Cunha, I.
Gill, P.
Katz-Bassett, E.
Investigating interdomain routing policies in the wildInternet Measurement Conference (IMC) Topology with BGP
2015
Ahmed, N.
Sarac, K.
An experimental study on inter-domain routing dynamics using IP-level path tracesConference on Local Computer Networks (LCN) Topology with BGP
2015
Yang, H.
Lam, S.S.
Scalable verification of networks with packet transformers using atomic predicatesUniv. Texas, Austin Topology with BGP
2015
Lee, T.
Szalachowski, P.
Barrera, D.
Perrig, A.
Lee, H.
Watrin, D.
Bootstrapping real-world deployment of future Internet architecturesarxiv.org Topology with BGP
2015
Kurar, B.
Tahboub, R.
Internet scale DoS attacksIntl J. of Applied Mathematics, Electronics and Computers Topology with BGP
2015
Abu-Ata, M.
Dragan, F.F.
Metric tree-like structures in real-world networks: an empirical studyNetworks Topology with BGP
Topology with Skitter
2015
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type prediction in Internet AS graphsIowa State Univ. Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Brief announcement: Routing the Internet with very few entriesProc. Symp. on Principles of Distributed Computing (PODC) Topology with BGP
2015
Rye, E.C.Evaluating the limits of network topology inference via virtualized network emulationNaval Postgraduate School Topology with BGP
2015
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.-J.
Perrig, A.
Designing a global authentication infrastructurearxiv.org Topology with BGP
2015
Chen, C.
Matsumoto, S.
Perrig, A.
ECO-DNS: Expected consistency optimization for DNSIntl. Conference on Distributed Computing Systems (ICDCS) Topology with BGP
2015
Tao, N.
Chen, X.
Fu, X.
AS path inference: From complex network perspectiveNetworking Conference (IFIP) Topology with BGP
2015
Lee, J.Y.
Oh, J.C.
A node-centric reputation computation algorithm on online social networksApplications of Social Media and Social Network Analysis Topology with BGP
2015
Fanou, R.
Francois, P.
Aben, E.
On the diversity of interdomain routing in AfricaLecture Notes in Computer Science (LNCS) Topology with BGP
2015
Erunika, O.
Kaneko, K.
Taraoka, F.
Performance evaluation of host-based mobility management schemes in the InternetIntl. Conference on Mobile Computing and Ubiquitous Networking (ICMU) Topology with BGP
2015
Wang, M.
Zhou, H.
Chen, J.
OpenISMA: An Approach of Achieving a Scalable OpenFlow Network by Identifiers Separating and MappingSeventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) Topology with BGP
2015
Shah, A.
Papadopoulos, C.
Characterizing International BGP DetoursColorado State University Technical Report Topology with BGP
2015
Nakata, Y.
Arakawa, S.
Murata, M.
A provider and peer selection policy for the future sustainable internetIntl J. of Management and Network Economics Topology with BGP
2015
Masatoshi, E.
Hayama, H.
Tsuyoshi, O.
Yamaguchi, Y.
A Proposal of Estimation Method of Consumed Memory Amount by Regression Analysis for Constructing AS Emulation Environment by Virtual ComputerNara Institute of Science and Technology Topology with BGP
2015
Leskovec, J.
Lang, K.J.
Dasgupta, A.
Mahoney, M.W.
Large-scale community structure in social and information networks Topology with BGP
2015
Kloti, R.
Kotronis, V.
Ager, B.
Dimitropoulos, X.
Policy-compliant path diversity and bisection bandwidthIEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2015
Hu, X.Y.
Gong, J.
Multipath inter-domain routing for named data networking Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Router in Internet with fifteen entriesFrancophone Meeting on Algorithmic Aspects of Telecommunications Topology with BGP
2015
Eikema, B.BGP Routing Security and Deployment StrategiesUniversity of Amsterdam Topology with BGP
2015
Eberle, W.
Holder, L.
Scalable anomaly detection in graphsIntelligent Data Analysis Topology with BGP
2015
Acedo, J.C.Evolution of the Internet topology from a regional perspectiveUniv. of Arizona Topology with BGP
2014
Palacin, M.
Bikfalvi, A.
Oliver, M.
Mercury: Revealing hidden interconnections between access ISPs and content providersEUNICE Topology with BGP
2014
Johnson, T.
Lazos, L.
Network anomaly detection using autonomous system flow aggregatesIEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2014
Ahmed, N.
Kamil, Sarac
Measuring path divergence in the InternetIntl Conference on Performance Computing and Communications (IPCCC) Topology with BGP
2014
Lodhi, A.H.The economics of internet peering interconnectionsGeorgia Inst. of Technology Topology with BGP
2014
Yang, H.
Lam, S.S.
Collaborative verification of forward and reverse reachability in the Internet data planeIEEE Intl Conference on Network Protocol (ICNP) Topology with BGP
2014
Sousa, A.C.M.Scaling the Internet routing system through route aggregationTecnico Lisboa Topology with BGP
2014
Sha, Z.
Panchal, J.
Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice modeIntl Conference on Systems, Man, and Cybernetics (SMC) Topology with BGP
2014
Retvari, G.
Szabo, D.
Gulyas, A.
Korosi, A.
Tapolcai, J.
An information-theoretic approach to routing scalabilityProc. Workshop on Hot Topics in Networks (HotNets) Topology with BGP
2014
Gamperli, A.
Kotronis, V.
Dimitropoulos, X.
Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation frameworkSIGCOMM Computer Communication Review Topology with BGP
2014
Eberle, W.
Holder, L.
A partitioning approach to scaling anomaly detection in graph streamsIntl. Conference on Big Data Topology with BGP
2014
Wu, X.
Griffioen, J.
Supporting application-based route selectionIntl Conference on Computer Communication and Networks (ICCCN) Topology with BGP
2014
Sankey, J.
Wright, M.
Dovetail: stronger anonymity in next-generation Internet routingIntl Symp. on Privacy Enhancing Technologies (PETS) Topology with BGP
2014
Bangera, P.
Gorinsky, G.
Economics of traffic attraction by transit providersIFIP Networking Conf. Topology with BGP
2014
Ascigil, O.
Calvert, K.L.
Griffioen, J.N.
On the scalability of interdomain path computationsNetworking Conference (IFIP) Topology with BGP
2014
Zhu, M.
Li, J.
Liu, Y.
Li, D.
Wu, J.
TED: Inter-domain traffic engineering via deflectionIntl Symp. of Quality of Service (IWQoS) Topology with BGP
2014
Zhu, M.
Liu, Y.
Li, J.
Wu, J.
CCOF: Congestion control on the fly for inter-domain routingIntl Workshop on Local and Metropolitan Area Networks (LANMAN) Topology with BGP
2014
Qazi, S.
Moors, T.
Disjoint-path selection in Internet: What traceroutes tell us?arxiv.org Topology with BGP
2014
Li, M.
Wang, H.
Yang, J.
Li, C.
A value based framework for provider selection of regional ISPsSymp. on Network Operations and Management (NOMS) Topology with BGP
Topology with Skitter
2014
Borici, A.
Thomo, A.
Semantic graph compression with hypergraphsIntl Conference on Advanced Information Networking and Applications Topology with BGP
2014
Visala, K.
Keating, A.
Khan, R.H.
Models and tools for the high-level simulation of a name-based interdomain routing architectureComputer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2014
Sha, Z.
Panchal, J.H.
Estimating local decision-making behavior in complex evolutionary systemsJ. of Mechanical Design Topology with BGP
2014
Sahhaf, S.
Tavernier, W.
Colle, D.
Pickavet, M.
Demeester, P.
Availability analysis of resilient geometric routing on Internet topologyIntl Conference on Design of Reliable Communication Networks (DRCN) Topology with BGP
2014
Hasan, S.
Gorinsky, S.
Dovrolis, C.
Sitaraman, R.K.
Trade-offs in optimizing the cache deployments of CDNsIEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2014
Chen, K.
Fhoffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P usersIEEE Trans. on Computers Topology with BGP
2014
Mazloum, R.
Buob, M.-O.
Auge, J.
Baynat, B.
Ross, D.
Friedman, T.
Violation of interdomain routing assumptionsPassive and Active Measurement (PAM) Topology with BGP
2014
Laszka, A.
Johnson, B.
Grossklags, J.
Felegyhazi, M.
Estimating systematic risk in real-world networksProc. Conference on Financial Cryptography and Data Security Topology with BGP
2014
Houmansadr, A.
Wong, E.L.
Shmatikov, V.
No direction home: The true cost of routing around decoysNetwork and Distributed System Security Symp. (NDSS) Topology with BGP
2014
Tan, F
Wu, J.
Xia, Y.
Tse, C.K.
Traffic congestion in interconnected complex networksarxiv.org Topology with BGP
2014
Geva, M.
Herzberg, A.
Gev, Y.
Bandwidth Distributed Denial of Service: Attacks and defensesIEEE Security and Privacy Topology with BGP
2013
Lee, S.B.
Kang, M.S.
Gligor, V.D.
CoDef: Collaborative defense against large-scale link-flooding attacksACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eriksson, B
Durairajan, R.
Barford, P.
RiskRoute: A framework for mitigating network outage threatsACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eberle, W.
Holder, L.
Incremental anomaly detection in graphsIntl Conference on Data Mining Workshops Topology with BGP
2013
Gersch, J.
Massey, D.
Characterizing vulnerability to IP hijack attemptsIEEE Intl Conference on Technologies for Homeland Security (HST) Topology with BGP
2013
Zhao, M.
Aditya, P.
Chen, A.
Lin, Y.
Haeberlen, A.
Druschel, P.
Maggs, B.
Wishon, B.
Ponec, M.
Peer-assisted content distribution in Akamai NetSessionInternet Measurement Conference (IMC) Topology with BGP
2013
Papadopoulos, S.
Theodoridis, G.
Tzovaras, D.
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomaliesVisualization for Cyber Security (VizSec) Topology with BGP
2013
Karaarslan, E.
Perez, A.G.
Siaterlis, C.
Recreating a large-scale BGP incident in a realistic environmentInformation Sciences and Systems , Proc Intl Symp. on Computer and Information Sciences Topology with BGP
2013
Bangera, P.
Gorinsky, S.
An economic perspective on traffic attraction by Internet transit providersIEEE Intl Conference on Network Protocols (ICNP) Topology with BGP
2013
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attackHong Kong Univ. of Science and Technology Topology with BGP
UCSD Network Telescope
2013
Meirom, E.A.
Mannor, S.
Orda, A.
Network formation games and the Internet structurearxiv.org Topology with BGP
2013
Lian, W.
Rescorla, E.
Shacham, H.
Savage, S.
Measuring the practical impact of DNSSEC deploymenUsenix Security Conference (SEC) Topology with BGP
2013
Lee, J.Y.
Oh, J.C.
A model for recursive propagations of reputations in social networksIEEE/ACM Intl Conference on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2013
Wang, Y.
Wang, Z.
Zhang, L.
An epidemic-dynamics-based model for CXPST spreading in inter-domain routing systemProc. Intl Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA) Topology with BGP
2013
Nappa, A.
Rafique, M.Z.
Caballero1, J.
Driving in the cloud: An analysis of drive-by download operations and abuse reportingProc. Intl Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing survivability of inter-domain routing system under cascading failuresFrontiers in Internet Technologies, Second CCF Internet Conference of China (ICoC) Topology with BGP
2013
Kaur, B.
Kahlon, K.S.
Sharma, S.
Inter-domain routing with shielded infrastructure and buzzer techniqueIntl J. of Computer Applications Topology with BGP
2013
Pacifici, V.
Dan, G.
Stable content-peering of autonomous systems in a content-centric networkSwedish National Computer Networking Workshop (SNCNW) Topology with BGP
2013
Misseri, X.
Gojmerac, I.
Rougier, J.-L.
IDRD: Enabling inter-domain route diversityIEEE Intl Conference on Communications (ICC) Topology with BGP
2013
Lehrieder, F.Performance evaluation and optimization of content distribution using overlay networksJulius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE Topology with BGP
2013
Sankey, J.MDovetail: stronger anonymity in next-generation Internet routingUniv. Texas, Arlington, TX, US Topology with BGP
2013
Jiang, J.
Luo, J.
Li, W.
Lu, Y.
Constraint conditions to eliminate AS incentive of lying in interdomain routingSymp. on Integrated Network Management (IM) Topology with BGP
2013
Hsiao, H.-C.
Kim, T.H.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.
Perrig, A.
STRIDE: Sanctuary Trail - Refuge from Internet DDoS EntrapmentProc. ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS) Topology with BGP
2013
Pacifici, V.
Dan, G.
Content-peering dynamics of autonomous caches in a content-centric networkProc. IEEE INFOCOM Topology with BGP
2013
Neudorfer, L.
Shavitt, Y.
Zilberman, N.
Improving AS relationship inference using PoPsProc. IEEE INFOCOM Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
Taenaka, Y.
Hazeyama, H.
PhishCage: reproduction of fraudulent websites in the emulated InternetProc. Intl ICST Conference on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
COSMO - Emulation of Internet traffic (poster abstract)Proc. Intl ICST Conference on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyachi, T.
Miwa, S.
Design and implementation of XBurnerProc. Intl ICST Conference on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Marchetta, P.
de Donato, W.
Pescape, A.
Detecting third-party addresses in traceroute traces with IP timestamp optionPassive and Active Measurement (PAM) Topology with BGP
2013
Camacho, J.M.
Garcia-Martinez, A.
Bagnulo, M.
Valera, F.
BGP-XM: BGP eXtended multipath for transit Autonomous SystemsComputer Networks Topology with BGP
2013
Matsuda, K.
Hasegawa, G.
Kamei, S.
Murata, M.
A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurementIEICE Trans. on Information and Systems Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
A study of IP prefix hijacking in cloud computing networksSecurity Comm. Networks Topology with BGP
2013
Qin, D.
Yang, J.
Wang, H.
Experimental study on diversity and novelty of interdomain pathsChinese Journal of Electronics Topology with BGP
2013
Palacin, M.
Oliver, M.
Infante, J.
Oechsner, S.
Bikfalvi, A.
The impact of content delivery networks on the Internet ecosystemJ. of Information Policy Topology with BGP
2013
Moses, K.V.Improving IP-based geo-location through Internet topology and geospatial datasetsDuke Univ., Durham, NC, US Topology with BGP
2013
Mislove, A.
Koppula, H.S.
Gummadi, K.P.
Druschel, P.
Bhattacharjee, B.
An empirical validation of growth models for complex networksDynamics On and Of Complex Networks Topology with BGP
2013
Erola, P.
Gomez, S.
Arenas, A.
On the routability of the InternetDynamics On and Of Complex Networks Topology with BGP
2013
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-Betweenness vertices from heterogeneous networksThe Influence of Technology on Social Network Analysis and Mining, Ch. 11 Topology with BGP
2012
Vasilakos, X.
Katsaros, K.
Xylomenos, G.
Cloud computing for global name-resolution in information-centric networksIEEE Symp. on Network Cloud Computing and Applications (NCCA) Topology with BGP
2012
Meyer, S.
Wahlisch, M.
Schmidt, T.C.
Exploring reachability via settlement-free peeringACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2012
Ekbatani, H.R.Investigating the mutual impact of the P2P overlay and the AS-level underlayUniv. Oregon, Eugene, OR, US Topology with BGP
2012
Schuchard, M.
Geddes, J.
Thompson, C.
Hopper, N.
Routing around decoysACM Conference on Computer and Communications Security (CCS) Topology with BGP
2012
Dinh, T.N.
Shen, Y.
Thai, M.T.
An efficient spectral bound for link vulnerability assessment in large-scale networksIEEE Military Communications Conference (MILCOM) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
A tale of nine Internet exchange points: studying path latencies through major regional IXPsIEEE Conference on Local Computer Networks (LCN) Topology with BGP
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the internet evolutionNetwork Operations and Management Symp. (APNOMS) Topology with BGP
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the Internet evolutionNetwork Operations and Management Symp. (APNOMS) Topology with BGP
2012
Juen, J.Protecting anonymity in the presence of autonomous system and internet exchange level adversariesUniv. Illinois, Urbana-Champaign Topology with BGP
2012
Cohen, N.
Couderty, D.
Lancin, A.
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphsProject-Team MASCOTTE, INRIA Topology with BGP
2012
Burger, V.
Lehrieder, F.
Hossfeld, T.
Seedorf, J.
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarmsTeletraffic Congress (ITC) Topology with BGP
2012
Rajahalma, J.Inter-domain incentives and Internet architectureAalto Univ., FI Topology with BGP
2012
Orman, G.K.
Labatut, V.
Cherifi, H.
Comparative evaluation of community detection algorithms: a topological approachJ. Stat. Mechanics: Theory and Experiment Topology with BGP
2012
Gjoka, M.
Kurant, M.
Markopoulou, A.
2.5K-graphs: from sampling to generationarxiv.org Topology with BGP
2012
Beben, A.
Batalla, J.M.
Chai, W.K.
Sliwinski, J.
Multi-criteria decision algorithms for efficient content delivery in content networksAnn. Telecommunications Topology with BGP
2012
Ager, B.
Chatzis, N.
Feldmann, A.
Sarrar, N.
Uhlig, S.
Willinger, W.
Anatomy of a large European IXPACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2012
Sherry, J.
Kim, D.
Mahalingam, S.
Tang, A.
Wang, S.
Ratnasamy, S.
Netcalls: End host function calls to network traffic processing servicesUC Berkeley Topology with BGP
2012
Fujikawa, K.
Tazaki, H.
Harai, H.
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS networkSymp. on Applications and the Internet (SAINT) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Evaluating end-user network benefits of peering with path latenciesIEEE Conference on Computer Communications and Networks (ICCCN) Topology with BGP
2012
Tomasik, J.
Weisser, M.-A.
The inter-domain hierarchy in measured and randomly generated AS-level topologiesIEEE Conference on Communications (ICC) Topology with BGP
2012
Sobrinho, J.L.
Tiago Quelhas, T.
A theory for the connectivity discovered by routing protocolsIEEE/ACM Trans. on Networking (TON) Topology with BGP
2012
Keating, A.Models for the simulation of a name-based interdomain routing architectureAalto Univ., FI Topology with BGP
2012
Hsiao, H.-C.
Kim, T.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.D.
Perrig, A.
Sanctuary trail: refuge from Internet DDoS entrapmentCarnegie Mellon Univ. Topology with BGP
2012
Deng, W.
Muhlbauer, W.
Yang, Y.
Zhu, P.
Lu, X.
Plattner, B.
Shedding light on the use of AS relationships for path inferenceJ. Communications and Networks Topology with BGP
2012
Cesareo, J.
Karlin, J.
Schapira, M.
Rexford, J.
Optimizing the placement of implicit proxiesPrinceton Univ. Topology with BGP
2012
Cesareo, J.Optimizing implicit proxy placement to evade traffic filtersPrinceton Univ. Topology with BGP
2012
Tozal, M.E.
Sarac, K.
Estimating network layer subnet characteristics via statistical samplingIntl IFIP TC 6 Networking Conf., Part I Topology with BGP
2012
Seibert, J.Security and economic implications of localizing traffic in overlay networksPurdue Univ. Topology with BGP
2012
Saucez, D.
Donnet, B.
On the dynamics of locators in LISPNetworking Topology with BGP
2012
Nozaki, Y.
Tuncer, H.
Shenoy, N.
ISP tiered model based architecture for routing scalabilityIEEE Conference on Communications (ICC) Topology with BGP
2012
Liu, Y.
Su, J.
Chang, R.K.C.
LDC: Detecting BGP prefix hijacking by load distribution changeParallel and Distributed Processing Symp. Workshops (IPDPSW) Topology with BGP
2012
Hasan, S.
Gorinsky, S.
Obscure giants: detecting the provider-free ASesNetworking Topology with BGP
2012
Chaudhury, A.
Basuchowdhuri, P.
Majumder, S.
Spread of information in a social network using influential nodesAdvances in Knowledge Discovery and Data Mining Topology with BGP
2012
Chai, W.K.
He, D.
Psaras, I.
Pavlou, G.
Cache 'less for more' in information-centric networksNetworking Topology with BGP
2012
Pasquini, R.
Verdi, F.L.
Magalhaes, M.F.
Towards local routing state in the future internetWPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2012
Liu, H.
Hu, X.
Zhao, D.
Lu, X.
Failure isolation based defense against Internet CXPST-like attackJ. Hybrid Information Technology Topology with BGP
2012
Strowes, S.D.
Perkins, C.
Harnessing Internet topological stability in Thorup-Zwick compact routingIEEE INFOCOM Topology with BGP
2012
Sobrinho, J.L.
Le, F.
A fresh look at inter-domain route aggregationIEEE INFOCOM Topology with BGP
2012
Ribeiro, B.
Basu, P.
Towsley, D.
Multiple random walks to uncover short paths in power law networksIEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Qin, D.
Yang, J.
Liu, Z.
Wang, H.
Zhang, B.
Zhang, W.
AMIR: Another multipath interdomain routingIEEE Conference on Advanced Information Networking and Applications (AINA) Topology with BGP
2012
Lutu, A.
Bagnulo, M.
Stanojevic, R.
An economic side-effect for prefix deaggregationIEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Grey, M.
Rossberg, M.
Schaefer, G.
Automatic creation of VPN backup paths for improved resilience against BGP-attackersACM Symp. on Applied Computing (SAC) Topology with BGP
2012
Qin, D.
Yang, J.
Wang, H.
Zhang, B.
Gao, L.
Liu, Z.
Multipath interdomain routing via deviation from primary pathConference on Information Networking (ICOIN) Topology with BGP
2012
Edwards, B.
Hofmeyr, S.
Stelle, G.
Forrest, S.
Internet topology over timearxiv.org Topology with BGP
2012
Wei, W.
Yingjie, X.
Yabo, D.
ASTVA: DDoS-limiting architecture for Next Generation InternetAdv. Materials Research Topology with BGP
2012
Chen, Y.
Le Merrer, E.
Li, Z.
Yaning Liu, Y.
Simon, G.
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTVComputer Networks Topology with BGP
2011
Drivere, A.A.Can we study the topology of the Internet from the vantage points of large and small content providers?Youngstown State Univ. Topology with BGP
2011
Liu, Y.
Peng, W.
Su, J.
Study on IP prefix hijacking in cloud computing networks based on attack planningConference on Trust, Security and Privacy in Computing and Communications (TrustCom) Topology with BGP
2011
Chen, M.
Yu, L.
Bai, H.
Two propositions about geographical distributions of BitTorrent file resourcesConference on Informatics, Cybernetics, and Computer Engineering (ICCE) Topology with BGP
2011
Takahashi, Y.
Ishibashi, K.
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted trafficConference on Network Games, Control and Optimization (NetGCooP) Topology with BGP
2011
Kurant, M.
Markopoulou, A.
Towards unbiased BFS samplingIEEE J. Selected Areas in Communications Topology with BGP
2011
Gjoka, M.
Kurant, M.
Butts, C.T.
Markopoulou, A.
Practical recommendations on crawling online social networksIEEE J. Selected Areas in Communications Topology with BGP
2011
Zhang, B.-F.
Li, Y.
Liu, Y.-J.
Su, J.-S.
Analysis of prefix hijacking based on AS hierarchical modelConference on Network and System Security (NSS) Topology with BGP
2011
Szekeres, A.Multi-path inter-domain routing: The impact on BGP's scalability, stability and resilience to link failuresUniv. Politehnica of Bucharest and Vrije Univ. Amsterdam Topology with BGP
2011
Alvarez-Hamelin, J.I.
Anunziata, D.
Beiro, M.G.
Barrat, A.
Dall'Asta, L.
Vespignani, A.
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool)Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires Topology with BGP
2011
Wong, E.L.
Shmatikov, V.
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routingConference on Dependable Systems and Networks (DSN) Topology with BGP
2011
Strowes, S.D.
Mooney, G.
Perkins, C.
Compact routing on the Internet AS-graphIEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2011
Liu, Y.
Dai, B.
Zhu, P.
Su, J.
Whom to convince? It really matters in BGP prefix hijacking attack and defenseFuture Information Technology Topology with BGP
2011
Karaoglu, H.T.
Yuksel, M.
Gunes, M.H.
On the scalability of path exploration using opportunistic path-vector routingIEEE Conference on Communications (ICC) Topology with BGP
2011
Helminger, M.Interactive visualization of global routing dynamicsTechnische Univ. Muenchen, Faculty of Informatics Topology with BGP
2011
Amaral, P.
Silva, E.
Bernardo, L.
Pinto, P.
Inter-domain traffic engineering using an AS-level multipath routing architectureIEEE Conference on Communications (ICC) Topology with BGP
2011
Siritana, H.
Kitisin, S.
Gertphol, S.
A study of autonomous system relationships within ThailandConference on Computer Science and Software Engineering (JCSSE) Topology with BGP
2011
Akashi, O.Analysis of cooperative management strategies against route-hijackingIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
Topology with Skitter
2011
Scholz, J.
Greiner, M.
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metricsEPL (Europhysics Letters) Topology with BGP
Topology with Skitter
2011
Deng, W.
Zhu, P.
Xiong, N.
Xiao, Y.
Xiaofeng, H.
How resilient are individual ASes against AS-level link failures?IEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2011
Deng, W.
Karaliopoulos, M.
Muehlbauer, W.
Zhu, P.
Lu, X.
Plattner, B.
k-Fault tolerance of the Internet AS graphComputer Networks Topology with BGP
2011
Wu, H.
Kvizhinadze, G.
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequenciesStatistics and Probability Letters Topology with BGP
2011
Melnik, S.
Hackett, A.
Porter, M.A.
Mucha, P.J.
Gleeson, J.P.
The unreasonable effectiveness of tree-based theory for networks with clusteringPhys. Rev. E Topology with BGP
Topology with Skitter
2011
Bangera, P.
Gorinsky, S.
Impact of prefix hijacking on payments of providersConference on Communication Systems and Networks (COMSNETS) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing systemJ. of Next Generation Information Technology Topology with BGP
2010
Rasti, A.H.
Magharei, N.
Rejaie, R.
Willinger, W.
Eyeball ASes: from geography to connectivityInternet Measurement Conference (IMC) Topology with BGP
2010
Huang, D.
Zhao, J.
Wang, X.
Trading bandwidth for playback lag: Can active peers help?Multi-media Conf. Topology with BGP
2010
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols?ACM SIGCOMM Computer Communication Review Topology with BGP
2010
Asai, H.
Esaki, H.
Estimating AS relationships for application-layer traffic optimizationWorkshop on Incentives, Overlays, and Economic Traffic Control (ETM) Topology with BGP
2010
Asai, H.
Esaki, H.
Towards interdomain transit traffic reduction in peer-assisted content delivery networksSymp. on Telecommunications Network Strategy and Planning (NETWORKS) Topology with BGP
2010
Hanif, S.Impact of topology on BGP convergenceDept. Computer Science, VU Univ. Amsterdam Topology with BGP
2010
Guo, T.
Wang, N.
Tafazolli, R.
Moessner, K.
Policy-aware virtual relay placement for inter-domain path diversityIEEE Symp. on Computers and Communications (ISCC) Topology with BGP
2010
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-betweenness verticesConference on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2010
Elena, E.
Rougier, J.
Secci, S.
Characterisation of AS-level path deviations and multipath in Internet routingEURO-NF Conference on Next Generation Internet (NGI) Topology with BGP
2010
Vilhar, A.
Novak, R.
Kandus, G.
The impact of network topology on the performance of MAP selection algorithmsComputer Networks Topology with BGP
2010
Tarkoma, S.
Antikainen, M.
Canopy: publish/subscribe with upgraph combinationIEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2010
Rajahalme, J.Incentive-informed inter-domain multicastIEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2010
Hu, C.
Chen, K.
Chen, Y.
Liu, B.
Evaluating potential routing diversity for internet failure recoveryIEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2010
Dou, B-L
Wang, X-G
Zhang, S-Y
Robustness of networks against cascading failuresPhysica A: Statistical Mechanics and its Applications Topology with BGP
2010
Xuan, Q.
Du, F.
Wu, T-J
Partially ordered sets in complex networksJ. Phys. A: Math. Theor. Topology with BGP
2010
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Bonaventura, O.
Extracting intra-domain topology from mrinfo probingPassive and Active Measurement (PAM) Topology with BGP
2010
DiBenedetto, S.
Stone, A.
Strout, M.
Massey, D.
Simulating internet scale topologies with metaroutingColorado State Univ. Topology with BGP
2010
Chen, K.
Hu, C.
Zhang, W.
Chen, Y.
Liu, B.
On the eyeshots of BGP vantage pointsIEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2010
Amaral, P.
Ganhao, F.
Assuncao, C.
Bernardo, L.
Pinto, P.
Scalable multi-region routing at inter-domain levelIEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
A study of hinge-transmit property of BGP routing systemForum on Computer Science-Technology and Applications (IFCSTA) Topology with BGP
2009
Strowes, S.D.
Perkins, C.
Deterministic, reduced-visibility inter-domain forwardingACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Rajahalme, J.
Sarela, M.
Visala, K.
Riihijarvi, J.
Inter-domain rendezvous service architecturePSIRP (TR09-003) Topology with BGP
2009
Miller, K.
Eliassi-Rad, T.
Continuous time group discovery in dynamic graphsWorkshop on Analyzing Networks and Learning with Graphs (NIPS) Topology with BGP
2009
Chen, K.
Choffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P usersACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Merindol, P.
Van den Schrieck, V.
Donnet, B.
Bonaventure, O.
Pansiot, J.-J.
Quantifying ASes multiconnectivity using multicast informationInternet Measurement Conference (IMC) Topology with BGP
2009
Studer, A.
Perrig, A.
The coremelt attackSymp. on Research in Computer Security (ESORICS) Topology with BGP
2009
Shu, W.
Changjia, C.
Backup routing for BGP: Virtual ring routing schemeIEEE Conference on Computer Science and Information Technology (ICCSIT) Topology with BGP
2009
Avramopoulos, I.
Suchara, M.
Protecting DNS from routing attacks: a comparison of two alternative anycast implementationsIEEE Security and Privacy Topology with BGP
2009
Yang, G.
Dou, W.
An efficient algorithm for AS path inferringConference on Hybrid Information Technology Topology with BGP
2009
Miwa, S.
Suzuki, M.
Hazeyama, H.
Uda, S.
Miyachi, T.
Kadobayashi, Y.
Shinoda, Y.
Experiences in emulating 10K AS topology with massive VM multiplexingACM workshop on Virtualized infrastructure systems and architectures Topology with BGP
2009
Cittadini, L.
Rimondini, M.
Corea, M.
Di Battista, G.
On the feasibility of static analysis for BGP convergenceIFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
2009
Asai, H.
Esaki, H.
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNsAsia Future Internet summer school, Jeju, Korea Topology with BGP
2009
Amaral, P.
Bernardo, L.
Pinto, P.
DTIA: An Architecture for Inter-Domain RoutingIEEE Conference on Communications (ICC) Topology with BGP
2009
Bui, Q.D.
Jennings, A.
Relay node selection in large-scale VoIP overlay networksConference on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2009
Xu, Y.
Zhang, W.
A power-law approach on router-level internet macroscopic topology modelingFuzzy Information and Engineering, Volume 2 Topology with BGP
2009
Shavitt, Y.
Shir, E.
Weinsberg, U.
Near-deterministic inference of AS relationshipsConference on Telecommunications (ConTEL) Topology with BGP
2009
Asai, H.
Esaki, H.
A methodology for magnitude-based inter-AS distance estimationWIT, Hokkaido, Japan Topology with BGP
2009
Di Menna, A.
Refice, T.
Cittadini, L.
Di Battista, G.
Measuring route diversity in the internet from remote vantage pointsIEEE Conference on Networking (ICN) Topology with BGP
2009
D'Ignazio, A.
Giovannetti, E.
Asymmetry and discrimination in Internet peering: evidence from the LINXJ. Industrial Organization Topology with BGP
2009
Weinsberg, U.
Shavitt, Y.
Shir, E.
Near-deterministic inference of AS relationshipsIEEE Conference on Computer Communications (INFOCOM) Topology with BGP
2009
Liu, B.
Cui, Y.
Lu, Y.
Xue, Y.
Locality-awareness in BitTorrent-like P2P applicationsIEEE Trans. on Multimedia Topology with BGP
2009
Hasegawa, G.
Hiraoka, Y.
Murata, M.
Evaluation of free-riding traffic problem in overlay routing and its mitigation methodConference on Networking and Services (ICNS) Topology with BGP
2009
Haeberlen, A.
Avramopoulos, I.
Rexford, J.
Druschel, P.
NetReview: detecting when interdomain routing goes wrongUsenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2009
Eberle, W.
Holder, L.
Cook, D.
Identifying threats using graph-based anomaly detectionMachine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4 Topology with BGP
2009
Zhang, G.Measuring the impacts of sampling bias on internet AS-level topology inferenceWRI Conference on Communications and Mobile Computing (CMC) Topology with BGP
2009
Lumezanu, C.
Baden, R.
Spring, N.
Bhattacharjee, B.
Triangle inequality and routing policy violations in the internetPassive and Active Measurement (PAM) Topology with BGP
2009
Puzis, R.
Yagil, D.
Elovici, Y.
Braha, D.
Collaborative attack on internet users' anonymityInternet Research Topology with BGP
2008
Kang, U.
Tsourakakis, C.
Appel, A.P.
Faloutsos, C.
Leskovec, J.
HADI: Fast diameter estimation and mining in massive graphs with HadoopCarnegie Mellon Univ. Topology with BGP
2008
Hei, Y.
Nakao, A.
Hasegawa, T.
Ogishi, T.
Yamamoto, S.
AS alliance: cooperatively improving resilience of intra-alliance communicationACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2008
Serrano, M.A.
De Los Rios, P.
Structural efficiency of percolated landscapes in flow networksPlos One Topology with BGP
2008
MacArthur, B.D.
Sanchez-Garcia, R.J.
Anderson, J.W.
Symmetry in complex networksDiscrete Applied Mathematics Topology with BGP
2008
Vilhar, A.
Novak, R.
Policy relationship annotations of predefined AS-level topologiesComputer Networks Topology with BGP
2008
Wojciechowski, M.Border Gateway modeling and simulationDep. Computer Science, VU Univ. Amsterdam Topology with BGP
2008
Raghavan, V.
Riley, G.
Jaafar, T.
Realistic topology modeling for the internet BGP infrastructureIEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with BGP
2008
Katz, G.J.
Kider, J.T.
All-pairs shortest-paths for large graphs on the GPUACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware Topology with BGP
2008
Li, L.
Chen, C.
Exploring possible strategies for competitions between Autonomous SystemsIEEE Conference on Communications (ICC) Topology with BGP
2008
Xiao, Y.
MacArthur, B.D.
Wang, H.
Xiong, M.
Wang, W.
Network quotients: structural skeletons of complex systemsPhys. Rev. E Topology with BGP
2008
John, J.P.
Katz-Bassett, E.
Krishnamurthy, A.
Anderson, T.
Venkataramani, A.
Consensus routing: the internet as a distributed systemUsenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2008
Hazeyama, H.
Suzuki, M.
Miwa, S.
Miyamoto, D.
Kadobayashi, Y.
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasuresConference on Cyber Security Experimentation and Test Topology with BGP
2007
Qazi, S.
Moors, T.
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networksIEEE Global Telecommunications Conference (GLOBECOM) Topology with BGP
2007
Muehlbauer, W.
Uhlig, S.
Fu, B.
Meulle, M.
Maennel, O.
In search for an appropriate granularity to model routing policiesACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Ballani, H.
Francis, P.
Zhang, X.
A study of prefix hijacking and interception in the internetACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Wu, J.
Zhang, Y.
Mao, Z.M.
Shin, K.G.
Internet routing resilience to failures: analysis and implicationsACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2007
Huang, C.
Li, J.
Ross, K.W.
Can internet video-on-demand be profitable?ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2006
Restrepo, J.G.
Ott, E.
Hunt, B.R.
Characterizing the dynamical importance of network nodes and linksPhys. Rev. Lett. Topology with BGP
2006
D'Ignazio, A.
Giovannetti, E.
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approachJ. Competition Law and Economics Topology with BGP
2003
Fayed, M.
Krapivsky, P.
Byers, J.W.
Crovella, M.
Finkel, D.
Redner, S.
On the emergence of highly variable distributions in the autonomous system topologyACM SIGCOMM Computer Communication Review Topology with BGP
2016
Bhardwaj, O.
Anschelevich, E.
Kar, K.
Coalitionally stable pricing schemes for inter-domain forwardingComputer Networks Topology with Skitter
2015
Kloster, K.
Gleich, D.F.
Seeded PageRank solution pathsarxiv.org Topology with Skitter
2015
Francois, G.
Festor, O.
Anomaly traceback using software defined networkingIntl. Workshop on Information Forensics and Security (WIFS) Topology with Skitter
2015
Staudt, C.L.
Sazonovs, A.
Meyerhenke, H.
NetworKit: A tool suite for large-scale complex network analysisarxiv.org Topology with Skitter
2015
Saha, S.Efficient methods on reducing data redundancy in the InternetAalto Univ., FI Topology with Skitter
2015
Huang, T.T.
Sun, B.Q.
The impact of the Internet on global industry: New evidence of Internet measurementResearch in Intl Business and Finance Topology with Skitter
2015
Li, D.
Sha, W.
Dynamic ring for seamless mobility in identity centric networksComputers and Communication (ISCC) Topology with Skitter
2014
Medrano-Chavez, A.G.
Perez-Cortes, E.
Lopez-Guerrero, M.
A performance comparison of Chord and Kademlia DHTs in high churn scenariosPeer-to-Peer Networking and Applications Topology with Skitter
2014
Zhang, J.Statistical inference on network dataUniv. Illinois, Urbana-Champaign Topology with Skitter
2014
Arora, D.
Verigin, A.
Godkin, T.
Neville, S.W.
Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnetsIntl Conference on Advanced Information Networking and Applications (AINA)) Topology with Skitter
2014
Fallah, M.S.
Kahani, N.
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacksSecurity and Communication Networks Topology with Skitter
2014
Dundjerski, D.
Tomasevic, M.
Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocolsConcurrency Computation: Practice and Experience Topology with Skitter
2013
Freno, A.
Keller, M.
Tommasi, M.
Probability estimation over large-scale random networks via the Fiedler delta statisticJournal of Machine Learning Research Topology with Skitter
2013
Seo, D.
Lee, H.
Perrig, A.
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacksComputers and Security Topology with Skitter
2013
Preciado, V.M.
Jadbabaie, A.
Moment-based spectral analysis of large-scale networks using local structural informationIEEE/ACM Trans. on Networking (TON) Topology with Skitter
2013
Godkin, T.Statistical assessment of peer-to-peer botnet featuresUniv. of Victoria, Victoria, CA Topology with Skitter
2013
Fu, A.W.
Wu, H.
Cheng, J.
Wong, R.C.
IS-Label: an independent-set based labeling scheme for point-to-point distance queryingProc. of the VLDB Endowment Topology with Skitter
2013
Nikolaevskiy, I.
Lukyanenko, A.
Polishchuk, T.
Polishchuk, V.
Gurtov, A.
isBF: scalable in-packet Bloom filter based multicastProc. ACM Symp. on Applied Computing (SAC) Topology with Skitter
2013
Chen, Y.
Kawadia, V.
Urgaonkar, R.
Detecting overlapping temporal community structure in time-evolving networksarxiv.org Topology with Skitter
2013
Tang, M.
Zhang, G.
Lin, T.
Liu, J.
HDLBR: A name-independent compact routing scheme for power-law networksComputer Communications Topology with Skitter
2013
Ni, C.
Jin, G.
CTFPi: A new method for packet filtering of firewallProc. Intl Conference on Information Technology and Software Engineering, Ch. 48 Topology with Skitter
2012
Karasawa, T.
Soshi, M.
Miyaji, A.
A novel hybrid IP traceback scheme with packet countersConference on Internet and Distributed Computing Systems (IDCS) Topology with Skitter
2012
Parno, B.
Zhou, Z.
Perrig, A.
Using trustworthy host-based information in the networkWorkshop on Scalable trusted computing (STC) Topology with Skitter
2012
Preciado, V.M.
Draief, M.
Jadbabaie, A.
Structural analysis of viral spreading processes in social and communication networks using egonetsarxiv.org Topology with Skitter
2012
Goltsev, A.V.
Dorogovtsev, S.N.
Oliveira, J.G.
Mendes, J.F.F.
Localization and spreading of diseases in complex networksPhys. Rev. Lett. Topology with Skitter
2012
Yang, M.-H.
Yang, M.-C.
RIHT: A novel hybrid IP traceback schemeIEEE Transactions on Information Forensics and Security Topology with Skitter
2012
Wehmuth, K.
Ziviani, A.
Distributed assessment of the closeness centrality ranking in complex networksWorkshop on Simplifying Complex Networks for Practitioners (SIMPLEX) Topology with Skitter
2011
Mukaddam, A.
ELHajj, I.
Hop count variabilityConference for Internet Technology and Secured Transactions (ICITST) Topology with Skitter
2011
Wehmuth, K.
Ziviani, A.
Distributed location of the critical nodes to network robustness based on spectral analysisLatin American Network Operations and Management Symp. (LANOMS) Topology with Skitter
2011
Bell, C.Examining change in Internet topology in terms of external events, April 2001 - April 2002Univ. Nebraska at Omaha Topology with Skitter
2011
Youssef, M.
Kooij, R.
Scoglio, C.
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemicsJ. Computational Science Topology with Skitter
2011
Alvarez-Hamelin, J.I.
Beiro, M.G.
Busch, J.R.
Understanding edge connectivity in the Internet through core decompositionInternet Mathematics Topology with Skitter
2010
Song, J.
Zhao, H.
Yang, B.
Sun, H.
AS-level Internet macroscopic topology centralization evolvement analysisJ. Software Engineering and Applications Topology with Skitter
2010
de Montgolfier, F.
Soto, M.
Viennot, L.
Autour du caractere arborescent d'InternetMajecSTIC Topology with Skitter
2010
Xu, Y.
Wang, Z.
On an IBA topology model for internet topology structureConference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Topology with Skitter
2010
Yan, G.
Eidenbenz, S.
Thulasidasan, S.
Datta, P.
Ramaswamy, V.
Criticality analysis of Internet infrastructureComputer Networks Topology with Skitter
2009
Augustin, B.
Krishnamurthy, B.
Willinger, W.
IXP's: mapped?Internet Measurement Conference (IMC) Topology with Skitter
2009
Erlebach, T.
Moonen, L.S.
Spieksma, F.C.R.
Vukadinovic, D.
Connectivity measures for internet topologies on the level of autonomous systemsOperations Research Topology with Skitter
2009
Korn, A.
Schubert, A.
Telcs, A.
Lobby index in networksPhysica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Xu, Y.
Zhao, H.
An improved BA model for router-level internet macroscopic topologyIAENG J. Computer Science Topology with Skitter
2009
Madhyastha, H.V.
Katz-Bassett, E.
Anderson, T.
Krishnamurthy, A.
Venkataramani, A.
iPlane Nano: path prediction for peer-to-peer applicationsProc. USENIX Symp. on Networked Systems Design and Implementation (NSDI) Topology with Skitter
2009
Gunes, M.H.
Sarac, K.
Analyzing router responsiveness to active measurement probesPassive and Active Measurement (PAM) Topology with Skitter
2009
Durresi, A.
Paruchuri, V.
Barolli, L.
Fast autonomous system tracebackJ. Network and Computer Applications Topology with Skitter
2009
Xiao, B.
Liu, L.
Guo, X.
Xu, K.
Modeling the IPv6 internet AS-level topologyPhysica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Kaune, S.
Pussep, K.
Leng, C.
Kovacevic, A.
Tyson, G.
Steinmetz, R.
Modelling the internet delay space based on geographical locationsConference on Parallel, Distributed and Network-based Processing Topology with Skitter
2008
Beiro, M.G.
Alvarez-Hamelin, J.I.
Busch, J.R.
A low complexity visualization tool that helps to perform complex systems analysisNew J. Physics Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Wang, L.
Correctness of sampling bias on Internet router-level topologyIntl Conference on Wireless Communications, Networking and Mobile Computing Topology with Skitter
2008
Bi, X.
Tan, W.
Xiao, R.
A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous SystemsSymp. on Computer and Computational Sciences (IMSCSS) Topology with Skitter
2008
Wei, W.
Dong, Y.
Lu, D.
Jin, G.
Optimal control of DDoS defense with multi-resource max-min fairnessConference on Cybernetics and Intelligent Systems Topology with Skitter
2008
Zhang, J.
Zhao, H.
Zhou, Y.
The study on characteristics of the coreness of router-level internet nodesChinese Control and Decision Conference (CCDC) Topology with Skitter
2008
Latapy, M.
Magnien, C.
Complex network measurements: estimating the relevance of observed propertiesIEEE Conference on Computer Communications (INFOCOM) Topology with Skitter
2008
Fraigniaud, P.
Febhar, E.
Viennot, F.
The inframetric model for the internetIEEE Conference on Computer Communications (INFOCOM) Topology with Skitter
2007
Leguay, J.
Latapy, M.
Friedman, T.
Salamatiana, K.
Describing and simulating internet routesComputer Networks Topology with Skitter
2007
Zhou, S.
Zhang, G.-Q.
Chinese Internet AS-level topologyIET Communications Topology with Skitter
2007
Schmidt, T.C.
Wahlisch, M.
Zhang, Y.
On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routingIEEE Conference on Networking (ICN) Topology with Skitter
2007
Kunzmann, G.
Nagel, R.
Hossfeld, T.
Binzenhofer, A.
Eger, K.
Efficient simulation of large-scale P2P networks: modeling network transmission timesEUROMICRO Conference on Parallel, Distributed and Network-Based Processing (PDP) Topology with Skitter
2006
Donnet, B.
Bayant, B.
Friedman, T.
Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negativesACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Deployment of an algorithm for large-scale topology discoveryIEEE J. Selected Areas in Communications Topology with Skitter
2006
Guillaume, J.-L.
Latapy, M.
Magoni, D.
Relevance of massively distributed explorations of the internet topology: qualitative resultsComputer Networks Topology with Skitter
2006
Yaar, A.
Perrig, A.
Song, D.
StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defenseIEEE J. Selected Areas in Communications Topology with Skitter
2006
Latapy, M.
Magnien, C.
Measuring fundamental properties of real-world complex networksarxiv.org Topology with Skitter
2006
Farhat, H.Protecting TCP services from denial of service attacksSIGCOMM workshop on Large-Scale Attack Defense (LSAD) Topology with Skitter
2006
Zhang, L.
Guan, Y.
TOPO: a topology-aware single packet attack traceback schemeSecurecomm and Workshops Topology with Skitter
2006
Donnet, B.
Friedman, T.
Topology discovery using an address prefix based stopping ruleUNICE : Networks and Applications Towards a Ubiquitously Connected World Topology with Skitter
2006
Donnet, B.
Raoult, P.
Friedman, T.
Efficient route tracing from a single sourcearxiv.org Topology with Skitter
2006
Jin, S.
Bestavros, A.
Small-world characteristics of internet topologies and implications on multicast scalingComputer Networks Topology with Skitter
2005
Erlebach, T.
Moonen, L.S.
Spieksma, F.
Vukadinovic, D.
Connectivity measures for internet topologiesK.U. Leuven Topology with Skitter
2005
Xiang, Y.
Zhou, W.
Mark-aided distributed filtering by using neural network for DDoS defenseIEEE Global Telecommunications Conference (GLOBECOM) Topology with Skitter
2005
Janic, M.
Van Mieghem, P.
On properties of multicast routing treesJ. Communication Systems Topology with Skitter
2005
Chen, R.
Park, J.-M.
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sourcesIEEE Conference on Computer Communications and Networks (ICCCN) Topology with Skitter
2005
Martins, O.A.Affecting IP traceback with recent Internet topology mapsIowa State Univ. Topology with Skitter
2005
Donnet, B.
Raoult, P.
Friedman, T.
Crovella, M.
Efficient algorithms for large-scale topology discoveryACM Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2005
Donnet, B.
Friedman, T.
A CIDR stopping rule for topology discoveryAlgotel Topology with Skitter
2005
Yaar, A.
Perrig, A.
Song, D.
FIT: Fast Internet TracebackIEEE Conference on Computer Communications (INFOCOM) Topology with Skitter
2005
Donnet, B.
Friedman, T.
Crovella, M.
Improved algorithms for network topology discoveryPassive and Active Measurement (PAM) Topology with Skitter
2004
Prince, C.
Wyatt, D.
Confidence-weighted marginal utility analyses for improved internet mappingUniv. Washington, CSE Dept. Topology with Skitter
2004
Yaar, A.
Perrig, A.
Song, D.
SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacksIEEE Symp. on Security and Privacy Topology with Skitter
2004
Tang, L.
Crovella, M.
Geometric exploration of the landmark selection problemPassive and Active Measurement (PAM) Topology with Skitter
2004
Xu, K.
Duan, Z.
Zhang, Z.-L.
Chandrashekar, J.
On properties of Internet Exchange Points and their impact on AS topology and relationshipIFIP-TC6 Networking Conference (NETWORKING) Topology with Skitter
2004
Zhou, S.
Mondragon, R.J.
Redundancy and robustness of AS-level Internet topology and its modelsElectronics Letters Topology with Skitter
2003
Tang, L.
Crovella, M.
Virtual landmarks for the internetInternet Measurement Conference (IMC) Topology with Skitter
2003
Lakhina, A.
Byers, J.W.
Crovella, M.
Matta, I.
On the geographic location of internet resourcesJ. on Selected Areas in Communications Topology with Skitter
2003
Teixeira, T.
Marzullo, K.
Savage, S.
Voelker, G.M.
Characterizing and measuring path diversity of internet topologiesACM Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Topology with Skitter
2003
Yaar, A.
Perrig, A.
Song, D.
Pi: a path identification mechanism to defend against DDoS attacksIEEE Symp. on Security and Privacy Topology with Skitter
2017
Iglesias, F.
Zseby, T.
Pattern discovery in Internet background radiationIEEE Transactions on Big Data UCSD Network Telescope
2017
Haddadi, F.
Heywood, A.
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?Intl J. of Network Management UCSD Network Telescope
2017
Ochieng, N.
Ismail, A.
Waweru, M.
Orero, J.
Detecting scanning computer worms using machine learning and darkspace network trafficPan African Conf. on Science, Computing and Telecommunications UCSD Network Telescope
2017
Polat, H.
Mehr, H.
Cetin, A.
Diagnosis of Chronic Kidney Disease Based on Support Vector Machine by Feature Selection MethodsJ. of Medical Systems UCSD Network Telescope
2016
Xu, M.
Hua, L.
Xu, S.
A vine copula model for predicting the effectiveness of cyber defense early-warningTechnometrics UCSD Network Telescope
2016
Chen, P.
Xu, M.
Xu, S.
Hu, T.
Modeling and predicting extreme cyber attack rates via marked point processesJ. Applied Statistics UCSD Network Telescope
2016
Lin, C.
Wu, C.
Huang, M.
Wen, Z.
Cheng, Q.
Adaptive IP mutation: A proactive approach for defending against worm propagationIEEE Symposium onReliable Distributed Systems Workshops (SRDSW) UCSD Network Telescope
2016
Haddadi, F.Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithmsDalhousie Univ. UCSD Network Telescope
2016
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attackManagement Information Systems Quarterly UCSD Network Telescope
2016
Fachkha, C.
Debbabi, M.
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterizationIEEE Communications Surveys and Tutorials UCSD Network Telescope
2016
Marnerides, A.
Mauthe, A.
Analysis and characterisation of botnet scan trafficIntl Conference on Computing, Networking and Communications (ICNC) UCSD Network Telescope
2016
Kolesnichenko, A.
Haverkort, B.
Remke, A.
de Boer, P.
Fitting a code-red virus spread model: An account of putting theory into practiceIntl Conference on the Design of Reliable Communication Networks (DRCN) UCSD Network Telescope
2016
Kirubavathi, G.
Anitha, R.
Botnet detection via mining of traffic flow characteristicsComputers and Electrical Engineering UCSD Network Telescope
2016
Chen, Z.
Chen, C.
Characterising heterogeneity in vulnerable hosts on worm propagationIntl J. Security and Networks UCSD Network Telescope
2015
Haga, Y.
Saso, A.
Mori, T.
Goto, S.
Increasing the darkness of darknet trafficGlobal Communications Conference (GLOBECOM) UCSD Network Telescope
2015
Fachkha, C.Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacksConcordia Univ. UCSD Network Telescope
2015
Donoghue, N.
Hahn, B.
Xu, H.
Kroeger, T.
Zage, D.
Johnson, R.
Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Databasearxiv.org UCSD Network Telescope
2015
Gupta, S.
Gupta, B.B.
Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-artIntl J. System Assurance Engineering and Management UCSD Network Telescope
2015
Zhan, Z.
Xu, M.
Xu, S.
Predicting cyber attack rates with extreme valuesIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2015
Vaidya, T.2001-2013: Survey and analysis of major cyberattacksarxiv.org UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Chain, B.
Hybrid epidemics - A case study on computer worm ConfickerPlos One UCSD Network Telescope
2015
Haddadi, F.
Le Cong, D.
Porter, L.
Zincir-Heywood, A.
On the effectiveness of different botnet detection approachesInformation Security Practice and Experience (ISPE) UCSD Network Telescope
2015
Balkanli, E.
Zincir-Heywood, A.N.
Highlights on analyzing one-way traffic using different toolsIEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA) UCSD Network Telescope
2015
Zhang, C.
Zhou, S.
Miller, J.
Cox, I.
Chain, B.
Optimizing hybrid spreading in metapopulationsNature Scientific Reports UCSD Network Telescope
2015
Yao, G.
Bi, J.
Vasilakos, A.V.
Passive IP Traceback: disclosing the locations of IP spoofers from path backscatterIEEE Transactions on Information Forensics and Security UCSD Network Telescope
2014
Zhan, Z.
Xu, M.
Xu, S.
A characterization of cybersecurity posture from Network Telescope dataProc. Intl Conference on Trustworthy Systems (InTrust) UCSD Network Telescope
2014
Kolesnichenko, A.Model-checking mean-field models: algorithms and applicationsUniv. of Twente UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Entropy-based characterization of Internet background radiationEntropy UCSD Network Telescope
2014
Balkanli, E.
Alves, J.
Zincir-Heywood, A.N.
Supervised learning to detect DDoS attacksIEEE Computational Intelligence in Cyber Security (CICS) UCSD Network Telescope
2014
Yang, S.
Du, H.
Holsopple, J.
Sudit, M.
Attack ProjectionAdvances in Information Security UCSD Network Telescope
2014
Iglesias, F.
Zseby, T.
Modelling IP darkspace traffic by means of clustering techniquesCommunications and Network Security (CNS) UCSD Network Telescope
2014
Garcia, S.
Grill, M.
Stiborek, J.
Zunino, A.
An empirical comparison of botnet detection methodsComputers and Security UCSD Network Telescope
2014
Balkanli, E.
Zincir-Heywood, A.N.
On the analysis of backscatter trafficIEEE Local Computer Networks Workshops (LCN Workshops) UCSD Network Telescope
2014
Du, H.Probabilistic modeling and inference for obfuscated network attack sequencesRochester Inst. of Technology UCSD Network Telescope
2014
Kale, M.
Choudhari, D.M.
DDOS attack detection based on an ensemble of neural classifierIntl J. Computer Science and Network Security (IJCSNS) UCSD Network Telescope
2014
Gonzalez, C.Information theoretic measures for the detection of anomalies in IP darkspace trafficBarcelona Tech UCSD Network Telescope
2014
Du, H.
Yang, S.J.
Probabilistic Inference for Obfuscated Network Attack SequencesIntl Conference on Dependable Systems and Networks UCSD Network Telescope
2014
Zhan, Z.A statistical framework for analyzing cyber attacksUniv. Texas, San Antonio, TX, US UCSD Network Telescope
2014
Wang, P.
Guan, X.
Zhao, J.
Tao, J.
Qin, T.
A new sketch method for measuring host connection degree distributionIEEE Trans. on Information Forensics and Security UCSD Network Telescope
2014
Strapp, S.
Yang, S.
Segmenting large-scale cyber attacks for online behavior model generationSocial Computing, Behavioral-Cultural Modeling and Prediction (SBP) UCSD Network Telescope
2014
Khan, F.
Hosein, N.
Ghiasi, S.
Chuah, C.
Sharma, P.
Streaming solutions for fine-grained network traffic measurements and analysisIEEE/ACM Trans. on Networking (ToN) UCSD Network Telescope
2014
Singh, K.
Guntuku, S.C.
Thakur, A.
Hota, C.
Big data analytics framework for peer-to-peer botnet detection using random forestsInformation Sciences UCSD Network Telescope
2014
Ko, S.
Kim, K.
Lee, Y.
Song, J.
A classification method of darknet traffic for advanced security monitoring and responseLecture Notes in Computer Science UCSD Network Telescope
2014
Chatziadam, P.
Askoxylakis, I.G.
Fragkiadakis, A.
A Network Telescope for Early Warning Intrusion DetectionLecture Notes in Computer Science UCSD Network Telescope
2013
Huang S.Y., Huang Y.Network forensic analysis using growing hierarchical SOMIEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov) UCSD Network Telescope
2013
Tidy, L.J.
Woodhead, S.
Wetherall, J.
Simulation of zero-day worm epidemiology in the dynamic, heterogeneous InternetJ. Defense Modeling and Simulation: Applications, Methodology, Technology UCSD Network Telescope
2013
Strapp, S.Segmentation and model generation for large-scale cyber attacksRochester Inst. of Technology UCSD Network Telescope
2013
Guntuku, S.
Narang, P.
Hota, C.
Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural networkarxiv.org UCSD Network Telescope
2013
Irwin, B.A source analysis of the Conficker outbreak from a Network TelescopeSAIEE Africa Research Journal UCSD Network Telescope
2013
Ma, C.
Yang, Y.
Guo, X.
Improved SEIR viruses propagation model and the patch's impact on the propagation of the virusJ. of Computational Information Systems UCSD Network Telescope
2013
Tidy, L.
Woodhead, S.
Wetherall, J.
A large-scale zero-day worm simulator for cyber-epidemiological analysisIntl Conference on Advances in Computer Science and Electronics Engineering (CSEE) UCSD Network Telescope
2013
Wang, F.
Zhang, Y.
Guo, H.
Wang, C.
Combating good point set scanning-based self-learning worms by using predatorsJ. Network Security UCSD Network Telescope
2013
Du, H.
Yang, S.J.
Temporal and spatial analyses for large-scale cyber attacksHandbook of Computational Approaches to Counterterrorism UCSD Network Telescope
2013
Andrysiak, T.
Saganowski, L.
Choras, M.
DDoS attacks detection by means of greedy algorithmsImage Processing and Communications Challenges 4 UCSD Network Telescope
2012
Xu, E.
Hsu, W.
Lee, M.L.
Patel, D.
Top-k maximal influential paths in network dataDatabase and Expert Systems Applications UCSD Network Telescope
2012
Martin, S.
Chiarello, L.
Leduc, G.
DISco: A distributed information store for network challenges and their outcomeIEEE Conference on Network Operations and Management Symposium (NOMS) UCSD Network Telescope
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection improvement based on spatial-temporal characteristicsAdvanced Science Lett. UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Characterizing transition behaviors in Internet attack sequencesIEEE Conference on Computer Communications and Networks (ICCCN) UCSD Network Telescope
2011
Suresh, M.
Anitha, R.
Evaluating machine learning algorithms for detecting DDoS attacksAdvances in Network Security and Applications (CNSA) UCSD Network Telescope
2011
Abouzakhar, N.S.
Chen, H.
Christianson, B.
An enhanced fuzzy ARM approach for intrusion detectionJ. Digital Crime and Forensics UCSD Network Telescope
2011
Narita, M.
Katoh, T.
Bista, B.B.
Takata, T.
Evaluation of a distributed detecting method for SYN flood attacks using a real Internet traceAdvanced Information Networking and Applications (WAINA) UCSD Network Telescope
2011
Du, H.
Yang, S.J.
Discovering collaborative cyber attack patterns using social network analysisConference on Social computing, behavioral-cultural modeling and prediction (SBP) UCSD Network Telescope
2011
Saganowski, L.
Andrysiak, T.
Choras, M.
Renk, R.
Expansion of matching pursuit methodology for anomaly detection in computer networksAdvances in Intelligent and Soft Computing UCSD Network Telescope
2011
Choras, M.
Saganowski, L.
Renk, R.
Holubowicz, W.
Statistical and signal-based network traffic recognition for anomaly detectionExpert Systems UCSD Network Telescope
2010
Yao, G.
Bi, J.
Zhou, Z.
Passive IP traceback: capturing the origin of anonymous traffic through network telescopesACM SIGCOMM Computer Communication Review UCSD Network Telescope
2010
Abouzakhar, N.S.
Bakar, A.
A chi-square testing-based intrusion detection modelConference on Cybercrime Forensics Education and Training (CFET ) UCSD Network Telescope
2010
Fadlullah, Z.M.
Taleb, T.
Vasilakos, A.V.
Guizani, M.
Kato, N.
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysisIEEE/ACM Trans. on Networking (TON) UCSD Network Telescope
2010
Bi, J.
Hu, P.
Li, P.
Study on classification and characteristics of source address spoofing attacks in the InternetIEEE Conference on Networking (ICN) UCSD Network Telescope
2010
Gupta, R.
Ramamritham, K.
Mohania, M.
Ratio threshold queries over distributed data sourcesIntl Conference on Data Engineering (ICDE) UCSD Network Telescope
2009
Kyriakopoulos, K.G.
Parish, D.J.
Using wavelets for compression and detecting events in anomalous network trafficConference on Systems and Networks Communication UCSD Network Telescope
2009
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Measuring complexity and predictability in networks with multiscale entropy analysisIEEE Conference on Computer Communications (INFOCOM) UCSD Network Telescope
2008
He, X.
Parameswaran, S.
MCAD: Multiple connection based anomaly detectionIEEE Conference on Communication Systems (ICCS) UCSD Network Telescope
2008
Choi, H.
Lee, H.
Kim, H.
Fast detection and visualization of network attacks on parallel coordinatesComputers and Security UCSD Network Telescope
2008
Riihijarvi, J.
Mahonen, P.
Wellens, M.
Metrics for characterizing complexity of network trafficConference on Telecommunications (ICT) UCSD Network Telescope
2008
Irwin, B.
Pilkington, N.
High level internet scale traffic visualization using Hilbert curve mappingVisualization for Computer Security (VizSec) UCSD Network Telescope
2008
Wei, S.
Mirkovic, J.
Correcting congestion-based error in network telescope's observations of worm dynamicsInternet Measurement Conference (IMC) UCSD Network Telescope
2008
Li, P.
Bi, J.
Zhou, Z.
A backscatter technology based study on source address spoofingPeriodical of Ocean Univ. of China UCSD Network Telescope
2008
Francois, J.
State, R.
Festor, O.
Activity monitoring for large honeynets and network telescopesJ. Advances in Systems and Measurements UCSD Network Telescope
2007
Dainotti, A.
Pescape, A.
Ventre, G.
Worm traffic analysis and characterizationIEEE Conference on Communications (ICC) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Measuring network-aware worm spreading abilityIEEE Conference on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Vojnovic, M.
Gupta, V.
Karagiannis, T.
Gkantsidis, C.
Sampling strategies for epidemic-style information disseminationIEEE Conference on Computer Communications (INFOCOM) UCSD Network Telescope
2007
Chen, Z.
Ji, C.
Optimal worm-scanning method using vulnerable-host distributionsJ. Security and Networks UCSD Network Telescope
2006
Rajab, M.
Monrose, F.
Terzis, A.
Fast and evasive attacks: highlighting the challenges aheadSymp. on Recent Advances in Intrusion Detection (RAID) UCSD Network Telescope
2006
Francois, J.
State, R.
Festor, O.
Tracking global wide configuration errorsIEEE Workshop on Monitoring, Attack Detection and Mitigation UCSD Network Telescope
2006
Hamadeh, I.
Kesidis, G.
Toward a framework for forensic analysis of scanning wormsEmerging Trends in Information and Communication Security (ETRICS) UCSD Network Telescope
2006
Peng, Y.
Gong, J.
Yang, W.
Liu, W.
Disclosing the element distribution of Bloom filterConference on Computational Science (ICCS) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
Worm evolution tracking via timing analysisACM workshop on Rapid Malcode (WORM) UCSD Network Telescope
2005
Chen, Z.
Ji, C.
Importance-scanning worm using vulnerable-host distributionIEEE Global Telecommunications Conference (GLOBECOM) UCSD Network Telescope
2005
Chen, Z.
Lin, C.
Ni, J.
Ruan, D.-H.
Zheng, B.
Jiang, Y.-X.
Peng, X.
Wang, Y.
Luo, A.
Zhu, B.
Yue, Y.
Ren, F.-Y.
Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LANIEEE Conference on Local Computer Networks (LCN) UCSD Network Telescope
2005
Kumar, A.
Paxson, V.
Weaver, N.
Exploiting underlying structure for detailed reconstruction of an internet-scale eventInternet Measurement Conference (IMC) UCSD Network Telescope
2005
Rajab, M.
Monrose, F.
Terzis, A.
On the effectiveness of distributed worm monitoringUsenix Security Conference (SEC) UCSD Network Telescope
2005
Chhabra, P.
John, A.
Saran, H.
PISA: Automatic extraction of traffic signaturesIFIP-TC6 Networking Conference (NETWORKING) UCSD Network Telescope

  Last Modified: Fri Oct-13-2017 16:26:33 PDT
  Page URL: http://www.caida.org/data/publications/index.xml