Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > data : publications : bylocation
Non-CAIDA Publications using CAIDA data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of our datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.

|   View By:    dataset    location   |

This map shows a geographic distribution of the institutional affiliations of the first author of papers published by non-CAIDA researchers that used one or more of the datasets distributed by CAIDA.

Could not load the interactive version of this Google map,
possibly due to browser settings (no javascript) or unsupported browser

CityTitleAuthorsDatasetDate
Baltimore, MD, USFast and evasive attacks: highlighting the challenges aheadRajab, M., Monrose, F., et al.Network Telescope: Witty Worm2006-09
Athens, GRThe multiple instances of node centrality and their implicat ...Nomikos, G., Pantazopoulos, P., et al.Topology with Archipelago2013-12
Washington DC, USAn empirical evaluation of relay selection in TorWacek, C., Tan, H., et al.Topology with Archipelago, Topology with BGP2013-02
Madrid, ESDriving in the cloud: An analysis of drive-by download opera ...Nappa, A., Rafique, M.Z., et al.Topology with BGP2013-07
Madrid, ESSTONE: A stream-based DDoS defense frameworkCallau-Zori, M., Jimenez-Peris, R., et al.Denial of Service Attacks2013-03
Coimbra, PTPeer selection in P2P service overlays using geographical lo ...Fiorese, A., Simoes, P., et al.Topology with Archipelago2012-06
Koganei, JPExperiences in emulating 10K AS topology with massive VM mul ...Miwa, S., Suzuki, M., et al.Topology with BGP2009-08
Changsha, CNHow resilient are individual ASes against AS-level link fail ...Deng, W., Zhu, P., et al.Topology with BGP2011-04
Marina Del Rey, CA, USSelecting representative IP addresses for internet topology ...Fan, X., Heidemann, J.Topology with Archipelago2010-11
Paris, FRMeasuring fundamental properties of real-world complex netwo ...Latapy, M., Magnien, C.Topology with Skitter2006-09
Atlanta, GA, USImportance-scanning worm using vulnerable-host distributionChen, Z., Ji, C.Network Telescope: Witty Worm2005-11
Richland, WA, USMassive scale cyber traffic analysis: A driver for graph dat ...Joslyn, C., Choudhury, S., et al.Denial of Service Attacks, Anonymized Internet Traces2013-06
Nancy, FRActivity monitoring for large honeynets and network telescop ...Francois, J., State, R., et al.Network Telescope: Backscatter2008-00
Berlin, DEProtecting DNS from routing attacks: a comparison of two alt ...Avramopoulos, I., Suchara, M.Topology with BGP2009-09
Aachen, DEMeasuring complexity and predictability in networks with mul ...Riihijarvi, J., Mahonen, P., et al.Network Telescope: Backscatter2009-04
Stony Brook, NY, USHigh speed multicast scheduling in hybrid optical packet swi ...Guo, Z., Yang, Y.Anonymized Internet Traces2012-06
Rome, ITMeasuring route diversity in the internet from remote vantag ...Di Menna, A., Refice, T., et al.Topology with BGP2009-05
Brescia, ITAn SMV-based approach to traffic classificationEste, A., Gringoli, F., et al.Anonymized Internet Traces2008-00
West Lafayette, IN, USSecurity and economic implications of localizing traffic in ...Seibert, J.Topology with BGP2012-05
Budapest, HULobby index in networksKorn, A., Schubert, A., et al.Topology with Skitter2009-06
Boston, MA, USOn the cost of supporting multihoming and mobilityIshakian, V., Akinwumi, J., et al.Anonymized Internet Traces2009-06
Cookeville, TN, USIncremental anomaly detection in graphsEberle, W., Holder, L.Topology with BGP2013-12
Delft, NLOn properties of multicast routing treesJanic, M., Van Mieghem, P.Topology with Skitter2005-11
Guildford, UKPolicy-aware virtual relay placement for inter-domain path d ...Guo, T., Wang, N., et al.Topology with BGP2010-08
Bangkok, THA study of autonomous system relationships within ThailandSiritana, H., Kitisin, S., et al.Topology with BGP2011-05
Tianjin, CNAn efficient framework for parallel and continuous frequent ...Zhang, Y., Sun, Y., et al.Anonymized Internet Traces2013-12
Hong Kong, CNEntropy based flow aggregationHu, Y., Chiu, D.-M., et al.Anonymized Internet Traces2006-04
Bydgoszcz, PLExpansion of matching pursuit methodology for anomaly detect ...Saganowski, L., Andrysiak, T., et al.Network Telescope: Backscatter2011-00
Ann Arbor, MI, USInternet routing resilience to failures: analysis and implic ...Wu, J., Zhang, Y., et al.Topology with BGP2007-00
Richardson, TX, USEstimating network layer subnet characteristics via statisti ...Tozal, M.E., Sarac, K.Topology with BGP2012-05
Potsdam, GEOn the extent of correlation in BGP updates in the Internet ...Sapegin, A., Uhlig, S.Topology with Archipelago2013-09
Florham Park, NJ, USDemo abstract: towards extracting semantics by visualizing l ...Gansner, E.R., Krishnamurthy, B., et al.Topology with Archipelago2014-01
Brisbane, AUEnsemble-based DDoS detection and mitigation modelBhatia, S., Schmidt, D., et al.Denial of Service Attacks2012-10
Vigo, ESBounded energy consumption with dynamic packet coalescingHerreria-Alonso, S., Rodriguez-Perez, M., et al.Anonymized Internet Traces2012-06
Newcastle, UKMessage traceback systems. Dancing with the devilAndreou, M.S.Anonymized Internet Traces, Topology with Skitter2009-09
Ottawa, CAA TCP connection establishment filter: symmetric connection ...Whitehead, B., Lung, C.-H., et al.Anonymized Internet Traces2007-06
Manhattan, KS, USViral conductance: Quantifying the robustness of networks wi ...Youssef, M., Kooij, R., et al.Topology with Skitter2011-03
Beijing, CNRobust TCP reassembly with a hardware-based solution for bac ...Yuan, R., Weibing, Y., et al.Anonymized Internet Traces2010-07
Enschede, NLGaussian traffic revisitedSchmidt, R., Sadre, R., et al.Anonymized Internet Traces2013-05
Madrid, ESReducing the cost of implementing error correction codes in ...Reviriego, P., Pontarelli, S., et al.Anonymized Internet Traces2013-07
Madrid, ESImproving energy efficiency in IEEE 802.3ba high-rate ethern ...Reviriego, P., Huiszoon, B., et al.Anonymized Internet Traces2011-03
Madison, WI, USWhat's in a name?: decoding router interface namesChabarek, J., Barford, P.Topology with Archipelago2013-08
Haifa, ILThe Bloom paradox: When not to use a Bloom filterRottenstreich, O., Keslassy, I.Anonymized Internet Traces2011-06
St. Louis, MO, USExploiting locality to ameliorate packet queue contention an ...Kumar, S., Maschmeyer, J., et al.Anonymized Internet Traces2006-05
Daegu, KRAdaptive load shedding via fuzzy control in data stream mana ...Basaran, C., Kang, K.-D., et al.Anonymized Internet Traces2012-12
Auckland, NZObservations of UDP to TCP ratio and port numbersLee, D., Carpenter, B.E., et al.Anonymized Internet Traces2010-06
Tiruchirappalli, INDetection of distributed denial of service attacks using an ...Kumar, P.A.R., Selvakumar, S.Denial of Service Attacks, Network telescope: Other2013-02
Los Angeles, CA, USGA-based internet traffic classification technique for QoS p ...Park, J., Tyan, H.-R., et al.Anonymized Internet Traces2006-12
Hangzhou, CNOptimal control of DDoS defense with multi-resource max-min ...Wei, W., Dong, Y., et al.Topology with Skitter2008-09
Changsha, CNA study of hinge-transmit property of BGP routing systemYujing, L., Bofeng, Z., et al.Topology with BGP2010-01
Ghaziabad, INIPv4 to IPv6 shift: major challengesVerma, H., Yadav, B., et al.Anonymized Internet Traces2012-04
Tel-Aviv, ILCBTree: A practical concurrent self-adjusting search treeKorenfeld, B.Anonymized Internet Traces2012-05
Beijing, CNFlattening and preferential attachment in the Internet evolu ...Li, M., Wang, H., et al.Topology with BGP2012-09
Shijiazhuang, CNCombating good point set scanning-based self-learning worms ...Wang, F., Zhang, Y., et al.Network Telescope: Witty Worm2013-01
Osaka, JPOn-line detection of persistently high packet-rate flows via ...Kudo, T., Takin, T.Anonymized Internet Traces, Network Telescope: Backscatter2014-01
Gif sur Yvette, FRInternet topology on as-level: Model, generation methods and ...Tomasik, J., Weisser, M.-A.Topology with Archipelago, Topology with BGP2011-01
Los Angeles, CA, USTradeoffs in CDN designs for throughput oriented trafficYu, M., Jiang, W., et al.Topology with Archipelago2012-12
Liege, BENetwork fingerprinting: TTL-based router signaturesVanaubel, Y., Pansiot, J.-J., et al.Topology with Archipelago2013-10
Brescia, ITMTCLASS: Enabling statistical traffic classification of mult ...Gringoli, F., Nava, L., et al.Anonymized Internet Traces2012-08
Naples, ITTopology discovery at the router level: a new hybrid tool ta ...Marchetta, P., Merindol, P., et al.Topology with Archipelago, Topology with Skitter2011-10
Shenyang, CNAnalysis of interlayer connection catastrophe characteristic ...Yang, B., Zhao, H., et al.Topology with Archipelago2013-02
Harbin, CNFeature selection for optimizing traffic classificationZhang, H., Lu, G., et al.Anonymized Internet Traces2012-04
Tokyo, JPLow-power network-packet-processing architecture using proce ...Okuno, M., Ishida, S., et al.Anonymized Internet Traces2005-04
Halifax, CAIP traceback through (authenticated) deterministic flow mark ...Aghaei-Foroushani, V., Zincir-Heywood, A.N.Anonymized Internet Traces2013-00
Brno, CZOptimization of network flow monitoringZadnik, M.Anonymized Internet Traces2013-05
Paris, FRAutour du caractere arborescent d'Internetde Montgolfier, F., Soto, M., et al.Topology with Skitter2010-10
Madrid, ESIncreasing the MTU size for energy efficiency in ethernetReviriego, P., Sanchez-Macian, A., et al.Anonymized Internet Traces2010-06
Palma de Mallorca, ESStructural efficiency of percolated landscapes in flow netwo ...Serrano, M.A., De Los Rios, P.Topology with BGP2008-11
Redmond, WA, USUsing trustworthy host-based information in the networkParno, B., Zhou, Z., et al.Topology with Skitter2012-10
Paris, FRThe inframetric model for the internetFraigniaud, P., Febhar, E., et al.Topology with Skitter2008-04
Los Angeles, CA, USCollaborative change detection of DDoS attacks on community ...Chen, Y., Hwang, K.Anonymized Internet Traces2006-05
Austin, TX, USNo direction home: The true cost of routing around decoysHoumansadr, A., Wong, E.L., et al.Topology with BGP2014-02
Beijing, CNPassive IP traceback: capturing the origin of anonymous traf ...Yao, G., Bi, J., et al.Network Telescope: Backscatter2010-10
Halifax, CAOn evaluating IP traceback schemes: a practical perspectiveAghaei-Foroushani, V., Zincir-Heywood, A.N.Anonymized Internet Traces2013-05
Philadelphia, PA, USPeer-assisted content distribution in Akamai NetSessionZhao, M., Aditya, P., et al.Topology with BGP2013-10
Buenos Aires, ARA low complexity visualization tool that helps to perform co ...Beiro, M.G., Alvarez-Hamelin, J.I., et al.Topology with Skitter2008-12
Jinan, CNIdentifying heavy-hitter flows fast and accuratelyZhang, N., Wang, F., et al.Anonymized Internet Traces2010-06
Durham, NC, USImproving IP-based geo-location through Internet topology an ...Moses, K.V.Topology with BGP2013-00
Berlin, DEIn search for an appropriate granularity to model routing po ...Muehlbauer, W., Uhlig, S., et al.Topology with BGP2007-10
Orlando, FL, USInternet exchange points and Internet routingAhmad, M.Z., Guha, R.Topology with Archipelago2011-10
Waterford, IEQoSPlan: A measurement based quality of service aware networ ...Davy, A., Jennings, B., et al.Anonymized Internet Traces2012-06
Leuven, BEOn the impact of clustering on measurement reductionSaucez, D., Donnet, B., et al.Topology with Archipelago2009-05
Nanjing, CNOnline identification of Tor anonymous communication trafficHe, G.-F., Yang, M., et al.Anonymized Internet Traces2013-03
Shenyang, CNInternet complex network separation degree analysis based on ...Su, W.-J., Zhao, H., et al.Topology with Archipelago2005-09
Davis, CA, USThe quantitative comparison of computer networksBrugger, S.T.Anonymized Internet Traces2009-06
Beijing, CNTowards high-performance network application identification ...He, F., Xiang, F., et al.Anonymized Internet Traces2011-05
Zurich, CHAnatomy of a large European IXPAger, B., Chatzis, N., et al.Topology with BGP2012-08
Aalto, FIPredictive models of network traffic loadPouzols, F.M., Lopez, D.R., et al.Anonymized Internet Traces2011-00
Harbin, CNIdentifying heavy hitters in high-speed network monitoringZhang, Y., Fang, B.X., et al.Anonymized Internet Traces2010-03
Pittsburgh, PA, USFIT: Fast Internet TracebackYaar, A., Perrig, A., et al.Topology with Skitter2005-03
Daejeon, KRUnmasking the growing UDP traffic in a campus networkLee, C., Lee, D.K., et al.Anonymized Internet Traces2012-03
Palo Alto, CA, USRethinking packet forwarding hardwareCasado, M., Koponen, T., et al.Anonymized Internet Traces2008-11
Syracuse, NY, USA model for recursive propagations of reputations in social ...Lee, J.Y., Oh, J.C.Topology with BGP2013-08
Los Angeles, CA, USReducing dynamic power dissipation in pipelined forwarding e ...Jiang, W., Prasanna, V.K.Anonymized Internet Traces2009-10
Manouba, TNA traffic coherence analysis model for DDoS attack detectionRahmani, H., Sahli, N., et al.Anonymized Internet Traces, Network Telescope: Backscatter2009-07
London, UKRevisiting the issues on netflow sample and export performan ...Haddadi, H., Landa, R., et al.Anonymized Internet Traces2007-04
Singapore, SGEfficient extraction of high-betweenness verticesChong, W.H., Toh, W.S.B., et al.Topology with BGP2010-08
Monteluco di Roio, ITPartially dynamic efficient algorithms for distributed short ...Ciceronea, S., D'Angelo, G., et al.Topology with Archipelago2010-02
Ishikawa, JPDesign and implementation of XBurnerMiyachi, T., Miwa, S.Topology with BGP2013-03
Madrid, ESWire-speed statistical classification of network traffic on ...Santiago del Rio, P.M., Rossi, D., et al.Anonymized Internet Traces2012-11
Minneapolis, MI, USToward building practical privacy enhancing technologiesLin, Z.Anonymized Internet Traces2012-07
Shenyang, CNA power-law approach on router-level internet macroscopic to ...Xu, Y., Zhang, W.Topology with BGP2009-06
Urbana, IL, USSWIRL: A scalable watermark to detect correlated network flo ...Houmansadr, A., Borisov, N.Anonymized Internet Traces2011-02
Beijing, CNAntiworm NPU-based parallel Bloom filters for TCP/IP content ...Chen, Z., Lin, C., et al.Network Telescope: Backscatter2005-11
Urbana, IL, USCirripede: Circumvention Infrastructure using Router Redirec ...Houmansadr, A., Nguyen, G.T.K., et al.Anonymized Internet Traces2011-10
Beer-Sheva, ILCollaborative attack on internet users' anonymityPuzis, R., Yagil, D., et al.Topology with BGP2009-00
Princeton, NJ, USOnline measurement of large traffic aggregates on commodity ...Jose, L., Yu, M., et al.Anonymized Internet Traces2011-03
Loughborough, UKUsing wavelets for compression and detecting events in anoma ...Kyriakopoulos, K.G., Parish, D.J.Network Telescope: Witty Worm2009-09
Victoria, CAStatistical assessment of peer-to-peer botnet featuresGodkin, T.Topology with Skitter2013-04
Hamburg, DEOn the correlation of geographic and network proximity at in ...Schmidt, T.C., Wahlisch, M., et al.Topology with Skitter2007-04
Madrid, ESMultimedia flow classification at 10 Gbps using acceleration ...Leira, R., Gomez, P., et al.Anonymized Internet Traces2013-06
College Station, TX, USStochastic pre-classification for Software Defined FirewallsGhoshal, P., Casey, C.J., et al.Anonymized Internet Traces2013-07
Manouba, TNJoint entropy analysis model for DDoS attack detectionRahmani, H., Sahli, N., et al.Anonymized Internet Traces, Network Telescope: Backscatter2009-08
Davis, CA, USProgME: towards programmable network measurementYuan, L., Chuah, C., et al.Anonymized Internet Traces2007-00
Newark, NJ, USA router-based technique to mitigate reduction of quality (R ...Shevtekar, A., Ansari, N.Anonymized Internet Traces2008-04
Hong Kong, CNAchieving high-bitrate overlay live streaming with proxy hel ...Ren, D., Chan, S.G.Topology with Archipelago2012-05
Fort Collins, CO, USCharacterizing vulnerability to IP hijack attemptsGersch, J., Massey, D.Topology with BGP2013-11
Brisbane, AUDetecting Distributed Denial-of-Service attacks and flash ev ...Bhatia, S.Denial of Service Attacks2013-08
College Park, MD, USCharacterizing the dynamical importance of network nodes and ...Restrepo, J.G., Ott, E., et al.Topology with BGP2006-09
Munich, DEAn application-aware load balancing strategy for network pro ...Ohlendorf, R., Meitinger, M., et al.Anonymized Internet Traces2010-01
Hangzhou, CNTraffic congestion in interconnected complex networksTan, F, Wu, J., et al.Topology with BGP2014-01
Pisa, ITk-clique communities in the Internet AS-level topology graphGregori, E., Lenzini, L., et al.Topology with Archipelago2011-06
Budapest, HUCompressing IP forwarding tables: towards entropy bounds and ...Retvari, G., Tapolcai, J., et al.Anonymized Internet Traces2013-10
Paris, FRComplex network measurements: estimating the relevance of ob ...Latapy, M., Magnien, C.Topology with Skitter2008-04
Harbin, CNParallelizing weighted frequency counting in high-speed netw ...Zhang, Y., Fang, B.X., et al.Anonymized Internet Traces2010-04
Urbana, IL, USNon-blind watermarking of network flowsHoumansadr, A., Kiyavash, N., et al.Anonymized Internet Traces2012-03
Cleveland, OH, USSmall-world characteristics of internet topologies and impli ...Jin, S., Bestavros, A.Topology with Skitter2006-04
Shenyang, CNCollapse by cascading failures in hybrid attacked regional I ...Xu, Y., Wang, Z.Topology with Archipelago2012-04
Tokyo, JPEstimating AS relationships for application-layer traffic op ...Asai, H., Esaki, H.Topology with BGP2010-09
Madrid, ESA simple analytical model for energy efficient ethernetMarsan, M.A., Fernandez Anta, A., et al.Anonymized Internet Traces2011-07
Shenyang, CNRobustness analyses of Internet topology with power-law feat ...Xu, Y., Ma, W.Topology with Archipelago2014-00
Nanjing, CNDisclosing the element distribution of Bloom filterPeng, Y., Gong, J., et al.Network Telescope: Backscatter2006-05
Austin, TX, USDetecting overlapping temporal community structure in time-e ...Chen, Y., Kawadia, V., et al.Topology with Skitter2013-03
Ningbo, CNCTFPi: A new method for packet filtering of firewallNi, C., Jin, G.Topology with Skitter2013-01
London, UKTechniques for flow inversion on sampled dataClegg, R., Landa, R., et al.Anonymized Internet Traces2008-04
Gothenburg, SECharacterization and classification of internet backbone tra ...John, W.Anonymized Internet Traces2010-02
Berlin, DEExploring reachability via settlement-free peeringMeyer, S., Wahlisch, M., et al.Topology with BGP2012-12
Madrid, ESInternet traffic classification for high-performance and off ...Santiago del Rio, P.M.Anonymized Internet Traces2013-05
Madrid, ESApplication of Internet traffic characterization to all-opti ...Santiago del Rio, P.M., Ramos, J., et al.Anonymized Internet Traces2010-08
Brisbane, AUParametric differences between a real-world Distributed Deni ...Bhatia, S., Mohay, G., et al.Denial of Service Attacks2011-08
Riverside, CA, USInferential time-decaying Bloom filtersDautrich Jr, J.L., Ravishankar, C.V.Anonymized Internet Traces2013-03
Atlanta, GA, USNon-crypto hardware hash functions for high performance netw ...Hua, N., Norige, E., et al.Anonymized Internet Traces2011-10
Orlando, FL, USEvaluating end-user network benefits of peering with path la ...Ahmad, M.Z., Guha, R.Topology with BGP2012-07
Melbourne, AUMark-aided distributed filtering by using neural network for ...Xiang, Y., Zhou, W.Topology with Skitter2005-11
Rochester, NY, USCharacterizing transition behaviors in Internet attack seque ...Du, H., Yang, S.J.Network telescope: Other2011-07
Lisboa, PTA fresh look at inter-domain route aggregationSobrinho, J.L., Le, F.Topology with BGP2012-03
Shenyang, CNOn an IBA topology model for internet topology structureXu, Y., Wang, Z.Topology with Skitter2010-06
Beijing, CNEvaluating and optimizing IP lookup on many core processorsHe, P., Guan, H., et al.Anonymized Internet Traces2012-08
Atlanta, GA, USRealistic topology modeling for the internet BGP infrastruct ...Raghavan, V., Riley, G., et al.Topology with BGP2008-09
Tokyo, JPTowards interdomain transit traffic reduction in peer-assist ...Asai, H., Esaki, H.Topology with BGP2010-09
San Diego, CA, USBitmap algorithms for counting active flows on high speed li ...Estan, C., Varghese, G., et al.Anonymized Internet Traces2003-10
Boston, MA, USOn the geographic location of internet resourcesLakhina, A., Byers, J.W., et al.Topology with Skitter2003-08
Bydgoszcz, PLDDoS attacks detection by means of greedy algorithmsAndrysiak, T., Saganowski, L., et al.Network Telescope: Backscatter2013-00
Seoul, KRAS-level topology collection through looking glass serversKhan, A., Kwon, T., et al.Topology with Archipelago2013-10
Lisboa, PTA theory for the connectivity discovered by routing protocol ...Sobrinho, J.L., Tiago Quelhas, T.Topology with BGP2012-06
Beijing, CNEvaluating potential routing diversity for internet failure ...Hu, C., Chen, K., et al.Topology with BGP2010-05
Waterloo, CAPerformance analysis of TCAMs in switchesTawakol, A.Anonymized Internet Traces2012-04
Omaha, NE, USExamining change in Internet topology in terms of external e ...Bell, C.Topology with Skitter2011-08
Brescia, ITSupport Vector Machines for TCP traffic classificationEste, A., Gringoli, F., et al.Anonymized Internet Traces2009-09
Pullman, WA, USA collaborative defense framework against DDoS attacks in ne ...Liu, H.Denial of Service Attacks, Anonymized Internet Traces2013-05
Fort Collins, CO, USEpiphany: A location hiding architecture for protecting crit ...Kambhampati, V., Papadopolous, C., et al.Topology with Archipelago2012-06
Enschede, NLLightweight link dimensioning using sFlow samplingSchmidt, R., Sadre, R., et al.Anonymized Internet Traces2013-10
Tel-Aviv, ILNear-deterministic inference of AS relationshipsShavitt, Y., Shir, E., et al.Topology with BGP2009-06
Paris, FREfficient route tracing from a single sourceDonnet, B., Raoult, P., et al.Topology with Skitter2006-05
Beijing, CNA more efficient hybrid approach for single-packet IP traceb ...Wang, Y., Su, S., et al.Topology with Archipelago, Topology with Skitter2012-02
Stony Brook, NY, USPipelining multicast scheduling in all-optical packet switch ...Guo, Z., Yang, Y.Anonymized Internet Traces2011-09
Urbana, IL, USProtecting anonymity in the presence of autonomous system an ...Juen, J.Topology with BGP2012-09
Rome, ITOn-the-fly statistical classification of internet traffic at ...Baiocchi, A., Maiolini, G., et al.Anonymized Internet Traces2008-10
Edinburgh, UKEmpirical evaluation of data transformations for network inf ...Fenacci, D., Franke, B.Topology with Archipelago, Anonymized Internet Traces2010-07
Tokyo, JPAURORA: Autonomous System relationships-aware overlay routin ...Asai, H., Esaki, H.Topology with BGP2009-08
Rio de Janeiro, BRECO-ALOC: Energy-efficient resource allocation for cluster-b ...Fragni, C., Costa, L.H.M.K.Anonymized Internet Traces2012-06
Boston, MA, USOn supporting mobility and multihoming in recursive internet ...Ishakian, V., Akinwumi, J., et al.Anonymized Internet Traces2010-10
Newark, DE, USMisbehaviors in TCP SACK generationEkiz, N., Rahman, A.H., et al.Anonymized Internet Traces2011-04
Valencia, ESNetwork performance analysis based on histogram workload mod ...Hernandez-Orallo, E., Vila-Carbo, J.Anonymized Internet Traces2007-10
Victoria, CAEvaluating the effectiveness of Sybil attacks against peer-t ...Verigin, A.L.Topology with Archipelago2013-12
Haifa, ILReducing the reordering delay in multi-core network processo ...Shpiner, A., Keslassy, I., et al.Anonymized Internet Traces2012-01
Minneapolis, MN, USRouting around decoysSchuchard, M., Geddes, J., et al.Topology with BGP2012-10
Baltimore, MD, USWorm evolution tracking via timing analysisRajab, M., Monrose, F., et al.Network Telescope: Witty Worm2005-11
Redmond, WA, USSampling strategies for epidemic-style information dissemina ...Vojnovic, M., Gupta, V., et al.Network Telescope: Witty Worm2007-04
Shanghai, CNRobustness of networks against cascading failuresDou, B-L, Wang, X-G, et al.Topology with BGP2010-05
Barcelona, ESThe impact of content delivery networks on the Internet ecos ...Palacin, M., Oliver, M., et al.Topology with BGP2013-00
Ramat-Gan, ILFragmentation considered vulnerableGilad, Y., Herzberg, A.Anonymized Internet Traces2013-04
Tokyo, JPA novel hybrid IP traceback scheme with packet countersKarasawa, T., Soshi, M., et al.Topology with Skitter2012-11
Nancy, FRTracking global wide configuration errorsFrancois, J., State, R., et al.Network Telescope: Backscatter2006-09
Berlin, DESearch and analysis of backbone traffic measurements in the ...Idzikowski, F.Anonymized Internet Traces2009-03
Pohang, KRTraffic dispersion graph based anomaly detectionLe, D.Q., Jeong, T., et al.Denial of Service Attacks2011-10
Beijing, CNModeling the IPv6 internet AS-level topologyXiao, B., Liu, L., et al.Topology with Skitter2009-02
Rome, ITOn the feasibility of static analysis for BGP convergenceCittadini, L., Rimondini, M., et al.Topology with BGP2009-08
Wuerzburg, DEPerformance evaluation and optimization of content distribut ...Lehrieder, F.Topology with BGP2013-06
Munich, DEFlexPath NP - flexible, dynamically reconfigurable processin ...Ohlendorf, R., Meitinger, M., et al.Anonymized Internet Traces2010-03
Irvine, CA, USPractical recommendations on crawling online social networksGjoka, M., Kurant, M., et al.Topology with BGP2011-10
Urbana, IL, USPreventing encrypted traffic analysisSchear, N.Anonymized Internet Traces2011-01
Urbana, IL, USDesign, analysis, and implementation of effective network fl ...Houmansadr, A.Anonymized Internet Traces2012-00
Hamburg, DEWhat is happening from behind?: Making the impact of interne ...Wahlisch, M., Schmidt, T.C., et al.Topology with Archipelago, Topology with Skitter2008-00
Braga, PTOptimizing network measurements through self-adaptive sampli ...Silva, J.M.C., Lima, S.R.Anonymized Internet Traces2012-06
Louvain, BERevisiting flow-based load balancing: Stateless path selecti ...Detal, G., Paasch, C., et al.Anonymized Internet Traces2012-12
San Diego, CA, USNew directions in traffic measurement and accounting: focusi ...Estan, C., Varghese, G.Anonymized Internet Traces2003-08
Eugene, OR, USInvestigating the mutual impact of the P2P overlay and the A ...Ekbatani, H.R.Topology with BGP2012-12
Haifa, ILNetwork formation games and the Internet structureMeirom, E.A., Mannor, S., et al.Topology with BGP2013-08
Beijing, CNSymbiotic effect: A guideline for network modelingZhang, G.-Q., Zhang, G.-Q., et al.Topology with Archipelago2009-09
Barcelona, ESAdaptive shared-state samplingRaspall, F., Sallent, S.Anonymized Internet Traces2008-00
Pisa, ITThe impact of IXPs on the AS-level topology structure of the ...Gregori, E., Improta, A., et al.Topology with Archipelago2011-01
Rochester, NY, USTemporal and spatial analyses for large-scale cyber attacksDu, H., Yang, S.J.Network telescope: Other2013-00
Urbana, IL, USPreventing SSL traffic analysis with realistic cover trafficSchear, N., Borisov, N.Anonymized Internet Traces2009-11
Stockholm, SEStable content-peering of autonomous systems in a content-ce ...Pacifici, V., Dan, G.Topology with BGP2013-06
Waterloo, CATurbo covert channel: An iterative framework for covert comm ...Ahmadzadeh, S.A., Agnew, G.Anonymized Internet Traces2013-04
Aarhus, DKSelf-organizing weights for Internet AS-graphs and surprisin ...Scholz, J., Greiner, M.Topology with Skitter, Topology with BGP2011-04
Paris, FREfficient algorithms for large-scale topology discoveryDonnet, B., Raoult, P., et al.Topology with Skitter2005-06
Colchester, UKOptimising rule order for a packet filtering firewallMothersole, I., Reed, M.J.Anonymized Internet Traces2011-05
Los Angeles, CA, USResource/accuracy tradeoffs in software-defined measurementMoshref, M., Yu, M., et al.Anonymized Internet Traces2013-08
Los Angeles, CA, USSoftware defined traffic measurement with OpenSketchYu, M., Jose, L., et al.Anonymized Internet Traces2013-04
Atlanta, GA, USOptimal worm-scanning method using vulnerable-host distribut ...Chen, Z., Ji, C.Network Telescope: Witty Worm2007-00
Tokyo, JPInter-AS locator allocation of hierarchical automatic number ...Fujikawa, K., Tazaki, H., et al.Topology with BGP2012-07
Changsha, CNLDC: Detecting BGP prefix hijacking by load distribution cha ...Liu, Y., Su, J., et al.Topology with BGP2012-05
Istanbul, TRComparative evaluation of community detection algorithms: a ...Orman, G.K., Labatut, V., et al.Topology with BGP2012-08
Atlanta, GA, USWhy is the internet traffic bursty in short (sub-RTT) timesc ...Jiang, H., Dovrolis, C.Anonymized Internet Traces2005-06
Melbourne, AURelay node selection in large-scale VoIP overlay networksBui, Q.D., Jennings, A.Topology with BGP2009-07
West Lafayette, IN, USOpportunistic flow-level latency estimation using consistent ...Lee, M., Duffield, N., et al.Anonymized Internet Traces2012-02
Paris, FRIDRD: Enabling inter-domain route diversityMisseri, X., Gojmerac, I., et al.Topology with BGP2013-06
Gif sur Yvette, FRThe inter-domain hierarchy in measured and randomly generate ...Tomasik, J., Weisser, M.-A.Topology with BGP2012-06
Urbana, IL, USAssuring network service with bandwidth and integrity based ...Khan, F.M.Denial of Service Attacks2011-00
Osaka, JPA method to reduce inter-ISP transit cost caused by overlay ...Matsuda, K., Hasegawa, G., et al.Topology with BGP2013-02
Glasgow, UKDeterministic, reduced-visibility inter-domain forwardingStrowes, S.D., Perkins, C.Topology with BGP2009-12
Grenoble, FRIBTrack: an ICMP black holes trackerJacquin, L., Roca, V., et al.Topology with Archipelago2012-03
Riverside, CA, USNetwork monitoring using traffic dispersion graphs (TDGs)Iliofotou, M., Pappu, P., et al.Anonymized Internet Traces, Topology with Skitter2007-00
Haifa, ILHash tables with finite buckets are less resistant to deleti ...Kanizo, Y., Hay, D., et al.Anonymized Internet Traces2010-09
Melbourne, AUAdapting router buffers for energy efficiencyVishwanath, A., Sivaraman, V., et al.Anonymized Internet Traces2011-12
Beijing, CNFlattening and preferential attachment in the internet evolu ...Li, M., Wang, H., et al.Topology with BGP2012-09
Brescia, ITIP traffic classification for QoS guarantees: the independen ...Dusi, M., Gringoli, F., et al.Anonymized Internet Traces2008-08
Pittsburgh, PA, USHADI: Fast diameter estimation and mining in massive graphs ...Kang, U., Tsourakakis, C., et al.Topology with BGP2008-12
Glasgow, UKHarnessing Internet topological stability in Thorup-Zwick co ...Strowes, S.D., Perkins, C.Topology with BGP2012-03
Hatfield, UKA chi-square testing-based intrusion detection modelAbouzakhar, N.S., Bakar, A.Network Telescope: Backscatter2010-09
Chapel Hill, NC, USEmpirical study of the impact of sampling timescales and str ...Shriram, A., Kaur, J.Anonymized Internet Traces2006-04
Beijing, CNStream data analysis for backbone network intrusion detectio ...Xiaojuan, S., Bin, L.Anonymized Internet Traces2012-09
Leuven, BEQuantifying ASes multiconnectivity using multicast informati ...Merindol, P., Van den Schrieck, V., et al.Topology with BGP2009-11
Paris, FRViolation of interdomain routing assumptionsMazloum, R., Buob, M.-O., et al.Topology with BGP2014-03
Palo Alto, CA, USRiskRoute: A framework for mitigating network outage threatsEriksson, B, Durairajan, R., et al.Topology with BGP2013-12
Madrid, ESObscure giants: detecting the provider-free ASesHasan, S., Gorinsky, S.Topology with BGP2012-05
Athens, GROn the local approximations of node centrality in Internet r ...Pantazopoulos, P., Karaliopoulos, M., et al.Topology with Archipelago2013-05
Paris, FRTopology discovery using an address prefix based stopping ru ...Donnet, B., Friedman, T.Topology with Skitter2006-06
Newark, NJ, USA proactive test based differentiation to mitigate low rate ...Shevtekar, A., Ansari, N.Anonymized Internet Traces2007-08
Zhengzhou, CNAn epidemic-dynamics-based model for CXPST spreading in inte ...Wang, Y., Wang, Z., et al.Topology with BGP2013-07
Seoul, KRFast detection and visualization of network attacks on paral ...Choi, H., Lee, H., et al.Network Telescope: Backscatter2008-07
Beijing, CNMultipath interdomain routing via deviation from primary pat ...Qin, D., Yang, J., et al.Topology with BGP2012-02
Beijing, CNAMIR: Another multipath interdomain routingQin, D., Yang, J., et al.Topology with BGP2012-03
Ipswich, UKChinese Internet AS-level topologyZhou, S., Zhang, G.-Q.Topology with Skitter2007-04
Eugene, OR, USEyeball ASes: from geography to connectivityRasti, A.H., Magharei, N., et al.Topology with BGP2010-11
Minneapolis, MI, USNew attacks on timing-based network flow watermarksLin, Z, Hopper, N.Anonymized Internet Traces2012-08
Tel-Aviv, ILImproving AS relationship inference using PoPsNeudorfer, L., Shavitt, Y., et al.Topology with BGP2013-04
Boston, MA, USVirtual landmarks for the internetTang, L., Crovella, M.Topology with Skitter2003-10
San Diego, CA, USRealistic and responsive network traffic generationVishwanath, K., Vahdat, A.Anonymized Internet Traces2006-10
West Lafayette, IN, USA framework for efficient class-based samplingSaxena, M., Kompella, R.Anonymized Internet Traces2009-04
Hamilton, NZEfficient internet topology discovery techniquesKing, A.Topology with Archipelago2010-02
Austin, TX, USPower and performance analysis of network traffic prediction ...Iqbal, M.F., John, L.K.Anonymized Internet Traces2012-04
Nashville, TN, USOn scalability of proximity-aware peer-to-peer streamingDai, L, Cao, Y., et al.Topology with Archipelago, Topology with BGP2009-01
Sophia Antipolis, FROn the dynamics of locators in LISPSaucez, D., Donnet, B.Topology with BGP2012-05
Pittsburgh, PASanctuary trail: refuge from Internet DDoS entrapmentHsiao, H.-C., Kim, T., et al.Topology with BGP2012-06
Orlando, FL, USAnalysis of large scale traceroute datasets in Internet rout ...Ahmad, M.Z., Guha, R.Topology with Archipelago2012-12
Changsha, CNk-Fault tolerance of the Internet AS graphDeng, W., Karaliopoulos, M., et al.Topology with BGP2011-04
Haifa, ILMaximizing the throughput of cuckoo hashing in network devic ...Kanizo, Y., Hay, D., et al.Anonymized Internet Traces2012-02
Tokyo, JPMonitoring the dynamics of network traffic by recursive mult ...Kato, M., Cho, K., et al.Anonymized Internet Traces2012-10
Los Alamos, NM, USCriticality analysis of Internet infrastructureYan, G., Eidenbenz, S., et al.Topology with Skitter2010-05
London, UKIdentifiability of link metrics based on end-to-end path mea ...Ma, L., He, T., et al.Topology with Archipelago2013-10
Brno, CZEvolution of cache replacement policies to track heavy-hitte ...Zadnik, M., Canini, M.Anonymized Internet Traces2010-10
Davis, CA, USCharacterizing and improving distributed Network-based Intru ...Proebstel, E.Anonymized Internet Traces2008-00
Pittsburgh, PA, USPi: a path identification mechanism to defend against DDoS a ...Yaar, A., Perrig, A., et al.Topology with Skitter2003-05
Shanghai, CNNetwork quotients: structural skeletons of complex systemsXiao, Y., MacArthur, B.D., et al.Topology with BGP2008-00
Chatham Maritime, UKSimulation of zero-day worm epidemiology in the dynamic, het ...Tidy, L.J., Woodhead, S., et al.Network Telescope: Witty Worm2013-10
Darmstadt, DEModelling the internet delay space based on geographical loc ...Kaune, S., Pussep, K., et al.Topology with Skitter2009-02
Munich, DEA hardware packet re-sequencer unit for network processorsMeitinger, M., Ohlendorf, R., et al.Anonymized Internet Traces2008-02
Anandapur, INSpread of information in a social network using influential ...Chaudhury, A., Basuchowdhuri, P., et al.Topology with BGP2012-05
San Diego, CA, USSwing: Realistic and responsive network traffic generationVishwanath, K.V., Vahdat, A.Anonymized Internet Traces2009-06
Aveiro, PTTopological implications of cascading interdomain bilateral ...Jesus, V., Aguiar, R.L., et al.Topology with Archipelago2011-10
Paris, FREngineering a new loop-free shortest paths routing algorithmD'Angelo, G., D'Emidio, M., et al.Topology with Archipelago2012-00
Leuven, BERetouched Bloom filters: allowing networked applications to ...Donnet, B., Bayant, B., et al.Topology with Skitter2006-12
Changsha, CNWhom to convince? It really matters in BGP prefix hijacking ...Liu, Y., Dai, B., et al.Topology with BGP2011-06
Beijing, CNMeasuring the impacts of sampling bias on internet AS-level ...Zhang, G.Topology with BGP2009-03
Beijing, CNA2C: Anti-attack counters for traffic measurementHe, K., Hu, C., et al.Anonymized Internet Traces2010-12
Sendai, JPDTRAB: Combating against attacks on encrypted protocols thro ...Fadlullah, Z.M., Taleb, T., et al.Network Telescope: Backscatter2010-08
Cambridge, UKAntitrust analysis for the internet upstream market: a Borde ...D'Ignazio, A., Giovannetti, E.Topology with BGP2006-02
Pisa, ITDPI over commodity hardware: implementation of a scalable fr ...De Sensi, D.Anonymized Internet Traces2013-02
Berlin, DEProbability estimation over large-scale random networks via ...Freno, A., Keller, M., et al.Topology with Skitter2013-12
Mugla, TRRecreating a large-scale BGP incident in a realistic environ ...Karaarslan, E., Perez, A.G., et al.Topology with BGP2013-10
Madrid, ESTowards an energy efficient 10 Gb/s optical ethernet: Perfor ...Larrabeiti, D., Reviriego, P., et al.Anonymized Internet Traces2011-07
Hong Kong, CNCoding and replication co-design for interactive multiview v ...Huang, H., Zhang, B., et al.Topology with Archipelago2012-03
Berkeley, CA, USNetcalls: End host function calls to network traffic process ...Sherry, J., Kim, D., et al.Topology with BGP2012-07
Bucharest, HUMulti-path inter-domain routing: The impact on BGP's scalabi ...Szekeres, A.Topology with BGP2011-08
Melbourne, AUMultifractality in TCP/IP traffic: the case againstVeitch, D., Hohna, N., et al.Anonymized Internet Traces2005-06
Coimbatore, INA real time detection of Distributed Denial of Service attac ...Anitha, R., Karthik, R., et al.Denial of Service Attacks2012-05
Philadelphia, PA, USAll-pairs shortest-paths for large graphs on the GPUKatz, G.J., Kider, J.T.Topology with BGP2008-06
Bogota, COEvaluacion de desempeno de diversas arquitecturas de commuta ...Moreno, S.D.B.Anonymized Internet Traces2011-12
Shenyang, CNCorrectness of sampling bias on Internet router-level topolo ...Li, C., Zhao, H., et al.Topology with Skitter2008-10
Paris, FREnhancing the computation of distributed shortest paths on r ...D'Angelo, G., D'Emidio, M., et al.Topology with Archipelago2012-11
Xiangtan, CNHDLBR: A name-independent compact routing scheme for power-l ...Tang, M., Zhang, G., et al.Topology with Skitter2013-02
Warsaw, PLOn the design of energy-efficient service rate control mecha ...Karpowicz, M.Anonymized Internet Traces2013-09
Lyon, FRTraffic classification techniques supporting semantic networ ...Gremillet, O., Goncalves, P., et al.Anonymized Internet Traces2010-06
Madras, INAdaptive network intrusion detection system using a hybrid a ...Karthick, R.R., Hattiwale, V.P., et al.Denial of Service Attacks2012-01
Valencia, ESA histogram-based stochastic process for finite buffer occup ...Hernandez-Orallo, E., Vila-Carbo, J.Anonymized Internet Traces2007-00
Charlotte, NC, USCross-layer TCP flow aware model for energy efficient use of ...Haider, A., Acharya, K., et al.Anonymized Internet Traces2010-12
Kaiserslautern, DENetReview: detecting when interdomain routing goes wrongHaeberlen, A., Avramopoulos, I., et al.Topology with BGP2009-04
Blacksburg, VA, USAttack diagnosis: throttling distributed denial-of-service a ...Chen, R., Park, J.-M.Topology with Skitter2005-10
Vigo, ESOptimal configuration of energy-efficient ethernetHerreria-Alonso, S., Rodriguez-Perez, M., et al.Anonymized Internet Traces2012-03
Stanford, CA, USUsing packet histories to troubleshoot networksHandigol, N.A.Anonymized Internet Traces2013-06
Hatfield, UKAn enhanced fuzzy ARM approach for intrusion detectionAbouzakhar, N.S., Chen, H., et al.Network Telescope: Backscatter2011-04
Kent, OH, USMetric tree-like structures in real-life networks: an empiri ...Abu-Ata, M., Dragan, F.F.Topology with Skitter, Topology with BGP2014-02
Berkeley, CA, USContinuous time group discovery in dynamic graphsMiller, K., Eliassi-Rad, T.Topology with BGP2009-12
Ames, IA, USAffecting IP traceback with recent Internet topology mapsMartins, O.A.Topology with Skitter2005-06
Seoul, KRAPFS: Adaptive Probabilistic Filter Scheduling against distr ...Seo, D., Lee, H., et al.Topology with Skitter2013-11
Redmond, WA, USCan internet video-on-demand be profitable?Huang, C., Li, J., et al.Topology with BGP2007-00
London, UKRedundancy and robustness of AS-level Internet topology and ...Zhou, S., Mondragon, R.J.Topology with Skitter2004-02
Baltimore, MD, USDiscovery of persistent threat structures through temporal a ...Namayanja, J.M., Janeja, V.P.Anonymized Internet Traces2013-06
Younstown, OH, USCan we study the topology of the Internet from the vantage p ...Drivere, A.A.Topology with BGP2011-12
University Park, PA, USToward a framework for forensic analysis of scanning wormsHamadeh, I., Kesidis, G.Network Telescope: Witty Worm2006-06
Hong Kong, CNAn efficient approach to multi-level route analyticsChen, A., Chan, E.W.W., et al.Topology with Archipelago2013-05
Beijing, CNA backscatter technology based study on source address spoof ...Li, P., Bi, J., et al.Network Telescope: Backscatter2008-00
Atlanta, GA, USMeasuring network-aware worm spreading abilityChen, Z., Ji, C.Network Telescope: Witty Worm2007-05
Madrid, ESEfficient implementation of error correction codes in hash t ...Reviriego, P., Pontarelli, S., et al.Anonymized Internet Traces2014-01
Monterey, CA, USPassive TCP reconstruction and forensic analysis with tcpflo ...Garfinkel, S.L., Shick, M.Anonymized Internet Traces2013-09
Manouba, TNDDoS flooding attack detection scheme based on F-divergenceRahmani, H., Sahli, N., et al.Denial of Service Attacks2012-04
Ramat-Gan, ILVulnerable delegation of DNS resolutionHerzberg, A., Shulman, H.Anonymized Internet Traces2013-09
Beijing, CNTracking millions of flows in high speed networks for applic ...Pan, T., Guo, X., et al.Anonymized Internet Traces2012-03
Redmond, WA, USHow secure are secure interdomain routing protocols?Goldberg, S., Schapira, M., et al.Topology with BGP2010-10
West Lafayette, IN, USCamouflaging timing channels in web trafficSellke, H., Wang, C.-C., et al.Anonymized Internet Traces2009-12
Caparica, PTInter-domain traffic engineering using an AS-level multipath ...Amaral, P., Silva, E., et al.Topology with BGP2011-06
Orlando, FL, USA tale of nine Internet exchange points: studying path laten ...Ahmad, M.Z., Guha, R.Topology with BGP2012-10
Berkeley, CA, USAchieving flexibility and performance for packet forwarding ...Moon, D.Anonymized Internet Traces2010-05
London, UKOn the relationship between fundamental measurements in TCP ...Clegg, R.G., Araujo, J.T., et al.Anonymized Internet Traces2013-06
San Diego, CA, USNew directions in traffic measurement and accountingEstan, C., Varghese, G.Anonymized Internet Traces2002-10
Wurzburg, DEWho profits from peer-to-peer file-sharing? Traffic optimiza ...Burger, V., Lehrieder, F., et al.Topology with BGP2012-09
Atlanta, GA, USExploiting underlying structure for detailed reconstruction ...Kumar, A., Paxson, V., et al.Network Telescope: Witty Worm2005-10
Washington DC, USUsers get routed: Traffic correlation on Tor by realistic ad ...Johnson, A., Wacek, C., et al.Topology with Archipelago, Topology with BGP2013-11
Tehran, IRTDPF: a traceback-based distributed packet filter to mitigat ...Fallah, M.S., Kahani, N.Topology with Skitter2014-02
Ljubljana, SIPolicy relationship annotations of predefined AS-level topol ...Vilhar, A., Novak, R.Topology with BGP2008-10
Aalto, FIModels for the simulation of a name-based interdomain routin ...Keating, A.Topology with BGP2012-06
Pisa, ITk-dense communities in the internet AS-level topologyGregori, E., Lenzini, L, et al.Topology with Archipelago2011-01
Seattle, WA, USConsensus routing: the internet as a distributed systemJohn, J.P., Katz-Bassett, E., et al.Topology with BGP2008-00
Beijing, CNAnalysis of UDP traffic usage on internet backbone linksZhang, M., Dusi, M., et al.Anonymized Internet Traces2009-09
Nanjing, CNConstraint conditions to eliminate AS incentive of lying in ...Jiang, J., Luo, J., et al.Topology with BGP2013-05
Harbin, CNA framework to quantify the pitfalls of using traceroute in ...Zhang, Y., Oliveira, R., et al.Topology with Archipelago2011-10
Irvine, CA, USTowards unbiased BFS samplingKurant, M., Markopoulou, A.Topology with BGP2011-10
Amsterdam, NLImpact of topology on BGP convergenceHanif, S.Topology with BGP2010-08
Tokyo, JPPhishCage: reproduction of fraudulent websites in the emulat ...Miyamoto, D., Miyachi, T., et al.Topology with BGP2013-03
Trondheim, NOReliable broadcast contribution over the public InternetMarkman, M.A.J., Tokheim, S.Anonymized Internet Traces2012-06
Caparica, PTDTIA: An Architecture for Inter-Domain RoutingAmaral, P., Bernardo, L., et al.Topology with BGP2009-08
Paris, FRIXP's: mapped?Augustin, B., Krishnamurthy, B., et al.Topology with Skitter2009-11
Changsha, CNAssessing survivability of inter-domain routing system under ...Liu, Y., Peng, W., et al.Topology with BGP2013-07
Caparica, PTScalable multi-region routing at inter-domain levelAmaral, P., Ganhao, F., et al.Topology with BGP2010-03
Budapest, HUAnalysis of elephant users in broadband network trafficMegyesi, P., Molnar, S.Anonymized Internet Traces2013-08
Petropolis, RJ, BRDistributed assessment of the closeness centrality ranking i ...Wehmuth, K., Ziviani, A.Topology with Skitter2012-04
West Lafayette, IN, USAnonymizing network traces with temporal pseudonym consisten ...Qardaji, W., Li, N.Anonymized Internet Traces2012-06
Southampton, UKSymmetry in complex networksMacArthur, B.D., Sanchez-Garcia, R.J., et al.Topology with BGP2008-11
San Diego, CA, USThe power of slicing in internet flow measurementKompella, R., Estan, C.Anonymized Internet Traces2005-10
Tempe, AZ, USNetwork-aware behavior clustering of Internet end hostsXu, K., Wang, F., et al.Anonymized Internet Traces, Network Telescope: Witty Worm2011-04
Glasgow, UKCompact routing on the Internet AS-graphStrowes, S.D., Mooney, G., et al.Topology with BGP2011-06
Beirut, LBHop count variabilityMukaddam, A., ELHajj, I.Topology with Skitter2011-12
Seattle, WA, USTransport layer renegingEkiz, N., Amer, P.D.Anonymized Internet Traces2012-00
Reno, NV, USAnalyzing router responsiveness to active measurement probesGunes, M.H., Sarac, K.Topology with Skitter2009-03
Amherst, MA, USSaving energy and improving TCP throughput with rate adaptat ...Hanay, Y.S., Li, W., et al.Anonymized Internet Traces2012-06
Haifa, ILEstimators also need shared values to grow togetherTsidon, E., Hanniel, I., et al.Anonymized Internet Traces2012-03
Orlando, FL, USImpact of Internet exchange points on Internet topology evol ...Ahmad, M.Z., Guha, R.Topology with Skitter2010-10
Tel-Aviv, ILNear-deterministic inference of AS relationshipsWeinsberg, U., Shavitt, Y., et al.Topology with BGP2009-04
Irvine, CA, US2.5K-graphs: from sampling to generationGjoka, M., Kurant, M., et al.Topology with BGP2012-08
Singapore, SGEfficient extraction of high-Betweenness vertices from heter ...Chong, W.H., Toh, W.S.B., et al.Topology with BGP2013-00
Aveiro, PTProfiling de trafego inter-operador baseado em analise multi ...Coelho, N.M.M.Anonymized Internet Traces2012-12
Stockholm, SEContent-peering dynamics of autonomous caches in a content-c ...Pacifici, V., Dan, G.Topology with BGP2013-04
London, UKA large-scale zero-day worm simulator for cyber-epidemiologi ...Tidy, L., Woodhead, S., et al.Network Telescope: Witty Worm2013-02
Rome, ITSupporting the Web with an information centric network that ...Detti, A., Pomposini, M., et al.Anonymized Internet Traces2012-08
Lubeck, DEDynaCORE - dynamically reconfigurable coprocessor for networ ...Albrecht, C., Foag, J., et al.Anonymized Internet Traces2010-03
London, UKForecasting full-path network congestion using one bit signa ...Woldeselassie, M., Clegg, R., et al.Anonymized Internet Traces2010-07
Sevilla, ESLinguistic summarization of network traffic flowsPouzols, F.M., Barriga, A., et al.Anonymized Internet Traces2008-06
Buenos Aires, ARhttp://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsuali ...Alvarez-Hamelin, J.I., Anunziata, D., et al.Topology with BGP2011-07
Reno, NV, USOn the scalability of path exploration using opportunistic p ...Karaoglu, H.T., Yuksel, M., et al.Topology with BGP2011-06
Tel-Aviv, ILCBTree: A practical concurrent self-adjusting search treeAfek, Y., Kaplan, H., et al.Anonymized Internet Traces2012-10
Changsha, CNEvaluation of prefix hijacking impact based on hinge-transmi ...Yujing, L., Bofeng, Z., et al.Topology with BGP2010-11
Madison, WI, USBitmap algorithms for counting active flows on high speed li ...Estan, C., Varghese, G., et al.Anonymized Internet Traces2006-10
Austin, TX, USEfficient traffic aware power management in multicore commun ...Iqbal, M.F., John, L.K.Anonymized Internet Traces2012-10
Newcastle, UKCOTraSE Connection Oriented Traceback in Switched EthernetAndreou, M.S., van Moorsel, A.Anonymized Internet Traces2009-00
Tokyo, JPAnalysis of cooperative management strategies against route- ...Akashi, O.Topology with Skitter, Topology with BGP2011-05
San Diego, CA, USDetecting evasion attacks at high speeds without reassemblyVarghese, G., Fingerhut, J., et al.Anonymized Internet Traces2006-10
Austin, TX, USFlow migration on multicore network processors: Load balanci ...Iqbal, M.F., Holt, J., et al.Anonymized Internet Traces2013-10
Gjovik, NOSlow Port Scanning with BroLarsen, R.Anonymized Internet Traces2013-11
Wellington, NZMartingale limit theorems of divisible statistics in a multi ...Wu, H., Kvizhinadze, G.Topology with BGP2011-03
Cesson-Sevigne, FROAZE: A network-friendly distributed zapping system for peer ...Chen, Y., Le Merrer, E., et al.Topology with BGP2012-01
Madrid, ESTrade-offs in optimizing the cache deployments of CDNsHasan, S., Gorinsky, S., et al.Topology with BGP2014-04
Beijing, CNCLUE: Achieving fast update over compressed table for parall ...Yang, T., Duan, R., et al.Anonymized Internet Traces2012-06
Brescia, ITComparing traffic classifiersSalgarelli, L., Gringoli, F., et al.Anonymized Internet Traces2007-00
Ithaca, NY, USA study of prefix hijacking and interception in the internetBallani, H., Francis, P., et al.Topology with BGP2007-10
York, UKMarkov-modulated on/off processes for long-range dependent i ...Clegg, R.Anonymized Internet Traces2006-10
Pittsburgh, PA, USStackPi: new packet marking and filtering mechanisms for DDo ...Yaar, A., Perrig, A., et al.Topology with Skitter2006-10
Ikoma, JPOutfitting an inter-AS topology to a network emulation testb ...Hazeyama, H., Suzuki, M., et al.Topology with BGP2008-00
Riverside, CA, USLong-range dependence: ten years of Internet traffic modelin ...Karagiannis, T., Molle, M., et al.Anonymized Internet Traces2004-09
Gainesville, FL, USAn efficient spectral bound for link vulnerability assessmen ...Dinh, T.N., Shen, Y., et al.Topology with BGP2012-10
Braga, PTAutomated and distributed network service monitoringGermoglio, G., Dias, B., et al.Topology with Archipelago2009-09
Beijing, CNFiltering location optimization for the reactive packet filt ...Lu, N., Wang, Y., et al.Topology with Archipelago2013-07
Chungli, TWRIHT: A novel hybrid IP traceback schemeYang, M.-H., Yang, M.-C.Topology with Skitter2012-04
Limerick, IEThe unreasonable effectiveness of tree-based theory for netw ...Melnik, S., Hackett, A., et al.Topology with Skitter, Topology with BGP2011-03
Changsha, CNAn efficient algorithm for AS path inferringYang, G., Dou, W.Topology with BGP2009-08
Rochester, NY, USISP tiered model based architecture for routing scalabilityNozaki, Y., Tuncer, H., et al.Topology with BGP2012-05
Tokyo, JPCOSMO - Emulation of Internet traffic (poster abstract)Miyamoto, D., Miyachi, T.Topology with BGP2013-03
Gothenburg, SEMultifaceted defense against Distributed Denial of Service a ...Fu, Z.Denial of Service Attacks2012-08
Buenos Aires, AREstudio del Trafico Autosimilar Orientado a la Simulacion Me ...Scappini, R.Anonymized Internet Traces2010-08
Changchun, CNImproved SEIR viruses propagation model and the patch's impa ...Ma, C., Yang, Y., et al.Network Telescope: Code-Red Worm2013-04
Tokyo, JPProposal and evaluation of network-processor acceleration ar ...Okuno, M., Nishi, H.Anonymized Internet Traces2004-03
Riverside, CA, USTraffic-aware power optimization for network applications on ...Kuang, J., Bhuyan, L., et al.Anonymized Internet Traces2012-06
Evanston, IL, USWhere the sidewalk ends: extending the internet as graph usi ...Chen, K., Choffnes, D.R., et al.Topology with BGP2009-12
Princeton, NJ, USInter-AS traffic patterns and there implicationsFang, W., Peterson, L.Anonymized Internet Traces1999-12
Pittsburgh, PA, USSTRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapme ...Hsiao, H.-C., Kim, T.H., et al.Topology with BGP2013-05
Albuquerque, NM, USInternet topology over timeEdwards, B., Hofmeyr, S., et al.Topology with BGP2012-02
Cookeville, TN, USIdentifying threats using graph-based anomaly detectionEberle, W., Holder, L., et al.Topology with BGP2009-04
Aveiro, PTLocalization and spreading of diseases in complex networksGoltsev, A.V., Dorogovtsev, S.N., et al.Topology with Skitter2012-09
Debrecen, HULevy flights and fractal modeling of internet trafficTerdik, G., Gyires, T.Anonymized Internet Traces2009-02
Haifa, ILOptimal dynamic hash tablesKanizo, Y., Hay, D., et al.Anonymized Internet Traces2009-00
Rome, ITScalability measurements in an information-centric networkMelazzi, N.B., A. Detti, A., et al.Anonymized Internet Traces2012-05
Burlington, MA, USInter-domain rendezvous service architectureRajahalme, J., Sarela, M., et al.Topology with BGP2009-12
Cambridge, MA, USIdentifying known and unknown peer-to-peer trafficConstantinou, F., Mavrommatis, P.Anonymized Internet Traces2006-07
Ames, IA, USTOPO: a topology-aware single packet attack traceback schemeZhang, L., Guan, Y.Topology with Skitter2006-08
Miami, FL, USLeveraging symbiotic relationship between simulation and emu ...Erazo, M.A., Liu, J.Anonymized Internet Traces2013-05
London, UKBGPfuse: using visual feature fusion for the detection and a ...Papadopoulos, S., Theodoridis, G., et al.Topology with BGP2013-10
College Station, TX, USEliminating network protocol vulnerabilities through abstrac ...Casey, C.J., Sutton, A., et al.Anonymized Internet Traces2013-10
Rio de Janeiro, BRCaracterizacao e identificacao de papeis e vertices em redes ...Spinelli, L.P.Anonymized Internet Traces2011-08
Pisa, ITOn the feasibility of measuring the internet through smartph ...Faggiani, A., Gregori, E., et al.Topology with Archipelago2012-05
Aachen, DEMetrics for characterizing complexity of network trafficRiihijarvi, J., Mahonen, P., et al.Network Telescope: Backscatter2008-06
Paris, FRA CIDR stopping rule for topology discoveryDonnet, B., Friedman, T.Topology with Skitter2005-05
Hampton, VA, USA fluid-based approach for modeling network activitiesHu, Y.-H.Anonymized Internet Traces2013-08
Braga, PTMultiadaptive sampling for lightweight network measurementsSilva, J.M.C., Lima, S.R.Anonymized Internet Traces2012-07
Austin, TX, USGet off my prefix! the need for dynamic, gerontocratic polic ...Wong, E.L., Shmatikov, V.Topology with BGP2011-06
Beijing, CNStudy on classification and characteristics of source addres ...Bi, J., Hu, P., et al.Network Telescope: Backscatter2010-04
Rochester, NY, USDiscovering collaborative cyber attack patterns using social ...Du, H., Yang, S.J.Network telescope: Other2011-03
London, UKModelling internet traffic using Markov chainsClegg, R.Anonymized Internet Traces2006-00
Hong Kong, CNAnonymous overlay network supporting authenticated routingSchlegel, R., Wong, D.S.Topology with Archipelago2012-05
San Diego, CA, USCoDef: Collaborative defense against large-scale link-floodi ...Lee, S.B., Kang, M.S., et al.Topology with BGP2013-12
Rome, ITInvestigating the trade-off between overhead and delay for f ...Iacovazzi, A., Baiocchi, A.Anonymized Internet Traces2013-06
Minhsiung, TWA virtual service framework for service composition QoS base ...Wu, M.-F., Jiang, T.M., et al.Topology with Archipelago2008-12
New Haven, CT, USA flow- and packet-level model of the InternetVenkataramanan, R., Jeong, M.-W., et al.Anonymized Internet Traces2011-07
London, UKSimulating internet traffic with Markov-modulated processesClegg, R.Anonymized Internet Traces2007-00
Pernambuco, BRAn orchestration approach for unwanted Internet traffic iden ...Feitosa, E., Souto, E., et al.Denial of Service Attacks2012-05
Brescia, ITQuantifying the accuracy of the ground truth associated with ...Dusi, M., Gringoli, F., et al.Anonymized Internet Traces2011-04
Uberlandia, BRTowards local routing state in the future internetPasquini, R., Verdi, F.L., et al.Topology with BGP2012-04
Madrid, ESBGP-XM: BGP eXtended multipath for transit Autonomous System ...Camacho, J.M., Garcia-Martinez, A., et al.Topology with BGP2013-03
Hong Kong, CNToward continuous push-based P2P live streamingRen, D., Wong, W., et al.Topology with Archipelago2012-12
Nanjing, CNComparative research on internet flows characteristicsZhang, X., Ding, W.Anonymized Internet Traces2012-10
Madrid, ESDevelopment and evaluation of a low-cost scalable architectu ...Martinez, V.M.Anonymized Internet Traces2012-00
Granville, OH, USDivergence in network trafficTakahashi, E.K., Chen, Y., et al.Denial of Service Attacks2011-11
Wuhan, CNLocality-awareness in BitTorrent-like P2P applicationsLiu, B., Cui, Y., et al.Topology with BGP2009-04
Shanghai, CNTrading bandwidth for playback lag: Can active peers help?Huang, D., Zhao, J., et al.Topology with BGP2010-10
Ramat-Gan, ILOff-path hacking: the illusion of challenge-response authent ...Gilad, Y., Herzberg, A., et al.Anonymized Internet Traces2013-10
University Park, PA, USEstimating systematic risk in real-world networksLaszka, A., Johnson, B., et al.Topology with BGP2014-03
Zouk Mosbeh, LBProtecting TCP services from denial of service attacksFarhat, H.Topology with Skitter2006-09
Beijing, CNPreventing DDoS attacks by identifier/locator separationLuo, H., Lin, Y., et al.Denial of Service Attacks2013-11
Newark, DE, USCorrecting congestion-based error in network telescope's obs ...Wei, S., Mirkovic, J.Network Telescope: Witty Worm2008-00
Warsaw, PLMulti-criteria decision algorithms for efficient content del ...Beben, A., Batalla, J.M., et al.Topology with BGP2012-08
Hamburg, DEMobilitaet und Proximitaet in strukturierten Overlay-Netzen ...Dramburg, M.Topology with Archipelago, Topology with Skitter2008-08
Indianapolis, IN, USFast autonomous system tracebackDurresi, A., Paruchuri, V., et al.Topology with Skitter2009-03
Shenyang, CNAS-level Internet macroscopic topology centralization evolve ...Song, J., Zhao, H., et al.Topology with Skitter2010-10
Pittsburgh, PA, USThe coremelt attackStuder, A., Perrig, A.Topology with BGP2009-09
Coimbatore, INEvaluating machine learning algorithms for detecting DDoS at ...Suresh, M., Anitha, R.Network Telescope: Code-Red Worm2011-06
San Diego, CA, USAutomatically inferring patterns of resource consumption in ...Estan, C., Savage, S., et al.Anonymized Internet Traces2003-08
Beijing, CNExperimental study on diversity and novelty of interdomain p ...Qin, D., Yang, J., et al.Topology with BGP2013-01
Singapore, SGTop-k maximal influential paths in network dataXu, E., Hsu, W., et al.Network Telescope: Code-Red Worm2012-09
Fort Collins, CO, USSimulating internet scale topologies with metaroutingDiBenedetto, S., Stone, A., et al.Topology with BGP2010-03
Rome, ITOn the fly application flows identification by exploiting K- ...Maiolini, G., Molina, G., et al.Anonymized Internet Traces2009-00
Madrid, ESWould energy efficient ethernet be effective on 10Gbps optic ...Reviriego, P., Larrabeiti, D., et al.Anonymized Internet Traces2010-07
Ljubljana, SIThe impact of network topology on the performance of MAP sel ...Vilhar, A., Novak, R., et al.Topology with BGP2010-05
Shenyang, CNAnalysis on traveling time of internetLi, C., Zhao, H., et al.Topology with Archipelago2007-00
Munich, DEEfficient simulation of large-scale P2P networks: modeling n ...Kunzmann, G., Nagel, R., et al.Topology with Skitter2007-02
Harbin, CNQuantifying the pitfalls of traceroute in AS connectivity in ...Zhang, Y., Oliveira, R., et al.Topology with Archipelago2010-04
Boston, MA, USAn empirical validation of growth models for complex network ...Mislove, A., Koppula, H.S., et al.Topology with BGP2013-00
Hamburg, DEA virtual and distributed control layer with proximity aware ...Knauf, A., Hege, G., et al.Topology with Archipelago2010-08
Sydney, AUUsing type-of-relationship (ToR) graphs to select disjoint p ...Qazi, S., Moors, T.Topology with BGP2007-11
Changsha, CNA study of IP prefix hijacking in cloud computing networksLiu, Y., Peng, W., et al.Topology with BGP2013-02
Boston, MA, USGeometric exploration of the landmark selection problemTang, L., Crovella, M.Topology with Skitter2004-05
Edinburgh, UKHigh-fidelity per-flow delay measurements with reference lat ...Lee, M., Duffield, N., et al.Anonymized Internet Traces2013-10
San Diego, CA, USCharacterizing and measuring path diversity of internet topo ...Teixeira, T., Marzullo, K., et al.Topology with Skitter2003-06
Baltimore, MD, USOn the effectiveness of distributed worm monitoringRajab, M., Monrose, F., et al.Network Telescope: Witty Worm2005-07
Boston, MA, USOn supporting mobility and multihoming in recursive internet ...Ishakian, V., Akinwumi, J., et al.Anonymized Internet Traces2012-07
Santa Cruz, CA, USCharacterizing per-application network traffic using entropyPetkov, V., Rajagopal, R., et al.Anonymized Internet Traces2013-05
Changsha, CNAnalysis of prefix hijacking based on AS hierarchical modelZhang, B.-F., Li, Y., et al.Topology with BGP2011-09
Minneapolis, MN, USOn properties of Internet Exchange Points and their impact o ...Xu, K., Duan, Z., et al.Topology with Skitter2004-04
Pullman, WA, USNetshuffle: Improving traffic trace anonymization through gr ...Valgenti, V.C., Paul, R.R., et al.Anonymized Internet Traces2011-06
Wright Patterson AFB, OH, USScalable wavelet-based active network stepping stone detecti ...Gilbert, J.Anonymized Internet Traces2012-03
Heraklion, GRITA: Innocuous topology awareness for unstructured P2P netwo ...Papadakis, H., Fragopoulou, P., et al.Topology with Archipelago, Topology with BGP2012-05
Paris, FRRelevance of massively distributed explorations of the inter ...Guillaume, J.-L., Latapy, M., et al.Topology with Skitter2006-11
Paris, FRDescribing and simulating internet routesLeguay, J., Latapy, M., et al.Topology with Skitter2007-06
Tokyo, JPDNS-based defense against IP spoofing attacksMoriyama, E., Takahashi, T., et al.Anonymized Internet Traces2012-11
Pullman, WA, USTrustGuard: A flow-level reputation-based DDoS defense syste ...Liu, H., Sun, Y., et al.Denial of Service Attacks, Anonymized Internet Traces2011-01
Beijing, CNExploring possible strategies for competitions between Auton ...Li, L., Chen, C.Topology with BGP2008-05
Burlington, MA, USIncentive-informed inter-domain multicastRajahalme, J.Topology with BGP2010-05
Philadelphia, PA, USMoment-based spectral analysis of large-scale networks using ...Preciado, V.M., Jadbabaie, A.Topology with Skitter2013-04
Pittsburgh, PA, USStegoTorus: a camouflage proxy for the Tor anonymity systemWeinberg, Z., Wang, J., et al.Anonymized Internet Traces2012-10
Austin, TX, USWorkload-aware network processors: improving performance whi ...Iqbal, M.F.Anonymized Internet Traces2013-08
Beijing, CNA hardware-based TCP stream state tracking and reassembly so ...Zhao, Y., Yuan, R., et al.Anonymized Internet Traces2012-06
L'Aquila, ITEngineering a new algorithm for distributed shortest paths o ...Cicerone, S., D'Angelo, G., et al.Topology with Archipelago2012-03
Paris, FRA TCP delay-based mechanism for detecting congestion in the ...Dassouki, K., Debar, H., et al.Denial of Service Attacks2013-06
Bari, ITSpectral models for bitrate measurement from packet sampled ...Grieco, L.A., Barakat, C., et al.Anonymized Internet Traces2011-06
Shenyang, CNAn improved BA model for router-level internet macroscopic t ...Xu, Y., Zhao, H.Topology with Skitter2009-05
Barcelona, ESLatency estimation of IP flows using NetFlowSantiago, S.S.Anonymized Internet Traces2013-06
Hamilton, NY, USOn the prevalence and characteristics of MPLS deployments in ...Sommers, J., Erikson, B., et al.Topology with Archipelago, Topology with BGP2011-11
Haifa, ILThe variable-increment counting Bloom filterRottenstreich, O., Kanizo, Y., et al.Anonymized Internet Traces2012-03
Gif sur Yvette, FRaSHIIP: Autonomous generator of random internet-like topolog ...Tomasik, J., Weisser, M.-A.Topology with Archipelago2010-09
Changsha, CNShedding light on the use of AS relationships for path infer ...Deng, W., Muhlbauer, W., et al.Topology with BGP2012-06
Munich, DEPartitioning the InternetWachs, M., Grothoff, C., et al.Topology with Archipelago, Topology with BGP2012-10
Tokyo, JPIncentive mechanism for prompting ISPs to implement outbound ...Takahashi, Y., Ishibashi, K.Topology with BGP2011-10
Ann Arbor, MI, USMeasuring IPv6 adoptionCzyz, J., Allman, M., et al.Topology with Archipelago2014-00
Beijing, CNBackup routing for BGP: Virtual ring routing schemeShu, W., Changjia, C.Topology with BGP2009-09
Helsinki, FICanopy: publish/subscribe with upgraph combinationTarkoma, S., Antikainen, M.Topology with BGP2010-05
London, UKA trace-driven analysis of caching in content-centric networ ...Tyson, G., Kaune, S., et al.Topology with Archipelago2012-08
Berkeley, CA, USFuture architectures for middlebox processing services on th ...Sherry, J.Topology with Archipelago, Topology with BGP2012-12
Buenos Aires, ARUnderstanding edge connectivity in the Internet through core ...Alvarez-Hamelin, J.I., Beiro, M.G., et al.Topology with Skitter2011-03
London, UKCache 'less for more' in information-centric networksChai, W.K., He, D., et al.Topology with BGP2012-05
London, UKTowards informative statistical flow inversionClegg, R., Haddadi, H., et al.Anonymized Internet Traces2007-05
Rome, ITThe CONET solution for information centric networkingBlefari-Melazzi, N., Cancellieri, M., et al.Anonymized Internet Traces2012-01
Madrid, ESImpact of prefix hijacking on payments of providersBangera, P., Gorinsky, S.Topology with BGP2011-01
Munich, DEInteractive visualization of global routing dynamicsHelminger, M.Topology with BGP2011-06
Paris, FRExact and approximate algorithms for computing the hyperboli ...Cohen, N., Couderty, D., et al.Topology with BGP2012-09
Paris, FRImproved algorithms for network topology discoveryDonnet, B., Friedman, T., et al.Topology with Skitter2005-03
Hangzhou, CNPartially ordered sets in complex networksXuan, Q., Du, F., et al.Topology with BGP2010-04
Shenyang, CNAnalysis of Internet robustness in attacksXu, Y., Zhang, X.Topology with Archipelago2012-05
Shenyang, CNResearch on the distribution of network nodes based on multi ...Li, C., Zhao, H., et al.Topology with Archipelago2008-00
Nanjing, CNTwo propositions about geographical distributions of BitTorr ...Chen, M., Yu, L., et al.Topology with BGP2011-11
Berkeley, CA, USBridging the software/hardware forwarding divideMoon, D., Naous, J., et al.Anonymized Internet Traces2010-00
Naples, ITDetecting third-party addresses in traceroute traces with IP ...Marchetta, P., de Donato, W., et al.Topology with BGP2013-03
Poznan, PLStatistical and signal-based network traffic recognition for ...Choras, M., Saganowski, L., et al.Network Telescope: Backscatter, Network Telescope: Witty Worm2011-01
Amsterdam, NLBorder Gateway modeling and simulationWojciechowski, M.Topology with BGP2008-09
Sydney, AUMCAD: Multiple connection based anomaly detectionHe, X., Parameswaran, S.Network Telescope: Backscatter2008-11
Changsha, CNFailure isolation based defense against Internet CXPST-like ...Liu, H., Hu, X., et al.Topology with BGP2012-04
Leicester, UKConnectivity measures for internet topologiesErlebach, T., Moonen, L.S., et al.Topology with Skitter2005-12
Amherst, MA, USMultiple random walks to uncover short paths in power law ne ...Ribeiro, B., Basu, P., et al.Topology with BGP2012-03
Pittsburgh, PA, USModeling adoptability of secure BGP protocolsChan, H., Dash, D., et al.Topology with Archipelago2006-09
Leicester, UKConnectivity measures for internet topologies on the level o ...Erlebach, T., Moonen, L.S., et al.Topology with Skitter2009-07
Princeton, NJ, USOptimizing the placement of implicit proxiesCesareo, J., Karlin, J., et al.Topology with BGP2012-06
Bradford, UKDynamic OBS offset allocation in WDM networksMouchos, C., Tsokanos, A., et al.Anonymized Internet Traces2010-11
Liege, BEDISco: A distributed information store for network challenge ...Martin, S., Chiarello, L., et al.Network telescope: Other2012-05
Aalto, FIisBF: scalable in-packet Bloom filter based multicastNikolaevskiy, I., Lukyanenko, A., et al.Topology with Skitter2013-03
San Diego, CA, USMeasuring the practical impact of DNSSEC deploymenLian, W., Rescorla, E., et al.Topology with BGP2013-08
Tokyo, JPA methodology for magnitude-based inter-AS distance estimati ...Asai, H., Esaki, H.Topology with BGP2009-06
New Delhi, INRatio threshold queries over distributed data sourcesGupta, R., Ramamritham, K., et al.Network Telescope: Backscatter2013-06
Pittsburgh, PA, USSIFF: a Stateless Internet Flow Filter to mitigate DDoS floo ...Yaar, A., Perrig, A., et al.Topology with Skitter2004-05
Iwate, JPEvaluation of a distributed detecting method for SYN flood a ...Narita, M., Katoh, T., et al.Network Telescope: Backscatter2011-03
Cambridge, UKAsymmetry and discrimination in Internet peering: evidence f ...D'Ignazio, A., Giovannetti, E.Topology with BGP2009-05
Palo Alto, CA, USHey, you darned counters!: get off my ASIC!Mogul, J.C., Congdon, P.Anonymized Internet Traces2012-08
Paris, FRCharacterisation of AS-level path deviations and multipath i ...Elena, E., Rougier, J., et al.Topology with BGP2010-07
London, UKCriticisms of modelling packet traffic using long-range depe ...Clegg, R., Landa, R., et al.Anonymized Internet Traces2011-09
Phoenix, AZ, USBehavioral graph analysis of Internet applicationsXu, K., Wang, F.Anonymized Internet Traces2011-12
Arlington, TX, USDovetail: stronger anonymity In next-generation Internet rou ...Sankey, J.MTopology with BGP2013-05
Belgrade, RSGraphical processing unit-based parallelization of the Open ...Dundjerski, D., Tomasevic, M.Topology with Skitter2014-02
Tokyo, JPCache-based network processor architecture: evaluation with ...Okuno, M., Nishimura, S., et al.Anonymized Internet Traces2006-11
Grahamstown, ZAHigh level internet scale traffic visualization using Hilber ...Irwin, B., Pilkington, N.Network Telescope: Backscatter2008-05
Haifa, ILThe variable-increment counting Bloom filterRottenstreich, O., Keslassy, I.Anonymized Internet Traces2010-00
Beijing, CNRevisiting the rich club of the Internet AS-level topologyWang, Y., Bi, J., et al.Topology with Archipelago, Topology with Skitter2013-01
Petropolis, RJ, BRDistributed location of the critical nodes to network robust ...Wehmuth, K., Ziviani, A.Topology with Skitter2011-10
Enschede, NLMeasurement artifacts in NetFlow dataHofstede, R., Drago, I., et al.Anonymized Internet Traces2013-03
Vigo, ESA GI/G/1 model for 10 Gb/s energy efficient ethernet linksHerreria-Alonso, S., Rodriguez-Perez, M., et al.Anonymized Internet Traces2012-11
North Brunswick, NJ, USPISA: Automatic extraction of traffic signaturesChhabra, P., John, A., et al.Network Telescope: Backscatter2005-05
Rome, ITCONET: a content centric inter-networking architectureDetti, A., Melazzi, N.B., et al.Anonymized Internet Traces2011-08
Princeton, NJ, USOptimizing implicit proxy placement to evade traffic filtersCesareo, J.Topology with BGP2012-06
Paris, FRDeployment of an algorithm for large-scale topology discover ...Donnet, B., Raoult, P., et al.Topology with Skitter2006-12
Strasbourg, FRExtracting intra-domain topology from mrinfo probingPansiot, J.-J., Merindol, P., et al.Topology with BGP2010-04
West Lafayette, IN, USTwo samples are enough: Opportunistic flow-level latency est ...Lee, M., Duffield, N., et al.Anonymized Internet Traces2010-05
Beijing, CNCatching popular prefixes at AS border routers with a predic ...Zhang, W., Bi, J., et al.Anonymized Internet Traces2012-03
Fujimino, JPAS alliance: cooperatively improving resilience of intra-all ...Hei, Y., Nakao, A., et al.Topology with BGP2008-12
Philadelphia, PA, USStructural analysis of viral spreading processes in social a ...Preciado, V.M., Draief, M., et al.Topology with Skitter2012-09
Shenyang, CNThe study on characteristics of the coreness of router-level ...Zhang, J., Zhao, H., et al.Topology with Skitter2008-07
Rennes, FRPTPv2-based metwork load estimationFrangoudis, P.A., Ksentini, A., et al.Anonymized Internet Traces2013-09
Riverside, CA, USNetwork traffic analysis using traffic dispersion graphs (TD ...Iliofotou, M., Pappu, P., et al.Anonymized Internet Traces, Topology with Skitter2007-05
Aveiro, PTInter-operator traffic differentiation based on multiscale a ...Coelho, N., Salvador, P., et al.Anonymized Internet Traces2013-08
Tarragona, ESOn the routability of the InternetErola, P., Gomez, S., et al.Topology with BGP2013-00
Monterey, CA, USToward large-graph comparison measures to understand Interne ...Daryl, L.H.A.Topology with Archipelago2013-09
Madison, WI, USCLAMP: Efficient class-based sampling for flexible flow moni ...Saxena, M., Kompella, R.Anonymized Internet Traces2010-10
Valparaiso, CLComparison in power consumption of static and dynamic WDM ne ...Leiva, A., Finochietto, J.M., et al.Anonymized Internet Traces2011-07
College Park, MD, USTriangle inequality and routing policy violations in the int ...Lumezanu, C., Baden, R., et al.Topology with BGP2009-03
Amritsar, INInter-domain routing with shielded infrastructure and buzzer ...Kaur, B., Kahlon, K.S., et al.Topology with BGP2013-07
Madrid, ESBatch to the future: analyzing timestamp accuracy of high-pe ...Moreno, V., Santiago del Rio, P.M., et al.Anonymized Internet Traces2012-10
Enschede, NLA study of impacts of flow timeouts on link provisioningFokkema, J.Anonymized Internet Traces2013-06
Ramat-Gan, ILSocket overloading for fun and cache-poisoningHerzberg, A., Shulman, H.Anonymized Internet Traces2013-12
Guangzhou, CNSelf-similarity and heavy-tail of ICMP trafficLiu, W., Yan, Y., et al.Anonymized Internet Traces2012-12
Beijing, CNEasily-implemented adaptive packet sampling for high speed n ...Wang, H., Lin, Y., et al.Anonymized Internet Traces2006-05
Budapest, HUSpotter: a model based active geolocation serviceLaki, S., Matray, P., et al.Topology with Archipelago2010-04
Toyonaka, JPEvaluation of free-riding traffic problem in overlay routing ...Hasegawa, G., Hiraoka, Y., et al.Topology with BGP2009-04
Ilmenau, DEAutomatic creation of VPN backup paths for improved resilien ...Grey, M., Rossberg, M., et al.Topology with BGP2012-03
Changsha, CNStudy on IP prefix hijacking in cloud computing networks bas ...Liu, Y., Peng, W., et al.Topology with BGP2011-11
Stony Brook, NY, USHigh-speed multicast scheduling for all-optical packet switc ...Guo, Z., Yang, Y.Anonymized Internet Traces2013-07
Gyeongsan, KRA long range dependent Internet traffic model using unbounde ...Kim, S., Nam, S.Y.Anonymized Internet Traces2013-01
Brooklyn, NY, USEfficient buffering and scheduling for a single-chip crosspo ...Cao, Z., Panwar, S.S.Anonymized Internet Traces2012-10
Stanford, CA, USTiny buffers for electronic and optical routersBeheshti-Zavareh, N.Anonymized Internet Traces2009-12
Hong Kong, CNMarginal deterrence in the enforcement of law: Evidence from ...Hui, K.-L., Kim, S.H., et al.Network Telescope: Backscatter, Topology with BGP2013-09
London, UKChallenges in the capture and dissemination of measurements ...Clegg, R.G., Withall, M.S., et al.Anonymized Internet Traces2009-06
Zhengzhou, CNASTVA: DDoS-limiting architecture for Next Generation Intern ...Wei, W., Yingjie, X., et al.Topology with BGP2012-01
Wenzhou, CNA DDoS-oriented distributed defense framework based on edge ...Bi, X., Tan, W., et al.Topology with Skitter2008-10
Beijing, CNReducing power of traffic manager in routers via dynamic on/ ...Fan, J., Hu, C., et al.Anonymized Internet Traces2012-05
Rio de Janeiro, BRA stateless traceback technique for identifying the origin o ...Moreira, M.D.D., Laufer, R., et al.Topology with Archipelago2011-06
Ramat-Gan, ILBandwidth Distributed Denial of Service: Attacks and defense ...Geva, M., Herzberg, A., et al.Topology with BGP2014-01
Hong Kong, CNIS-Label: an independent-set based labeling scheme for point ...Fu, A.W., Wu, H., et al.Topology with Skitter2013-04
Debrecen, HUDoes the internet still demonstrate fractal nature?Terdik, G., Gyires, T.Anonymized Internet Traces2009-03
Barcelona, ESDesign and evaluation of learning algorithms for dynamic res ...Mijumbi, R., Gorricho, J.-L., et al.Anonymized Internet Traces2014-05
Aalto, FIInter-domain incentives and Internet architectureRajahalma, J.Topology with BGP2012-08
Oslo, NOResource adaptive distributed information sharingHansen, H.V., Goebel, V., et al.Anonymized Internet Traces2010-06
Haifa, ILThe Bloom paradox: When not to use a Bloom filter?Rottenstreich, O., Keslassy, I.Anonymized Internet Traces2012-03
Seattle, WA, USConfidence-weighted marginal utility analyses for improved i ...Prince, C., Wyatt, D.Topology with Skitter2004-12
Ames, IA, USCardinality change-based early detection of large-scale cybe ...Chen, W., Liu, Y., et al.Denial of Service Attacks, Network Telescope: Witty Worm2013-04
Athens, GRCloud computing for global name-resolution in information-ce ...Vasilakos, X., Katsaros, K., et al.Topology with BGP2012-12
Evanston, IL, USOn the eyeshots of BGP vantage pointsChen, K., Hu, C., et al.Topology with BGP2010-03
Monterey, CA, USPrimitives for active internet topology mapping: toward high ...Beverly, R., Berger, A., et al.Topology with Archipelago2010-11
Hong Kong, CNPerformance evaluation and service rate provisioning for a q ...Chen, J., Addie, R.G., et al.Anonymized Internet Traces2013-11
Halifax, CATDFA: Traceback-based defense against DDoS flooding attacksAghaei-Foroushani, V., Zincir-Heywood, A.N.Denial of Service Attacks, Anonymized Internet Traces2014-05
Naples, ITWorm traffic analysis and characterizationDainotti, A., Pescape, A., et al.Network Telescope: Witty Worm2007-06
Orlando, FL, USAnalysing global triangle inequality violations due to Inter ...Ahmad, M.Z., Guha, R.Topology with Archipelago2012-10
Jalandhar, INDDoS attack's simulation using legitimate and attack real da ...Singh, J., Kumar, K., et al.Denial of Service Attacks2012-06
Madrid, ESAn economic side-effect for prefix deaggregationLutu, A., Bagnulo, M., et al.Topology with BGP2012-03

  Last Modified: Mon Sep-25-2017 10:50:57 PDT
  Page URL: http://www.caida.org/data/publications/bylocation/index.xml