Farnam Jahanian - Publications

Affiliations: 
University of Michigan, Ann Arbor, Ann Arbor, MI 
Area:
Computer Science

38 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2013 Xu Y, Bailey M, Noble B, Jahanian F. Small is better: Avoiding latency traps in virtualized data centers Proceedings of the 4th Annual Symposium On Cloud Computing, Socc 2013. DOI: 10.1145/2523616.2523620  0.415
2011 Nyalkalkar K, Sinhay S, Bailey M, Jahanian F. A comparative study of two network-based anomaly detection methods Proceedings - Ieee Infocom. 176-180. DOI: 10.1109/INFCOM.2011.5934975  0.417
2010 Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F. Internet inter-domain traffic Sigcomm'10 - Proceedings of the Sigcomm 2010 Conference. 75-86. DOI: 10.1145/1851182.1851194  0.335
2010 Jahanian F, Taylor D. Proceedings of the International Conference on Dependable Systems and Networks: Message from the general chair and conference coordinator Proceedings of the International Conference On Dependable Systems and Networks. DOI: 10.1109/DSN.2010.5544413  0.342
2010 Xu Y, Bailey M, Vander Weele E, Jahanian F. CANVuS: Context-aware network vulnerability scanning Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 138-157. DOI: 10.1007/978-3-642-15512-3_8  0.48
2009 Sinha S, Bailey M, Jahanian F. One size does not fit all: 10 years of applying context-aware security 2009 Ieee Conference On Technologies For Homeland Security, Hst 2009. 14-21. DOI: 10.1109/THS.2009.5168009  0.385
2009 Bailey M, Cooke E, Jahanian F, Xu Y, Karir M. Al survey of botnet technology and defenses Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 299-304. DOI: 10.1109/CATCH.2009.40  0.331
2008 Sinha S, Bailey M, Jahanian F. Shades of Grey: On the effectiveness of reputation-based blacklists 3rd International Conference On Malicious and Unwanted Software, Malware 2008. 57-64. DOI: 10.1109/MALWARE.2008.4690858  0.409
2008 Han J, Watson D, Jahanian F. Enhancing end-to-end availability and performance via topology-aware overlay networks Computer Networks. 52: 3029-3046. DOI: 10.1016/J.Comnet.2008.06.019  0.595
2007 Bailey M, Cooke E, Jahanian F, Myrick A, Sinha S. Practical darknet measurement 2006 Ieee Conference On Information Sciences and Systems, Ciss 2006 - Proceedings. 1496-1501. DOI: 10.1109/CISS.2006.286376  0.39
2006 Cooke E, Myrick A, Rusek D, Jahanian F. Resource-aware multi-format network security data storage Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 177-184. DOI: 10.1145/1162666.1162677  0.392
2006 Han J, Watson D, Jahanian F. An experimental study of Internet path diversity Ieee Transactions On Dependable and Secure Computing. 3: 273-288. DOI: 10.1109/Tdsc.2006.43  0.72
2006 Sinha S, Jahanian F, Patel JM. WIND: Workload-aware INtrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 290-310.  0.462
2005 Han J, Watson D, Jahanian F. Topology aware overlay networks Proceedings - Ieee Infocom. 4: 2554-2565. DOI: 10.1109/INFCOM.2005.1498540  0.483
2005 Bailey M, Cooke E, Jahanian F, Provos N, Rosaen K, Watson D. Data reduction for the scalable automated analysis of distributed darknet traffic Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 239-252.  0.331
2004 Watson D, Smart M, Malan GR, Jahanian F. Protocol scrubbing: Network security through transparent flow modification Ieee/Acm Transactions On Networking. 12: 261-273. DOI: 10.1109/Tnet.2003.822645  0.709
2004 Han J, Jahanian F. Impact of path diversity on multi-homed and overlay networks Proceedings of the International Conference On Dependable Systems and Networks. 29-38.  0.524
2004 Cooke E, Bailey M, Mao ZM, Watson D, Jahanian F, McPherson D. Toward understanding distributed blackhole placement Worm'04 - Proceedings of the 2004 Acm Workshop On Rapid Malcode. 54-64.  0.352
2003 Watson D, Jahanian F, Labovitz C. Experiences with monitoring OSPF on a regional service provider network Proceedings - International Conference On Distributed Computing Systems. 204-213.  0.465
2002 Han J, Malan GR, Jahanian F. Fault-tolerant virtual private networks within an autonomous system Proceedings of the Ieee Symposium On Reliable Distributed Systems. 41-50.  0.728
2001 Labovitz C, Ahuja A, Bose A, Jahanian F. Delayed internet routing convergence Ieee/Acm Transactions On Networking. 9: 293-306. DOI: 10.1109/90.929852  0.498
2001 Stuart DA, Brockmeyer M, Mok AK, Jahanian F. Simulation-verification: Biting at the state explosion problem Ieee Transactions On Software Engineering. 27: 599-617. DOI: 10.1109/32.935853  0.567
1999 Zou H, Jahanian F. A real-time primary-backup replication service Ieee Transactions On Parallel and Distributed Systems. 10: 533-548. DOI: 10.1109/71.774905  0.46
1999 Subramanian S, Malan GR, Shim HS, Lee JH, Knoop P, Weymouth TE, Jahanian F, Prakash A. Software architecture for the UARC Web-based collaboratory Ieee Internet Computing. 3: 46-54. DOI: 10.1109/4236.761653  0.687
1999 Abdelzaher T, Dawson S, Feng W, Jahanian F, Johnson S, Mehra A, Mitton T, Shaikh A, Shin K, Wang Z, Zou H, Bjorkland M, Marron P. Real-Time Systems. 16: 127-153. DOI: 10.1023/A:1008009721495  0.436
1999 Abdelzaher T, Dawson S, Feng WC, Jahanian F, Johnson S, Mehra A, Mitton T, Shaikh A, Shin K, Wang Z, Zou H, Bjorkland M, Marron P. ARMADA middleware and communication services Real-Time Systems. 16: 127-153.  0.3
1998 Labovitz C, Malan GR, Jahanian F. Internet routing instability Ieee/Acm Transactions On Networking. 6: 515-528. DOI: 10.1109/90.731185  0.716
1998 Robert Malan G, Jahanian F. An extensible probe architecture for network protocol performance measurement Computer Communication Review. 28: 215-227. DOI: 10.1002/Spe.557  0.53
1998 Malan GR, Jahanian F, Subramanian S. Attribute-based data dissemination for Internet applications Journal of High Speed Networks. 7: 319-337.  0.717
1997 Mehra A, Rexford J, Jahanian F. Design and evaluation of a window-consistent replication service Ieee Transactions On Computers. 46: 986-996. DOI: 10.1109/12.620480  0.377
1997 Feng W, Jahanian F, Sechrest S. An optimal bandwidth allocation strategy for the delivery of compressed prerecorded video Multimedia Systems. 5: 297-309. DOI: 10.1007/S005300050062  0.395
1997 Dawson S, Jahanian F, Mitton T. Experiments on six commercial TCP implementations using a software fault injection tool Software - Practice and Experience. 27: 1385-1410. DOI: 10.1002/(Sici)1097-024X(199712)27:12<1385::Aid-Spe133>3.0.Co;2-7  0.483
1996 Stuart DA, Mok AK, Jahanian F. A methodology and support tools for analysis of real-time specifications International Journal of Software Engineering and Knowledge Engineering. 6: 401-426. DOI: 10.1142/S021819409600017X  0.626
1995 Mehra A, Rexford J, Ang HS, Jahanian F. Design and evaluation of a window-consistent replication service Real-Time Technology and Applications - Proceedings. 182-191. DOI: 10.1109/12.620480  0.423
1995 Dawson S, Jahanian F. Probing and fault injection of dependable distributed protocols Computer Journal. 38: 286-300. DOI: 10.1093/Comjnl/38.4.286  0.362
1995 Dawson S, Jahanian F. Deterministic fault injection of distributed systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 938: 178-196.  0.345
1994 Jahanian F, Rajkumar R, Raju SCV. Runtime monitoring of timing constraints in distributed real-time systems Real-Time Systems. 7: 247-273. DOI: 10.1007/Bf01088521  0.33
1987 Jahanian F, Mok AKL. A Graph-Theoretic Approach for Timing Analysis and its Implementation Ieee Transactions On Computers. 961-975. DOI: 10.1109/Tc.1987.5009519  0.304
Show low-probability matches.