Year |
Citation |
Score |
2013 |
Xu Y, Bailey M, Noble B, Jahanian F. Small is better: Avoiding latency traps in virtualized data centers Proceedings of the 4th Annual Symposium On Cloud Computing, Socc 2013. DOI: 10.1145/2523616.2523620 |
0.415 |
|
2011 |
Nyalkalkar K, Sinhay S, Bailey M, Jahanian F. A comparative study of two network-based anomaly detection methods Proceedings - Ieee Infocom. 176-180. DOI: 10.1109/INFCOM.2011.5934975 |
0.417 |
|
2010 |
Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F. Internet inter-domain traffic Sigcomm'10 - Proceedings of the Sigcomm 2010 Conference. 75-86. DOI: 10.1145/1851182.1851194 |
0.335 |
|
2010 |
Jahanian F, Taylor D. Proceedings of the International Conference on Dependable Systems and Networks: Message from the general chair and conference coordinator Proceedings of the International Conference On Dependable Systems and Networks. DOI: 10.1109/DSN.2010.5544413 |
0.342 |
|
2010 |
Xu Y, Bailey M, Vander Weele E, Jahanian F. CANVuS: Context-aware network vulnerability scanning Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 138-157. DOI: 10.1007/978-3-642-15512-3_8 |
0.48 |
|
2009 |
Sinha S, Bailey M, Jahanian F. One size does not fit all: 10 years of applying context-aware security 2009 Ieee Conference On Technologies For Homeland Security, Hst 2009. 14-21. DOI: 10.1109/THS.2009.5168009 |
0.385 |
|
2009 |
Bailey M, Cooke E, Jahanian F, Xu Y, Karir M. Al survey of botnet technology and defenses Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 299-304. DOI: 10.1109/CATCH.2009.40 |
0.331 |
|
2008 |
Sinha S, Bailey M, Jahanian F. Shades of Grey: On the effectiveness of reputation-based blacklists 3rd International Conference On Malicious and Unwanted Software, Malware 2008. 57-64. DOI: 10.1109/MALWARE.2008.4690858 |
0.409 |
|
2008 |
Han J, Watson D, Jahanian F. Enhancing end-to-end availability and performance via topology-aware overlay networks Computer Networks. 52: 3029-3046. DOI: 10.1016/J.Comnet.2008.06.019 |
0.595 |
|
2007 |
Bailey M, Cooke E, Jahanian F, Myrick A, Sinha S. Practical darknet measurement 2006 Ieee Conference On Information Sciences and Systems, Ciss 2006 - Proceedings. 1496-1501. DOI: 10.1109/CISS.2006.286376 |
0.39 |
|
2006 |
Cooke E, Myrick A, Rusek D, Jahanian F. Resource-aware multi-format network security data storage Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 177-184. DOI: 10.1145/1162666.1162677 |
0.392 |
|
2006 |
Han J, Watson D, Jahanian F. An experimental study of Internet path diversity Ieee Transactions On Dependable and Secure Computing. 3: 273-288. DOI: 10.1109/Tdsc.2006.43 |
0.72 |
|
2006 |
Sinha S, Jahanian F, Patel JM. WIND: Workload-aware INtrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 290-310. |
0.462 |
|
2005 |
Han J, Watson D, Jahanian F. Topology aware overlay networks Proceedings - Ieee Infocom. 4: 2554-2565. DOI: 10.1109/INFCOM.2005.1498540 |
0.483 |
|
2005 |
Bailey M, Cooke E, Jahanian F, Provos N, Rosaen K, Watson D. Data reduction for the scalable automated analysis of distributed darknet traffic Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 239-252. |
0.331 |
|
2004 |
Watson D, Smart M, Malan GR, Jahanian F. Protocol scrubbing: Network security through transparent flow modification Ieee/Acm Transactions On Networking. 12: 261-273. DOI: 10.1109/Tnet.2003.822645 |
0.709 |
|
2004 |
Han J, Jahanian F. Impact of path diversity on multi-homed and overlay networks Proceedings of the International Conference On Dependable Systems and Networks. 29-38. |
0.524 |
|
2004 |
Cooke E, Bailey M, Mao ZM, Watson D, Jahanian F, McPherson D. Toward understanding distributed blackhole placement Worm'04 - Proceedings of the 2004 Acm Workshop On Rapid Malcode. 54-64. |
0.352 |
|
2003 |
Watson D, Jahanian F, Labovitz C. Experiences with monitoring OSPF on a regional service provider network Proceedings - International Conference On Distributed Computing Systems. 204-213. |
0.465 |
|
2002 |
Han J, Malan GR, Jahanian F. Fault-tolerant virtual private networks within an autonomous system Proceedings of the Ieee Symposium On Reliable Distributed Systems. 41-50. |
0.728 |
|
2001 |
Labovitz C, Ahuja A, Bose A, Jahanian F. Delayed internet routing convergence Ieee/Acm Transactions On Networking. 9: 293-306. DOI: 10.1109/90.929852 |
0.498 |
|
2001 |
Stuart DA, Brockmeyer M, Mok AK, Jahanian F. Simulation-verification: Biting at the state explosion problem Ieee Transactions On Software Engineering. 27: 599-617. DOI: 10.1109/32.935853 |
0.567 |
|
1999 |
Zou H, Jahanian F. A real-time primary-backup replication service Ieee Transactions On Parallel and Distributed Systems. 10: 533-548. DOI: 10.1109/71.774905 |
0.46 |
|
1999 |
Subramanian S, Malan GR, Shim HS, Lee JH, Knoop P, Weymouth TE, Jahanian F, Prakash A. Software architecture for the UARC Web-based collaboratory Ieee Internet Computing. 3: 46-54. DOI: 10.1109/4236.761653 |
0.687 |
|
1999 |
Abdelzaher T, Dawson S, Feng W, Jahanian F, Johnson S, Mehra A, Mitton T, Shaikh A, Shin K, Wang Z, Zou H, Bjorkland M, Marron P. Real-Time Systems. 16: 127-153. DOI: 10.1023/A:1008009721495 |
0.436 |
|
1999 |
Abdelzaher T, Dawson S, Feng WC, Jahanian F, Johnson S, Mehra A, Mitton T, Shaikh A, Shin K, Wang Z, Zou H, Bjorkland M, Marron P. ARMADA middleware and communication services Real-Time Systems. 16: 127-153. |
0.3 |
|
1998 |
Labovitz C, Malan GR, Jahanian F. Internet routing instability Ieee/Acm Transactions On Networking. 6: 515-528. DOI: 10.1109/90.731185 |
0.716 |
|
1998 |
Robert Malan G, Jahanian F. An extensible probe architecture for network protocol performance measurement Computer Communication Review. 28: 215-227. DOI: 10.1002/Spe.557 |
0.53 |
|
1998 |
Malan GR, Jahanian F, Subramanian S. Attribute-based data dissemination for Internet applications Journal of High Speed Networks. 7: 319-337. |
0.717 |
|
1997 |
Mehra A, Rexford J, Jahanian F. Design and evaluation of a window-consistent replication service Ieee Transactions On Computers. 46: 986-996. DOI: 10.1109/12.620480 |
0.377 |
|
1997 |
Feng W, Jahanian F, Sechrest S. An optimal bandwidth allocation strategy for the delivery of compressed prerecorded video Multimedia Systems. 5: 297-309. DOI: 10.1007/S005300050062 |
0.395 |
|
1997 |
Dawson S, Jahanian F, Mitton T. Experiments on six commercial TCP implementations using a software fault injection tool Software - Practice and Experience. 27: 1385-1410. DOI: 10.1002/(Sici)1097-024X(199712)27:12<1385::Aid-Spe133>3.0.Co;2-7 |
0.483 |
|
1996 |
Stuart DA, Mok AK, Jahanian F. A methodology and support tools for analysis of real-time specifications International Journal of Software Engineering and Knowledge Engineering. 6: 401-426. DOI: 10.1142/S021819409600017X |
0.626 |
|
1995 |
Mehra A, Rexford J, Ang HS, Jahanian F. Design and evaluation of a window-consistent replication service Real-Time Technology and Applications - Proceedings. 182-191. DOI: 10.1109/12.620480 |
0.423 |
|
1995 |
Dawson S, Jahanian F. Probing and fault injection of dependable distributed protocols Computer Journal. 38: 286-300. DOI: 10.1093/Comjnl/38.4.286 |
0.362 |
|
1995 |
Dawson S, Jahanian F. Deterministic fault injection of distributed systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 938: 178-196. |
0.345 |
|
1994 |
Jahanian F, Rajkumar R, Raju SCV. Runtime monitoring of timing constraints in distributed real-time systems Real-Time Systems. 7: 247-273. DOI: 10.1007/Bf01088521 |
0.33 |
|
1987 |
Jahanian F, Mok AKL. A Graph-Theoretic Approach for Timing Analysis and its Implementation Ieee Transactions On Computers. 961-975. DOI: 10.1109/Tc.1987.5009519 |
0.304 |
|
Show low-probability matches. |