Vern Paxson - Publications

Affiliations: 
Electrical Engineering and Computer Science University of California, Berkeley, Berkeley, CA, United States 
Area:
Security (SEC); Operating Systems & Networking (OSNT)

23 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Sundaresan S, McCoy D, Afroz S, Paxson V. Profiling underground merchants based on network behavior Ecrime Researchers Summit, Ecrime. 2016: 62-70. DOI: 10.1109/ECRIME.2016.7487943  0.318
2012 Dhawan M, Samuel J, Teixeira R, Kreibich C, Allman M, Weaver N, Paxson V. Fathom: A browser-based network measurement platform Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 73-86. DOI: 10.1145/2398776.2398786  0.318
2011 Li Z, Goyal A, Chen Y, Paxson V. Towards situational awareness of large-scale botnet probing events Ieee Transactions On Information Forensics and Security. 6: 175-188. DOI: 10.1109/Tifs.2010.2086445  0.33
2010 Kreibich C, Weaver N, Nechaev B, Paxson V. Netalyzr: Illuminating the edge network Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 246-259. DOI: 10.1145/1879141.1879173  0.335
2009 Maier G, Feldmann A, Paxson V, Allman M. On dominant characteristics of residential broadband internet traffic Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 90-102. DOI: 10.1145/1644893.1644904  0.328
2009 Kanich C, Kreibich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S. Spamalytics: An empirical analysis of spam marketing conversion Communications of the Acm. 52: 99-107. DOI: 10.1145/1562164.1562190  0.331
2009 Sommer R, Paxson V, Weaver N. An architecture for exploiting multi-core processors to parallelize network intrusion prevention Concurrency Computation Practice and Experience. 21: 1255-1279. DOI: 10.1002/cpe.1422  0.301
2008 Maier G, Sommer R, Dreger H, Feldmann A, Paxson V, S Hneider F. Enriching network security analysis with time travel Computer Communication Review. 38: 183-194. DOI: 10.1145/1402946.1402980  0.352
2008 Jung J, Milito RA, Paxson V. On the adaptive real-time detection of fast-propagating network worms Journal in Computer Virology. 4: 197-210. DOI: 10.1007/S11416-007-0080-Y  0.319
2006 Kannan J, Jung J, Paxson V, Koksal CE. Semi-automated discovery of application session structure Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 119-132. DOI: 10.1145/1177080.1177096  0.32
2006 Kohler E, Li J, Paxson V, Shenker S. Observed structure of addresses in IP traffic Ieee/Acm Transactions On Networking. 14: 1207-1218. DOI: 10.1109/Tnet.2006.886288  0.343
2006 Duffield N, Presti FL, Paxson V, Don Towsley I. Network loss tomography using striped unicast probes Ieee/Acm Transactions On Networking. 14: 697-710. DOI: 10.1109/Tnet.2006.880182  0.366
2006 Paxson V. End-to-end routing behavior in the internet Computer Communication Review. 36: 43-56. DOI: 10.1109/90.649563  0.357
2004 Bajcsy R, Kesidis G, Levitt K, Lindell B, Liu P, Miller D, Mundy R, Neuman C, Ostrenga R, Paxson V, Porras P, Benzel T, Rosenberg C, Tygar JD, Sastry S, et al. Cyber defense technology networking and evaluation Communications of the Acm. 47: 58. DOI: 10.1145/971617.971646  0.311
2002 Willinger W, Govindan R, Jamin S, Paxson V, Shenker S. Scaling phenomena in the Internet: critically examining criticality. Proceedings of the National Academy of Sciences of the United States of America. 99: 2573-80. PMID 11875212 DOI: 10.1073/Pnas.012583099  0.365
2001 Floyd S, Paxson V. Difficulties in simulating the Internet Ieee/Acm Transactions On Networking. 9: 392-403. DOI: 10.1109/90.944338  0.374
2000 Adams A, Bu T, Friedman T, Horowitz J, Towsley D, Cáceres R, Duffield N, Presti FL, Moon SB, Paxson V. The use of end-to-end multicast measurements for characterizing internal network behavior Ieee Communications Magazine. 38: 152-158. DOI: 10.1109/35.841840  0.396
1999 Paxson V. End-to-end Internet packet dynamics Ieee/Acm Transactions On Networking. 7: 277-292. DOI: 10.1109/90.779192  0.403
1999 Paxson V. Bro: A system for detecting network intruders in real-time Computer Networks. 31: 2435-2463. DOI: 10.1016/S1389-1286(99)00112-7  0.4
1998 Paxson V, Mahdavi J, Adams A, Mathis M. An architecture for large-scale internet measurement Ieee Communications Magazine. 36: 48-54. DOI: 10.1109/35.707817  0.358
1995 Paxson V, Floyd S. Wide Area Traffic: The Failure of Poisson Modeling Ieee/Acm Transactions On Networking. 3: 226-244. DOI: 10.1109/90.392383  0.385
1994 Paxson V. Empirically derived analytic models of wide-area TCP connections Ieee/Acm Transactions On Networking. 2: 316-336. DOI: 10.1109/90.330413  0.347
1994 Paxson V. Growth Trends in Wide-Area TCP Connections Ieee Network. 8: 8-17. DOI: 10.1109/65.298159  0.4
Show low-probability matches.