Year |
Citation |
Score |
2016 |
Sundaresan S, McCoy D, Afroz S, Paxson V. Profiling underground merchants based on network behavior Ecrime Researchers Summit, Ecrime. 2016: 62-70. DOI: 10.1109/ECRIME.2016.7487943 |
0.318 |
|
2012 |
Dhawan M, Samuel J, Teixeira R, Kreibich C, Allman M, Weaver N, Paxson V. Fathom: A browser-based network measurement platform Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 73-86. DOI: 10.1145/2398776.2398786 |
0.318 |
|
2011 |
Li Z, Goyal A, Chen Y, Paxson V. Towards situational awareness of large-scale botnet probing events Ieee Transactions On Information Forensics and Security. 6: 175-188. DOI: 10.1109/Tifs.2010.2086445 |
0.33 |
|
2010 |
Kreibich C, Weaver N, Nechaev B, Paxson V. Netalyzr: Illuminating the edge network Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 246-259. DOI: 10.1145/1879141.1879173 |
0.335 |
|
2009 |
Maier G, Feldmann A, Paxson V, Allman M. On dominant characteristics of residential broadband internet traffic Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 90-102. DOI: 10.1145/1644893.1644904 |
0.328 |
|
2009 |
Kanich C, Kreibich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S. Spamalytics: An empirical analysis of spam marketing conversion Communications of the Acm. 52: 99-107. DOI: 10.1145/1562164.1562190 |
0.331 |
|
2009 |
Sommer R, Paxson V, Weaver N. An architecture for exploiting multi-core processors to parallelize network intrusion prevention Concurrency Computation Practice and Experience. 21: 1255-1279. DOI: 10.1002/cpe.1422 |
0.301 |
|
2008 |
Maier G, Sommer R, Dreger H, Feldmann A, Paxson V, S Hneider F. Enriching network security analysis with time travel Computer Communication Review. 38: 183-194. DOI: 10.1145/1402946.1402980 |
0.352 |
|
2008 |
Jung J, Milito RA, Paxson V. On the adaptive real-time detection of fast-propagating network worms Journal in Computer Virology. 4: 197-210. DOI: 10.1007/S11416-007-0080-Y |
0.319 |
|
2006 |
Kannan J, Jung J, Paxson V, Koksal CE. Semi-automated discovery of application session structure Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 119-132. DOI: 10.1145/1177080.1177096 |
0.32 |
|
2006 |
Kohler E, Li J, Paxson V, Shenker S. Observed structure of addresses in IP traffic Ieee/Acm Transactions On Networking. 14: 1207-1218. DOI: 10.1109/Tnet.2006.886288 |
0.343 |
|
2006 |
Duffield N, Presti FL, Paxson V, Don Towsley I. Network loss tomography using striped unicast probes Ieee/Acm Transactions On Networking. 14: 697-710. DOI: 10.1109/Tnet.2006.880182 |
0.366 |
|
2006 |
Paxson V. End-to-end routing behavior in the internet Computer Communication Review. 36: 43-56. DOI: 10.1109/90.649563 |
0.357 |
|
2004 |
Bajcsy R, Kesidis G, Levitt K, Lindell B, Liu P, Miller D, Mundy R, Neuman C, Ostrenga R, Paxson V, Porras P, Benzel T, Rosenberg C, Tygar JD, Sastry S, et al. Cyber defense technology networking and evaluation Communications of the Acm. 47: 58. DOI: 10.1145/971617.971646 |
0.311 |
|
2002 |
Willinger W, Govindan R, Jamin S, Paxson V, Shenker S. Scaling phenomena in the Internet: critically examining criticality. Proceedings of the National Academy of Sciences of the United States of America. 99: 2573-80. PMID 11875212 DOI: 10.1073/Pnas.012583099 |
0.365 |
|
2001 |
Floyd S, Paxson V. Difficulties in simulating the Internet Ieee/Acm Transactions On Networking. 9: 392-403. DOI: 10.1109/90.944338 |
0.374 |
|
2000 |
Adams A, Bu T, Friedman T, Horowitz J, Towsley D, Cáceres R, Duffield N, Presti FL, Moon SB, Paxson V. The use of end-to-end multicast measurements for characterizing internal network behavior Ieee Communications Magazine. 38: 152-158. DOI: 10.1109/35.841840 |
0.396 |
|
1999 |
Paxson V. End-to-end Internet packet dynamics Ieee/Acm Transactions On Networking. 7: 277-292. DOI: 10.1109/90.779192 |
0.403 |
|
1999 |
Paxson V. Bro: A system for detecting network intruders in real-time Computer Networks. 31: 2435-2463. DOI: 10.1016/S1389-1286(99)00112-7 |
0.4 |
|
1998 |
Paxson V, Mahdavi J, Adams A, Mathis M. An architecture for large-scale internet measurement Ieee Communications Magazine. 36: 48-54. DOI: 10.1109/35.707817 |
0.358 |
|
1995 |
Paxson V, Floyd S. Wide Area Traffic: The Failure of Poisson Modeling Ieee/Acm Transactions On Networking. 3: 226-244. DOI: 10.1109/90.392383 |
0.385 |
|
1994 |
Paxson V. Empirically derived analytic models of wide-area TCP connections Ieee/Acm Transactions On Networking. 2: 316-336. DOI: 10.1109/90.330413 |
0.347 |
|
1994 |
Paxson V. Growth Trends in Wide-Area TCP Connections Ieee Network. 8: 8-17. DOI: 10.1109/65.298159 |
0.4 |
|
Show low-probability matches. |