BibTeX records: Vern Paxson

download as .bib file

@inproceedings{DBLP:conf/sigcomm/PietNP23,
  author       = {Julien Piet and
                  Dubem Nwoji and
                  Vern Paxson},
  editor       = {Henning Schulzrinne and
                  Vishal Misra and
                  Eddie Kohler and
                  David A. Maltz},
  title        = {{GGFAST:} Automating Generation of Flexible Network Traffic Classifiers},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2023 Conference, {ACM} {SIGCOMM}
                  2023, New York, NY, USA, 10-14 September 2023},
  pages        = {850--866},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603269.3604840},
  doi          = {10.1145/3603269.3604840},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/PietNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PietSP023,
  author       = {Julien Piet and
                  Aashish Sharma and
                  Vern Paxson and
                  David A. Wagner},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Network Detection of Interactive {SSH} Impostors Using Deep Learning},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4283--4300},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/piet},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PietSP023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoDAPSV021,
  author       = {Grant Ho and
                  Mayank Dhiman and
                  Devdatta Akhawe and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Hopper: Modeling and Detecting Lateral Movement},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3093--3110},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ho},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HoDAPSV021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13442,
  author       = {Grant Ho and
                  Mayank Dhiman and
                  Devdatta Akhawe and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  title        = {Hopper: Modeling and Detecting Lateral Movement (Extended Report)},
  journal      = {CoRR},
  volume       = {abs/2105.13442},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13442},
  eprinttype    = {arXiv},
  eprint       = {2105.13442},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13442.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenPJ20,
  author       = {Jianjun Chen and
                  Vern Paxson and
                  Jian Jiang},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Composition Kills: {A} Case Study of Email Sender Authentication},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2183--2199},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/chen-jianjun},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoCGSPSV019,
  author       = {Grant Ho and
                  Asaf Cidon and
                  Lior Gavish and
                  Marco Schweighauser and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Detecting and Characterizing Lateral Phishing at Scale},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1273--1290},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/ho},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HoCGSPSV019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00790,
  author       = {Grant Ho and
                  Asaf Cidon and
                  Lior Gavish and
                  Marco Schweighauser and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  title        = {Detecting and Characterizing Lateral Phishing at Scale},
  journal      = {CoRR},
  volume       = {abs/1910.00790},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00790},
  eprinttype    = {arXiv},
  eprint       = {1910.00790},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00790.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/BanoRJSDMMP18,
  author       = {Shehar Bano and
                  Philipp Richter and
                  Mobin Javed and
                  Srikanth Sundaresan and
                  Zakir Durumeric and
                  Steven J. Murdoch and
                  Richard Mortier and
                  Vern Paxson},
  title        = {Scanning the Internet for Liveness},
  journal      = {Comput. Commun. Rev.},
  volume       = {48},
  number       = {2},
  pages        = {2--9},
  year         = {2018},
  url          = {https://doi.org/10.1145/3213232.3213234},
  doi          = {10.1145/3213232.3213234},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/BanoRJSDMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PearceELFP18,
  author       = {Paul Pearce and
                  Roya Ensafi and
                  Frank Li and
                  Nick Feamster and
                  Vern Paxson},
  title        = {Toward Continual Measurement of Global Network-Level Censorship},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {24--33},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331018},
  doi          = {10.1109/MSP.2018.1331018},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PearceELFP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/LiP18,
  author       = {Frank Li and
                  Vern Paxson},
  title        = {A Large-Scale Empirical Study of Security Patches},
  journal      = {login Usenix Mag.},
  volume       = {43},
  number       = {1},
  year         = {2018},
  url          = {https://www.usenix.org/publications/login/spring2018/li},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/LiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anrw/SinghNAPTGP18,
  author       = {Rachee Singh and
                  Rishab Nithyanand and
                  Sadia Afroz and
                  Paul Pearce and
                  Michael Carl Tschantz and
                  Phillipa Gill and
                  Vern Paxson},
  title        = {Characterizing the Nature and Dynamics of Tor Exit Blocking},
  booktitle    = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018,
                  Montreal, QC, Canada, July 16-16, 2018},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3232755.3232786},
  doi          = {10.1145/3232755.3232786},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/anrw/SinghNAPTGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenJDWCP018,
  author       = {Jianjun Chen and
                  Jian Jiang and
                  Hai{-}Xin Duan and
                  Tao Wan and
                  Shuo Chen and
                  Vern Paxson and
                  Min Yang},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {We Still Don't Have Secure Cross-Domain Requests: an Empirical Study
                  of {CORS}},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1079--1093},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/chen-jianjun},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenJDWCP018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TschantzASQJP18,
  author       = {Michael Carl Tschantz and
                  Sadia Afroz and
                  Shaarif Sajid and
                  Shoaib Asif Qazi and
                  Mobin Javed and
                  Vern Paxson},
  editor       = {Lex Gill and
                  Rob Jansen},
  title        = {A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability},
  booktitle    = {8th {USENIX} Workshop on Free and Open Communications on the Internet,
                  {FOCI} 2018, Baltimore, MD, USA, August 14, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/foci18/presentation/tschantz},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TschantzASQJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-11606,
  author       = {Sadia Afroz and
                  Michael Carl Tschantz and
                  Shaarif Sajid and
                  Shoaib Asif Qazi and
                  Mobin Javed and
                  Vern Paxson},
  title        = {Exploring Server-side Blocking of Regions},
  journal      = {CoRR},
  volume       = {abs/1805.11606},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.11606},
  eprinttype    = {arXiv},
  eprint       = {1805.11606},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-11606.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-00459,
  author       = {Sadia Afroz and
                  Mobin Javed and
                  Vern Paxson and
                  Shoaib Asif Qazi and
                  Shaarif Sajid and
                  Michael Carl Tschantz},
  title        = {A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability},
  journal      = {CoRR},
  volume       = {abs/1806.00459},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.00459},
  eprinttype    = {arXiv},
  eprint       = {1806.00459},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-00459.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/SargentKPA17,
  author       = {Matthew Sargent and
                  John Kristoff and
                  Vern Paxson and
                  Mark Allman},
  title        = {On the Potential Abuse of {IGMP}},
  journal      = {Comput. Commun. Rev.},
  volume       = {47},
  number       = {1},
  pages        = {27--35},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041027.3041031},
  doi          = {10.1145/3041027.3041031},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/SargentKPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MarczakP17,
  author       = {William R. Marczak and
                  Vern Paxson},
  title        = {Social Engineering Attacks on Government Opponents: Target Perspectives},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {2},
  pages        = {172--185},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0022},
  doi          = {10.1515/POPETS-2017-0022},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MarczakP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/PearceJLEFWP17,
  author       = {Paul Pearce and
                  Ben Jones and
                  Frank Li and
                  Roya Ensafi and
                  Nick Feamster and
                  Nicholas Weaver and
                  Vern Paxson},
  title        = {Global-Scale Measurement of {DNS} Manipulation},
  journal      = {login Usenix Mag.},
  volume       = {42},
  number       = {4},
  year         = {2017},
  url          = {https://www.usenix.org/publications/login/winter2017/pearce},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/PearceJLEFWP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17,
  author       = {Kurt Thomas and
                  Frank Li and
                  Ali Zand and
                  Jacob Barrett and
                  Juri Ranieri and
                  Luca Invernizzi and
                  Yarik Markov and
                  Oxana Comanescu and
                  Vijay Eranti and
                  Angelika Moscicki and
                  Daniel Margolis and
                  Vern Paxson and
                  Elie Bursztein},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen
                  Credentials},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1421--1434},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134067},
  doi          = {10.1145/3133956.3134067},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasLZBRIMCEM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiP17,
  author       = {Frank Li and
                  Vern Paxson},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {A Large-Scale Empirical Study of Security Patches},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2201--2215},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134072},
  doi          = {10.1145/3133956.3134072},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/DurrettKBPAMLP17,
  author       = {Greg Durrett and
                  Jonathan K. Kummerfeld and
                  Taylor Berg{-}Kirkpatrick and
                  Rebecca S. Portnoff and
                  Sadia Afroz and
                  Damon McCoy and
                  Kirill Levchenko and
                  Vern Paxson},
  editor       = {Martha Palmer and
                  Rebecca Hwa and
                  Sebastian Riedel},
  title        = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset
                  for Fine-grained Domain Adaptation},
  booktitle    = {Proceedings of the 2017 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2017, Copenhagen, Denmark, September
                  9-11, 2017},
  pages        = {2598--2607},
  publisher    = {Association for Computational Linguistics},
  year         = {2017},
  url          = {https://doi.org/10.18653/v1/d17-1275},
  doi          = {10.18653/V1/D17-1275},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/DurrettKBPAMLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MurdockLBDP17,
  author       = {Austin Murdock and
                  Frank Li and
                  Paul Bramsen and
                  Zakir Durumeric and
                  Vern Paxson},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Target generation for internet-wide IPv6 scanning},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {242--253},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131405},
  doi          = {10.1145/3131365.3131405},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/MurdockLBDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LevchenkoDHCAP17,
  author       = {Kirill Levchenko and
                  Amogh Dhamdhere and
                  Bradley Huffaker and
                  kc claffy and
                  Mark Allman and
                  Vern Paxson},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Packetlab: a universal measurement endpoint interface},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {254--260},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131396},
  doi          = {10.1145/3131365.3131396},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/LevchenkoDHCAP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DurumericMSBSBB17,
  author       = {Zakir Durumeric and
                  Zane Ma and
                  Drew Springall and
                  Richard Barnes and
                  Nick Sullivan and
                  Elie Bursztein and
                  Michael D. Bailey and
                  J. Alex Halderman and
                  Vern Paxson},
  title        = {The Security Impact of {HTTPS} Interception},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/security-impact-https-interception/},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/DurumericMSBSBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PearceELFP17,
  author       = {Paul Pearce and
                  Roya Ensafi and
                  Frank Li and
                  Nick Feamster and
                  Vern Paxson},
  title        = {Augur: Internet-Wide Detection of Connectivity Disruptions},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {427--443},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.55},
  doi          = {10.1109/SP.2017.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PearceELFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PearceJLEFWP17,
  author       = {Paul Pearce and
                  Ben Jones and
                  Frank Li and
                  Roya Ensafi and
                  Nick Feamster and
                  Nicholas Weaver and
                  Vern Paxson},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Global Measurement of {DNS} Manipulation},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {307--323},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/pearce},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PearceJLEFWP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SinghNAPTGP17,
  author       = {Rachee Singh and
                  Rishab Nithyanand and
                  Sadia Afroz and
                  Paul Pearce and
                  Michael Carl Tschantz and
                  Phillipa Gill and
                  Vern Paxson},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Characterizing the Nature and Dynamics of Tor Exit Blocking},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {325--341},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/singh},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SinghNAPTGP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoSJP017,
  author       = {Grant Ho and
                  Aashish Sharma and
                  Mobin Javed and
                  Vern Paxson and
                  David A. Wagner},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Detecting Credential Spearphishing in Enterprise Settings},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {469--485},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HoSJP017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PortnoffADKBMLP17,
  author       = {Rebecca S. Portnoff and
                  Sadia Afroz and
                  Greg Durrett and
                  Jonathan K. Kummerfeld and
                  Taylor Berg{-}Kirkpatrick and
                  Damon McCoy and
                  Kirill Levchenko and
                  Vern Paxson},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {Tools for Automated Analysis of Cybercriminal Markets},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {657--666},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052600},
  doi          = {10.1145/3038912.3052600},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/PortnoffADKBMLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09609,
  author       = {Greg Durrett and
                  Jonathan K. Kummerfeld and
                  Taylor Berg{-}Kirkpatrick and
                  Rebecca S. Portnoff and
                  Sadia Afroz and
                  Damon McCoy and
                  Kirill Levchenko and
                  Vern Paxson},
  title        = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset
                  for Fine-grained Domain Adaptation},
  journal      = {CoRR},
  volume       = {abs/1708.09609},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.09609},
  eprinttype    = {arXiv},
  eprint       = {1708.09609},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-09609.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JainJP16,
  author       = {Sakshi Jain and
                  Mobin Javed and
                  Vern Paxson},
  title        = {Towards Mining Latent Client Identifiers from Network Traffic},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {2},
  pages        = {100--114},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0007},
  doi          = {10.1515/POPETS-2016-0007},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JainJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenJDWWP16,
  author       = {Jianjun Chen and
                  Jian Jiang and
                  Hai{-}Xin Duan and
                  Nicholas Weaver and
                  Tao Wan and
                  Vern Paxson},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Host of Troubles: Multiple Host Ambiguities in {HTTP} Implementations},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1516--1527},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978394},
  doi          = {10.1145/2976749.2978394},
  timestamp    = {Tue, 13 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenJDWWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaoKMPF16,
  author       = {Shuang Hao and
                  Alex Kantchelian and
                  Brad Miller and
                  Vern Paxson and
                  Nick Feamster},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{PREDATOR:} Proactive Recognition and Elimination of Domain Abuse
                  at Time-Of-Registration},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1568--1579},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978317},
  doi          = {10.1145/2976749.2978317},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaoKMPF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16,
  author       = {Srikanth Sundaresan and
                  Damon McCoy and
                  Sadia Afroz and
                  Vern Paxson},
  title        = {Profiling underground merchants based on network behavior},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {62--70},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487943},
  doi          = {10.1109/ECRIME.2016.7487943},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SundaresanMAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/RichterWVABFKWP16,
  author       = {Philipp Richter and
                  Florian Wohlfart and
                  Narseo Vallina{-}Rodriguez and
                  Mark Allman and
                  Randy Bush and
                  Anja Feldmann and
                  Christian Kreibich and
                  Nicholas Weaver and
                  Vern Paxson},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {215--229},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987474},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/RichterWVABFKWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/IkramVSKP16,
  author       = {Muhammad Ikram and
                  Narseo Vallina{-}Rodriguez and
                  Suranga Seneviratne and
                  Mohamed Ali K{\^{a}}afar and
                  Vern Paxson},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {An Analysis of the Privacy and Security Risks of Android {VPN} Permission-enabled
                  Apps},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {349--364},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987471},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/IkramVSKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenZDLJLWP16,
  author       = {Jianjun Chen and
                  Xiaofeng Zheng and
                  Hai{-}Xin Duan and
                  Jinjin Liang and
                  Jian Jiang and
                  Kang Li and
                  Tao Wan and
                  Vern Paxson},
  title        = {Forwarding-Loop Attacks in Content Delivery Networks},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/forwarding-loop-attacks-content-delivery-networks.pdf},
  timestamp    = {Tue, 13 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenZDLJLWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KhattakFAJSMPM16,
  author       = {Sheharbano Khattak and
                  David Fifield and
                  Sadia Afroz and
                  Mobin Javed and
                  Srikanth Sundaresan and
                  Damon McCoy and
                  Vern Paxson and
                  Steven J. Murdoch},
  title        = {Do You See What {I} See? Differential Treatment of Anonymous Users},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KhattakFAJSMPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/VallentinPS16,
  author       = {Matthias Vallentin and
                  Vern Paxson and
                  Robin Sommer},
  editor       = {Katerina J. Argyraki and
                  Rebecca Isaacs},
  title        = {{VAST:} {A} Unified Platform for Interactive Network Forensics},
  booktitle    = {13th {USENIX} Symposium on Networked Systems Design and Implementation,
                  {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016},
  pages        = {345--362},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/vallentin},
  timestamp    = {Tue, 02 Feb 2021 08:05:49 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/VallentinPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/JonesFPWA16,
  author       = {Ben Jones and
                  Nick Feamster and
                  Vern Paxson and
                  Nicholas Weaver and
                  Mark Allman},
  editor       = {Thomas Karagiannis and
                  Xenofontas A. Dimitropoulos},
  title        = {Detecting {DNS} Root Manipulation},
  booktitle    = {Passive and Active Measurement - 17th International Conference, {PAM}
                  2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9631},
  pages        = {276--288},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30505-9\_21},
  doi          = {10.1007/978-3-319-30505-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/JonesFPWA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TschantzAAP16,
  author       = {Michael Carl Tschantz and
                  Sadia Afroz and
                  anonymous and
                  Vern Paxson},
  title        = {SoK: Towards Grounding Censorship Circumvention in Empiricism},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {914--933},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.59},
  doi          = {10.1109/SP.2016.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TschantzAAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiDCKBMSP16,
  author       = {Frank Li and
                  Zakir Durumeric and
                  Jakub Czyz and
                  Mohammad Karami and
                  Michael D. Bailey and
                  Damon McCoy and
                  Stefan Savage and
                  Vern Paxson},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {You've Got Vulnerability: Exploring Effective Vulnerability Notifications},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1033--1050},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/li},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiDCKBMSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiHKNBTBP16,
  author       = {Frank Li and
                  Grant Ho and
                  Eric Kuan and
                  Yuan Niu and
                  Lucas Ballard and
                  Kurt Thomas and
                  Elie Bursztein and
                  Vern Paxson},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {Remedying Web Hijacking: Notification Effectiveness and Webmaster
                  Comprehension},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages        = {1009--1019},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872427.2883039},
  doi          = {10.1145/2872427.2883039},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/www/LiHKNBTBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RichterWVABFKWP16,
  author       = {Philipp Richter and
                  Florian Wohlfart and
                  Narseo Vallina{-}Rodriguez and
                  Mark Allman and
                  Randy Bush and
                  Anja Feldmann and
                  Christian Kreibich and
                  Nicholas Weaver and
                  Vern Paxson},
  title        = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment},
  journal      = {CoRR},
  volume       = {abs/1605.05606},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.05606},
  eprinttype    = {arXiv},
  eprint       = {1605.05606},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RichterWVABFKWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/RichterABP15,
  author       = {Philipp Richter and
                  Mark Allman and
                  Randy Bush and
                  Vern Paxson},
  title        = {A Primer on IPv4 Scarcity},
  journal      = {Comput. Commun. Rev.},
  volume       = {45},
  number       = {2},
  pages        = {21--31},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766330.2766335},
  doi          = {10.1145/2766330.2766335},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/RichterABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FifieldLHWP15,
  author       = {David Fifield and
                  Chang Lan and
                  Rod Hynes and
                  Percy Wegmann and
                  Vern Paxson},
  title        = {Blocking-resistant communication through domain fronting},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {2},
  pages        = {46--64},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0009},
  doi          = {10.1515/POPETS-2015-0009},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/FifieldLHWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiSP15,
  author       = {Frank Li and
                  Richard Shin and
                  Vern Paxson},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Florian Kerschbaum and
                  Cristina Nita{-}Rotaru},
  title        = {Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with
                  Multiple Data Owners},
  booktitle    = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
                  Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {53--64},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808425.2808430},
  doi          = {10.1145/2808425.2808430},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Al-DuwairiAAP15,
  author       = {Basheer Al{-}Duwairi and
                  Ahmad T. Al{-}Hammouri and
                  Monther Aldwairi and
                  Vern Paxson},
  title        = {GFlux: {A} google-based system for Fast Flux detection},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {755--756},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346920},
  doi          = {10.1109/CNS.2015.7346920},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Al-DuwairiAAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/JavedHPP15,
  author       = {Mobin Javed and
                  Cormac Herley and
                  Marcus Peinado and
                  Vern Paxson},
  editor       = {Kenjiro Cho and
                  Kensuke Fukuda and
                  Vivek S. Pai and
                  Neil Spring},
  title        = {Measurement and Analysis of Traffic Exchange Services},
  booktitle    = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
                  2015, Tokyo, Japan, October 28-30, 2015},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815675.2815708},
  doi          = {10.1145/2815675.2815708},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/JavedHPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/EnsafiFWFWP15,
  author       = {Roya Ensafi and
                  David Fifield and
                  Philipp Winter and
                  Nick Feamster and
                  Nicholas Weaver and
                  Vern Paxson},
  editor       = {Kenjiro Cho and
                  Kensuke Fukuda and
                  Vivek S. Pai and
                  Neil Spring},
  title        = {Examining How the Great Firewall Discovers Hidden Circumvention Servers},
  booktitle    = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
                  2015, Tokyo, Japan, October 28-30, 2015},
  pages        = {445--458},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815675.2815690},
  doi          = {10.1145/2815675.2815690},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/EnsafiFWFWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/Paxson15,
  author       = {Vern Paxson},
  title        = {Keynote Speaker},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413676},
  doi          = {10.1109/MALWARE.2015.7413676},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/Paxson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/Vallina-Rodriguez15,
  author       = {Narseo Vallina{-}Rodriguez and
                  Srikanth Sundaresan and
                  Christian Kreibich and
                  Nicholas Weaver and
                  Vern Paxson},
  editor       = {Gaetano Borriello and
                  Giovanni Pau and
                  Marco Gruteser and
                  Jason I. Hong},
  title        = {Beyond the Radio: Illuminating the Higher Layers of Mobile Networks},
  booktitle    = {Proceedings of the 13th Annual International Conference on Mobile
                  Systems, Applications, and Services, MobiSys 2015, Florence, Italy,
                  May 19-22, 2015},
  pages        = {375--387},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2742647.2742675},
  doi          = {10.1145/2742647.2742675},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/Vallina-Rodriguez15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/JonesEFPW15,
  author       = {Ben Jones and
                  Roya Ensafi and
                  Nick Feamster and
                  Vern Paxson and
                  Nicholas Weaver},
  editor       = {Ben Zevenbergen},
  title        = {Ethical Concerns for Censorship Measurement},
  booktitle    = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Ethics in Networked
                  Systems Research, {NS} Ethics@SIGCOMM 2015, London, United Kingdom,
                  August 21, 2015},
  pages        = {17--19},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2793013.2793015},
  doi          = {10.1145/2793013.2793015},
  timestamp    = {Thu, 20 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/JonesEFPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Vallina-Rodriguez15,
  author       = {Narseo Vallina{-}Rodriguez and
                  Srikanth Sundaresan and
                  Christian Kreibich and
                  Vern Paxson},
  editor       = {Theophilus Benson and
                  Costin Raiciu},
  title        = {Header Enrichment or {ISP} Enrichment?: Emerging Privacy Threats in
                  Mobile Networks},
  booktitle    = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Hot Topics in
                  Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM
                  2015, London, United Kingdom, August 21, 2015},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2785989.2786002},
  doi          = {10.1145/2785989.2786002},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/Vallina-Rodriguez15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15,
  author       = {Kurt Thomas and
                  Elie Bursztein and
                  Chris Grier and
                  Grant Ho and
                  Nav Jagpal and
                  Alexandros Kapravelos and
                  Damon McCoy and
                  Antonio Nappa and
                  Vern Paxson and
                  Paul Pearce and
                  Niels Provos and
                  Moheeb Abu Rajab},
  title        = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {151--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.17},
  doi          = {10.1109/SP.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasBGHJKMNPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RastiMWP15,
  author       = {Ryan Rasti and
                  Mukul Murthy and
                  Nicholas Weaver and
                  Vern Paxson},
  title        = {Temporal Lensing and Its Application in Pulsing Denial-of-Service
                  Attacks},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {187--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.19},
  doi          = {10.1109/SP.2015.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RastiMWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiSP15,
  author       = {Frank Li and
                  Richard Shin and
                  Vern Paxson},
  title        = {Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with
                  Multiple Data Owners},
  journal      = {CoRR},
  volume       = {abs/1507.08309},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.08309},
  eprinttype    = {arXiv},
  eprint       = {1507.08309},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RazaghpanahVSKG15,
  author       = {Abbas Razaghpanah and
                  Narseo Vallina{-}Rodriguez and
                  Srikanth Sundaresan and
                  Christian Kreibich and
                  Phillipa Gill and
                  Mark Allman and
                  Vern Paxson},
  title        = {Haystack: In Situ Mobile Traffic Analysis in User Space},
  journal      = {CoRR},
  volume       = {abs/1510.01419},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.01419},
  eprinttype    = {arXiv},
  eprint       = {1510.01419},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RazaghpanahVSKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PearceDGLGMPSV14,
  author       = {Paul Pearce and
                  Vacha Dave and
                  Chris Grier and
                  Kirill Levchenko and
                  Saikat Guha and
                  Damon McCoy and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Characterizing Large-Scale Click Fraud in ZeroAccess},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660369},
  doi          = {10.1145/2660267.2660369},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PearceDGLGMPSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasLGP14,
  author       = {Kurt Thomas and
                  Frank Li and
                  Chris Grier and
                  Vern Paxson},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Consequences of Connectivity: Characterizing Account Hijacking on
                  Twitter},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {489--500},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660282},
  doi          = {10.1145/2660267.2660282},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasLGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/Vallina-RodriguezAKWP14,
  author       = {Narseo Vallina{-}Rodriguez and
                  Johanna Amann and
                  Christian Kreibich and
                  Nicholas Weaver and
                  Vern Paxson},
  editor       = {Aruna Seneviratne and
                  Christophe Diot and
                  Jim Kurose and
                  Augustin Chaintreau and
                  Luigi Rizzo},
  title        = {A Tangled Mass: The Android Root Certificate Stores},
  booktitle    = {Proceedings of the 10th {ACM} International on Conference on emerging
                  Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia,
                  December 2-5, 2014},
  pages        = {141--148},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2674005.2675015},
  doi          = {10.1145/2674005.2675015},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/Vallina-RodriguezAKWP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KhattakJKUP14,
  author       = {Sheharbano Khattak and
                  Mobin Javed and
                  Syed Ali Khayam and
                  Zartash Afzal Uzmi and
                  Vern Paxson},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {A Look at the Consequences of Internet Censorship Through an {ISP}
                  Lens},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {271--284},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663750},
  doi          = {10.1145/2663716.2663750},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KhattakJKUP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SommerVCP14,
  author       = {Robin Sommer and
                  Matthias Vallentin and
                  Lorenzo De Carli and
                  Vern Paxson},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {{HILTI:} an Abstract Execution Environment for Deep, Stateful Network
                  Traffic Analysis},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {461--474},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663735},
  doi          = {10.1145/2663716.2663735},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/SommerVCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DurumericKAHBLWABPP14,
  author       = {Zakir Durumeric and
                  James Kasten and
                  David Adrian and
                  J. Alex Halderman and
                  Michael D. Bailey and
                  Frank Li and
                  Nicholas Weaver and
                  Johanna Amann and
                  Jethro Beekman and
                  Mathias Payer and
                  Vern Paxson},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {The Matter of Heartbleed},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {475--488},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663755},
  doi          = {10.1145/2663716.2663755},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/DurumericKAHBLWABPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/WeaverKDP14,
  author       = {Nicholas Weaver and
                  Christian Kreibich and
                  Martin Dam and
                  Vern Paxson},
  editor       = {Michalis Faloutsos and
                  Aleksandar Kuzmanovic},
  title        = {Here Be Web Proxies},
  booktitle    = {Passive and Active Measurement - 15th International Conference, {PAM}
                  2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8362},
  pages        = {183--192},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04918-2\_18},
  doi          = {10.1007/978-3-319-04918-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/WeaverKDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/VallentinCSPW14,
  author       = {Matthias Vallentin and
                  Dominik Charousset and
                  Thomas C. Schmidt and
                  Vern Paxson and
                  Matthias W{\"{a}}hlisch},
  editor       = {Fabi{\'{a}}n E. Bustamante and
                  Y. Charlie Hu and
                  Arvind Krishnamurthy and
                  Sylvia Ratnasamy},
  title        = {Native actors: how to scale network forensics},
  booktitle    = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
                  17-22, 2014},
  pages        = {141--142},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2619239.2631471},
  doi          = {10.1145/2619239.2631471},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/VallentinCSPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MarczakSMP14,
  author       = {William R. Marczak and
                  John Scott{-}Railton and
                  Morgan Marquis{-}Boire and
                  Vern Paxson},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {When Governments Hack Opponents: {A} Look at Actors and Technology},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {511--525},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/marczak},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MarczakSMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KapravelosGCKVP14,
  author       = {Alexandros Kapravelos and
                  Chris Grier and
                  Neha Chachra and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Vern Paxson},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Hulk: Eliciting Malicious Behavior in Browser Extensions},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {641--654},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KapravelosGCKVP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014foci,
  editor       = {Jedidiah R. Crandall and
                  Vern Paxson},
  title        = {4th {USENIX} Workshop on Free and Open Communications on the Internet,
                  {FOCI} '14, San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/foci14},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2014foci.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TschantzAPT14,
  author       = {Michael Carl Tschantz and
                  Sadia Afroz and
                  Vern Paxson and
                  J. Doug Tygar},
  title        = {On Modeling the Costs of Censorship},
  journal      = {CoRR},
  volume       = {abs/1409.3211},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.3211},
  eprinttype    = {arXiv},
  eprint       = {1409.3211},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/TschantzAPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RichterABP14,
  author       = {Philipp Richter and
                  Mark Allman and
                  Randy Bush and
                  Vern Paxson},
  title        = {A Primer on IPv4 Scarcity},
  journal      = {CoRR},
  volume       = {abs/1411.2649},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.2649},
  eprinttype    = {arXiv},
  eprint       = {1411.2649},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RichterABP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JavedP13,
  author       = {Mobin Javed and
                  Vern Paxson},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Detecting stealthy, distributed {SSH} brute-forcing},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516719},
  doi          = {10.1145/2508859.2516719},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JavedP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/HaoTPFKGH13,
  author       = {Shuang Hao and
                  Matthew Thomas and
                  Vern Paxson and
                  Nick Feamster and
                  Christian Kreibich and
                  Chris Grier and
                  Scott Hollenbeck},
  editor       = {Konstantina Papagiannaki and
                  P. Krishna Gummadi and
                  Craig Partridge},
  title        = {Understanding the domain registration behavior of spammers},
  booktitle    = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
                  Barcelona, Spain, October 23-25, 2013},
  pages        = {63--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2504730.2504753},
  doi          = {10.1145/2504730.2504753},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/HaoTPFKGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KhattakJAP13,
  author       = {Sheharbano Khattak and
                  Mobin Javed and
                  Philip D. Anderson and
                  Vern Paxson},
  editor       = {Jedidiah R. Crandall and
                  Joss Wright},
  title        = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion},
  booktitle    = {3rd {USENIX} Workshop on Free and Open Communications on the Internet,
                  {FOCI} '13, Washington, D.C., USA, August 13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/foci13/workshop-program/presentation/khattak},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KhattakJAP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaxsonCJRSSSTVW13,
  author       = {Vern Paxson and
                  Mihai Christodorescu and
                  Mobin Javed and
                  Josyula R. Rao and
                  Reiner Sailer and
                  Douglas Lee Schales and
                  Marc Ph. Stoecklin and
                  Kurt Thomas and
                  Wietse Z. Venema and
                  Nicholas Weaver},
  editor       = {Samuel T. King},
  title        = {Practical Comprehensive Bounds on Surreptitious Communication over
                  {DNS}},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {17--32},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/paxson},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PaxsonCJRSSSTVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasMGKP13,
  author       = {Kurt Thomas and
                  Damon McCoy and
                  Chris Grier and
                  Alek Kolcz and
                  Vern Paxson},
  editor       = {Samuel T. King},
  title        = {Trafficking Fraudulent Accounts: The Role of the Underground Market
                  in Twitter Spam and Abuse},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {195--210},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasMGKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2013,
  editor       = {Vern Paxson},
  title        = {6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '13, Washington, D.C., USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/leet13},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12,
  author       = {Chris Grier and
                  Lucas Ballard and
                  Juan Caballero and
                  Neha Chachra and
                  Christian J. Dietrich and
                  Kirill Levchenko and
                  Panayiotis Mavrommatis and
                  Damon McCoy and
                  Antonio Nappa and
                  Andreas Pitsillidis and
                  Niels Provos and
                  M. Zubair Rafique and
                  Moheeb Abu Rajab and
                  Christian Rossow and
                  Kurt Thomas and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Manufacturing compromise: the emergence of exploit-as-a-service},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {821--832},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382283},
  doi          = {10.1145/2382196.2382283},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DhawanSTKAWP12,
  author       = {Mohan Dhawan and
                  Justin Samuel and
                  Renata Teixeira and
                  Christian Kreibich and
                  Mark Allman and
                  Nicholas Weaver and
                  Vern Paxson},
  editor       = {John W. Byers and
                  Jim Kurose and
                  Ratul Mahajan and
                  Alex C. Snoeren},
  title        = {Fathom: a browser-based network measurement platform},
  booktitle    = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  pages        = {73--86},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2398776.2398786},
  doi          = {10.1145/2398776.2398786},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/DhawanSTKAWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ThomasGP12,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Vern Paxson},
  editor       = {Engin Kirda},
  title        = {Adapting Social Spam Infrastructure for Political Censorship},
  booktitle    = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/leet12/workshop-program/presentation/thomas},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/ThomasGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/HalvorsonSMFKWLP12,
  author       = {Tristan Halvorson and
                  Janos Szurdi and
                  Gregor Maier and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Christian Kreibich and
                  Nicholas Weaver and
                  Kirill Levchenko and
                  Vern Paxson},
  editor       = {Nina Taft and
                  Fabio Ricciato},
  title        = {The {BIZ} Top-Level Domain: Ten Years Later},
  booktitle    = {Passive and Active Measurement - 13th International Conference, {PAM}
                  2012, Vienna, Austria, March 12-14th, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7192},
  pages        = {221--230},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28537-0\_22},
  doi          = {10.1007/978-3-642-28537-0\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/HalvorsonSMFKWLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RossowDGKPPBS12,
  author       = {Christian Rossow and
                  Christian J. Dietrich and
                  Chris Grier and
                  Christian Kreibich and
                  Vern Paxson and
                  Norbert Pohlmann and
                  Herbert Bos and
                  Maarten van Steen},
  title        = {Prudent Practices for Designing Malware Experiments: Status Quo and
                  Outlook},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {65--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.14},
  doi          = {10.1109/SP.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RossowDGKPPBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/MartignoniPZHMSPPSS12,
  author       = {Lorenzo Martignoni and
                  Pongsin Poosankam and
                  Matei Zaharia and
                  Jun Han and
                  Stephen McCamant and
                  Dawn Song and
                  Vern Paxson and
                  Adrian Perrig and
                  Scott Shenker and
                  Ion Stoica},
  editor       = {Gernot Heiser and
                  Wilson C. Hsieh},
  title        = {Cloud Terminal: Secure Access to Sensitive Applications from Untrusted
                  Systems},
  booktitle    = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15,
                  2012},
  pages        = {165--182},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/martignoni},
  timestamp    = {Mon, 01 Feb 2021 08:43:32 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/MartignoniPZHMSPPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiGCP11,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Vern Paxson},
  title        = {Towards Situational Awareness of Large-Scale Botnet Probing Events},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {1},
  pages        = {175--188},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2010.2086445},
  doi          = {10.1109/TIFS.2010.2086445},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiGCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaierFPSV11,
  author       = {Gregor Maier and
                  Anja Feldmann and
                  Vern Paxson and
                  Robin Sommer and
                  Matthias Vallentin},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {An Assessment of Overt Malicious Activity Manifest in Residential
                  Networks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_9},
  doi          = {10.1007/978-3-642-22424-9\_9},
  timestamp    = {Wed, 25 Sep 2019 18:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MaierFPSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MillerPGKP11,
  author       = {Brad Miller and
                  Paul Pearce and
                  Chris Grier and
                  Christian Kreibich and
                  Vern Paxson},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {What's Clicking What? Techniques and Innovations of Today's Clickbots},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {164--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_10},
  doi          = {10.1007/978-3-642-22424-9\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MillerPGKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ThomasGSP11,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Dawn Song and
                  Vern Paxson},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {Suspended accounts in retrospect: an analysis of twitter spam},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {243--258},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068840},
  doi          = {10.1145/2068816.2068840},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/ThomasGSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichWKCP11,
  author       = {Christian Kreibich and
                  Nicholas Weaver and
                  Chris Kanich and
                  Weidong Cui and
                  Vern Paxson},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {{GQ:} practical containment for measuring modern malware systems},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {397--412},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068854},
  doi          = {10.1145/2068816.2068854},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KreibichWKCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/ZhangP11,
  author       = {Chao Michael Zhang and
                  Vern Paxson},
  editor       = {Neil Spring and
                  George F. Riley},
  title        = {Detecting and Analyzing Automated Activity on Twitter},
  booktitle    = {Passive and Active Measurement - 12th International Conference, {PAM}
                  2011, Atlanta, GA, USA, March 20-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6579},
  pages        = {102--111},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19260-9\_11},
  doi          = {10.1007/978-3-642-19260-9\_11},
  timestamp    = {Sun, 02 Jun 2019 21:20:49 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/ZhangP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KreibichWMNP11,
  author       = {Christian Kreibich and
                  Nicholas Weaver and
                  Gregor Maier and
                  Boris Nechaev and
                  Vern Paxson},
  editor       = {Nina Taft and
                  David Wetherall},
  title        = {Experiences from Netalyzr with engaging users in end-system measurement},
  booktitle    = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements
                  up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August
                  19, 2011},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2018602.2018609},
  doi          = {10.1145/2018602.2018609},
  timestamp    = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/KreibichWMNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11,
  author       = {Kirill Levchenko and
                  Andreas Pitsillidis and
                  Neha Chachra and
                  Brandon Enright and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Chris Grier and
                  Tristan Halvorson and
                  Chris Kanich and
                  Christian Kreibich and
                  He Liu and
                  Damon McCoy and
                  Nicholas Weaver and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Click Trajectories: End-to-End Analysis of the Spam Value Chain},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {431--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.24},
  doi          = {10.1109/SP.2011.24},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasGMPS11,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Justin Ma and
                  Vern Paxson and
                  Dawn Song},
  title        = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.25},
  doi          = {10.1109/SP.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasGMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaballeroGKP11,
  author       = {Juan Caballero and
                  Chris Grier and
                  Christian Kreibich and
                  Vern Paxson},
  title        = {Measuring Pay-per-Install: The Commoditization of Malware Distribution},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Caballero.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CaballeroGKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11,
  author       = {Chris Kanich and
                  Nicholas Weaver and
                  Damon McCoy and
                  Tristan Halvorson and
                  Christian Kreibich and
                  Kirill Levchenko and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Show Me the Money: Characterizing Spam-advertised Revenue},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KanichWMHKLPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeaverKP11,
  author       = {Nicholas Weaver and
                  Christian Kreibich and
                  Vern Paxson},
  editor       = {Nick Feamster and
                  Wenke Lee},
  title        = {Redirecting {DNS} for Ads and Profit},
  booktitle    = {{USENIX} Workshop on Free and Open Communications on the Internet,
                  {FOCI} '11, San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/foci11/redirecting-dns-ads-and-profit},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WeaverKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6298,
  author       = {Vern Paxson and
                  Mark Allman and
                  Jerry Chu and
                  Matt Sargent},
  title        = {Computing TCP's Retransmission Timer},
  journal      = {{RFC}},
  volume       = {6298},
  pages        = {1--11},
  year         = {2011},
  url          = {https://doi.org/10.17487/RFC6298},
  doi          = {10.17487/RFC6298},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6298.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierTPZ10,
  author       = {Chris Grier and
                  Kurt Thomas and
                  Vern Paxson and
                  Chao Michael Zhang},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {@spam: the underground on 140 characters or less},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {27--37},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866311},
  doi          = {10.1145/1866307.1866311},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierTPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/MuthukrishnanPAA10,
  author       = {Chitra Muthukrishnan and
                  Vern Paxson and
                  Mark Allman and
                  Aditya Akella},
  editor       = {Geoffrey G. Xie and
                  Robert Beverly and
                  Robert Tappan Morris and
                  Bruce Davie},
  title        = {Using strongly typed networking to architect for tussle},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Hot Topics in Networks. HotNets
                  2010, Monterey, CA, {USA} - October 20 - 21, 2010},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1868447.1868456},
  doi          = {10.1145/1868447.1868456},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/MuthukrishnanPAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichWNP10,
  author       = {Christian Kreibich and
                  Nicholas Weaver and
                  Boris Nechaev and
                  Vern Paxson},
  editor       = {Mark Allman},
  title        = {Netalyzr: illuminating the edge network},
  booktitle    = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  pages        = {246--259},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1879141.1879173},
  doi          = {10.1145/1879141.1879173},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KreibichWNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ChoCGPS10,
  author       = {Chia Yuan Cho and
                  Juan Caballero and
                  Chris Grier and
                  Vern Paxson and
                  Dawn Song},
  editor       = {Michael D. Bailey},
  title        = {Insights from the Inside: {A} View of Botnet Management from Infiltration},
  booktitle    = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/leet-10/insights-inside-view-botnet-management-infiltration},
  timestamp    = {Mon, 20 Nov 2023 09:09:49 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/ChoCGPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/FelegyhaziKP10,
  author       = {M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Christian Kreibich and
                  Vern Paxson},
  editor       = {Michael D. Bailey},
  title        = {On the Potential of Proactive Domain Blacklisting},
  booktitle    = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/leet-10/potential-proactive-domain-blacklisting},
  timestamp    = {Thu, 22 May 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/FelegyhaziKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PitsillidisLKKVPWS10,
  author       = {Andreas Pitsillidis and
                  Kirill Levchenko and
                  Christian Kreibich and
                  Chris Kanich and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Nicholas Weaver and
                  Stefan Savage},
  title        = {Botnet Judo: Fighting Spam with Itself},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/botnet-judo-fighting-spam-itself},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PitsillidisLKKVPWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/NechaevAPG08,
  author       = {Boris Nechaev and
                  Mark Allman and
                  Vern Paxson and
                  Andrei V. Gurtov},
  editor       = {Aditya Akella and
                  Nick Feamster and
                  Sanjay G. Rao},
  title        = {A Preliminary Analysis of {TCP} Performance in an Enterprise Network},
  booktitle    = {2010 Internet Network Management Workshop / Workshop on Research on
                  Enterprise Networking, San Jose, CA, USA, April, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/inmwren-10/preliminary-analysis-tcp-performance-enterprise-network},
  timestamp    = {Tue, 02 Feb 2021 08:05:44 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/NechaevAPG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/CallahanAP10,
  author       = {Tom Callahan and
                  Mark Allman and
                  Vern Paxson},
  editor       = {Arvind Krishnamurthy and
                  Bernhard Plattner},
  title        = {A Longitudinal View of {HTTP} Traffic},
  booktitle    = {Passive and Active Measurement, 11th International Conference, {PAM}
                  2010, Zurich, Switzerland, April 7-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6032},
  pages        = {222--231},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12334-4\_23},
  doi          = {10.1007/978-3-642-12334-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/CallahanAP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SommerP10,
  author       = {Robin Sommer and
                  Vern Paxson},
  title        = {Outside the Closed World: On Using Machine Learning for Network Intrusion
                  Detection},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {305--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.25},
  doi          = {10.1109/SP.2010.25},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SommerP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordCGLPY10,
  author       = {Paul Barford and
                  Yan Chen and
                  Anup Goyal and
                  Zhichun Li and
                  Vern Paxson and
                  Vinod Yegneswaran},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Employing Honeynets For Network Situational Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {71--102},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_5},
  doi          = {10.1007/978-1-4419-0140-8\_5},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KanichKLEVPS09,
  author       = {Chris Kanich and
                  Christian Kreibich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  title        = {Spamalytics: an empirical analysis of spam marketing conversion},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {9},
  pages        = {99--107},
  year         = {2009},
  url          = {https://doi.org/10.1145/1562164.1562190},
  doi          = {10.1145/1562164.1562190},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/KanichKLEVPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/PaxsonMR09,
  author       = {Vern Paxson and
                  Nick McKeown and
                  Jennifer Rexford},
  title        = {Selecting the 2008 sigcomm test-of-time awardwinner(s)},
  journal      = {Comput. Commun. Rev.},
  volume       = {39},
  number       = {2},
  pages        = {40--41},
  year         = {2009},
  url          = {https://doi.org/10.1145/1517480.1517488},
  doi          = {10.1145/1517480.1517488},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/PaxsonMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SommerPW09,
  author       = {Robin Sommer and
                  Vern Paxson and
                  Nicholas Weaver},
  title        = {An architecture for exploiting multi-core processors to parallelize
                  network intrusion prevention},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {21},
  number       = {10},
  pages        = {1255--1279},
  year         = {2009},
  url          = {https://doi.org/10.1002/cpe.1422},
  doi          = {10.1002/CPE.1422},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/SommerPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiGCP09,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Vern Paxson},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Automating analysis of large-scale botnet probing events},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533063},
  doi          = {10.1145/1533057.1533063},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiGCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/MittalPSW09,
  author       = {Prateek Mittal and
                  Vern Paxson and
                  Robin Sommer and
                  Mark Winterrowd},
  editor       = {Lakshminarayanan Subramanian and
                  Will E. Leland and
                  Ratul Mahajan},
  title        = {Securing Mediated Trace Access Using Black-box Permutation Analysis},
  booktitle    = {Eight {ACM} Workshop on Hot Topics in Networks (HotNets-VIII), {HOTNETS}
                  '09, New York City, NY, USA, October 22-23, 2009},
  publisher    = {{ACM} {SIGCOMM}},
  year         = {2009},
  url          = {http://conferences.sigcomm.org/hotnets/2009/papers/hotnets2009-final151.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/MittalPSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MaierFPA09,
  author       = {Gregor Maier and
                  Anja Feldmann and
                  Vern Paxson and
                  Mark Allman},
  editor       = {Anja Feldmann and
                  Laurent Mathy},
  title        = {On dominant characteristics of residential broadband internet traffic},
  booktitle    = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009},
  pages        = {90--102},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1644893.1644904},
  doi          = {10.1145/1644893.1644904},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/MaierFPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/NechaevPAG09,
  author       = {Boris Nechaev and
                  Vern Paxson and
                  Mark Allman and
                  Andrei V. Gurtov},
  editor       = {Anja Feldmann and
                  Laurent Mathy},
  title        = {On calibrating enterprise switch measurements},
  booktitle    = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009},
  pages        = {143--155},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1644893.1644910},
  doi          = {10.1145/1644893.1644910},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/NechaevPAG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/KreibichKLEVPS09,
  author       = {Christian Kreibich and
                  Chris Kanich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Wenke Lee},
  title        = {Spamcraft: An Inside Look At Spam Campaign Orchestration},
  booktitle    = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '09, Boston, MA, USA, April 21, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/leet-09/spamcraft-inside-look-spam-campaign-orchestration},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/KreibichKLEVPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WeaverSP09,
  author       = {Nicholas Weaver and
                  Robin Sommer and
                  Vern Paxson},
  title        = {Detecting Forged {TCP} Reset Packets},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/detecting-forged-tcp-reset-packets/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WeaverSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5681,
  author       = {Mark Allman and
                  Vern Paxson and
                  Ethan Blanton},
  title        = {{TCP} Congestion Control},
  journal      = {{RFC}},
  volume       = {5681},
  pages        = {1--18},
  year         = {2009},
  url          = {https://doi.org/10.17487/RFC5681},
  doi          = {10.17487/RFC5681},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JungMP08,
  author       = {Jaeyeon Jung and
                  Rodolfo A. Milito and
                  Vern Paxson},
  title        = {On the adaptive real-time detection of fast-propagating network worms},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {197--210},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0080-y},
  doi          = {10.1007/S11416-007-0080-Y},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JungMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KanichKLEVPS08,
  author       = {Chris Kanich and
                  Christian Kreibich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Spamalytics: an empirical analysis of spam marketing conversion},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455774},
  doi          = {10.1145/1455770.1455774},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KanichKLEVPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JuanKLP08,
  author       = {Leo Juan and
                  Christian Kreibich and
                  Chih{-}Hung Lin and
                  Vern Paxson},
  editor       = {Diego Zamboni},
  title        = {A Tool for Offline and Live Testing of Evasion Resilience in Network
                  Intrusion Detection Systems},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5137},
  pages        = {267--278},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70542-0\_14},
  doi          = {10.1007/978-3-540-70542-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/JuanKLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KreibichKLEVPS08,
  author       = {Christian Kreibich and
                  Chris Kanich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Fabian Monrose},
  title        = {On the Spam Campaign Trail},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/kreibich/kreibich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/KreibichKLEVPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/AllmanP08,
  author       = {Mark Allman and
                  Vern Paxson},
  editor       = {Mark Claypool and
                  Steve Uhlig},
  title        = {A Reactive Measurement Framework},
  booktitle    = {Passive and Active Network Measurement, 9th International Conference,
                  {PAM} 2008, Cleveland, OH, USA, April 29-30, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4979},
  pages        = {92--101},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79232-1\_10},
  doi          = {10.1007/978-3-540-79232-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/AllmanP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DregerFPS08,
  author       = {Holger Dreger and
                  Anja Feldmann and
                  Vern Paxson and
                  Robin Sommer},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Predicting the Resource Consumption of Network Intrusion Detection
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {135--154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_8},
  doi          = {10.1007/978-3-540-87403-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DregerFPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/MaierSDFPS08,
  author       = {Gregor Maier and
                  Robin Sommer and
                  Holger Dreger and
                  Anja Feldmann and
                  Vern Paxson and
                  Fabian Schneider},
  editor       = {Victor Bahl and
                  David Wetherall and
                  Stefan Savage and
                  Ion Stoica},
  title        = {Enriching network security analysis with time travel},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Seattle, WA, USA, August 17-22, 2008},
  pages        = {183--194},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1402958.1402980},
  doi          = {10.1145/1402958.1402980},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/MaierSDFPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/DregerFPS08,
  author       = {Holger Dreger and
                  Anja Feldmann and
                  Vern Paxson and
                  Robin Sommer},
  editor       = {Zhen Liu and
                  Vishal Misra and
                  Prashant J. Shenoy},
  title        = {Predicting the resource consumption of network intrusion detection
                  systems},
  booktitle    = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference
                  on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008,
                  Annapolis, MD, USA, June 2-6, 2008},
  pages        = {437--438},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375457.1375509},
  doi          = {10.1145/1375457.1375509},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/DregerFPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VutukuruBP08,
  author       = {Mythili Vutukuru and
                  Hari Balakrishnan and
                  Vern Paxson},
  title        = {Efficient and Robust {TCP} Stream Normalization},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {96--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.27},
  doi          = {10.1109/SP.2008.27},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/VutukuruBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AllmanKPSW08,
  author       = {Mark Allman and
                  Christian Kreibich and
                  Vern Paxson and
                  Robin Sommer and
                  Nicholas Weaver},
  editor       = {Niels Provos},
  title        = {Principles for Developing Comprehensive Network Visibility},
  booktitle    = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
                  CA, USA, July 29, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/hotsec08/tech/full\_papers/allman/allman.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AllmanKPSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GonzalezPW07,
  author       = {Jos{\'{e}} M. Gonz{\'{a}}lez and
                  Vern Paxson and
                  Nicholas Weaver},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Shunting: a hardware/software architecture for flexible, high-performance
                  network intrusion prevention},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {139--149},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315264},
  doi          = {10.1145/1315245.1315264},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GonzalezPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FranklinP07,
  author       = {Jason Franklin and
                  Adrian Perrig and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {An inquiry into the nature and causes of the wealth of internet miscreants},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {375--388},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315292},
  doi          = {10.1145/1315245.1315292},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FranklinP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JungMP07,
  author       = {Jaeyeon Jung and
                  Rodolfo A. Milito and
                  Vern Paxson},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {On the Adaptive Real-Time Detection of Fast-Propagating Network Worms},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_11},
  doi          = {10.1007/978-3-540-73614-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/JungMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/WeaverPG07,
  author       = {Nicholas Weaver and
                  Vern Paxson and
                  Jos{\'{e}} M. Gonz{\'{a}}lez},
  editor       = {Andr{\'{e}} DeHon and
                  Mike Hutton},
  title        = {The shunt: an FPGA-based accelerator for network intrusion prevention},
  booktitle    = {Proceedings of the {ACM/SIGDA} 15th International Symposium on Field
                  Programmable Gate Arrays, {FPGA} 2007, Monterey, California, USA,
                  February 18-20, 2007},
  pages        = {199--206},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1216919.1216952},
  doi          = {10.1145/1216919.1216952},
  timestamp    = {Tue, 06 Nov 2018 16:58:22 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/WeaverPG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/AllmanCNP07,
  author       = {Mark Allman and
                  Ken Christensen and
                  Bruce Nordman and
                  Vern Paxson},
  editor       = {Constantine Dovrolis and
                  Vern Paxson and
                  Stefan Savage},
  title        = {Enabling an Energy-Efficient Future Internet Through Selectively Connected
                  End Systems},
  booktitle    = {6th {ACM} Workshop on Hot Topics in Networks - HotNets-VI, Atlanta,
                  Georgia, USA, November 14-15, 2007},
  publisher    = {{ACM} {SIGCOMM}},
  year         = {2007},
  url          = {http://conferences.sigcomm.org/hotnets/2007/papers/hotnets6-final86.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/AllmanCNP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AllmanPT07,
  author       = {Mark Allman and
                  Vern Paxson and
                  Jeff Terrell},
  editor       = {Constantine Dovrolis and
                  Matthew Roughan},
  title        = {A brief history of scanning},
  booktitle    = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2007, San Diego, California, USA, October 24-26, 2007},
  pages        = {77--82},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1298306.1298316},
  doi          = {10.1145/1298306.1298316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/AllmanPT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AllmanP07,
  author       = {Mark Allman and
                  Vern Paxson},
  editor       = {Constantine Dovrolis and
                  Matthew Roughan},
  title        = {Issues and etiquette concerning use of shared measurement data},
  booktitle    = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2007, San Diego, California, USA, October 24-26, 2007},
  pages        = {135--140},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1298306.1298327},
  doi          = {10.1145/1298306.1298327},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/AllmanP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VallentinSLLPT07,
  author       = {Matthias Vallentin and
                  Robin Sommer and
                  Jason Lee and
                  Craig Leres and
                  Vern Paxson and
                  Brian Tierney},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {The {NIDS} Cluster: Scalable, Stateful Network Intrusion Detection
                  on Commodity Hardware},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_6},
  doi          = {10.1007/978-3-540-74320-0\_6},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VallentinSLLPT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AllmanKPSW07,
  author       = {Mark Allman and
                  Christian Kreibich and
                  Vern Paxson and
                  Robin Sommer and
                  Nicholas Weaver},
  title        = {The Strengths of Weaker Identities: Opportunistic Personas},
  booktitle    = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
                  MA, USA, August 7, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotsec-07/strengths-weaker-identities-opportunistic-personas},
  timestamp    = {Mon, 01 Feb 2021 08:42:51 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AllmanKPSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WeaverSP07,
  author       = {Nicholas Weaver and
                  Stuart Staniford and
                  Vern Paxson},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Very Fast Containment of Scanning Worms, Revisited},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {113--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_6},
  doi          = {10.1007/978-0-387-44599-1\_6},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WeaverSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2007,
  editor       = {Constantine Dovrolis and
                  Vern Paxson and
                  Stefan Savage},
  title        = {6th {ACM} Workshop on Hot Topics in Networks - HotNets-VI, Atlanta,
                  Georgia, USA, November 14-15, 2007},
  publisher    = {{ACM} {SIGCOMM}},
  year         = {2007},
  timestamp    = {Mon, 05 May 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotnets/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/PangAPL06,
  author       = {Ruoming Pang and
                  Mark Allman and
                  Vern Paxson and
                  Jason Lee},
  title        = {The devil and packet trace anonymization},
  journal      = {Comput. Commun. Rev.},
  volume       = {36},
  number       = {1},
  pages        = {29--38},
  year         = {2006},
  url          = {https://doi.org/10.1145/1111322.1111330},
  doi          = {10.1145/1111322.1111330},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/PangAPL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Paxson06,
  author       = {Vern Paxson},
  title        = {End-to-end routing behavior in the internet},
  journal      = {Comput. Commun. Rev.},
  volume       = {36},
  number       = {5},
  pages        = {41--56},
  year         = {2006},
  url          = {https://doi.org/10.1145/1163593.1163602},
  doi          = {10.1145/1163593.1163602},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Paxson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/DuffieldPPT06,
  author       = {Nick G. Duffield and
                  Francesco Lo Presti and
                  Vern Paxson and
                  Donald F. Towsley},
  title        = {Network loss tomography using striped unicast probes},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {14},
  number       = {4},
  pages        = {697--710},
  year         = {2006},
  url          = {http://doi.acm.org/10.1145/1217649},
  doi          = {10.1145/1217649},
  timestamp    = {Fri, 23 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/DuffieldPPT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/KohlerLPS06,
  author       = {Eddie Kohler and
                  Jinyang Li and
                  Vern Paxson and
                  Scott Shenker},
  title        = {Observed structure of addresses in {IP} traffic},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {14},
  number       = {6},
  pages        = {1207--1218},
  year         = {2006},
  url          = {http://doi.acm.org/10.1145/1217692},
  doi          = {10.1145/1217692},
  timestamp    = {Wed, 16 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/KohlerLPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/AllmanBPS06,
  author       = {Mark Allman and
                  Ethan Blanton and
                  Vern Paxson and
                  Scott Shenker},
  editor       = {Eddie Kohler and
                  Greg Minshall},
  title        = {Fighting Coordinated Attackers with Cross-Organizational Information
                  Sharing},
  booktitle    = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
                  California, USA, November 29-30, 2006},
  publisher    = {{ACM} {SIGCOMM}},
  year         = {2006},
  url          = {http://conferences.sigcomm.org/hotnets/2006/allman06fighting.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/AllmanBPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/ParkerRSCGSHBEA06,
  author       = {Andrew Parker and
                  Sasank Reddy and
                  Thomas Schmid and
                  Kevin K. Chang and
                  Saurabh Ganeriwal and
                  Mani B. Srivastava and
                  Mark H. Hansen and
                  Jeff Burke and
                  Deborah Estrin and
                  Mark Allman and
                  Vern Paxson},
  editor       = {Eddie Kohler and
                  Greg Minshall},
  title        = {Network System Challenges in Selective Sharing and Verification for
                  Personal, Social, and Urban-Scale Sensing Applications},
  booktitle    = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
                  California, USA, November 29-30, 2006},
  publisher    = {{ACM} {SIGCOMM}},
  year         = {2006},
  url          = {http://conferences.sigcomm.org/hotnets/2006/parker06network.pdf},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/ParkerRSCGSHBEA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KannanJPK06,
  author       = {Jayanthkumar Kannan and
                  Jaeyeon Jung and
                  Vern Paxson and
                  Can Emre Koksal},
  editor       = {Jussara M. Almeida and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Paul Barford},
  title        = {Semi-automated discovery of application session structure},
  booktitle    = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages        = {119--132},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1177080.1177096},
  doi          = {10.1145/1177080.1177096},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KannanJPK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PangPSP06,
  author       = {Ruoming Pang and
                  Vern Paxson and
                  Robin Sommer and
                  Larry L. Peterson},
  editor       = {Jussara M. Almeida and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Paul Barford},
  title        = {binpac: a yacc for writing application protocol parsers},
  booktitle    = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages        = {289--300},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1177080.1177119},
  doi          = {10.1145/1177080.1177119},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/PangPSP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CuiPWK06,
  author       = {Weidong Cui and
                  Vern Paxson and
                  Nicholas Weaver and
                  Randy H. Katz},
  title        = {Protocol-Independent Adaptive Replay of Application Dialog},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/protocol-independent-adaptive-replay-application-dialog/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CuiPWK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GonzalezP06,
  author       = {Jos{\'{e}} M. Gonz{\'{a}}lez and
                  Vern Paxson},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Enhancing Network Intrusion Detection with Integrated Sampling and
                  Filtering},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_14},
  doi          = {10.1007/11856214\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GonzalezP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WeaverPS06,
  author       = {Nicholas Weaver and
                  Vern Paxson and
                  Robin Sommer},
  title        = {Work in Progress: Bro-LAN Pervasive Network Inspection and Control
                  for {LAN} Traffic},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359568},
  doi          = {10.1109/SECCOMW.2006.359568},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/WeaverPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaxsonADLPSW06,
  author       = {Vern Paxson and
                  Krste Asanovic and
                  Sarang Dharmapurikar and
                  John W. Lockwood and
                  Ruoming Pang and
                  Robin Sommer and
                  Nicholas Weaver},
  title        = {Rethinking Hardware Support for Network Analysis and Intrusion Prevention},
  booktitle    = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver,
                  BC, Canada, July 31, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/hotsec-06/rethinking-hardware-support-network-analysis-and-intrusion-prevention},
  timestamp    = {Mon, 01 Feb 2021 08:43:09 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PaxsonADLPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4440,
  author       = {Sally Floyd and
                  Vern Paxson and
                  Aaron Falk and
                  Internet Architecture Board},
  title        = {{IAB} Thoughts on the Role of the Internet Research Task Force {(IRTF)}},
  journal      = {{RFC}},
  volume       = {4440},
  pages        = {1--13},
  year         = {2006},
  url          = {https://doi.org/10.17487/RFC4440},
  doi          = {10.17487/RFC4440},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4440.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/HellersteinPPRSW05,
  author       = {Joseph M. Hellerstein and
                  Vern Paxson and
                  Larry L. Peterson and
                  Timothy Roscoe and
                  Scott Shenker and
                  David Wetherall},
  title        = {The Network Oracle},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {28},
  number       = {1},
  pages        = {3--10},
  year         = {2005},
  url          = {http://sites.computer.org/debull/A05mar/hellerstein.ps},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/HellersteinPPRSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PaxsonW05,
  author       = {Vern Paxson and
                  Michael Waidner},
  title        = {Guest Editor's Introduction: 2005 {IEEE} Symposium on Security and
                  Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {2},
  number       = {2},
  pages        = {81},
  year         = {2005},
  url          = {https://doi.org/10.1109/TDSC.2005.23},
  doi          = {10.1109/TDSC.2005.23},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PaxsonW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SommerP05,
  author       = {Robin Sommer and
                  Vern Paxson},
  title        = {Exploiting Independent State For Network Intrusion Detection},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {59--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.24},
  doi          = {10.1109/CSAC.2005.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SommerP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DregerKPS05,
  author       = {Holger Dreger and
                  Christian Kreibich and
                  Vern Paxson and
                  Robin Sommer},
  editor       = {Klaus Julisch and
                  Christopher Kr{\"{u}}gel},
  title        = {Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based
                  Context},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  Second International Conference, {DIMVA} 2005, Vienna, Austria, July
                  7-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3548},
  pages        = {206--221},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506881\_13},
  doi          = {10.1007/11506881\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DregerKPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PangABLPT05,
  author       = {Ruoming Pang and
                  Mark Allman and
                  Mike Bennett and
                  Jason Lee and
                  Vern Paxson and
                  Brian Tierney},
  title        = {A First Look at Modern Enterprise Traffic},
  booktitle    = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
                  Berkeley, California, USA, October 19-21, 2005},
  pages        = {15--28},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {http://www.usenix.org/events/imc05/tech/pang.html},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/PangABLPT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KornexlPDFS05,
  author       = {Stefan Kornexl and
                  Vern Paxson and
                  Holger Dreger and
                  Anja Feldmann and
                  Robin Sommer},
  title        = {Building a Time Machine for Efficient Recording and Retrieval of High-Volume
                  Network Traffic},
  booktitle    = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
                  Berkeley, California, USA, October 19-21, 2005},
  pages        = {267--272},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {http://www.usenix.org/events/imc05/tech/kornexl.html},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/KornexlPDFS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KumarPW05,
  author       = {Abhishek Kumar and
                  Vern Paxson and
                  Nicholas Weaver},
  title        = {Exploiting Underlying Structure for Detailed Reconstruction of an
                  Internet-scale Event},
  booktitle    = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
                  Berkeley, California, USA, October 19-21, 2005},
  pages        = {351--364},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {http://www.usenix.org/events/imc05/tech/kumar.html},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/KumarPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DharmapurikarP05,
  author       = {Sarang Dharmapurikar and
                  Vern Paxson},
  editor       = {Patrick D. McDaniel},
  title        = {Robust {TCP} Stream Reassembly in the Presence of Adversaries},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/robust-tcp-stream-reassembly-presence-adversaries},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DharmapurikarP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/Paxson05,
  author       = {Vern Paxson},
  editor       = {Vijay Atluri and
                  Angelos D. Keromytis},
  title        = {An analysis of the witty outbreak: exploiting underlying structure
                  for detailed reconstruction of an internet-scale event},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Rapid Malcode, {WORM} 2005,
                  Fairfax, VA, USA, November 11, 2005},
  pages        = {51},
  publisher    = {{ACM} Press},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103626.1103636},
  doi          = {10.1145/1103626.1103636},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/Paxson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04,
  author       = {Ruzena Bajcsy and
                  Terry Benzel and
                  Matt Bishop and
                  Robert Braden and
                  Carla E. Brodley and
                  Sonia Fahmy and
                  Sally Floyd and
                  Wes Hardaker and
                  Anthony D. Joseph and
                  George Kesidis and
                  Karl N. Levitt and
                  Robert Lindell and
                  Peng Liu and
                  David J. Miller and
                  Russ Mundy and
                  Clifford Neuman and
                  Ron Ostrenga and
                  Vern Paxson and
                  Phillip A. Porras and
                  Catherine Rosenberg and
                  J. Doug Tygar and
                  Shankar Sastry and
                  Daniel F. Sterne and
                  Shyhtsun Felix Wu},
  title        = {Cyber defense technology networking and evaluation},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {3},
  pages        = {58--61},
  year         = {2004},
  url          = {https://doi.org/10.1145/971617.971646},
  doi          = {10.1145/971617.971646},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DregerFPS04,
  author       = {Holger Dreger and
                  Anja Feldmann and
                  Vern Paxson and
                  Robin Sommer},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Operational experiences with high-volume network intrusion detection},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {2--11},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030086},
  doi          = {10.1145/1030083.1030086},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DregerFPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hoti/WeaverESP04,
  author       = {Nicholas Weaver and
                  Dan Ellis and
                  Stuart Staniford and
                  Vern Paxson},
  title        = {Worms vs. perimeters: the case for hard-LANs},
  booktitle    = {Proceedings of the 12th Annual {IEEE} Symposium on High Performance
                  Interconnects, {HOTIC} 2004, August 22-24, 2004, Stanford, CA, {USA}},
  pages        = {70--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CONECT.2004.1375206},
  doi          = {10.1109/CONECT.2004.1375206},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hoti/WeaverESP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PangYBPP04,
  author       = {Ruoming Pang and
                  Vinod Yegneswaran and
                  Paul Barford and
                  Vern Paxson and
                  Larry L. Peterson},
  editor       = {Alfio Lombardo and
                  James F. Kurose},
  title        = {Characteristics of internet background radiation},
  booktitle    = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages        = {27--40},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1028788.1028794},
  doi          = {10.1145/1028788.1028794},
  timestamp    = {Mon, 08 Jul 2019 07:25:59 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/PangYBPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/Paxson04,
  author       = {Vern Paxson},
  editor       = {Alfio Lombardo and
                  James F. Kurose},
  title        = {Strategies for sound internet measurement},
  booktitle    = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages        = {263--271},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1028788.1028824},
  doi          = {10.1145/1028788.1028824},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/Paxson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/Paxson04,
  author       = {Vern Paxson},
  editor       = {Edward G. Coffman Jr. and
                  Zhen Liu and
                  Arif Merchant},
  title        = {Measuring adversaries},
  booktitle    = {Proceedings of the International Conference on Measurements and Modeling
                  of Computer Systems, {SIGMETRICS} 2004, June 10-14, 2004, New York,
                  NY, {USA}},
  pages        = {142},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1005686.1005688},
  doi          = {10.1145/1005686.1005688},
  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/Paxson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JungPBB04,
  author       = {Jaeyeon Jung and
                  Vern Paxson and
                  Arthur W. Berger and
                  Hari Balakrishnan},
  title        = {Fast Portscan Detection Using Sequential Hypothesis Testing},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {211--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301325},
  doi          = {10.1109/SECPRI.2004.1301325},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JungPBB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeaverSP04,
  author       = {Nicholas Weaver and
                  Stuart Staniford and
                  Vern Paxson},
  editor       = {Matt Blaze},
  title        = {Very Fast Containment of Scanning Worms},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {29--44},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/weaver.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WeaverSP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/StanifordMPW04,
  author       = {Stuart Staniford and
                  David Moore and
                  Vern Paxson and
                  Nicholas Weaver},
  editor       = {Vern Paxson},
  title        = {The top speed of flash worms},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
                  Washington, DC, USA, October 29, 2004},
  pages        = {33--42},
  publisher    = {{ACM} Press},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029618.1029624},
  doi          = {10.1145/1029618.1029624},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/StanifordMPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/WeaverHKP04,
  author       = {Nicholas Weaver and
                  Ihab Hamadeh and
                  George Kesidis and
                  Vern Paxson},
  editor       = {Vern Paxson},
  title        = {Preliminary results using scale-down to explore worm dynamics},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
                  Washington, DC, USA, October 29, 2004},
  pages        = {65--72},
  publisher    = {{ACM} Press},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029618.1029628},
  doi          = {10.1145/1029618.1029628},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/WeaverHKP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/worm/2004,
  editor       = {Vern Paxson},
  title        = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
                  Washington, DC, USA, October 29, 2004},
  publisher    = {{ACM} Press},
  year         = {2004},
  isbn         = {1-58113-970-5},
  timestamp    = {Fri, 23 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MoorePSSSW03,
  author       = {David Moore and
                  Vern Paxson and
                  Stefan Savage and
                  Colleen Shannon and
                  Stuart Staniford{-}Chen and
                  Nicholas Weaver},
  title        = {Inside the Slammer Worm},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {33--39},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219056},
  doi          = {10.1109/MSECP.2003.1219056},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MoorePSSSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SommerP03,
  author       = {Robin Sommer and
                  Vern Paxson},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Enhancing byte-level network intrusion detection signatures with context},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {262--271},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948145},
  doi          = {10.1145/948109.948145},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SommerP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/PangP03,
  author       = {Ruoming Pang and
                  Vern Paxson},
  editor       = {Anja Feldmann and
                  Martina Zitterbart and
                  Jon Crowcroft and
                  David Wetherall},
  title        = {A high-level programming environment for packet trace anonymization
                  and transformation},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2003 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  August 25-29, 2003, Karlsruhe, Germany},
  pages        = {339--351},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/863955.863994},
  doi          = {10.1145/863955.863994},
  timestamp    = {Sat, 30 Sep 2023 09:56:14 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/PangP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShankarP03,
  author       = {Umesh Shankar and
                  Vern Paxson},
  title        = {Active Mapping: Resisting {NIDS} Evasion without Altering Traffic},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {44--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199327},
  doi          = {10.1109/SECPRI.2003.1199327},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ShankarP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/WeaverPSC03,
  author       = {Nicholas Weaver and
                  Vern Paxson and
                  Stuart Staniford and
                  Robert K. Cunningham},
  editor       = {Stuart Staniford and
                  Stefan Savage},
  title        = {A taxonomy of computer worms},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Rapid Malcode, {WORM} 2003,
                  Washington, DC, USA, October 27, 2003},
  pages        = {11--18},
  publisher    = {{ACM} Press},
  year         = {2003},
  url          = {https://doi.org/10.1145/948187.948190},
  doi          = {10.1145/948187.948190},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/WeaverPSC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MahajanBFIPS02,
  author       = {Ratul Mahajan and
                  Steven M. Bellovin and
                  Sally Floyd and
                  John Ioannidis and
                  Vern Paxson and
                  Scott Shenker},
  title        = {Aggregate congestion control},
  journal      = {Comput. Commun. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {69},
  year         = {2002},
  url          = {https://doi.org/10.1145/510726.510743},
  doi          = {10.1145/510726.510743},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MahajanBFIPS02a,
  author       = {Ratul Mahajan and
                  Steven M. Bellovin and
                  Sally Floyd and
                  John Ioannidis and
                  Vern Paxson and
                  Scott Shenker},
  title        = {Controlling high bandwidth aggregates in the network},
  journal      = {Comput. Commun. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {62--73},
  year         = {2002},
  url          = {https://doi.org/10.1145/571697.571724},
  doi          = {10.1145/571697.571724},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KohlerLPS02,
  author       = {Eddie Kohler and
                  Jinyang Li and
                  Vern Paxson and
                  Scott Shenker},
  title        = {Observed structure of addresses in {IP} traffic},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop,
                  {IMW} 2002, Marseille, France, November 6-8, 2002},
  pages        = {253--266},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/637201.637242},
  doi          = {10.1145/637201.637242},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/KohlerLPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DonohoFSPCS02,
  author       = {David L. Donoho and
                  Ana Georgina Flesia and
                  Umesh Shankar and
                  Vern Paxson and
                  Jason Coit and
                  Stuart Staniford},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive
                  Streams by Exploiting Maximum Tolerable Delay},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {17--35},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_2},
  doi          = {10.1007/3-540-36084-0\_2},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DonohoFSPCS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ZhangBPS02,
  author       = {Yin Zhang and
                  Lee Breslau and
                  Vern Paxson and
                  Scott Shenker},
  editor       = {Matthew Mathis and
                  Peter Steenkiste and
                  Hari Balakrishnan and
                  Vern Paxson},
  title        = {On the characteristics and origins of internet flow rates},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  August 19-23, 2002, Pittsburgh, PA, {USA}},
  pages        = {309--322},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/633025.633055},
  doi          = {10.1145/633025.633055},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ZhangBPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StanifordPW02,
  author       = {Stuart Staniford and
                  Vern Paxson and
                  Nicholas Weaver},
  editor       = {Dan Boneh},
  title        = {How to Own the Internet in Your Spare Time},
  booktitle    = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
                  CA, USA, August 5-9, 2002},
  pages        = {149--167},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/sec02/staniford.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StanifordPW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2002,
  editor       = {Matthew Mathis and
                  Peter Steenkiste and
                  Hari Balakrishnan and
                  Vern Paxson},
  title        = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  August 19-23, 2002, Pittsburgh, PA, {USA}},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/633025},
  doi          = {10.1145/633025},
  isbn         = {1-58113-570-X},
  timestamp    = {Wed, 21 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/AllmanP01,
  author       = {Mark Allman and
                  Vern Paxson},
  title        = {On estimating end-to-end network path properties},
  journal      = {Comput. Commun. Rev.},
  volume       = {31},
  number       = {2-Supplement},
  pages        = {124--151},
  year         = {2001},
  url          = {https://doi.org/10.1145/844193.844203},
  doi          = {10.1145/844193.844203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/AllmanP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Paxson01,
  author       = {Vern Paxson},
  title        = {An analysis of using reflectors for distributed denial-of-service
                  attacks},
  journal      = {Comput. Commun. Rev.},
  volume       = {31},
  number       = {3},
  pages        = {38--47},
  year         = {2001},
  url          = {https://doi.org/10.1145/505659.505664},
  doi          = {10.1145/505659.505664},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Paxson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/X01c,
  author       = {Sally Floyd and
                  Vern Paxson},
  title        = {Difficulties in simulating the internet},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {9},
  number       = {4},
  pages        = {392--403},
  year         = {2001},
  url          = {https://doi.org/10.1109/90.944338},
  doi          = {10.1109/90.944338},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/X01c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DuffieldPPT01,
  author       = {Nick G. Duffield and
                  Francesco Lo Presti and
                  Vern Paxson and
                  Donald F. Towsley},
  title        = {Inferring Link Loss Using Striped Unicast Probes},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications,
                  Twentieth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Twenty years into the communications odyssey, Anchorage,
                  Alaska, USA, April 22-26, 2001},
  pages        = {915--923},
  publisher    = {{IEEE} Comptuer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/INFCOM.2001.916283},
  doi          = {10.1109/INFCOM.2001.916283},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/DuffieldPPT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcommla/AllmanP01,
  author       = {Mark Allman and
                  Vern Paxson},
  editor       = {Julio Escobar},
  title        = {On estimating end-to-end network path properties},
  booktitle    = {Workshop on Data Communication in Latin America and the Caribbean,
                  {SIGCOMM-LA} 2001, San Jose, Costa Rica, 2001},
  pages        = {124--151},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/371626.371774},
  doi          = {10.1145/371626.371774},
  timestamp    = {Fri, 03 Jun 2022 10:57:55 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcommla/AllmanP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HandleyPK01,
  author       = {Mark Handley and
                  Vern Paxson and
                  Christian Kreibich},
  editor       = {Dan S. Wallach},
  title        = {Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End
                  Protocol Semantics},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/handley.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HandleyPK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imw/2001,
  editor       = {Vern Paxson},
  title        = {Proceedings of the 1st {ACM} {SIGCOMM} Internet Measurement Workshop,
                  {IMW} 2001, San Francisco, California, USA, November 1-2, 2001},
  publisher    = {{ACM}},
  year         = {2001},
  isbn         = {1-58113-435-5},
  timestamp    = {Wed, 13 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imw/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AdamsBFHTCDPMP00,
  author       = {Andrew K. Adams and
                  Tian Bu and
                  Timur Friedman and
                  Joseph Horowitz and
                  Don Towsley and
                  Ram{\'{o}}n C{\'{a}}ceres and
                  Nick Duffield and
                  Francesco Lo Presti and
                  Sue B. Moon and
                  Vern Paxson},
  title        = {The use of end-to-end multicast measurements for characterizing internal
                  network behavior},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {38},
  number       = {5},
  pages        = {152--159},
  year         = {2000},
  url          = {https://doi.org/10.1109/35.841840},
  doi          = {10.1109/35.841840},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AdamsBFHTCDPMP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangP00,
  author       = {Yin Zhang and
                  Vern Paxson},
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {Detecting Backdoors},
  booktitle    = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9th-usenix-security-symposium/detecting-backdoors},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangP00a,
  author       = {Yin Zhang and
                  Vern Paxson},
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {Detecting Stepping Stones},
  booktitle    = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9th-usenix-security-symposium/detecting-stepping-stones},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangP00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2780,
  author       = {Scott O. Bradner and
                  Vern Paxson},
  title        = {{IANA} Allocation Guidelines For Values In the Internet Protocol and
                  Related Headers},
  journal      = {{RFC}},
  volume       = {2780},
  pages        = {1--10},
  year         = {2000},
  url          = {https://doi.org/10.17487/RFC2780},
  doi          = {10.17487/RFC2780},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2873,
  author       = {Xipeng Xiao and
                  Alan Hannan and
                  Vern Paxson and
                  Edward Crabbe},
  title        = {{TCP} Processing of the IPv4 Precedence Field},
  journal      = {{RFC}},
  volume       = {2873},
  pages        = {1--8},
  year         = {2000},
  url          = {https://doi.org/10.17487/RFC2873},
  doi          = {10.17487/RFC2873},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2873.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2960,
  author       = {Randall R. Stewart and
                  Qiaobing Xie and
                  Ken Morneault and
                  Chip Sharp and
                  Hanns Juergen Schwarzbauer and
                  Tom Taylor and
                  Ian Rytina and
                  Malleswar Kalla and
                  Lixia Zhang and
                  Vern Paxson},
  title        = {Stream Control Transmission Protocol},
  journal      = {{RFC}},
  volume       = {2960},
  pages        = {1--134},
  year         = {2000},
  url          = {https://doi.org/10.17487/RFC2960},
  doi          = {10.17487/RFC2960},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2960.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2988,
  author       = {Vern Paxson and
                  Mark Allman},
  title        = {Computing TCP's Retransmission Timer},
  journal      = {{RFC}},
  volume       = {2988},
  pages        = {1--8},
  year         = {2000},
  url          = {https://doi.org/10.17487/RFC2988},
  doi          = {10.17487/RFC2988},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Paxson99,
  author       = {Vern Paxson},
  title        = {Bro: a system for detecting network intruders in real-time},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {23-24},
  pages        = {2435--2463},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(99)00112-7},
  doi          = {10.1016/S1389-1286(99)00112-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Paxson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/Paxson99,
  author       = {Vern Paxson},
  title        = {End-to-end internet packet dynamics},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {7},
  number       = {3},
  pages        = {277--292},
  year         = {1999},
  url          = {https://doi.org/10.1109/90.779192},
  doi          = {10.1109/90.779192},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/Paxson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/FrancisJPZGJ99,
  author       = {Paul Francis and
                  Sugih Jamin and
                  Vern Paxson and
                  Lixia Zhang and
                  Daniel F. Gryniewicz and
                  Yixin Jin},
  title        = {An Architecture for a Global Internet Host Distance Estimation Service},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications,
                  Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999},
  pages        = {210--217},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/INFCOM.1999.749285},
  doi          = {10.1109/INFCOM.1999.749285},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/FrancisJPZGJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Paxson99,
  author       = {Vern Paxson},
  title        = {Defending against network {IDS} evasion},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Paxson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Paxson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/AllmanP99,
  author       = {Mark Allman and
                  Vern Paxson},
  editor       = {Lyman Chapin and
                  James P. G. Sterbenz and
                  Guru M. Parulkar and
                  Jonathan S. Turner},
  title        = {On Estimating End-to-End Network Path Properties},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 1999 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  August 30 - September 3, 1999, Cambridge, Massachusetts, {USA}},
  pages        = {263--274},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/316188.316230},
  doi          = {10.1145/316188.316230},
  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/AllmanP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2498,
  author       = {Jamshid Mahdavi and
                  Vern Paxson},
  title        = {{IPPM} Metrics for Measuring Connectivity},
  journal      = {{RFC}},
  volume       = {2498},
  pages        = {1--10},
  year         = {1999},
  url          = {https://doi.org/10.17487/RFC2498},
  doi          = {10.17487/RFC2498},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2525,
  author       = {Vern Paxson and
                  Mark Allman and
                  Scott Dawson and
                  William C. Fenner and
                  Jim Griner and
                  Ian Heavens and
                  Kevin Lahey and
                  Jeffrey Semke and
                  Bernie Volz},
  title        = {Known {TCP} Implementation Problems},
  journal      = {{RFC}},
  volume       = {2525},
  pages        = {1--61},
  year         = {1999},
  url          = {https://doi.org/10.17487/RFC2525},
  doi          = {10.17487/RFC2525},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2525.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2581,
  author       = {Mark Allman and
                  Vern Paxson and
                  W. Richard Stevens},
  title        = {{TCP} Congestion Control},
  journal      = {{RFC}},
  volume       = {2581},
  pages        = {1--14},
  year         = {1999},
  url          = {https://doi.org/10.17487/RFC2581},
  doi          = {10.17487/RFC2581},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2581.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2678,
  author       = {Jamshid Mahdavi and
                  Vern Paxson},
  title        = {{IPPM} Metrics for Measuring Connectivity},
  journal      = {{RFC}},
  volume       = {2678},
  pages        = {1--10},
  year         = {1999},
  url          = {https://doi.org/10.17487/RFC2678},
  doi          = {10.17487/RFC2678},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2678.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/PaxsonMAM98,
  author       = {Vern Paxson and
                  Jamshid Mahdavi and
                  Andrew K. Adams and
                  Matt Mathis},
  title        = {An architecture for large-scale Internet measurement},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {36},
  number       = {8},
  pages        = {48--54},
  year         = {1998},
  url          = {https://doi.org/10.1109/35.707817},
  doi          = {10.1109/35.707817},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/PaxsonMAM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/Paxson98,
  author       = {Vern Paxson},
  editor       = {Mary K. Vernon and
                  Garth Gibson and
                  Guy Latouche and
                  Scott T. Leutenegger},
  title        = {On Calibrating Measurements of Packet Transit Times},
  booktitle    = {Proceedings of the 1998 {ACM} {SIGMETRICS} joint international conference
                  on Measurement and modeling of computer systems, {SIGMETRICS} '98
                  / {PERFORMANCE} '98, Madison, Wisconsin, USA, June 22-26, 1998},
  pages        = {11--21},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277851.277865},
  doi          = {10.1145/277851.277865},
  timestamp    = {Fri, 30 Jul 2021 16:13:33 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/Paxson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Paxson98,
  author       = {Vern Paxson},
  editor       = {Aviel D. Rubin},
  title        = {Bro: {A} System for Detecting Network Intruders in Real-Time},
  booktitle    = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX,
                  USA, January 26-29, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  url          = {https://www.usenix.org/conference/7th-usenix-security-symposium/bro-system-detecting-network-intruders-real-time},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Paxson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-NI-9809030,
  author       = {Vern Paxson},
  title        = {Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating
                  Self-Similar Network Traffic},
  journal      = {CoRR},
  volume       = {cs.NI/9809030},
  year         = {1998},
  url          = {https://arxiv.org/abs/cs/9809030},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-NI-9809030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2330,
  author       = {Vern Paxson and
                  Guy Almes and
                  Jamshid Mahdavi and
                  Matt Mathis},
  title        = {Framework for {IP} Performance Metrics},
  journal      = {{RFC}},
  volume       = {2330},
  pages        = {1--40},
  year         = {1998},
  url          = {https://doi.org/10.17487/RFC2330},
  doi          = {10.17487/RFC2330},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2330.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2357,
  author       = {Allison Mankin and
                  Allyn Romanow and
                  Scott O. Bradner and
                  Vern Paxson},
  title        = {{IETF} Criteria for Evaluating Reliable Multicast Transport and Application
                  Protocols},
  journal      = {{RFC}},
  volume       = {2357},
  pages        = {1--11},
  year         = {1998},
  url          = {https://doi.org/10.17487/RFC2357},
  doi          = {10.17487/RFC2357},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2357.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Paxson97,
  author       = {Vern Paxson},
  title        = {Fast, approximate synthesis of fractional Gaussian noise for generating
                  self-similar network traffic},
  journal      = {Comput. Commun. Rev.},
  volume       = {27},
  number       = {5},
  pages        = {5--18},
  year         = {1997},
  url          = {https://doi.org/10.1145/269790.269792},
  doi          = {10.1145/269790.269792},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Paxson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/Paxson97,
  author       = {Vern Paxson},
  title        = {End-to-end routing behavior in the Internet},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {5},
  number       = {5},
  pages        = {601--615},
  year         = {1997},
  url          = {https://doi.org/10.1109/90.649563},
  doi          = {10.1109/90.649563},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/Paxson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Paxson97,
  author       = {Vern Paxson},
  editor       = {Christophe Diot and
                  Christian Huitema and
                  Scott Shenker and
                  Martha Steenstrup},
  title        = {End-to-end Internet Packet Dynamics},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 1997 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  September 14-18, 1997, Cannes, France},
  pages        = {139--152},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/263105.263155},
  doi          = {10.1145/263105.263155},
  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/Paxson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Paxson97a,
  author       = {Vern Paxson},
  editor       = {Christophe Diot and
                  Christian Huitema and
                  Scott Shenker and
                  Martha Steenstrup},
  title        = {Automated Packet Trace Analysis of {TCP} Implementations},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 1997 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  September 14-18, 1997, Cannes, France},
  pages        = {167--179},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/263105.263160},
  doi          = {10.1145/263105.263160},
  timestamp    = {Wed, 21 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/Paxson97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/PaxsonF97,
  author       = {Vern Paxson and
                  Sally Floyd},
  editor       = {Sigr{\'{u}}n Andrad{\'{o}}ttir and
                  Kevin J. Healy and
                  David H. Withers and
                  Barry L. Nelson},
  title        = {Why We Don't Know How To Simulate the Internet},
  booktitle    = {Proceedings of the 29th conference on Winter simulation, {WSC} 1997,
                  Atlanta, GA, USA, December 7-10, 1997},
  pages        = {1037--1044},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.ieeecomputersociety.org/10.1109/WSC.1997.640988},
  doi          = {10.1109/WSC.1997.640988},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsc/PaxsonF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Paxson96,
  author       = {Vern Paxson},
  editor       = {Deborah Estrin and
                  Sally Floyd and
                  Craig Partridge and
                  Martha Steenstrup},
  title        = {End-to-end Routing Behavior in the Internet},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 1996 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  Stanford, CA, USA, August 26-30, 1996},
  pages        = {25--38},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/248156.248160},
  doi          = {10.1145/248156.248160},
  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/Paxson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/PaxsonF95,
  author       = {Vern Paxson and
                  Sally Floyd},
  title        = {Wide area traffic: the failure of Poisson modeling},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {3},
  number       = {3},
  pages        = {226--244},
  year         = {1995},
  url          = {https://doi.org/10.1109/90.392383},
  doi          = {10.1109/90.392383},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/PaxsonF95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/WilliamsonWPM95,
  author       = {Carey L. Williamson and
                  Walter Willinger and
                  Vern Paxson and
                  Benjamin Melamed},
  editor       = {Blaine D. Gaither},
  title        = {Network Traffic Measurement and Modelling (Panel)},
  booktitle    = {Proceedings of the 1995 {ACM} {SIGMETRICS} joint international conference
                  on Measurement and modeling of computer systems, Ottawa, Canada, May
                  15-19, 1995},
  pages        = {56--57},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/223587.223593},
  doi          = {10.1145/223587.223593},
  timestamp    = {Fri, 30 Jul 2021 16:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/WilliamsonWPM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/Paxson94,
  author       = {Vern Paxson},
  title        = {Growth trends in wide-area {TCP} connections},
  journal      = {{IEEE} Netw.},
  volume       = {8},
  number       = {4},
  pages        = {8--17},
  year         = {1994},
  url          = {https://doi.org/10.1109/65.298159},
  doi          = {10.1109/65.298159},
  timestamp    = {Wed, 05 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/Paxson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/Paxson94,
  author       = {Vern Paxson},
  title        = {Empirically derived analytic models of wide-area {TCP} connections},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {2},
  number       = {4},
  pages        = {316--336},
  year         = {1994},
  url          = {https://doi.org/10.1109/90.330413},
  doi          = {10.1109/90.330413},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/Paxson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/PaxsonF94,
  author       = {Vern Paxson and
                  Sally Floyd},
  editor       = {Jon Crowcroft},
  title        = {Wide-Area Traffic: The Failure of Poisson Modeling},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 1994 Conference on Communications
                  Architectures, Protocols and Applications, London, UK, August 31 -
                  September 2, 1994},
  pages        = {257--268},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/190314.190338},
  doi          = {10.1145/190314.190338},
  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/PaxsonF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/PaxsonS93,
  author       = {Vern Paxson and
                  Chris Saltmarsh},
  title        = {Glish: {A} User-Level Software Bus for Loosely-Coupled Distributed
                  Systems},
  booktitle    = {Proceedings of the Usenix Winter 1993 Technical Conference, San Diego,
                  California, USA, January 1993},
  pages        = {141--156},
  publisher    = {{USENIX} Association},
  year         = {1993},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/PaxsonS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics