Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Paxson, V. (1999).  Bro: A System for Detecting Network Intruders in Real-Time. 2435-2463.
Paxson, V., & Floyd S. (1995).  Wide-Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking. 3(3), 226-244.
Paxson, V. (1997).  End-to-End Internet Packet Dynamics. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Paxson, V. (2011).  Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots.
Paxson, V., Almes G.., Mahdavi J., & Mathis M. (1998).  Framework for IP Performance Metrics.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication Over DNS. SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
Paxson, V., & Floyd S. (1997).  Why We Don't Know How To Simulate The Internet. Proceedings of the 1997 Winter Simulation Conference.
Paxson, V. (1996).  Towards a Framework for Defining Internet Performance Metrics.
Paxson, V. (1997).  End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking. 5(5), 601-615.
Paxson, V., Allman M., Chu J., & Sargent M. (2011).  Computing TCP's Retransmission Timer.
Paxson, V. (1990).  A Survey of Support for Implementing Debuggers.
Paxson, V. (2018).  ICSI & The "Bro" Project. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Paxson, V. (1998).  On Calibrating Measurements of Packet Transit Times. Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98). 11-21.
Paxson, V. (1997).  Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic. Computer Communication Review. 27(5), 5-18.
Paxson, V., Adams A. K., & Mathis M. (2000).  Experiences with NIMI. Proceedings of the Passive & Active Measurement (PAM 2000).
Paxson, V. (2001).  An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. 31(3), 
Paxson, V., Allman M., Dawson S.., Fenner W.., Griner J., Heavens I.., et al. (1999).  Known TCP Implementation Problems.
Paxson, V., & Allman M. (2000).  Computing TCP's Retransmission Timer.
Paxson, V., & Saltmarsh C.. (1993).  Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. Proceedings of the 1993 Winter USENIX Technical Conference.
Paxson, V. (1998).  Bro: A System for Detecting Network Intruders in Real-Time. Proceedings of the 7th USENIX Security Symposium.
Paxson, V. (1994).  Growth Trends in Wide-Area TCP Connections. IEEE Network. 8-17.
Pawar, U. Singh, Pal J., Gupta R., & Toyama K. (2007).  Multiple Mice for Retention Tasks in Disadvantaged Schools. Proceedings of the 25th Annual ACM Conference on Human Factors in Computing Systems (CHI '07). 1581-1590.
Pauls, A., DeNero J., & Klein D. (2009).  Consensus Training for Consensus Decoding in Machine Translation. 1418-1427.

Pages