Publications
An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005). A First Look at Modern Enterprise Traffic.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 15-28.
(2005). On the Impact of Bursting on TCP Performance.
Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005).
(2005). Measuring the Evolution of Transport Protocols in the Internet.
ACM Computer Communication Review. 35(2), 37-52.
(2005). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Fighting Coordinated Attackers with Cross-Organizational Information on Sharing.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
(2006). Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 37-42.
(2006).
(2006). Tracking the Role of Adversaries in Measuring Unwanted Traffic.
Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
(2006).
(2006). A Brief History of Scanning.
77-82.
(2007).
(2007). Determining an Appropriate Sending Rate Over an Underutilized Network Path.
51(7), 1815-1832.
(2007).
(2007).
(2007). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007).
(2007).
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2008).
(2008).
(2008).
A Reactive Measurement Framework.
92-101.
(2008).
(2008).