Publications
On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013). Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013). Findings and Implications from Data Mining the IMC Review Process.
ACM SIGCOMM Computer Communication Review. 3(1), 23-29.
(2013).
(2013).
(2013). On Modern DNS Behavior and Properties.
ACM SIGCOMM Computer Communication Review. 43(3), 8-15.
(2013).
(2013).
(2014).
(2014).
A Large-Scale Empirical Analysis of Email Spam Detection Through Network Characteristics in a Stand-Alone Enterprise.
Computer Networks. 59, 101-121.
(2014).
(2014).
(2014).
(2014). Performance Within A Fiber-To-The-Home Network.
ACM SIGCOMM Computer Communication Review. 44(3), 23-30.
(2014).
(2014). Addressing Ethical Considerations in Network Measurement Papers.
Proceedings of ACM SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015). On The Power and Limitations of Detecting Network Filtering via Passive Observation.
Proceedings of the Passive and Active Management Conference (PAM 2015).
(2015). A Primer on IPv4 Scarcity.
ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
(2015). Resilience of Deployed TCP to Blind Off-Path Attacks.
Proceedings of ACM Internet Measurement Conference.
(2015). Addressing Ethical Considerations in Network Measurement Papers.
Communications of the ACM. 59(10),
(2016). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016). Towards a Model of DNS Client Behavior.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).