Publications
Active Mapping: Resisting NIDS Evasion Without Altering Traffic.
Proceedings of the IEEE Symposium on Security and Privacy.
(2003).
(2015).
(2012). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.
Journal on Computer Virology. 4(1), 197-210.
(2008).
(2007). Aggregate Congestion Control.
ACM SIGCOMM Computer Communication Review. 32(1), 69.
(2002). An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015). An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of ACM Internet Measurement Conference.
(2016).
(2001). An Architecture for a Global Internet Host Distance Estimation Service.
Proceedings of IEEE INFOCOM.
(1999). An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
1-7.
(2007). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009). An Architecture for Large-Scale Internet Measurement.
IEEE Communications. 36(8), 48-54.
(1998).
(2011). Automated Analysis of Cybercriminal Markets.
Proceedings of WWW 2017.
(2017). Automated Packet Trace Analysis of TCP Implementations.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997).
(2009).
(2018).
(2014).
(2015).
binpac: A yacc for Writing Application Protocol Parsers.
Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
(2006).
(2012). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015).
(2010).