Publications
You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004).
(2006). Wide-Area Traffic: The Failure of Poisson Modeling.
IEEE/ACM Transactions on Networking. 3(3), 226-244.
(1995). Why We Don't Know How To Simulate The Internet.
Proceedings of the 1997 Winter Simulation Conference.
(1997). Where Mathematics Meets the Internet.
Notices of the American Mathematical Society. 45(8), 961-970.
(1998).
(2014).
(2011). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018).
(2007).
Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004). VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016).
(2010).
Using Honeynets for Internet Situational Awareness.
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
(2005).
(2000).
(2013).
Towards Situational Awareness of Large-Scale Botnet Probing Events.
IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
(2011). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016).
(2013).
(2013).
(1996). Toward Continual Measurement of Global Network-Level Censorship.
Security and Privacy. 16(1),
(2018). The Top Speed of Flash Worms.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).
(2008).