Follow
Vern Paxson
Vern Paxson
Verified email at berkeley.edu
Title
Cited by
Cited by
Year
Wide area traffic: the failure of Poisson modeling
V Paxson, S Floyd
IEEE/ACM Transactions on networking 3 (3), 226-244, 1995
59221995
TCP congestion control
M Allman, V Paxson, E Blanton
41202009
Bro: a system for detecting network intruders in real-time
V Paxson
Computer networks 31 (23-24), 2435-2463, 1999
40441999
Stream control transmission protocol
R Stewart
39142007
Outside the closed world: On using machine learning for network intrusion detection
R Sommer, V Paxson
2010 IEEE symposium on security and privacy, 305-316, 2010
19352010
How to 0wn the internet in your spare time
S Staniford, V Paxson, N Weaver
USENIX security Symposium, 11th. USENIX, 2002
17792002
End-to-end routing behavior in the Internet
V Paxson
IEEE/ACM transactions on Networking 5 (5), 601-615, 1997
16231997
Inside the slammer worm
D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver
IEEE Security & Privacy 1 (4), 33-39, 2003
14752003
Computing TCP's retransmission timer
V Paxson, M Allman, J Chu, M Sargent
13442011
Difficulties in simulating the Internet
S Floyd, V Paxson
IEEE/ACm Transactions on Networking 9 (4), 392-403, 2001
12512001
End-to-end Internet packet dynamics
V Paxson
Proceedings of the ACM SIGCOMM'97 conference on Applications, technologies …, 1997
11501997
End-to-end Internet packet dynamics
V Paxson
IEEE/ACM transactions on networking 7 (3), 277-292, 1999
11401999
Controlling high bandwidth aggregates in the network
R Mahajan, SM Bellovin, S Floyd, J Ioannidis, V Paxson, S Shenker
ACM SIGCOMM Computer Communication Review 32 (3), 62-73, 2002
11062002
Effectiveness and impact of corporate average fuel economy (CAFE) standards
National Research Council, Transportation Research Board, ...
National Academies Press, 2002
1065*2002
Measurements and analysis of end-to-end Internet dynamics
VE Paxson
University of California, Berkeley, 1997
10501997
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
10442014
Fast portscan detection using sequential hypothesis testing
J Jung, V Paxson, AW Berger, H Balakrishnan
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 211-225, 2004
10052004
Empirically derived analytic models of wide-area TCP connections
V Paxson
IEEE/ACM transactions on Networking 2 (4), 316-336, 1994
9481994
Wide-area traffic: the failure of Poisson modeling
V Paxson, S Floyd
ACM SIGCOMM Computer Communication Review 24 (4), 257-268, 1994
8981994
Framework for IP performance metrics
V Paxson, G Almes, J Mahdavi, M Mathis
8941998
Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic
V Paxson
ACM SIGCOMM Computer Communication Review 27 (5), 5-18, 1997
8531997
@ spam: the underground on 140 characters or less
C Grier, K Thomas, V Paxson, M Zhang
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8192010
A taxonomy of computer worms
N Weaver, V Paxson, S Staniford, R Cunningham
Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003
7662003
An analysis of using reflectors for distributed denial-of-service attacks
V Paxson
ACM SIGCOMM Computer Communication Review 31 (3), 38-47, 2001
7032001
Network Intrusion Detection: Evasion, Traffic Normalization, and {End-to-End} Protocol Semantics
M Handley, V Paxson, C Kreibich
10th USENIX Security Symposium (USENIX Security 01), 2001
7002001
What’s new about cloud computing security
Y Chen, V Paxson, RH Katz
University of California, Berkeley Report No. UCB/EECS-2010-5 January 20 …, 2010
6902010
Design and evaluation of a real-time url spam filtering service
K Thomas, C Grier, J Ma, V Paxson, D Song
2011 IEEE symposium on security and privacy, 447-462, 2011
6682011
Detecting stepping stones.
Y Zhang, V Paxson
USENIX Security Symposium 171, 184, 2000
6502000
Suspended accounts in retrospect: an analysis of twitter spam
K Thomas, C Grier, D Song, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
6212011
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013
619*2013
On dominant characteristics of residential broadband internet traffic
G Maier, A Feldmann, V Paxson, M Allman
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 90-102, 2009
5962009
An inquiry into the nature and causes of the wealth of internet miscreants.
J Franklin, A Perrig, V Paxson, S Savage
Ccs 7, 375-388, 2007
5932007
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5922008
On estimating end-to-end network path properties
M Allman, V Paxson
ACM SIGCOMM Computer Communication Review 29 (4), 263-274, 1999
5791999
Self-similarity and heavy tails: Structural modeling of network traffic
W Willinger, V Paxson, MS Taqqu
A practical guide to heavy tails: statistical techniques and applications 23 …, 1998
5761998
On the characteristics and origins of internet flow rates
Y Zhang, L Breslau, V Paxson, S Shenker
Proceedings of the 2002 conference on Applications, technologies …, 2002
5622002
Why we don't know how to simulate the Internet
V Paxson, S Floyd
Proceedings of the 29th conference on Winter simulation, 1037-1044, 1997
5571997
Characteristics of internet background radiation
R Pang, V Yegneswaran, P Barford, V Paxson, L Peterson
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 27-40, 2004
5332004
Where mathematics meets the Internet
W Willinger, V Paxson
Notices of the AMS 45 (8), 961-970, 1998
5211998
Netalyzr: Illuminating the edge network
C Kreibich, N Weaver, B Nechaev, V Paxson
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010
4712010
The system can't perform the operation now. Try again later.
Articles 1–40