Information flow estimation: A study of news on Twitter | 0 | 0.34 | 2022 |
Likelihood-Based Inference for Modelling Packet Transit From Thinned Flow Summaries | 0 | 0.34 | 2022 |
Verifiable Policy-Defined Networking Using Metagraphs | 0 | 0.34 | 2022 |
Generating Name-Like Vectors for Testing Large-Scale Entity Resolution | 0 | 0.34 | 2021 |
Popularity And Centrality In Spotify Networks: Critical Transitions In Eigenvector Centrality | 0 | 0.34 | 2021 |
A Review Of Shannon And Differential Entropy Rate Estimation | 0 | 0.34 | 2021 |
Counting Candy Crush Configurations | 0 | 0.34 | 2021 |
Landmarks-Based Blocking Method For Large-Scale Entity Resolution | 0 | 0.34 | 2020 |
The one comparing narrative social network extraction techniques | 0 | 0.34 | 2020 |
BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping | 0 | 0.34 | 2020 |
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities | 0 | 0.34 | 2020 |
ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report). | 0 | 0.34 | 2019 |
Generating connected random graphs | 0 | 0.34 | 2019 |
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles | 4 | 0.40 | 2019 |
How The Avengers Assemble: Ecological Modelling Of Effective Cast Sizes For Movies | 0 | 0.34 | 2019 |
Network structure inhibits information cascades in heavy-tailed social networks. | 0 | 0.34 | 2018 |
Super-blockers and the Effect of Network Structure on Information Cascades. | 0 | 0.34 | 2018 |
Rasch Analysis of HTTPS Reachability. | 0 | 0.34 | 2018 |
Hierarchical Traffic Matrices - Axiomatic Foundations to Practical Traffic Matrix Synthesis. | 0 | 0.34 | 2018 |
Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles. | 10 | 0.67 | 2018 |
A BasisEvolution framework for network traffic anomaly detection. | 1 | 0.37 | 2018 |
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay | 2 | 0.37 | 2018 |
The one comparing narrative social network extraction techniques. | 1 | 0.35 | 2018 |
Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report). | 0 | 0.34 | 2018 |
Rigorous statistical analysis of HTTPS reachability. | 0 | 0.34 | 2017 |
Controlled Synthesis of Traffic Matrices. | 0 | 0.34 | 2017 |
Malachite: Firewall policy comparison | 8 | 0.73 | 2016 |
The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report). | 0 | 0.34 | 2016 |
Verifiable Policy-defined Networking for Security Management. | 2 | 0.48 | 2016 |
The Mathematical Foundations for Mapping Policies to Network Devices. | 1 | 0.36 | 2016 |
Case Studies of SCADA Firewall Configurations and the Implications for Best Practices. | 1 | 0.38 | 2016 |
Towards Standardising Firewall Reporting. | 2 | 0.40 | 2015 |
Fast Generation of Spatially Embedded Random Networks | 1 | 0.36 | 2015 |
Unravelling Graph-Exchange File Formats. | 2 | 0.39 | 2015 |
Spatiotemporal Traffic Matrix Synthesis | 9 | 0.54 | 2015 |
Lossy Compression of Dynamic, Weighted Graphs | 1 | 0.34 | 2015 |
All networks look the same to me: Testing for homogeneity in networks | 0 | 0.34 | 2015 |
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases. | 3 | 0.39 | 2015 |
Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy | 4 | 0.54 | 2015 |
COLD: PoP-level Network Topology Synthesis. | 1 | 0.35 | 2014 |
Network-design sensitivity analysis | 2 | 0.46 | 2014 |
Maximum entropy traffic matrix synthesis | 1 | 0.35 | 2014 |
Hidden Markov model identifiability via tensors | 1 | 0.38 | 2013 |
Rigorous statistical analysis of internet loss measurements | 8 | 0.53 | 2013 |
An automated system for emulated network experimentation | 4 | 0.53 | 2013 |
STRIP: Privacy-preserving vector-based routing | 5 | 0.44 | 2013 |
I can see for miles: Re-visualizing the internet. | 4 | 0.42 | 2012 |
Multi-Observer Privacy-Preserving Hidden Markov Models | 3 | 0.43 | 2012 |
Improving Hidden Markov Model Inferences With Private Data From Multiple Observers. | 2 | 0.47 | 2012 |
AutoNetkit: simplifying large scale, open-source network experimentation | 4 | 0.55 | 2012 |