Name
Affiliation
Papers
ROBERT BEVERLY
Naval Postgraduate School
47
Collaborators
Citations 
PageRank 
64
361
32.92
Referers 
Referees 
References 
863
801
462
Search Limit
100863
Title
Citations
PageRank
Year
Third time's not a charm: exploiting SNMPv3 for router fingerprinting00.342021
Follow the scent: defeating IPv6 prefix rotation privacy00.342021
AS-level BGP community usage classification10.372021
Keep your Communities Clean: Exploring the Routing Message Impact of BGP Communities00.342020
Discovering the IPv6 Network Periphery.00.342020
Reading In-Between the Lines: An Analysis of Dissenter00.342020
Customer Management DNS Resource Records.00.342019
EUI-64 Considered Harmful.00.342019
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet30.432019
Sundials in the Shade - An Internet-Wide Perspective on ICMP Timestamps.00.342019
An Internet Heartbeat.00.342019
In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery.10.372018
BGP Communities: Even more Worms in the Routing Can.40.452018
The Impact of Router Outages on the AS-level Internet20.362017
Principles for Measurability in Protocol Design.40.462017
SDN as Active Measurement Infrastructure.00.342017
Empirical Study of Router IPv6 Interface Address Distributions.10.362016
Decomposition of MAC address structure for granular device inference.80.702016
Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery.30.392016
Resilience of Deployed TCP to Blind Attacks40.412015
Server Siblings: Identifying Shared Ipv4/Ipv6 Infrastructure Via Active Fingerprinting90.562015
Measuring And Characterizing Ipv6 Router Availability70.452015
Experience in using MTurk for Network Measurement20.402015
Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping40.462014
A middlebox-cooperative TCP for a non end-to-end internet151.052014
Speedtrap: internet-scale IPv6 alias resolution60.482013
Findings and implications from data mining the IMC review process10.362013
IPv6 alias resolution via induced fragmentation60.482013
Internet nameserver IPv4 and IPv6 address relationships40.572013
Auto-learning of SMTP TCP transport-layer features for spam and abusive message detection60.622011
Measuring the state of ECN readiness in servers, clients,and routers261.182011
Forensic carving of network packets and associated data structures130.942011
Building And Evaluating A K-Resilient Mobile Distributed File System Resistant To Device Compromise90.612011
A position paper on data sovereignty: the importance of geolocating data in the cloud351.392011
Challenges In Monitoring Cyberarms Compliance00.342011
Primitives for active internet topology mapping: toward high-frequency characterization180.812010
The 2nd workshop on active internet measurements (AIMS-2) report10.362010
The workshop on active internet measurements (AIMS) report60.692009
Understanding the efficacy of deployed internet source address validation filtering575.032009
An internet protocol address clustering algorithm40.462008
Exploiting Transport-Level Characteristics of Spam151.092008
The internet is not a big truck: toward quantifying network neutrality152.142007
SVM learning of IP address structure for latency prediction130.732006
The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet.00.342005
The state of the email address70.622004
A Robust Classifier for Passive TCP/IP Fingerprinting492.712004
RTG: A Scalable SNMP Statistics Architecture for Service Providers20.412002