Third time's not a charm: exploiting SNMPv3 for router fingerprinting | 0 | 0.34 | 2021 |
Follow the scent: defeating IPv6 prefix rotation privacy | 0 | 0.34 | 2021 |
AS-level BGP community usage classification | 1 | 0.37 | 2021 |
Keep your Communities Clean: Exploring the Routing Message Impact of BGP Communities | 0 | 0.34 | 2020 |
Discovering the IPv6 Network Periphery. | 0 | 0.34 | 2020 |
Reading In-Between the Lines: An Analysis of Dissenter | 0 | 0.34 | 2020 |
Customer Management DNS Resource Records. | 0 | 0.34 | 2019 |
EUI-64 Considered Harmful. | 0 | 0.34 | 2019 |
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet | 3 | 0.43 | 2019 |
Sundials in the Shade - An Internet-Wide Perspective on ICMP Timestamps. | 0 | 0.34 | 2019 |
An Internet Heartbeat. | 0 | 0.34 | 2019 |
In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery. | 1 | 0.37 | 2018 |
BGP Communities: Even more Worms in the Routing Can. | 4 | 0.45 | 2018 |
The Impact of Router Outages on the AS-level Internet | 2 | 0.36 | 2017 |
Principles for Measurability in Protocol Design. | 4 | 0.46 | 2017 |
SDN as Active Measurement Infrastructure. | 0 | 0.34 | 2017 |
Empirical Study of Router IPv6 Interface Address Distributions. | 1 | 0.36 | 2016 |
Decomposition of MAC address structure for granular device inference. | 8 | 0.70 | 2016 |
Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery. | 3 | 0.39 | 2016 |
Resilience of Deployed TCP to Blind Attacks | 4 | 0.41 | 2015 |
Server Siblings: Identifying Shared Ipv4/Ipv6 Infrastructure Via Active Fingerprinting | 9 | 0.56 | 2015 |
Measuring And Characterizing Ipv6 Router Availability | 7 | 0.45 | 2015 |
Experience in using MTurk for Network Measurement | 2 | 0.40 | 2015 |
Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping | 4 | 0.46 | 2014 |
A middlebox-cooperative TCP for a non end-to-end internet | 15 | 1.05 | 2014 |
Speedtrap: internet-scale IPv6 alias resolution | 6 | 0.48 | 2013 |
Findings and implications from data mining the IMC review process | 1 | 0.36 | 2013 |
IPv6 alias resolution via induced fragmentation | 6 | 0.48 | 2013 |
Internet nameserver IPv4 and IPv6 address relationships | 4 | 0.57 | 2013 |
Auto-learning of SMTP TCP transport-layer features for spam and abusive message detection | 6 | 0.62 | 2011 |
Measuring the state of ECN readiness in servers, clients,and routers | 26 | 1.18 | 2011 |
Forensic carving of network packets and associated data structures | 13 | 0.94 | 2011 |
Building And Evaluating A K-Resilient Mobile Distributed File System Resistant To Device Compromise | 9 | 0.61 | 2011 |
A position paper on data sovereignty: the importance of geolocating data in the cloud | 35 | 1.39 | 2011 |
Challenges In Monitoring Cyberarms Compliance | 0 | 0.34 | 2011 |
Primitives for active internet topology mapping: toward high-frequency characterization | 18 | 0.81 | 2010 |
The 2nd workshop on active internet measurements (AIMS-2) report | 1 | 0.36 | 2010 |
The workshop on active internet measurements (AIMS) report | 6 | 0.69 | 2009 |
Understanding the efficacy of deployed internet source address validation filtering | 57 | 5.03 | 2009 |
An internet protocol address clustering algorithm | 4 | 0.46 | 2008 |
Exploiting Transport-Level Characteristics of Spam | 15 | 1.09 | 2008 |
The internet is not a big truck: toward quantifying network neutrality | 15 | 2.14 | 2007 |
SVM learning of IP address structure for latency prediction | 13 | 0.73 | 2006 |
The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet. | 0 | 0.34 | 2005 |
The state of the email address | 7 | 0.62 | 2004 |
A Robust Classifier for Passive TCP/IP Fingerprinting | 49 | 2.71 | 2004 |
RTG: A Scalable SNMP Statistics Architecture for Service Providers | 2 | 0.41 | 2002 |