Hash-based IP traceback AC Snoeren, C Partridge, LA Sanchez, CE Jones, F Tchakountio, ST Kent, ... ACM SIGCOMM Computer Communication Review 31 (4), 3-14, 2001 | 1242 | 2001 |
Single-packet IP traceback AC Snoeren, C Partridge, LA Sanchez, CE Jones, F Tchakountio, ... IEEE/ACM Transactions on networking 10 (6), 721-734, 2002 | 696 | 2002 |
Usilng machine learning technliques to identify botnet traffic C Livadas, R Walsh, D Lapsley, WT Strayer Proceedings. 2006 31st IEEE conference on local computer networks, 967-974, 2006 | 595 | 2006 |
XTP: The Xpress transfer protocol WT Strayer, BJ Dempsey, AC Weaver Addison Wesley Longman Publishing Co., Inc., 1992 | 364 | 1992 |
Smart packets for active networks B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge 1999 IEEE Second Conference on Open Architectures and Network Programming …, 1999 | 342 | 1999 |
Botnet detection based on network behavior WT Strayer, D Lapsely, R Walsh, C Livadas Botnet Detection: Countering the Largest Security Threat, 1-24, 2008 | 338 | 2008 |
Detecting botnets with tight command and control WT Strayer, R Walsh, C Livadas, D Lapsley Proceedings. 2006 31st IEEE Conference on Local Computer Networks, 195-202, 2006 | 295 | 2006 |
Smart packets: applying active networks to network management B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge ACM Transactions on Computer Systems (TOCS) 18 (1), 67-88, 2000 | 188 | 2000 |
Decoy routing: Toward unblockable internet communication J Karlin, D Ellard, AW Jackson, CE Jones, G Lauer, DP Mankins, ... USENIX workshop on free and open communications on the Internet (FOCI 11), 2011 | 171 | 2011 |
Commentaries on" Active networking and end-to-end arguments" TM Chen, AW Jackson IEEE Network 12 (3), 66-71, 1998 | 141 | 1998 |
Virtual private networks: technologies and solutions R Yuan, WT Strayer Addison-Wesley Longman Publishing Co., Inc., 2001 | 123 | 2001 |
Using signal processing to analyze wireless data traffic C Partridge, D Cousins, AW Jackson, R Krishnan, T Saxena, WT Strayer Proceedings of the 1st ACM Workshop on Wireless Security, 67-76, 2002 | 106 | 2002 |
Method and system for integrated computer networking attack attribution WT Strayer, CE Jones, IM Castineyra, RR Hain US Patent 7,814,546, 2010 | 91 | 2010 |
Portable run-time support for dynamic object-oriented parallel processing AS Grimshaw, JB Weissman, WT Strayer ACM Transactions on Computer Systems (TOCS) 14 (2), 139-170, 1996 | 91 | 1996 |
Multi-tiered scalable network monitoring WT Strayer, W Milliken, RJ Watro US Patent 8,321,938, 2012 | 85 | 2012 |
Detecting botnets using command and control traffic B AsSadhan, JMF Moura, D Lapsley, C Jones, WT Strayer 2009 Eighth IEEE International Symposium on Network Computing and …, 2009 | 85 | 2009 |
Dynamic, object-oriented parallel processing AS Grimshaw, WT Strayer, P Narayan IEEE Parallel & Distributed Technology: Systems & Applications 1 (2), 33-47, 1993 | 80 | 1993 |
Hardware support for a hash-based IP traceback LA Sanchez, WC Milliken, AC Snoeren, F Tchakountio, CE Jones, ... Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 75 | 2001 |
Method and apparatus for tracing packets L Sanchez, WT Strayer, C Partridge US Patent 6,981,158, 2005 | 60 | 2005 |
Spie-ipv6: Single ipv6 packet traceback WT Strayer, CE Jones, F Tchakountio, RR Hain 29th Annual IEEE International Conference on Local Computer Networks, 118-125, 2004 | 57 | 2004 |