Vern Paxson
Orcid: 0009-0005-2673-543XAffiliations:
- University of California, Berkeley, USA
According to our database1,
Vern Paxson
authored at least 196 papers
between 1993 and 2023.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2006, "For contributions to Internet measurement and intrusion detection.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on icir.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
2018
IEEE Secur. Priv., 2018
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Passive and Active Measurement, 11th International Conference, 2010
Proceedings of the 2010 Internet Network Management Workshop / Workshop on Research on Enterprise Networking, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
An architecture for exploiting multi-core processors to parallelize network intrusion prevention.
Concurr. Comput. Pract. Exp., 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
J. Comput. Virol., 2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.
Proceedings of the Detection of Intrusions and Malware, 2008
2007
Proceedings of the Malware Detection, 2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007
Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007
Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays, 2007
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
RFC, March, 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event.
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the 5th Internet Measurement Conference, 2005
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event.
Proceedings of the 5th Internet Measurement Conference, 2005
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
A high-level programming environment for packet trace anonymization and transformation.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 11th USENIX Security Symposium, 2002
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
2001
Comput. Commun. Rev., 2001
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
2000
RFC, March, 2000
The use of end-to-end multicast measurements for characterizing internal network behavior.
IEEE Commun. Mag., 2000
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
1998
RFC, June, 1998
Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1998
1997
Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic.
Comput. Commun. Rev., 1997
Proceedings of the 29th conference on Winter simulation, 1997
Proceedings of the ACM SIGCOMM 1997 Conference on Applications, 1997
1995
Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1995
1994
IEEE/ACM Trans. Netw., 1994
1993
Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems.
Proceedings of the Usenix Winter 1993 Technical Conference, 1993