Publications
(2009). RFC 5681: TCP Congestion Control.
(2009). Spamalytics: An Empirical Analysis of Spam Marketing Conversion.
52(9), 99-107.
(2008). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.
Journal on Computer Virology. 4(1), 197-210.
(2008). Efficient and Robust TCP Stream Normalization.
96-110.
(2008). Enriching Network Security Analysis with Time Travel.
183-194.
(2008). A Reactive Measurement Framework.
92-101.
(2008). On the Spam Campaign Trail.
(2007). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.
175-192.
(2007). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
1-7.
(2007). A Brief History of Scanning.
77-82.
(2007). Issues and Etiquette Concerning Use of Shared Measurement Data.
135-140.
(2007). The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
(2007). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007). Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention.
Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). Very Fast Containment of Scanning Worms, Revisited.
113-145.

]