How to Own the Internet in Your Spare Time. S Staniford, V Paxson, N Weaver USENIX security symposium 2, 14-15, 2002 | 1702 | 2002 |
Inside the slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver IEEE Security & Privacy 1 (4), 33-39, 2003 | 1366 | 2003 |
A taxonomy of computer worms N Weaver, V Paxson, S Staniford, R Cunningham Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003 | 699 | 2003 |
Netalyzr: Illuminating the edge network C Kreibich, N Weaver, B Nechaev, V Paxson Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010 | 410 | 2010 |
Very Fast Containment of Scanning Worms. N Weaver, S Staniford, V Paxson USENIX Security Symposium 2, 16-85, 2004 | 372 | 2004 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 319 | 2011 |
The spread of the sapphire/slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE, 2003 | 316 | 2003 |
Method and system for reducing the rate of infection of a communications network by a software worm S Staniford, C Kahn, N Weaver, C Coit, R Jonkman US Patent App. 10/313,623, 2004 | 299 | 2004 |
The top speed of flash worms S Staniford, D Moore, V Paxson, N Weaver Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004 | 283 | 2004 |
Protocol-Independent Adaptive Replay of Application Dialog. W Cui, V Paxson, N Weaver, RH Katz NDSS, 2006 | 246 | 2006 |
Show Me the Money: Characterizing Spam-advertised Revenue. C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... USENIX Security Symposium 35, 2011 | 153 | 2011 |
The SFRA: a corner-turn FPGA architecture N Weaver, J Hauser, J Wawrzynek Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field …, 2004 | 148 | 2004 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... 21st {USENIX} Security Symposium ({USENIX} Security 12), 1-16, 2012 | 145 | 2012 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... 21st {USENIX} Security Symposium ({USENIX} Security 12), 1-16, 2012 | 145 | 2012 |
Exploiting underlying structure for detailed reconstruction of an internet-scale event A Kumar, V Paxson, N Weaver Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 33-33, 2005 | 143 | 2005 |
Warhol worms: The potential for very fast internet plagues N Weaver | 138 | 2001 |
Detecting In-Flight Page Changes with Web Tripwires. C Reis, SD Gribble, T Kohno, NC Weaver NSDI 8, 31-44, 2008 | 128 | 2008 |
Botnet Judo: Fighting Spam with Itself. A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... NDSS, 2010 | 117 | 2010 |
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer R Verdult, FD Garcia, B Ege Supplement to the Proceedings of 22nd {USENIX} Security Symposium …, 2015 | 110 | 2015 |
Post-placement C-slow retiming for the Xilinx Virtex FPGA N Weaver, Y Markovskiy, Y Patel, J Wawrzynek Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field …, 2003 | 103 | 2003 |