Inferring internet denial-of-service activity D Moore, C Shannon, DJ Brown, GM Voelker, S Savage ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006 | 2193 | 2006 |
A fistful of bitcoins: characterizing payments among men with no names S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ... Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013 | 1732 | 2013 |
On the placement of web server replicas L Qiu, VN Padmanabhan, GM Voelker Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 1185 | 2001 |
Beyond blacklists: learning to detect malicious web sites from suspicious URLs J Ma, LK Saul, S Savage, GM Voelker Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 1118 | 2009 |
Internet quarantine: Requirements for containing self-propagating code D Moore, C Shannon, GM Voelker, S Savage IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 1067 | 2003 |
On the scale and performance of cooperative web proxy caching A Wolman, M Voelker, N Sharma, N Cardwell, A Karlin, HM Levy Proceedings of the seventeenth ACM symposium on Operating systems principles …, 1999 | 911 | 1999 |
Characterizing user behavior and network performance in a public wireless LAN A Balachandran, GM Voelker, P Bahl, PV Rangan Proceedings of the 2002 ACM SIGMETRICS international conference on …, 2002 | 849 | 2002 |
Understanding availability R Bhagwan, S Savage, GM Voelker Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley …, 2003 | 789 | 2003 |
Total Recall: System Support for Automated Availability Management. R Bhagwan, K Tati, Y Cheng, S Savage, GM Voelker Nsdi 4, 25-25, 2004 | 745 | 2004 |
Identifying suspicious URLs: an application of large-scale online learning J Ma, LK Saul, S Savage, GM Voelker Proceedings of the 26th annual international conference on machine learning …, 2009 | 743 | 2009 |
Spamalytics: An empirical analysis of spam marketing conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 585 | 2008 |
Difference engine: Harnessing memory redundancy in virtual machines D Gupta, S Lee, M Vrable, S Savage, AC Snoeren, G Varghese, ... Communications of the ACM 53 (10), 85-93, 2010 | 572 | 2010 |
End-to-end differentiation of congestion and wireless losses S Cen, PC Cosman, GM Voelker IEEE/ACM Transactions on networking 11 (5), 703-717, 2003 | 555 | 2003 |
Sora: high-performance software radio using general-purpose multi-core processors K Tan, H Liu, J Zhang, Y Zhang, J Fang, GM Voelker Communications of the ACM 54 (1), 99-107, 2011 | 534 | 2011 |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ... Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 524 | 2005 |
Detour: Informed Internet routing and transport S Savage, T Anderson, A Aggarwal, D Becker, N Cardwell, A Collins, ... Ieee Micro 19 (1), 50-59, 1999 | 521 | 1999 |
Access and mobility of wireless PDA users M McNett, GM Voelker ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 40-55, 2005 | 465 | 2005 |
Measurement and analysis of a streaming media workload M Chesire, A Wolman, GM Voelker, HM Levy 3rd USENIX Symposium on Internet Technologies and Systems (USITS 01), 2001 | 454 | 2001 |
Jigsaw: Solving the puzzle of enterprise 802.11 analysis YC Cheng, J Bellardo, P Benkö, AC Snoeren, GM Voelker, S Savage ACM SIGCOMM Computer Communication Review 36 (4), 39-50, 2006 | 433 | 2006 |
An analysis of underground forums M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 388 | 2011 |