How to Own the Internet in Your Spare Time. S Staniford, V Paxson, N Weaver USENIX security symposium 2, 14-15, 2002 | 1677 | 2002 |
Inside the slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver IEEE Security & Privacy 1 (4), 33-39, 2003 | 1357 | 2003 |
A taxonomy of computer worms N Weaver, V Paxson, S Staniford, R Cunningham Proceedings of the 2003 ACM workshop on Rapid malcode, 11-18, 2003 | 689 | 2003 |
Netalyzr: illuminating the edge network C Kreibich, N Weaver, B Nechaev, V Paxson Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010 | 410 | 2010 |
Very Fast Containment of Scanning Worms. N Weaver, S Staniford, V Paxson USENIX Security Symposium 2, 16-85, 2004 | 370 | 2004 |
The spread of the sapphire/slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE, 2003 | 315 | 2003 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 309 | 2011 |
Method and system for reducing the rate of infection of a communications network by a software worm S Staniford, C Kahn, N Weaver, C Coit, R Jonkman US Patent App. 10/313,623, 2004 | 294 | 2004 |
The top speed of flash worms S Staniford, D Moore, V Paxson, N Weaver Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004 | 276 | 2004 |
Protocol-Independent Adaptive Replay of Application Dialog. W Cui, V Paxson, N Weaver, RH Katz NDSS, 2006 | 239 | 2006 |
Show Me the Money: Characterizing Spam-advertised Revenue. C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... USENIX Security Symposium 35, 2011 | 148 | 2011 |
The SFRA: a corner-turn FPGA architecture N Weaver, J Hauser, J Wawrzynek Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field …, 2004 | 148 | 2004 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012 | 143 | 2012 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012 | 143 | 2012 |
Exploiting underlying structure for detailed reconstruction of an internet-scale event A Kumar, V Paxson, N Weaver Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 33-33, 2005 | 140 | 2005 |
Warhol worms: The potential for very fast internet plagues N Weaver | 135 | 2001 |
Detecting In-Flight Page Changes with Web Tripwires. C Reis, SD Gribble, T Kohno, NC Weaver NSDI 8, 31-44, 2008 | 127 | 2008 |
Botnet Judo: Fighting Spam with Itself. A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... NDSS, 2010 | 116 | 2010 |
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer R Verdult, FD Garcia, B Ege Supplement to the Proceedings of 22nd {USENIX} Security Symposium …, 2015 | 106 | 2015 |
Post-placement C-slow retiming for the Xilinx Virtex FPGA N Weaver, Y Markovskiy, Y Patel, J Wawrzynek Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field …, 2003 | 99 | 2003 |