Inferring internet denial-of-service activity D Moore, C Shannon, DJ Brown, GM Voelker, S Savage ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006 | 2023 | 2006 |
On the placement of web server replicas L Qiu, VN Padmanabhan, GM Voelker Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 1127 | 2001 |
A fistful of bitcoins: characterizing payments among men with no names S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ... Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013 | 1060 | 2013 |
Internet quarantine: Requirements for containing self-propagating code D Moore, C Shannon, GM Voelker, S Savage IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 974 | 2003 |
Beyond blacklists: learning to detect malicious web sites from suspicious URLs J Ma, LK Saul, S Savage, GM Voelker Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 888 | 2009 |
On the scale and performance of cooperative web proxy caching A Wolman, M Voelker, N Sharma, N Cardwell, A Karlin, HM Levy Proceedings of the seventeenth ACM symposium on Operating systems principles …, 1999 | 877 | 1999 |
Characterizing user behavior and network performance in a public wireless LAN A Balachandran, GM Voelker, P Bahl, PV Rangan Proceedings of the 2002 ACM SIGMETRICS international conference on …, 2002 | 825 | 2002 |
Understanding availability R Bhagwan, S Savage, GM Voelker International Workshop on Peer-to-Peer Systems, 256-267, 2003 | 764 | 2003 |
Human-computer interaction: the human and computer as a team in emergency management information systems L Carver, M Turoff Communications of the ACM 50 (3), 33-38, 2007 | 722* | 2007 |
Total Recall: System Support for Automated Availability Management. R Bhagwan, K Tati, Y Cheng, S Savage, GM Voelker Nsdi 4, 25-25, 2004 | 681 | 2004 |
Identifying suspicious URLs: an application of large-scale online learning J Ma, LK Saul, S Savage, GM Voelker Proceedings of the 26th annual international conference on machine learning …, 2009 | 599 | 2009 |
Spamalytics: An empirical analysis of spam marketing conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 536 | 2008 |
End-to-end differentiation of congestion and wireless losses S Cen, PC Cosman, GM Voelker IEEE/ACM Transactions on networking 11 (5), 703-717, 2003 | 530 | 2003 |
Difference engine: Harnessing memory redundancy in virtual machines D Gupta, S Lee, M Vrable, S Savage, AC Snoeren, G Varghese, ... Communications of the ACM 53 (10), 85-93, 2010 | 523 | 2010 |
Sora: high-performance software radio using general-purpose multi-core processors K Tan, H Liu, J Zhang, Y Zhang, J Fang, GM Voelker Communications of the ACM 54 (1), 99-107, 2011 | 497 | 2011 |
Detour: Informed Internet routing and transport S Savage, T Anderson, A Aggarwal, D Becker, N Cardwell, A Collins, ... Ieee Micro 19 (1), 50-59, 1999 | 489 | 1999 |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ... Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 478 | 2005 |
Access and mobility of wireless PDA users M McNett, GM Voelker ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 40-55, 2005 | 441 | 2005 |
Measurement and analysis of a streaming media workload. M Chesire, A Wolman, GM Voelker, HM Levy USITS 1, 1-1, 2001 | 431 | 2001 |
Jigsaw: Solving the puzzle of enterprise 802.11 analysis YC Cheng, J Bellardo, P Benkö, AC Snoeren, GM Voelker, S Savage ACM SIGCOMM Computer Communication Review 36 (4), 39-50, 2006 | 402 | 2006 |