default search action
Vern Paxson
Person information
- affiliation: University of California, Berkeley, USA
- award (2011): SIGCOMM Award
- award (2007): Grace Murray Hopper Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c155]Julien Piet, Dubem Nwoji, Vern Paxson:
GGFAST: Automating Generation of Flexible Network Traffic Classifiers. SIGCOMM 2023: 850-866 - [c154]Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner:
Network Detection of Interactive SSH Impostors Using Deep Learning. USENIX Security Symposium 2023: 4283-4300 - 2021
- [c153]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [i24]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - 2020
- [c152]Jianjun Chen, Vern Paxson, Jian Jiang:
Composition Kills: A Case Study of Email Sender Authentication. USENIX Security Symposium 2020: 2183-2199
2010 – 2019
- 2019
- [c151]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [i23]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [j36]Shehar Bano, Philipp Richter, Mobin Javed, Srikanth Sundaresan, Zakir Durumeric, Steven J. Murdoch, Richard Mortier, Vern Paxson:
Scanning the Internet for Liveness. Comput. Commun. Rev. 48(2): 2-9 (2018) - [j35]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Toward Continual Measurement of Global Network-Level Censorship. IEEE Secur. Priv. 16(1): 24-33 (2018) - [j34]Frank Li, Vern Paxson:
A Large-Scale Empirical Study of Security Patches. login Usenix Mag. 43(1) (2018) - [c150]Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson:
Characterizing the Nature and Dynamics of Tor Exit Blocking. ANRW 2018: 23 - [c149]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang:
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. USENIX Security Symposium 2018: 1079-1093 - [c148]Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson:
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. FOCI @ USENIX Security Symposium 2018 - [i22]Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson:
Exploring Server-side Blocking of Regions. CoRR abs/1805.11606 (2018) - [i21]Sadia Afroz, Mobin Javed, Vern Paxson, Shoaib Asif Qazi, Shaarif Sajid, Michael Carl Tschantz:
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. CoRR abs/1806.00459 (2018) - 2017
- [j33]Matthew Sargent, John Kristoff, Vern Paxson, Mark Allman:
On the Potential Abuse of IGMP. Comput. Commun. Rev. 47(1): 27-35 (2017) - [j32]William R. Marczak, Vern Paxson:
Social Engineering Attacks on Government Opponents: Target Perspectives. Proc. Priv. Enhancing Technol. 2017(2): 172-185 (2017) - [j31]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global-Scale Measurement of DNS Manipulation. login Usenix Mag. 42(4) (2017) - [c147]Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein:
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials. CCS 2017: 1421-1434 - [c146]Frank Li, Vern Paxson:
A Large-Scale Empirical Study of Security Patches. CCS 2017: 2201-2215 - [c145]Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. EMNLP 2017: 2598-2607 - [c144]Austin Murdock, Frank Li, Paul Bramsen, Zakir Durumeric, Vern Paxson:
Target generation for internet-wide IPv6 scanning. Internet Measurement Conference 2017: 242-253 - [c143]Kirill Levchenko, Amogh Dhamdhere, Bradley Huffaker, kc claffy, Mark Allman, Vern Paxson:
Packetlab: a universal measurement endpoint interface. Internet Measurement Conference 2017: 254-260 - [c142]Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael D. Bailey, J. Alex Halderman, Vern Paxson:
The Security Impact of HTTPS Interception. NDSS 2017 - [c141]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Augur: Internet-Wide Detection of Connectivity Disruptions. IEEE Symposium on Security and Privacy 2017: 427-443 - [c140]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global Measurement of DNS Manipulation. USENIX Security Symposium 2017: 307-323 - [c139]Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson:
Characterizing the Nature and Dynamics of Tor Exit Blocking. USENIX Security Symposium 2017: 325-341 - [c138]Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner:
Detecting Credential Spearphishing in Enterprise Settings. USENIX Security Symposium 2017: 469-485 - [c137]Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, Vern Paxson:
Tools for Automated Analysis of Cybercriminal Markets. WWW 2017: 657-666 - [i20]Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. CoRR abs/1708.09609 (2017) - 2016
- [j30]Sakshi Jain, Mobin Javed, Vern Paxson:
Towards Mining Latent Client Identifiers from Network Traffic. Proc. Priv. Enhancing Technol. 2016(2): 100-114 (2016) - [c136]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson:
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. CCS 2016: 1516-1527 - [c135]Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster:
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. CCS 2016: 1568-1579 - [c134]Srikanth Sundaresan, Damon McCoy, Sadia Afroz, Vern Paxson:
Profiling underground merchants based on network behavior. eCrime 2016: 62-70 - [c133]Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Internet Measurement Conference 2016: 215-229 - [c132]Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson:
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Internet Measurement Conference 2016: 349-364 - [c131]Jianjun Chen, Xiaofeng Zheng, Hai-Xin Duan, Jinjin Liang, Jian Jiang, Kang Li, Tao Wan, Vern Paxson:
Forwarding-Loop Attacks in Content Delivery Networks. NDSS 2016 - [c130]Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch:
Do You See What I See? Differential Treatment of Anonymous Users. NDSS 2016 - [c129]Matthias Vallentin, Vern Paxson, Robin Sommer:
VAST: A Unified Platform for Interactive Network Forensics. NSDI 2016: 345-362 - [c128]Ben Jones, Nick Feamster, Vern Paxson, Nicholas Weaver, Mark Allman:
Detecting DNS Root Manipulation. PAM 2016: 276-288 - [c127]Michael Carl Tschantz, Sadia Afroz, anonymous, Vern Paxson:
SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy 2016: 914-933 - [c126]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - [c125]Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson:
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. WWW 2016: 1009-1019 - [i19]Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Multi-perspective Analysis of Carrier-Grade NAT Deployment. CoRR abs/1605.05606 (2016) - 2015
- [j29]Philipp Richter, Mark Allman, Randy Bush, Vern Paxson:
A Primer on IPv4 Scarcity. Comput. Commun. Rev. 45(2): 21-31 (2015) - [j28]David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson:
Blocking-resistant communication through domain fronting. Proc. Priv. Enhancing Technol. 2015(2): 46-64 (2015) - [c124]Frank Li, Richard Shin, Vern Paxson:
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. CCSW 2015: 53-64 - [c123]Basheer Al-Duwairi, Ahmad T. Al-Hammouri, Monther Aldwairi, Vern Paxson:
GFlux: A google-based system for Fast Flux detection. CNS 2015: 755-756 - [c122]Mobin Javed, Cormac Herley, Marcus Peinado, Vern Paxson:
Measurement and Analysis of Traffic Exchange Services. Internet Measurement Conference 2015: 1-12 - [c121]Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson:
Examining How the Great Firewall Discovers Hidden Circumvention Servers. Internet Measurement Conference 2015: 445-458 - [c120]Vern Paxson:
Keynote Speaker. MALWARE 2015: 1 - [c119]Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Nicholas Weaver, Vern Paxson:
Beyond the Radio: Illuminating the Higher Layers of Mobile Networks. MobiSys 2015: 375-387 - [c118]Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nicholas Weaver:
Ethical Concerns for Censorship Measurement. NS Ethics@SIGCOMM 2015: 17-19 - [c117]Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Vern Paxson:
Header Enrichment or ISP Enrichment?: Emerging Privacy Threats in Mobile Networks. HotMiddlebox@SIGCOMM 2015: 25-30 - [c116]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - [c115]Ryan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson:
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks. IEEE Symposium on Security and Privacy 2015: 187-198 - [i18]Frank Li, Richard Shin, Vern Paxson:
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. CoRR abs/1507.08309 (2015) - [i17]Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, Vern Paxson:
Haystack: In Situ Mobile Traffic Analysis in User Space. CoRR abs/1510.01419 (2015) - 2014
- [c114]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c113]Kurt Thomas, Frank Li, Chris Grier, Vern Paxson:
Consequences of Connectivity: Characterizing Account Hijacking on Twitter. CCS 2014: 489-500 - [c112]Narseo Vallina-Rodriguez, Johanna Amann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Tangled Mass: The Android Root Certificate Stores. CoNEXT 2014: 141-148 - [c111]Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson:
A Look at the Consequences of Internet Censorship Through an ISP Lens. Internet Measurement Conference 2014: 271-284 - [c110]Robin Sommer, Matthias Vallentin, Lorenzo De Carli, Vern Paxson:
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis. Internet Measurement Conference 2014: 461-474 - [c109]Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. Internet Measurement Conference 2014: 475-488 - [c108]Nicholas Weaver, Christian Kreibich, Martin Dam, Vern Paxson:
Here Be Web Proxies. PAM 2014: 183-192 - [c107]Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch:
Native actors: how to scale network forensics. SIGCOMM 2014: 141-142 - [c106]William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson:
When Governments Hack Opponents: A Look at Actors and Technology. USENIX Security Symposium 2014: 511-525 - [c105]Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson:
Hulk: Eliciting Malicious Behavior in Browser Extensions. USENIX Security Symposium 2014: 641-654 - [e6]Jedidiah R. Crandall, Vern Paxson:
4th USENIX Workshop on Free and Open Communications on the Internet, FOCI '14, San Diego, CA, USA, August 18, 2014. USENIX Association 2014 [contents] - [i16]Michael Carl Tschantz, Sadia Afroz, Vern Paxson, J. Doug Tygar:
On Modeling the Costs of Censorship. CoRR abs/1409.3211 (2014) - [i15]Philipp Richter, Mark Allman, Randy Bush, Vern Paxson:
A Primer on IPv4 Scarcity. CoRR abs/1411.2649 (2014) - 2013
- [c104]Mobin Javed, Vern Paxson:
Detecting stealthy, distributed SSH brute-forcing. CCS 2013: 85-96 - [c103]Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, Scott Hollenbeck:
Understanding the domain registration behavior of spammers. Internet Measurement Conference 2013: 63-76 - [c102]Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson:
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion. FOCI 2013 - [c101]Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:
Practical Comprehensive Bounds on Surreptitious Communication over DNS. USENIX Security Symposium 2013: 17-32 - [c100]Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium 2013: 195-210 - [e5]Vern Paxson:
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013. USENIX Association 2013 [contents] - 2012
- [c99]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c98]Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, Vern Paxson:
Fathom: a browser-based network measurement platform. Internet Measurement Conference 2012: 73-86 - [c97]Kurt Thomas, Chris Grier, Vern Paxson:
Adapting Social Spam Infrastructure for Political Censorship. LEET 2012 - [c96]Tristan Halvorson, Janos Szurdi, Gregor Maier, Márk Félegyházi, Christian Kreibich, Nicholas Weaver, Kirill Levchenko, Vern Paxson:
The BIZ Top-Level Domain: Ten Years Later. PAM 2012: 221-230 - [c95]Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. IEEE Symposium on Security and Privacy 2012: 65-79 - [c94]Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker, Ion Stoica:
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. USENIX ATC 2012: 165-182 - 2011
- [j27]Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Trans. Inf. Forensics Secur. 6(1): 175-188 (2011) - [c93]Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin:
An Assessment of Overt Malicious Activity Manifest in Residential Networks. DIMVA 2011: 144-163 - [c92]Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson:
What's Clicking What? Techniques and Innovations of Today's Clickbots. DIMVA 2011: 164-183 - [c91]Kurt Thomas, Chris Grier, Dawn Song, Vern Paxson:
Suspended accounts in retrospect: an analysis of twitter spam. Internet Measurement Conference 2011: 243-258 - [c90]Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, Vern Paxson:
GQ: practical containment for measuring modern malware systems. Internet Measurement Conference 2011: 397-412 - [c89]Chao Michael Zhang, Vern Paxson:
Detecting and Analyzing Automated Activity on Twitter. PAM 2011: 102-111 - [c88]Christian Kreibich, Nicholas Weaver, Gregor Maier, Boris Nechaev, Vern Paxson:
Experiences from Netalyzr with engaging users in end-system measurement. W-MUST@SIGCOMM 2011: 25-30 - [c87]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c86]Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song:
Design and Evaluation of a Real-Time URL Spam Filtering Service. IEEE Symposium on Security and Privacy 2011: 447-462 - [c85]Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson:
Measuring Pay-per-Install: The Commoditization of Malware Distribution. USENIX Security Symposium 2011 - [c84]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c83]Nicholas Weaver, Christian Kreibich, Vern Paxson:
Redirecting DNS for Ads and Profit. FOCI 2011 - [i14]Vern Paxson, Mark Allman, Jerry Chu, Matt Sargent:
Computing TCP's Retransmission Timer. RFC 6298: 1-11 (2011) - 2010
- [c82]Chris Grier, Kurt Thomas, Vern Paxson, Chao Michael Zhang:
@spam: the underground on 140 characters or less. CCS 2010: 27-37 - [c81]Chitra Muthukrishnan, Vern Paxson, Mark Allman, Aditya Akella:
Using strongly typed networking to architect for tussle. HotNets 2010: 9 - [c80]Christian Kreibich, Nicholas Weaver, Boris Nechaev, Vern Paxson:
Netalyzr: illuminating the edge network. Internet Measurement Conference 2010: 246-259 - [c79]Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song:
Insights from the Inside: A View of Botnet Management from Infiltration. LEET 2010 - [c78]Márk Félegyházi, Christian Kreibich, Vern Paxson:
On the Potential of Proactive Domain Blacklisting. LEET 2010 - [c77]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [c76]Boris Nechaev, Mark Allman, Vern Paxson, Andrei V. Gurtov:
A Preliminary Analysis of TCP Performance in an Enterprise Network. INM/WREN 2010 - [c75]Tom Callahan, Mark Allman, Vern Paxson:
A Longitudinal View of HTTP Traffic. PAM 2010: 222-231 - [c74]Robin Sommer, Vern Paxson:
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy 2010: 305-316 - [p2]Paul Barford, Yan Chen, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran:
Employing Honeynets For Network Situational Awareness. Cyber Situational Awareness 2010: 71-102
2000 – 2009
- 2009
- [j26]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [j25]Vern Paxson, Nick McKeown, Jennifer Rexford:
Selecting the 2008 sigcomm test-of-time awardwinner(s). Comput. Commun. Rev. 39(2): 40-41 (2009) - [j24]Robin Sommer, Vern Paxson, Nicholas Weaver:
An architecture for exploiting multi-core processors to parallelize network intrusion prevention. Concurr. Comput. Pract. Exp. 21(10): 1255-1279 (2009) - [c73]Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Automating analysis of large-scale botnet probing events. AsiaCCS 2009: 11-22 - [c72]Prateek Mittal, Vern Paxson, Robin Sommer, Mark Winterrowd:
Securing Mediated Trace Access Using Black-box Permutation Analysis. HotNets 2009 - [c71]Gregor Maier, Anja Feldmann, Vern Paxson, Mark Allman:
On dominant characteristics of residential broadband internet traffic. Internet Measurement Conference 2009: 90-102 - [c70]Boris Nechaev, Vern Paxson, Mark Allman, Andrei V. Gurtov:
On calibrating enterprise switch measurements. Internet Measurement Conference 2009: 143-155 - [c69]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - [c68]Nicholas Weaver, Robin Sommer, Vern Paxson:
Detecting Forged TCP Reset Packets. NDSS 2009 - [i13]Mark Allman, Vern Paxson, Ethan Blanton:
TCP Congestion Control. RFC 5681: 1-18 (2009) - 2008
- [j23]Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson:
On the adaptive real-time detection of fast-propagating network worms. J. Comput. Virol. 4(3): 197-210 (2008) - [c67]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. CCS 2008: 3-14 - [c66]Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson:
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. DIMVA 2008: 267-278 - [c65]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
On the Spam Campaign Trail. LEET 2008 - [c64]Mark Allman, Vern Paxson:
A Reactive Measurement Framework. PAM 2008: 92-101 - [c63]Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Predicting the Resource Consumption of Network Intrusion Detection Systems. RAID 2008: 135-154 - [c62]Gregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider:
Enriching network security analysis with time travel. SIGCOMM 2008: 183-194 - [c61]Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Predicting the resource consumption of network intrusion detection systems. SIGMETRICS 2008: 437-438 - [c60]Mythili Vutukuru, Hari Balakrishnan, Vern Paxson:
Efficient and Robust TCP Stream Normalization. SP 2008: 96-110 - [c59]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
Principles for Developing Comprehensive Network Visibility. HotSec 2008 - 2007
- [c58]José M. González, Vern Paxson, Nicholas Weaver:
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. CCS 2007: 139-149 - [c57]Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage:
An inquiry into the nature and causes of the wealth of internet miscreants. CCS 2007: 375-388 - [c56]Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson:
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. DIMVA 2007: 175-192 - [c55]Nicholas Weaver, Vern Paxson, José M. González:
The shunt: an FPGA-based accelerator for network intrusion prevention. FPGA 2007: 199-206 - [c54]Mark Allman, Ken Christensen, Bruce Nordman, Vern Paxson:
Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems. HotNets 2007 - [c53]Mark Allman, Vern Paxson, Jeff Terrell:
A brief history of scanning. Internet Measurement Conference 2007: 77-82 - [c52]Mark Allman, Vern Paxson:
Issues and etiquette concerning use of shared measurement data. Internet Measurement Conference 2007: 135-140 - [c51]Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney:
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. RAID 2007: 107-126 - [c50]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
The Strengths of Weaker Identities: Opportunistic Personas. HotSec 2007 - [p1]Nicholas Weaver, Stuart Staniford, Vern Paxson:
Very Fast Containment of Scanning Worms, Revisited. Malware Detection 2007: 113-145 - [e4]Constantine Dovrolis, Vern Paxson, Stefan Savage:
6th ACM Workshop on Hot Topics in Networks - HotNets-VI, Atlanta, Georgia, USA, November 14-15, 2007. ACM SIGCOMM 2007 [contents] - 2006
- [j22]Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee:
The devil and packet trace anonymization. Comput. Commun. Rev. 36(1): 29-38 (2006) - [j21]Vern Paxson:
End-to-end routing behavior in the internet. Comput. Commun. Rev. 36(5): 41-56 (2006) - [j20]Nick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley:
Network loss tomography using striped unicast probes. IEEE/ACM Trans. Netw. 14(4): 697-710 (2006) - [j19]Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker:
Observed structure of addresses in IP traffic. IEEE/ACM Trans. Netw. 14(6): 1207-1218 (2006) - [c49]Mark Allman, Ethan Blanton, Vern Paxson, Scott Shenker:
Fighting Coordinated Attackers with Cross-Organizational Information Sharing. HotNets 2006 - [c48]Andrew Parker, Sasank Reddy, Thomas Schmid, Kevin K. Chang, Saurabh Ganeriwal, Mani B. Srivastava, Mark H. Hansen, Jeff Burke, Deborah Estrin, Mark Allman, Vern Paxson:
Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications. HotNets 2006 - [c47]Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal:
Semi-automated discovery of application session structure. Internet Measurement Conference 2006: 119-132 - [c46]Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson:
binpac: a yacc for writing application protocol parsers. Internet Measurement Conference 2006: 289-300 - [c45]Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz:
Protocol-Independent Adaptive Replay of Application Dialog. NDSS 2006 - [c44]José M. González, Vern Paxson:
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. RAID 2006: 272-289 - [c43]Nicholas Weaver, Vern Paxson, Robin Sommer:
Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic. SecureComm 2006: 1-2 - [c42]Vern Paxson, Krste Asanovic, Sarang Dharmapurikar, John W. Lockwood, Ruoming Pang, Robin Sommer, Nicholas Weaver:
Rethinking Hardware Support for Network Analysis and Intrusion Prevention. HotSec 2006 - [i12]Sally Floyd, Vern Paxson, Aaron Falk, Internet Architecture Board:
IAB Thoughts on the Role of the Internet Research Task Force (IRTF). RFC 4440: 1-13 (2006) - 2005
- [j18]Joseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall:
The Network Oracle. IEEE Data Eng. Bull. 28(1): 3-10 (2005) - [j17]Vern Paxson, Michael Waidner:
Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Secur. Comput. 2(2): 81 (2005) - [c41]Robin Sommer, Vern Paxson:
Exploiting Independent State For Network Intrusion Detection. ACSAC 2005: 59-71 - [c40]Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer:
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. DIMVA 2005: 206-221 - [c39]Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney:
A First Look at Modern Enterprise Traffic. Internet Measurement Conference 2005: 15-28 - [c38]Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer:
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Internet Measurement Conference 2005: 267-272 - [c37]Abhishek Kumar, Vern Paxson, Nicholas Weaver:
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. Internet Measurement Conference 2005: 351-364 - [c36]Sarang Dharmapurikar, Vern Paxson:
Robust TCP Stream Reassembly in the Presence of Adversaries. USENIX Security Symposium 2005 - [c35]Vern Paxson:
An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. WORM 2005: 51 - 2004
- [j16]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [c34]Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Operational experiences with high-volume network intrusion detection. CCS 2004: 2-11 - [c33]Nicholas Weaver, Dan Ellis, Stuart Staniford, Vern Paxson:
Worms vs. perimeters: the case for hard-LANs. Hot Interconnects 2004: 70-76 - [c32]Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson:
Characteristics of internet background radiation. Internet Measurement Conference 2004: 27-40 - [c31]Vern Paxson:
Strategies for sound internet measurement. Internet Measurement Conference 2004: 263-271 - [c30]Vern Paxson:
Measuring adversaries. SIGMETRICS 2004: 142 - [c29]Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
Fast Portscan Detection Using Sequential Hypothesis Testing. S&P 2004: 211-225 - [c28]Nicholas Weaver, Stuart Staniford, Vern Paxson:
Very Fast Containment of Scanning Worms. USENIX Security Symposium 2004: 29-44 - [c27]Stuart Staniford, David Moore, Vern Paxson, Nicholas Weaver:
The top speed of flash worms. WORM 2004: 33-42 - [c26]Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson:
Preliminary results using scale-down to explore worm dynamics. WORM 2004: 65-72 - [e3]Vern Paxson:
Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004. ACM Press 2004, ISBN 1-58113-970-5 [contents] - 2003
- [j15]David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver:
Inside the Slammer Worm. IEEE Secur. Priv. 1(4): 33-39 (2003) - [c25]Robin Sommer, Vern Paxson:
Enhancing byte-level network intrusion detection signatures with context. CCS 2003: 262-271 - [c24]Ruoming Pang, Vern Paxson:
A high-level programming environment for packet trace anonymization and transformation. SIGCOMM 2003: 339-351 - [c23]Umesh Shankar, Vern Paxson:
Active Mapping: Resisting NIDS Evasion without Altering Traffic. S&P 2003: 44-61 - [c22]Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham:
A taxonomy of computer worms. WORM 2003: 11-18 - 2002
- [j14]Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker:
Aggregate congestion control. Comput. Commun. Rev. 32(1): 69 (2002) - [j13]Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker:
Controlling high bandwidth aggregates in the network. Comput. Commun. Rev. 32(3): 62-73 (2002) - [c21]Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker:
Observed structure of addresses in IP traffic. Internet Measurement Workshop 2002: 253-266 - [c20]David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford:
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. RAID 2002: 17-35 - [c19]Yin Zhang, Lee Breslau, Vern Paxson, Scott Shenker:
On the characteristics and origins of internet flow rates. SIGCOMM 2002: 309-322 - [c18]Stuart Staniford, Vern Paxson, Nicholas Weaver:
How to Own the Internet in Your Spare Time. USENIX Security Symposium 2002: 149-167 - [e2]Matthew Mathis, Peter Steenkiste, Hari Balakrishnan, Vern Paxson:
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 19-23, 2002, Pittsburgh, PA, USA. ACM 2002, ISBN 1-58113-570-X [contents] - 2001
- [j12]Mark Allman, Vern Paxson:
On estimating end-to-end network path properties. Comput. Commun. Rev. 31(2-Supplement): 124-151 (2001) - [j11]Vern Paxson:
An analysis of using reflectors for distributed denial-of-service attacks. Comput. Commun. Rev. 31(3): 38-47 (2001) - [j10]Sally Floyd, Vern Paxson:
Difficulties in simulating the internet. IEEE/ACM Trans. Netw. 9(4): 392-403 (2001) - [c17]Nick G. Duffield, Francesco Lo Presti, Vern Paxson, Donald F. Towsley:
Inferring Link Loss Using Striped Unicast Probes. INFOCOM 2001: 915-923 - [c16]Mark Allman, Vern Paxson:
On estimating end-to-end network path properties. SIGCOMM-LA 2001: 124-151 - [c15]Mark Handley, Vern Paxson, Christian Kreibich:
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. USENIX Security Symposium 2001 - [e1]Vern Paxson:
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop, IMW 2001, San Francisco, California, USA, November 1-2, 2001. ACM 2001, ISBN 1-58113-435-5 [contents] - 2000
- [j9]Andrew K. Adams, Tian Bu, Timur Friedman, Joseph Horowitz, Don Towsley, Ramón Cáceres, Nick Duffield, Francesco Lo Presti, Sue B. Moon, Vern Paxson:
The use of end-to-end multicast measurements for characterizing internal network behavior. IEEE Commun. Mag. 38(5): 152-159 (2000) - [c14]Yin Zhang, Vern Paxson:
Detecting Backdoors. USENIX Security Symposium 2000 - [c13]Yin Zhang, Vern Paxson:
Detecting Stepping Stones. USENIX Security Symposium 2000 - [i11]Scott O. Bradner, Vern Paxson:
IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers. RFC 2780: 1-10 (2000) - [i10]Xipeng Xiao, Alan Hannan, Vern Paxson, Edward Crabbe:
TCP Processing of the IPv4 Precedence Field. RFC 2873: 1-8 (2000) - [i9]Randall R. Stewart, Qiaobing Xie, Ken Morneault, Chip Sharp, Hanns Juergen Schwarzbauer, Tom Taylor, Ian Rytina, Malleswar Kalla, Lixia Zhang, Vern Paxson:
Stream Control Transmission Protocol. RFC 2960: 1-134 (2000) - [i8]Vern Paxson, Mark Allman:
Computing TCP's Retransmission Timer. RFC 2988: 1-8 (2000)
1990 – 1999
- 1999
- [j8]Vern Paxson:
Bro: a system for detecting network intruders in real-time. Comput. Networks 31(23-24): 2435-2463 (1999) - [j7]Vern Paxson:
End-to-end internet packet dynamics. IEEE/ACM Trans. Netw. 7(3): 277-292 (1999) - [c12]Paul Francis, Sugih Jamin, Vern Paxson, Lixia Zhang, Daniel F. Gryniewicz, Yixin Jin:
An Architecture for a Global Internet Host Distance Estimation Service. INFOCOM 1999: 210-217 - [c11]Vern Paxson:
Defending against network IDS evasion. Recent Advances in Intrusion Detection 1999 - [c10]Mark Allman, Vern Paxson:
On Estimating End-to-End Network Path Properties. SIGCOMM 1999: 263-274 - [i7]Jamshid Mahdavi, Vern Paxson:
IPPM Metrics for Measuring Connectivity. RFC 2498: 1-10 (1999) - [i6]Vern Paxson, Mark Allman, Scott Dawson, William C. Fenner, Jim Griner, Ian Heavens, Kevin Lahey, Jeffrey Semke, Bernie Volz:
Known TCP Implementation Problems. RFC 2525: 1-61 (1999) - [i5]Mark Allman, Vern Paxson, W. Richard Stevens:
TCP Congestion Control. RFC 2581: 1-14 (1999) - [i4]Jamshid Mahdavi, Vern Paxson:
IPPM Metrics for Measuring Connectivity. RFC 2678: 1-10 (1999) - 1998
- [j6]Vern Paxson, Jamshid Mahdavi, Andrew K. Adams, Matt Mathis:
An architecture for large-scale Internet measurement. IEEE Commun. Mag. 36(8): 48-54 (1998) - [c9]Vern Paxson:
On Calibrating Measurements of Packet Transit Times. SIGMETRICS 1998: 11-21 - [c8]Vern Paxson:
Bro: A System for Detecting Network Intruders in Real-Time. USENIX Security Symposium 1998 - [i3]Vern Paxson:
Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic. CoRR cs.NI/9809030 (1998) - [i2]Vern Paxson, Guy Almes, Jamshid Mahdavi, Matt Mathis:
Framework for IP Performance Metrics. RFC 2330: 1-40 (1998) - [i1]Allison Mankin, Allyn Romanow, Scott O. Bradner, Vern Paxson:
IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols. RFC 2357: 1-11 (1998) - 1997
- [j5]Vern Paxson:
Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic. Comput. Commun. Rev. 27(5): 5-18 (1997) - [j4]Vern Paxson:
End-to-end routing behavior in the Internet. IEEE/ACM Trans. Netw. 5(5): 601-615 (1997) - [c7]Vern Paxson:
End-to-end Internet Packet Dynamics. SIGCOMM 1997: 139-152 - [c6]Vern Paxson:
Automated Packet Trace Analysis of TCP Implementations. SIGCOMM 1997: 167-179 - [c5]Vern Paxson, Sally Floyd:
Why We Don't Know How To Simulate the Internet. WSC 1997: 1037-1044 - 1996
- [c4]Vern Paxson:
End-to-end Routing Behavior in the Internet. SIGCOMM 1996: 25-38 - 1995
- [j3]Vern Paxson, Sally Floyd:
Wide area traffic: the failure of Poisson modeling. IEEE/ACM Trans. Netw. 3(3): 226-244 (1995) - [c3]Carey L. Williamson, Walter Willinger, Vern Paxson, Benjamin Melamed:
Network Traffic Measurement and Modelling (Panel). SIGMETRICS 1995: 56-57 - 1994
- [j2]Vern Paxson:
Growth trends in wide-area TCP connections. IEEE Netw. 8(4): 8-17 (1994) - [j1]Vern Paxson:
Empirically derived analytic models of wide-area TCP connections. IEEE/ACM Trans. Netw. 2(4): 316-336 (1994) - [c2]Vern Paxson, Sally Floyd:
Wide-Area Traffic: The Failure of Poisson Modeling. SIGCOMM 1994: 257-268 - 1993
- [c1]Vern Paxson, Chris Saltmarsh:
Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. USENIX Winter 1993: 141-156
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint