A survey of botnet technology and defenses M Bailey, E Cooke, F Jahanian, Y Xu, M Karir 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 353 | 2009 |
Cloudy with a chance of breach: Forecasting cyber security incidents Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu 24th USENIX Security Symposium (USENIX Security 15), 1009-1024, 2015 | 255 | 2015 |
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks J Czyz, M Kallitsis, M Gharaibeh, C Papadopoulos, M Bailey, M Karir Proceedings of the 2014 Conference on Internet Measurement Conference, 435-448, 2014 | 233 | 2014 |
Internet background radiation revisited E Wustrow, M Karir, M Bailey, F Jahanian, G Huston Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010 | 211 | 2010 |
Rating network security posture and comparing network maliciousness M Liu, M Bailey, M Karir, Y Liu, J Zhang US Patent 10,038,703, 2018 | 137 | 2018 |
On the Mismanagement and Maliciousness of Networks. J Zhang, Z Durumeric, MD Bailey, M Liu, M Karir NDSS 14, 23-26, 2014 | 85 | 2014 |
Characterizing dark dns behavior J Oberheide, M Karir, ZM Mao Detection of Intrusions and Malware, and Vulnerability Assessment: 4th …, 2007 | 69 | 2007 |
Multi-threaded routing toolkit (MRT) routing information export format L Blunk, M Karir, C Labovitz | 66 | 2011 |
Predicting cyber security incidents using feature-based characterization of network-level malicious activities Y Liu, J Zhang, A Sarabi, M Liu, M Karir, M Bailey Proceedings of the 2015 ACM International Workshop on International Workshop …, 2015 | 53 | 2015 |
Understanding IPv6 internet background radiation J Czyz, K Lady, SG Miller, M Bailey, M Kallitsis, M Karir Proceedings of the 2013 conference on Internet measurement conference, 105-118, 2013 | 51 | 2013 |
Flamingo: Visualizing internet traffic J Oberheide, M Goff, M Karir 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 150-161, 2006 | 43 | 2006 |
Address resolution problems in large data center networks T Narten, M Karir, I Foo | 38 | 2013 |
MRT routing information export format L Blunk Internet-Draft, draft-ietf-grow-mrt-13, 2010 | 29 | 2010 |
VAST: visualizing autonomous system topology J Oberheide, M Karir, D Blazakis Proceedings of the 3rd international workshop on Visualization for computer …, 2006 | 29 | 2006 |
Network maliciousness susceptibility analysis and rating M Liu, M Bailey, M Karir, J Zhang, Z Durumeric US Patent 9,729,558, 2017 | 24 | 2017 |
Characterization of blacklists and tainted network traffic J Zhang, A Chivukula, M Bailey, M Karir, M Liu International Conference on Passive and Active Network Measurement, 218-228, 2013 | 23 | 2013 |
LES: Layered encryption security M Karir, J Baras Proceedings of the Third International Conference on Networking (ICN’04), 2004 | 21 | 2004 |
Understanding IPv6 populations in the wild M Karir, G Huston, G Michaelson, M Bailey Passive and Active Measurement: 14th International Conference, PAM 2013 …, 2013 | 19 | 2013 |
BGP-Inspect-extracting information from raw BGP data D Blazakis, M Karir, JS Baras 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 174-185, 2006 | 18 | 2006 |
Analyzing BGP ASPATH behavior in the Internet D Blazakis, M Karir, JS Baras Proc. 9th IEEE Global Internet Symposium, 2006 | 12 | 2006 |