Manish Karir
Manish Karir
Geen geverifieerd e-mailadres
Geciteerd door
Geciteerd door
A survey of botnet technology and defenses
M Bailey, E Cooke, F Jahanian, Y Xu, M Karir
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
Cloudy with a chance of breach: Forecasting cyber security incidents
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 1009-1024, 2015
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks
J Czyz, M Kallitsis, M Gharaibeh, C Papadopoulos, M Bailey, M Karir
Proceedings of the 2014 Conference on Internet Measurement Conference, 435-448, 2014
Internet background radiation revisited
E Wustrow, M Karir, M Bailey, F Jahanian, G Huston
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010
Atlas internet observatory 2009 annual report
NANOG49, Oct, 2009
Rating network security posture and comparing network maliciousness
M Liu, M Bailey, M Karir, Y Liu, J Zhang
US Patent 10,038,703, 2018
On the Mismanagement and Maliciousness of Networks.
J Zhang, Z Durumeric, M Bailey, M Liu, M Karir
NDSS 14, 23-26, 2014
Characterizing dark dns behavior
J Oberheide, M Karir, ZM Mao
International Conference on Detection of Intrusions and Malware, and …, 2007
Multi-threaded routing toolkit (MRT) routing information export format
L Blunk, M Karir, C Labovitz
Internet Engineering Task Force, RFC 6396, 2011
Flamingo: Visualizing internet traffic
J Oberheide, M Goff, M Karir
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 150-161, 2006
Understanding IPv6 internet background radiation
J Czyz, K Lady, SG Miller, M Bailey, M Kallitsis, M Karir
Proceedings of the 2013 conference on Internet measurement conference, 105-118, 2013
Predicting cyber security incidents using feature-based characterization of network-level malicious activities
Y Liu, J Zhang, A Sarabi, M Liu, M Karir, M Bailey
Proceedings of the 2015 ACM International Workshop on International Workshop …, 2015
MRT routing information export format
L Blunk
Internet-Draft, draft-ietf-grow-mrt-13, 2010
Address resolution problems in large data center networks
T Narten, M Karir, I Foo
Internet Engineering Task Force (IETF), 2013
VAST: visualizing autonomous system topology
J Oberheide, M Karir, D Blazakis
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
Characterization of blacklists and tainted network traffic
J Zhang, A Chivukula, M Bailey, M Karir, M Liu
International Conference on Passive and Active Network Measurement, 218-228, 2013
The ethics of energy transitions
C Miller
2014 IEEE International Symposium on Ethics in Science, Technology and …, 2014
Understanding IPv6 populations in the wild
M Karir, G Huston, G Michaelson, M Bailey
International Conference on Passive and Active Network Measurement, 256-259, 2013
LES: Layered encryption security
M Karir, JS Baras
in Proceedings of the Third International Conference on Networking (ICN’04, 2004
BGP-Inspect-Extracting Information from Raw BGP Data
D Blazakis, M Karir, JS Baras
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 174-185, 2006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20