How to own the internet in your spare time S Staniford, V Paxson, N Weaver 11th USENIX Security Symposium (USENIX Security 02), 2002 | 1780 | 2002 |
Inside the slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver IEEE Security & Privacy 1 (4), 33-39, 2003 | 1482 | 2003 |
The matter of heartbleed Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ... Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014 | 1095 | 2014 |
A taxonomy of computer worms N Weaver, V Paxson, S Staniford, R Cunningham Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003 | 767 | 2003 |
Netalyzr: Illuminating the edge network C Kreibich, N Weaver, B Nechaev, V Paxson Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010 | 469 | 2010 |
Very fast containment of scanning worms, revisited N Weaver, S Staniford, V Paxson Malware Detection, 113-145, 2007 | 394 | 2007 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 375 | 2011 |
Method and system for reducing the rate of infection of a communications network by a software worm S Staniford, C Kahn, N Weaver, C Coit, R Jonkman US Patent App. 10/313,623, 2004 | 359 | 2004 |
The spread of the sapphire/slammer worm D Moore http://www. cs. berkeley. edu/~ nweaver/sapphire, 2003 | 350 | 2003 |
The top speed of flash worms S Staniford, D Moore, V Paxson, N Weaver Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004 | 302 | 2004 |
Protocol-independent adaptive replay of application dialog. W Cui, V Paxson, N Weaver, RH Katz NDSS, 2006 | 289 | 2006 |
Global measurement of {DNS} manipulation P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson 26th USENIX Security Symposium (USENIX Security 17), 307-323, 2017 | 207 | 2017 |
{PharmaLeaks}: Understanding the Business of Online Pharmaceutical Affiliate Programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... 21st USENIX Security Symposium (USENIX Security 12), 1-16, 2012 | 179 | 2012 |
Show me the money: Characterizing spam-advertised revenue C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... 20th USENIX Security Symposium (USENIX Security 11), 2011 | 167 | 2011 |
Detecting In-Flight Page Changes with Web Tripwires. C Reis, SD Gribble, T Kohno, NC Weaver NSDI 8, 31-44, 2008 | 155 | 2008 |
Examining how the great firewall discovers hidden circumvention servers R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson Proceedings of the 2015 Internet Measurement Conference, 445-458, 2015 | 150 | 2015 |
The SFRA: a corner-turn FPGA architecture N Weaver, J Hauser, J Wawrzynek Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field …, 2004 | 148 | 2004 |
Warhol worms: The potential for very fast Internet plaques N Weaver http://www. cs. berkeley. edu/~ nweaver/warhol. html, 2001 | 148 | 2001 |
Exploiting underlying structure for detailed reconstruction of an internet-scale event A Kumar, V Paxson, N Weaver Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 33-33, 2005 | 144 | 2005 |
Botcoin: Monetizing stolen cycles. DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ... NDSS 2014, 1-16, 2014 | 133 | 2014 |