Follow
Nicholas Weaver
Nicholas Weaver
International Computer Science Institute
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
How to own the internet in your spare time.
S Staniford, V Paxson, N Weaver
USENIX security symposium 2, 14-15, 2002
17662002
Inside the slammer worm
D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver
IEEE Security & Privacy 1 (4), 33-39, 2003
14542003
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
9372014
A taxonomy of computer worms
N Weaver, V Paxson, S Staniford, R Cunningham
Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003
7472003
Netalyzr: Illuminating the edge network
C Kreibich, N Weaver, B Nechaev, V Paxson
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010
4552010
Very Fast Containment of Scanning Worms.
N Weaver, S Staniford, V Paxson
USENIX Security Symposium 2, 16-85, 2004
3802004
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3632011
Method and system for reducing the rate of infection of a communications network by a software worm
S Staniford, C Kahn, N Weaver, C Coit, R Jonkman
US Patent App. 10/313,623, 2004
3412004
The spread of the sapphire/slammer worm
D Moore
http://www. cs. berkeley. edu/~ nweaver/sapphire, 2003
3252003
The top speed of flash worms
S Staniford, D Moore, V Paxson, N Weaver
Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004
2962004
Protocol-independent adaptive replay of application dialog.
W Cui, V Paxson, N Weaver, RH Katz
NDSS, 2006
2722006
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ...
Proceedings of the 21st USENIX conference on Security symposium, 1-1, 2012
1692012
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ...
Proceedings of the 21st USENIX conference on Security symposium, 1-1, 2012
1692012
Show Me the Money: Characterizing Spam-advertised Revenue.
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium 35, 2011
1632011
Global measurement of DNS manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th USENIX Security Symposium, 2017
1502017
The SFRA: a corner-turn FPGA architecture
N Weaver, J Hauser, J Wawrzynek
Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field …, 2004
1482004
Warhol worms: The potential for very fast internet plagues
N Weaver
1472001
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer.
R Verdult, FD Garcia, B Ege
USENIX Security Symposium, 703-718, 2013
1462013
Detecting In-Flight Page Changes with Web Tripwires.
C Reis, SD Gribble, T Kohno, NC Weaver
NSDI 8, 31-44, 2008
1452008
Exploiting underlying structure for detailed reconstruction of an internet-scale event
A Kumar, V Paxson, N Weaver
Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 33-33, 2005
1452005
The system can't perform the operation now. Try again later.
Articles 1–20