How to own the internet in your spare time. S Staniford, V Paxson, N Weaver USENIX security symposium 2, 14-15, 2002 | 1766 | 2002 |
Inside the slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver IEEE Security & Privacy 1 (4), 33-39, 2003 | 1454 | 2003 |
The matter of heartbleed Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ... Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014 | 937 | 2014 |
A taxonomy of computer worms N Weaver, V Paxson, S Staniford, R Cunningham Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003 | 747 | 2003 |
Netalyzr: Illuminating the edge network C Kreibich, N Weaver, B Nechaev, V Paxson Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010 | 455 | 2010 |
Very Fast Containment of Scanning Worms. N Weaver, S Staniford, V Paxson USENIX Security Symposium 2, 16-85, 2004 | 380 | 2004 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 363 | 2011 |
Method and system for reducing the rate of infection of a communications network by a software worm S Staniford, C Kahn, N Weaver, C Coit, R Jonkman US Patent App. 10/313,623, 2004 | 341 | 2004 |
The spread of the sapphire/slammer worm D Moore http://www. cs. berkeley. edu/~ nweaver/sapphire, 2003 | 325 | 2003 |
The top speed of flash worms S Staniford, D Moore, V Paxson, N Weaver Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004 | 296 | 2004 |
Protocol-independent adaptive replay of application dialog. W Cui, V Paxson, N Weaver, RH Katz NDSS, 2006 | 272 | 2006 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ... Proceedings of the 21st USENIX conference on Security symposium, 1-1, 2012 | 169 | 2012 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ... Proceedings of the 21st USENIX conference on Security symposium, 1-1, 2012 | 169 | 2012 |
Show Me the Money: Characterizing Spam-advertised Revenue. C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... USENIX Security Symposium 35, 2011 | 163 | 2011 |
Global measurement of DNS manipulation P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson 26th USENIX Security Symposium, 2017 | 150 | 2017 |
The SFRA: a corner-turn FPGA architecture N Weaver, J Hauser, J Wawrzynek Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field …, 2004 | 148 | 2004 |
Warhol worms: The potential for very fast internet plagues N Weaver | 147 | 2001 |
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. R Verdult, FD Garcia, B Ege USENIX Security Symposium, 703-718, 2013 | 146 | 2013 |
Detecting In-Flight Page Changes with Web Tripwires. C Reis, SD Gribble, T Kohno, NC Weaver NSDI 8, 31-44, 2008 | 145 | 2008 |
Exploiting underlying structure for detailed reconstruction of an internet-scale event A Kumar, V Paxson, N Weaver Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 33-33, 2005 | 145 | 2005 |