Fast portscan detection using sequential hypothesis testing J Jung, V Paxson, AW Berger, H Balakrishnan IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 211-225, 2004 | 984 | 2004 |
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds S Kandula, D Katabi, M Jacob, A Berger Proceedings of the 2nd conference on Symposium on Networked Systems Design …, 2005 | 569 | 2005 |
Dynamic load balancing without packet reordering S Kandula, D Katabi, S Sinha, A Berger ACM SIGCOMM Computer Communication Review 37 (2), 51-62, 2007 | 509 | 2007 |
Fast detection of scanning worm infections SE Schechter, J Jung, AW Berger Recent Advances in Intrusion Detection: 7th International Symposium, RAID …, 2004 | 407 | 2004 |
Locating Internet routing instabilities A Feldmann, O Maennel, ZM Mao, A Berger, B Maggs ACM SIGCOMM Computer Communication Review 34 (4), 205-218, 2004 | 347 | 2004 |
NIRA: a new inter-domain routing architecture X Yang, D Clark, AW Berger IEEE/ACM transactions on networking 15 (4), 775-788, 2007 | 280 | 2007 |
Traffic descriptors for VBR video teleconferencing over ATM networks AR Reibman, AW Berger IEEE/ACM transactions on networking 3 (3), 329-339, 1995 | 217 | 1995 |
Modeling TTL-based Internet caches J Jung, AW Berger, H Balakrishnan IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 216 | 2003 |
Performance analysis of a rate-control throttle where tokens and jobs queue AW Berger IEEE journal on Selected Areas in Communications 9 (2), 165-170, 1991 | 182 | 1991 |
Real time pricing to assist in load frequency control AW Berger, FC Schweppe IEEE Transactions on Power Systems 4 (3), 920-926, 1989 | 175 | 1989 |
Understanding the efficacy of deployed internet source address validation filtering R Beverly, A Berger, Y Hyun, K Claffy Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, 356-369, 2009 | 170 | 2009 |
Complexity of Internet interconnections: Technology, incentives and implications for policy P Faratin, DD Clark, S Bauer, W Lehr TRC, 2007 | 165 | 2007 |
Effective bandwidths with priorities AW Berger, W Whitt IEEE/ACM Transactions on networking 6 (4), 447-460, 1998 | 156 | 1998 |
The growing complexity of Internet interconnection P Faratin, DD Clark, S Bauer, W Lehr, PW Gilmore, A Berger Communications & strategies, 51, 2008 | 139 | 2008 |
Dimensioning bandwidth for elastic traffic in high-speed data networks AW Berger, Y Kogan IEEE/ACM Transactions on networking 8 (5), 643-654, 2000 | 139 | 2000 |
Method for predicting file download time from mirrored data centers in a global computer network FT Leighton, R Sundaram, A Soviani, M Levine, A Parker, ... US Patent 7,096,263, 2006 | 106 | 2006 |
Extending the effective bandwidth concept to networks with priority classes AW Berger, W Whitt IEEE Communications magazine 36 (8), 78-83, 1998 | 105 | 1998 |
Entropy/ip: Uncovering structure in ipv6 addresses P Foremski, D Plonka, A Berger Proceedings of the 2016 Internet Measurement Conference, 167-181, 2016 | 87 | 2016 |
Inferring BGP blackholing activity in the internet V Giotsas, G Smaragdakis, C Dietzel, P Richter, A Feldmann, A Berger Proceedings of the 2017 Internet Measurement Conference, 1-14, 2017 | 80 | 2017 |
Detecting peering infrastructure outages in the wild V Giotsas, C Dietzel, G Smaragdakis, A Feldmann, A Berger, E Aben Proceedings of the conference of the ACM special interest group on data …, 2017 | 79 | 2017 |