Best subset selection via a modern optimization lens D Bertsimas, A King, R Mazumder | 971 | 2016 |
Analysis of a"/0" Stealth Scan from a Botnet A Dainotti, A King, KC Claffy, F Papale, A Pescapé Proceedings of the 2012 Internet Measurement Conference, 1-14, 2012 | 184 | 2012 |
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017 | 164 | 2017 |
OR forum—an algorithmic approach to linear regression D Bertsimas, A King Operations Research 64 (1), 2-16, 2016 | 154 | 2016 |
BGPStream: a software framework for live and historical BGP data analysis C Orsini, A King, D Giordano, V Giotsas, A Dainotti Proceedings of the 2016 Internet Measurement Conference, 429-444, 2016 | 140 | 2016 |
ARTEMIS: Neutralizing BGP hijacking within a minute P Sermpezis, V Kotronis, P Gigis, X Dimitropoulos, D Cicalese, A King, ... IEEE/ACM transactions on networking 26 (6), 2471-2486, 2018 | 139 | 2018 |
Logistic regression: From art to science D Bertsimas, A King Statistical Science, 367-384, 2017 | 111 | 2017 |
Estimating internet address space usage through passive measurements A Dainotti, K Benson, A King, KC Claffy, M Kallitsis, E Glatz, ... ACM SIGCOMM Computer Communication Review 44 (1), 42-49, 2013 | 76 | 2013 |
Profiling BGP serial hijackers: capturing persistent misbehavior in the global routing table C Testart, P Richter, A King, A Dainotti, D Clark Proceedings of the Internet Measurement Conference, 420-434, 2019 | 61 | 2019 |
At home and abroad: The use of denial-of-service attacks during elections in nondemocratic regimes PM Lutscher, NB Weidmann, ME Roberts, M Jonker, A King, A Dainotti Journal of Conflict Resolution 64 (2-3), 373-401, 2020 | 47 | 2020 |
Lost in space: improving inference of IPv4 address space utilization A Dainotti, K Benson, A King, B Huffaker, E Glatz, X Dimitropoulos, ... IEEE Journal on Selected Areas in Communications 34 (6), 1862-1876, 2016 | 47 | 2016 |
Test results of the streamer-tube system of the CHARM II neutrino detector JP Dewulf, F Bergsma, C Busi, A Capone, T Delbar, D De Pedis, ... Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 1986 | 47 | 1986 |
To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today C Testart, P Richter, A King, A Dainotti, D Clark Passive and Active Measurement: 21st International Conference, PAM 2020 …, 2020 | 39 | 2020 |
Chocolatine: Outage detection for internet background radiation A Guillot, R Fontugne, P Winter, P Merindol, A King, A Dainotti, C Pelsser 2019 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2019 | 33 | 2019 |
Teaching network security with IP darkspace data T Zseby, FI Vázquez, A King, KC Claffy IEEE Transactions on Education 59 (1), 1-7, 2015 | 32 | 2015 |
Proportional drift tubes for large calorimeter detectors C Bosio, W Flegel, B Friend, A King, KH Mess, J Meyer, RS Orr, ... Nuclear Instruments and Methods 157 (1), 35-46, 1978 | 31 | 1978 |
Spoki: Unveiling a new wave of scanners through a reactive network telescope R Hiesgen, M Nawrocki, A King, A Dainotti, TC Schmidt, M Wählisch 31st USENIX Security Symposium (USENIX Security 22), 431-448, 2022 | 29 | 2022 |
The limited streamer tube system of the charm collaboration M Jonker, F Udo, U Amaldi, R Donnet, W Flegel, B Friend, E Gygi, ... Nuclear Instruments and Methods in Physics Research 215 (3), 361-368, 1983 | 25 | 1983 |
A coordinated view of the temporal evolution of large-scale Internet events A King, B Huffaker, A Dainotti, k c Claffy Computing 96, 53-65, 2014 | 21 | 2014 |
Analysis of internet-wide probing using darknets A Dainotti, A King, K Claffy Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012 | 20 | 2012 |