ÆÈ·Î¿ì
Geoffrey M. Voelker
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker, S Savage
ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006
21932006
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
17322013
On the placement of web server replicas
L Qiu, VN Padmanabhan, GM Voelker
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications ¡¦, 2001
11852001
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 15th ACM SIGKDD international conference on Knowledge ¡¦, 2009
11182009
Internet quarantine: Requirements for containing self-propagating code
D Moore, C Shannon, GM Voelker, S Savage
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE ¡¦, 2003
10672003
On the scale and performance of cooperative web proxy caching
A Wolman, M Voelker, N Sharma, N Cardwell, A Karlin, HM Levy
Proceedings of the seventeenth ACM symposium on Operating systems principles ¡¦, 1999
9111999
Characterizing user behavior and network performance in a public wireless LAN
A Balachandran, GM Voelker, P Bahl, PV Rangan
Proceedings of the 2002 ACM SIGMETRICS international conference on ¡¦, 2002
8492002
Understanding availability
R Bhagwan, S Savage, GM Voelker
Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley ¡¦, 2003
7892003
Total Recall: System Support for Automated Availability Management.
R Bhagwan, K Tati, Y Cheng, S Savage, GM Voelker
Nsdi 4, 25-25, 2004
7452004
Identifying suspicious URLs: an application of large-scale online learning
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 26th annual international conference on machine learning ¡¦, 2009
7432009
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications ¡¦, 2008
5852008
Difference engine: Harnessing memory redundancy in virtual machines
D Gupta, S Lee, M Vrable, S Savage, AC Snoeren, G Varghese, ...
Communications of the ACM 53 (10), 85-93, 2010
5722010
End-to-end differentiation of congestion and wireless losses
S Cen, PC Cosman, GM Voelker
IEEE/ACM Transactions on networking 11 (5), 703-717, 2003
5552003
Sora: high-performance software radio using general-purpose multi-core processors
K Tan, H Liu, J Zhang, Y Zhang, J Fang, GM Voelker
Communications of the ACM 54 (1), 99-107, 2011
5342011
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ...
Proceedings of the twentieth ACM symposium on Operating systems principles ¡¦, 2005
5242005
Detour: Informed Internet routing and transport
S Savage, T Anderson, A Aggarwal, D Becker, N Cardwell, A Collins, ...
Ieee Micro 19 (1), 50-59, 1999
5211999
Access and mobility of wireless PDA users
M McNett, GM Voelker
ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 40-55, 2005
4652005
Measurement and analysis of a streaming media workload
M Chesire, A Wolman, GM Voelker, HM Levy
3rd USENIX Symposium on Internet Technologies and Systems (USITS 01), 2001
4542001
Jigsaw: Solving the puzzle of enterprise 802.11 analysis
YC Cheng, J Bellardo, P Benkö, AC Snoeren, GM Voelker, S Savage
ACM SIGCOMM Computer Communication Review 36 (4), 39-50, 2006
4332006
An analysis of underground forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement ¡¦, 2011
3882011
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20