Farnam Jahanian

According to our database1, Farnam Jahanian authored at least 92 papers between 1986 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 2009, "For contributions to the dependability and security of networks and systems.".

IEEE Fellow

IEEE Fellow 2009, "For contributions to dependability and security of network systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Realizing the transformative impact of computing and data in a networked world.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

2013
Small is better: avoiding latency traps in virtualized data centers.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013

2012
Learning from Early Attempts to Measure Information Security Performance.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Safeguarding academic accounts and resources with the University Credential Abuse Auditing System.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
A comparative study of two network-based anomaly detection methods.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

An exploration of L2 cache covert channels in virtualized environments.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Reflections on the evolution of internet threats: the growing imperative for a cyber secure society.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Internet inter-domain traffic.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

CANVuS: Context-Aware Network Vulnerability Scanning.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.
Proceedings of the Network and Distributed System Security Symposium, 2010

Internet background radiation revisited.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
If It Ain't Broke, Don't Fix It: Challenges and New Directions for Inferring the Impact of Software Patches.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

Dependability in the cloud: Challenges and opportunities.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Enhancing end-to-end availability and performance via topology-aware overlay networks.
Computer Networks, 2008

CloudAV: N-Version Antivirus in the Network Cloud.
Proceedings of the 17th USENIX Security Symposium, 2008

Virtualized in-cloud security services for mobile devices.
Proceedings of the First Workshop on Virtualization in Mobile Computing, 2008

Shades of grey: On the effectiveness of reputation-based "blacklists".
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2007
Rethinking Antivirus: Executable Analysis in the Network Cloud.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Automated Classification and Analysis of Internet Malware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Shedding Light on the Configuration of Dark Addresses.
Proceedings of the Network and Distributed System Security Symposium, 2007

Student Forum.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
An Experimental Study of Internet Path Diversity.
IEEE Trans. Dependable Sec. Comput., 2006

WIND: Workload-Aware INtrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
The Blaster Worm: Then and Now.
IEEE Security & Privacy, 2005

The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

The Internet Motion Sensor - A Distributed Blackhole Monitoring System.
Proceedings of the Network and Distributed System Security Symposium, 2005

Topology aware overlay networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Protocol scrubbing: network security through transparent flow modification.
IEEE/ACM Trans. Netw., 2004

An extensible probe architecture for network protocol performance measurement.
Softw., Pract. Exper., 2004

Toward understanding distributed blackhole placement.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Impact of Path Diversity on Multi-homed and Overlay Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Experiences With Monitoring OSPF on a Regional Service Provider Network.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

2002
Fault-Tolerant Virtual Private Networks within An Autonomous System.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

2001
Simulation-Verification: Biting at the State Explosion Problem.
IEEE Trans. Software Eng., 2001

Delayed Internet routing convergence.
IEEE/ACM Trans. Netw., 2001

2000
A Flexible, Extensible Simulation Environment for Testing Real-Time Specifications.
IEEE Trans. Computers, 2000

Defeating TCP/IP Stack Fingerprinting.
Proceedings of the 9th USENIX Security Symposium, 2000

Constructing Real-time Group Communication Middleware Using the Resource Kernel.
Proceedings of the 21st IEEE Real-Time Systems Symposium (RTSS 2000), 2000

Transport and Application Protocol Scrubbing.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Probabilistic Data Consistency for Wide-Area Applications.
Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28, 2000

Experiences with Group Communication Middleware.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
A Real-Time Primary-Backup Replication Service.
IEEE Trans. Parallel Distrib. Syst., 1999

ARMADA Middleware and Communication Services.
Real-Time Systems, 1999

Software Architecture for the UARC Web-Based Collaboratory.
IEEE Internet Computing, 1999

Origins of Internet Routing Instability.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

The Inter-group Router Approach to Scalable Group Composition.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

Experimental Study of Internet Stability and Backbone Failures.
Proceedings of the Digest of Papers: FTCS-29, 1999

1998
Internet routing instability.
IEEE/ACM Trans. Netw., 1998

Attribute-based data dissemination for Internet applications.
J. High Speed Networks, 1998

The Upper Atmospheric Research Collaboratory (UARC).
Interactions, 1998

Optimization of a Real-Time Primary-Backup Replication Service.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

An Extensible Probe Architecture for Network Protocol Performance Measurement.
Proceedings of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 31, 1998

Real-Time Primary-Backup (RTPB) Replication with Temporal Consistency Guarantees.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

1997
Design and Evaluation of a Window-Consistent Replication Service.
IEEE Trans. Computers, 1997

Experiments on Six Commercial TCP Implementations Using a Software Fault Injection Tool.
Softw., Pract. Exper., 1997

An Optimal Bandwidth Allocation Strategy for the Delivery of Compressed Prerecorded Video.
Multimedia Syst., 1997

Salamander: A Push-based Distribution Substrate for Internet Applications.
Proceedings of the 1st USENIX Symposium on Internet Technologies and Systems, 1997

A Flexible, Extensible Simulation Environment for Testing Real-Time Specifications.
Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium, 1997

Comparison of Two Middleware Data Dissemination Services in a Wide-Area Distributed Systems.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

A. Software Environment for Custom Simulation and Monitoring of Real-Time Specifications.
Proceedings of the 2nd High-Assurance Systems Engineering Workshop (HASE '97), 1997

Providing Flexible Services for Managing Shared State in Collaborative Systems.
Proceedings of the Fifth European Conference on Computer Supported Cooperative Work, 1997

1996
A Methodology and Support Tools for Analysis of Real-Time Specifications.
International Journal of Software Engineering and Knowledge Engineering, 1996

Fault-Tolerance in Distributed Real-Time Systems.
Proceedings of the Third International Workshop on Real-Time Computing Systems Application (RTCSA '96), October 30, 1996

RTCAST: lightweight multicast for real-time process groups.
Proceedings of the 2nd IEEE Real-Time Technology and Applications Symposium, 1996

Providing VCR Functionality in a Constant Quality Video-On Demand Transportation Service.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

Fault injection experiments on real-time protocols using ORCHESTRA.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

Testing of Fault-Tolerant and Real-Time Distributed Systems via Protocol Fault Injektion.
Proceedings of the Digest of Papers: FTCS-26, 1996

Corona: A Communication Service for Scalable, Reliable Group Collaboration Systems.
Proceedings of the CSCW '96, 1996

1995
Probing and Fault Injection of Dependable Distributed Protocols.
Comput. J., 1995

A Software Fault Injection Tool on Real-Time Mach.
Proceedings of the 16th IEEE Real-Time Systems Symposium, 1995

Design and evaluation of a window-consistent replication service.
Proceedings of the 1st IEEE Real-Time Technology and Applications Symposium, 1995

Probing and Fault Injection of Protocol Implementations.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

1994
Modechart: A Specification Language for Real-Time Systems.
IEEE Trans. Software Eng., 1994

Runtime Monitoring of Timing Constraints in Distributed Real-Time Systems.
Real-Time Systems, 1994

Deterministic Fault Injection of Distributed Systems.
Proceedings of the Theory and Practice in Distributed Systems, International Workshop, 1994

1993
Processor Group Membership Protocols: Specification, Design, and Implementation.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

Fault Tolerance in Embedded Real-Time Systems.
Proceedings of the Hardware and Software Architectures for Fault Tolerance, 1993

1992
Strong, Weak, and Hybrid Membership.
Proceedings of the Second Workshop on the Management of Replicated Data, 1992

Cheap Mutual Exclusion.
Proceedings of the USENIX Summer 1992 Technical Conference, 1992

Monitoring Timing Constraints in Distributed Real-Time Systems.
Proceedings of the Real-Time Systems Symposium, 1992

1991
A Timestamp-Based Checkpointing Protocol for Long-Lived Distributed Computations.
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991

Run-time monitoring of real-time systems.
Proceedings of the Real-Time Systems Symposium, 1991

1990
A formalism for monitoring real-time constraints at run-time.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

1989
Verifying Broperties of Systems with Variable Timing Constraints.
Proceedings of the Real-Time Systems Symposium, 1989

1988
A Method for Verifying Properties of Modechart Specifications.
Proceedings of the 9th IEEE Real-Time Systems Symposium (RTSS '88), 1988

1987
A Graph-Theoretic Approach for Timing Analysis and its Implementation.
IEEE Trans. Computers, 1987

1986
Safety Analysis of Timing Properties in Real-Time Systems.
IEEE Trans. Software Eng., 1986

A Graph-Theoretic Approach for Timing Analysis in Real Time Logic.
Proceedings of the 7th IEEE Real-Time Systems Symposium (RTSS '86), 1986


  Loading...