Jelena Mirkovic

  • University of Southern California, Los Angeles, USA

According to our database1, Jelena Mirkovic authored at least 110 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs).
IEEE Commun. Mag., June, 2023

Practical Intent-driven Routing Configuration Synthesis.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

Defending Root DNS Servers Against DDoS Using Layered Defenses.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

I know what you did on Venmo: Discovering privacy leaks in mobile social payments.
Proc. Priv. Enhancing Technol., 2022

The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study.
IEEE Secur. Priv., 2022

"Free" as in Freedom to Protest?
IEEE Secur. Priv., 2022

Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals.
CoRR, 2022

Did your child get disturbed by an inappropriate advertisement on YouTube?
CoRR, 2022

Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures.
CoRR, 2022

Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs.
Proceedings of the IEEE Global Communications Conference, 2022

Xatu: boosting existing DDoS detection systems using auxiliary signals.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

Polymorphic Malware Behavior Through Network Trace Analysis.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Samba: Identifying Inappropriate Videos for Young Children on YouTube.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Understanding DNS Query Composition at B-Root.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education.
IEEE Secur. Priv., 2021

User Experiences on Network Testbeds.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Defending Web Servers Against Flash Crowd Attacks.
Proceedings of the Applied Cryptography and Network Security, 2021

Using Terminal Histories to Monitor Student Progress on Hands-on Exercises.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

BLAG: Improving the Accuracy of Blacklists.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Quantifying the Impact of Blocklisting in the Age of Address Reuse.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Quantifying Cloud Misbehavior.
Proceedings of the 9th IEEE International Conference on Cloud Networking, 2020

Using Episodic Memory for User Authentication.
ACM Trans. Priv. Secur., 2019

Measuring Student Learning On Network Testbeds.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Designing for Fallible Humans.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Grammatical Generalisation in Statistical Learning: Is it implicit and invariant across development?
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

Handling Anti-Virtual Machine Techniques in Malicious Software.
ACM Trans. Priv. Secur., 2018

DEW: Distributed Experiment Workflows.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

Malware Analysis Through High-level Behavior.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

GuidedPass: Helping Users to Create Strong and Memorable Passwords.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Game experience preferences of people with chronic illnesses.
Proceedings of the 10th Nordic Conference on Human-Computer Interaction, Oslo, 2018

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

SENSS Against Volumetric DDoS Attacks.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Do you see me now? Sparsity in passive observations of address liveness.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

Hiding debuggers from malware with apate.
Proceedings of the Symposium on Applied Computing, 2017

User and Stakeholder Requirements of eHealth Support Tool Viewed In a Self-Determination Theory Lens.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

RESECT: Self-Learning Traffic Filters for IP Spoofing Defense.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Commoner Privacy And A Study On Network Traces.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Good Automatic Authentication Question Generation.
Proceedings of the INLG 2016, 2016

Life-experience passwords (LEPs).
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

DETERLab and the DETER Project.
Proceedings of the GENI Book, 2016

Evaluating Cybersecurity Education Interventions: Three Case Studies.
IEEE Secur. Priv., 2015

Evaluation Theory and Practice Applied to Cybersecurity Education.
IEEE Secur. Priv., 2015

Expressing Different Traffic Models Using the LegoTG Framework.
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

Optimal application allocation on multiple public clouds.
Comput. Networks, 2014

Cardinal Pill Testing of System Virtual Machines.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Class Capture-the-Flag Exercises.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Safe and Automated Live Malware Experimentation on Public Testbeds.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

SENSS: observe and control your own traffic in the internet.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

SENSS: Software Defined Security Service.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Critter: Content-Rich Traffic Trace Repository.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

Identifying eHealth literacy demands of health information seeking tasks.
Proceedings of the AMIA 2014, 2014

iDECIDE: A Mobile Application for Pre-Meal Insulin Dosing Using an Evidence Based Equation to Account for Patient Preferences.
Proceedings of the AMIA 2014, 2014

Usability, Security, and Mobility for Mobile Devices in Healthcare Information Systems.
PhD thesis, 2013

Integrating Sensor Networks for Energy Monitoring with Service-Oriented Architectures.
Int. J. Distributed Sens. Networks, 2013

Utilizing emerging technologies to promote more efficient face-to-face patient-clinician communication.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Nap-related consolidation in learning the grammar and vocabulary of a novel language.
Proceedings of the 35th Annual Meeting of the Cognitive Science Society, 2013

Teaching Cybersecurity with DeterLab.
IEEE Secur. Priv., 2012

Beyond Disk Imaging for Preserving User State in Network Testbeds.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

A framework for the development of ubiquitous patient support systems.
Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare, 2012

Enabling the usage of sensor networks with service-oriented architectures.
Proceedings of the Seventh International Workshop on Middleware for Sensor Networks, 2012

Reducing allocation errors in network testbeds.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Collaborative DoS Defenses.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Comparative Evaluation of Spoofing Defenses.
IEEE Trans. Dependable Secur. Comput., 2011

Rules Versus Statistics: Insights From a Highly Inflected Language.
Cogn. Sci., 2011

A Semantic Framework for Data Analysis in Networked Systems.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Semantic Regularities in Grammatical Categories: Learning Grammatical Gender in an Artificial Language.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011

Tools for worm experimentation on the DETER testbed.
Int. J. Commun. Networks Distributed Syst., 2010

Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Secur. Comput., 2009

Incrementality and Prediction in Human Sentence Processing.
Cogn. Sci., 2009

Modeling Human Behavior for Defense Against Flash-Crowd Attacks.
Proceedings of IEEE International Conference on Communications, 2009

RAD: Reflector Attack Defense Using Message Authentication Codes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise.
IEEE Trans. Computers, 2008

Learning the valid incoming direction of IP packets.
Comput. Networks, 2008

On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Theoretical Analysis of Saturation Throughput in MU-DCF.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Managing the Health of Security Experiments.
Proceedings of the Workshop on Cyber Security and Test, 2008

Channel aware scheduling in MIMO based WLANs in the presence of channel uncertainty.
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008

Correcting congestion-based error in network telescope's observations of worm dynamics.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

Combining Speak-Up with DefCOM for Improved DDoS Defense.
Proceedings of IEEE International Conference on Communications, 2008

Privacy-safe network trace sharing via secure queries.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

Fairness and Delay in MU-MIMO WLANs.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

A MAC Protocol for MIMO Based IEEE 802.11 Wireless Local Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Automating DDoS Experimentation.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

When is service really denied?: a user-centric dos metric.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

Fine-grained capabilities for flooding DDoS defense using client reputations.
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007

A Centralized MAC Protocol with QoS Support for Wireless LANs.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

A MAC Protocol with Multi-User MIMO Support for Ad-Hoc WLANs.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Towards user-centric metrics for denial-of-service measurement.
Proceedings of the Workshop on Experimental Computer Science, 2007

Building Reputations for Internet Clients.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

A realistic simulation of internet-scale events.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006

MIMO Link Modeling for System Level Simulations.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Profiling and Clustering Internet Hosts.
Proceedings of the 2006 International Conference on Data Mining, 2006

Measuring denial Of service.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

A Framework for a Collaborative DDoS Defense.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks.
IEEE Trans. Dependable Secur. Comput., 2005

Distributed Worm Simulation with a Realistic Internet Model.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

A taxonomy of DDoS attack and DDoS defense mechanisms.
Comput. Commun. Rev., 2004

Performance evaluation for IEEE 802.11G hot spot coverage using sectorised antennas.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Alliance formation for DDoS defense.
Proceedings of the New Security Paradigms Workshop 2003, 2003

Source-End DDoS Defense.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

DefCOM: Defensive Cooperative Overlay Mesh.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

SAVE: Source Address Validity Enforcement Protocol.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Attacking DDoS at the Source.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

A self-organizing approach to data forwarding in large-scale sensor networks.
Proceedings of the IEEE International Conference on Communications, 2001

Genetic Search Based on Multiple Mutations.
Computer, 2000