Matthew Roughan

Orcid: 0000-0002-7882-7329

Affiliations:
  • University of Adelaide, Australia


According to our database1, Matthew Roughan authored at least 138 papers between 1996 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2018, "For contributions to Internet measurement and analysis, with applications to network engineering".

IEEE Fellow

IEEE Fellow 2019, "for contributions to Internet measurement and analysis".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Rank is all you need: development and analysis of robust causal networks.
Appl. Netw. Sci., December, 2024

Modified CMA-ES Algorithm for Multi-Modal Optimization: Incorporating Niching Strategies and Dynamic Adaptation Mechanism.
CoRR, 2024

POSTER: Packet Field Tree: a hybrid approach, open database and evaluation methodology for Automated Protocol Reverse-Engineering.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

How Is Starlink Manoeuvring? An Analysis of Patterns in the Manoeuvres of Starlink Satellites.
Proceedings of the 9th International Conference on Internet of Things, 2024

2023
Packet Field Tree: a hybrid approach to automated protocol reverse-engineering.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Rank Is All You Need: Robust Estimation of Complex Causal Networks.
Proceedings of the Complex Networks & Their Applications XII, 2023

2022
Likelihood-Based Inference for Modelling Packet Transit From Thinned Flow Summaries.
IEEE Trans. Signal Inf. Process. over Networks, 2022

Verifiable Policy-Defined Networking Using Metagraphs.
IEEE Trans. Dependable Secur. Comput., 2022

Verifying and Monitoring IoTs Network Behavior Using MUD Profiles.
IEEE Trans. Dependable Secur. Comput., 2022

Information flow estimation: A study of news on Twitter.
Online Soc. Networks Media, 2022

The entropy rate of Linear Additive Markov Processes.
CoRR, 2022

Performance Analysis: Discovering Semi-Markov Models From Event Logs.
CoRR, 2022

Boolean Expressions in Firewall Analysis.
CoRR, 2022

#IStandWithPutin Versus #IStandWithUkraine: The Interaction of Bots and Humans in Discussion of the Russia/Ukraine War.
Proceedings of the Social Informatics - 13th International Conference, 2022

2021
Mathematical Reconciliation of Medical Privacy Policies.
ACM Trans. Manag. Inf. Syst., 2021

A Review of Shannon and Differential Entropy Rate Estimation.
Entropy, 2021

Counting Candy Crush configurations.
Discret. Appl. Math., 2021

Em-K Indexing for Approximate Query Matching in Large-scale ER.
CoRR, 2021

High Performance Out-of-sample Embedding Techniques for Multidimensional Scaling.
CoRR, 2021

Convergence of Conditional Entropy for Long Range Dependent Markov Chains.
CoRR, 2021

NPD Entropy: A Non-Parametric Differential Entropy Rate Estimator.
CoRR, 2021

Differential Entropy Rate Characterisations of Long Range Dependent Processes.
CoRR, 2021

Popularity and centrality in Spotify networks: critical transitions in eigenvector centrality.
J. Complex Networks, 2021

Generating Name-Like Vectors for Testing Large-Scale Entity Resolution.
IEEE Access, 2021

2020
Bayesian Inference of Network Structure From Information Cascades.
IEEE Trans. Signal Inf. Process. over Networks, 2020

The Polylogarithm Function in Julia.
CoRR, 2020

Simulating Name-like Vectors for Testing Large-scale Entity Resolution.
CoRR, 2020

A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities.
Proceedings of the Second IEEE International Conference on Trust, 2020

BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Landmarks-based Blocking Method For Large-scale Entity Resolution.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

The one comparing narrative social network extraction techniques.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
Practically surreal: Surreal arithmetic in Julia.
SoftwareX, 2019

How the Avengers assemble: Ecological modelling of effective cast sizes for movies.
CoRR, 2019

ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report).
CoRR, 2019

Generating connected random graphs.
J. Complex Networks, 2019

Estimating the Parameters of the Waxman Random Graph.
Proceedings of the Algorithms and Models for the Web Graph - 16th International Workshop, 2019

2018
Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report).
CoRR, 2018

Network structure inhibits information cascades in heavy-tailed social networks.
CoRR, 2018

A BasisEvolution framework for network traffic anomaly detection.
Comput. Networks, 2018

Super-blockers and the Effect of Network Structure on Information Cascades.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Rasch Analysis of HTTPS Reachability.
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018

The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Hierarchical Traffic Matrices: Axiomatic Foundations to Practical Traffic Matrix Synthesis.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Controlled Synthesis of Traffic Matrices.
IEEE/ACM Trans. Netw., 2017

Fast Generation of Spatially Embedded Random Networks.
IEEE Trans. Netw. Sci. Eng., 2017

MGtoolkit: A python package for implementing metagraphs.
SoftwareX, 2017

Rigorous statistical analysis of HTTPS reachability.
CoRR, 2017

ForestStream: Accurate Measurement of Cascades in Online Social Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
Case Studies of SCADA Firewall Configurations and the Implications for Best Practices.
IEEE Trans. Netw. Serv. Manag., 2016

The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report).
CoRR, 2016

Verifiable Policy-defined Networking for Security Management.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

The Mathematical Foundations for Mapping Policies to Network Devices.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Malachite: Firewall policy comparison.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

A comparison of information criteria for traffic model selection.
Proceedings of the 10th International Conference on Signal Processing and Communication Systems, 2016

2015
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases.
IEEE Trans. Dependable Secur. Comput., 2015

All networks look the same to me: Testing for homogeneity in networks.
CoRR, 2015

Unravelling Graph-Exchange File Formats.
CoRR, 2015

Spatiotemporal Traffic Matrix Synthesis.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

The Hitchhikers Guide to Sharing Graph Data.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Lossy Compression of Dynamic, Weighted Graphs.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Towards Standardising Firewall Reporting.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Maximum entropy traffic matrix synthesis.
SIGMETRICS Perform. Evaluation Rev., 2014

Network-design sensitivity analysis.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

COLD: PoP-level Network Topology Synthesis.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
Multi-Observer Privacy-Preserving Hidden Markov Models.
IEEE Trans. Signal Process., 2013

Rigorous Statistical Analysis of Internet Loss Measurements.
IEEE/ACM Trans. Netw., 2013

Hidden Markov model identifiability via tensors.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

STRIP: Privacy-preserving vector-based routing.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

An automated system for emulated network experimentation.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version).
IEEE/ACM Trans. Netw., 2012

Improving Hidden Markov Model Inferences With Private Data From Multiple Observers.
IEEE Signal Process. Lett., 2012

I can see for miles: Re-visualizing the internet.
IEEE Netw., 2012

AutoNetkit: simplifying large scale, open-source network experimentation.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On the identifiability of multi-observer hidden Markov models.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
GATEway: symbiotic inter-domain traffic engineering.
Telecommun. Syst., 2011

10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems.
IEEE J. Sel. Areas Commun., 2011

The Internet Topology Zoo.
IEEE J. Sel. Areas Commun., 2011

Planarity of data networks.
Proceedings of the 23rd International Teletraffic Congress, 2011

Network link tomography and compressive sensing.
Proceedings of the SIGMETRICS 2011, 2011

Diffusion Wavelets-Based Analysis on Traffic Matrices.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Efficient network-wide flow record generation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Generalized graph products for network design and analysis.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

On the success of network inference using a markov routing model.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
A Case Study of the Accuracy of SNMP Measurements.
J. Electr. Comput. Eng., 2010

BGP route prediction within ISPs.
Comput. Commun., 2010

How to Build Complex, Large-Scale Emulated Networks.
Proceedings of the Testbeds and Research Infrastructures. Development of Networks and Communities, 2010

BasisDetect: a model-based network event detection framework.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
The Measurement Paradox in Valiant Network Design.
J. Electr. Comput. Eng., 2009

Hiccups on the road to privacy-preserving linear programming.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Spatio-temporal compressive sensing and internet traffic matrices.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Stable and flexible iBGP.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Humpty Dumpty: Putting iBGP Back Together Again.
Proceedings of the NETWORKING 2009, 2009

Internet optometry: assessing the broken glasses in internet reachability.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

2008
Guest editorial - internet scalability: properties and evolution.
IEEE Netw., 2008

The need for simulation in evaluating anomaly detectors.
Comput. Commun. Rev., 2008

Maximizing Networking Lifetime in Wireless Sensor Networks with Regular Topologies.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

Bigfoot, sasquatch, the yeti and other missing links: what we don't know about the as graph.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

Towards a meaningful MRA of traffic matrices.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

On the predictive power of shortest-path weight inference.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

Where's Waldo? practical searches for stability in iBGP.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

2007
Some remarks on unexpected scaling exponents.
Comput. Commun. Rev., 2007

Modeling BGP Table Fluctuations.
Proceedings of the Managing Traffic Performance in Converged Networks, 2007

Testing the reachability of (new) address space.
Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, 2007

Node Localisation in Wireless Ad Hoc Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Multiple Target Localisation in Sensor Networks with Location Privacy.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

2006
The many facets of internet topology and traffic.
Networks Heterog. Media, 2006

A Comparison of Poisson and Uniform Sampling for Active Measurements.
IEEE J. Sel. Areas Commun., 2006

Secure distributed data-mining and its application to large-scale network measurements.
Comput. Commun. Rev., 2006

Public review for the devil and packet trace anonymization.
Comput. Commun. Rev., 2006

Building an AS-topology model that captures route diversity.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Privacy-preserving performance measurements.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006

2005
Estimating point-to-point and point-to-multipoint traffic matrices: an information-theoretic approach.
IEEE/ACM Trans. Netw., 2005

Simplifying the synthesis of internet traffic matrices.
Comput. Commun. Rev., 2005

Fundamental bounds on the accuracy of network performance measurements.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Traffic Matrix Reloaded: Impact of Routing Changes.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005

Network Anomography.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Combining routing and traffic data for detection of IP forwarding anomalies.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

IP forwarding anomalies and improving their detection using multiple data sources.
Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, 2004

Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Pragmatic modeling of broadband access traffic.
Comput. Commun., 2003

Fast accurate computation of large-scale IP traffic matrices from link loads.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

Performance of estimated traffic matrices in traffic engineering.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

An information-theoretic approach to traffic matrix estimation.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003

Traffic engineering with estimated traffic matrices.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

BGP beacons.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

2002
Martingale Methods for Analysing Single-Server Queues.
Queueing Syst. Theory Appl., 2002

Self-similar traffic and network dynamics.
Proc. IEEE, 2002

A case study of OSPF behavior in a large enterprise network.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

Experience in measuring backbone traffic variability: models, metrics, measurements and meaning.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

2000
Real-time estimation of the parameters of long-range dependence.
IEEE/ACM Trans. Netw., 2000

1999
Measuring Long-Range Dependence under Changing Traffic Conditions.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

Queue-Length Distributions for Multi-Priority Queueing Systems.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

1998
Computing Queue-Length Distributions for Power-Law Queues.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

1996
The Determinant of a Triangular-Block Matrix.
SIAM Rev., 1996


  Loading...