Follow
Nicholas Weaver
Nicholas Weaver
International Computer Science Institute
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
How to own the internet in your spare time
S Staniford, V Paxson, N Weaver
11th USENIX Security Symposium (USENIX Security 02), 2002
17772002
Inside the slammer worm
D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver
IEEE Security & Privacy 1 (4), 33-39, 2003
14792003
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
10632014
A taxonomy of computer worms
N Weaver, V Paxson, S Staniford, R Cunningham
Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003
7652003
Netalyzr: Illuminating the edge network
C Kreibich, N Weaver, B Nechaev, V Paxson
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010
4652010
Very fast containment of scanning worms, revisited
N Weaver, S Staniford, V Paxson
Malware Detection, 113-145, 2007
3942007
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3732011
Method and system for reducing the rate of infection of a communications network by a software worm
S Staniford, C Kahn, N Weaver, C Coit, R Jonkman
US Patent App. 10/313,623, 2004
3552004
The spread of the sapphire/slammer worm
D Moore
http://www. cs. berkeley. edu/~ nweaver/sapphire, 2003
3502003
The top speed of flash worms
S Staniford, D Moore, V Paxson, N Weaver
Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004
2992004
Protocol-independent adaptive replay of application dialog.
W Cui, V Paxson, N Weaver, RH Katz
NDSS, 2006
2862006
Global measurement of {DNS} manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th USENIX Security Symposium (USENIX Security 17), 307-323, 2017
2002017
{PharmaLeaks}: Understanding the Business of Online Pharmaceutical Affiliate Programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
21st USENIX Security Symposium (USENIX Security 12), 1-16, 2012
1782012
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1672011
Detecting In-Flight Page Changes with Web Tripwires.
C Reis, SD Gribble, T Kohno, NC Weaver
NSDI 8, 31-44, 2008
1552008
The SFRA: a corner-turn FPGA architecture
N Weaver, J Hauser, J Wawrzynek
Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field …, 2004
1482004
Warhol worms: The potential for very fast Internet plaques
N Weaver
http://www. cs. berkeley. edu/~ nweaver/warhol. html, 2001
1482001
Exploiting underlying structure for detailed reconstruction of an internet-scale event
A Kumar, V Paxson, N Weaver
Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 33-33, 2005
1442005
Examining how the great firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Proceedings of the 2015 Internet Measurement Conference, 445-458, 2015
1422015
Botcoin: Monetizing stolen cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS 2014, 1-16, 2014
1302014
The system can't perform the operation now. Try again later.
Articles 1–20