Geoffrey M. Voelker
Cited by
Cited by
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker, S Savage
ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
On the placement of web server replicas
L Qiu, VN Padmanabhan, GM Voelker
Proceedings IEEE INFOCOM 2001. Conference on Computer Communicationsá…, 2001
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 15th ACM SIGKDD international conference on Knowledgeá…, 2009
Internet quarantine: Requirements for containing self-propagating code
D Moore, C Shannon, GM Voelker, S Savage
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEEá…, 2003
On the scale and performance of cooperative web proxy caching
A Wolman, M Voelker, N Sharma, N Cardwell, A Karlin, HM Levy
Proceedings of the seventeenth ACM symposium on Operating systems principlesá…, 1999
Characterizing user behavior and network performance in a public wireless LAN
A Balachandran, GM Voelker, P Bahl, PV Rangan
Proceedings of the 2002 ACM SIGMETRICS international conference oná…, 2002
Understanding availability
R Bhagwan, S Savage, GM Voelker
Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeleyá…, 2003
Identifying suspicious URLs: an application of large-scale online learning
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 26th annual international conference on machine learningá…, 2009
Total Recall: System Support for Automated Availability Management.
R Bhagwan, K Tati, Y Cheng, S Savage, GM Voelker
Nsdi 4, 25-25, 2004
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communicationsá…, 2008
Difference engine: Harnessing memory redundancy in virtual machines
D Gupta, S Lee, M Vrable, S Savage, AC Snoeren, G Varghese, ...
Communications of the ACM 53 (10), 85-93, 2010
End-to-end differentiation of congestion and wireless losses
S Cen, PC Cosman, GM Voelker
IEEE/ACM Transactions on networking 11 (5), 703-717, 2003
Sora: high-performance software radio using general-purpose multi-core processors
K Tan, H Liu, J Zhang, Y Zhang, J Fang, GM Voelker
Communications of the ACM 54 (1), 99-107, 2011
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ...
Proceedings of the twentieth ACM symposium on Operating systems principlesá…, 2005
Detour: Informed Internet routing and transport
S Savage, T Anderson, A Aggarwal, D Becker, N Cardwell, A Collins, ...
Ieee Micro 19 (1), 50-59, 1999
Access and mobility of wireless PDA users
M McNett, GM Voelker
ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 40-55, 2005
Measurement and analysis of a streaming media workload
M Chesire, A Wolman, GM Voelker, HM Levy
3rd USENIX Symposium on Internet Technologies and Systems (USITS 01), 2001
Jigsaw: Solving the puzzle of enterprise 802.11 analysis
YC Cheng, J Bellardo, P Benk÷, AC Snoeren, GM Voelker, S Savage
ACM SIGCOMM Computer Communication Review 36 (4), 39-50, 2006
An analysis of underground forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurementá…, 2011
The system can't perform the operation now. Try again later.
Articles 1–20