Publications of N. Taft

BACK TO COATI PUBLICATION INDEX

Publications of N. Taft

Conference's articles
  1. D. Barman, J. Chandrashekar, N. Taft, M. Faloutsos, L. Huang, and F. Giroire. Impact of IT Monoculture on Behavioral End Host Intrusion Detection. In ACM SIGCOMM Workshop on Research on Enterprise Networking -- WREN, Barcelona, Spain, pages 27--36, August 2009. ACM. [PDF ] [Abstract] [bibtex-entry]
     
  2. F. Giroire, J. Chandrashekar, N. Taft, E. Schooler, and K. Papagiannaki. Exploiting Temporal Persistence to Detect Covert Botnet Channels. In Springer, editor, 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), volume 5758 of Lecture Notes in Computer Science, Saint Malo, France, pages 326--345, September 2009. [PDF ] [Abstract] [bibtex-entry]
     
  3. F. Giroire, J. Chandrashekar, G. Iannaccone, D. Papagiannaki, E. Schooler, and N. Taft. The Cubicle vs. The Coffee Shop: Behavioral Modes in Enterprise End-Users. In Proceeding of the Passive and Active Monitoring conference (PAM08), volume 4979 of Lecture Notes in Computer Science, pages 202-211, 2008. Springer. [PDF ] [Abstract] [bibtex-entry]
     
  4. F. Giroire, A. Nucci, N. Taft, and C. Diot. Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection. In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2003. [WWW ] [PDF ] [Abstract] [bibtex-entry]
     
Internal reports
  1. F. Giroire, J. Chendrashekar, G. Iannaccone, T. Karagiannis, K. Papagiannaki, E. Schooler, and N. Taft. Inside the Forbidden City: A look at End-Host Traffic inside a Modern Enterprise. Technical Report, Intel Research, 2007. [PDF ] [bibtex-entry]
     
  2. F. Giroire, J. Chendrashekar, N. Taft, G. Iannaccone, T. Karagiannis, K. Papagiannaki, and E. Schooler. The Case For Personalizing End-Host Detectors.. Technical Report, Intel Research, 2007. [PDF ] [bibtex-entry]
     
  3. F. Giroire, A. Nucci, N. Taft, and C. Diot. Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection. Technical Report, Sprint, 2002. [Abstract] [bibtex-entry]
     
Miscellaneous
  1. F. Giroire, J. Chandrashekar, N. Taft, E. Schooler, and K. Papagiannaki. Method and System for Detecting and Reducing Botnet Activity, December 2008.
    Note: Docket Number P28858 / 45631-207291. [bibtex-entry]
     
  2. F. Giroire, A. Nucci, N. Taft, and C. Diot. Method and Systems for Correlating Practical Constraints in a Network, July 2008.
    Note: Patent number US 7,394,760 B1. Filled in July 2003. [bibtex-entry]
     
  3. F. Giroire, A. Nucci, N. Taft, and C. Diot. Method and Systems for Identifying Optimal Mapping in a Network, November 2008.
    Note: Patent number US 7,453,824 B1. Filled in July 2003. [bibtex-entry]
     

BACK TO COATI PUBLICATION INDEX



Last modified: Fri Oct 20 15:06:12 2017