BibBase mirkovic, j
generated by bibbase.org
  2023 (1)
Defending Root DNS Servers Against DDoS Using Layered Defenses. Rizvi, A S M; Mirkovic, J.; Heidemann, J.; Hardaker, W.; and Story, R. In IEEE COMSNETS, 2023.
link   bibtex  
  2022 (7)
Polymorphic Malware Behavior Through Network Trace Analysis. Deng, X.; and Mirkovic, J. In Proceedings of 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022.
link   bibtex  
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. Weideman, N.; Wang, H.; Kann, T.; Zahabizadeh, S.; Wu, W.; Tandon, R.; Mirkovic, J.; and Hauser, C. In RAID, 2022.
link   bibtex  
I know what you did on Venmo: Discovering privacy leaks in mobile social payments. Tandon, R.; Charnsethikul, P.; Arora, I.; Murthy, D.; and Mirkovic, J. In Privacy Enhancing Technologies Symposium (PETS), 2022.
link   bibtex  
Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts. Balenson, D.; Benzel, T.; Eide, E.; Emmerich, D.; Johnson, D.; Mirkovic, J.; and Tinnel, L. In Cyber Security Experimentation and Test (CSET), 2022.
link   bibtex  
AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs. Tandon, R.; Charnsethikul, P.; Kallitsis, M.; and Mirkovic, J. In Globecom, 2022.
link   bibtex  
Samba: Identifying Inappropriate Videos for Young Children on YouTube. Binh, L.; Tandon, R.; Oinar, C.; Liu, J.; Durairaj, U.; Guo, J.; Zahabizadeh, S.; Ilango, S.; Tang, J.; Morstatter, F.; Woo, S.; and Mirkovic, J. In 31st ACM International Conference on Information & Knowledge Management (CKIM), 2022.
link   bibtex  
Xatu: Boosting Existing DDoS Detection Systems Using Auxiliary Signals. Xu, Z.; Ramanathan, S.; Ruth, A.; Mirkovic, J.; and Yu, M. In CoNext, 2022.
link   bibtex  
  2021 (1)
User Experiences on Network Testbeds. Mirkovic, J.; and Pusey, P. In Proceedings of 14th Cyber Security Experimentation and Test (CSET), 2021.
link   bibtex  
  2020 (6)
Using Terminal Histories to Monitor Student Progress on Hands-on Exercises. Mirkovic, J.; Aggarwal, A.; Weinman, D.; Lepe, P.; Mache, J.; and Weiss, R. In Proceedings of Special Interest Group on Computer Science Education Symposium (SIGCSE), 2020.
link   bibtex  
BLAG: Improving the Accuracy of Blocklists. Ramanathan, S.; Mirkovic, J.; and Yu, M. In 27th Annual Network and Distributed System Security Symposium, NDSS, pages 23–26, 2020.
link   bibtex  
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags. Di Tizio, G.; Massacci, F.; Allodi, L.; Dashevskyi, S.; and Mirkovic, J. In Workshop on Cyber Range Technologies and Applications (CACOE), 2020.
link   bibtex  
Quantifying the Impact of Blocklisting in the Age of Address Reuse. Ramanathan, S.; Hossain, A.; Mirkovic, J.; Yu, M.; and Afroz, S. In Proceedings of the ACM Internet Measurement Conference, pages 360–369, 2020.
link   bibtex  
Quantifying Cloud Misbehavior. Tandon, R.; Charnsetikul, P.; and Mirkovic, J. In Proceedings of the IEEE CloudNet, 2020.
link   bibtex  
Malware Behavior Through Network Trace Analysis. Deng, X.; and Mirkovic, J. In Proceedings of International Networking Conference (INC), 2020.
link   bibtex  
  2019 (6)
Techreport ISI-TR-699 LegoTG: Composable Traffic Generation with a Custom Blueprint. Mirkovic, J.; and Bartlett, G. . 2019.
link   bibtex  
Using Episodic Memory for User Authentication. Woo, S. S; Artstein, R.; Kaiser, E.; Le, X.; and Mirkovic, J. ACM Transactions on Privacy and Security (TOPS), 22(2): 11. 2019.
link   bibtex  
Improving Testbed Experiment Design Through Shifting User Interface Emphasis. Bartlett, G.; Mirkovic, J.; and Blythe, J. Technical Report ISI-TR-737, 2019.
link   bibtex  
Designing for Fallible Humans. Mirkovic, J.; and Woo, S. S In Humans and CyberSecurity Workshop (HACS), 2019.
link   bibtex  
Measuring Student Learning On Network Testbeds. Lepe, P.; Aggarwal, A.; Mirkovic, J.; Mache, J.; Weiss, R.; and Weinmann, D. In Midscale Education and Research Infrastructure and Tools (MERIT) Workshop, pages 1–2, 2019. IEEE
link   bibtex  
Defending Web Servers Against Flash Crowd Attacks. Tandon, R.; Palia, A.; Ramani, J.; Paulsen, B.; Bartlett, G.; and Mirkovic, J. In Midscale Education and Research Infrastructure and Tools (MERIT) Workshop, pages 1–2, 2019. IEEE
link   bibtex  
  2018 (7)
Handling Anti-Virtual Machine Techniques in Malicious Software. Shi, H.; Mirkovic, J.; and Alwabel, A. ACM Transactions on Privacy and Security (TOPS), 21(1): 2. 2018.
link   bibtex  
Memorablity and Security of Different Passphrase Generation Methods. Woo, S. S; and Mirkovic, J. Korea Institute of Information Security and Cryptology, 28(1): 29–35. 2018.
link   bibtex  
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes. Hanamsagar, A.; Woo, S. S; Kanich, C.; and Mirkovic, J. In ACM Conference on Human Factors in Computing Systems (CHI), 2018.
link   bibtex  
Malware Analysis Through High-level Behavior. Deng, X.; and Mirkovic, J. In Proceedings of Cyber Security Experimentation and Test (CSET) Workshop, 2018.
link   bibtex  
DEW: Distributed Experiment Workflows. Mirkovic, J.; Bartlett, G.; and Blythe, J. In Proceedings of Cyber Security Experimentation and Test (CSET) Workshop, 2018.
link   bibtex  
GuidedPass: Helping Users to Create Strong and Memorable Passwords. Woo, S. S; and Mirkovic, J. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), pages 250–270, 2018. Springer
link   bibtex  
SENSS Against Volumetric DDoS Attacks. Ramanathan, S.; Mirkovic, J.; Yu, M.; and Zhang, Y. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), pages 266–277, 2018. ACM
link   bibtex  
  2017 (6)
Enabling SDN Experimentation in Network Testbeds. Sivaramakrishnan, S.; Mirkovic, J.; Kannan, P. G; Choon, C. M.; and Sklower, K. In ACM SDNNFV Security Workshop, 2017.
link   bibtex  
Do You See Me Now? Sparsity in Passive Observations of Address Liveness. Mirkovic, J.; Bartlett, G.; Heidemann, J.; Shi, H.; and Deng, X. In Traffic Measurement and Analysis Conference (TMA), 2017.
link   bibtex  
Hiding debuggers from malware with Apate. Shi, H.; and Mirkovic, J. In Proceedings of the Symposium on Applied Computing, pages 1703–1710, 2017. ACM
link   bibtex  
Understanding Malware’s Network Behaviors using Fantasm. Deng, X.; Shi, H.; and Mirkovic, J. In Learning from Authoritative Security Experiment Results (LASER) Workshop, 2017. USENIX Association
link   bibtex  
Commoner Privacy And A Study On Network Traces. Deng, X.; and Mirkovic, J. In Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC), pages 566–576, 2017. ACM
link   bibtex  
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. Mirkovic, J.; Kline, E.; and Reiher, P. In Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC), pages 474–485, 2017. ACM
link   bibtex  
  2016 (3)
DETERLab and the DETER Project. Wroclawski, J.; Benzel, T.; Blythe, J.; Faber, T.; Hussain, A.; Mirkovic, J.; and Schwab, S. In The GENI Book, pages 35–62. Springer International Publishing, 2016.
link   bibtex  
Good Automatic Authentication Question Generation. Woo, S. S; Li, Z.; and Mirkovic, J. In The 9th International Natural Language Generation conference, pages 203, 2016.
link   bibtex  
Improving Recall and Security of Passphrases Through Use of Mnemonics. Woo, S. S; and Mirkovic, J. In Passwords, 2016.
link   bibtex  
  2015 (5)
SENSS: observe and control your own traffic in the internet. Alwabel, A.; Yu, M.; Zhang, Y.; and Mirkovic, J. ACM SIGCOMM Computer Communication Review, 44(4): 349–350. 2015.
link   bibtex  
Evaluation theory and practice applied to cybersecurity education. Dark, M.; and Mirkovic, J. IEEE Security & Privacy, 13(2): 75–80. 2015.
link   bibtex  
Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015. Mirkovic, J.; Tabor, A.; Woo, S.; and Pusey, P. In 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15), 2015.
link   bibtex  
Evaluating Cybersecurity Education Interventions: Three Case Studies. Mirkovic, J.; Dark, M.; Du, W.; Vigna, G.; and Denning, T. IEEE Security & Privacy, 13(3): 63–69. 2015.
link   bibtex  
Expressing Different Traffic Models Using The LegoTG Framework. Bartlett, G.; and Mirkovic, J. In 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, pages 56–63, 2015. IEEE
link   bibtex  
  2014 (7)
Optimal Application Allocation on Multiple Public Clouds. Woo, S. S; and Mirkovic, J. Computer Networks. 2014.
link   bibtex  
Life-Experience Passwords (LEPs). Woo, S. S; Mirkovic, J.; Artstein, R.; and Kaiser, E. In Symposium on Usable Privacy and Security (SOUPS), 2014.
link   bibtex  
Class Capture-the-Flag Exercises. Mirkovic, J.; and Peterson, P. A. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). 2014.
link   bibtex  
Safe and automated live malware experimentation on public testbeds. Alwabel, A.; Shi, H.; Bartlett, G.; and Mirkovic, J. In 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014.
link   bibtex  
Cardinal pill testing of system virtual machines. Shi, H.; Alwabel, A.; and Mirkovic, J. In 23rd USENIX Security Symposium (USENIX Security 14), pages 271–285, 2014.
link   bibtex  
Critter: Content-Rich Traffic Trace Repository. Sharma, V.; Bartlett, G.; and Mirkovic, J. In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, pages 13–20, 2014. ACM
link   bibtex  
SENSS: Software Defined Security Service. Yu, M.; Zhang, Y.; Mirkovic, J.; and Alwabel, A. In Open Networking Summit (ONS 2014), 2014.
link   bibtex  
  2013 (1)
Deterlab testbed for cybersecurity research and education. Mirkovic, J.; and Benzel, T. Journal of Computing Sciences in Colleges, 28(4): 163–163. 2013.
link   bibtex  
  2012 (3)
Teaching cybersecurity with DeterLab. Mirkovic, J.; and Benzel, T. IEEE Security & Privacy, 10(1): 73–76. 2012.
link   bibtex  
Beyond Disk Imaging for Preserving User State in Network Testbeds. Mirkovic, J.; Alwabel, A.; and Faber, T. In Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test, pages 2–2, 2012. USENIX Association
link   bibtex  
Reducing allocation errors in network testbeds. Mirkovic, J.; Shi, H.; and Hussain, A. In Proceedings of the 2012 ACM conference on Internet measurement conference, pages 495–508, 2012. ACM
link   bibtex  
  2011 (4)
Comparative evaluation of spoofing defenses. Mirkovic, J.; and Kissel, E. IEEE Transactions on Dependable and Secure Computing, 8(2): 218–232. 2011.
link   bibtex  
A semantic framework for data analysis in networked systems. Viswanathan, A.; Hussain, A.; Mirkovic, J.; Schwab, S.; and Wroclawski, J. In Proc. of the USENIX Symposium on Networked Systems Design and Implementation, 2011.
link   bibtex  
Teaching Security With Network Testbeds. Mirkovic, J.; Ryan, M.; Hickey, J.; Sklower, K.; Reiher, P.; Peterson, P. A.; Kang, B H.; Chuah, M. C.; Massey, D.; and Ragusa, G. In ACM SIGCOMM Workshop on Education, 2011.
link   bibtex  
Collaborative DoS Defenses. Mirkovic, J. In Encyclopedia of Cryptography and Security, pages 217–220. Springer US, 2011.
link   bibtex  
  2010 (3)
The DETER project: Advancing the science of cyber security experimentation and test. Mirkovic, J.; Benzel, T. V; Faber, T.; Braden, R.; Wroclawski, J. T; and Schwab, S. In Technologies for Homeland Security (HST), 2010 IEEE International Conference on, pages 1–7, 2010. IEEE
link   bibtex  
Tools for worm experimentation on the DETER testbed. Wei, S.; Hussain, A.; Mirkovic, J.; and Ko, C. International Journal of Communication Networks and Distributed Systems, 5(1-2): 151–171. 2010.
link   bibtex  
DADL: Distributed Application Description Language. Mirkovic, J.; Faber, T.; Hsieh, P.; Malaiyandisamy, G.; and Malaviya, R. USC/ISI Technical Report# ISI-TR-664. 2010.
link   bibtex  
  2009 (7)
Accurately measuring denial of service in simulation and testbed experiments. Mirkovic, J.; Hussain, A.; Fahmy, S.; Reiher, P.; and Thomas, R. K IEEE Transactions on Dependable and Secure Computing, 6(2): 81–95. 2009.
link   bibtex  
Modeling human behavior for defense against flash-crowd attacks. Oikonomou, G.; and Mirkovic, J. In 2009 IEEE International Conference on Communications (ICC), pages 1–6, 2009. IEEE
link   bibtex  
Current developments in DETER cybersecurity testbed technology. Benzel, T.; Braden, B.; Faber, T.; Mirkovic, J.; Schwab, S.; Sollins, K.; and Wroclawski, J. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology, pages 57–70, 2009. IEEE
link   bibtex  
How to test DoS defenses. Mirkovic, J.; Fahmy, S.; Reiher, P.; and Thomas, R. K In Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pages 103–117, 2009.
link   bibtex  
RAD: Reflector attack defense using message authentication codes. Kline, E.; Beaumont-Gay, M.; Mirkovic, J.; and Reiher, P. In 2009 Annual Computer Security Applications Conference (ACSAC), pages 269–278, 2009. IEEE
link   bibtex  
Current developments in DETER cybersecurity testbed technology. Benzel, T.; Braden, B.; Faber, T.; Mirkovic, J.; Schwab, S.; Sollins, K.; and Wroclawski, J. In Cybersecurity Applications & Technology Conference For Homeland Security (CATCH)., pages 57–70, 2009. IEEE
link   bibtex  
Comparative Evaluation of Spoofing Defenses. Kissel, E.; and Mirkovic, J Proceedings of IEEE Transactions on Dependable and Secure Computing,218–232. 2009.
link   bibtex  
  2008 (8)
Privacy-safe network trace sharing via secure queries. Mirkovic, J. In Proceedings of the 1st ACM workshop on Network Data Anonymization, pages 3–10, 2008. ACM
link   bibtex  
Building accountability into the future Internet. Mirkovic, J.; and Reiher, P. In 4th Workshop on Secure Network Protocols, 2008. NPSec 2008. , pages 45–51, 2008. IEEE
link   bibtex  
Testing a collaborative DDoS defense in a red team/blue team exercise. Mirkovic, J.; Reiher, P.; Papadopoulos, C.; Hussain, A.; Shepard, M.; Berg, M.; and Jung, R. IEEE Transactions on Computers, 57(8): 1098–1112. 2008.
link   bibtex  
Correcting congestion-based error in network telescope's observations of worm dynamics. Wei, S.; and Mirkovic, J. In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, pages 125–130, 2008. ACM
link   bibtex  
A two-constraint approach to risky cybersecurity experiment management. Wroclawski, J.; Mirkovic, J.; Faber, T.; and Schwab, S. In Invited paper at the Sarnoff Symposium, 2008.
link   bibtex  
Combining speak-up with DefCOM for improved DDoS defense. Mehta, M.; Thapar, K.; Oikonomou, G.; and Mirkovic, J. In 2008 IEEE International Conference on Communications, pages 1708–1714, 2008. IEEE
link   bibtex  
Managing the Health of Security Experiments. Mirkovic, J.; Sollins, K. R; and Wroclawski, J. In CSET, 2008.
link   bibtex  
Learning the valid incoming direction of IP packets. Li, J.; Mirkovic, J.; Ehrenkranz, T.; Wang, M.; Reiher, P.; and Zhang, L. Computer Networks, 52(2): 399–417. 2008.
link   bibtex  
  2007 (8)
Towards user-centric metrics for denial-of-service measurement. Mirkovic, J.; Hussain, A.; Wilson, B.; Fahmy, S.; Reiher, P.; Thomas, R.; Yao, W.; and Schwab, S. In Proceedings of the 2007 workshop on Experimental Computer Science, pages 8, 2007. ACM
link   bibtex  
Fine-grained capabilities for flooding DDoS defense using client reputations. Natu, M.; and Mirkovic, J. In Proceedings of the 2007 workshop on Large Scale Attack Defense, pages 105–112, 2007. ACM
link   bibtex  
DDoS benchmarks and experimenter's workbench for the DETER testbed. Mirkovic, J.; Wei, S.; Hussain, A.; Wilson, B.; Thomas, R.; Schwab, S.; Fahmy, S.; Chertov, R.; and Reiher, P. In Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, pages 1–7, 2007. IEEE
link   bibtex  
Automating ddos experimentation. Mirkovic, J.; Wilson, B.; Hussain, A.; Fahmy, S.; Reiher, P.; Thomas, R.; Schwab, S.; and Centreville, V. In Proc. of the DETER Community Workshop on Cyber Security Experimentation and Test. USENIX Association, 2007.
link   bibtex  
When is service really denied?: a user-centric dos metric. Mirkovic, J.; Hussain, A.; Willson, B.; Fahmy, S.; Yao, W.; Reiher, P.; Schwab, S.; and Thomas, R. In ACM SIGMETRICS Performance Evaluation Review, volume 35, pages 357–358, 2007. ACM
link   bibtex  
A user-centric metric for denial-of-service measurement. Mirkovic, J.; Hussain, A.; Wilson, B.; Fahmy, S.; Reiher, P.; Thomas, R.; Yao, W.; and Schwab, S. In Proc. of Workshop on Experimental Comp. Sci, 2007.
link   bibtex  
Building reputations for internet clients. Wei, S.; and Mirkovic, J. Electronic Notes in Theoretical Computer Science, 179: 17–30. 2007.
link   bibtex  
DDoS Benchmarks and Experimentation Workbench for the DETER Testbed. Mirkovic, J.; Wei, S.; Hussain, A.; Wilson, B.; Thomas, R.; and Schwab, S. In In Proceedings of the 3rd IEEE Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2007, 2007. Citeseer
link   bibtex  
  2006 (8)
A framework for a collaborative DDoS defense. Oikonomou, G.; Mirkovic, J.; Reiher, P.; and Robinson, M. In 22nd Annual Computer Security Applications Conference (ACSAC), pages 33–42, 2006. IEEE
link   bibtex  
Measuring denial of service. Mirkovic, J.; Reiher, P.; Fahmy, S.; Thomas, R.; Hussain, A.; Schwab, S.; and Ko, C. In Proceedings of the 2nd ACM workshop on Quality of Protection, pages 53–58, 2006. ACM
link   bibtex  
Benchmarks for DDoS defense evaluation. Mirkovic, J.; Arikan, E.; Wei, S.; Thomas, R.; Fahmy, S.; and Reiher, P. In MILCOM 2006-2006 IEEE Military Communications Conference, pages 1–10, 2006. IEEE
link   bibtex  
Profiling and Clustering Internet Hosts. Wei, S.; Mirkovic, J.; and Kissel, E. In Proceedings of the WORLDCOMP International Conference on Data Mining DMIN, volume 6, pages 269–75, 2006.
link   bibtex  
DDoS experiment methodology. Hussain, A.; Schwab, S.; Thomas, R.; Fahmy, S.; and Mirkovic, J. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation, 2006.
link   bibtex  
A realistic simulation of internet-scale events. Wei, S.; and Mirkovic, J. In Proceedings of the 1st international conference on Performance evaluation methodolgies and tools, pages 28, 2006. ACM
link   bibtex  
Measuring impact of dos attacks. Mirkovic, J.; Fahmy, S.; Reiher, P.; Thomas, R.; Hussain, A.; Schwab, S.; and Ko, C. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation, 2006.
link   bibtex  
A Practical IP Spoofing Defense Through Route-Based Filtering. Mirkovic, J.; Jevtic, N.; and Reiher, P. University of Delaware CIS Department Technical Report CIS-TR-2006-332. 2006.
link   bibtex  
  2005 (3)
D-WARD: a source-end defense against flooding denial-of-service attacks. Mirkovic, J.; and Reiher, P. IEEE transactions on Dependable and Secure Computing, 2(3): 216–232. 2005.
link   bibtex  
Distributed worm simulation with a realistic internet model. Wei, S.; Mirkovic, J.; and Swany, M. In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation, pages 71–79, 2005. IEEE Computer Society
link   bibtex  
Distributed defense against DDOS attacks. Mirkovic, J.; Robinson, M.; Reiher, P.; and Oikonomou, G. University of Delaware CIS Department Technical Report CIS-TR-2005-02. 2005.
link   bibtex  
  2004 (3)
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security). Mirkovic, J.; Dietrich, S.; Dittrich, D.; and Reiher, P. . 2004.
link   bibtex  
Internet Denial of Service: Attack and Defense Mechanisms. Dittrich, D.; Mirkovic, J.; Reiher, P.; and Dietrich, S. 2004.
link   bibtex  
A taxonomy of DDoS attacks and DDoS defense mechanisms. Mirkovic, J.; Martin, J.; and Reiher, P. ACM SIGCOMM Computer Communication Review, 34(2): 39–53. 2004.
link   bibtex  
  2003 (4)
D-WARD: source-end defense against distributed denial-of-service attacks. Mirkovic, J. Ph.D. Thesis, University of California Los Angeles, 2003.
link   bibtex  
Alliance formation for DDoS defense. Mirkovic, J.; Robinson, M.; and Reiher, P. In Proceedings of the 2003 workshop on New Security Paradigms, pages 11–18, 2003. ACM
link   bibtex  
Source-end DDoS defense. Mirkovic, J.; Prier, G.; and Reiher, P. In Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003., pages 171–178, 2003. IEEE
link   bibtex  
DefCOM: defensive cooperative overlay mesh. Robinson, M.; Mirkovic, J.; Michel, S.; Schnaider, M.; and Reiher, P. In DARPA Information Survivability Conference and Exposition, 2003. Proceedings, volume 2, pages 101–102, 2003. IEEE
link   bibtex  
  2002 (5)
Attacking DDoS at the source. Mirkovic, J.; Prier, G.; and Reiher, P. In 10th IEEE International Conference on Network Protocols (ICNP), pages 312–321, 2002. IEEE
link   bibtex  
SAVE: Source address validity enforcement protocol. Li, J.; Mirkovic, J.; Wang, M.; Reiher, P.; and Zhang, L. In INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, volume 3, pages 1557–1566, 2002. IEEE
link   bibtex  
Implementing Address Assurance in the Intel IXP Router. Burns, M.; Prier, G.; Mirkovic, J.; and Reiher, P. In Western Network Processors Conference, 2002.
link   bibtex  
iSAVE: Incrementally Deployable Source Address Validation. Mirkovic, J.; Xu, Z.; Li, J.; Schnaider, M.; Reiher, P.; and Zhang, L. Technical Report UCLA technical report, 2002.
link   bibtex  
Implementing address assurance in the intel ixp. Burns, M.; Prier, G.; Mirkovic, J.; and Reiher, P. In Proceedings of the Network Processors Conference (NPC), 2002.
link   bibtex  
  2001 (2)
A self-organizing approach to data forwarding in large-scale sensor networks. Mirkovic, J.; Venkataramani, G. P.; Lu, S.; and Zhang, L. In IEEE International Conference on Communications (ICC), volume 5, pages 1357–1361, 2001. IEEE
link   bibtex  
Research and Development in E-Business on the Internet. Milutinovic, V; Cvetkovic, D; Aleksic, M; Davidovic, G; Dimitrijevic, Z; Dingarac, D; Grubic, M; Grujic, A; Horvat, D; Horvat, Z; and others In System Sciences, 2001. Proceedings of the 34th Annual Hawaii International Conference on, pages 10–pp, 2001. IEEE
link   bibtex  
  2000 (1)
Genetic search based on multiple mutations. Milutinovic, V.; Cvetkovic, D.; and Mirkovic, J. Computer, 33(11): 118–119. 2000.
link   bibtex  
  1999 (2)
A Self-Organizing Approach to Data Forwarding in Large-Scale Sensor Networks. Mirkovic, J.; Venkataramani, G. P.; Lu, S.; and Zhang, L. . 1999.
link   bibtex  
Genetic algorithms for intelligent internet search: a survey and a package for experimenting with various locality types. Mirkovic, J; Cvetkovic, D; Tomca, N; Cveticanin, S; Slijepcevic, S; Obradovic, V; Mrkic, M; Cakulev, I; Kraus, L.; and Milutinovic, V IEEE TCCA Newsletter,118–119. 1999.
link   bibtex