{"id":11,"date":"2023-10-06T18:06:49","date_gmt":"2023-10-06T18:06:49","guid":{"rendered":"https:\/\/www.isi.edu\/people-mirkovic\/?page_id=11"},"modified":"2025-06-13T17:41:27","modified_gmt":"2025-06-13T17:41:27","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/people-mirkovic\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n\n\t\n        <div class=\"pubs\">\n\n                                <h2 class=\"year h4\">2025<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/46368\/cisaf-a-framework-for-estimating-the-security-posture-of-academic-and-research-cyberinfrastructure\/\" target=\"_blank\">\n                                CISAF: A Framework for Estimating the Security Posture of Academic and Research Cyberinfrastructure                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Qishen Liang, Jelena Mirkovic, Brian Kocoloski                        <\/div>\n                    \n                    <div>\n                        <i>arXiv preprint arXiv:2509.00266<\/i>,&nbsp;2025\n\n                                                    <div>\n                                <a href=\"https:\/\/arxiv.org\/pdf\/2509.00266\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/33174\/legitimate-and-malicious-use-cases-for-sphere-cyberinfrastructure\/\" target=\"_blank\">\n                                Legitimate and malicious use cases for SPHERE cyberinfrastructure                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Brian Kocoloski, Jelena Mirkovic, Qishen Liang, Stingley Spencer                        <\/div>\n                    \n                    <div>\n                        <i>Zenodo<\/i>,&nbsp;2025\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20690\/data-flows-in-you-benchmarking-and-improving-static-data-flow-analysis-on-binary-executables\/\" target=\"_blank\">\n                                Data Flows in You: Benchmarking and Improving Static Data-flow Analysis on Binary Executables                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Nicolaas Weideman, Sima Arasteh, Mukund Raghothaman, Jelena Mirkovic, Christophe Hauser                        <\/div>\n                    \n                    <div>\n                        <i>arXiv preprint arXiv:2506.00313<\/i>,&nbsp;2025\n\n                                                    <div>\n                                <a href=\"https:\/\/arxiv.org\/pdf\/2506.00313\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/21727\/unmasking-the-internet-a-survey-of-fine-grained-network-traffic-analysis\/\" target=\"_blank\">\n                                Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Yebo Feng, Jun Li, Jelena Mirkovic, Cong Wu, Chong Wang, Hao Ren, Jiahua Xu, Yang Liu                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Communications Surveys &amp; Tutorials<\/i>,&nbsp;2025\n\n                                                    <div>\n                                <a href=\"https:\/\/discovery.ucl.ac.uk\/id\/eprint\/10206661\/1\/Unmasking_the_Internet_A_Survey_of_Fine-Grained_Network_Traffic_Analysis.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16263\/puppeteer-leveraging-a-large-language-model-for-scambaiting\/\" target=\"_blank\">\n                                Puppeteer: Leveraging a Large Language Model for Scambaiting                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Pithayuth Charnsethikul, Benjamin Crotty, Jelena Mirkovic, Jeffrey Liu, Rishit Saiya, Genevieve Bartlett                        <\/div>\n                    \n                    <div>\n                        2025\n\n                                                    <div>\n                                <a href=\"https:\/\/steel.isi.edu\/pubs\/puppeteer_hicss_final_version.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/25915\/navigating-social-media-privacy-awareness-preferences-and-discoverability\/\" target=\"_blank\">\n                                Navigating Social Media Privacy: Awareness, Preferences, and Discoverability                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Pithayuth Charnsethikul, Almajd Zunquti, Gale Lucas, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings on Privacy Enhancing Technologies<\/i>,&nbsp;2025\n\n                                                    <div>\n                                <a href=\"https:\/\/petsymposium.org\/popets\/2025\/popets-2025-0148.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2024<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16267\/a-study-of-unexpected-dns-queries-at-b-root\/\" target=\"_blank\">\n                                A Study of Unexpected DNS Queries at B-Root                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Dipsy Desai, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        2024\n\n                                                    <div>\n                                <a href=\"https:\/\/ant.isi.edu\/events\/dinr2024\/P\/p21.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16266\/trusted-ci-webinar-sphere-security-and-privacy-heterogeneous-environment-for-reproducible-experimentation\/\" target=\"_blank\">\n                                Trusted CI Webinar: SPHERE-Security and Privacy Heterogeneous Environment for Reproducible Experimentation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Balenson David                        <\/div>\n                    \n                    <div>\n                        2024\n\n                                                    <div>\n                                <a href=\"https:\/\/www.ideals.illinois.edu\/items\/130035\/bitstreams\/433918\/data.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/21728\/binhunter-a-fine-grained-graph-representation-for-localizing-vulnerabilities-in-binary-executables\/\" target=\"_blank\">\n                                BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables*                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Sima Arasteh, Jelena Mirkovic, Mukund Raghothaman, Christophe Hauser                        <\/div>\n                    \n                    <div>\n                        <i>2024 Annual Computer Security Applications Conference (ACSAC), 1062-1074<\/i>,&nbsp;2024\n\n                                                    <div>\n                                <a href=\"https:\/\/r-mukund.github.io\/pdf\/2024-ACSAC.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/57978\/enabling-reproducibility-through-the-sphere-research-infrastructure\/\" target=\"_blank\">\n                                Enabling reproducibility through the sphere research infrastructure                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Brian Kocoloski, David Balenson                        <\/div>\n                    \n                    <div>\n                        <i>Usenix<\/i>,&nbsp;2024\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/sites\/default\/files\/sphere_article_for_login_magazine_20241216.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2023<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20692\/cici-rssd-discern-datasets-to-illuminate-suspicious-computations-on-engineering-research-networks\/\" target=\"_blank\">\n                                CICI: RSSD: DISCERN: Datasets to Illuminate Suspicious Computations on Engineering Research Networks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 2319864. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2023\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16270\/prediction-of-network-events-via-rule-set-representations-of-machine-learning-models\/\" target=\"_blank\">\n                                Prediction of network events via rule set representations of machine learning models                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Y Kanza, B Krishnamurthy, S Ramanathan, M Yu, J Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>US Patent 11,669,751<\/i>,&nbsp;2023\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16269\/leader-defense-against-exploit-based-denial-of-service-attacks-on-web-applications\/\" target=\"_blank\">\n                                Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Rajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 26th International Symposium on Research in Attacks \u2026<\/i>,&nbsp;2023\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607238\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20691\/research-infrastructure-mid-scale-ri-1-m1-ip-sphere-security-and-privacy-heterogeneous-environment-for-reproducible-experimentation\/\" target=\"_blank\">\n                                Research Infrastructure: Mid-scale RI-1 (M1: IP): SPHERE-Security and Privacy Heterogeneous Environment for Reproducible Experimentation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 2330066. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2023\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16273\/practical-intent-driven-routing-configuration-synthesis\/\" target=\"_blank\">\n                                Practical intent-driven routing configuration synthesis                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>20th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u2026<\/i>,&nbsp;2023\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/nsdi23-ramanathan.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2022<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16281\/free-as-in-freedom-to-protest\/\" target=\"_blank\">\n                                \u201cFree\u201d as in Freedom to Protest?                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Fabio Massacci, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E Geer                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Security &amp; Privacy 20 (5), 16-21<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/ieeexplore.ieee.org\/iel7\/8013\/9888995\/09889004.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16283\/measuring-changes-in-regional-network-traffic-due-to-covid-19-stay-at-home-measures\/\" target=\"_blank\">\n                                Measuring changes in regional network traffic due to covid-19 stay-at-home measures                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Yebo Feng, Jun Li                        <\/div>\n                    \n                    <div>\n                        <i>arXiv preprint arXiv:2203.00742<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/arxiv.org\/pdf\/2203.00742\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16274\/understanding-dns-query-composition-at-b-root\/\" target=\"_blank\">\n                                Understanding DNS Query Composition at B-Root                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jacob Ginesin, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>2022 IEEE\/ACM International Conference on Big Data Computing, Applications \u2026<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/arxiv.org\/pdf\/2308.07966\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16275\/amon-senss-scalable-and-accurate-detection-of-volumetric-ddos-attacks-at-isps\/\" target=\"_blank\">\n                                AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Rajat Tandon, Pithayuth Charnsethikul, Michalis Kallitsis, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>GLOBECOM 2022-2022 IEEE Global Communications Conference, 3399-3404<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/par.nsf.gov\/servlets\/purl\/10390157\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16277\/detection-of-sparse-anomalies-in-high-dimensional-network-telescope-signals\/\" target=\"_blank\">\n                                Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Rafail Kartsioukas, Rajat Tandon, Zheng Gao, Jelena Mirkovic, Michalis Kallitsis, Stilian Stoev                        <\/div>\n                    \n                    <div>\n                        <i>arXiv preprint arXiv:2211.04918<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/arxiv.org\/pdf\/2211.04918\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16278\/did-your-child-get-disturbed-by-an-inappropriate-advertisement-on-youtube\/\" target=\"_blank\">\n                                Did your child get disturbed by an inappropriate advertisement on YouTube?                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jeffrey Liu, Rajat Tandon, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Neelesh Gupta, Zoe Zhou, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>arXiv preprint arXiv:2211.02356<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/arxiv.org\/pdf\/2211.02356\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16276\/xatu-boosting-existing-ddos-detection-systems-using-auxiliary-signals\/\" target=\"_blank\">\n                                Xatu: Boosting existing DDoS detection systems using auxiliary signals                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Zhiying Xu, Sivaramakrishnan Ramanathan, Alexander Rush, Jelena Mirkovic, Minlan Yu                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 18th International Conference on emerging Networking \u2026<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555050.3569121\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16279\/harm-dos-hash-algorithm-replacement-for-mitigating-denial-of-service-vulnerabilities-in-binary-executables\/\" target=\"_blank\">\n                                Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 25th International Symposium on Research in Attacks \u2026<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545967\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16284\/polymorphic-malware-behavior-through-network-trace-analysis\/\" target=\"_blank\">\n                                Polymorphic malware behavior through network trace analysis                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Xiyue Deng, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>2022 14th International Conference on COMmunication Systems &amp; NETworkS \u2026<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/a25-dengfinal.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16285\/i-know-what-you-did-on-venmo-discovering-privacy-leaks-in-mobile-social-payments\/\" target=\"_blank\">\n                                I know what you did on Venmo: Discovering privacy leaks in mobile social payments                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Rajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings on Privacy Enhancing Technologies<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/petsymposium.org\/popets\/2022\/popets-2022-0069.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2021<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16288\/user-experiences-on-network-testbeds\/\" target=\"_blank\">\n                                User experiences on network testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Portia Pusey                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 72-82<\/i>,&nbsp;2021\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3474728\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16290\/defending-web-servers-against-flash-crowd-attacks\/\" target=\"_blank\">\n                                Defending Web Servers Against Flash Crowd Attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Genevieve Bartlett, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Applied Cryptography and Network Security: 19th International Conference \u2026<\/i>,&nbsp;2021\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20694\/reu-site-surf-i-safe-usable-resilient-and-fair-internet\/\" target=\"_blank\">\n                                REU Site: SURF-I: Safe, Usable, Resilient and Fair Internet                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 2051101. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2021\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16292\/collaborative-dos-defenses\/\" target=\"_blank\">\n                                Collaborative DoS Defenses                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Encyclopedia of Cryptography, Security and Privacy, 1-5<\/i>,&nbsp;2021\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20693\/ccri-new-classnet-community-labeling-and-sharing-of-security-and-networking-test-datasets\/\" target=\"_blank\">\n                                CCRI: NEW: CLASSNET: Community Labeling and Sharing of Security and Networking Test datasets                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 2120400. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2021\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16294\/malware-behavior-through-network-trace-analysis\/\" target=\"_blank\">\n                                Malware behavior through network trace analysis                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Xiyue Deng, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Selected Papers from the 12th International Networking Conference: INC 2020 \u2026<\/i>,&nbsp;2021\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/inc2020.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2020<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16297\/an-experimental-approach-for-estimating-cyber-risk-a-proposal-building-upon-cyber-ranges-and-capture-the-flags\/\" target=\"_blank\">\n                                An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Giorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevskyi, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW), 56-65<\/i>,&nbsp;2020\n\n                                                    <div>\n                                <a href=\"https:\/\/research.vu.nl\/files\/359054771\/An_Experimental_Approach_for_Estimating_Cyber_Risk_a_Proposal_Building_upon_Cyber_Ranges_and_Capture_the_Flags.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16295\/quantifying-cloud-misbehavior\/\" target=\"_blank\">\n                                Quantifying cloud misbehavior                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Rajat Tandon, Jelena Mirkovic, Pithayuth Charnsethikul                        <\/div>\n                    \n                    <div>\n                        <i>2020 IEEE 9th International Conference on Cloud Networking (CloudNet), 1-8<\/i>,&nbsp;2020\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/cloudnet2020.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16296\/quantifying-the-impact-of-blocklisting-in-the-age-of-address-reuse\/\" target=\"_blank\">\n                                Quantifying the impact of blocklisting in the age of address reuse                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Sivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the ACM Internet Measurement Conference, 360-369<\/i>,&nbsp;2020\n\n                                                    <div>\n                                <a href=\"http:\/\/minlanyu.seas.harvard.edu\/writeup\/imc20.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20695\/ccri-ens-modernizing-and-streamlining-deterlab-testbed-experimentation\/\" target=\"_blank\">\n                                CCRI: ENS: Modernizing and Streamlining DeterLab Testbed Experimentation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 2016643. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2020\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16301\/blag-improving-the-accuracy-of-blacklists\/\" target=\"_blank\">\n                                Blag: Improving the accuracy of blacklists                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu                        <\/div>\n                    \n                    <div>\n                        <i>NDSS<\/i>,&nbsp;2020\n\n                                                    <div>\n                                <a href=\"https:\/\/par.nsf.gov\/servlets\/purl\/10205652\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16299\/using-terminal-histories-to-monitor-student-progress-on-hands-on-exercises\/\" target=\"_blank\">\n                                Using Terminal Histories to Monitor Student Progress on Hands-on Exercises                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Aashray Aggarwal, David Weinman, Paul Lepe, Jens Mache and Richard Weiss                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of Special Interest Group on Computer Science Education \u2026<\/i>,&nbsp;2020\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2019<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16305\/using-episodic-memory-for-user-authentication\/\" target=\"_blank\">\n                                Using episodic memory for user authentication                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Woo, Ron Artstein, Elsi Kaiser, Xiao Le, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34<\/i>,&nbsp;2019\n\n                                                    <div>\n                                <a href=\"https:\/\/www.researchgate.net\/profile\/Simon-Woo\/publication\/332216818_Using_Episodic_Memory_for_User_Authentication\/links\/5cc07f02a6fdcc1d49acb5f5\/Using-Episodic-Memory-for-User-Authentication.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16302\/designing-for-fallible-humans\/\" target=\"_blank\">\n                                Designing for fallible humans                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Simon Woo                        <\/div>\n                    \n                    <div>\n                        <i>2019 IEEE 5th International Conference on Collaboration and Internet \u2026<\/i>,&nbsp;2019\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/hacs.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16303\/measuring-student-learning-on-network-testbeds\/\" target=\"_blank\">\n                                Measuring student learning on network testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss, David Weinmann                        <\/div>\n                    \n                    <div>\n                        <i>2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2<\/i>,&nbsp;2019\n\n                                                    <div>\n                                <a href=\"https:\/\/par.nsf.gov\/servlets\/purl\/10198147\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2018<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/61625\/guidedpass-helping-users-to-create\/\" target=\"_blank\">\n                                GuidedPass: Helping Users to Create                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Wool, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Research in Attacks, Intrusions, and Defenses: 21st International Symposium \u2026<\/i>,&nbsp;2018\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20591\/satc-core-small-hardening-systems-against-low-rate-ddos-attacks\/\" target=\"_blank\">\n                                SaTC: CORE: Small: Hardening Systems Against Low-Rate DDoS Attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1815495. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2018\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16307\/leveraging-semantic-transformation-to-investigate-password-habits-and-their-causes\/\" target=\"_blank\">\n                                Leveraging semantic transformation to investigate password habits and their causes                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Ameya Hanamsagar, Simon S Woo, Chris Kanich, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems \u2026<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/www.cs.uic.edu\/~ckanich\/papers\/hanamsagar2018leveraging.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16306\/senss-against-volumetric-ddos-attacks\/\" target=\"_blank\">\n                                SENSS against volumetric DDoS attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 34th Annual Computer Security Applications Conference \u2026<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/steel.isi.edu\/members\/sivaram\/papers\/senss.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20696\/elements-software-distributed-workflows-for-cyberexperimentation\/\" target=\"_blank\">\n                                Elements: Software: Distributed Workflows for Cyberexperimentation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1835608. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2018\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16308\/memorablity-and-security-of-different-passphrase-generation-methods\/\" target=\"_blank\">\n                                Memorablity and security of different passphrase generation methods                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Woo, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>\uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc9c0 28 (1), 29-35<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/koreascience.kr\/article\/JAKO201809253685076.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16309\/blacklists-assemble-aggregating-blacklists-for-accuracy\/\" target=\"_blank\">\n                                Blacklists assemble: Aggregating blacklists for accuracy                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Sivaramakrishnan Ramanthan, Jelena Mirkovic, Minlan Yu                        <\/div>\n                    \n                    <div>\n                        <i>Technical Report ISI-TR-730. Information Sciences Institute<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/steel.isi.edu\/members\/sivaram\/papers\/blag_technical_report.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16310\/guidedpass-helping-users-to-create-strong-and-memorable-passwords\/\" target=\"_blank\">\n                                GuidedPass: Helping Users to Create Strong and Memorable Passwords                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Woo, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Research in Attacks, Intrusions, and Defenses: 21st International Symposium \u2026<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/guidedpass.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16311\/dew-distributed-experiment-workflows\/\" target=\"_blank\">\n                                DEW: Distributed Experiment Workflows                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Genevieve Bartlett, Jim Blythe                        <\/div>\n                    \n                    <div>\n                        <i>Cyber Security Experimentation and Test (CSET)<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/cset18\/cset18-paper-mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16312\/malware-analysis-through-high-level-behavior\/\" target=\"_blank\">\n                                Malware analysis through high-level behavior                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Xiyue Deng, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/cset18\/cset18-paper-deng.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2017<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20697\/reu-site-human-communication-in-a-connected-world\/\" target=\"_blank\">\n                                REU Site: Human Communication in a Connected World                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1659886. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2017\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20698\/collaborative-research-modeling-student-activity-and-learning-on-cybersecurity-testbeds\/\" target=\"_blank\">\n                                Collaborative Research: Modeling Student Activity and Learning on Cybersecurity Testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1723717. Directorate for STEM Education 17 (1723717), 23717<\/i>,&nbsp;2017\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16317\/hiding-debuggers-from-malware-with-apate\/\" target=\"_blank\">\n                                Hiding debuggers from malware with apate                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Hao Shi, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the Symposium on Applied Computing, 1703-1710<\/i>,&nbsp;2017\n\n                                                    <div>\n                                <a href=\"https:\/\/steel.isi.edu\/Projects\/apate\/apate.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16318\/enabling-sdn-experimentation-in-network-testbeds\/\" target=\"_blank\">\n                                Enabling SDN experimentation in network testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mikovic, Pravein G Kannan, Chan Mun Choon, Keith Sklower                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the ACM International Workshop on Security in Software \u2026<\/i>,&nbsp;2017\n\n                                                    <div>\n                                <a href=\"https:\/\/steel.isi.edu\/members\/sivaram\/papers\/sdntestbeds.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16313\/handling-anti-virtual-machine-techniques-in-malicious-software\/\" target=\"_blank\">\n                                Handling anti-virtual machine techniques in malicious software                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Hao Shi, Jelena Mirkovic, Abdulla Alwabel                        <\/div>\n                    \n                    <div>\n                        <i>ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-31<\/i>,&nbsp;2017\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16315\/commoner-privacy-and-a-study-on-network-traces\/\" target=\"_blank\">\n                                Commoner privacy and a study on network traces                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Xiyue Deng, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 33rd Annual Computer Security Applications Conference \u2026<\/i>,&nbsp;2017\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/commoner.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16319\/understanding-malwares-network-behaviors-using-fantasm\/\" target=\"_blank\">\n                                Understanding {Malware\u2019s} Network Behaviors using Fantasm                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Xiyue Deng, Hao Shi, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>The LASER Workshop: Learning from Authoritative Security Experiment Results \u2026<\/i>,&nbsp;2017\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/laser2017\/laser2017_deng.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2016<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16320\/good-automatic-authentication-question-generation\/\" target=\"_blank\">\n                                Good Automatic Authentication Question Generation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Woo, Zuyao Li, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>The 9th International Natural Language Generation conference, 203<\/i>,&nbsp;2016\n\n                                                    <div>\n                                <a href=\"https:\/\/aclanthology.org\/W16-6632.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16322\/improving-recall-and-security-of-passphrases-through-use-of-mnemonics\/\" target=\"_blank\">\n                                Improving recall and security of passphrases through use of mnemonics                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Woo, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 10th International Conference on Passwords (Passwords)<\/i>,&nbsp;2016\n\n                                                    <div>\n                                <a href=\"http:\/\/dash.skku.edu\/pub\/mnpass.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16323\/how-users-choose-and-reuse-passwords\/\" target=\"_blank\">\n                                How users choose and reuse passwords                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Ameya Hanamsagar, Simon Woo, Christopher Kanich, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Information Sciences Institute<\/i>,&nbsp;2016\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/118085852\/isi-tr-715.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2015<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16326\/evaluating-cybersecurity-education-interventions-three-case-studies\/\" target=\"_blank\">\n                                Evaluating cybersecurity education interventions: Three case studies                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Security &amp; Privacy 13 (3), 63-69<\/i>,&nbsp;2015\n\n                                                    <div>\n                                <a href=\"https:\/\/tamaradenning.net\/files\/papers\/mirkovic-IEEE-SP-magazine-2015-evaluating-cybersecurity-education-interventions.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16325\/expressing-different-traffic-models-using-the-legotg-framework\/\" target=\"_blank\">\n                                Expressing Different Traffic Models Using The LegoTG Framework                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Genevieve Bartlett, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>2015 IEEE 35th International Conference on Distributed Computing Systems \u2026<\/i>,&nbsp;2015\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=7b345330dd897fcd6b027da907cc256b59ca4a04\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16327\/evaluation-theory-and-practice-applied-to-cybersecurity-education\/\" target=\"_blank\">\n                                Evaluation theory and practice applied to cybersecurity education                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Melissa Dark, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Security &amp; Privacy 13 (2), 75-80<\/i>,&nbsp;2015\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16328\/passive-and-active-measurement\/\" target=\"_blank\">\n                                Passive and Active Measurement                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Yong Liu                        <\/div>\n                    \n                    <div>\n                        <i>Springer<\/i>,&nbsp;2015\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16329\/engaging-novices-in-cybersecurity-competitions-a-vision-and-lessons-learned-at-acm-tapia-2015\/\" target=\"_blank\">\n                                Engaging novices in cybersecurity competitions: A vision and lessons learned at {ACM} Tapia 2015                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Aimee Tabor, Simon Woo, Portia Pusey                        <\/div>\n                    \n                    <div>\n                        <i>2015 USENIX Summit on Gaming, Games, and Gamification in Security Education \u2026<\/i>,&nbsp;2015\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/3gse15\/3gse15-mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2014<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20699\/edu-revitalizing-cyber-security-education-and-research-through-competitions\/\" target=\"_blank\">\n                                EDU: Revitalizing Cyber Security Education and Research through Competitions                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1319197. Directorate for STEM Education 13 (1319197), 19197<\/i>,&nbsp;2014\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16331\/senss-observe-and-control-your-own-traffic-in-the-internet\/\" target=\"_blank\">\n                                SENSS: observe and control your own traffic in the Internet                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2014 ACM conference on SIGCOMM, 349-350<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2619239.2631459\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16332\/life-experience-passwords-leps\/\" target=\"_blank\">\n                                Life-Experience Passwords (LEPs)                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Woo, Jelena Mirkovic, Ron Artstein, Elsi Kaiser                        <\/div>\n                    \n                    <div>\n                        <i>Symposium on Usable Privacy and Security (SOUPS)<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"http:\/\/cups.cs.cmu.edu\/soups\/2014\/workshops\/papers\/lep_woo_12.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16333\/optimal-application-allocation-on-multiple-public-clouds\/\" target=\"_blank\">\n                                Optimal Application Allocation on Multiple Public Clouds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Simon S Woo, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Computer Networks<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"http:\/\/www.ttcenter.ir\/ArticleFiles\/ENARTICLE\/3136.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16330\/critter-content-rich-traffic-trace-repository\/\" target=\"_blank\">\n                                Critter: Content-rich traffic trace repository                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Vinod Sharma, Genevieve Bartlett, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2014 ACM Workshop on Information Sharing &amp; Collaborative \u2026<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/102429004\/wiscs14-critter.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16334\/senss-software-defined-security-service\/\" target=\"_blank\">\n                                SENSS: Software Defined Security Service                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Minlan Yu, Ying Zhang, Jelena Mirkovic, Abdulla Alwabel                        <\/div>\n                    \n                    <div>\n                        <i>Presented as part of the Open Networking Summit 2014 (ONS 2014)<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/ons2014\/ons2014-paper-yu.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16335\/cardinal-pill-testing-of-system-virtual-machines\/\" target=\"_blank\">\n                                Cardinal pill testing of system virtual machines                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Hao Shi, Abdulla Alwabel, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>23rd USENIX Security Symposium (USENIX Security 14), 271-285<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity14\/sec14-paper-shi.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16336\/safe-and-automated-live-malware-experimentation-on-public-testbeds\/\" target=\"_blank\">\n                                Safe and automated live malware experimentation on public testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Abdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>7th Workshop on Cyber Security Experimentation and Test (CSET 14)<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/cset14\/cset14-paper-alwabel-final.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16337\/class-capture-the-flag-exercises\/\" target=\"_blank\">\n                                Class Capture-the-Flag Exercises                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Peter AH Peterson                        <\/div>\n                    \n                    <div>\n                        <i>2014 USENIX Summit on Gaming, Games, and Gamification in Security Education \u2026<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/3gse14\/3gse14-mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2013<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20700\/twc-option-small-frade-model-human-behavior-for-flash-crowd-attack-defense\/\" target=\"_blank\">\n                                TWC: Option: Small: FRADE: Model Human Behavior for Flash cRowd Attack DEfense                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1319215. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2013\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2012<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20592\/twc-small-critter-home-content-rich-traffic-trace-repository-from-real-time-anonymous-user-contributions\/\" target=\"_blank\">\n                                TWC: Small: Critter@ home: Content-Rich Traffic Trace Repository from Real-Time, Anonymous, User Contributions                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1224035. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2012\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16341\/beyond-disk-imaging-for-preserving-user-state-in-network-testbeds\/\" target=\"_blank\">\n                                Beyond Disk Imaging for Preserving User State in Network Testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Abdulla Alwabel, Ted Faber                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 5th USENIX conference on Cyber Security Experimentation \u2026<\/i>,&nbsp;2012\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/cset12\/cset12-final22.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2011<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20701\/sdci-sec-traffic-modeling-and-generation-with-custom-fidelity-for-cyber-security-experimentation\/\" target=\"_blank\">\n                                SDCI Sec: Traffic modeling and generation with custom fidelity for cyber security experimentation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1127388. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2011\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16344\/dependable-and-secure-computing\/\" target=\"_blank\">\n                                DEPENDABLE AND SECURE COMPUTING                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            IR Chen, AP Speer, M Eltoweissy, M Serafini, P Bokor, N Suri, J Vinter, A Ademaj, W Brandst\u00e4tter, F Tagliab\u00f2, J Koch, D Heimbigner, JH Collet, P Zajac, M Psarakis, D Gizopoulos, J Mirkovic, E Kissel, JFC Joseph, BS Lee, A Das, BC Seet, CW Lee, SY Hsieh, PP Tsang, A Kapadia, C Cornelius, SW Smith, S Grau, M Fischer, M Brinkmeier, G Sch\u00e4fer, A Hofmann, B Sick, J Sun, C Zhang, Y Zhang, Y Fang, M Portela-Garc\u00eda, C L\u00f3pez-Ongil, M Garc\u00eda Valderas, L Entrena, HM Sun, WC Ting, KH Wang                        <\/div>\n                    \n                    <div>\n                        2011\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/57982\/comparative-evaluation-of-spoofing-defenses\/\" target=\"_blank\">\n                                Comparative Evaluation of Spoofing Defenses                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Ezra Kissel, J Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of IEEE Transactions on Dependable and Secure Computing, 218-232<\/i>,&nbsp;2011\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/spoofer.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16345\/teaching-security-with-network-testbeds\/\" target=\"_blank\">\n                                Teaching Security With Network Testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Mike Ryan, John Hickey, Keith Sklower, Peter Reiher, Peter AH Peterson, B Hoon Kang, Mooi Choo Chuah, Daniel Massey, Gisele Ragusa                        <\/div>\n                    \n                    <div>\n                        <i>ACM Sigcomm Educational Workshop<\/i>,&nbsp;2011\n\n                                                    <div>\n                                <a href=\"https:\/\/www.researchgate.net\/profile\/Peter-Peterson-3\/publication\/233923326_Teaching_Security_With_Network_Testbeds\/links\/0fcfd50cfdfd211156000000\/Teaching-Security-With-Network-Testbeds.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2010<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20702\/investigating-network-testbed-usage\/\" target=\"_blank\">\n                                Investigating Network Testbed Usage                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1049758. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2010\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/21734\/the-deter-project-advancing-the-science-of-cyber-security-experimentation-and-test\/\" target=\"_blank\">\n                                The DETER project: Advancing the science of cyber security experimentation and test                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Terry V Benzel, Ted Faber, Robert Braden, John T Wroclawski, Stephen Schwab                        <\/div>\n                    \n                    <div>\n                        <i>Technologies for Homeland Security (HST) IEEE International Conference \u2026<\/i>,&nbsp;2010\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/deter-1.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16348\/dadl-distributed-application-description-language\/\" target=\"_blank\">\n                                Dadl: Distributed application description language                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Ted Faber, Paul Hsieh, Ganesan Malaiyandisamy, Rashi Malaviya                        <\/div>\n                    \n                    <div>\n                        <i>USC\/ISI Technical Report# ISI-TR-664<\/i>,&nbsp;2010\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/dadlsubmit.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2009<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20703\/collaborative-research-hands-on-exercises-on-deter-testbed-for-security-education\/\" target=\"_blank\">\n                                Collaborative research: Hands-on exercises on DETER testbed for security education                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 0920719. Directorate for STEM Education 9 (920719), 20719<\/i>,&nbsp;2009\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20704\/tc-small-privacy-safe-sharing-of-network-data-via-secure-queries-pseq\/\" target=\"_blank\">\n                                TC: Small: Privacy-safe sharing of network data via secure queries (PSEQ)                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 0914780. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2009\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16352\/modeling-human-behavior-for-defense-against-flash-crowd-attacks\/\" target=\"_blank\">\n                                Modeling human behavior for defense against flash-crowd attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Georgios Oikonomou, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>2009 IEEE International Conference on Communications, 1-6<\/i>,&nbsp;2009\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=3606622037f30ac044c7e49d796352ae9c9f172c\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16353\/how-to-test-dos-defenses\/\" target=\"_blank\">\n                                How to test DoS defenses                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan K Thomas                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2009 Cybersecurity Applications &amp; Technology Conference \u2026<\/i>,&nbsp;2009\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/catch-ddos.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/21735\/current-developments-in-deter-cybersecurity-testbed-technology\/\" target=\"_blank\">\n                                Current developments in DETER cybersecurity testbed technology                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Terry Benzel, Bob Braden, Ted Faber, Jelena Mirkovic, Steve Schwab, Karen Sollins, John Wroclawski                        <\/div>\n                    \n                    <div>\n                        <i>2009 Cybersecurity Applications &amp; Technology Conference for Homeland \u2026<\/i>,&nbsp;2009\n\n                                                    <div>\n                                <a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/58894\/Benzel-2009-Current%20developments%20in%20DETER%20cybersecurity%20testbed%20technology.pdf?sequence=1&#038;isAllowed=y\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16351\/comparative-evaluation-of-spoofing-defenses\/\" target=\"_blank\">\n                                Comparative evaluation of spoofing defenses                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Ezra Kissel                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Transactions on Dependable and Secure Computing 8 (2), 218-232<\/i>,&nbsp;2009\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/96761532\/TDSC-2007-11-0173.R1_Mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2008<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16360\/managing-the-health-of-security-experiments\/\" target=\"_blank\">\n                                Managing the Health of Security Experiments.                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Karen R Sollins, John Wroclawski                        <\/div>\n                    \n                    <div>\n                        <i>CSET<\/i>,&nbsp;2008\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/legacy\/event\/cset08\/tech\/full_papers\/mirkovic\/mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16362\/combining-speak-up-with-defcom-for-improved-ddos-defense\/\" target=\"_blank\">\n                                Combining speak-up with DefCOM for improved DDoS defense                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Mohit Mehta, Kanika Thapar, George Oikonomou, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>2008 IEEE International Conference on Communications, 1708-1714<\/i>,&nbsp;2008\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/icc.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16364\/learning-the-valid-incoming-direction-of-ip-packets\/\" target=\"_blank\">\n                                Learning the valid incoming direction of IP packets                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter Reiher, Lixia Zhang                        <\/div>\n                    \n                    <div>\n                        <i>Computer Networks 52 (2), 399-417<\/i>,&nbsp;2008\n\n                                                    <div>\n                                <a href=\"https:\/\/lasr.cs.ucla.edu\/lasr-members\/reiher\/papers\/save2007.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20705\/cri-crd-isim-simulator-of-internet-scale-events\/\" target=\"_blank\">\n                                CRI: CRD: iSim-Simulator of Internet-Scale Events                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 0836531. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2008\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16357\/privacy-safe-network-trace-sharing-via-secure-queries\/\" target=\"_blank\">\n                                Privacy-safe network trace sharing via secure queries                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 1st ACM workshop on Network data anonymization, 3-10<\/i>,&nbsp;2008\n\n                                                    <div>\n                                <a href=\"http:\/\/www.cs.colostate.edu\/~cs656\/reading\/mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16358\/correcting-congestion-based-error-in-network-telescopes-observations-of-worm-dynamics\/\" target=\"_blank\">\n                                Correcting congestion-based error in network telescope&#039;s observations of worm dynamics                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Songjie Wei, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, 125-130<\/i>,&nbsp;2008\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/imc08.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16359\/building-accountability-into-the-future-internet\/\" target=\"_blank\">\n                                Building accountability into the future Internet                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>2008 4th Workshop on Secure Network Protocols, 45-51<\/i>,&nbsp;2008\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=3ab5b6d40f390f99121912eb6c058af351f263dd\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/22770\/benchmarks-for-evaluation-of-distributed-denial-of-service-ddos\/\" target=\"_blank\">\n                                Benchmarks for Evaluation of Distributed Denial of Service (DDOS)                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        2008\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2007<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20706\/cri-crd-isim-simulator-of-internet-scale-events\/\" target=\"_blank\">\n                                CRI: CRD: iSim-Simulator of Internet-Scale Events                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 0708744. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2007\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/20707\/ct-isg-collaborative-research-enabling-routers-to-detect-and-filter-spoofed-traffic\/\" target=\"_blank\">\n                                CT-ISG: Collaborative research: Enabling Routers to Detect and Filter Spoofed Traffic                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 0823121. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2007\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16366\/automating-ddos-experimentation\/\" target=\"_blank\">\n                                Automating ddos experimentation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Brett Wilson, Alefiya Hussain, Sonia Fahmy, Peter Reiher, Roshan Thomas, Stephen Schwab, VA Centreville                        <\/div>\n                    \n                    <div>\n                        <i>Proc. of the DETER Community Workshop on Cyber Security Experimentation and \u2026<\/i>,&nbsp;2007\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/event\/deter07\/tech\/full_papers\/mirkovic\/mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16365\/fine-grained-capabilities-for-flooding-ddos-defense-using-client-reputations\/\" target=\"_blank\">\n                                Fine-grained capabilities for flooding DDoS defense using client reputations                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Maitreya Natu, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2007 workshop on Large scale attack defense, 105-112<\/i>,&nbsp;2007\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352664.1352668\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16367\/building-reputations-for-internet-clients\/\" target=\"_blank\">\n                                Building reputations for internet clients                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Songjie Wei, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Electronic Notes in Theoretical Computer Science 179, 17-30<\/i>,&nbsp;2007\n\n                                                    <div>\n                                <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S157106610700299X\/pdf?md5=58a8087d2cc93733c0b2295a93422538&#038;pid=1-s2.0-S157106610700299X-main.pdf&#038;_valck=1\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2006<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16377\/profiling-and-clustering-internet-hosts\/\" target=\"_blank\">\n                                Profiling and Clustering Internet Hosts.                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Songjie Wei, Jelena Mirkovic, Ezra Kissel                        <\/div>\n                    \n                    <div>\n                        <i>DMIN 6, 269-75<\/i>,&nbsp;2006\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/DMI8155.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16378\/a-practical-ip-spoofing-defense-through-route-based-filtering\/\" target=\"_blank\">\n                                A Practical IP Spoofing Defense Through Route-Based Filtering                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Nikola Jevtic, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>University of Delaware CIS Department Technical Report CIS-TR-2006-332<\/i>,&nbsp;2006\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/51850888\/csig.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16371\/a-framework-for-a-collaborative-ddos-defense\/\" target=\"_blank\">\n                                A framework for a collaborative DDoS defense                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            George Oikonomou, Jelena Mirkovic, Peter Reiher, Max Robinson                        <\/div>\n                    \n                    <div>\n                        <i>Computer Security Applications Conference. ACSAC&#039;06. 22nd Annual, 33-42<\/i>,&nbsp;2006\n\n                                                    <div>\n                                <a href=\"http:\/\/ms15.voip.edu.tw\/~johnson\/MOST\/Paper\/A%20Framework%20for%20A%20Collaborative%20DDoS%20Defense.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16373\/benchmarks-for-ddos-defense-evaluation\/\" target=\"_blank\">\n                                Benchmarks for DDoS defense evaluation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Erinc Arikan, Songjie Wei, Roshan Thomas, Sonia Fahmy, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>MILCOM 2006-2006 IEEE Military Communications conference, 1-10<\/i>,&nbsp;2006\n\n                                                    <div>\n                                <a href=\"https:\/\/www.cs.purdue.edu\/homes\/fahmy\/papers\/MilBench.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16374\/a-realistic-simulation-of-internet-scale-events\/\" target=\"_blank\">\n                                A realistic simulation of internet-scale events                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Songjie Wei, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 1st international conference on Performance evaluation \u2026<\/i>,&nbsp;2006\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=2153df5e30e808aea6b658fac4a5d71b1c39cc0b\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2005<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16379\/d-ward-a-source-end-defense-against-flooding-denial-of-service-attacks\/\" target=\"_blank\">\n                                D-WARD: a source-end defense against flooding denial-of-service attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>IEEE transactions on Dependable and Secure Computing 2 (3), 216-232<\/i>,&nbsp;2005\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/tdsc.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16380\/distributed-worm-simulation-with-a-realistic-internet-model\/\" target=\"_blank\">\n                                Distributed worm simulation with a realistic internet model                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Songjie Wei, Jelena Mirkovic, Martin Swany                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 19th Workshop on Principles of Advanced and Distributed \u2026<\/i>,&nbsp;2005\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=3976f8cc7e789b3606f74fb75f9f0ce16ee33c38\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16381\/distributed-defense-against-ddos-attacks\/\" target=\"_blank\">\n                                Distributed defense against DDOS attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Max Robinson, Peter Reiher, George Oikonomou                        <\/div>\n                    \n                    <div>\n                        <i>University of Delaware CIS Department Technical Report CIS-TR-2005-02<\/i>,&nbsp;2005\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/udel_tech_report_2005-02.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2004<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16384\/a-taxonomy-of-ddos-attacks-and-ddos-defense-mechanisms\/\" target=\"_blank\">\n                                A taxonomy of DDoS attacks and DDoS defense mechanisms                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Janice Martin, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>ACM SIGCOMM Computer Communication Review 34 (2), 39-53<\/i>,&nbsp;2004\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=f20c2d9abecf35276d1ca3d635c333c6b84537a7\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/61626\/internet-denial-of-service-attack-and-defense-mechanisms\/\" target=\"_blank\">\n                                Internet Denial of Service: Attack and Defense Mechanisms                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            David Dittrich, Jelena Mirkovic, Peter Reiher, Sven Dietrich                        <\/div>\n                    \n                    <div>\n                        <i>Pearson Education<\/i>,&nbsp;2004\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16383\/internet-denial-of-service-attack-and-defense-mechanisms-radia-perlman-computer-networking-and-security\/\" target=\"_blank\">\n                                Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>Prentice Hall PTR<\/i>,&nbsp;2004\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2003<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16385\/alliance-formation-for-ddos-defense\/\" target=\"_blank\">\n                                Alliance formation for DDoS defense                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Max Robinson, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2003 workshop on New security paradigms, 11-18<\/i>,&nbsp;2003\n\n                                                    <div>\n                                <a href=\"http:\/\/www.nspw.org\/papers\/2003\/nspw2003-mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16386\/d-ward-ddos-network-attack-recognition-and-defence\/\" target=\"_blank\">\n                                D-WARD: DDoS network attack recognition and defence                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovi\u0107                        <\/div>\n                    \n                    <div>\n                        <i>Ph. D. thesis, Computer Science Department, University of California, Los \u2026<\/i>,&nbsp;2003\n\n                                                    <div>\n                                <a href=\"https:\/\/lasr.cs.ucla.edu\/ddos\/prospectus.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16387\/defcom-defensive-cooperative-overlay-mesh\/\" target=\"_blank\">\n                                DefCOM: defensive cooperative overlay mesh                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Max Robinson, Jelena Mirkovic, Scott Michel, Matthew Schnaider, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>DARPA Information Survivability Conference and Exposition. Proceedings \u2026<\/i>,&nbsp;2003\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16388\/source-end-ddos-defense\/\" target=\"_blank\">\n                                Source-end DDoS defense                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Gregory Prier, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>Second IEEE International Symposium on Network Computing and Applications \u2026<\/i>,&nbsp;2003\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16389\/implementing-address-assurance-in-the-intel-ixp\/\" target=\"_blank\">\n                                Implementing address assurance in the intel ixp                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            M Burns, G Prier, J Mirkovic, P Reiher                        <\/div>\n                    \n                    <div>\n                        <i>Western Network Processors Conference<\/i>,&nbsp;2003\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16390\/d-ward-source-end-defense-against-distributed-denial-of-service-attacks\/\" target=\"_blank\">\n                                D-WARD: source-end defense against distributed denial-of-service attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>University of California, Los Angeles<\/i>,&nbsp;2003\n\n                                                    <div>\n                                <a href=\"https:\/\/lasr.cs.ucla.edu\/ddos\/dward-thesis.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2002<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16394\/save-source-address-validity-enforcement-protocol\/\" target=\"_blank\">\n                                SAVE: Source address validity enforcement protocol                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and \u2026<\/i>,&nbsp;2002\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=d6ab0f3c2678dc62428272c7268d32fd20c2f136\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16392\/attacking-ddos-at-the-source\/\" target=\"_blank\">\n                                Attacking DDoS at the source                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Peter Reiher, Jelena Mirkovic, Greg Prier                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 10th IEEE International Conference on Network Protocols<\/i>,&nbsp;2002\n\n                                                    <div>\n                                <a href=\"http:\/\/www.cs.unc.edu\/~jeffay\/courses\/nidsS05\/mitigation\/mirkovic-attacking-ddos-src02.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/61627\/attacking-ddos-at-the-source\/\" target=\"_blank\">\n                                Attacking ddos at the source                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            J Mirkovic G Prier, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>Proc. of the 10th IEEE International Conference on Network Protocols, 312-321<\/i>,&nbsp;2002\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16393\/implementing-address-assurance-in-the-intel-ixp-router\/\" target=\"_blank\">\n                                Implementing Address Assurance in the Intel IXP Router                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Michael Burns, Gregory Prier, Jelena Mirkovic, Peter Reiher                        <\/div>\n                    \n                    <div>\n                        <i>Western Network Processors Conference<\/i>,&nbsp;2002\n\n                                                    <div>\n                                <a href=\"https:\/\/lasr.cs.ucla.edu\/ficus-members\/reiher\/papers\/npc_paper.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16395\/isave-incrementally-deployable-source-address-validation\/\" target=\"_blank\">\n                                iSAVE: incrementally deployable source address validation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Zhiguo Xu, Jun Li, Matthew Schnaider, Peter Reiher, Lixia Zhang                        <\/div>\n                    \n                    <div>\n                        <i>UCLA tech report<\/i>,&nbsp;2002\n\n                                                    <div>\n                                <a href=\"https:\/\/www.researchgate.net\/profile\/Peter-Reiher\/publication\/2842219_iSAVE_Incrementally_Deployable_Source_Address_Validation\/links\/02e7e51d1ce05ca7b9000000\/iSAVE-Incrementally-Deployable-Source-Address-Validation.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2001<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16396\/a-self-organizing-approach-to-data-forwarding-in-large-scale-sensor-networks\/\" target=\"_blank\">\n                                A self-organizing approach to data forwarding in large-scale sensor networks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Geetha Priya Venkataramani, Songwu Lu, Lixia Zhang                        <\/div>\n                    \n                    <div>\n                        <i>ICC 2001. IEEE International Conference on Communications. Conference Record \u2026<\/i>,&nbsp;2001\n\n                                                    <div>\n                                <a href=\"https:\/\/www.cs.ucla.edu\/~lixia\/papers\/01ICC.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16397\/research-and-development-in-e-business-on-the-internet\/\" target=\"_blank\">\n                                Research and development in e-business on the Internet                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            V Milutinovic, D Cvetkovic, M Aleksic, G Davidovic, Z Dimitrijevic, D Dingarac, M Grubic, A Grujic, D Horvat, Z Horvat, I Ikodinovic, J Illic, N Illic, E Jovanov, M Jovanociv, T Jovanovic, P Knezevic, D Krsmanovic, G Marinkovic, M Mihanovic, A Milenkovic, D Milicev, M Milicevic, V Milijkovic, D Mulutinovic, J Mirkovic, M Mitrovic, M Nikolic, D Petkovic, Z Petkovic, J Protic, S Protic, D Raskovic, S Savic, S Slijepcevic, I Sokic, M Stefanovic, I Tartalja, M Tomasevic, N Tomca, B Radunovic, M Vuletic, S Zgonjanin                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 34th Annual Hawaii International Conference on System \u2026<\/i>,&nbsp;2001\n\n                                                    <div>\n                                <a href=\"http:\/\/3opan.net\/~zorand\/public\/publications\/ebusiness.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16398\/a-source-router-approach-to-ddos-defense\/\" target=\"_blank\">\n                                A Source Router Approach to DDoS Defense                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Peter Reiher, Gregory Prier                        <\/div>\n                    \n                    <div>\n                        <i>Proceeding of USENIX Security Symposium<\/i>,&nbsp;2001\n\n                                                    <div>\n                                <a href=\"https:\/\/www.researchgate.net\/profile\/Peter-Reiher\/publication\/2885998_A_Source_Router_Approach_to_DDoS_Defense\/links\/02e7e51d1ce02a4f55000000\/A-Source-Router-Approach-to-DDoS-Defense.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2000<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16399\/genetic-search-based-on-multiple-mutations\/\" target=\"_blank\">\n                                Genetic search based on multiple mutations                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Veljko Milutinovic, Dragana Cvetkovic, Jelena Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>Computer 33 (11), 118-119<\/i>,&nbsp;2000\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/54347441\/2.88169720170905-28060-1msp09r.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">1999<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16400\/genetic-algorithms-for-intelligent-internet-search-a-survey-and-a-package-for-experimenting-with-various-locality-types\/\" target=\"_blank\">\n                                Genetic algorithms for intelligent internet search: a survey and a package for experimenting with various locality types                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            J Mirkovic, D Cvetkovic, N Tomca, S Cveticanin, S Slijepcevic, V Obradovic, M Mrkic, I Cakulev, Laslo Kraus, V Milutinovic                        <\/div>\n                    \n                    <div>\n                        <i>IEEE TCCA Newsletter, 118-119<\/i>,&nbsp;1999\n\n                                                    <div>\n                                <a href=\"https:\/\/rti.etf.bg.ac.rs\/rti\/ebi\/projects\/search\/static\/package.doc\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/results\/publications\/16401\/a-new-probabilistic-approach-to-congestion-control-in-communication-networks\/\" target=\"_blank\">\n                                A NEW PROBABILISTIC APPROACH TO CONGESTION CONTROL IN COMMUNICATION NETWORKS                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            H Mortazavian, J Mirkovic                        <\/div>\n                    \n                    <div>\n                        <i>PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND \u2026<\/i>,&nbsp;1999\n\n                                            <\/div>\n\n                <\/div>\n\n            \n        <\/div>\n\n        \n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":421,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-11","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Publications - Jelena Mirkovic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/people-mirkovic\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publications - Jelena Mirkovic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/people-mirkovic\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Jelena Mirkovic\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T17:41:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/publications\/\",\"url\":\"https:\/\/www.isi.edu\/people-mirkovic\/publications\/\",\"name\":\"Publications - Jelena Mirkovic\",\"isPartOf\":{\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/#website\"},\"datePublished\":\"2023-10-06T18:06:49+00:00\",\"dateModified\":\"2025-06-13T17:41:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isi.edu\/people-mirkovic\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isi.edu\/people-mirkovic\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/#website\",\"url\":\"https:\/\/www.isi.edu\/people-mirkovic\/\",\"name\":\"Jelena Mirkovic\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isi.edu\/people-mirkovic\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Jelena Mirkovic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/people-mirkovic\/publications\/","og_locale":"en_US","og_type":"article","og_title":"Publications - Jelena Mirkovic","og_url":"https:\/\/www.isi.edu\/people-mirkovic\/publications\/","og_site_name":"Jelena Mirkovic","article_modified_time":"2025-06-13T17:41:27+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/people-mirkovic\/publications\/","url":"https:\/\/www.isi.edu\/people-mirkovic\/publications\/","name":"Publications - Jelena Mirkovic","isPartOf":{"@id":"https:\/\/www.isi.edu\/people-mirkovic\/#website"},"datePublished":"2023-10-06T18:06:49+00:00","dateModified":"2025-06-13T17:41:27+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/people-mirkovic\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/people-mirkovic\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/people-mirkovic\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/people-mirkovic\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/people-mirkovic\/#website","url":"https:\/\/www.isi.edu\/people-mirkovic\/","name":"Jelena Mirkovic","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/people-mirkovic\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}