{"id":13,"date":"2023-10-06T18:07:13","date_gmt":"2023-10-06T18:07:13","guid":{"rendered":"https:\/\/www.isi.edu\/people-mirkovic\/?page_id=13"},"modified":"2024-11-08T20:55:26","modified_gmt":"2024-11-08T20:55:26","slug":"cv","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/people-mirkovic\/cv\/","title":{"rendered":"CV"},"content":{"rendered":"\n\n\t<h3>Jelena Mirkovic<br \/>\nCURRICULUM VITAE<br \/>\n<\/h3>\nUSC Information Sciences Institute<br \/>\n4676 Admiralty Way ste 1001<br \/>\nMarina Del Rey, CA 90292<br \/>\n310-448-9170<br \/>\nE-mail:\u00a0sunshine@isi.edu<br \/>\nHomepage:\u00a0<a href=\"https:\/\/www.isi.edu\/people-mirkovic\/\">https:\/\/www.isi.edu\/people-mirkovic\/<\/a>\n<h2>\n\t\tAppointments\n\t<\/h2>\n\t<table width=\"90%\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td><b>Principal Scientist<\/b><br \/>\nUniversity of Southern California, Information Sciences Institute<\/td>\n<td>1\/2013 &#8211; present<\/td>\n<\/tr>\n<tr>\n<td><b>Research Associate Professor<\/b><br \/>\nUniversity of Southern California<\/td>\n<td>12\/2017 &#8211; present<\/td>\n<\/tr>\n<tr>\n<td><b>Research Assistant Professor<\/b><br \/>\nUniversity of Southern California<\/td>\n<td>8\/2010 &#8211; 12\/2017<\/td>\n<\/tr>\n<tr>\n<td><b>Computer Scientist<\/b><br \/>\nUniversity of Southern California, Information Sciences Institute<\/td>\n<td>8\/2007 &#8211; 12\/2012<\/td>\n<\/tr>\n<tr>\n<td><b>Assistant Professor<\/b><br \/>\nComputer and Information Sciences Department, University of Delaware<\/td>\n<td>9\/2003 &#8211; 8\/2007<\/td>\n<\/tr>\n<tr>\n<td><b>Research Assistant<\/b><br \/>\nComputer Science Department, University of California Los Angeles<\/td>\n<td>10\/2000 &#8211; 8\/2003<\/td>\n<\/tr>\n<tr>\n<td><b>Lecturer<\/b><br \/>\nCenter for Excellence in Engineering and Diversity, University of California Los Angeles<\/td>\n<td>4\/2000<\/td>\n<\/tr>\n<tr>\n<td><b>Teaching Assistant<\/b><br \/>\nComputer Science Department, University of California Los Angeles<\/td>\n<td>10\/1998 &#8211; 8\/2000<\/td>\n<\/tr>\n<tr>\n<td><b>Research Assistant<\/b><br \/>\nSchool of Electrical Engineering, University of Belgrade, Serbia<\/td>\n<td>9\/1997 &#8211; 9\/1998<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\n\t\tEducation\n\t<\/h2>\n\t<table width=\"90%\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td><b>University of California Los Angeles<br \/>\nPh.D. in Computer Science\u00a0<\/b>(specializing in Network Security)<br \/>\nThesis: D-WARD: Source-End DDoS Defense<br \/>\nAdvisor: Prof. Peter Reiher<br \/>\nGPA: 3.84\/4.00<\/td>\n<td>9\/2003<\/td>\n<\/tr>\n<tr>\n<td><b>University of California Los Angeles<br \/>\nM.S. in Computer Science<\/b><br \/>\nGPA: 3.82\/4.00<\/td>\n<td>12\/2000<\/td>\n<\/tr>\n<tr>\n<td><b>School of Electrical Engineering, University of Belgrade, Serbia<br \/>\nB.Sc. in Computer Science<\/b><br \/>\nGPA: 9.33\/10.00<\/td>\n<td>7\/1998<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\n\t\tPublications\n\t<\/h2>\n\t<p>&nbsp;<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td bgcolor=\"#fffacd\"><b><i>Books<\/i><\/b><\/td>\n<td>\n<ol>\n<li>John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic and Stephen Schwab, Chapter on &#8220;DETERLab and DETER project&#8221; in\u00a0<a href=\"http:\/\/www.springer.com\/us\/book\/9783319337678?wt_mc=PPC.Google%20AdWords.3.EPR653.GoogleShopping_Product_US&amp;gclid=CMuT2cGa1s8CFYlbfgod4jUABg#otherversion=9783319337692\" target=\"_blank\" rel=\"noopener\">The GENI Book<\/a>,<br \/>\nRick McGeer, Mark Berman, Chip Elliott and Robert Ricci, Springer, 2016.<\/li>\n<li>Chapter on &#8220;Collaborative DDoS Defenses&#8221; in\u00a0<a href=\"https:\/\/www.springer.com\/us\/book\/9781441959058\" target=\"_blank\" rel=\"noopener\">Encyclopedia of Cryptography and Security, 2nd Edition<\/a><br \/>\nHenk C.A. van Tilborg, Sushil Jajodia, Editors-in-Chief,<br \/>\nSpringer, 2011.<\/li>\n<li><a href=\"http:\/\/vig.prenhall.com\/catalog\/academic\/product\/0,1144,0131475738,00.html\" target=\"_blank\" rel=\"noopener\">Internet Denial of Service: Attack and Defense Mechanisms<\/a><br \/>\nJelena Mirkovic, Sven Dietrich, David Dittrich and Peter Reiher,<br \/>\nPrentice Hall PTR, ISBN 0-13-147573-8, 2005.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#fffacd\"><b><i>Journals<\/i><\/b><\/td>\n<td height=\"74\">\n<ol>\n<li><a href=\"https:\/\/ant.isi.edu\/~johnh\/PAPERS\/Rizvi23b.pdf\">Defending Root DNS Servers Against DDoS Using Layered Defenses (extended)<\/a><br \/>\nA S M Rizvi, Jelena Mirkovic, John Heidemann, Wesley Hardaker and Robert Story,<br \/>\nElsevier Ad Hoc Networks, Dec 2023, vol 151<\/li>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=9382367\" target=\"_blank\" rel=\"noopener\">Perspectives on the SolarWinds Incident<\/a><br \/>\nSean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash and James Bret Michael<br \/>\nIEEE Security &amp; Privacy, volume 19, number 2, pp 7-13, 2021. (editorial)<\/li>\n<li><a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3308992\" target=\"_blank\" rel=\"noopener\">Using Episodic Memory for User Authentication<\/a><br \/>\nSimon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le and Jelena Mirkovic,<br \/>\nACM Transactions on Privacy and Security, vol 22, issue 2, April 2019.<\/li>\n<li><a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3139292\" target=\"_blank\" rel=\"noopener\">Handling Anti-Virtual Machine Techniques in Malicious Software<\/a><br \/>\nH. Shi and J. Mirkovic,<br \/>\nACM Transactions on Privacy and Security, vol 21, issue 1, 2018.<\/li>\n<li><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128614000371\" target=\"_blank\" rel=\"noopener\">Optimal application allocation on multiple public clouds<\/a><br \/>\nS. Woo and J. Mirkovic,<br \/>\nElsevier Computer Networks, February 2014.<\/li>\n<li><a href=\"http:\/\/www.computer.org\/csdl\/mags\/sp\/2012\/01\/msp2012010073-abs.html\" target=\"_blank\" rel=\"noopener\">Teaching Cybersecurity with DeterLab<\/a><br \/>\nJ. Mirkovic and T. Benzel.<br \/>\nIEEE Security and Privacy Magazine, January\/February 2012, Vol. 10, No. 1, pp. 73-76. (invited paper).<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/TDSC-2007-11-0173.R1_Mirkovic.pdf\" target=\"_blank\" rel=\"noopener\">Comparative Evaluation of Spoofing Defenses<\/a><br \/>\nJ. Mirkovic and E. Kissel,<br \/>\nIEEE Transactions on Dependable and Secure Computing, March-April 2011, Vol. 8, No. 2, pp 218-232.<\/li>\n<li><a href=\"http:\/\/www.inderscience.com\/search\/index.php?action=record&amp;rec_id=33972&amp;prevQuery=&amp;ps=10&amp;m=or\" target=\"_blank\" rel=\"noopener\">Tools for worm experimentation on the DETER testbed<\/a><br \/>\nS.Wei, A. Hussain, J. Mirkovic and C. Ko,<br \/>\nInternational Journal of Communication Networks and Distributed Systems (IJCNDS), 2010, Vol. 5, No. 1\/2, pp. 151-171.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/TDSC-2008-04-0069.pdf\" target=\"_blank\" rel=\"noopener\">Accurately Measuring Denial of Service in Simulation and Testbed Experiments<\/a><br \/>\nJ. Mirkovic, A. Hussain, S. Fahmy, P. Reiher and R. Thomas,<br \/>\nIEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, pp. 81-95, April-June 2009.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/redteam.pdf\" target=\"_blank\" rel=\"noopener\">Testing a Collaborative DDoS Defense in a Red Team\/Blue Team Exercise<\/a><br \/>\nJ. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain, M. Shepard, M. Berg and R. Jung,<br \/>\nIEEE Transactions on Computers, Vol. 57, No. 8, pp 1098-1112, August 2008.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/savejourn.pdf\" target=\"_blank\" rel=\"noopener\">Learning the valid incoming direction of IP packets<\/a><br \/>\nJ. Li, J. Mirkovic, T. Ehrenkranz, M. Wang, P. Reiher and L. Zhang,<br \/>\nComputer Networks, Vol. 52, No. 2, February 2008, pp 399-417.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/tdsc.pdf\" target=\"_blank\" rel=\"noopener\">D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks<\/a><br \/>\nJ. Mirkovic and P. Reiher,<br \/>\nIEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September 2005, pp. 216-232.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#fffacd\"><b><i>Conferences and workshops<\/i><\/b><\/td>\n<td>\n<ol>\n<li>Puppeteer: Leveraging a Large Language Model for Scambaiting, Pithayuth Charnsethikul, Jelena Mirkovic, Rishit Saiya, Jeffrey Liu, Benjamin Crotty, Genevieve Bartlett, Proceedings of HICSS, 2025.<\/li>\n<li><a href=\"https:\/\/www.openconf.org\/acsac2024\/modules\/request.php?module=oc_program&amp;action=summary.php&amp;id=446\">BinHunter: A Fine-Grained Graph Representation for Localizing\u00a0 Vulnerabilities in Binary Executables<\/a>, Sima Arasteh, Jelena Mirkovic, Mukund Raghothaman, Christophe Hauser, Proceedings of ACSAC, 2024.<\/li>\n<li><a href=\"https:\/\/ant.isi.edu\/~johnh\/PAPERS\/Rizvi23a.pdf\">Defending Root DNS Servers Against DDoS Using Layered Defenses<\/a><br \/>\nA S M Rizvi, Jelena Mirkovic, John Heidemann, Wesley Hardaker and Robert Story,<br \/>\nProceedings of IEEE COMSNETS 2023, <strong>Best paper award.<\/strong><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/system\/files\/nsdi23-ramanathan.pdf\">Practical Intent-driven Routing Configuration Synthesis<\/a><br \/>\nSivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu and Jelena Mirkovic, Proceedings of NSDI 2023\u00a0<strong>(acceptance rate 46\/288=16%)<\/strong><\/li>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607238\">Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications<\/a><br \/>\nRajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic, Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023) <strong>(acceptance rate 50\/213=23%)<\/strong><\/li>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557442\" target=\"_blank\" rel=\"noopener\">Samba: Identifying Inappropriate Videos for Young Children on YouTube<\/a><br \/>\nLe Binh, Rajat Tandon, Chingis Oinar, Jeffrey Liu, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Fred Morstatter, Simon Woo, and Jelena Mirkovic<br \/>\nProceedings of the 31st ACM International Conference on Information &amp; Knowledge Management (CIKM), 2022\u00a0<b>(acceptance rate 274\/1175 = 23.32%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/conext22-final62.pdf\" target=\"_blank\" rel=\"noopener\">Xatu: Boosting Existing DDoS Detection Systems Using Auxiliary Signals<\/a><br \/>\nZhiying Xu, Sivaramakrishnan Ramanathan, Alexander Ruth, Jelena Mirkovic and Minlan Yu<br \/>\nProceedings of CoNext, 2022.\u00a0<b>(acceptance rate 28\/151=19%)<\/b><\/li>\n<li><a href=\"https:\/\/steel.isi.edu\/members\/rajattan\/Rajat%20Tandon_files\/Globecom2022_AMON_SENSS.pdf\" target=\"_blank\" rel=\"noopener\">AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs<\/a><br \/>\nRajat Tandon, Pithayuth Charnsethikul, Michalis Kallitsis and Jelena Mirkovic<br \/>\nProceedings of Globecom, 2022.<\/li>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3546096.3546104\" target=\"_blank\" rel=\"noopener\">Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts<\/a><br \/>\nDavid Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic and Laura Tinnel<br \/>\nProceedings of Cyber Security Experimentation and Test (CSET), 2022.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/harmdos.pdf\" target=\"_blank\" rel=\"noopener\">Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables<\/a><br \/>\nNicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic and Christophe Hauser<br \/>\nProceedings of International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2022.\u00a0<b>(acceptance rate 53\/216=25%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/pets2022-1.pdf\" target=\"_blank\" rel=\"noopener\">I know what you did on Venmo: Discovering privacy leaks in mobile social payments<\/a><br \/>\nRajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy and Jelena Mirkovic<br \/>\nProceedings of Privacy Enhancing Technologies Symposium (PETS), 2022.\u00a0<b>(acceptance rate 53\/216=24%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/a25-dengfinal.pdf\" target=\"_blank\" rel=\"noopener\">Polymorphic Malware Behavior Through Network Trace Analysis<\/a><br \/>\nXiyue Deng and Jelena Mirkovic<br \/>\nProceedings of 14th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS), 2022.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/learningwtestbeds.pdf\" target=\"_blank\" rel=\"noopener\">User Experiences on Network Testbeds<\/a><br \/>\nJelena Mirkovic and Portia Pusey<br \/>\nProceedings of 14th Cyber Security Experimentation and Test (CSET), 2021.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/risk2020.pdf\" target=\"_blank\" rel=\"noopener\">An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags<\/a><br \/>\nGiorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevsky and Jelena Mirkovic<br \/>\nProceedings of IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW), 2020.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/inc2020.pdf\" target=\"_blank\" rel=\"noopener\">Malware Behavior Through Network Trace Analysis<\/a><br \/>\nXiyue Deng and Jelena Mirkovic<br \/>\nProceedings of International Networking Conference (INC), 2020.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/cloudnet2020.pdf\" target=\"_blank\" rel=\"noopener\">Quantifying Cloud Misbehavior<\/a><br \/>\nRajat Tandon, Jelena Mirkovic, Pithayuth Charnsethikul<br \/>\nProceedings of IEEE International Conference on Cloud Networking (CloudNet), 2020.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/imc2020.pdf\" target=\"_blank\" rel=\"noopener\">Quantifying the Impact of Blocklisting in the Age of Address Reuse<\/a><br \/>\nSivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz<br \/>\nProceedings of Internet Measurement Conference (IMC), 2020.<br \/>\n<b>(acceptance rate 53\/216=24.5%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/BLAG_NDSS.pdf\" target=\"_blank\" rel=\"noopener\">BLAG: Improving the Accuracy of Blacklists<\/a><br \/>\nSivaramakrishnan Ramanathan, Jelena Mirkovic and Minlan Yu,<br \/>\nProceedings of Network and Distributed System Security Symposium (NDSS), 2020.<br \/>\n<b>(acceptance rate 88\/506=17.4%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/sigcse2020.pdf\" target=\"_blank\" rel=\"noopener\">Using Terminal Histories to Monitor Student Progress on Hands-on Exercises<\/a><br \/>\nJelena Mirkovic, Aashray Aggarwal, David Weinman, Paul Lepe, Jens Mache and Richard Weiss,<br \/>\nProceedings of Special Interest Group on Computer Science Education Symposium (SIGCSE), 2020.<br \/>\n<b>(acceptance rate 31.4%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/MERIT5.pdf\" target=\"_blank\" rel=\"noopener\">Measuring Student Learning On Network Testbeds<\/a><br \/>\nPaul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss and David Weinmann,<br \/>\nProceedings of the Midscale Education and Research Infrastructure and Tools (MERIT) Workshop, 2019.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/MERIT6.pdf\" target=\"_blank\" rel=\"noopener\">Defending Web Servers Against Flash Crowd Attacks<\/a><br \/>\nRajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett and Jelena Mirkovic,<br \/>\nProceedings of the Midscale Education and Research Infrastructure and Tools (MERIT) Workshop, 2019.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/senss.pdf\" target=\"_blank\" rel=\"noopener\">SENSS Against Volumetric DDoS Attacks<\/a><br \/>\nSivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu and Ying Zhang<br \/>\nProceedings of 2018 Annual Computer Security Applications Conference (ACSAC), 2018.<br \/>\n<b>(acceptance rate 60\/299=20.1%)<\/b><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/cset18\/cset18-paper-mirkovic.pdf\" target=\"_blank\" rel=\"noopener\">DEW: Distributed Experiment Workflows<\/a><br \/>\nJelena Mirkovic, Genevieve Bartlett and James Blythe<br \/>\nProceedings of the CSET 2018.<\/li>\n<li><a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/cset18\/cset18-paper-deng.pdf\" target=\"_blank\" rel=\"noopener\">Malware Analysis through High-Level Behavior<\/a><br \/>\nXiyue Deng and Jelena Mirkovic<br \/>\nProceedings of the CSET 2018.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/guidedpass.pdf\" target=\"_blank\" rel=\"noopener\">GuidedPass: Helping Users to Create Strong and Memorable Passwords<\/a><br \/>\nSimon S. Woo and Jelena Mirkovic<br \/>\nProceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018.<br \/>\n<b>(acceptance rate 33\/145=23%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/semtrac.pdf\" target=\"_blank\" rel=\"noopener\">Leveraging Semantic Transformation to Investigate Password Habits and Their Causes<\/a><br \/>\nAmeya Hanamsagar, Simon S. Woo, Chris Kanich and Jelena Mirkovic<br \/>\nProceedings of the ACM Conference on Human Factors in Computing Systems (CHI), 2018.<br \/>\n<b>(acceptance rate 667\/2657=25.1%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/resect.pdf\" target=\"_blank\" rel=\"noopener\">RESECT: Self-Learning Traffic Filters for IP Spoofing Defense<\/a><br \/>\nJelena Mirkovic, Erik Kline and Peter Reiher<br \/>\nProceedings of 2017 Annual Computer Security Applications Conference (ACSAC), 2017.<br \/>\n<b>(acceptance rate 48\/244=19.7%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/commoner.pdf\" target=\"_blank\" rel=\"noopener\">Commoner Privacy And A Study On Network Traces<\/a><br \/>\nXiyue Deng and Jelena Mirkovic<br \/>\nProceedings of 2017 Annual Computer Security Applications Conference (ACSAC), 2017.<br \/>\n<b>(acceptance rate 48\/244=19.7%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/malwaresurvey.pdf\" target=\"_blank\" rel=\"noopener\">Understanding Malware&#8217;s Network Behaviors using Fantasm<\/a><br \/>\nXiyue Deng, Hao Shi and Jelena Mirkovic<br \/>\nProceedings of LASER Workshop, 2017.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/tma.pdf\" target=\"_blank\" rel=\"noopener\">Do You See Me Now? Sparsity in Passive Observations of Address Liveness<\/a><br \/>\nJelena Mirkovic,Genevieve Bartlett, John Heidemann, Hao Shi and Xiyue Deng<br \/>\nProceedings of Traffic Measurement and Analysis Conference (TMA), 2017.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/apate.pdf\" target=\"_blank\" rel=\"noopener\">Hiding Debuggers from Malware with Apate<\/a><br \/>\nHao Shi, Jelena Mirkovic,<br \/>\nProceedings of ACM SAC, 2017.\u00a0<b>(acceptance rate 8\/51=16%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/sdntestbeds.pdf\" target=\"_blank\" rel=\"noopener\">Enabling SDN Experimentation in Network Testbeds<\/a><br \/>\nSivaramakrishnan Ramanathan, Pravein Kannan, Chan Mun Choon, Jelena Mirkovic, Keith Sklower,<br \/>\nProceedings of ACM SDNNFV Security Workshop, 2017.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/MNPass.pdf\" target=\"_blank\" rel=\"noopener\">Improving Recall and Security of Passphrases through Use of Mnemonics<\/a><br \/>\nSimon Woo, Jelena Mirkovic,<br \/>\nProceedings of Passwords Conference, 2016.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/LEP.pdf\" target=\"_blank\" rel=\"noopener\">Life-Experience Passwords (LEPs)<\/a><br \/>\nSimon Woo, Elsi Keiser, Ron Artstein, Jelena Mirkovic,<br \/>\nProceedings of ACSAC, 2016\u00a0<b>(acceptance rate 48\/210=22.8%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/inlg.pdf\" target=\"_blank\" rel=\"noopener\">Good Automatic Authentication Question Generation<\/a><br \/>\nSimon Woo, Zuyao Li, Jelena Mirkovic,<br \/>\nProceedings of International Natural Language Generation conference, 2016<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/gamify.pdf\" target=\"_blank\" rel=\"noopener\">Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015<\/a><br \/>\nJelena Mirkovic, Aimee Tabor, Simon Woo, Portia Pusey,<br \/>\nProceedings of USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE), 2015.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/cnert-legotg.pdf\" target=\"_blank\" rel=\"noopener\">Expressing Different Traffic Models Using The LegoTG Framework<\/a><br \/>\nG. Bartlett and J. Mirkovic.<br \/>\nIn Proceedings of the Workshop on Computer and Networking Experimental Research using Testbeds (CNERT), 2015 (Best Paper)<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/wiscs14-critter.pdf\" target=\"_blank\" rel=\"noopener\">Critter: Content-Rich Traffic Trace Repository<\/a><br \/>\nV. Sharma, G. Bartlett and J. Mirkovic.<br \/>\nIn Proceedings of Workshop on Information Sharing and Collaborative Security (WISCS), 2014.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/cardinalpill.pdf\" target=\"_blank\" rel=\"noopener\">Cardinal Pill Testing of System Virtual Machines<\/a><br \/>\nH. Shi, A. Alwabel, and J. Mirkovic.<br \/>\nIn Proceedings of the USENIX Security Symposium, 2014.<br \/>\n<b>(acceptance rate ~67\/350=19%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/3gse.pdf\" target=\"_blank\" rel=\"noopener\">Class Capture-the-Flag Exercises<\/a><br \/>\nJ. Mirkovic, P. A. H. Peterson.<br \/>\nIn Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education 2014.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/cset14.pdf\" target=\"_blank\" rel=\"noopener\">Safe and Automated Live Malware Experimentation on Public Testbeds<\/a><br \/>\nA. Alwabel, H. Shi, G. Bartlett, and J. Mirkovic.<br \/>\nIn Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/LEP-1.pdf\" target=\"_blank\" rel=\"noopener\">Life-Experience Passwords (LEPs)<\/a><br \/>\nS. Woo, J. Mirkovic, E. Kaiser and R. Artstein.<br \/>\nIn Proceedings of the Who are you? Adventures in Authentication Workshop 2014.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/imc12-final-1.pdf\" target=\"_blank\" rel=\"noopener\">Reducing Allocation Errors in Network Testbeds<\/a><br \/>\nJ. Mirkovic, H. Shi and A. Hussain.<br \/>\nIn Proceedings of the Internet Measurement Conference (IMC) 2012.<br \/>\n<b>(acceptance rate ~45\/183=24.6%)<\/b><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/cset12\/beyond-disk-imaging-preserving-user-state-network-testbeds\" target=\"_blank\" rel=\"noopener\">Beyond Disk Imaging for Preserving User State in Network Testbeds<\/a><br \/>\nJ. Mirkovic, A. Alwabel and T. Faber.<br \/>\nIn Proceedings of the Workshop on CyberSecurity Experimentation and Test (CSET) 2012.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/SAF-nsdi2011-paper.pdf\" target=\"_blank\" rel=\"noopener\">A Semantic Framework for Data Analysis in Networked Systems<\/a><br \/>\nA. Viswanathan, A. Hussain, J. Wroclawski, S. Schwab and J. Mirkovic.<br \/>\nIn Proceedings of the Networked System Design and Implementation (NSDI) 2011.<br \/>\n<b>(acceptance rate ~27\/157=17.2%)<\/b><\/li>\n<li><a href=\"http:\/\/edusigcomm.info.ucl.ac.be\/pmwiki\/uploads\/Workshop2011\/20110312001\/sigedu.pdf\">Teaching Security with Network Testbeds<\/a><br \/>\nJ. Mirkovic, M. Ryan, J. Hickey, K. Sklower, P. Reiher, P. A. H. Peterson, B. H. Kang, M. C. Chuah, D. Massey, G. Ragusa.<br \/>\nIn Proceedings of the ACM SIGCOMM Workshop on Education, 2011.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/deter.pdf\" target=\"_blank\" rel=\"noopener\">The DETER Project: Advancing the Science of Cyber Security Experimentation and Test<\/a><br \/>\nJ. Mirkovic, T. Benzel. S. Schwab, J. Wroclawski, T. Faber and B. Braden.<br \/>\nIn Proceedings of the IEEE Homeland Security Technologies Conference (IEEE HST), 2010.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/PID1020415.pdf\" target=\"_blank\" rel=\"noopener\">RAD: Reflector Attack Defense Using Message Authentication Codes<\/a><br \/>\nE. Kline, M. Beaumont-Gay, J. Mirkovic and P. Reiher.<br \/>\nIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2009.\u00a0<b>(acceptance rate ~44\/240=18.3%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/icc09.pdf\" target=\"_blank\" rel=\"noopener\">Modeling Human Behavior for Defense against Flash Crowd Attacks<\/a><br \/>\nG. Oikonomou and J. Mirkovic,<br \/>\nProceedings of the IEEE International Conference on Communications (ICC), 2009.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/trident09.pdf\" target=\"_blank\" rel=\"noopener\">Tools for Worm Experimentation on the DETER testbed<\/a><br \/>\nS. Wei, C. Ko, J. Mirkovic and A. Hussain,<br \/>\nProceedings of the IEEE Create-Net International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (Tridentcom), 2009.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/catch-ddos.pdf\" target=\"_blank\" rel=\"noopener\">How to Test DDoS Defenses<\/a><br \/>\nJ. Mirkovic, S. Fahmy, P. Reiher and R. Thomas,<br \/>\nProceedings of the Cybersecurity Applications &amp; Technology Conference For Homeland Security (CATCH) 2009.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/catch-deter.pdf\" target=\"_blank\" rel=\"noopener\">Current Developments in DETER Cybersecurity Testbed Technology<\/a><br \/>\nT. Benzel, B. Braden, T. Faber, J. Mirkovic, S. Schwab, K. Sollins and J. Wroclawski,<br \/>\nProceedings of the Cybersecurity Applications &amp; Technology Conference For Homeland Security (CATCH) 2009.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/npsec.pdf\" target=\"_blank\" rel=\"noopener\">Building Accountability into the Future Internet<\/a><br \/>\nJ. Mirkovic and P. Reiher,<br \/>\nProceedings of the IEEE ICNP Workshop on Secure Network Protocols (NPSec), 2008.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/imc08.pdf\" target=\"_blank\" rel=\"noopener\">Correcting Congestion-Based Error in Network Telescope&#8217;s Observations of Worm Dynamics<\/a><br \/>\nS. Wei and J. Mirkovic,<br \/>\nProceedings of the IEEE Internet Measurement Conference (IMC), 2008.\u00a0<b>(6-page paper, overall acceptance rate 32\/185=17%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/nda07mr-mirkovic.pdf\" target=\"_blank\" rel=\"noopener\">Privacy-Safe Network Trace Sharing via Secure Queries<\/a><br \/>\nJ. Mirkovic,<br \/>\nProceedings of the ACM CCS Workshop on Network Data Anonymization (NDA), 2008.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/health.pdf\" target=\"_blank\" rel=\"noopener\">Managing the Health of Security Experiments<\/a><br \/>\nJ. Mirkovic, K. Sollins and J. Wroclawski,<br \/>\nProceedings of the USENIX Cyber Security Experimentation and Test Workshop (CSET), 2008.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/icc.pdf\" target=\"_blank\" rel=\"noopener\">Combining Speak-up with DefCOM for Improved DDoS Defense<\/a><br \/>\nM. Mehta, K. Thapar, G. Oikonomou and J. Mirkovic,<br \/>\nProceedings of the IEEE International Conference on Communications (ICC), 2008.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/LSAD.pdf\" target=\"_blank\" rel=\"noopener\">Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations<\/a><br \/>\nM. Natu and J. Mirkovic,<br \/>\nProceedings of the ACM SIGCOMM Large-Scale Attack and Defense Workshop (LSAD), 2007.<\/li>\n<li><a href=\"https:\/\/www.usenix.org\/legacy\/event\/deter07\/tech\/full_papers\/mirkovic\/mirkovic.pdf\" target=\"_blank\" rel=\"noopener\">Automating DDoS Experimentation<\/a><br \/>\nJ. Mirkovic, B. Wilson, A. Hussain, S. Fahmy, P. Reiher, R. Thomas and S. Schwab,<br \/>\nProceedings of the USENIX DETER workshop, 2007<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/expcs.pdf\" target=\"_blank\" rel=\"noopener\">Towards User-Centric Metrics for Denial-Of-Service Measurement<\/a>,<br \/>\nJ. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. Yao and S. Schwab,<br \/>\nProceedings of the ACM FCRC Workshop on Experimental Computer Science (ExpCS), 2007.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/tric.pdf\" target=\"_blank\" rel=\"noopener\">DDoS Benchmarks and Experimenter&#8217;s Workbench for the DETER Testbed<\/a><br \/>\nJ. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov and P. Reiher,<br \/>\nProceedings of the IEEE Create-Net International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (Tridentcom), 2007.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/MilBench.pdf\" target=\"_blank\" rel=\"noopener\">Benchmarks for DDoS Defense Evaluation<\/a><br \/>\nJ. Mirkovic, E.Arikan, S. Wei, S. Fahmy, R. Thomas and P. Reiher,<br \/>\nProceedings of the IEEE AFCEA MILCOM 2006.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/qop20-mirkovic.pdf\" target=\"_blank\" rel=\"noopener\">Measuring Denial-of-Service<\/a><br \/>\nJ. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussain, S. Schwab and C. Ko,<br \/>\nProceedings of the ACM CCS Quality of Protection Workshop (QoP), 2006.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ACSAC06.pdf\" target=\"_blank\" rel=\"noopener\">A Framework for Collaborative DDoS Defense<\/a><br \/>\nG. Oikonomou, J. Mirkovic, P. Reiher and M. Robinson,<br \/>\nProceedings of the Annual Computer Security Applications Conference (ACSAC), 2006.\u00a0<b>(acceptance rate 32\/135=27%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/stm.pdf\" target=\"_blank\" rel=\"noopener\">Building Reputations for Internet Clients<\/a><br \/>\nS. Wei and J. Mirkovic,<br \/>\nProceedings of the ESORICS International Workshop on Security and Trust Management (STM), 2006.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/paws.pdf\" target=\"_blank\" rel=\"noopener\">A Realistic Simulation of Internet-Scale Events<\/a><br \/>\nS. Wei and J. Mirkovic,<br \/>\nProceedings of the the Create-Net International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS), 2006.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/DMI8155.pdf\" target=\"_blank\" rel=\"noopener\">Profiling and Clustering Internet Hosts<\/a><br \/>\nS. Wei, J. Mirkovic and E. Kissel,<br \/>\nProceedings of the WORLDCOMP International Conference on Data Mining (DMIN), June 2006.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/PADS05-w3.pdf\" target=\"_blank\" rel=\"noopener\">Distributed Worm Simulation with a Realistic Internet Model<\/a><br \/>\nS. Wei, J. Mirkovic and M. Swany,<br \/>\nProceedings of the ACM IEEE SCS Workshop on Principles of Advanced and Distributed Simulation (PADS), 2005.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/defcom-nspw.pdf\" target=\"_blank\" rel=\"noopener\">Alliance Formation for DDoS Defense<\/a><br \/>\nJ. Mirkovic, M. Robinson, P. Reiher and G. Kuenning,<br \/>\nProceedings of the ACM SIGSAC New Security Paradigms Workshop (NSPW), 2003.\u00a0<b>(acceptance rate 13\/43=30%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/nca03.pdf\" target=\"_blank\" rel=\"noopener\">Challenges of Source-End DDoS Defense<\/a><br \/>\nJ. Mirkovic, G. Prier and P. Reiher,<br \/>\nProceedings of the IEEE International Symposium on Network Computing and Applications (NCA), 2003.\u00a0<b>(acceptance rate 40\/155=26%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/404_mirkovic_j.pdf\" target=\"_blank\" rel=\"noopener\">Attacking DDoS at the Source<\/a><br \/>\nJ. Mirkovic, G. Prier and P. Reiher,<br \/>\nProceedings of the IEEE International Conference on Network Protocols (ICNP), 2002.\u00a0<b>(acceptance rate 32\/217=15%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/isaveixp.pdf\" target=\"_blank\" rel=\"noopener\">Implementing Address Assurance in the Intel IXP Router<\/a><br \/>\nM. Burns, G. Prier, J. Mirkovic, P. Reiher,<br \/>\nProceedings of the Network Processors Conference (NPC), 2002.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/save_to_infocom.pdf\" target=\"_blank\" rel=\"noopener\">SAVE: Source Address Validity Enforcement Protocol<\/a><br \/>\nJ. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang,<br \/>\nProceedings of the IEEE INFOCOM, 2002.\u00a0<b>(acceptance rate 192\/938=20.5%)<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/icc2001.pdf\" target=\"_blank\" rel=\"noopener\">A Self-Organizing Approach to Data Forwarding In Large-Scale Sensor Networks<\/a><br \/>\nJ. Mirkovic, G. P. Venkataramani, S. Lu and L. Zhang,<br \/>\nProceedings of the IEEE International Conference on Communications (ICC), 2001.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#fffacd\"><b><i>Other refereed publications<\/i><\/b><\/td>\n<td>\n<ol>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/senss-1.pdf\" target=\"_blank\" rel=\"noopener\">Software-Defined Security Service<\/a><br \/>\nM. Yu, Y. Zhang, J. Mirkovic and A. Alwabel<br \/>\nOpen Networking Summit, 2014.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/sigmetrics.pdf\" target=\"_blank\" rel=\"noopener\">When Is Service Really Denied? A User-Centric DoS Metric<\/a><br \/>\nJ. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, W. Yao, P. Reiher, S. Schwab and R. Thomas,<br \/>\n<b>Poster paper<\/b>\u00a0at the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2007.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ccr.pdf\" target=\"_blank\" rel=\"noopener\">A Taxonomy of DDoS Attacks and Defense Mechanisms<\/a><br \/>\nJ. Mirkovic and P. Reiher,<br \/>\nACM SIGCOMM Computer Communications Review, Vol. 34, Num. 2, April 2004, pp. 39-54.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ry118.pdf\" target=\"_blank\" rel=\"noopener\">Genetic Search Based on Multiple Mutations<\/a><br \/>\nV. Milutinovic, D. Cvetkovic and J. Mirkovic,<br \/>\nIEEE Computer, pp. 118-119, November 2000.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#fffacd\"><b><i>Tech reports \/ thesis \/ other<\/i><\/b><\/td>\n<td>\n<ol>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/hacs.pdf\" target=\"_blank\" rel=\"noopener\">Designing for Fallible Humans<\/a><br \/>\nJ. Mirkovic and S. S. Woo,<br \/>\nProceedings of Humans and CyberSecurity Workshop (HACS), 2019.<br \/>\n<b>Invited paper<\/b><\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/dewstudy.pdf\" target=\"_blank\" rel=\"noopener\">Improving Testbed Experiment Design Through Shifting User Interface Emphasis<\/a>,<br \/>\nG. Bartlett, J. Mirkovic and J. Blythe,<br \/>\nUSC\/ISI Technical Report # ISI-TR-737, 2019.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/legotg.pdf\" target=\"_blank\" rel=\"noopener\">LegoTG: Composable Traffic Generation with a Custom Blueprint<\/a>,<br \/>\nJ. Mirkovic and G. Bartlett,<br \/>\nUSC\/ISI Technical Report # ISI-TR-699, 2015.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/dadlsubmit.pdf\" target=\"_blank\" rel=\"noopener\">DADL: Distributed Application Description Language<\/a>,<br \/>\nJ. Mirkovic, T. Faber. P. Hsieh, G. Malayandisamu, R. Malavia,<br \/>\nUSC\/ISI Technical Report # ISI-TR-664, 2010.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/spoofer.pdf\" target=\"_blank\" rel=\"noopener\">Comparative Evaluation of Spoofing Defenses<\/a><br \/>\nE. Kissel and J. Mirkovic,<br \/>\nUSC\/ISI technical report number ISI-TR-655, January 2009.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/sarnoff.pdf\" target=\"_blank\" rel=\"noopener\">A Two-Constraint Approach to Risky Cybersecurity Experiment Management<\/a><br \/>\nJ. Wroclawski, J. Mirkovic, T. Faber and S. Schwab,<br \/>\nInvited paper at the 2008 Sarnoff Symposium.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/csig.pdf\" target=\"_blank\" rel=\"noopener\">A Practical IP Spoofing Defense Through Route-Based Filtering<\/a><br \/>\nJ. Mirkovic, N. Jevtic and P. Reiher,<br \/>\nUniversity of Delaware CIS Department Technical Report CIS-TR-2006-332.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/udel_tech_report_2005-02.pdf\" target=\"_blank\" rel=\"noopener\">Distributed Defense Against DDOS Attacks<\/a><br \/>\nJ. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou,<br \/>\nUniversity of Delaware CIS Department Technical Report CIS-TR-2005-02.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ucla_tech_report_020018.pdf\" target=\"_blank\" rel=\"noopener\">A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms<\/a><br \/>\nJ. Mirkovic, J. Martin and P. Reiher,<br \/>\nUCLA CSD Technical Report CSD-TR-020018.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ucla_tech_report_010042.pdf\" target=\"_blank\" rel=\"noopener\">Source Router Approach to DDoS Defense<\/a><br \/>\nJ. Mirkovic, G. Prier and P. Reiher,<br \/>\nUCLA CSD Technical Report CSD-TR-010042.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ucla_tech_report_020030.pdf\" target=\"_blank\" rel=\"noopener\">iSAVE: Incrementally Deployable Source Address Validation<\/a><br \/>\nJ. Mirkovic, Z. Xu, J. Li, M. Schnaider, P. Reiher and L. Zhang,<br \/>\nUCLA CSD Technical Report CSD-TR-020030.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/dward-thesis.pdf\" target=\"_blank\" rel=\"noopener\">D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks<\/a><br \/>\nJ. Mirkovic,<br \/>\nPh.D. Thesis, UCLA, August 2003.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ucla_tech_report_010004.pdf\" target=\"_blank\" rel=\"noopener\">SAVE: Source Address Validity Enforcement Protocol<\/a><br \/>\nJ. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang,<br \/>\nUCLA Technical Report CSD-TR-010004.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\n\t\tGrants\n\t<\/h2>\n\t<p>&nbsp;<\/p>\n<table border=\"1\" width=\"100%\">\n<tbody>\n<tr>\n<td bgcolor=\"#fffacd\"><strong><em>Active<\/em><\/strong><\/td>\n<td>\n<ol>\n<li><a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2330066\">Research Infrastructure: Mid-scale RI-1 (M1:IP): SPHERE &#8211; Security and Privacy Heterogeneous Environment for Reproducible Experimentation<\/a><br \/>\naward number 2330066<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: B. Kocoloski, USC\/ISI<br \/>\nCo-PI: D. Choffnes, Northeastern University<\/li>\n<li><a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2319864&amp;HistoricalAwards=false\">CICI: RSSD: DISCERN: Datasets to Illuminate Suspicious Computations on Engineering Research Networks<\/a><br \/>\naward number 2319864<br \/>\nLead PI: B. Kocoloski, USC\/ISI<br \/>\nCo-PI: J. Mirkovic, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/~mirkovic\/grants\/duripll.txt\" target=\"_blank\" rel=\"noopener\">Modernizing DeterLab education support and growing and diversifying education user base<\/a><br \/>\nAFRL DURIP<br \/>\naward number FA9550-22-1-0459<br \/>\nLead PI: Jelena Mirkovic, USC\/ISI<\/li>\n<\/ol>\n<ol>\n<li><a href=\"https:\/\/ant.isi.edu\/classnet\/\" target=\"_blank\" rel=\"noopener\">Community Labeling and Sharing of Security and Networking Test datasets (CLASSNET)<\/a><br \/>\nNSF CCRI<br \/>\naward number 8115780<br \/>\nLead PI: Jelena Mirkovic, USC\/ISI<br \/>\nCo-PI: John Heidemann, USC\/ISI<br \/>\nCo-PI: Wes Hardaker, USC\/ISI<br \/>\nCo-PI: Michalis Kallitsis, Merit Network Inc.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#fffacd\"><strong><em>Completed<\/em><\/strong><\/td>\n<td>\n<ol>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/moddeter.txt\" target=\"_blank\" rel=\"noopener\">ENS: Modernizing and Streamlining DeterLab Testbed Experimentation<\/a><br \/>\nNSF CCRI<br \/>\naward number 2016643<br \/>\nLead PI: Jelena Mirkovic, USC\/ISI<br \/>\nCo-PI: Terry Benzel, USC\/ISI<\/li>\n<li><a href=\"https:\/\/reu.isi.edu\/\" target=\"_blank\" rel=\"noopener\">REU Site: SURF-I: Safe, Usable, Resilient and Fair Internet<\/a><br \/>\nNSF REU<br \/>\naward number 2051101<br \/>\nLead PI: Jelena Mirkovic, USC\/ISI<br \/>\nCo-PI: Luis Garcia, USC\/ISI<br \/>\nCo-PI: Fred Morstatter, USC\/ISI<br \/>\nCo-PI: Rafael Ferreira da Silva, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/searcch.txt\" target=\"_blank\" rel=\"noopener\">SEARCCH: Sharing Expertise and Artifacts for Reuse through a Cybersecurity Community Hub<\/a><br \/>\nNSF OCI<br \/>\naward number 1925564<br \/>\nLead PI: Terry Benzel, USC\/ISI<br \/>\nCo-PI: Jelena Mirkovic, USC\/ISI<br \/>\nCo-PI: Eric Eide, University of Utah<br \/>\nCo-PI: David Balenson, SRI<br \/>\nCo-PI: Laura Tinnel, SRI<br \/>\nCo-PI: Tim Yardley, University of Illinois at Urbana-Champaign<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/dreams.pdf\" target=\"_blank\" rel=\"noopener\">DETER Research Education and Operations Mission Sustainment<\/a><br \/>\nNSF OCI<br \/>\naward number 1842703<br \/>\nLead PI: T. Benzel, USC\/ISI<br \/>\nCo-PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: E.Kline, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/dew.pdf\" target=\"_blank\" rel=\"noopener\">Distributed Workflows for Cyberexperimentation<\/a><br \/>\nNSF OAC Software Institutes<br \/>\naward number 1835608<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: G. Bartlett, USC\/ISI<br \/>\nCo-PI: J. Blythe, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/leader.pdf\" target=\"_blank\" rel=\"noopener\">Hardening Systems Against Low-Rate DDoS Attacks<\/a><br \/>\nNSF SaTC<br \/>\naward number 1815495<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: C. Hauser, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ddidd.pdf\" target=\"_blank\" rel=\"noopener\">DDoS Defense In Depth for DNS<\/a><br \/>\nNSF OCI CICI<br \/>\naward number 1739034<br \/>\nLead PI: J. Heidemann, USC\/ISI<br \/>\nCo-PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: W. Hardaker, USC\/ISI<\/li>\n<li><a href=\"http:\/\/reu.isi.edu\/\" target=\"_blank\" rel=\"noopener\">REU Site: Human Communication in a Connected World<\/a><br \/>\nNSF CNS<br \/>\naward number 1659886<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: C. Hauser, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/modeling.pdf\" target=\"_blank\" rel=\"noopener\">Modeling Student Activity and Learning on Cybersecurity Testbeds<\/a><br \/>\nNSF Cybercorps SFS<br \/>\naward number 1723717<br \/>\nLead PI: J. Mirkovic USC\/ISI<br \/>\nCo-PI: Richard Weiss, Evergreen College<br \/>\nCo-PI: Jens Mache, Lewis and Clarke College<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/senss-2.pdf\" target=\"_blank\" rel=\"noopener\">SENSS: Security Service for the Internet<\/a><br \/>\nDHS DDoSD<br \/>\naward number D15PC00184<br \/>\nLead PI: J. Mirkovic USC\/ISI<br \/>\nCo-PI: M. Yu, Yale University<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/cctf.pdf\" target=\"_blank\" rel=\"noopener\">Revitalizing Cyber Security Education and Research through Competitions<\/a><br \/>\nNSF SaTC<br \/>\naward number 1224035<br \/>\nLead PI: J. Mirkovic USC\/ISI<br \/>\nCo-PI: Ronald Pike, CSU Pomona<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/frade.pdf\" target=\"_blank\" rel=\"noopener\">FRADE: Model Human Behavior for Flash cRowd Attack DEfense<\/a><br \/>\nNSF SaTC<br \/>\naward number 1319215<br \/>\nLead PI: J. Mirkovic USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/critter.pdf\" target=\"_blank\" rel=\"noopener\">Critter@home: Content-Rich Traffic Trace Repository from Real-Time, Anonymous, User Contributions<\/a><br \/>\nNSF SaTC<br \/>\naward number 1224035<br \/>\nLead PI: J. Mirkovic USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/trafgen.pdf\">Traffic modeling and generation with custom fidelity for cyber security experimentation<\/a><br \/>\nNSF SDCI<br \/>\naward number 1127388<br \/>\nLead PI: J. Mirkovic USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/seq.pdf\" target=\"_blank\" rel=\"noopener\">Privacy-safe sharing of network data via secure queries<\/a><br \/>\nNSF CNS Trusted Computing<br \/>\naward number 0914780<br \/>\nLead PI: J. Mirkovic USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/usage.pdf\">Investigating Network Testbed Usage<\/a><br \/>\nNSF EAGER<br \/>\naward number 1049758<br \/>\nLead PI: J. Mirkovic USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/ccli.pdf\" target=\"_blank\" rel=\"noopener\">Hands-on exercises on DETER testbed for security education<\/a><br \/>\nNSF DUE Course, Curriculum and Laboratory Improvement (CCLI)<br \/>\naward number 0920719<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: P. Reiher, UCLA<br \/>\nCo-PI: D. Massey, Colorado State University<br \/>\nCo-PI: Mooi-Choo Chuah, Lehigh University<br \/>\nCo-PI: B. Hoon Kang, UNC Charlotte<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/btct.pdf\" target=\"_blank\" rel=\"noopener\">Beyond Testbeds: Catalyzing Transformative Research and Education through Cybersecurity Collaboratories (BTCT)<\/a><br \/>\nNSF CNS Cyber Trust<br \/>\naward number 0831491<br \/>\nLead PI: J. Wroclawski, USC\/ISI<br \/>\nCo-PI: J. Mirkovic, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/spoofed.pdf\" target=\"_blank\" rel=\"noopener\">Enabling Routers to Detect and Filter Spoofed Traffic<\/a><br \/>\nNSF CNS Cyber Trust<br \/>\naward number 0716452<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: P. Reiher, UCLA<\/li>\n<li>Transparent, Secure and Reliable Virtual Infrastructure Management<br \/>\nUSC-InfoSys Center for Research and Education in Advanced Software Technologies (CAST)<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: T. Faber, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/isim.pdf\">iSim &#8211; Simulator of Internet-scale Events<\/a><br \/>\nNSF CNS Computing Research Infrastructure (CRI) &#8211; planning grant<br \/>\naward number: 0708774<br \/>\nLead PI: J. Mirkovic, USC\/ISI<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/ddos-benchmarks\/\">Benchmarks for DDoS Defense<\/a><br \/>\nHomeland Security Advanced Research Projects Agency<br \/>\naward number FA8750-05-2-0197<br \/>\nLead PI: J. Mirkovic, USC\/ISI<br \/>\nCo-PI: P. Reiher, UCLA<br \/>\nCo-PI: S. Fahmy, Purdue University<br \/>\nCo-PI: R. Thomas, SPARTA, Inc.<\/li>\n<li><a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/defcom.pdf\" target=\"_blank\" rel=\"noopener\">DefCOM &#8211; Distributed Defense Against DDoS Attacks<\/a><br \/>\nNSF CNS Cyber Trust<br \/>\naward number 0430228<br \/>\nLead PI: J. Mirkovic, University of Delaware<br \/>\nCo-PI: P. Reiher, UCLA<\/li>\n<li>Securing DefCOM operation from inside and outside threats<br \/>\nNSF Research Experiences for Undergraduates (REU) Supplement<br \/>\naward number 0430228<br \/>\nLead PI: J. Mirkovic, University of Delaware<\/li>\n<li>Machine Learning for Worm Defense<br \/>\nUniversity of Delaware Research Foundation<br \/>\nLead PI: J. Mirkovic, University of Delaware<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\n\t\tProgram Committee Service\n\t<\/h2>\n\t<ul>\n<li><strong>PC chair<\/strong> for PAM 2015, NPSec (Workshop on Secure Network Protocols) 2009, CSET (Workshop on Cyber Security Experimentation and Test) 2008 and 2009.<\/li>\n<li><strong>Local chair<\/strong> for PAM 2014.<\/li>\n<li><strong>Track chair<\/strong> for ACM CCS 2021.<\/li>\n<li><strong>TPC member<\/strong> IMC 2024, USENIX Security 2023, IMC 2022, USENIX Security 2022, ACM CCS 2022, USENIX Security 2021, RAID 2021, IMC 2021, International Workshop on Traffic Measurement for Cybersecurity 2021, NDSS 2020, Euro S&amp;P 2020, SOSR 2020, Usenix Security 2020, CoNext 2019, IMC 2019, DIMVA 2019, PAM 2019, Usenix Security 2019, RAID 2019, NDSS 2018, CSET 2017, ASE 2017, LASER 2017, CSET 2016, ASE 2016, Oakland S&amp;P 2015, IMC 2014, PAM 2014, CANS 2013, ACSAC 2012, IMC 2012, ICDCS 2011, Securecomm 2009, Global Internet 2008 and 2009, Chinacom 2009, IEEE Consumer Communications and Networking Conference 2008, Applied Cryptography and Network Security 2008, INFOCOM 2006, IWQoS (International Workshop on Quality of Service) 2006, 2007 and 2008, ICCCN (IEEE International Conference on Computer Communications and Networks) 2006, 2007 and 2008, WSPWN (International Workshop on Research Challenges in Mobile and Wireless Networks Security and Privacy) 2006, NPSec (Workshop on Secure Network Protocols) 2005, 2006, 2008 and 2013, WORIA (International Workshop on Rapid Internet Attacks) 2005.<\/li>\n<li><strong>Invited session chair<\/strong> for &#8220;Network Security&#8221; session at the Sarnoff Symposium 2007 and 2008.<\/li>\n<li><strong>Publicity chair<\/strong> for SIGCOMM 2007, NPSec (Workshop on Secure Network Protocols) 2007.<\/li>\n<\/ul>\n<h2>\n\t\tReviewer and Editor Service\n\t<\/h2>\n\t<ul>\n<li><strong>Co-editor<\/strong> of IEEE Security and Privacy Magazine&#8217;s security education column<\/li>\n<li><strong>Associate Editor<\/strong> of ACM Transactions on Security and Privacy (TOPS)<\/li>\n<li><strong>Editor<\/strong> of Elsevier Computer Networks<\/li>\n<li>NSF Cyber Trust, NeTS, CAREER and REU program panelist<\/li>\n<li><strong>ACM<\/strong> CCR (Computer Communications Review), ACM Transactions on Internet Technology, ACM Symposium on Applied Computing, ACM Operating Systems Review, ACM Computing Surveys<\/li>\n<li><strong>IEEE<\/strong> Transactions on Dependable and Secure Computing, IEEE Transactions on Computers, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Mobile Computing, IEEE Transactions on Cloud Computing, IEEE Journal on Selected Areas in Communications, IEEE Security and Privacy Magazine, IEEE Computer Magazine, IEEE Communications Letters<br \/>\nInternational Journal of Information Security<\/li>\n<li><strong>Elsevier<\/strong> International Journal of Computer and Telecommunications Networking, Elsevier Ad Hoc Networks Journal, Elsevier Computer Networks Journal<\/li>\n<li>EURASIP Journal on Advances in Signal Processing<\/li>\n<li>SpringerLink International Journal of Information Security<\/li>\n<li><strong>The Handbook<\/strong> of Information Security, The Handbook of Computer Networks<\/li>\n<li>ETRI Journal<\/li>\n<\/ul>\n\n","protected":false},"excerpt":{"rendered":"<p>Jelena Mirkovic CURRICULUM VITAE USC Information Sciences Institute 4676 Admiralty Way ste 1001 Marina Del Rey, CA 90292 310-448-9170 E-mail:\u00a0sunshine@isi.edu Homepage:\u00a0https:\/\/www.isi.edu\/people-mirkovic\/ Appointments Principal Scientist University of Southern California, Information Sciences Institute 1\/2013 &#8211; present Research Associate Professor University of Southern California 12\/2017 &#8211; present Research Assistant Professor University of Southern California 8\/2010 &#8211; 12\/2017 Computer&hellip;<\/p>\n","protected":false},"author":421,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CV - Jelena Mirkovic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/people-mirkovic\/cv\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CV - Jelena Mirkovic\" \/>\n<meta property=\"og:description\" content=\"Jelena Mirkovic CURRICULUM VITAE USC Information Sciences Institute 4676 Admiralty Way ste 1001 Marina Del Rey, CA 90292 310-448-9170 E-mail:\u00a0sunshine@isi.edu Homepage:\u00a0https:\/\/www.isi.edu\/people-mirkovic\/ Appointments Principal Scientist University of Southern California, Information Sciences Institute 1\/2013 &#8211; present Research Associate Professor University of Southern California 12\/2017 &#8211; present Research Assistant Professor University of Southern California 8\/2010 &#8211; 12\/2017 Computer&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/people-mirkovic\/cv\/\" \/>\n<meta property=\"og:site_name\" content=\"Jelena Mirkovic\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-08T20:55:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/cv\/\",\"url\":\"https:\/\/www.isi.edu\/people-mirkovic\/cv\/\",\"name\":\"CV - Jelena Mirkovic\",\"isPartOf\":{\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/#website\"},\"datePublished\":\"2023-10-06T18:07:13+00:00\",\"dateModified\":\"2024-11-08T20:55:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/cv\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isi.edu\/people-mirkovic\/cv\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/cv\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isi.edu\/people-mirkovic\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CV\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/#website\",\"url\":\"https:\/\/www.isi.edu\/people-mirkovic\/\",\"name\":\"Jelena Mirkovic\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isi.edu\/people-mirkovic\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CV - Jelena Mirkovic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/people-mirkovic\/cv\/","og_locale":"en_US","og_type":"article","og_title":"CV - Jelena Mirkovic","og_description":"Jelena Mirkovic CURRICULUM VITAE USC Information Sciences Institute 4676 Admiralty Way ste 1001 Marina Del Rey, CA 90292 310-448-9170 E-mail:\u00a0sunshine@isi.edu Homepage:\u00a0https:\/\/www.isi.edu\/people-mirkovic\/ Appointments Principal Scientist University of Southern California, Information Sciences Institute 1\/2013 &#8211; present Research Associate Professor University of Southern California 12\/2017 &#8211; present Research Assistant Professor University of Southern California 8\/2010 &#8211; 12\/2017 Computer&hellip;","og_url":"https:\/\/www.isi.edu\/people-mirkovic\/cv\/","og_site_name":"Jelena Mirkovic","article_modified_time":"2024-11-08T20:55:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/people-mirkovic\/cv\/","url":"https:\/\/www.isi.edu\/people-mirkovic\/cv\/","name":"CV - Jelena Mirkovic","isPartOf":{"@id":"https:\/\/www.isi.edu\/people-mirkovic\/#website"},"datePublished":"2023-10-06T18:07:13+00:00","dateModified":"2024-11-08T20:55:26+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/people-mirkovic\/cv\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/people-mirkovic\/cv\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/people-mirkovic\/cv\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/people-mirkovic\/"},{"@type":"ListItem","position":2,"name":"CV"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/people-mirkovic\/#website","url":"https:\/\/www.isi.edu\/people-mirkovic\/","name":"Jelena Mirkovic","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/people-mirkovic\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}