ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

Journal articles and other publications can be found here.

Evaluating Externally Visible OutagesA. Alwabel, J. Healy, J. Heidemann, B. Luu, Y. Pradkin, and R. Safavian
ISI-TR-701
August, 2015

QUASAR: A New Approach to Software AttestationJ. Abramson, S. Schwab, Q. Tran, and W. B. Moore
ISI-TR-700
July, 2015

LegoTG: Composable Traffic Generation with a Custom BlueprintJ. Mirkovic and G. Bartlett
ISI-TR-699
June, 2015

Poster: Lightweight Content-based Phishing DetectionC. Ardi and J. Heidemann
ISI-TR-698
May, 2015

PASO: An Integrated, Scalable PSO-based Optimization Framework for Hyper-Redundant Manipulator Path Planning and Inverse KinematicsT. Collins and W. - M. Shen
ISI-TR-697
April, 2015

Implementation of the TCP Extended Data Offset OptionH. Trieu, J. Touch, and T. Faber
ISI-TR-696
March, 2015

Connection-Oriented DNS to Improve Privacy and Security (extended)L. Zhu, Z. Hu, J. Heidemann, D. Wessels, A. Mankin, and N. Somaiya
ISI-TR-695
February, 2015

Detecting Malicious Activity with {DNS} Backscatter (extended)K. Fukuda, J. Heidemann,
ISI-TR-2015-704
2015

Connection-Oriented {DNS} to Improve Privacy and Security (extended)L. Zhu, Z. Hu, J. Heidemann, D. Wessels, A. Mankin, N. Somaiya,
ISI-TR-2015-695
2015

Assessing Co-Locality of {IP} BlocksM. Gharaibeh, H. Zhang, C. Papadopoulos, J. Heidemann,
CS-15-103
2015