ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

Journal articles and other publications can be found here.

Assessing Co-Locality of {IP} BlocksM. Gharaibeh, H. Zhang, C. Papadopoulos, J. Heidemann,
CS-15-103
2015

IRIS (Integrity and Reliability in Integrated Circuits) Test Article Generation (ITAG)J. Draper, M. C. French,
2015

Poster: Lightweight Content-based Phishing DetectionC. Ardi, J. Heidemann,
ISI-TR-2015-698
2015

Detecting Malicious Activity with {DNS} Backscatter (extended)K. Fukuda, J. Heidemann,
ISI-TR-2015-704
2015

Connection-Oriented {DNS} to Improve Privacy and Security (extended)L. Zhu, Z. Hu, J. Heidemann, D. Wessels, A. Mankin, N. Somaiya,
ISI-TR-2015-695
2015

Evaluating Externally Visible OutagesA. Alwabel, J. Healy, J. Heidemann, B. Luu, Y. Pradkin, R. Safavian.,
ISI-TR-701
2015

Web-scale Content Reuse Detection (extended)C. Ardi and J. Heidemann
ISI-TR-692
June, 2014

T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended)L. Zhu, Z. Hu, J. Heidemann, D. Wessels, A. Mankin, and N. Somaiya
ISI-TR-693
June, 2014

When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended) L. Quan, J. Heidemann, and Y. Pradkin
ISI-TR-691
May, 2014

The BLEMS Augmented Sensor DeviceJ. Touch
ISI-TR-689
March, 2014