default search action
Jelena Mirkovic
- > Home > Persons > Jelena Mirkovic
Publications
- 2024
- [i6]Mithün Paul, Genevieve Bartlett, Jelena Mirkovic, Marjorie Freedman:
Phishing Email Detection Using Inputs From Artificial Intelligence. CoRR abs/2405.12494 (2024) - 2023
- [j24]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers against DDoS Using Layered Defenses (Extended). Ad Hoc Networks 151: 103259 (2023) - [c84]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers Against DDoS Using Layered Defenses. COMSNETS 2023: 513-521 - [c83]Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, Jelena Mirkovic:
Practical Intent-driven Routing Configuration Synthesis. NSDI 2023: 629-644 - [c82]Rajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic:
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications. RAID 2023: 744-758 - 2022
- [j22]Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor:
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. IEEE Secur. Priv. 20(1): 87-95 (2022) - [j21]Fabio Massacci, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E. Geer:
"Free" as in Freedom to Protest? IEEE Secur. Priv. 20(5): 16-21 (2022) - [j20]Rajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, Jelena Mirkovic:
I know what you did on Venmo: Discovering privacy leaks in mobile social payments. Proc. Priv. Enhancing Technol. 2022(3): 200-221 (2022) - [c80]Le Binh, Rajat Tandon, Chingis Oinar, Jeffrey Liu, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Fred Morstatter, Simon S. Woo, Jelena Mirkovic:
Samba: Identifying Inappropriate Videos for Young Children on YouTube. CIKM 2022: 88-97 - [c79]Xiyue Deng, Jelena Mirkovic:
Polymorphic Malware Behavior Through Network Trace Analysis. COMSNETS 2022: 138-146 - [c78]Zhiying Xu, Sivaramakrishnan Ramanathan, Alexander M. Rush, Jelena Mirkovic, Minlan Yu:
Xatu: boosting existing DDoS detection systems using auxiliary signals. CoNEXT 2022: 1-17 - [c77]Rajat Tandon, Pithayuth Charnsethikul, Michalis Kallitsis, Jelena Mirkovic:
AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs. GLOBECOM 2022: 3399-3404 - [c76]Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser:
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. RAID 2022: 276-291 - [c75]David M. Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic, Laura Tinnel:
Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts. CSET @ USENIX Security Symposium 2022: 65-70 - [i4]Jelena Mirkovic, Yebo Feng, Jun Li:
Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures. CoRR abs/2203.00742 (2022) - [i3]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers Against DDoS Using Layered Defenses. CoRR abs/2209.07491 (2022) - [i2]Jeffrey Liu, Rajat Tandon, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Neelesh Gupta, Zoe Zhou, Jelena Mirkovic:
Did your child get disturbed by an inappropriate advertisement on YouTube? CoRR abs/2211.02356 (2022) - [i1]Rafail Kartsioukas, Rajat Tandon, Zheng Gao, Jelena Mirkovic, Michalis Kallitsis, Stilian Stoev:
Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals. CoRR abs/2211.04918 (2022) - 2021
- [j19]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j18]Fariborz Farahmand, Jens Grossklags, Jelena Mirkovic, Bill Newhouse:
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education. IEEE Secur. Priv. 19(6): 104-110 (2021) - [c74]Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett, Jelena Mirkovic:
Defending Web Servers Against Flash Crowd Attacks. ACNS (2) 2021: 338-361 - 2020
- [c72]Rajat Tandon, Jelena Mirkovic, Pithayuth Charnsethikul:
Quantifying Cloud Misbehavior. CloudNet 2020: 1-8 - [c71]Giorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevskyi, Jelena Mirkovic:
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags. EuroS&P Workshops 2020: 56-65 - [c70]Sivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz:
Quantifying the Impact of Blocklisting in the Age of Address Reuse. Internet Measurement Conference 2020: 360-369 - [c69]Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu:
BLAG: Improving the Accuracy of Blacklists. NDSS 2020 - [c68]Jelena Mirkovic, Aashray Aggarwal, David Weinmann, Paul Lepe, Jens Mache, Richard Weiss:
Using Terminal Histories to Monitor Student Progress on Hands-on Exercises. SIGCSE 2020: 866-872 - 2019
- [j17]Simon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le, Jelena Mirkovic:
Using Episodic Memory for User Authentication. ACM Trans. Priv. Secur. 22(2): 11:1-11:34 (2019) - [c66]Jelena Mirkovic, Simon S. Woo:
Designing for Fallible Humans. CIC 2019: 298-305 - [c65]Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss, David Weinmann:
Measuring Student Learning On Network Testbeds. ICNP 2019: 1-2 - [c64]Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett, Jelena Mirkovic:
Defending Web Servers Against Flash Crowd Attacks. ICNP 2019: 1-2 - 2018
- [j16]Hao Shi, Jelena Mirkovic, Abdulla Alwabel:
Handling Anti-Virtual Machine Techniques in Malicious Software. ACM Trans. Priv. Secur. 21(1): 2:1-2:31 (2018) - [c63]Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang:
SENSS Against Volumetric DDoS Attacks. ACSAC 2018: 266-277 - [c62]Ameya Hanamsagar, Simon S. Woo, Chris Kanich, Jelena Mirkovic:
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes. CHI 2018: 570 - [c60]Simon S. Woo, Jelena Mirkovic:
GuidedPass: Helping Users to Create Strong and Memorable Passwords. RAID 2018: 250-270 - [c59]Xiyue Deng, Jelena Mirkovic:
Malware Analysis Through High-level Behavior. CSET @ USENIX Security Symposium 2018 - [c58]Jelena Mirkovic, Genevieve Bartlett, Jim Blythe:
DEW: Distributed Experiment Workflows. CSET @ USENIX Security Symposium 2018 - 2017
- [c57]Jelena Mirkovic, Erik Kline, Peter L. Reiher:
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. ACSAC 2017: 474-485 - [c56]Xiyue Deng, Jelena Mirkovic:
Commoner Privacy And A Study On Network Traces. ACSAC 2017: 566-576 - [c54]Hao Shi, Jelena Mirkovic:
Hiding debuggers from malware with apate. SAC 2017: 1703-1710 - [c53]Jelena Mirkovic, Genevieve Bartlett, John S. Heidemann, Hao Shi, Xiyue Deng:
Do you see me now? Sparsity in passive observations of address liveness. TMA 2017: 1-9 - 2016
- [c52]Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic:
Life-experience passwords (LEPs). ACSAC 2016: 113-126 - [c51]Simon S. Woo, Zuyao Li, Jelena Mirkovic:
Good Automatic Authentication Question Generation. INLG 2016: 203-206 - [p1]John Wroclawski, Terry V. Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab:
DETERLab and the DETER Project. The GENI Book 2016: 35-62 - 2015
- [j15]Melissa Dark, Jelena Mirkovic:
Evaluation Theory and Practice Applied to Cybersecurity Education. IEEE Secur. Priv. 13(2): 75-80 (2015) - [j14]Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning:
Evaluating Cybersecurity Education Interventions: Three Case Studies. IEEE Secur. Priv. 13(3): 63-69 (2015) - [c50]Genevieve Bartlett, Jelena Mirkovic:
Expressing Different Traffic Models Using the LegoTG Framework. ICDCS Workshops 2015: 56-63 - 2014
- [j13]Simon S. Woo, Jelena Mirkovic:
Optimal application allocation on multiple public clouds. Comput. Networks 68: 138-148 (2014) - [c47]Vinod Sharma, Genevieve Bartlett, Jelena Mirkovic:
Critter: Content-Rich Traffic Trace Repository. WISCS@CCS 2014: 13-20 - [c46]Minlan Yu, Ying Zhang, Jelena Mirkovic, Abdulla Alwabel:
SENSS: Software Defined Security Service. ONS 2014 - [c45]Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic:
SENSS: observe and control your own traffic in the internet. SIGCOMM 2014: 349-350 - [c44]Abdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic:
Safe and Automated Live Malware Experimentation on Public Testbeds. CSET 2014 - [c43]Jelena Mirkovic, Peter Peterson:
Class Capture-the-Flag Exercises. 3GSE 2014 - [c42]Hao Shi, Abdulla Alwabel, Jelena Mirkovic:
Cardinal Pill Testing of System Virtual Machines. USENIX Security Symposium 2014: 271-285 - 2012
- [j11]Jelena Mirkovic, Terry Benzel:
Teaching Cybersecurity with DeterLab. IEEE Secur. Priv. 10(1): 73-76 (2012) - [c39]Jelena Mirkovic, Hao Shi, Alefiya Hussain:
Reducing allocation errors in network testbeds. Internet Measurement Conference 2012: 495-508 - [c36]Jelena Mirkovic, Abdulla Alwabel, Ted Faber:
Beyond Disk Imaging for Preserving User State in Network Testbeds. CSET 2012 - 2011
- [j9]Jelena Mirkovic, Ezra Kissel:
Comparative Evaluation of Spoofing Defenses. IEEE Trans. Dependable Secur. Comput. 8(2): 218-232 (2011) - [c34]Arun Viswanathan, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab, John Wroclawski:
A Semantic Framework for Data Analysis in Networked Systems. NSDI 2011 - 2010
- [j8]Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko:
Tools for worm experimentation on the DETER testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 151-171 (2010) - [e2]Terry V. Benzel, Jelena Mirkovic, Angelos Stavrou:
3rd Workshop on Cyber Security Experimentation and Test, CSET '10, Washington, D.C., USA, August 9, 2010. USENIX Association 2010 [contents] - 2009
- [j6]Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Secur. Comput. 6(2): 81-95 (2009) - [c33]Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher:
RAD: Reflector Attack Defense Using Message Authentication Codes. ACSAC 2009: 269-278 - [c32]Georgios Oikonomou, Jelena Mirkovic:
Modeling Human Behavior for Defense Against Flash-Crowd Attacks. ICC 2009: 1-6 - [c31]Songjie Wei, Calvin Ko, Jelena Mirkovic, Alefiya Hussain:
Tools for worm experimentation on the DETER testbed. TRIDENTCOM 2009: 1-10 - [e1]Terry V. Benzel, Jelena Mirkovic, Angelos Stavrou:
2nd Workshop on Cyber Security Experimentation and Test, CSET '09, Montreal, Canada, August 10, 2009. USENIX Association 2009 [contents] - 2008
- [j5]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. Comput. Networks 52(2): 399-417 (2008) - [j4]Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008) - [c28]Mohit Mehta, Kanika Thapar, George C. Oikonomou, Jelena Mirkovic:
Combining Speak-Up with DefCOM for Improved DDoS Defense. ICC 2008: 1708-1714 - [c27]Songjie Wei, Jelena Mirkovic:
Correcting congestion-based error in network telescope's observations of worm dynamics. Internet Measurement Conference 2008: 125-130 - [c25]Jelena Mirkovic, Karen R. Sollins, John Wroclawski:
Managing the Health of Security Experiments. CSET 2008 - 2007
- [c22]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 - [c18]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas:
When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 - [c17]Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan K. Thomas, Stephen Schwab, Sonia Fahmy, Roman Chertov, Peter L. Reiher:
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. TRIDENTCOM 2007: 1-7 - [c16]Jelena Mirkovic, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Automating DDoS Experimentation. DETER 2007 - 2006
- [c14]George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson:
A Framework for a Collaborative DDoS Defense. ACSAC 2006: 33-42 - [c13]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko:
Measuring denial Of service. QoP 2006: 53-58 - [c12]Songjie Wei, Jelena Mirkovic, Ezra Kissel:
Profiling and Clustering Internet Hosts. DMIN 2006: 269-275 - [c10]Songjie Wei, Jelena Mirkovic:
A realistic simulation of internet-scale events. VALUETOOLS 2006: 28 - [c9]Songjie Wei, Jelena Mirkovic:
Building Reputations for Internet Clients. STM 2006: 17-30 - 2005
- [j3]Jelena Mirkovic, Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 2(3): 216-232 (2005) - [c8]Songjie Wei, Jelena Mirkovic, D. Martin Swany:
Distributed Worm Simulation with a Realistic Internet Model. PADS 2005: 71-79 - 2004
- [j2]Jelena Mirkovic, Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms. Comput. Commun. Rev. 34(2): 39-53 (2004) - 2003
- [c6]Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh. DISCEX (2) 2003: 101-102 - [c5]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Source-End DDoS Defense. NCA 2003: 171-178 - [c4]Jelena Mirkovic, Max Robinson, Peter L. Reiher:
Alliance formation for DDoS defense. NSPW 2003: 11-18 - 2002
- [c3]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Attacking DDoS at the Source. ICNP 2002: 312-321 - [c2]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002: 1557-1566 - 2001
- [c1]Jelena Mirkovic, Geetha Priya Venkataramani, Songwu Lu, Lixia Zhang:
A self-organizing approach to data forwarding in large-scale sensor networks. ICC 2001: 1357-1361
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint