default search action
Nevil Brownlee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. J. Comput. Secur. 29(1): 25-50 (2021) - 2020
- [i17]Nevil Brownlee, Bob Hinden:
Independent Submission Editor Model. RFC 8730: 1-6 (2020)
2010 – 2019
- 2019
- [j9]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Checking certificate revocation efficiently using certificate revocation guard. J. Inf. Secur. Appl. 48 (2019) - 2018
- [c32]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard. DSN 2018: 350-361 - 2017
- [c31]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Evaluating network intrusion detection systems for high-speed networks. ITNAC 2017: 1-6 - 2016
- [j8]Maurizio Dusi, Alessandro Finamore, Kimberly C. Claffy, Nevil Brownlee, Darryl Veitch:
Measuring and Troubleshooting the Internet: Algorithms, Tools and Applications. IEEE J. Sel. Areas Commun. 34(6): 1805-1806 (2016) - [c30]Maziar Janbeglou, Nevil Brownlee:
OverUDP: Tunneling Transport Layer Protocols in UDP for P2P Application of IPv4. AINA Workshops 2016: 325-330 - [c29]Maziar Janbeglou, Nevil Brownlee:
Identifying Tunnelled Proxies through Passively Monitoring Network Traffic. HPCC/SmartCity/DSS 2016: 63-69 - [c28]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation. LCN 2016: 527-530 - [i16]Nevil Brownlee:
SVG Drawings for RFCs: SVG 1.2 RFC. RFC 7996: 1-53 (2016) - 2015
- [c27]Se-Young Yu, Nevil Brownlee, Aniket Mahanti:
Comparative analysis of big data transfer protocols in an international high-speed network. IPCCC 2015: 1-9 - [c26]Se-Young Yu, Nevil Brownlee, Aniket Mahanti:
Characterizing performance and fairness of big data transfer protocols on long-haul networks. LCN 2015: 213-216 - [c25]Thitipong Jarassriwilai, Tiffany Dauber, Nevil Brownlee, Aniket Mahanti:
Understanding evolution and adoption of Top-level Domain names. LCN Workshops 2015: 687-694 - 2014
- [j7]Ramin Sadre, Anna Sperotto, Rick Hofstede, Nevil Brownlee:
Flow-based Approaches in Network Management: Recent Advances and Future Trends. Int. J. Netw. Manag. 24(4): 219-220 (2014) - [c24]Maziar Janbeglou, Habib Naderi, Nevil Brownlee:
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks. AINA Workshops 2014: 524-529 - [c23]Se-Young Yu, Nevil Brownlee, Aniket Mahanti:
Performance and Fairness Issues in Big Data Transfers. CoNEXT Student Workshop 2014: 9-11 - [c22]Qinwen Hu, Nevil Brownlee:
How Interface ID Allocation Mechanisms are Performed in IPv6. CoNEXT Student Workshop 2014: 26-27 - [c21]Nevil Brownlee:
On Searching for Patterns in Traceroute Responses. PAM 2014: 67-76 - [c20]Tanja Zseby, Nevil Brownlee, Alistair King, kc claffy:
Nightlights: Entropy-Based Metrics for Classifying Darkspace Traffic Patterns. PAM 2014: 275-277 - [c19]Brian Trammell, David Gugelmann, Nevil Brownlee:
Inline Data Integrity Signals for Passive Measurement. TMA 2014: 15-25 - 2013
- [c18]Se-Young Yu, Nevil Brownlee, Aniket Mahanti:
Comparative performance analysis of high-speed transfer protocols for big data. LCN 2013: 292-295 - [c17]Tanja Zseby, Alistair King, Nevil Brownlee, Kimberly C. Claffy:
The Day after Patch Tuesday: Effects Observable in IP Darkspace Traffic. PAM 2013: 273-275 - [i15]Heather Flanagan, Nevil Brownlee:
RFC Series Format Requirements and Future Development. RFC 6949: 1-14 (2013) - 2012
- [c16]Nevil Brownlee:
One-Way Traffic Monitoring with iatmon. PAM 2012: 179-188 - [i14]Nevil Brownlee, Internet Architecture Board:
Independent Submission Model. RFC 6548: 1-5 (2012) - 2011
- [j6]Nevil Brownlee:
Flow-Based Measurement: IPFIX Development and Deployment. IEICE Trans. Commun. 94-B(8): 2190-2198 (2011)
2000 – 2009
- 2009
- [c15]Nikolaos Chatzis, Nevil Brownlee:
Similarity Search over DNS Query Streams for Email Worm Detection. AINA 2009: 588-595 - [c14]Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee:
Email worm detection by wavelet analysis of DNS query streams. CICS 2009: 53-60 - [i13]Ganesh Sadasivan, Nevil Brownlee, Benoit Claise, Jürgen Quittek:
Architecture for IP Flow Information Export. RFC 5470: 1-31 (2009) - [i12]Tanja Zseby, Elisa Boschi, Nevil Brownlee, Benoit Claise:
IP Flow Information Export (IPFIX) Applicability. RFC 5472: 1-31 (2009) - 2008
- [c13]DongJin Lee, Nevil Brownlee:
On the Variability of Internet Host Interactions. GLOBECOM 2008: 2403-2308 - 2007
- [c12]Bojan Zdrnja, Nevil Brownlee, Duane Wessels:
Passive Monitoring of DNS Anomalies. DIMVA 2007: 129-139 - [c11]DongJin Lee, Nevil Brownlee:
A Methodology for Finding Significant Network Hosts. LCN 2007: 981-988 - [c10]Ziqian Liu, Bradley Huffaker, Marina Fomenkov, Nevil Brownlee, Kimberly C. Claffy:
Two Days in the Life of the DNS Anycast Root Servers. PAM 2007: 125-134 - 2006
- [e1]Ehab Al-Shaer, Aiko Pras, Nevil Brownlee:
Fourth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, E2EMON'06, 3rd April, 2006, Vancouver, BC, Canada. IEEE 2006, ISBN 1-4244-0145-3 [contents] - 2005
- [c9]Srinivas Shakkottai, Nevil Brownlee, kc claffy:
A Study of Burstiness in TCP Flows. PAM 2005: 13-26 - [c8]Nevil Brownlee:
Some Observations of Internet Stream Lifetimes. PAM 2005: 265-277 - [c7]Alok Shriram, Margaret Murray, Young Hyun, Nevil Brownlee, Andre Broido, Marina Fomenkov, Kimberly C. Claffy:
Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links. PAM 2005: 306-320 - 2004
- [j5]Nevil Brownlee, kc claffy:
Internet Measurement. IEEE Internet Comput. 8(5): 30-33 (2004) - [c6]Thomas Karagiannis, Andre Broido, Nevil Brownlee, kc claffy, Michalis Faloutsos:
Is P2P dying or just hiding? [P2P traffic measurement]. GLOBECOM 2004: 1532-1538 - [c5]Duane Wessels, Marina Fomenkov, Nevil Brownlee, Kimberly C. Claffy:
Measurements and Laboratory Simulations of the Upper DNS Hierarchy. PAM 2004: 147-157 - [r1]Nevil Brownlee, kc claffy:
Measuring the Internet. The Practical Handbook of Internet Computing 2004 - 2002
- [j4]Nevil Brownlee, Kimberly C. Claffy:
Understanding Internet traffic streams: dragonflies and tortoises. IEEE Commun. Mag. 40(10): 110-117 (2002) - [c4]Nevil Brownlee, Kimberly C. Claffy:
Internet stream size distributions. SIGMETRICS 2002: 282-283 - 2001
- [c3]Nevil Brownlee, Kimberly C. Claffy, Evi Nemeth:
DNS measurements at a root server. GLOBECOM 2001: 1672-1676 - [c2]Nevil Brownlee:
Using the NeTraMet for Production Traffic Measurement. Integrated Network Management 2001: 213-226 - [c1]Nevil Brownlee, Kimberly C. Claffy, Evi Nemeth:
DNS Root/g TLD Server Measurements. LISA 2001: 241-256 - 2000
- [j3]Nevil Brownlee, Russell Fulton:
Kawaihiko and the third-quartile day [traffic management]. IEEE Commun. Mag. 38(8): 162-168 (2000) - [i11]Nevil Brownlee, Alan Blount:
Accounting Attributes and Record Formats. RFC 2924: 1-36 (2000)
1990 – 1999
- 1999
- [i10]Nevil Brownlee:
Traffic Flow Measurement: Meter MIB. RFC 2720: 1-55 (1999) - [i9]Nevil Brownlee:
RTFM: Applicability Statement. RFC 2721: 1-10 (1999) - [i8]Nevil Brownlee, Cyndi Mills, Gregory R. Ruth:
Traffic Flow Measurement: Architecture. RFC 2722: 1-48 (1999) - [i7]Nevil Brownlee:
SRL: A Language for Describing Traffic Flows and Specifying Actions for Flow Groups. RFC 2723: 1-22 (1999) - [i6]Sigmund W. Handelman, Stephen Stibler, Nevil Brownlee, Gregory R. Ruth:
RTFM: New Attributes for Traffic Flow Measurement. RFC 2724: 1-18 (1999) - 1998
- [j2]Nevil Brownlee:
Network Management and Realtime Traffic Flow Measurement. J. Netw. Syst. Manag. 6(2): 223-228 (1998) - [i5]Nevil Brownlee, Erik Guttman:
Expectations for Computer Security Incident Response. RFC 2350: 1-38 (1998) - 1997
- [i4]Nevil Brownlee, Cyndi Mills, Gregory R. Ruth:
Traffic Flow Measurement: Architecture. RFC 2063: 1-37 (1997) - [i3]Nevil Brownlee:
Traffic Flow Measurement: Meter MIB. RFC 2064: 1-38 (1997) - [i2]Nevil Brownlee:
Traffic Flow Measurement: Experiences with NeTraMet. RFC 2123: 1-34 (1997) - 1994
- [i1]Nevil Brownlee:
Accounting Requirements for IPng. RFC 1672: 1-3 (1994)
1970 – 1979
- 1977
- [j1]Nevil Brownlee:
An Algol-Based Implementation of SNOBOL4 Patterns. Commun. ACM 20(7): 527-529 (1977)
Coauthor Index
aka: Kimberly C. Claffy
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint