Jelena Mirkovic
University of Southern California
H-index: 35
North America-United States
Top articles of Jelena Mirkovic
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
DeterLab Testbed for Cybersecurity Experimentation | Terry Benzel Jelena Mirkovic David Balenson Brian Kocoloski | 2023 | |
Practical intent-driven routing configuration synthesis | Sivaramakrishnan Ramanathan Ying Zhang Mohab Gawish Yogesh Mundada Zhaodong Wang | 2023 | |
Defending Root DNS Servers against DDoS Using Layered Defenses (Extended) | Ad Hoc Networks | ASM Rizvi Jelena Mirkovic John Heidemann Wesley Hardaker Robert Story | 2023/12/1 |
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications | Rajat Tandon Haoda Wang Nicolaas Weideman Shushan Arakelyan Genevieve Bartlett | 2023/7 | |
Prediction of network events via rule set representations of machine learning models | 2023/6/6 | ||
Toward findable, accessible, interoperable, and reusable cybersecurity artifacts | Arafath Nihar Alan J Curran Ahmad M Karimi Jennifer L Braid Laura S Bruckman | 2021/6/20 | |
Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals | arXiv preprint arXiv:2211.04918 | Rafail Kartsioukas Rajat Tandon Zheng Gao Jelena Mirkovic Michalis Kallitsis | 2022/11/9 |
Measuring changes in regional network traffic due to covid-19 stay-at-home measures | arXiv preprint arXiv:2203.00742 | Jelena Mirkovic Yebo Feng Jun Li | 2022/3/1 |
Did your child get disturbed by an inappropriate advertisement on YouTube? | Jeffrey Liu Rajat Tandon Uma Durairaj Jiani Guo Spencer Zahabizadeh | 2022/8 | |
Polymorphic malware behavior through network trace analysis | Xiyue Deng Jelena Mirkovic | 2022/1/4 | |
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables | Nicolaas Weideman Haoda Wang Tyler Kann Spencer Zahabizadeh Wei-Cheng Wu | 2022/6 | |
Understanding DNS Query Composition at B-Root | Jacob Ginesin Jelena Mirkovic | 2022/12/6 | |
I know what you did on Venmo: Discovering privacy leaks in mobile social payments | Rajat Tandon Pithayuth Charnsethikul Ishank Arora Dhiraj Murthy Jelena Mirkovic | 2022 | |
Samba: Identifying Inappropriate Videos for Young Children on YouTube | Le Binh Rajat Tandon Chingis Oinar Jeffrey Liu Uma Durairaj | 2022/10/17 | |
AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs | Rajat Tandon Pithayuth Charnsethikul Michalis Kallitsis Jelena Mirkovic | 2022/8 | |
“Free” as in Freedom to Protest? | IEEE Security & Privacy | Fabio Massacci Antonino Sabetta Jelena Mirkovic Toby Murray Hamed Okhravi | 2022/9/13 |
Xatu: Boosting existing DDoS detection systems using auxiliary signals | Zhiying Xu Sivaramakrishnan Ramanathan Alexander Rush Jelena Mirkovic Minlan Yu | 2022/11/30 | |
Cybersecurity datasets: A mirage | Jelena Mirkovic Stephen Hayne Michalis Kallitsis Wes Hardaker John Heidemann | 2021 | |
Defending web servers against flash crowd attacks | Rajat Tandon Abhinav Palia Jaydeep Ramani Brandon Paulsen Genevieve Bartlett | 2021/6/10 | |
Malware behavior through network trace analysis | Xiyue Deng Jelena Mirkovic | 2021 |