andersen2008accountable
@inproceedings{andersen2008accountable,
  title = {Accountable internet protocol (AIP)}, 
  author = {Andersen, David G and Balakrishnan, Hari and Feamster, Nick and Koponen, Teemu
        and Moon, Daekyeong and Shenker, Scott}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {38}, 
  number = {4}, 
  year = {2008}, 
  pages = {339--350}, 
  www_tags = {selected}, 
  www_section = {Architecture}, 
}
antonakakis2010building
@inproceedings{antonakakis2010building,
  title = {Building a Dynamic Reputation System for DNS.}, 
  author = {Antonakakis, Manos and Perdisci, Roberto and Dagon, David and Lee, Wenke and
        Feamster, Nick}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2010}, 
  pages = {273--290}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
anwer2010building
@article{anwer2010building,
  title = {Building a fast, virtualized data plane with programmable hardware}, 
  author = {Anwer, Muhammad Bilal and Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {40}, 
  number = {1}, 
  year = {2010}, 
  pages = {75--82}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
anwer2010switchblade
@article{anwer2010switchblade,
  title = {Switchblade: a platform for rapid deployment of network protocols on
        programmable hardware}, 
  author = {Anwer, Muhammad Bilal and Motiwala, Murtaza and Tariq, Mukarram bin and
        Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {40}, 
  number = {4}, 
  year = {2010}, 
  pages = {183--194}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
burnett2010chipping
@inproceedings{burnett2010chipping,
  title = {Chipping Away at Censorship Firewalls with User-Generated Content.}, 
  author = {Burnett, Sam and Feamster, Nick and Vempala, Santosh}, 
  booktitle = {USENIX Security Symposium}, 
  organization = {Washington, DC}, 
  year = {2010}, 
  pages = {463--468}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
burnett2010circumventing
@article{burnett2010circumventing,
  title = {Circumventing censorship with collage}, 
  author = {Burnett, Sam and Feamster, Nick and Vempala, Santosh}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {40}, 
  number = {4}, 
  year = {2010}, 
  pages = {471--472}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
burnett2013making
@article{burnett2013making,
  title = {Making sense of internet censorship: a new frontier for internet measurement}, 
  author = {Burnett, Sam and Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {43}, 
  number = {3}, 
  year = {2013}, 
  pages = {84--89}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
caesar2005design
@inproceedings{caesar2005design,
  title = {Design and implementation of a routing control platform}, 
  author = {Caesar, Matthew and Caldwell, Donald and Feamster, Nick and Rexford, Jennifer
        and Shaikh, Aman and van der Merwe, Jacobus}, 
  booktitle = {Proceedings of the 2nd conference on Symposium on Networked Systems Design
        \& Implementation-Volume 2}, 
  organization = {USENIX Association}, 
  year = {2005}, 
  pages = {15--28}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
feamster2002infranet
@inproceedings{feamster2002infranet,
  title = {Infranet: Circumventing Web Censorship and Surveillance.}, 
  author = {Feamster, Nick and Balazinska, Magdalena and Harfst, Greg and Balakrishnan,
        Hari and Karger, David R}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2002}, 
  pages = {247--262}, 
  www_tags = {selected}, 
  www_section = {Security}, 
  www_pdf_url = {http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}, 
}
feamster2003defeating
@article{feamster2003defeating,
  title = {Defeating Web censorship with untrusted messenger discovery}, 
  author = {Feamster, Nick and Balazinska, Magdalena and Wang, Winston and Balakrishnan,
        Hari and Karger, David}, 
  journal = {Workshop on Privacy Enhancing Technologies}, 
  year = {2003}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
feamster2003guidelines
@article{feamster2003guidelines,
  title = {Guidelines for interdomain traffic engineering}, 
  author = {Feamster, Nick and Borkenhagen, Jay and Rexford, Jennifer}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {33}, 
  number = {5}, 
  year = {2003}, 
  pages = {19--30}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
feamster2003measuring
@inproceedings{feamster2003measuring,
  title = {Measuring the effects of internet path faults on reactive routing}, 
  author = {Feamster, Nick and Andersen, David G and Balakrishnan, Hari and Kaashoek, M
        Frans}, 
  booktitle = {ACM SIGMETRICS Performance Evaluation Review}, 
  organization = {ACM}, 
  volume = {31}, 
  number = {1}, 
  year = {2003}, 
  pages = {126--137}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
feamster2004case
@inproceedings{feamster2004case,
  title = {The case for separating routing from routers}, 
  author = {Feamster, Nick and Balakrishnan, Hari and Rexford, Jennifer and Shaikh, Aman
        and Van Der Merwe, Jacobus}, 
  booktitle = {Proceedings of the ACM SIGCOMM workshop on Future directions in network
        architecture}, 
  organization = {ACM}, 
  year = {2004}, 
  pages = {5--12}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
feamster2004model
@inproceedings{feamster2004model,
  title = {A model of BGP routing for network engineering}, 
  author = {Feamster, Nick and Winick, Jared and Rexford, Jennifer}, 
  booktitle = {ACM SIGMETRICS Performance Evaluation Review}, 
  organization = {ACM}, 
  volume = {32}, 
  number = {1}, 
  year = {2004}, 
  pages = {331--342}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
feamster2004modeling
@article{feamster2004modeling,
  title = {Modeling BGP route selection within an AS}, 
  author = {Feamster, Nick and Rexford, Jennifer}, 
  journal = {IEEE/ACM Transactions on Networking. To appear. Earlier version appears in ACM
        SIGMETRICS}, 
  year = {2004}, 
  www_tags = {selected}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
feamster2005detecting
@inproceedings{feamster2005detecting,
  title = {Detecting BGP configuration faults with static analysis}, 
  author = {Feamster, Nick and Balakrishnan, Hari}, 
  booktitle = {Proceedings of the 2nd conference on Symposium on Networked Systems Design
        \& Implementation-Volume 2}, 
  organization = {USENIX Association}, 
  year = {2005}, 
  pages = {43--56}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
feamster2005implications
@article{feamster2005implications,
  title = {Implications of autonomy for the expressiveness of policy routing}, 
  author = {Feamster, Nick and Johari, Ramesh and Balakrishnan, Hari}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {35}, 
  number = {4}, 
  year = {2005}, 
  pages = {25--36}, 
  publisher = {ACM SIGCOMM}, 
  www_tags = {selected}, 
  www_section = {Internet Routing}, 
}
feamster2007lease
@article{feamster2007lease,
  title = {How to lease the Internet in your spare time}, 
  author = {Feamster, Nick and Gao, Lixin and Rexford, Jennifer}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {37}, 
  number = {1}, 
  year = {2007}, 
  pages = {61--64}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
fu2001and
@inproceedings{fu2001and,
  title = {The Dos and Don'ts of Client Authentication on the Web.}, 
  author = {Fu, Kevin and Sit, Emil and Smith, Kendra and Feamster, Nick}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2001}, 
  pages = {251--268}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
hao2009detecting
@inproceedings{hao2009detecting,
  title = {Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic
        Reputation Engine.}, 
  author = {Hao, Shuang and Syed, Nadeem Ahmed and Feamster, Nick and Gray, Alexander G and
        Krasser, Sven}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2009}, 
  pages = {101--118}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
hao2011monitoring
@inproceedings{hao2011monitoring,
  title = {Monitoring the initial DNS behavior of malicious domains}, 
  author = {Hao, Shuang and Feamster, Nick and Pandrangi, Ramakant}, 
  booktitle = {Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement
        conference}, 
  organization = {ACM}, 
  year = {2011}, 
  pages = {269--278}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
katz2012lifeguard
@article{katz2012lifeguard,
  title = {LIFEGUARD: practical repair of persistent route failures}, 
  author = {Katz-Bassett, Ethan and Scott, Colin and Choffnes, David R and Cunha, {\'I}talo
        and Valancius, Vytautas and Feamster, Nick and Madhyastha, Harsha V and Anderson,
        Thomas and Krishnamurthy, Arvind}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {42}, 
  number = {4}, 
  year = {2012}, 
  pages = {395--406}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
kim2011evolution
@inproceedings{kim2011evolution,
  title = {The evolution of network configuration: a tale of two campuses}, 
  author = {Kim, Hyojoon and Benson, Theophilus and Akella, Aditya and Feamster, Nick}, 
  booktitle = {Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement
        conference}, 
  organization = {ACM}, 
  year = {2011}, 
  pages = {499--514}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
kim2013improving
@article{kim2013improving,
  title = {Improving network management with software defined networking. Communications
        Magazine}, 
  author = {Kim, Hyojoon and Feamster, N}, 
  journal = {IEEE}, 
  volume = {51}, 
  number = {2}, 
  year = {2013}, 
  pages = {114--119}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
konte2011wide
@inproceedings{konte2011wide,
  title = {Wide-area routing dynamics of malicious networks}, 
  author = {Konte, Maria and Feamster, Nick}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {432--433}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
koponen2011architecting
@article{koponen2011architecting,
  title = {Architecting for innovation}, 
  author = {Koponen, Teemu and Shenker, Scott and Balakrishnan, Hari and Feamster, Nick and
        Ganichev, Igor and Ghodsi, Ali and Godfrey, P and McKeown, Nick and Parulkar,
        Guru and Raghavan, Barath and others}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {41}, 
  number = {3}, 
  year = {2011}, 
  pages = {24--36}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Architecture}, 
}
motiwala2008path
@article{motiwala2008path,
  title = {Path splicing}, 
  author = {Motiwala, Murtaza and Elmore, Megan and Feamster, Nick and Vempala, Santosh}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {38}, 
  number = {4}, 
  year = {2008}, 
  pages = {27--38}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Architecture}, 
}
nayak2009resonance
@inproceedings{nayak2009resonance,
  title = {Resonance: dynamic access control for enterprise networks}, 
  author = {Nayak, Ankur Kumar and Reimers, Alex and Feamster, Nick and Clark, Russ}, 
  booktitle = {Proceedings of the 1st ACM workshop on Research on enterprise networking}, 
  organization = {ACM}, 
  year = {2009}, 
  pages = {11--18}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
ramachandran2006revealing
@article{ramachandran2006revealing,
  title = {Revealing botnet membership using DNSBL counter-intelligence}, 
  author = {Ramachandran, Anirudh and Feamster, Nick and Dagon, David}, 
  journal = {Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet}, 
  year = {2006}, 
  pages = {49--54}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
ramachandran2007filtering
@inproceedings{ramachandran2007filtering,
  title = {Filtering spam with behavioral blacklisting}, 
  author = {Ramachandran, Anirudh and Feamster, Nick and Vempala, Santosh}, 
  booktitle = {Proceedings of the 14th ACM conference on Computer and communications
        security}, 
  organization = {ACM}, 
  year = {2007}, 
  pages = {342--351}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
ramachandran2008detecting
@incollection{ramachandran2008detecting,
  title = {Detecting botnet membership with dnsbl counterintelligence}, 
  author = {Ramachandran, Anirudh and Feamster, Nick and Dagon, David}, 
  booktitle = {Botnet Detection}, 
  year = {2008}, 
  pages = {131--142}, 
  publisher = {Springer US}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
sundaresan2011broadband
@inproceedings{sundaresan2011broadband,
  title = {Broadband internet performance: a view from the gateway}, 
  author = {Sundaresan, Srikanth and De Donato, Walter and Feamster, Nick and Teixeira,
        Renata and Crawford, Sam and Pescap{\`e}, Antonio}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {134--145}, 
  www_tags = {selected}, 
  www_section = {Broadband Access Networks}, 
}
sundaresan2012measuring
@article{sundaresan2012measuring,
  title = {Measuring home broadband performance}, 
  author = {Sundaresan, Srikanth and De Donato, Walter and Feamster, Nick and Teixeira,
        Renata and Crawford, Sam and Pescap{\`e}, Antonio}, 
  journal = {Communications of the ACM}, 
  volume = {55}, 
  number = {11}, 
  year = {2012}, 
  pages = {100--109}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Broadband Access Networks}, 
}
tariq2008answering
@inproceedings{tariq2008answering,
  title = {Answering what-if deployment and configuration questions with wise}, 
  author = {Tariq, Mukarram and Zeitoun, Amgad and Valancius, Vytautas and Feamster, Nick
        and Ammar, Mostafa}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {38}, 
  number = {4}, 
  year = {2008}, 
  pages = {99--110}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
tariq2009detecting
@inproceedings{tariq2009detecting,
  title = {Detecting network neutrality violations with causal inference}, 
  author = {Tariq, Mukarram Bin and Motiwala, Murtaza and Feamster, Nick and Ammar,
        Mostafa}, 
  booktitle = {Proceedings of the 5th international conference on Emerging networking
        experiments and technologies}, 
  organization = {ACM}, 
  year = {2009}, 
  pages = {289--300}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
tariq2013answering
@article{tariq2013answering,
%%%%% ERROR: Non-ASCII characters: ''\xe2\x80\x9c\xe2\x80\x9d''
  title = {Answering “What-If” Deployment and Configuration Questions With WISE:
        Techniques and Deployment Experience}, 
  author = {Tariq, Mukarram Bin and Bhandankar, Kaushik and Valancius, Vytautas and
        Zeitoun, Amgad and Feamster, Nick and Ammar, Mostafa}, 
  journal = {Networking, IEEE/ACM Transactions on}, 
  volume = {21}, 
  number = {1}, 
  year = {2013}, 
  pages = {1--13}, 
  publisher = {IEEE}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
valancius2011many
@inproceedings{valancius2011many,
  title = {How many tiers?: pricing in the internet transit market}, 
  author = {Valancius, Vytautas and Lumezanu, Cristian and Feamster, Nick and Johari,
        Ramesh and Vazirani, Vijay V}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {194--205}, 
  www_tags = {selected}, 
  www_section = {Economics and Policy}, 
}
valancius2013quantifying
@inproceedings{valancius2013quantifying,
  title = {Quantifying the benefits of joint content and network routing}, 
  author = {Valancius, Vytautas and Ravi, Bharath and Feamster, Nick and Snoeren, Alex C}, 
  booktitle = {Proceedings of the ACM SIGMETRICS/international conference on Measurement
        and modeling of computer systems}, 
  organization = {ACM}, 
  year = {2013}, 
  pages = {243--254}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
voellmy2012procera
@inproceedings{voellmy2012procera,
  title = {Procera: a language for high-level reactive network control}, 
  author = {Voellmy, Andreas and Kim, Hyojoon and Feamster, Nick}, 
  booktitle = {Proceedings of the first workshop on Hot topics in software defined
        networks}, 
  organization = {ACM}, 
  year = {2012}, 
  pages = {43--48}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}