Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- % $ biblatex auxiliary file $
- % $ biblatex version 2.5 $
- % Do not modify the above lines!
- %
- % This is an auxiliary file used by the 'biblatex' package.
- % This file may safely be deleted. It will be recreated as
- % required.
- %
- \begingroup
- \makeatletter
- \@ifundefined{ver@biblatex.sty}
- {\@latex@error
- {Missing 'biblatex' package}
- {The bibliography requires the 'biblatex' package.}
- \aftergroup\endinput}
- {}
- \endgroup
- \entry{akamai2015}{report}{}
- \name{author}{1}{}{%
- {{}%
- {Akamai}{A.}%
- {}{}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{A1}
- \strng{fullhash}{A1}
- \field{sortinit}{A}
- \field{title}{{Akamai's State of The Internet Security Report - Q3 2015}}
- \verb{url}
- \verb https://www.stateoftheinternet.com/downloads/pdfs/2015-cloud-security-r
- \verb eport-q3.pdf
- \endverb
- \list{institution}{1}{%
- {Akamai Technologies}%
- }
- \field{type}{techreport}
- \field{year}{2015}
- \endentry
- \entry{scion2015}{article}{}
- \name{author}{4}{}{%
- {{}%
- {Barrera}{B.}%
- {David}{D.}%
- {}{}%
- {}{}}%
- {{}%
- {Reischuk}{R.}%
- {Raphael~M.}{R.~M.}%
- {}{}%
- {}{}}%
- {{}%
- {Szalachowski}{S.}%
- {Pawel}{P.}%
- {}{}%
- {}{}}%
- {{}%
- {Perrig}{P.}%
- {Adrian}{A.}%
- {}{}%
- {}{}}%
- }
- \keyw{scion}
- \strng{namehash}{BD+1}
- \strng{fullhash}{BDRRMSPPA1}
- \field{sortinit}{B}
- \verb{eprint}
- \verb 1508.01651
- \endverb
- \field{title}{{SCION Five Years Later: Revisiting Scalability, Control, and
- Isolation on Next-Generation Networks}}
- \verb{url}
- \verb http://arxiv.org/pdf/1508.01651
- \endverb
- \field{journaltitle}{arXiv e-prints}
- \field{eprinttype}{arXiv}
- \field{eprintclass}{cs.NI}
- \field{month}{08}
- \field{year}{2015}
- \endentry
- \entry{sibra2016}{inproceedings}{}
- \name{author}{8}{}{%
- {{}%
- {Basescu}{B.}%
- {Cristina}{C.}%
- {}{}%
- {}{}}%
- {{}%
- {Reischuk}{R.}%
- {Raphael~M.}{R.~M.}%
- {}{}%
- {}{}}%
- {{}%
- {Szalachowski}{S.}%
- {Pawel}{P.}%
- {}{}%
- {}{}}%
- {{}%
- {Perrig}{P.}%
- {Adrian}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Zhang}{Z.}%
- {Yao}{Y.}%
- {}{}%
- {}{}}%
- {{}%
- {Hsiao}{H.}%
- {Hsu-Chun}{H.-C.}%
- {}{}%
- {}{}}%
- {{}%
- {Kubota}{K.}%
- {Ayumu}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Urakawa}{U.}%
- {Jumpei}{J.}%
- {}{}%
- {}{}}%
- }
- \keyw{ddos}
- \strng{namehash}{BC+1}
- \strng{fullhash}{BCRRMSPPAZYHHCKAUJ1}
- \field{sortinit}{B}
- \field{booktitle}{Proceedings of Symposium on Network and Distributed System
- Security (NDSS)}
- \field{title}{{SIBRA}: Scalable Internet Bandwidth Reservation Architecture}
- \verb{url}
- \verb http://www.scion-architecture.net/pdf/2016-SIBRA.pdf
- \endverb
- \field{month}{02}
- \field{year}{2016}
- \endentry
- \entry{clarke2009costs}{article}{}
- \name{author}{1}{}{%
- {{}%
- {Clarke}{C.}%
- {Richard~N}{R.~N.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{CRN1}
- \strng{fullhash}{CRN1}
- \field{sortinit}{C}
- \field{number}{1}
- \field{title}{Costs of neutral/unmanaged IP networks}
- \field{volume}{8}
- \field{journaltitle}{Review of network economics}
- \field{year}{2009}
- \endentry
- \entry{EC2015}{misc}{}
- \name{author}{1}{}{%
- {{}%
- {Commision}{C.}%
- {European}{E.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{CE1}
- \strng{fullhash}{CE1}
- \field{sortinit}{C}
- \field{title}{{Digital Agenda For Europe: EU Actions on Net Neutrality}}
- \verb{url}
- \verb https://ec.europa.eu/digital-agenda/en/eu-actions-net-neutrality
- \endverb
- \list{institution}{1}{%
- {European Commission}%
- }
- \field{month}{10}
- \field{year}{2015}
- \endentry
- \entry{dyaberi2012managing}{article}{}
- \name{author}{9}{}{%
- {{}%
- {Dyaberi}{D.}%
- {Jagadeesh~M}{J.~M.}%
- {}{}%
- {}{}}%
- {{}%
- {Parsons}{P.}%
- {Brian}{B.}%
- {}{}%
- {}{}}%
- {{}%
- {Pai}{P.}%
- {Vijay~S}{V.~S.}%
- {}{}%
- {}{}}%
- {{}%
- {Kannan}{K.}%
- {Kalapriya}{K.}%
- {}{}%
- {}{}}%
- {{}%
- {Chen}{C.}%
- {Yih-Farn~Robin}{Y.-F.~R.}%
- {}{}%
- {}{}}%
- {{}%
- {Jana}{J.}%
- {Rittwik}{R.}%
- {}{}%
- {}{}}%
- {{}%
- {Stern}{S.}%
- {Daniel}{D.}%
- {}{}%
- {}{}}%
- {{}%
- {Varshavsky}{V.}%
- {Alexander}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Wei}{W.}%
- {Bin}{B.}%
- {}{}%
- {}{}}%
- }
- \list{publisher}{1}{%
- {IEEE}%
- }
- \strng{namehash}{DJM+1}
- \strng{fullhash}{DJMPBPVSKKCYFRJRSDVAWB1}
- \field{sortinit}{D}
- \field{number}{11}
- \field{pages}{100\bibrangedash 107}
- \field{title}{Managing cellular congestion using incentives}
- \field{volume}{50}
- \field{journaltitle}{Communications Magazine, IEEE}
- \field{year}{2012}
- \endentry
- \entry{FCC2015}{misc}{}
- \field{sortinit}{F}
- \field{title}{{FCC Open Internet Rules}}
- \verb{url}
- \verb https://www.fcc.gov/general/open-internet
- \endverb
- \list{institution}{1}{%
- {FCC}%
- }
- \field{month}{02}
- \field{year}{2015}
- \endentry
- \entry{ferreira2005}{inproceedings}{}
- \name{author}{2}{}{%
- {{}%
- {Ferreira}{F.}%
- {Pedro}{P.}%
- {}{}%
- {}{}}%
- {{}%
- {Sirbu}{S.}%
- {Marvin}{M.}%
- {}{}%
- {}{}}%
- }
- \list{organization}{1}{%
- {ACM}%
- }
- \strng{namehash}{FPSM1}
- \strng{fullhash}{FPSM1}
- \field{sortinit}{F}
- \field{booktitle}{Proceedings of the 6th ACM conference on Electronic
- commerce}
- \field{pages}{137\bibrangedash 146}
- \field{title}{Inefficiency in provisioning interconnected communication
- networks}
- \field{year}{2005}
- \endentry
- \entry{glass2015}{misc}{}
- \name{author}{1}{}{%
- {{}%
- {Glass}{G.}%
- {Victor}{V.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{GV1}
- \strng{fullhash}{GV1}
- \field{sortinit}{G}
- \field{note}{{Talk held at SDP Conference, Princeton University}}
- \field{title}{{Smart Data Pricing: The Net-Neutrality Test}}
- \verb{url}
- \verb http://sdpindustryforum.com/static/files/victor_glass.pdf
- \endverb
- \field{month}{04}
- \field{year}{2015}
- \endentry
- \entry{hsiao2013stride}{inproceedings}{}
- \name{author}{7}{}{%
- {{}%
- {Hsiao}{H.}%
- {Hsu-Chun}{H.-C.}%
- {}{}%
- {}{}}%
- {{}%
- {Kim}{K.}%
- {Tiffany Hyun-Jin}{T.~H.-J.}%
- {}{}%
- {}{}}%
- {{}%
- {Yoo}{Y.}%
- {Sangjae}{S.}%
- {}{}%
- {}{}}%
- {{}%
- {Zhang}{Z.}%
- {Xin}{X.}%
- {}{}%
- {}{}}%
- {{}%
- {Lee}{L.}%
- {Soo~Bum}{S.~B.}%
- {}{}%
- {}{}}%
- {{}%
- {Gligor}{G.}%
- {Virgil}{V.}%
- {}{}%
- {}{}}%
- {{}%
- {Perrig}{P.}%
- {Adrian}{A.}%
- {}{}%
- {}{}}%
- }
- \list{organization}{1}{%
- {ACM}%
- }
- \strng{namehash}{HHC+1}
- \strng{fullhash}{HHCKTHJYSZXLSBGVPA1}
- \field{sortinit}{H}
- \field{booktitle}{Proceedings of the 8th ACM SIGSAC symposium on Information,
- computer and communications security}
- \field{pages}{415\bibrangedash 426}
- \field{title}{STRIDE: sanctuary trail--refuge from internet DDoS entrapment}
- \field{year}{2013}
- \endentry
- \entry{joe2011time}{inproceedings}{}
- \name{author}{3}{}{%
- {{}%
- {Joe-Wong}{J.-W.}%
- {Carlee}{C.}%
- {}{}%
- {}{}}%
- {{}%
- {Ha}{H.}%
- {Sangtae}{S.}%
- {}{}%
- {}{}}%
- {{}%
- {Chiang}{C.}%
- {Mung}{M.}%
- {}{}%
- {}{}}%
- }
- \list{organization}{1}{%
- {IEEE}%
- }
- \strng{namehash}{JWCHSCM1}
- \strng{fullhash}{JWCHSCM1}
- \field{sortinit}{J}
- \field{booktitle}{Distributed Computing Systems (ICDCS), 2011 31st
- International Conference on}
- \field{pages}{288\bibrangedash 298}
- \field{title}{Time-dependent broadband pricing: Feasibility and benefits}
- \field{year}{2011}
- \endentry
- \entry{matsumoto2015}{article}{}
- \name{author}{5}{}{%
- {{}%
- {Matsumoto}{M.}%
- {Stephanos}{S.}%
- {}{}%
- {}{}}%
- {{}%
- {Reischuk}{R.}%
- {Raphael~M.}{R.~M.}%
- {}{}%
- {}{}}%
- {{}%
- {Szalachowski}{S.}%
- {Pawel}{P.}%
- {}{}%
- {}{}}%
- {{}%
- {Kim}{K.}%
- {Tiffany~Hyun{-}Jin}{T.~H.}%
- {}{}%
- {}{}}%
- {{}%
- {Perrig}{P.}%
- {Adrian}{A.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{MS+1}
- \strng{fullhash}{MSRRMSPKTHPA1}
- \field{sortinit}{M}
- \field{title}{Designing a Global Authentication Infrastructure}
- \verb{url}
- \verb http://arxiv.org/abs/1506.03392
- \endverb
- \field{volume}{abs/1506.03392}
- \field{journaltitle}{CoRR}
- \field{year}{2015}
- \endentry
- \entry{meeker2016internet}{report}{}
- \name{author}{1}{}{%
- {{}%
- {Meeker}{M.}%
- {Mary}{M.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{MM1}
- \strng{fullhash}{MM1}
- \field{sortinit}{M}
- \field{title}{Internet Trends 2016}
- \verb{url}
- \verb http://www.kpcb.com/internet-trends
- \endverb
- \list{institution}{1}{%
- {KPCB}%
- }
- \field{type}{techreport}
- \field{year}{2016}
- \endentry
- \entry{odlyzko2014will}{report}{}
- \name{author}{1}{}{%
- {{}%
- {Odlyzko}{O.}%
- {Andrew}{A.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{OA1}
- \strng{fullhash}{OA1}
- \field{sortinit}{O}
- \field{title}{Will smart pricing finally take off?}
- \list{institution}{1}{%
- {DTIC Document}%
- }
- \field{type}{techreport}
- \field{year}{2014}
- \endentry
- \entry{odlyzko2012know}{article}{}
- \name{author}{4}{}{%
- {{}%
- {Odlyzko}{O.}%
- {Andrew}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Arnaud}{A.}%
- {Bill~St}{B.~S.}%
- {}{}%
- {}{}}%
- {{}%
- {Stallman}{S.}%
- {Erik}{E.}%
- {}{}%
- {}{}}%
- {{}%
- {Weinberg}{W.}%
- {Michael}{M.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{OA+1}
- \strng{fullhash}{OAABSSEWM1}
- \field{sortinit}{O}
- \field{title}{Know your limits: Considering the role of data caps and usage
- based billing in internet access service}
- \field{journaltitle}{Public Knowledge}
- \field{year}{2012}
- \endentry
- \entry{parno2007portcullis}{inproceedings}{}
- \name{author}{6}{}{%
- {{}%
- {Parno}{P.}%
- {Bryan}{B.}%
- {}{}%
- {}{}}%
- {{}%
- {Wendlandt}{W.}%
- {Dan}{D.}%
- {}{}%
- {}{}}%
- {{}%
- {Shi}{S.}%
- {Elaine}{E.}%
- {}{}%
- {}{}}%
- {{}%
- {Perrig}{P.}%
- {Adrian}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Maggs}{M.}%
- {Bruce}{B.}%
- {}{}%
- {}{}}%
- {{}%
- {Hu}{H.}%
- {Yih-Chun}{Y.-C.}%
- {}{}%
- {}{}}%
- }
- \list{organization}{1}{%
- {ACM}%
- }
- \strng{namehash}{PB+1}
- \strng{fullhash}{PBWDSEPAMBHYC1}
- \field{sortinit}{P}
- \field{booktitle}{ACM SIGCOMM Computer Communication Review}
- \field{number}{4}
- \field{pages}{289\bibrangedash 300}
- \field{title}{Portcullis: protecting connection setup from
- denial-of-capability attacks}
- \field{volume}{37}
- \field{year}{2007}
- \endentry
- \entry{sathiaseelan2015exploring}{inproceedings}{}
- \name{author}{3}{}{%
- {{}%
- {Sathiaseelan}{S.}%
- {Arjuna}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Tyson}{T.}%
- {Gareth}{G.}%
- {}{}%
- {}{}}%
- {{}%
- {Sen}{S.}%
- {Soumya}{S.}%
- {}{}%
- {}{}}%
- }
- \list{organization}{1}{%
- {IEEE}%
- }
- \strng{namehash}{SATGSS1}
- \strng{fullhash}{SATGSS1}
- \field{sortinit}{S}
- \field{booktitle}{Computer Communications Workshops (INFOCOM WKSHPS), 2015
- IEEE Conference on}
- \field{pages}{558\bibrangedash 563}
- \field{title}{Exploring the role of smart data pricing in enabling affordable
- internet access}
- \field{year}{2015}
- \endentry
- \entry{sen2013survey}{article}{}
- \name{author}{4}{}{%
- {{}%
- {Sen}{S.}%
- {Soumya}{S.}%
- {}{}%
- {}{}}%
- {{}%
- {Joe-Wong}{J.-W.}%
- {Carlee}{C.}%
- {}{}%
- {}{}}%
- {{}%
- {Ha}{H.}%
- {Sangtae}{S.}%
- {}{}%
- {}{}}%
- {{}%
- {Chiang}{C.}%
- {Mung}{M.}%
- {}{}%
- {}{}}%
- }
- \list{publisher}{1}{%
- {ACM}%
- }
- \strng{namehash}{SS+1}
- \strng{fullhash}{SSJWCHSCM1}
- \field{sortinit}{S}
- \field{number}{2}
- \field{pages}{15}
- \field{title}{A survey of smart data pricing: Past proposals, current plans,
- and future trends}
- \field{volume}{46}
- \field{journaltitle}{ACM Computing Surveys (CSUR)}
- \field{year}{2013}
- \endentry
- \entry{kddi2015}{report}{}
- \name{author}{6}{}{%
- {{}%
- {Sugiyama}{S.}%
- {Kohei}{K.}%
- {}{}%
- {}{}}%
- {{}%
- {Urakawa}{U.}%
- {Jumpei}{J.}%
- {}{}%
- {}{}}%
- {{}%
- {Taya}{T.}%
- {Masato}{M.}%
- {}{}%
- {}{}}%
- {{}%
- {Yamada}{Y.}%
- {Akira}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Kobayashi}{K.}%
- {Arei}{A.}%
- {}{}%
- {}{}}%
- {{}%
- {Tagami}{T.}%
- {Atsushi}{A.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{SK+1}
- \strng{fullhash}{SKUJTMYAKATA1}
- \field{sortinit}{S}
- \field{title}{{Empirical Analysis of Customer Behavior for Tiered Data Plans
- in Mobile Market}}
- \list{institution}{1}{%
- {{KDDI R\&D Laboratories Inc., Japan}}%
- }
- \field{type}{techreport}
- \field{year}{2015}
- \endentry
- \entry{swanson2008estimating}{article}{}
- \name{author}{2}{}{%
- {{}%
- {Swanson}{S.}%
- {Bret}{B.}%
- {}{}%
- {}{}}%
- {{}%
- {Gilder}{G.}%
- {George}{G.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{SBGG1}
- \strng{fullhash}{SBGG1}
- \field{sortinit}{S}
- \field{title}{Estimating the exaflood}
- \field{journaltitle}{Discovery Institute white paper}
- \field{year}{2008}
- \endentry
- \entry{cisco2015}{report}{}
- \name{author}{1}{}{%
- {{}%
- {Systems}{S.}%
- {Cisco}{C.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{SC1}
- \strng{fullhash}{SC1}
- \field{sortinit}{S}
- \field{title}{{Cisco visual networking index: forecast and methodology,
- 2014-2019}}
- \verb{url}
- \verb http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-n
- \verb gn-ip-next-generation-network/white_paper_c11-481360.pdf
- \endverb
- \list{institution}{1}{%
- {Cisco}%
- }
- \field{type}{techreport}
- \field{year}{2015}
- \endentry
- \entry{szabo1996mental}{article}{}
- \name{author}{1}{}{%
- {{}%
- {Szabo}{S.}%
- {Nick}{N.}%
- {}{}%
- {}{}}%
- }
- \strng{namehash}{SN1}
- \strng{fullhash}{SN1}
- \field{sortinit}{S}
- \field{title}{The mental accounting barrier to micropayments}
- \field{journaltitle}{h ttp://szabo. best. vwh. net/index. html}
- \field{year}{1996}
- \endentry
- \entry{cloudflare2015}{report}{}
- \field{sortinit}{T}
- \field{title}{{Technical Details Behind a 400Gbps NTP Amplification DDoS
- Attack}}
- \verb{url}
- \verb https://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-ampl
- \verb ification-ddos-attack/
- \endverb
- \list{institution}{1}{%
- {Cloudflare}%
- }
- \field{type}{techreport}
- \field{year}{2015}
- \endentry
- \entry{theeco2009}{article}{}
- \field{sortinit}{T}
- \field{title}{The mother of invention: Network operators in the poor world
- are cutting costs and increasing access in innovative ways}
- \verb{url}
- \verb http://www.economist.com/node/14483880
- \endverb
- \field{journaltitle}{The Economist}
- \field{month}{09}
- \field{year}{2009}
- \endentry
- \entry{varadhan2000persistent}{article}{}
- \name{author}{3}{}{%
- {{}%
- {Varadhan}{V.}%
- {Kannan}{K.}%
- {}{}%
- {}{}}%
- {{}%
- {Govindan}{G.}%
- {Ramesh}{R.}%
- {}{}%
- {}{}}%
- {{}%
- {Estrin}{E.}%
- {Deborah}{D.}%
- {}{}%
- {}{}}%
- }
- \list{publisher}{1}{%
- {Elsevier}%
- }
- \strng{namehash}{VKGRED1}
- \strng{fullhash}{VKGRED1}
- \field{sortinit}{V}
- \field{number}{1}
- \field{pages}{1\bibrangedash 16}
- \field{title}{Persistent route oscillations in inter-domain routing}
- \field{volume}{32}
- \field{journaltitle}{Computer networks}
- \field{year}{2000}
- \endentry
- \entry{yang2005limiting}{inproceedings}{}
- \name{author}{3}{}{%
- {{}%
- {Yang}{Y.}%
- {Xiaowei}{X.}%
- {}{}%
- {}{}}%
- {{}%
- {Wetherall}{W.}%
- {David}{D.}%
- {}{}%
- {}{}}%
- {{}%
- {Anderson}{A.}%
- {Thomas}{T.}%
- {}{}%
- {}{}}%
- }
- \list{organization}{1}{%
- {ACM}%
- }
- \strng{namehash}{YXWDAT1}
- \strng{fullhash}{YXWDAT1}
- \field{sortinit}{Y}
- \field{booktitle}{ACM SIGCOMM Computer Communication Review}
- \field{number}{4}
- \field{pages}{241\bibrangedash 252}
- \field{title}{A DoS-limiting network architecture}
- \field{volume}{35}
- \field{year}{2005}
- \endentry
- \entry{yuksel2007value}{inproceedings}{}
- \name{author}{5}{}{%
- {{}%
- {Yuksel}{Y.}%
- {Murat}{M.}%
- {}{}%
- {}{}}%
- {{}%
- {Ramakrishnan}{R.}%
- {KK}{K.}%
- {}{}%
- {}{}}%
- {{}%
- {Kalyanaraman}{K.}%
- {Shivkumar}{S.}%
- {}{}%
- {}{}}%
- {{}%
- {Houle}{H.}%
- {Joseph~D}{J.~D.}%
- {}{}%
- {}{}}%
- {{}%
- {Sadhvani}{S.}%
- {Rita}{R.}%
- {}{}%
- {}{}}%
- }
- \list{organization}{1}{%
- {IEEE}%
- }
- \strng{namehash}{YM+1}
- \strng{fullhash}{YMRKKSHJDSR1}
- \field{sortinit}{Y}
- \field{booktitle}{Quality of Service, 2007 Fifteenth IEEE International
- Workshop on}
- \field{pages}{109\bibrangedash 112}
- \field{title}{value of supporting class-of-service in IP backbones}
- \field{year}{2007}
- \endentry
- \lossort
- \endlossort
- \endinput
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement