Research Publications for Matthew J Luckie

Welcome to the University of Waikato research publications search page. This database includes all research publications produced by the University from 1998.

See Also: Research Links | Student Research Theses | Research Commons

Author's Publications

Publications ByLUCKIE, Matthew J

  Use our Online Phonebook to contact our current staff members.

  • Dhamdhere, A., Clark, D. D., Gamero-Garrido, A., Luckie, M., Mok, R. K. P., Akiwate, G., . . . claffy, K. (2018). Inferring persistent interdomain congestion. In Proc 2018 Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'18) (pp. 1-15). New York, NY: ACM. doi:10.1145/3230543.3230549

  • Lone, Q., Luckie, M., Korczynski, M., Asghari, H., Javed, M., & van Eeten, M. (2018). Using crowdsourcing marketplaces for network measurements: the case of Spoofer. In Network Traffic Measurement and Analysis Conference (TMA 2018). Vienna, Austria.

  • Luckie, M. J., & Beverly, R. (2017). The impact of router outages on the AS-level internet. In Proc ACM Special Interest Group on Data Communication Conference (pp. 488-501). Los Angeles, USA: ACM. doi:10.1145/3098822.3098858

  • Lone, Q., Luckie, M. J., Korczyński, M., & van Eeten, M. (2017). Using loops observed in Traceroute to infer the ability to Spoof. In M. A. Kaafar, S. Uhlig, & J. Amann (Eds.), Proc 18th International Conference on Passive and Active Measurement Vol. LNCS 10176 (pp. 229-241). Sydney, Australia: Springer. doi:10.1007/978-3-319-54328-4_17

  • Goodchild, B. J., Chiu, Y. -C., Hansen, R., Lu, H., Calder, M., Luckie, M. J., . . . Katz-Basset, E. (2017). The record route option is an option!. In Proc Internet Measurement Conference 2017 (pp. 7 pages). London, UK: ACM. doi:10.1145/3131365.3131392

  • Luckie, M. J., Dhamdhere, A., Huffaker, B., Clark, D., & claffy, K. (2016). bdrmap: Inference of borders between IP networks. In Proc 2016 ACM Conference on Internet Measurement (pp. 381-396). Santa Monica, California, USA: ACM. doi:10.1145/2987443.2987467

  • Czyz, J., Luckie, M., Allman, M., & Bailey, M. (2016). Don't forget to lock the back door! A characterization of IPv6 network security policy. In Proc Network and Distributed System Security Symposium 2016 (pp. 15 pages). San Diego, California: Internet Society. doi:10.14722/ndss.2016.23047

  • Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. J., & claffy, K. (2015). Mapping peering interconnections at the facility level. In Proc 11th International Conference on emerging Networking Experiments and Technologies (pp. 13 pages). Heidelberg, Germany: ACM. doi:10.1145/2716281.2836122

  • Chandrasekaran, B., Smaragdakis, G., Berger, A., Luckie, M. J., & Ng, K. -C. (2015). A server-to-server view of the Internet. In Proc 11th International Conference on emerging Networking Experiments and Technologies (pp. 13 pages). Heidelberg, Germany: ACM. doi:10.1145/2716281.2836125

  • Giotsas, V., Luckie, M., Huffaker, B., & Claffy, K. (2015). IPv6 AS relationships, clique, and congruence. In J. Mirkovic, & Y. Liu (Eds.), Proc 16th Passive and Active Measurement Conference Vol. LNCS 8995 (pp. 111-122). New York, NY: Springer. doi:10.1007/978-3-319-15509-8_9

This page has been reformatted for printing.