Refereed Journal Papers and Manuscripts

Journal Articles

  1. Burger, Eric W., Padma Krishnaswamy, and Henning Schulzrinne. “Measuring Broadband America: A Retrospective on Origins, Achievements, and Challenges.” Journal Article. SIGCOMM Computer Communication Review 53, no. 2 (2023): 11–21. https://doi.org/10.1145/3610381.3610384.
    [details]
  2. Hassan, Zoheb, Erika Heeren-Moon, Javad Sabzehali, Vijay K. Shah, Carl Dietrich, Jeffrey H. Reed, and Eric W. Burger. “Spectrum Sharing of the 12 GHz Band with Two-Way Terrestrial 5G Mobile Services: Motivations, Challenges, and Research Road Map.” Journal Article. IEEE Communications Magazine, 27AD, 1–7. https://doi.org/10.1109/MCOM.007.2200699.
    [details]
  3. Yuta Takanashi, Shin’ichiro Matsuo Eric Burger Clare Sullivan James Miller Hirotoshi Sato. “Call for Multi-Stakeholder Communication to Establish a Governance Mechanism for the Emerging Blockchain-Based Financial Ecosystem, Part 1 of 2.” Journal Article. Stanford Journal of Blockchain Law & Policy, 2020. https://stanford-jblp.pubpub.org/pub/multistakeholder-comm-governance.
    [details]
  4. Takahashi, Yuta, Shin’ichiro Matsuo, John Jacobs, Eric Burger, Clare Sullivan, James Angel, Tatsuya Saito, Toshiki Hashirisaka, and Hirotoshi Sato. “Consideration On Better Tokenization Practices And Regulations Concerning Investor Protection.” Journal Article. Journal of Financial Transformation 51 (0AD): 44–54. https://ideas.repec.org/a/ris/jofitr/1650.html.
    [details]
  5. Yuta Takanashi, Shin’ichiro Matsuo Eric Burger Clare Sullivan James Miller Hirotoshi Sato. “Call for Multi-Stakeholder Communication to Establish a Governance Mechanism for the Emerging Blockchain-Based Financial Ecosystem, Part 2 of 2.” Journal Article. Stanford Journal of Blockchain Law & Policy, 2020. https://stanford-jblp.pubpub.org/pub/multistakeholder-comm-governance2.
    [details]
  6. McEachern, James, and Eric William Burger. “How to Shut down Robocallers: The STIR/SHAKEN Protocol Will Stop Scammers from Exploiting a Caller ID Loophole.” Magazine Article. IEEE Spectrum 56, no. 12 (2019): 46–52. https://doi.org/10.1109/MSPEC.2019.8913833.
    [details]
  7. Sullivan, Clare, and Eric Burger. “‘In the Public Interest’: The Privacy Implications of International Business-to-Business Sharing of Cyber-Threat Intelligence.” Journal Article. Computer Law & Security Review 33, no. 1 (0AD): 14–29. https://doi.org/https://doi.org/10.1016/j.clsr.2016.11.015.
    [details]
  8. ———. “E-Residency and Blockchain.” Journal Article. Computer Law & Security Review 33, no. 4 (2017): 470–81. https://doi.org/https://doi.org/10.1016/j.clsr.2017.03.016.
    [details]
  9. Lange, Russell, and Eric W. Burger. “Long-Term Market Implications of Data Breaches, Not.” Journal Article. Journal of Information Privacy and Security 13, no. 4 (0AD): 186–206. https://doi.org/10.1080/15536548.2017.1394070.
    [details]
  10. Burger, Eric William, and Ophir Frieder. “Efficient Residential Consumer Device Interaction with Network Services.” Journal Article. IEEE Transactions on Consumer Electronics 53, no. 1 (0AD): 100–107. https://doi.org/10.1109/TCE.2007.339509.
    [details]
  11. ———. “A Novel System for Remote Control of Household Devices Using Digital IP Phones.” Journal Article. Transactions on Consumer Electronics 52, no. 2 (0AD): 575–82. https://doi.org/10.1109/TCE.2006.1649682.
    [details]
  12. Burger, Eric William. “A New Interprovider Interconnect Technology for Multimedia Networks.” Magazine Article. IEEE Communications Magazine 43, no. 6 (2005): 147–51. https://doi.org/10.1109/MCOM.2005.1452843.
    [details]
  13. Chowdhury, A., O. Frieder, E. Burger, D. Grossman, and K. Makki. “Dynamic Routing System (DRS): Fault Tolerance in Network Routing.” Journal Article. Computer Networks and ISDN Systems 31, no. 1 (0AD): 89–99. https://doi.org/https://doi.org/10.1016/S0169-7552(98)00232-3.
    [details]

Books

  1. Burger, Eric William. Ubiquitous Reach and Remote Control of Devices. Book. Düsseldorf: VDM Verlag, 2008.
    [details]
  2. ———. Program Construction in the UNIX Environment. Book. Washington DC: The George Washington University, 1994.
    [details]
  3. ———. UNIX System Calls and Inter–Process Communication. Book. Washington DC: The George Washington University, 1994.
    [details]

inbook

  1. Sullivan, Clare, and Eric Burger. “Blockchain, Digital Identity, E-Government.” Book Section. In Business Transformation through Blockchain: Volume II, edited by Horst Treiblmaier and Roman Beck, 233–58. Springer Nature, 2018.
    [details]

Conference Articles

  1. Carlberg, Kenneth, Eric William Burger, and Roger Piqueras Jover. “Dynamic 5G Network Slicing for First Responders.” Conference Proceedings. In 2019 Principles, Systems and Applications of IP Telecommunications (IPTComm), 1–4, 14AD. https://doi.org/10.1109/IPTCOMM.2019.8921240.
    [details]
  2. Chiang, Matthew, and Eric William Burger. “An Affordable Solution for Authenticated Communications for Enterprise and Personal Use.” Conference Proceedings. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 810–15, 8AD. https://doi.org/10.1109/CCWC.2018.8301725.
    [details]
  3. Vaidya, Tavish, Eric William Burger, Micah Sherr, and Clay Shields. “Where Art Thou, Eve? Experiences Laying Traps for Internet Eavesdroppers.” Conference Proceedings. In 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17). USENIX Association, 14AD. https://www.usenix.org/node/205858.
    [details]
  4. Burger, Eric William, and Clare Sullivan. “Minerva Project on the Estonian E-Residency Initiative: Impact of Estonia’s Start-Up Culture on De-Cisions Related to Prudence & Good Governance.” Conference Proceedings. In Human Aspects of the Operational Environment, AHFE Affiliated Conference on Cross-Cultural Decision-Making, 29AD.
    [details]
  5. Asgarli, Elchin, and Eric William Burger. “Semantic Ontologies for Cyber Threat Sharing Standards.” Conference Proceedings. In 2016 IEEE Symposium on Technologies for Homeland Security (HST), 1–6, 10AD. https://doi.org/10.1109/THS.2016.7568896.
    [details]
  6. Burger, Eric William, Michael D. Goodman, Kampanakis Panos, and Kevin A. Zhu. “Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies.” Conference Proceedings. In 2014 ACM Workshop on Information Sharing & Collaborative Security, 51–60. Association for Computing Machinery, 0AD. https://doi.org/10.1145/2663876.2663883.
    [details]
  7. Burger, Eric William, Howard J. Federoff, Massimo S. Fiandaca, Ophir Frieder, Nazli Goharian, and Andrew Yates. “Social Media Communications Networks and Pharmacovigilance: SequelAE-2.0.” Conference Proceedings. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), 1–3, 0AD. https://doi.org/10.1109/HealthCom.2013.6720777.
    [details]
  8. Gurbani, Vijay K., Eric William Burger, Carol Davids, and Tricha Anjali. “SIP CLF: A Common Log Format (CLF) for the Session Initiation Protocol (SIP).” Conference Proceedings. In Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML 10). USENIX Association, 3AD. https://www.usenix.org/conference/slaml10/sip-clf-common-log-format-clf-session-initiation-protocol-sip.
    [details]
  9. Burger, Eric William, Sharath Rajasekar, Phelim O’Doherty, Anders Lundqvist, and Thomas Grönberg. “A Telecommunications Web Services Platform for Third Party Network Access and SOA-Based Service Delivery.” Conference Proceedings. In 2007 Workshop on Middleware for Next-Generation Converged Networks and Applications. MNCNA ‘07. New York, NY, USA: Association for Computing Machinery, 0AD. https://doi.org/10.1145/1376878.1376888.
    [details]
  10. Burger, Eric William, and Ophir Frieder. “Efficient Residential Consumer Device Interaction With Network Services.” Conference Proceedings. In 2007 Digest of Technical Papers International Conference on Consumer Electronics, 1–2. IEEE, 10AD. https://doi.org/10.1109/ICCE.2007.341390.
    [details]
  11. ———. “A Novel System for Remote Control of Household Devices Using Digital IP Phones.” Conference Proceedings. In 2006 Digest of Technical Papers International Conference on Consumer Electronics, 183–84, 0AD. https://doi.org/10.1109/ICCE.2006.1598371.
    [details]
  12. ———. “Network Traffic Reduction for Transport of User Signaling Information.” Conference Proceedings. In CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., 2:1057–62, 0AD. https://doi.org/10.1109/CCNC.2006.1593200.
    [details]
  13. Burger, Eric William. “Applications for Narrow-Band Audio Streams.” Conference Proceedings. In Winter 2000 VON Developers’ Conference, 19AD.
    [details]
  14. ———. “Multinational Issues in R&D Management.” Conference Proceedings. In Technology Management : the New International Language, 184. IEEE, 27AD. https://doi.org/10.1109/PICMET.1991.183607.
    [details]
  15. Burger, Eric William, and Guido Dedene. “Economics of Point Acceleration.” Conference Proceedings. In Proceedings of the European Design Automation Conference (EURO-DAC) 1990, 424–28. Los Alamitos, CA, USA: IEEE Computer Society, 0AD. https://doi.org/10.1109/EDAC.1990.136685.
    [details]
  16. Burger, Eric William. “The Use of Unix Software Tools for Automatic Program Generation.” Conference Proceedings. In First Sun Expo, 0AD.
    [details]
  17. Moore, Tucker, Nathan Marshall, and Eric Burger. “Fortuna: A Novel Staked Voting System for Distributed Pari-Mutuel Gaming.” Conference Proceedings. In 5th IEEE International Conference on Blockchain. IEEE, 0AD. https://doi.org/https://doi.org/10.1109/Blockchain55522.2022.00041.
    [details]
  18. Bartholic, Michael, Eric Burger, Shin’ichiro Matsuo, and Taeho Jung. “Reputation as Contextual Knowledge: Incentives and External Value in Truthful Blockchain Oracles.” Conference Proceedings. In 2023 IEEE International Conference on Blockchain and Cryptocurrency. IEEE, 0AD. https://doi.org/https://doi.org/10.1109/ICBC56567.2023.10174903.
    [details]
  19. Chowdhury, Abdur, Ophr Frieder, David Grossman, Eric William Burger, and Kia Makki. “DRS: a Fault Tolerant Network Routing System for Mission Critical Distributed Applications.” Conference Proceedings. In Proceedings of Sixth International Conference on Computer Communications and Networks, 106–13. 1997: IEEE, 22AD. https://doi.org/10.1109/ICCCN.1997.623298.
    [details]
  20. Bartholic, Michael, Aron Laszka, Go Yamamoto, and Eric Burger. “A Taxonomy of Blockchain Oracles: The Truth Depends on the Question.” Conference Proceedings. In 2022 IEEE International Conference on Blockchain and Cryptocurrency. IEEE, 0AD. https://doi.org/https://doi.org/10.1109/ICBC54727.2022.9805555.
    [details]

Miscellaneous

  1. Klass, Gregory, and Eric William Burger. “Vendor Truth Serum.” Conference Paper. High Confidence Software and Systems Conference. Series Vendor Truth Serum. Poster, 9AD.
    [details]
  2. Vaidya, Tavish, Eric William Burger, Micah Sherr, and Clay Shields. “Studying the Pervasiveness of Internet Interception with HoneyPOP,SMTP,Telnet.” Conference Paper. USENIX Security 2015. Series Studying the Pervasiveness of Internet Interception with HoneyPOP,SMTP,Telnet. Poster, 12AD. https://security.cs.georgetown.edu/honeymail_usenix_poster.pdf.
    [details]