These papers will be listed on the web page, and that listing should be regarded as definitive for each particular class. The listing here will allow you to do reading ahead of time, before the web page has been updated for a particular class.
Papers on IP spoofing
"Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing," P. Ferguson, RFC 2827.
"On the Effectiveness of Route-based Packet Filtering for Distributed DoS Attack Prevention in Power-law Internets", Kihong Park and H. Lee, Proceeding of the ACM SIGCOMM '01.
"SAVE: Source Address Validity Enforcement," Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia Zhang, Infocom 2002.
"Hop Count Filtering: An Effective Defense Against Spoofed DDoS Traffic," $hen Jin, Haining Wang, Kang G. Shin, 10th ACM Conference on Computer and Communications Security, 2003.
Papers on routing security
"Secure Border Gateway Protocol (Secure BGP),", Stephen Kent, Charles Lynn, Karen Seo, IEEE Journal on Selected Areas in Communication, Vol. 18, No. 4, April 2000.
"Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues," Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo.
"Efficient Security Mechanisms for Routing Protocols," Yih-Chun Hu, Adrian Perrig, David B. Johnson, NDSS 03.
"Generic Threats to Routing Protocols," A. Barbir, S. Murphy, Y. Yang, December 2003.
Papers on DNS security
"DNS Security Introduction and Requirements," R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, Internet Draft, February 14, 2003.
"Threat Analysis of the Domain Name System," R. Austein, Internet Draft, February 2002.
A New Approach to DNS Security (DNSSEC),"Giuseppe Ateniese, Stefan Mangard," 8th ACM Conference on Computer and Communications Security, 2001.
Papers on securing ad hoc networks
"A Secure Routing Protocol for Ad Hoc Networks," Sanzgiri, et al ICNP, October 2002.
"Securing Ad Hoc Netorks," IEEE Network, Vol. 13, No. 6, November/December 1999.
Papers on security for ubiquitous environments
The Resurrecting Duckling: Security Issues in Ad-hoc Wireless Networks, Frank Stajano and Ross Anderson, Proc. Seventh Security Protocols Workshop, Berlin 2000.
An Authorization Infrastructure for Nomadic Computing, Kan Zhang and Tim Kindberg, In proceedings SACMAT 2002.
Securing WiFI Nomads: The Case for Quarantine, Examiniation, and Decontamination," Eustice et. al., New Software Paradigm Workshop, August 2003.
Papers on DDoS Defense
Implementing Pushback: Router-Based Defense Against DDoS Attacks, J. Ioannidis and S. Bellovin In Proceedings of NDSS '02, Feb. 2002.
Practical Network Support for IP Traceback, S. Savage, et al, SIGCOMM 2000.
NetBouncer: Client-Legitimacy Based High Performance DDoS Filtering, R. THomas, B. Mark, T. Johnson, and J. Croall, DISCEX 2003.
Attacking DDoS At the Source, J. Mirkovic, G. Prier, and P. Reiher, ICNP 2002.
Cossack: Coordinated Suppresion of SImultaneous Attacks, . C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, DANCE 2003.
Alliance Formation for DDoS Defense, J. Mirkovic, M. Robinson, P. Reiher, and G. Kuenning, New Software Paradigms Workshop, August 2003.
Papers on Worms
How to 0wn the Internet in Your Spare Time, Stuart Staniford, Vern Paxson, Nicholas Weaver, 11th Usenex Security Symposium, 2002.
Compartive Response Strategies for Large Scale Attack Mitigation, D. Jojiri, J. Rowe, K. Levitt, DISCEX 03, 2003.
Internet Quarantine: Requirements for Containing Self-Propagating Code, D. Moore, C. Shannon, G. Voelker, S. Savage, Infocom 2003.
Papers on Multicast Security
A Survey of Multicast Security Issues and Architectures, P. Kruss.
"Multicast Security: A Taxonomy and Some Efficient Constructions," Canetti, et al Infocom, 1999.
The Multicast Security (MSEC) Architecture, IETF Draft, Hardjono and Weis, November 2002.
Papers on evaluating network security
Observing Attacks and Evaluating Defenses on the Internet
Inferring Internet Denial-of-Service Activity, David Moore, Geoffrey Voelker, and Stefan Savage , 10th Usenex Security Symposium, 2001.
An Evening With Berferd In Which a Cracker is Lured, Endured, and Studied, Bill Cheswick, Usenex , 1992.
Papers on Handling spam
To be announced later.
Papers on anonymization and privacy services
Infranet: Circumventing Web Censorship and Surveillance, N. Feamseter, M. Balazinska, G. Harfst, H. Balakrishna, D. Karger, Usenix Security Symposium 2002.
Anonymous Connections and Onion Routing, P. Syverson, D. Goldschlag, M. Reed, IEEE Symposium on Privacy and Security, 1997.
Papers on handling compromised systems and security alerts