Youtube everywhere: Impact of device and infrastructure synergies on user experience A Finamore, M Mellia, MM Munafo, R Torres, SG Rao Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 380 | 2011 |
Dissecting video server selection strategies in the youtube cdn R Torres, A Finamore, JR Kim, M Mellia, MM Munafo, S Rao 2011 31st International Conference on Distributed Computing Systems, 248-257, 2011 | 222 | 2011 |
Nazca: Detecting Malware Distribution in Large-Scale Networks. L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ... NDSS 14, 23-26, 2014 | 134 | 2014 |
Detecting malicious endpoints using network connectivity and flow information S Saha, L Liu, R Torres, J Xu, A Nucci US Patent 8,813,236, 2014 | 113 | 2014 |
Towards self adaptive network traffic classification A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci Computer Communications 56, 35-46, 2015 | 65 | 2015 |
Detecting malicious http redirections using trees of user browsing activity H Mekky, R Torres, ZL Zhang, S Saha, A Nucci IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014 | 63 | 2014 |
DDoS attacks by subverting membership management in P2P systems X Sun, R Torres, S Rao 2007 3rd IEEE Workshop on Secure Network Protocols, 1-6, 2007 | 45 | 2007 |
Inferring undesirable behavior from P2P traffic analysis RD Torres, MY Hajjat, SG Rao, M Mellia, MM Munafň Proceedings of the eleventh international joint conference on Measurement …, 2009 | 42 | 2009 |
Detecting suspicious network behaviors based on domain name service failures P Luo, R Torres, Z Zhang, S Saha, SJ Lee, A Nucci US Patent 9,245,121, 2016 | 35 | 2016 |
Detecting malicious clients in isp networks using http connectivity graph and flow information L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia 2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014 | 23 | 2014 |
Detecting malware infestations in large-scale networks L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ... US Patent 8,959,643, 2015 | 21 | 2015 |
Mitos y realidades de las obras sociales en la Argentina R Torres Ediciones Granica SA, 2004 | 21 | 2004 |
The internet-wide impact of p2p traffic localization on isp profitability J Seibert, R Torres, M Mellia, MM Munafo, C Nita-Rotaru, S Rao IEEE/ACM Transactions on Networking 20 (6), 1910-1923, 2012 | 20 | 2012 |
On the feasibility of exploiting P2P systems to launch DDoS attacks X Sun, R Torres, SG Rao Peer-to-peer networking and applications 3 (1), 36-51, 2010 | 20 | 2010 |
Approximate matching of persistent lexicon using search-engines for classifying mobile app traffic G Ranjan, A Tongaonkar, R Torres IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 19 | 2016 |
Preventing DDoS attacks on internet servers exploiting P2P systems X Sun, R Torres, S Rao Computer Networks 54 (15), 2756-2774, 2010 | 19 | 2010 |
Per-user policy enforcement on mobile apps through network functions virtualization A Sapio, Y Liao, M Baldi, G Ranjan, F Risso, A Tongaonkar, R Torres, ... Proceedings of the 9th ACM workshop on Mobility in the Evolving Internet …, 2014 | 17 | 2014 |
Reoptimization of maximum weight induced hereditary subgraph problems N Boria, J Monnot, V Paschos | 16* | 2011 |
Detecting malicious activities with user‐agent‐based profiles Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia International Journal of Network Management 25 (5), 306-319, 2015 | 15 | 2015 |
Detecting malicious HTTP redirections using user browsing activity trees R Torres, H Mekky, Z Zhang, S Saha, A Nucci US Patent 9,531,736, 2016 | 14 | 2016 |