Youtube everywhere: Impact of device and infrastructure synergies on user experience A Finamore, M Mellia, MM Munafo, R Torres, SG Rao Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 430 | 2011 |
Dissecting video server selection strategies in the YouTube CDN R Torres, A Finamore, JR Kim, M Mellia, MM Munafo, S Rao 2011 31st International Conference on Distributed Computing Systems, 248-257, 2011 | 259 | 2011 |
Detecting malicious endpoints using network connectivity and flow information S Saha, L Liu, R Torres, J Xu, A Nucci US Patent 8,813,236, 2014 | 194 | 2014 |
Nazca: Detecting Malware Distribution in Large-Scale Networks. L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ... NDSS 14, 23-26, 2014 | 190 | 2014 |
Towards self adaptive network traffic classification A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci Computer Communications 56, 35-46, 2015 | 112 | 2015 |
Detecting malicious http redirections using trees of user browsing activity H Mekky, R Torres, ZL Zhang, S Saha, A Nucci IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014 | 85 | 2014 |
Frequency of ambulatory care adverse events in Latin American countries: the AMBEAS/PAHO cohort study D Montserrat-Capella, M Suárez, L Ortiz, JJ Mira, HG Duarte, L Reveiz, ... International Journal for Quality in Health Care 27 (1), 52-59, 2015 | 69 | 2015 |
Litigios por derecho a la salud en tres países de América Latina: revisión sistemática de la literatura L Reveiz, E Chapman, R Torres, JF Fitzgerald, A Mendoza, M Bolis, ... Revista Panamericana de Salud Pública 33, 213-222, 2013 | 68 | 2013 |
Detecting malicious HTTP redirections using user browsing activity trees R Torres, H Mekky, ZL Zhang, S Saha, A Nucci US Patent 9,531,736, 2016 | 64 | 2016 |
Detecting suspicious network behaviors based on domain name service failures P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci US Patent 9,245,121, 2016 | 53 | 2016 |
DDoS attacks by subverting membership management in P2P systems X Sun, R Torres, S Rao 2007 3rd IEEE Workshop on Secure Network Protocols, 1-6, 2007 | 45 | 2007 |
Detecting malware infestations in large-scale networks L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ... US Patent 8,959,643, 2015 | 43 | 2015 |
Inferring undesirable behavior from P2P traffic analysis RD Torres, MY Hajjat, SG Rao, M Mellia, MM Munafò Proceedings of the eleventh international joint conference on Measurement …, 2009 | 43 | 2009 |
Anatomical, histological and ultraestructural description of the gills and liver of the Tilapia (Oreochromis niloticus) R Torres, P Gonzalez, S Pena International Journal of Morphology 28 (3), 703-712, 2010 | 39 | 2010 |
Botnet protocol inference in the presence of encrypted traffic L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 36 | 2017 |
Right-to-health litigation in three Latin American countries: a systematic literature review/Litigios por derecho a la salud en tres paises de America Latina: revision … L Reveiz, E Chapman, R Torres, JF Fitzgerald, A Mendoza, M Bolis, ... Revista Panamericana de Salud Pública 33 (3), 213-223, 2013 | 33 | 2013 |
Mitos y realidades de las obras sociales en la Argentina R Torres Ediciones Granica SA, 2004 | 30 | 2004 |
Detecting malicious activities with user‐agent‐based profiles Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia International Journal of Network Management 25 (5), 306-319, 2015 | 28 | 2015 |
Detecting malicious clients in isp networks using http connectivity graph and flow information L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia 2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014 | 27 | 2014 |
Network application signatures for binary protocols R Keralapura, R Torres, M Iliofotou, A Tongaonkar, A Nucci US Patent 8,578,024, 2013 | 27 | 2013 |