default search action
Ruben Torres
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2015
- [j7]Alok Tongaonkar, Ruben Torres, Marios Iliofotou, Ram Keralapura, Antonio Nucci:
Towards self adaptive network traffic classification. Comput. Commun. 56: 35-46 (2015) - [j6]Yang Zhang, Hesham Mekky, Zhi-Li Zhang, Ruben Torres, Sung-Ju Lee, Alok Tongaonkar, Marco Mellia:
Detecting malicious activities with user-agent-based profiles. Int. J. Netw. Manag. 25(5): 306-319 (2015) - 2013
- [j5]Ruben Torres, Marco Mellia, Maurizio M. Munafò, Sanjay G. Rao:
Characterization of community based-P2P systems and implications for traffic localization. Peer-to-Peer Netw. Appl. 6(2): 118-133 (2013) - 2012
- [j4]Jeff Seibert, Ruben Torres, Marco Mellia, Maurizio M. Munafò, Cristina Nita-Rotaru, Sanjay G. Rao:
The internet-wide impact of P2P traffic localization on ISP profitability. IEEE/ACM Trans. Netw. 20(6): 1910-1923 (2012) - 2010
- [j3]Xin Sun, Ruben Torres, Sanjay G. Rao:
Preventing DDoS attacks on internet servers exploiting P2P systems. Comput. Networks 54(15): 2756-2774 (2010) - [j2]Xin Sun, Ruben Torres, Sanjay G. Rao:
On the feasibility of exploiting P2P systems to launch DDoS attacks. Peer-to-Peer Netw. Appl. 3(1): 36-51 (2010) - 2007
- [j1]Ruben Torres, Xin Sun, Aaron Walters, Cristina Nita-Rotaru, Sanjay G. Rao:
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. IEEE J. Sel. Areas Commun. 25(9): 1732-1744 (2007)
Conference and Workshop Papers
- 2017
- [c13]Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Botnet protocol inference in the presence of encrypted traffic. INFOCOM 2017: 1-9 - [c12]Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Kali: Scalable encryption fingerprinting in dynamic malware traces. MALWARE 2017: 3-10 - 2016
- [c11]Gyan Ranjan, Alok Tongaonkar, Ruben Torres:
Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic. INFOCOM 2016: 1-9 - 2015
- [c10]Pengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci, Marco Mellia:
Leveraging client-side DNS failure patterns to identify malicious behaviors. CNS 2015: 406-414 - 2014
- [c9]Lei Liu, Sabyasachi Saha, Ruben Torres, Jianpeng Xu, Pang-Ning Tan, Antonio Nucci, Marco Mellia:
Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information. ASONAM 2014: 150-157 - [c8]Amedeo Sapio, Mario Baldi, Yong Liao, Gyan Ranjan, Fulvio Risso, Alok Tongaonkar, Ruben Torres, Antonio Nucci:
MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks. EWSDN 2014: 131-132 - [c7]Hesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci:
Detecting malicious HTTP redirections using trees of user browsing activity. INFOCOM 2014: 1159-1167 - [c6]Amedeo Sapio, Yong Liao, Mario Baldi, Gyan Ranjan, Fulvio Risso, Alok Tongaonkar, Ruben Torres, Antonio Nucci:
Per-user policy enforcement on mobile apps through network functions virtualization. MobiArch 2014: 37-42 - [c5]Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia:
Nazca: Detecting Malware Distribution in Large-Scale Networks. NDSS 2014 - 2011
- [c4]Ruben Torres, Alessandro Finamore, Jin Ryong Kim, Marco Mellia, Maurizio M. Munafò, Sanjay G. Rao:
Dissecting Video Server Selection Strategies in the YouTube CDN. ICDCS 2011: 248-257 - [c3]Alessandro Finamore, Marco Mellia, Maurizio M. Munafò, Ruben Torres, Sanjay G. Rao:
YouTube everywhere: impact of device and infrastructure synergies on user experience. Internet Measurement Conference 2011: 345-360 - 2009
- [c2]Ruben Torres, Mohammad Y. Hajjat, Sanjay G. Rao, Marco Mellia, Maurizio M. Munafò:
Inferring undesirable behavior from P2P traffic analysis. SIGMETRICS/Performance 2009: 25-36 - 2007
- [c1]Ruben Torres, Xin Sun, Aaron Walters, Cristina Nita-Rotaru, Sanjay G. Rao:
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. INFOCOM 2007: 607-615
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 22:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint