Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information

Marco Mellia , Ruben Torres , Pang-Ning Tan , Sabyasachi Saha
advances in social networks analysis and mining 150 -157

15
2014
Behavior-based characterization of peer-to-peer (p2p) traffic

Mohammad Hajjat , Ruben Torres , Sanjay Rao
annual information security symposium 11

2008
Health in All Policies

Ruben Torres
Revista Argentina de Cardiología 84 ( 2) 111

2016
Towards self adaptive network traffic classification

Alok Tongaonkar , Ruben Torres , Marios Iliofotou , Ram Keralapura
Computer Communications 56 35 -46

57
2015
The internet-wide impact of P2P traffic localization on ISP profitability

Jeff Seibert , Ruben Torres , Marco Mellia , Maurizio M. Munafo
IEEE ACM Transactions on Networking 20 ( 6) 1910 -1923

15
2012
Dissecting Video Server Selection Strategies in the YouTube CDN

Ruben Torres , Alessandro Finamore , Jin Ryong Kim , Marco Mellia
2011 31st International Conference on Distributed Computing Systems 248 -257

151
2011
MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks

Amedeo Sapio , Mario Baldi , Yong Liao , Gyan Ranjan
2014 Third European Workshop on Software Defined Networks 131 -132

8
2014
Nazca: Detecting Malware Distribution in Large-Scale Networks

Luca Invernizzi , Stanislav Miskovic , Ruben Torres , Sabyasachi Saha
network and distributed system security symposium

88
2014
DDoS Attacks by Subverting Membership Management in P2P Systems

Xin Sun , Ruben Torres , Sanjay Rao
2007 3rd IEEE Workshop on Secure Network Protocols 1 -6

22
2007
Kali: Scalable encryption fingerprinting in dynamic malware traces

Lorenzo De Carli , Ruben Torres , Gaspar Modelo-Howard , Alok Tongaonkar
international conference on malicious and unwanted software 3 -10

1
2017
Leveraging client-side DNS failure patterns to identify malicious behaviors

Pengkui Luo , Ruben Torres , Zhi-Li Zhang , Sabyasachi Saha
communications and networking symposium 406 -414

10
2015
Detecting Malicious HTTP Redirections Using Trees of User Browsing Activity

Hesham Mekky , Ruben Torres , Zhi-Li Zhang , Sabyasachi Saha
international conference on computer communications 1159 -1167

47
2014
Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic

Gyan Ranjan , Alok Tongaonkar , Ruben Torres
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 1 -9

18
2016
Botnet protocol inference in the presence of encrypted traffic

Lorenzo De Carli , Ruben Torres , Gaspar Modelo-Howard , Alok Tongaonkar
IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 1 -9

8
2017
Detecting malicious activities with user-agent-based profiles

Yang Zhang , Hesham Mekky , Zhi-Li Zhang , Ruben Torres
International Journal of Network Management 25 ( 5) 306 -319

10
2015
On the feasibility of exploiting P2P systems to launch DDoS attacks

Xin Sun , Ruben Torres , Sanjay G. Rao
Peer-to-peer Networking and Applications 3 ( 1) 36 -51

7
2010
Characterization of community based-P2P systems and implications for traffic localization

Ruben Torres , Marco Mellia , Maurizio M. Munafo , Sanjay G. Rao
Peer-to-peer Networking and Applications 6 ( 2) 118 -133

4
2013
Preventing DDoS attacks on internet servers exploiting P2P systems

Xin Sun , Ruben Torres , Sanjay Rao
Computer Networks 54 ( 15) 2756 -2774

8
2010
Per-user policy enforcement on mobile apps through network functions virtualization

Amedeo Sapio , Yong Liao , Mario Baldi , Gyan Ranjan
mobility in the evolving internet architecture 37 -42

11
2014