Antonio Nucci

According to our database1, Antonio Nucci authored at least 82 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Eco-activism, Human-Computer Interaction and Fast Fashion.
Proceedings of the Design, User Experience, and Usability: Design for Diversity, Well-being, and Social Development, 2021

2017
Packet Capture and Analysis on MEDINA, A Massively Distributed Network Data Caching Platform.
Parallel Process. Lett., 2017

2016
Joining user profiles across online social networks: From the perspective of an adversary.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
GOM-Hadoop: A distributed framework for efficient analytics on ordered datasets.
J. Parallel Distributed Comput., 2015

Towards self adaptive network traffic classification.
Comput. Commun., 2015

Automatic generation of mobile app signatures from traffic observations.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Leveraging client-side DNS failure patterns to identify malicious behaviors.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
GeoEcho: Inferring User Interests from Geotag Reports in Network Traffic.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

FLOWR: a self-learning system for classifying mobileapplication traffic.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Per-user policy enforcement on mobile apps through network functions virtualization.
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014

Detecting malicious HTTP redirections using trees of user browsing activity.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks.
Proceedings of the Third European Workshop on Software Defined Networks, 2014

Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Fuzzy-Clustering-Based Decision Tree Approach for Large Population Speaker Identification.
IEEE Trans. Speech Audio Process., 2013

A Scalable Distributed Framework for Efficient Analytics on Ordered Datasets.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Mosaic: quantifying privacy leakage in mobile networks.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Missing or Inapplicable: Treatment of Incomplete Continuous-valued Features in Supervised Learning.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013

Understanding Mobile App Usage Patterns Using In-App Advertisements.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

SANTaClass: A Self Adaptive Network Traffic Classification system.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

NetworkProfiler: Towards automatic fingerprinting of Android apps.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Combining supervised and unsupervised learning for zero-day malware detection.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Efficient analytics on ordered datasets using MapReduce.
Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing, 2013

2012
Taming the Mobile Data Deluge With Drop Zones.
IEEE/ACM Trans. Netw., 2012

Pitch-based gender identification with two-stage classification.
Secur. Commun. Networks, 2012

Challenges in Network Application Identification.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

SubFlow: Towards practical flow-level traffic classification.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

DNS to the rescue: discerning content and services in a tangled web.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Recursive NMF: Efficient label tree learning for large multi-class problems.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

CUTE: Traffic Classification Using TErms.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Weighted linear kernel with tree transformed features for malware detection.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Poster: telephony network characterization for spammer identification.
SIGMETRICS Perform. Evaluation Rev., 2011

Protocol oblivious classification of multimedia traffic.
Secur. Commun. Networks, 2011

Taming user-generated content in mobile networks via Drop Zones.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

You can SPIT, but you can't hide: Spammer identification in telephony networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues.
Proceedings of IEEE International Conference on Communications, 2011

2010
Googling the internet: profiling internet endpoints via the world wide web.
IEEE/ACM Trans. Netw., 2010

A novel self-learning architecture for p2p traffic classification in high speed networks.
Comput. Networks, 2010

Profiling users in a 3g network using hourglass co-clustering.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

2009
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks.
IEEE/ACM Trans. Netw., 2009

Traffic monitor deployment in IP networks.
Comput. Networks, 2009

A Social Network Based Patching Scheme for Worm Containment in Cellular Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Measuring serendipity: connecting people, locations and interests in a mobile 3G network.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Self-Learning Peer-to-Peer Traffic Classifier.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Identifying hidden voice and video streams.
Proceedings of the Data Mining, 2009

2008
An efficient data structure for network anomaly detection.
Secur. Commun. Networks, 2008

Unconstrained endpoint profiling (googling the internet).
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

IPzip: A Stream-Aware IP Compression Algorithm.
Proceedings of the 2008 Data Compression Conference (DCC 2008), 2008

Design, Measurement and Management of Large-Scale IP Networks - Bridging the Gap between Theory and Practice.
Cambridge University Press, ISBN: 978-0-521-88069-5, 2008

2007
Estimating dynamic traffic matrices by using viable routing changes.
IEEE/ACM Trans. Netw., 2007

IGP link weight assignment for operational Tier-1 backbones.
IEEE/ACM Trans. Netw., 2007

Dynamic Nonuniform Data Approximation in Databases with Haar Wavelet.
J. Comput., 2007

Robust and efficient detection of DDoS attacks for large-scale internet.
Comput. Networks, 2007

Detecting bogus BGP route information: Going beyond prefix hijacking.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

SIP-based VoIP traffic behavior profiling and its applications.
Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, 2007

DoWitcher: Effective Worm Detection and Containment in the Internet Core.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Nonuniform Compression in Databases with Haar Wavelet.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

2006
Forming optimal topologies for Bluetooth-based wireless personal area networks.
IEEE Trans. Wirel. Commun., 2006

BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

Seeing the Difference in IP Traffic: Wireless Versus Wireline.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Design of Bloom Filter Array for Network Anomaly Detection.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Traffic matrix tracking using Kalman filters.
SIGMETRICS Perform. Evaluation Rev., 2005

Increasing the Link Utilization in IP over WDM Networks Using Availability as QoS.
Photonic Netw. Commun., 2005

The problem of synthetically generating IP traffic matrices: initial recommendations.
Comput. Commun. Rev., 2005

Traffic matrices: balancing measurements, inference and modeling.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Theory and practice of cross-traffic estimation.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Measuring the Shared Fate of IGP Engineering and Interdomain Traffic.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
An Energy-Efficient Method for Nodes Assignment in Cluster-Based Ad Hoc Networks.
Wirel. Networks, 2004

Controlled use of excess backbone bandwidth for providing new services in IP-over-WDM networks.
IEEE J. Sel. Areas Commun., 2004

On the design of fault-tolerant logical topologies in wavelength-routed packet networks.
IEEE J. Sel. Areas Commun., 2004

How to identify and estimate the largest traffic matrix elements in a dynamic environment.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Design of IGP Link Weights for Estimation of Traffic Matrices.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Scheduling algorithms for multicast traffic in TDM/WDM networks with arbitrary tuning latencies.
Comput. Networks, 2003

Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2002
Design of Logical Topologies in Wavelength-Routed IP Networks.
Photonic Netw. Commun., 2002

Energy Efficient Design of Wireless Ad Hoc Networks.
Proceedings of the NETWORKING 2002, 2002

Optimizing the Topology of Bluetooth Wireless Personal Area Networks.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
Logical topologies design over WDM wavelength routed networks robust to traffic uncertainties.
IEEE Commun. Lett., 2001

Design of fault-tolerant logical topologies in wavelength-routed optical IP networks.
Proceedings of the Global Telecommunications Conference, 2001

Optimal design of logical topologies in wavelength-routed optical networks with multicast traffic.
Proceedings of the Global Telecommunications Conference, 2001

2000
Multihop packet scheduling in WDM/TDM networks with nonnegligible transceiver tuning times.
IEEE Trans. Commun., 2000

Simple On-Line Scheduling Algorithms for All-Optical Broadcast-and-Select Networks.
Eur. Trans. Telecommun., 2000

1998
Efficient Multi-Hop Scheduling Algorithms for All-Optical WDM/TDM Broadcast-and-Select Networks with Arbitrary Transceiver Tuning Latencies.
Proceedings of the Optical Networks: Design and Modeling, 1998


  Loading...