Ramin Sadre

Orcid: 0000-0001-7362-359X

According to our database1, Ramin Sadre authored at least 90 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Avoiding "Hot Potato" Problems in Internet Service Providers.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach.
Proceedings of the IFIP Networking Conference, 2024

DISC-NG: Robust Service Discovery in the Ethereum Global Network.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements.
CoRR, 2023

A Survey of Public IoT Datasets for Network Security Research.
IEEE Commun. Surv. Tutorials, 2023

Towards Cheaper Tourists' Emotion and Satisfaction Estimation with PCA and Subgroup Analysis.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

2022
Exploiting the Temporal Behavior of State Transitions for Intrusion Detection in ICS/SCADA.
IEEE Access, 2022

C2B2: a Cloud-native Chaos Benchmarking suite for the Hyperledger Fabric Blockchain.
Proceedings of the 18th European Dependable Computing Conference, 2022

2021
OpenPosLib: A Library to Achieve Centimetric Geo-Spatial Positioning on a Budget.
IEEE Access, 2021

Chaos Duck: A Tool for Automatic IoT Software Fault-Tolerance Analysis.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Reverse-Engineering the Physical Configuration of Smart Homes.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Machine Learning with Reconfigurable Privacy on Resource-Limited Computing Devices.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

PyDPLib: Python Differential Privacy Library for Private Medical Data Analytics.
Proceedings of the IEEE International Conference on Digital Health, 2021

Synthetic and Private Smart Health Care Data Generation using GANs.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
On the Performance of QUIC over Wireless Mesh Networks.
J. Netw. Syst. Manag., 2020

Network trace generation for flow-based IDS evaluation in control and automation systems.
Int. J. Crit. Infrastructure Prot., 2020

Brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

NetSheriff: Sheltering Software-Defined Networks from Rogue Switches.
Proceedings of the Networked Systems - 8th International Conference, 2020

My House, My Rules: A Private-by-Design Smart Home Platform.
Proceedings of the MobiQuitous '20: Computing, 2020

Understanding the performance of container execution environments.
Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, 2020

GateSelect: A novel Internet gateway selection algorithm for client nodes.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
Prevalence of IoT Protocols in Telescopeand Honeypot Measurements.
J. Cyber Secur. Mobil., 2019

A Public Network Trace of a Control and Automation System.
CoRR, 2019

Improving Performance of QUIC in WiFi.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

On the Case of Privacy in the IoT Ecosystem: A Survey.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Collaborative informed gateway selection in large-scale and heterogeneous networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Distributed Middlebox Architecture for IoT Protection.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Sense-Share: A Framework for Resilient Collaborative Service Performance Monitoring.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2018
Fast and efficient probing of heterogeneous IoT networks.
Int. J. Netw. Manag., 2018

Beyond Telnet: Prevalence of IoT Protocols in Telescope and Honeypot Measurements.
Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, 2018

Is There a Case for Parallel Connections with Modern Web Protocols?
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018

2017
How HTTP/2 is changing web traffic and how to detect it.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

A low-delay SDN-based countermeasure to eavesdropping attacks in industrial control systems.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

MultiPath TCP to support user's mobility in future LTE network.
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017

Efficient probing of heterogeneous IoT networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

2016
Flow-Based Network Management: A Report from the IRTF NMRG Workshop.
J. Netw. Syst. Manag., 2016

Exploiting traffic periodicity in industrial control networks.
Int. J. Crit. Infrastructure Prot., 2016

A Survey on Information Visualization for Network and Service Management.
IEEE Commun. Surv. Tutorials, 2016

Observing real Multipath TCP traffic.
Comput. Commun., 2016

Report from the 6th PhD School on Traffic Monitoring and Analysis (TMA).
Comput. Commun. Rev., 2016

Assessing the Quality of Flow Measurements from OpenFlow Devices.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Measuring the Adoption of DDoS Protection Services.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

The curious case of parallel connections in HTTP/2.
Proceedings of the 12th International Conference on Network and Service Management, 2016

2015
Impact of Packet Sampling on Link Dimensioning.
IEEE Trans. Netw. Serv. Manag., 2015

Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case.
J. Netw. Syst. Manag., 2015

A First Look at Real Multipath TCP Traffic.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Measuring and Modeling Multipath TCP.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Flow-based Approaches in Network Management: Recent Advances and Future Trends.
Int. J. Netw. Manag., 2014

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX.
IEEE Commun. Surv. Tutorials, 2014

A hybrid procedure for efficient link dimensioning.
Comput. Networks, 2014

Bad neighborhoods on the internet.
IEEE Commun. Mag., 2014

Taking on Internet Bad Neighborhoods.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Internet Bad Neighborhoods temporal behavior.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Linking network usage patterns to traffic Gaussianity fit.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

2013
Flow whitelisting in SCADA networks.
Int. J. Crit. Infrastructure Prot., 2013

Measurement Artifacts in NetFlow Data.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Gaussian traffic revisited.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Evaluating third-party Bad Neighborhood blacklists for Spam detection.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Lightweight link dimensioning using sFlow sampling.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study.
IEEE Trans. Netw. Serv. Manag., 2012

Difficulties in Modeling SCADA Traffic: A Comparative Analysis.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

The effects of DDoS attacks on flow monitoring applications.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Internet bad neighborhoods aggregation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A first look into SCADA network traffic.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Simulative and Analytical Evaluation for ASD-Based Embedded Software.
Proceedings of the Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance, 2012

Inside dropbox: understanding personal cloud storage services.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Towards periodicity based anomaly detection in SCADA networks.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

Towards Bandwidth Estimation Using Flow-Level Measurements.
Proceedings of the Dependable Networks and Services, 2012

SSHCure: A Flow-Based SSH Intrusion Detection System.
Proceedings of the Dependable Networks and Services, 2012

2011
Report of the Third Workshop on the Usage of NetFlow/IPFIX in Network Management.
J. Netw. Syst. Manag., 2011

Report of the Second Workshop on the Usage of NetFlow/IPFIX in Network Management.
J. Netw. Syst. Manag., 2011

Internet Bad Neighborhoods: The spam case.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
An Overview of IP Flow-Based Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2010

2009
Using NetFlow/IPFIX for Network Management.
J. Netw. Syst. Manag., 2009

A Labeled Data Set for Flow-Based Intrusion Detection.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

Self-management of hybrid networks: Can we trust netflow data?
Proceedings of the Integrated Network Management, 2009

Detecting Spam at the Network Level.
Proceedings of the Internet of the Future, 2009

Hidden Markov Model Modeling of SSH Brute-Force Attacks.
Proceedings of the Integrated Management of Systems, 2009

A Statistical Analysis of Network Parameters for the Self-management of Lambda-Connections.
Proceedings of the Scalability of Networks and Services, 2009

2008
Anomaly Characterization in Flow-Based Traffic Time Series.
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008

Changes in the Web from 2000 to 2007.
Proceedings of the Managing Large-Scale Service Deployment, 2008

2007
Decomposition-Based Analysis of Queueing Networks.
PhD thesis, 2007

A Fixed-Point Algorithm for Closed Queueing Networks.
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2007

2004
The pseudo-self-similar traffic model: application and validation.
Perform. Evaluation, 2004

2003
Fitting world-wide web request traces with the EM-algorithm.
Perform. Evaluation, 2003

A Class-Based Least-Recently Used Caching Algorithm for World-Wide Web Proxies.
Proceedings of the Computer Performance Evaluations, 2003

2002
A Validation of the Pseudo Self-Similar Traffic Model.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Flows in Networks of MAP/MAP/1 Queues.
Proceedings of the Proceedings 11th GI/ITG Conference on Measuring, 2001

2000
FiFiQueues: Fixed-Point Analysis of Queueing Networks with Finite-Buffer Stations.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 2000

1999
An Abstract Machine for Curry and Its Concurrent Implementation in Java.
J. Funct. Log. Program., 1999


  Loading...