Ruben Torres

According to our database1, Ruben Torres authored at least 19 papers between 2007 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Kali: Scalable encryption fingerprinting in dynamic malware traces.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Botnet protocol inference in the presence of encrypted traffic.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Detecting malicious activities with user-agent-based profiles.
Int. J. Netw. Manag., 2015

Towards self adaptive network traffic classification.
Comput. Commun., 2015

Leveraging client-side DNS failure patterns to identify malicious behaviors.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Nazca: Detecting Malware Distribution in Large-Scale Networks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Per-user policy enforcement on mobile apps through network functions virtualization.
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014

Detecting malicious HTTP redirections using trees of user browsing activity.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks.
Proceedings of the Third European Workshop on Software Defined Networks, 2014

Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Characterization of community based-P2P systems and implications for traffic localization.
Peer-to-Peer Netw. Appl., 2013

2012
The internet-wide impact of P2P traffic localization on ISP profitability.
IEEE/ACM Trans. Netw., 2012

2011
YouTube everywhere: impact of device and infrastructure synergies on user experience.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Dissecting Video Server Selection Strategies in the YouTube CDN.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
On the feasibility of exploiting P2P systems to launch DDoS attacks.
Peer-to-Peer Netw. Appl., 2010

Preventing DDoS attacks on internet servers exploiting P2P systems.
Comput. Networks, 2010

2009
Inferring undesirable behavior from P2P traffic analysis.
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009

2007
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System.
IEEE J. Sel. Areas Commun., 2007


  Loading...