Ruben Torres
Ruben Torres
Verified email at symantec.com
TitleCited byYear
Youtube everywhere: Impact of device and infrastructure synergies on user experience
A Finamore, M Mellia, MM Munaf˛, R Torres, SG Rao
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurementá…, 2011
3622011
Dissecting video server selection strategies in the youtube cdn
R Torres, A Finamore, JR Kim, M Mellia, MM Munafo, S Rao
2011 31st International Conference on Distributed Computing Systems, 248-257, 2011
2032011
Nazca: Detecting Malware Distribution in Large-Scale Networks.
L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ...
NDSS 14, 23-26, 2014
1152014
Detecting malicious endpoints using network connectivity and flow information
S Saha, L Liu, R Torres, J Xu, A Nucci
US Patent 8,813,236, 2014
1092014
Detecting malicious http redirections using trees of user browsing activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014
492014
Towards self adaptive network traffic classification
A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci
Computer Communications 56, 35-46, 2015
472015
DDoS attacks by subverting membership management in P2P systems
X Sun, R Torres, S Rao
2007 3rd IEEE Workshop on Secure Network Protocols, 1-6, 2007
442007
Inferring undesirable behavior from P2P traffic analysis
RD Torres, MY Hajjat, SG Rao, M Mellia, MM Munaf˛
ACM SIGMETRICS Performance Evaluation Review 37 (1), 25-36, 2009
432009
Detecting suspicious network behaviors based on domain name service failures
P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci
US Patent 9,245,121, 2016
332016
Mitos y realidades de las obras sociales en la Argentina
R Torres
Ediciones Granica SA, 2004
222004
Detecting malware infestations in large-scale networks
L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ...
US Patent 8,959,643, 2015
212015
On the feasibility of exploiting P2P systems to launch DDoS attacks
X Sun, R Torres, SG Rao
Peer-to-peer networking and applications 3 (1), 36-51, 2010
212010
Detecting malicious clients in isp networks using http connectivity graph and flow information
L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia
Proceedings of the 2014 IEEE/ACM International Conference on Advances iná…, 2014
192014
The internet-wide impact of p2p traffic localization on isp profitability
J Seibert, R Torres, M Mellia, MM Munafo, C Nita-Rotaru, S Rao
IEEE/ACM Transactions on Networking 20 (6), 1910-1923, 2012
182012
Per-user policy enforcement on mobile apps through network functions virtualization
A Sapio, Y Liao, M Baldi, G Ranjan, F Risso, A Tongaonkar, R Torres, ...
Proceedings of the 9th ACM workshop on Mobility in the evolving internetá…, 2014
172014
Reoptimization of maximum weight induced hereditary subgraph problems
N Boria, J Monnot, V Paschos
16*2011
Preventing DDoS attacks on internet servers exploiting P2P systems
X Sun, R Torres, S Rao
Computer Networks 54 (15), 2756-2774, 2010
162010
Effectiveness of a batteryless and wireless wearable sensor system for identifying bed and chair exits in healthy older people
R Shinmoto Torres, R Visvanathan, S Hoskins, A van den Hengel, ...
Sensors 16 (4), 546, 2016
122016
Preventing DDoS attacks with P2P systems through robust membership management
X Sun, R Torres, S Rao
The 3rd Workshop on Secure Network Protocols (NPSec 2007), 2007
122007
Approximate matching of persistent lexicon using search-engines for classifying mobile app traffic
G Ranjan, A Tongaonkar, R Torres
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computerá…, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20