Ruben Torres
Ruben Torres
Verified email at symantec.com
Title
Cited by
Cited by
Year
Youtube everywhere: Impact of device and infrastructure synergies on user experience
A Finamore, M Mellia, MM Munafň, R Torres, SG Rao
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
3702011
Dissecting video server selection strategies in the youtube cdn
R Torres, A Finamore, JR Kim, M Mellia, MM Munafo, S Rao
2011 31st International Conference on Distributed Computing Systems, 248-257, 2011
2102011
Nazca: Detecting Malware Distribution in Large-Scale Networks.
L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ...
NDSS 14, 23-26, 2014
1242014
Detecting malicious endpoints using network connectivity and flow information
S Saha, L Liu, R Torres, J Xu, A Nucci
US Patent 8,813,236, 2014
862014
Towards self adaptive network traffic classification
A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci
Computer Communications 56, 35-46, 2015
592015
Detecting malicious http redirections using trees of user browsing activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014
552014
DDoS attacks by subverting membership management in P2P systems
X Sun, R Torres, S Rao
2007 3rd IEEE Workshop on Secure Network Protocols, 1-6, 2007
442007
Inferring undesirable behavior from P2P traffic analysis
RD Torres, MY Hajjat, SG Rao, M Mellia, MM Munafň
Proceedings of the eleventh international joint conference on Measurement …, 2009
422009
Detecting suspicious network behaviors based on domain name service failures
P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci
US Patent 9,245,121, 2016
272016
Mitos y realidades de las obras sociales en la Argentina
R Torres
Ediciones Granica SA, 2004
222004
Detecting malicious clients in isp networks using http connectivity graph and flow information
L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
202014
On the feasibility of exploiting P2P systems to launch DDoS attacks
X Sun, R Torres, SG Rao
Peer-to-peer networking and applications 3 (1), 36-51, 2010
202010
Detecting malware infestations in large-scale networks
L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ...
US Patent 8,959,643, 2015
192015
The internet-wide impact of p2p traffic localization on isp profitability
J Seibert, R Torres, M Mellia, MM Munafo, C Nita-Rotaru, S Rao
IEEE/ACM Transactions on Networking 20 (6), 1910-1923, 2012
192012
Approximate matching of persistent lexicon using search-engines for classifying mobile app traffic
G Ranjan, A Tongaonkar, R Torres
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
182016
Per-user policy enforcement on mobile apps through network functions virtualization
A Sapio, Y Liao, M Baldi, G Ranjan, F Risso, A Tongaonkar, R Torres, ...
Proceedings of the 9th ACM workshop on Mobility in the Evolving Internet …, 2014
172014
Reoptimization of maximum weight induced hereditary subgraph problems
N Boria, J Monnot, V Paschos
17*2011
Preventing DDoS attacks on internet servers exploiting P2P systems
X Sun, R Torres, S Rao
Computer Networks 54 (15), 2756-2774, 2010
172010
Effectiveness of a batteryless and wireless wearable sensor system for identifying bed and chair exits in healthy older people
RL Shinmoto Torres, R Visvanathan, S Hoskins, A Van den Hengel, ...
Sensors 16 (4), 546, 2016
152016
Leveraging client-side DNS failure patterns to identify malicious behaviors
P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci, M Mellia
2015 IEEE Conference on Communications and Network Security (CNS), 406-414, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20