default search action
Alok Tongaonkar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j7]Ali Zand, Gaspar Modelo-Howard, Alok Tongaonkar, Sung-Ju Lee, Christopher Kruegel, Giovanni Vigna:
Demystifying DDoS as a Service. IEEE Commun. Mag. 55(7): 14-21 (2017) - [c17]Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Botnet protocol inference in the presence of encrypted traffic. INFOCOM 2017: 1-9 - [c16]Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Kali: Scalable encryption fingerprinting in dynamic malware traces. MALWARE 2017: 3-10 - 2016
- [j6]Ignacio Bermudez, Alok Tongaonkar, Marios Iliofotou, Marco Mellia, Maurizio M. Munafò:
Towards automatic protocol field inference. Comput. Commun. 84: 40-51 (2016) - [j5]Alok Tongaonkar:
A Look at the Mobile App Identification Landscape. IEEE Internet Comput. 20(4): 9-15 (2016) - [j4]Alok Tongaonkar, R. Sekar:
Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata. IEEE Trans. Inf. Forensics Secur. 11(3): 468-483 (2016) - [c15]Gyan Ranjan, Alok Tongaonkar, Ruben Torres:
Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic. INFOCOM 2016: 1-9 - 2015
- [j3]Alok Tongaonkar, Ruben Torres, Marios Iliofotou, Ram Keralapura, Antonio Nucci:
Towards self adaptive network traffic classification. Comput. Commun. 56: 35-46 (2015) - [j2]Yang Zhang, Hesham Mekky, Zhi-Li Zhang, Ruben Torres, Sung-Ju Lee, Alok Tongaonkar, Marco Mellia:
Detecting malicious activities with user-agent-based profiles. Int. J. Netw. Manag. 25(5): 306-319 (2015) - [j1]Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar, Sabyasachi Saha:
YouLighter: A Cognitive Approach to Unveil YouTube CDN and Changes. IEEE Trans. Cogn. Commun. Netw. 1(2): 161-174 (2015) - [c14]Yabing Liu, Han Hee Song, Ignacio Bermudez, Alan Mislove, Mario Baldi, Alok Tongaonkar:
Identifying Personal Information in Internet Traffic. COSN 2015: 59-70 - [c13]Hongyi Yao, Gyan Ranjan, Alok Tongaonkar, Yong Liao, Zhuoqing Morley Mao:
SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic. MobiCom 2015: 439-451 - [c12]Ignacio Bermudez, Alok Tongaonkar, Marios Iliofotou, Marco Mellia, Maurizio M. Munafò:
Automatic protocol field inference for deeper protocol understanding. Networking 2015: 1-9 - [c11]Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar, Sabyasachi Saha:
YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes. ITC 2015: 19-27 - [i1]Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar, Sabyasachi Saha:
YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes. CoRR abs/1503.05426 (2015) - 2014
- [c10]Amedeo Sapio, Mario Baldi, Yong Liao, Gyan Ranjan, Fulvio Risso, Alok Tongaonkar, Ruben Torres, Antonio Nucci:
MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks. EWSDN 2014: 131-132 - [c9]Amedeo Sapio, Yong Liao, Mario Baldi, Gyan Ranjan, Fulvio Risso, Alok Tongaonkar, Ruben Torres, Antonio Nucci:
Per-user policy enforcement on mobile apps through network functions virtualization. MobiArch 2014: 37-42 - 2013
- [c8]Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song:
NetworkProfiler: Towards automatic fingerprinting of Android apps. INFOCOM 2013: 809-817 - [c7]Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
SANTaClass: A Self Adaptive Network Traffic Classification system. Networking 2013: 1-9 - [c6]Alok Tongaonkar, Shuaifu Dai, Antonio Nucci, Dawn Song:
Understanding Mobile App Usage Patterns Using In-App Advertisements. PAM 2013: 63-72 - 2012
- [c5]Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
Challenges in Network Application Identification. LEET 2012
2000 – 2009
- 2009
- [c4]Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan:
Fast Packet Classification Using Condition Factorization. ACNS 2009: 417-436 - 2008
- [c3]Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar:
Fast Packet Classification for Snort by Native Compilation of Rules. LISA 2008: 159-165 - 2007
- [c2]Alok Tongaonkar, Niranjan Inamdar, R. Sekar:
Inferring Higher Level Policies from Firewall Rules. LISA 2007: 17-26 - 2004
- [c1]Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh:
Towards Automatic Learning of Valid Services for Honeypots. ICDCIT 2004: 469-470
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint