default search action
Antonio Nucci
- > Home > Persons > Antonio Nucci
Publications
- 2015
- [j28]Alok Tongaonkar, Ruben Torres, Marios Iliofotou, Ram Keralapura, Antonio Nucci:
Towards self adaptive network traffic classification. Comput. Commun. 56: 35-46 (2015) - 2013
- [c40]Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
SANTaClass: A Self Adaptive Network Traffic Classification system. Networking 2013: 1-9 - 2012
- [c34]Soheil Hassas Yeganeh, Milad Eftekhar, Yashar Ganjali, Ram Keralapura, Antonio Nucci:
CUTE: Traffic Classification Using TErms. ICCCN 2012: 1-9 - [c32]Ignacio Bermudez, Marco Mellia, Maurizio M. Munafò, Ram Keralapura, Antonio Nucci:
DNS to the rescue: discerning content and services in a tangled web. Internet Measurement Conference 2012: 413-426 - [c31]Guowu Xie, Marios Iliofotou, Ram Keralapura, Michalis Faloutsos, Antonio Nucci:
SubFlow: Towards practical flow-level traffic classification. INFOCOM 2012: 2541-2545 - [c30]Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
Challenges in Network Application Identification. LEET 2012 - 2011
- [j23]Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao:
Protocol oblivious classification of multimedia traffic. Secur. Commun. Networks 4(4): 357-371 (2011) - [j22]Hossein Kaffash Bokharaei, Yashar Ganjali, Ram Keralapura, Antonio Nucci:
Poster: telephony network characterization for spammer identification. SIGMETRICS Perform. Evaluation Rev. 39(2): 69 (2011) - [c29]Zhichao Zhu, Guohong Cao, Ram Keralapura, Antonio Nucci:
Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues. ICC 2011: 1-6 - [c28]Hossein Kaffash Bokharaei, Alireza Sahraei, Yashar Ganjali, Ram Keralapura, Antonio Nucci:
You can SPIT, but you can't hide: Spammer identification in telephony networks. INFOCOM 2011: 41-45 - 2010
- [j21]Ram Keralapura, Antonio Nucci, Chen-Nee Chuah:
A novel self-learning architecture for p2p traffic classification in high speed networks. Comput. Networks 54(7): 1055-1068 (2010) - [c26]Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin Gao:
Profiling users in a 3g network using hourglass co-clustering. MobiCom 2010: 341-352 - 2009
- [c25]Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao:
Identifying hidden voice and video streams. Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009: 73440F - [c24]Ram Keralapura, Antonio Nucci, Chen-Nee Chuah:
Self-Learning Peer-to-Peer Traffic Classifier. ICCCN 2009: 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 22:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint