The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Luca Salgarelli: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Luca Salgarelli, Antonio Corghi, Henning Sanneck, Dorota Witaszek
    Supporting IP multicast integrated services in ATM networks. [Citation Graph (0, 0)][DBLP]
    Broadband Networking Technologies, 1997, pp:78-88 [Conf]
  2. Milind M. Buddhikot, Girish P. Chandranmenon, Seung-Jae Han, Yui-Wah Lee, Scott Miller, Luca Salgarelli
    Integration of 802.11 and Third-Generation Wireless Data Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  3. Uri Blumenthal, Milind M. Buddhikot, Juan A. Garay, Scott C. Miller, Sarvar Patel, Luca Salgarelli, Dorothy Stanley
    A scheme for authentication and dynamic key exchange in wireless networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2002, v:7, n:2, pp:37-48 [Journal]
  4. Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
    Traffic classification through simple statistical fingerprinting. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2007, v:37, n:1, pp:5-16 [Journal]
  5. Ramachandran Ramjee, Kannan Varadhan, Luca Salgarelli, Sandra R. Thuel, Shie Yuan Wang, Thomas F. La Porta
    HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2002, v:10, n:3, pp:396-410 [Journal]
  6. Luca Salgarelli, Thomas Karagiannis
    Comparing traffic classifiers. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2007, v:37, n:3, pp:65-68 [Journal]

  7. Detection of Encrypted Tunnels Across Network Boundaries. [Citation Graph (, )][DBLP]


  8. Detecting HTTP Tunnels with Statistical Mechanisms. [Citation Graph (, )][DBLP]


  9. Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic. [Citation Graph (, )][DBLP]


  10. A Preliminary Look at the Privacy of SSH Tunnels. [Citation Graph (, )][DBLP]


  11. IP Traffic Classification for QoS Guarantees: The Independence of Packets. [Citation Graph (, )][DBLP]


  12. Pattern Recognition Approaches for Classifying IP Flows. [Citation Graph (, )][DBLP]


  13. Optimizing statistical classifiers of network traffic. [Citation Graph (, )][DBLP]


  14. An Experimental Evaluation of the Computational Cost of a DPI Traffic Classifier. [Citation Graph (, )][DBLP]


  15. Impact of Asymmetric Routing on Statistical Traffic Classification. [Citation Graph (, )][DBLP]


  16. A Model for the Study of Privacy Issues in Secure Shell Connections. [Citation Graph (, )][DBLP]


  17. GT: picking up the truth from the ground for internet traffic. [Citation Graph (, )][DBLP]


  18. On the stability of the information carried by traffic flow features at the packet level. [Citation Graph (, )][DBLP]


  19. Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting. [Citation Graph (, )][DBLP]


  20. Support Vector Machines for TCP traffic classification. [Citation Graph (, )][DBLP]


  21. Traffic classification and its applications to modern networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002