Giuseppe Bianchi

Orcid: 0000-0001-7277-7423

Affiliations:
  • University of Rome Tor Vergata, CNIT / Department of Electronic Engineering, Italy
  • Politecnico di Milano, Italy (PhD 1991)


According to our database1, Giuseppe Bianchi authored at least 281 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Experimental assessment of SDR-based 5G positioning: methodologies and insights.
Ann. des Télécommunications, June, 2024

Composing eBPF Programs Made Easy With HIKe and eCLAT.
IEEE Trans. Netw. Serv. Manag., April, 2024

VaultFS: Write-once Software Support at the File System Level Against Ransomware Attacks.
CoRR, 2024

COREC: Concurrent Non-Blocking Single-Queue Receive Driver for Low Latency Networking.
CoRR, 2024

5G positioning with software-defined radios.
Comput. Networks, 2024

5GMap: User-Driven Audit of Access Security Configurations in Cellular Networks.
Proceedings of the 19th Wireless On-Demand Network Systems and Services Conference, 2024

Towards End-to-end Implementation of 5G Positioning with Off-the-shelf Devices.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

VoWiFi Security: An Exploration of Non-3GPP Untrusted Access via Public ePDG URLs.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

ShiftyLoader: Syscall-free Reflective Code Injection in the Linux Operating System.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

The Case for Ultra High Speed Portable Network Security Filters.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

OpenSatRange: An open cyber range for operators and users of satellite communication networks.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Benchmarking Virtualized Page Permission for Malware Detection: a Web Server Case Study.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

In Plain Sight: A Pragmatic Exploration of the Medical Landscape (In)security.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Physical Layer Threats to 5G Positioning: Impact on TOA-Based Methods.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Decentralizing DDoS Protection via Efficient Hardware Offloading.
Proceedings of the 25th IEEE International Conference on High Performance Switching and Routing, 2024

Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments.
Comput. Commun., December, 2023

Metronome: Adaptive and Precise Intermittent Packet Retrieval in DPDK.
IEEE/ACM Trans. Netw., June, 2023

Balloons in the Sky: Unveiling the Characteristics and Trade-Offs of the Google Loon Service.
IEEE Trans. Mob. Comput., June, 2023

Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security.
IEEE Trans. Wirel. Commun., 2023

Privacy and Transparency in Blockchain-Based Smart Grid Operations.
IEEE Access, 2023

Time Is on My Side: Forward-Replay Attacks to TOTP Authentication.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

From Experiments to Insights: A Journey in 5G New Radio Localization.
Proceedings of the 21st Mediterranean Communication and Computer Networking Conference, 2023

PHOENIX: A Cloud-based Framework for Ensemble Malware Detection.
Proceedings of the 21st Mediterranean Communication and Computer Networking Conference, 2023

Is Your Smartphone Really Safe? A Wake-up Call on Android Antivirus Software Effectiveness.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Windows Antivirus Evasion Techniques: How to Stay Ahead of the Hooks.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

RAINSTORM: Reconnaissance SDR Platform<sup>1</sup>.
Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, 2023

5GShell: a plug-and-play framework for automating the deployment of 5G cellular networks<sup>1</sup>.
Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, 2023

ScasDK - A Development Kit for Security Assurance test in Multi-Network-Function 5G.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

JITScanner: Just-in-Time Executable Page Check in the Linux Operating System.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
PEzoNG: Advanced Packer For Automated Evasion On Windows.
J. Comput. Virol. Hacking Tech., 2022

"Cellular Network Densification Increases Radio-Frequency Pollution": True or False?
IEEE Trans. Wirel. Commun., 2022

Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches.
IEEE Trans. Very Large Scale Integr. Syst., 2022

OpenNym: Privacy preserving recommending via pseudonymous group authentication.
Secur. Priv., 2022

Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer.
J. Syst. Archit., 2022

Staggered HLL: Near-continuous-time cardinality estimation with no overhead.
Comput. Commun., 2022

hXDP: Efficient software packet processing on FPGA NICs.
Commun. ACM, 2022

"Careful with that Roam, Edu": experimental analysis of Eduroam credential stealing attacks.
Proceedings of the 17th Wireless On-Demand Network Systems and Services Conference, 2022

Faster Software Packet Processing on FPGA NICs with eBPF Program Warping.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

5G Positioning with SDR-based Open-source Platforms: Where do We Stand?
Proceedings of the 11th IEEE IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2022

Designing Probabilistic Flow Counting over Sliding Windows.
Proceedings of the 11th IEEE IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2022

Uncertainty Quantification of 5G Positioning as a Location Data Analytics Function.
Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit, 2022

Is RISC-V ready for Space? A Security Perspective.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2022

eBPF Programming Made Easy with eCLAT.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
Dataset used in "Balloons in the Sky: Unveiling the Characteristics and Trade-offs of the Google Loon Service".
Dataset, November, 2021

Design and Experimental Assessment of Detection Schemes for Air Interface Attacks in Adverse Scenarios.
IEEE Wirel. Commun. Lett., 2021

Capture Aware Sequential Waterfilling for LoRaWAN Adaptive Data Rate.
IEEE Trans. Wirel. Commun., 2021

Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021

Dare-to-Share: Collaborative privacy-preserving recommendations with (almost) no crypto.
Secur. Priv., 2021

Do Dense 5G Networks Increase Exposure to Electromagnetic Fields? [Point of View].
Proc. IEEE, 2021

More Accurate Streaming Cardinality Estimation With Vectorized Counters.
IEEE Netw. Lett., 2021

Anomaly Detection Algorithms for Location Security in 5G Scenarios.
CoRR, 2021

LOcAl DEcisions on Replicated States (LOADER) in programmable dataplanes: Programming abstraction and experimental evaluation.
Comput. Networks, 2021

A stakeholder-oriented security analysis in virtualized 5G cellular networks.
Comput. Networks, 2021

IMSI Catchers in the wild: A real world 4G/5G assessment.
Comput. Networks, 2021

FlowFight: High performance-low memory top-k spreader detection.
Comput. Networks, 2021

5G and Beyond for Contact Tracing.
IEEE Commun. Mag., 2021

A survey on the application of deep learning for code injection detection.
Array, 2021

RIOT-AKA: cellular-like authentication over IoT devices.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

DEMO: top-k cardinality estimation with HyperLogLog sketches.
Proceedings of the 24th Conference on Innovation in Clouds, 2021

A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021

TooLate: Cryptographic Data Access Control for Offline Devices through Efficient Key Rotation.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

ABEBox: A data driven access control for securing public cloud storage with efficient key revocation.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Location Security under Reference Signals' Spoofing Attacks: Threat Model and Bounds.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication.
IEEE Trans. Inf. Forensics Secur., 2020

A look at interdisciplinarity using bipartite scholar/journal networks.
Scientometrics, 2020

Quantum Internet: Networking Challenges in Distributed Quantum Computing.
IEEE Netw., 2020

Fast Updates for Line-Rate HyperLogLog-Based Cardinality Estimation.
IEEE Commun. Lett., 2020

"5G Densification Increases Human Exposure to Radio-Frequency Pollution": True or False?
CoRR, 2020

LOcAl DEcisions on Replicated States (LOADER) in programmable data planes: programming abstraction and experimental evaluation.
CoRR, 2020

Is It Safe Living in the Vicinity of Cellular Towers? Analysis of Long-Term Human EMF Exposure at Population Scale.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Will the Proliferation of 5G Base Stations Increase the Radio-Frequency "Pollution"?
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

The diverse and variegated reactions of different cellular devices to IMSI catching attacks.
Proceedings of the WiNTECH@MobiCom 2020: Proceedings of the 14th International Workshop on Wireless Network Testbeds, 2020

Back to the Future: Towards Hardware "Netputing" Architectures (position paper).
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020

Disconnection Attacks Against LoRaWAN 1.0.X ABP Devices.
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020

CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Offloading Online MapReduce tasks with Stateful Programmable Data Planes.
Proceedings of the 23rd Conference on Innovation in Clouds, 2020

Paxos in the NIC: Hardware Acceleration of Distributed Consensus Protocols.
Proceedings of the 16th International Conference on the Design of Reliable Communication Networks, 2020

DISCOvering the heavy hitters with disaggregated sketches.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features.
J. Comput. Virol. Hacking Tech., 2019

Two-Phase Random Access Procedure for LTE-A Networks.
IEEE Trans. Wirel. Commun., 2019

XTRA: Towards Portable Transport Layer Functions.
IEEE Trans. Netw. Serv. Manag., 2019

Survey of Performance Acceleration Techniques for Network Function Virtualization.
Proc. IEEE, 2019

Scientific community detection via bipartite scholar/journal graph co-clustering.
J. Informetrics, 2019

StableSENS: Sampling Time Decision Algorithm for IoT Energy Harvesting Devices.
IEEE Internet Things J., 2019

Repetitions Versus Retransmissions: Tradeoff in Configuring NB-IoT Random Access Channels.
IEEE Internet Things J., 2019

A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management.
Inf., 2019

Smashing OpenFlow's "atomic" actions: Programmable data plane packet manipulation in hardware.
Int. J. Netw. Manag., 2019

Intelligent conditional collaborative private data sharing.
Future Gener. Comput. Syst., 2019

Sequential Waterfilling for Adaptive Data Rate allocation in LoraWAN.
CoRR, 2019

A Tutorial on IEEE 802.11ax High Efficiency WLANs.
IEEE Commun. Surv. Tutorials, 2019

CODDLE: Code-Injection Detection With Deep Learning.
IEEE Access, 2019

Foreshadow-VMM: Feasibility and Network Perspective.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

On the Latent Shape of ICT research.
Proceedings of the 17th International Conference on Scientometrics and Informetrics, 2019

Debunking the Italian Scientific Sectors' classification system: preliminary insights.
Proceedings of the 17th International Conference on Scientometrics and Informetrics, 2019

Facilitating GDPR Compliance: The H2020 BPR4GDPR Approach.
Proceedings of the Digital Transformation for a Sustainable Society in the 21st Century, 2019

Pushing Services to the Edge Using a Stateful Programmable Dataplane.
Proceedings of the European Conference on Networks and Communications, 2019

2018
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2018

An online approach for joint task assignment and worker evaluation in crowd-sourcing.
Pervasive Mob. Comput., 2018

On the Design of a Decentralized and Multiauthority Access Control Scheme in Federated and Cloud-Assisted Cyber-Physical Systems.
IEEE Internet Things J., 2018

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication.
CoRR, 2018

Living and Fluid Networks: The way ahead?
Comput. Commun., 2018

Exploring Training Options for RF Sensing Using CSI.
IEEE Commun. Mag., 2018

Revealing Hidden Hierarchical Heavy Hitters in network traffic.
Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 2018

A Fully Portable TCP Implementation Using XFSMs.
Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 2018

Scholarium: Supporting Identity Claims Through a Permissioned Blockchain.
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018

LODGE: LOcal Decisions on Global statEs in progrananaable data planes.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Quantum internet: from communication to distributed computing!
Proceedings of the 5th ACM International Conference on Nanoscale Computing and Communication, 2018

Towards traffic-oriented spreading factor allocations in LoRaWAN systems.
Proceedings of the 17th Annual Mediterranean Ad Hoc Networking Workshop, 2018

Multiple Hash Matching Units (MHMU): An Algorithmic Ternary Content Addressable Memory Design for Field Programmable Gate Arrays.
Proceedings of the IEEE 19th International Conference on High Performance Switching and Routing, 2018

A Programmable Hardware Calendar for High Resolution Pacing.
Proceedings of the IEEE 19th International Conference on High Performance Switching and Routing, 2018

Multi-Domain Access Rights Composition in Federated IoT Platforms.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

V- PMP: A VLIW Packet Manipulator Processor.
Proceedings of the 2018 European Conference on Networks and Communications, 2018

2017
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning.
ACM Trans. Priv. Secur., 2017

Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks.
ACM Trans. Embed. Comput. Syst., 2017

StreaMon: A Data-Plane Programming Abstraction for Software-Defined Stream Monitoring.
IEEE Trans. Dependable Secur. Comput., 2017

Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption.
IEEE Embed. Syst. Lett., 2017

A Survey on the Security of Stateful SDN Data Planes.
IEEE Commun. Surv. Tutorials, 2017

On the feasibility of attribute-based encryption for WLAN access control.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Implementing a Per-Flow Token Bucket Using Open Packet Processor.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

D-STREAMON - NFV-Capable Distributed Framework for Network Monitoring.
Proceedings of the First International Workshop on Sofwarized Infrastructures for 5G and Fog Computing, 2017

Implementing iptables using a programmable stateful data plane abstraction: Demo.
Proceedings of the Symposium on SDN Research, 2017

On offloading programmable SDN controller tasks to the embedded microcontroller of stateful SDN dataplanes.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

Smashing SDN "built-in" actions: Programmable data plane packet manipulation in hardware.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

D-StreaMon: From middlebox to distributed NFV framework for network monitoring.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

Demo: Implementing advanced network functions with stateful programmable data planes.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

Implementing advanced network functions for datacenters with stateful programmable data planes.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

Welcome message from general co-chairs.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

OAuth-IoT: An access control framework for the Internet of Things based on open standards.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Unveiling Access Point Signal Instability in WiFi-Based Passive Sensing.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

LTE-based passive device-free crowd density estimation.
Proceedings of the IEEE International Conference on Communications, 2017

Towards an IoT framework for semantic and organizational interoperability.
Proceedings of the Global Internet of Things Summit, 2017

2016
The Sleepy Bird Catches More Worms: Revisiting Energy Efficient Neighbor Discovery.
IEEE Trans. Mob. Comput., 2016

Geographical Load Balancing across Green Datacenters: A Mean Field Analysis.
SIGMETRICS Perform. Evaluation Rev., 2016

Superfluidity: a flexible functional architecture for 5G networks.
Trans. Emerg. Telecommun. Technol., 2016

Towards a Stateful Forwarding Abstraction to Implement Scalable Network Functions in Software and Hardware.
CoRR, 2016

Geographical Load Balancing across Green Datacenters.
CoRR, 2016

Open Packet Processor: a programmable architecture for wire speed platform-independent stateful in-network processing.
CoRR, 2016

The one-out-of-k retrieval problem and linear network coding.
Adv. Math. Commun., 2016

Opportunistic communication in smart city: Experimental insight with small-scale taxi fleets as data carriers.
Ad Hoc Networks, 2016

MAC design on real 802.11 devices: From exponential to Moderated Backoff.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

A Trained-once Crowd Counting Method Using Differential WiFi Channel State Information.
Proceedings of the 3rd International on Workshop on Physical Analytics, 2016

WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures.
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016

MAC learning: enabling automatic combination of elementary protocol components: demo.
Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, 2016

Attribute-Based Access Control Scheme in Federated IoT Platforms.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016

Facing lateral movements using widespread behavioral probes.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Towards the cross-domain interoperability of IoT platforms.
Proceedings of the European Conference on Networks and Communications, 2016

On the feasibility of "breadcrumb" trails within OpenFlow switches.
Proceedings of the European Conference on Networks and Communications, 2016

FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Modeling and Analysis of Random Access Channels With Bursty Arrivals in OFDMA Wireless Networks.
IEEE Trans. Wirel. Commun., 2015

Per-Frame Energy Consumption in 802.11 Devices and Its Implication on Modeling and Design.
IEEE/ACM Trans. Netw., 2015

Networking and communications for smart cities special issue editorial.
Comput. Commun., 2015

Key Management Protocol with Implicit Certificates for IoT systems.
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015

WIBECAM: Device Free Human Activity Recognition Through WiFi Beacon-Enabled Camera.
Proceedings of the 2nd workshop on Workshop on Physical Analytics, 2015

Stateful OpenFlow: Hardware proof of concept.
Proceedings of the 16th IEEE International Conference on High Performance Switching and Routing, 2015

2014
A General, Tractable and Accurate Model for a Cascade of LRU Caches.
IEEE Commun. Lett., 2014

Towards Wire-speed Platform-agnostic Control of OpenFlow Switches.
CoRR, 2014

OpenState: programming platform-independent stateful openflow applications inside the switch.
Comput. Commun. Rev., 2014

Simulating the Statistics of the First Meetings Using Dynamic "Open Environments".
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

StreaMon: A software-defined monitoring platform.
Proceedings of the 2014 26th International Teletraffic Congress (ITC), 2014

Weighting peer reviewers.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Performance Assessment of an Epidemic Protocol in VANET Using Real Traces.
Proceedings of the International Conference on Selected Topics in Mobile and Wireless Networking, 2014

2013
Wireless MAC Processor Networking: A Control Architecture for Expressing and Implementing High-Level Adaptation Policies in WLANs.
IEEE Veh. Technol. Mag., 2013

Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System.
IEEE Trans. Computers, 2013

A General, Tractable and Accurate Model for a Cascade of Caches.
CoRR, 2013

A Survey of Medium Access Mechanisms for Providing QoS in Ad-Hoc Networks.
IEEE Commun. Surv. Tutorials, 2013

Check before storing: what is the performance price of content integrity verification in LRU caching?
Comput. Commun. Rev., 2013

AGREE: exploiting energy harvesting to support data-centric access control in WSNs.
Ad Hoc Networks, 2013

Intermodule data sharing for flexible wireless MAC.
Proceedings of the 21st International Conference on Software, 2013

Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Enabling cognitive-radio paradigm on commercial off-the-shelf 802.11 hardware.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

One size hardly fits all: towards context-specific wireless MAC protocol deployment.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

On the interplay among naming, content validity and caching in Information Centric Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Conditional disclosure of encrypted whitelists for DDoS attack mitigation.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Modeling conservative updates in multi-hash approximate count sketches.
Proceedings of the 24th International Teletraffic Congress, 2012

"Better Than Nothing" Privacy with Bloom Filters: To What Extent?
Proceedings of the Privacy in Statistical Databases, 2012

Wireless MAC processors: Programming MAC protocols on commodity Hardware.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Breaking layer 2: A new architecture for programmable wireless interfaces.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012

Let me grab your App: Preliminary proof-of-concept design of opportunistic content augmentation.
Proceedings of IEEE International Conference on Communications, 2012

Wireless card virtualization: From virtual NICs to virtual MAC machines.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

Energy consumption anatomy of 802.11 devices and its implication on modeling and design.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

MAClets: active MAC protocols over hard-coded devices.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

2011
Revisiting an RFID Identification-Free Batch Authentication Approach.
IEEE Commun. Lett., 2011

Building a decentralized, cooperative, and privacy-preserving monitoring system for trustworthiness: the approach of the EU FP7 DEMONS project [Very Large Projects].
IEEE Commun. Mag., 2011

On-demand time-decaying bloom filters for telemarketer detection.
Comput. Commun. Rev., 2011

Hardware-Based "on-the-fly" Per-flow Scan Detector Pre-filter (Poster).
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

Traffic-Centric Modeling of Future Wireless Internet access technologies.
Proceedings of the 23rd International Teletraffic Congress, 2011

Design, implementation and performance evaluation of a publish-subscribe architecture for intermittently connected 802.15.4 networks.
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011

Delay performance of a Publish Subscribe system deployed over a memory-constrained, Delay Tolerant Network.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

A Framework for Packet-Droppers Mitigation in OLSR Wireless Community Networks.
Proceedings of IEEE International Conference on Communications, 2011

An architectural solution for data exchange in cooperative network security research.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches.
IEEE Trans. Veh. Technol., 2010

Streamline: An Optimal Distribution Algorithm for Peer-to-Peer Real-Time Streaming.
IEEE Trans. Parallel Distributed Syst., 2010

Rethinking the IEEE 802.11e EDCA performance modeling methodology.
IEEE/ACM Trans. Netw., 2010

Cross-layer H.264 scalable video downstream delivery over WLANs.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Flexible key exchange negotiation for wireless sensor networks.
Proceedings of the Fifth ACM International Workshop on Wireless Network Testbeds, 2010

Measurement Data Reduction through Variation Rate Metering.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fairness-oriented Overlay VPN topology construction.
Proceedings of the 17th International Conference on Telecommunications, 2010

Exploiting Dynamic Reconfiguration for FPGA Based Network Intrusion Detection Systems.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

Key escrow schemes with sliding window for privacy-aware anomaly detection system.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

2009
On the side-effects of proprietary solutions for fading and interference mitigation in IEEE 802.11b/g outdoor links.
Comput. Networks, 2009

Fundamental delay bounds in peer-to-peer chunk-based real-time streaming systems.
Proceedings of the 21st International Teletraffic Congress, 2009

SSVF: an open-source experimental evaluation framework for H.264 scalable video streaming.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
The SPARTA pseudonym and authorization system.
Sci. Comput. Program., 2008

User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS).
Secur. Commun. Networks, 2008

Preface.
Pervasive Mob. Comput., 2008

An Explanation for Unexpected 802.11 Outdoor Link-level Measurement Results.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

"Vendor-Affected" WLAN experimental results: A Pandora's Box?
Proceedings of the 2008 International Conference on Telecommunications, 2008

A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Privacy-Aware Secure Monitoring.
Proceedings of the Poster and Demonstration Paper Track of the 1st Future Internet Symposium (FIS'08) FIS'08 ; Vienna, 2008

New directions in privacy-preserving anomaly detection for network traffic.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
Out-of-Band Signaling Scheme for High Speed Wireless LANs.
IEEE Trans. Wirel. Commun., 2007

Broadcast Link Quality Measurements in 802.11 Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Towards Privacy-Preserving Network Monitoring: Issues and Challenges.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Impact of Chosen Error Criteria in RSS-based Localization: Power vs Distance vs Relative Distance Error Minimization.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Traffic Flow Confidentiality in IPsec: Protocol and Implementation.
Proceedings of the Future of Identity in the Information Society, 2007

2006
An analytical model of a new packet marking algorithm for TCP flows.
Comput. Networks, 2006

Selected papers from the 3rd international workshop on QoS in multiservice IP networks (QoS-IP 2005).
Comput. Networks, 2006

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Measurement Study of the Mobile Agent JADE Platform.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

802.11b/g Link Level Measurements for an Outdoor Wireless Campus Network.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Analysis of the IEEE 802.11e EDCA Under Statistical Traffic.
Proceedings of IEEE International Conference on Communications, 2006

Efficient Simulation of Bandwidth Allocation Dynamics in P2P Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Multiple-path layer-2 based routing and load balancing approach for wireless infrastructure mesh networks.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

Are 802.11 link quality broadcast measurements always reliable?
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

2005
Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations.
IEEE Netw., 2005

Guest Editorial.
Mob. Networks Appl., 2005

Remarks on IEEE 802.11 DCF performance analysis.
IEEE Commun. Lett., 2005

On the fidelity of IEEE 802.11 commercial cards.
Proceedings of the 1st International ICST Conference on Wireless Internet, 2005

Switched Ethernet Networking over LEO Satellite.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

A space-division time-division multiple access scheme for high throughput provisioning in WLANs.
Proceedings of IEEE International Conference on Communications, 2005

2004
Channel-dependent load balancing in wireless packet networks.
Wirel. Commun. Mob. Comput., 2004

QoS support and service differentiation in wireless networks.
Int. J. Commun. Syst., 2004

Streaming for vehicular users via elastic proxy buffer management.
IEEE Commun. Mag., 2004

Is TCP Packet Reordering Always Harmful?
Proceedings of the 12th International Workshop on Modeling, 2004

Improved support for streaming services in vehicular networks.
Proceedings of IEEE International Conference on Communications, 2004

The effect of heterogeneous link capacities in BitTorrent-like file sharing systems.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

Performance evaluation of differentiated access mechanisms effectiveness in 802.11 networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Performance analysis of the out-of-band signaling scheme for high speed wireless LANs.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Guest Editorial: Wireless Mobile Internet.
Wirel. Networks, 2003

QUASIMODO: quality of service-aware multicasting over DiffServ and overlay networks.
IEEE Netw., 2003

Design and Validation of QoS Aware Mobile Internet Access Procedures for Heterogeneous Networks.
Mob. Networks Appl., 2003

Design and performance evaluation of an hybrid reservation-polling MAC protocol for power-line communications.
Int. J. Commun. Syst., 2003

Quality of Service Multicasting over Differentiated Services Networks.
Proceedings of the Quality of Service in Multiservice IP Networks, 2003

Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802.11 network.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Performance evaluation of a new adaptive packet marking scheme for TCP over DiffServ networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Per-flow QoS support over a stateless Differentiated Services IP domain.
Comput. Networks, 2002

Endpoint admission control with delay variation measurements for QoS in IP networks.
Comput. Commun. Rev., 2002

Is Admission-Controlled Traffic Self-Similar?
Proceedings of the NETWORKING 2002, 2002

Adaptive low priority packet marking for better TCP performance.
Proceedings of the Network Control and Engineering for QoS, 2002

An API for advanced traffic control in diffserv routers.
Proceedings of the Network Control and Engineering for QoS, 2002

Per-flow signalling extension across diffserv domains.
Proceedings of the Network Control and Engineering for QoS, 2002

Improving load balancing mechanisms in wireless packet networks.
Proceedings of the IEEE International Conference on Communications, 2002

On the self-similarity of measurement-based admission controlled traffic.
Proceedings of the Global Telecommunications Conference, 2002

2001
Design, Implementation and Evaluation of Programmable Handoff in Mobile Networks.
Mob. Networks Appl., 2001

PCP: An End-to-End Measurement-Based Call Admission Control for Real-Time Services over IP Networks.
Proceedings of the Quality of Service in Multiservice IP Networks, International Workshop, 2001

A Migration Path for the Internet: From Best-Effort to a QoS Capable Infrastructure by Means of Localized Admission Control.
Proceedings of the Quality of Service in Multiservice IP Networks, International Workshop, 2001

A simulation study of load balancing algorithms in cellular packet networks.
Proceedings of the 4th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2001

Endpoint Admission Control over Assured Forwarding PHBs and Its Performance over RED Implementations.
Proceedings of the Evolutionary Trends of the Internet, 2001

Performance Evaluation of a Measurement- Based Algorithm for Distributed Admission Control in a DiffServ Framework.
Proceedings of the Evolutionary Trends of the Internet, 2001

PCP-DV: An End-to-End Admission Control Mechanism for IP Telephony.
Proceedings of the Evolutionary Trends of the Internet, 2001

Admission control over assured forwarding PHBs: a way to provide service accuracy in a DiffServ framework.
Proceedings of the Global Telecommunications Conference, 2001

2000
A programmable MAC framework for utility-based adaptive quality of service support.
IEEE J. Sel. Areas Commun., 2000

Performance analysis of the IEEE 802.11 distributed coordination function.
IEEE J. Sel. Areas Commun., 2000

Packet management techniques for measurement based end-to-end admission control in IP networks.
J. Commun. Networks, 2000

Using packet-level information in handover and admission control schemes for wireless packet network.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Throughput Analysis of End-to-End Measurement-Based Admission Control in IP.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
Effects of Multiple Node Crossing on ATM Traffic Performance.
Eur. Trans. Telecommun., 1999

1998
IEEE 802.11-saturation throughput analysis.
IEEE Commun. Lett., 1998

1997
The role of local storage in supporting video retrieval services on ATM networks.
IEEE/ACM Trans. Netw., 1997

Non Stationary Request Distribution in Video on Demand Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Capture-division packet access for wireless personal communications.
IEEE J. Sel. Areas Commun., 1996

Performance and dimensioning of a hierarchical video storage network for interactive video services.
Eur. Trans. Telecommun., 1996

Architecture and Performance of Non-Blocking ATM Switches with Shared Internal Queueing.
Comput. Networks ISDN Syst., 1996

Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs.
Proceedings of the 7th IEEE International Symposium on Personal, 1996

1994
Packet data service over GSM networks: proposal and performance evaluation attempt.
Proceedings of the 5th IEEE International Symposium on Personal, 1994

1993
Improved queueing analysis of shared buffer switching networks.
IEEE/ACM Trans. Netw., 1993


  Loading...