Marinho P. Barcellos

Orcid: 0000-0002-1505-6408

According to our database1, Marinho P. Barcellos authored at least 95 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analyzing Remote Peering Deployment and Its Implications for Internet Routing.
IEEE/ACM Trans. Netw., August, 2024

PoT-PolKA: Let the Edge Control the Proof-of-Transit in Path-Aware Networks.
IEEE Trans. Netw. Serv. Manag., August, 2024

The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

2023
DDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at Scale.
PACMNET, 2023

Provable Non-Frameability for 5G Lawful Interception.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

2022
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

On the Latency Impact of Remote Peering.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

Shoehorn: Towards Portable P4 for Low Cost Hardware.
Proceedings of the IFIP Networking Conference, 2022

Light, camera, actions: characterizing the usage of IXPs' action BGP communities.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

2021
Dynamic Property Enforcement in Programmable Data Planes.
IEEE/ACM Trans. Netw., 2021

Helix: Traffic Engineering for Multi-Controller SDN.
Proceedings of the SOSR '21: The ACM SIGCOMM Symposium on SDN Research, Virtual Event, USA, October 11, 2021

2020
Spoofed traffic inference at IXPs: Challenges, methods and analysis.
Comput. Networks, 2020

A survey on the current internet interconnection practices.
Comput. Commun. Rev., 2020

AS-Path Prepending: there is no rose without a thorn.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Decentralized proof of location in vehicular Ad Hoc networks.
Comput. Commun., 2019

Challenges in inferring spoofed traffic at IXPs.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

2018
Research in Security and Privacy in Brazil.
IEEE Secur. Priv., 2018

Mitigating Position Falsification Attacks in Vehicular Platooning.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Uncovering Bugs in P4 Programs with Assertion-based Verification.
Proceedings of the Symposium on SDN Research, 2018

Tá na Hora: analisando a latência de modificação de tabelas de fluxo em arquiteturas de switches SDN.
Proceedings of the XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, 2018

Vouch: A Secure Proof-of-Location Scheme for VANETs.
Proceedings of the 21st ACM International Conference on Modeling, 2018

Verification of P4 programs in feasible time using assertions.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Dynam-IX: a dynamic interconnection eXchange.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Picking a Partner: A Fair Blockchain Based Scoring Protocol for Autonomous Systems.
Proceedings of the Applied Networking Research Workshop, 2018

2017
NDNrel: A mechanism based on relations among objects to improve the performance of NDN.
J. Netw. Comput. Appl., 2017

Achieving minimum bandwidth guarantees and work-conservation in large-scale, SDN-based datacenter networks.
Comput. Networks, 2017

Exploiting parallelism in hierarchical content stores for high-speed ICN routers.
Comput. Networks, 2017

Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Sandboxing Data Plane Programs for Fun and Profit.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Packer: Minimizing multi-resource fragmentation and performance interference in datacenters.
Proceedings of the 2017 IFIP Networking Conference, 2017

On the impact of sybil attacks in cooperative driving scenarios.
Proceedings of the 2017 IFIP Networking Conference, 2017

POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Optimal Service Function Chain Composition in Network Functions Virtualization.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks.
J. Netw. Comput. Appl., 2016

PredCloud: Providing predictable network performance in large-scale OpenFlow-enabled cloud platforms through trust-based allocation of resources.
Comput. Commun., 2016

A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates.
Comput. Commun., 2016

Making puzzles green and useful for adaptive identity management in large-scale distributed systems.
Comput. Networks, 2016

ASTORIA: A framework for attack simulation and evaluation in smart grids.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Providing producer mobility support in NDN through proactive data replication.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Virtual network security: threats, countermeasures, and challenges.
J. Internet Serv. Appl., 2015

Opportunistic resilience embedding (ORE): Toward cost-efficient resilient virtual networks.
Comput. Networks, 2015

Edge-centric Computing: Vision and Challenges.
Comput. Commun. Rev., 2015

Predictor: Providing fine-grained management and predictability in multi-tenant datacenter networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

CCNrel: Leveraging relations among objects to improve the performance of CCN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Off the wire control: Improving the control plane resilience through cellular networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

IoNCloud: Exploring application affinity to improve utilization and predictability in datacenters.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Hierarchical Content Stores in High-Speed ICN Routers: Emulation and Prototype Implementation.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

2014
Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Were You There? Bridging the Gap to Unveil Users' Online Sessions in Networked, Distributed Systems.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Slowing down to speed up: Protecting users against massive attacks in content distribution systems.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A heuristic-based algorithm for privacy-oriented virtual network embedding.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Survivor: An enhanced controller placement strategy for improving SDN survivability.
Proceedings of the IEEE Global Communications Conference, 2014

HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems.
Comput. Commun., 2013

DoS-resilient virtual networks through multipath embedding and opportunistic recovery.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Trust-based grouping for cloud datacenters: Improving security in shared infrastructures.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Workflow specification and scheduling with security constraints in hybrid clouds.
Proceedings of the 2nd IEEE Latin American Conference on Cloud Computing and Communications, 2013

Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Make it green and useful: Reshaping puzzles for identity management in large-scale distributed systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

No more backups: Toward efficient embedding of survivable virtual networks.
Proceedings of IEEE International Conference on Communications, 2013

Characterizing the impact of network substrate topologies on virtual network embedding.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Beyond network simulators: Fostering novel distributed applications and protocols through extendible design.
J. Netw. Comput. Appl., 2012

Denial-of-service attacks and countermeasures on BitTorrent.
Comput. Networks, 2012

Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks.
Comput. Networks, 2012

Disconnecting to connect: Understanding optimistic disconnection in BitTorrent.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Security-aware optimal resource allocation for virtual network embedding.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
Funnel: Choking Polluters in BitTorrent File Sharing Communities.
IEEE Trans. Netw. Serv. Manag., 2011

A conservative strategy to protect P2P file sharing systems from pollution attacks.
Concurr. Comput. Pract. Exp., 2011

AltoStratus: A Collaboration Network Focused on the New Research Challenges and Opportunities in Cloud Computing.
Proceedings of the 25th Brazilian Symposium on Software Engineering, 2011

Challenging the feasibility of authentication mechanisms for P2P live streaming.
Proceedings of the 6th Latin America Networking Conference, 2011

Observing the BitTorrent universe through Telescopes.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Securing P2P systems from Sybil attacks through adaptive identity management.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Flexible and secure service discovery in ubiquitous computing.
J. Netw. Comput. Appl., 2010

Choking polluters in BitTorrent file sharing communities.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

2009
AGRADC: An architecture for autonomous deployment and configuration of grid computing applications.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

TorrentLab: investigating BitTorrent through simulation and live experiments.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2007
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing.
Comput. Networks, 2007

Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

2006
Flexible Security Configuration & Deployment in Peer-to-Peer Applications.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Bridging the Gap between Simulation and Experimental Evaluation in Computer Networks.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

2005
Congestion Control with ECN Support in Poll-Based Multicast Protocols.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Policy-based access control in peer-to-peer grid systems.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

Hybrid reliable multicast with TCP-XM.
Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, 2005

Evaluating high-throughput reliable multicast for grid applications in production networks.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Towards a flexible security framework for peer-to-peer based grid computing.
Proceedings of the 2nd Workshop on Middleware for Grid Computing, 2004

High-Performance Reliable Multicasting for Grid Applications.
Proceedings of the 5th International Workshop on Grid Computing (GRID 2004), 2004

2002
Simulating Group Communication Protocols Through an Object-Oriented Framework.
Proceedings of the Proceedings 35th Annual Simulation Symposium (ANSS-35 2002), 2002

1999
A Multicast Transport Protocol for Reliable Group Applications.
Proceedings of the Networked Group Communication, 1999

1998
PRMP : a scaleable polling-based reliable multicast protocol.
PhD thesis, 1998

An End-to-End Reliable Multicast Protocol Using Polling for Scaleability.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

1994
The HetNOS Network Operating System: A Tool for Writing Distributed Applications.
ACM SIGOPS Oper. Syst. Rev., 1994


  Loading...