Ricardo Morla

Orcid: 0000-0002-5162-3019

Affiliations:
  • University of Porto, Portugal
  • University of California, Irvine, USA (former)
  • Lancaster University, UK (PhD 2006)


According to our database1, Ricardo Morla authored at least 62 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy?
ACM Trans. Internet Techn., 2023

2022
Tweaking Metasploit to Evade Encrypted C2 Traffic Detection.
CoRR, 2022

JavaScript&Me, A Tool to Support Research into Code Transformation and Browser Security.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Hidden Markov models on a self-organizing map for anomaly detection in 802.11 wireless networks.
Neural Comput. Appl., 2021

An Outlook on using Packet Sampling in Flow-based C2 TLS Malware Traffic Detection.
Proceedings of the 12th International Conference on Network of the Future, 2021

Towards a Distributed Learning Architecture for Securing ISP Home Customers.
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops, 2021

An Initial Analysis of the Shortcomings of Conventional AI and the Benefits of Distributed AI Approaches in Industrial Use Cases.
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops, 2021

Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

2020
802.11 wireless simulation and anomaly detection using HMM and UBM.
Simul., 2020

Does domain name encryption increase users' privacy?
Comput. Commun. Rev., 2020

Flow-based Detection and Proxy-based Evasion of Encrypted Malware C2 Traffic.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
Predicting throughput in IEEE 802.11 based wireless networks using directional antenna.
Wirel. Networks, 2019

Anomaly Detection and Modeling in 802.11 Wireless Networks.
J. Netw. Syst. Manag., 2019

Rapid detection of spammers through collaborative information sharing across multiple service providers.
Future Gener. Comput. Syst., 2019

Ten AI Stepping Stones for Cybersecurity.
CoRR, 2019

Insulator visual non-conformity detection in overhead power distribution lines using deep learning.
Comput. Electr. Eng., 2019

Lessons learned and challenges on benchmarking publish-subscribe IoT platforms.
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, 2019

2018
Benchmarking Pub/Sub IoT middleware platforms for smart services.
J. Reliab. Intell. Environ., 2018

Systems and methods for SPIT detection in VoIP: Survey and future directions.
Comput. Secur., 2018

A Modular Tool for Benchmarking loT Publish-Subscribe Middleware.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

2017
Early identification of spammers through identity linking, social network and call features.
J. Comput. Sci., 2017

Run Time Prediction for Big Data Iterative ML Algorithms: a KMeans case study.
CoRR, 2017

A Framework for BGP Abnormal Events Detection.
CoRR, 2017

Effect of Pipelining and Multiplexing in Estimating HTTP/2.0 Web Object Sizes.
CoRR, 2017

802.11 Wireless Access Point Usage Simulation and Anomaly Detection.
CoRR, 2017

Benchmarking IoT middleware platforms.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

Identifying Persistent and Recurrent QoE Anomalies for DASH Streaming in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

2016
High-performance network traffic analysis for continuous batch intrusion detection.
J. Supercomput., 2016

Clustering VoIP caller for SPIT identification.
Secur. Commun. Networks, 2016

Dynamic adaptation of personal ubicomp environments.
Pers. Ubiquitous Comput., 2016

A behavioral reflective architecture for managing the integration of personal ubicomp systems: automatic SNMP-based discovery and management of behavior context in smart-spaces.
Pers. Ubiquitous Comput., 2016

Long-range trajectories from global and local motion representations.
J. Vis. Commun. Image Represent., 2016

An initial study of the effect of pipelining in hiding HTTP/2.0 response sizes.
CoRR, 2016

Power interference modeling for CSMA/CA based networks using directional antenna.
Comput. Commun., 2016

QWatch: Detecting and Locating QoE Anomaly for VoD in the Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Fault diagnosis in DSL networks using support vector machines.
Comput. Commun., 2015

Users Know Better: A QoE Based Adaptive Control System for VoD in the Cloud.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

QoE Driven Server Selection for VoD in the Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
A graph-based approach for interference free integration of commercial off-the-shelf elements in pervasive computing systems.
Future Gener. Comput. Syst., 2014

Event and Anomaly Detection Using Tucker3 Decomposition.
CoRR, 2014

Outlier detection in 802.11 wireless access points using Hidden Markov Models.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

2013
Modeling 802.11 AP usage through daily keep-alive event counts.
Wirel. Networks, 2013

Caller-REP: Detecting unwanted calls with caller social strength.
Comput. Secur., 2013

Predicting short 802.11 sessions from RADIUS usage data.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Abrupt ending of 802.11 AP connections.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

On the comprehension of DSL SyncTrap events in IPTV networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Motion Flow Tracking in Unconstrained Videos for Retail Scenario.
Proceedings of the Pattern Recognition and Image Analysis - 6th Iberian Conference, 2013

2012
Interference Free Integration of Pervasive Applications.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Mitigating SPIT with Social Strength.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards the improvement of diagnostic metrics Fault diagnosis for DSL-Based IPTV networks using the Rényi entropy.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A Single Pass Trellis-Based Algorithm for Clustering Evolving Data Streams.
Proceedings of the Data Warehousing and Knowledge Discovery, 2012

2011
Multistage SPIT detection in transit VoIP.
Proceedings of the 19th International Conference on Software, 2011

2010
Second life in-world action traffic modeling.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010

Improving P2P video streaming in wireless mesh networks.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

Using Directional Antennas on Stub Wireless Mesh Networks: Impact on Throughput, Delay, and Fairness.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

2008
PRT simulation in an immersive virtual world.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

2007
CodeGenie: using test-cases to search and reuse source code.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Informing the Design of User Studies on Conceptual Interference Frameworks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Towards interference-free deployment of ubicomp systems.
PhD thesis, 2006

A Framework for Describing Interference in Ubiquitous Computing Environments.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2004
Evaluating a Location-Based Application: A Hybrid Test and Simulation Environment.
IEEE Pervasive Comput., 2004


  Loading...