An overview of IP flow-based intrusion detection A Sperotto, G Schaffrath, R Sadre, C Morariu, A Pras, B Stiller IEEE communications surveys & tutorials 12 (3), 343-356, 2010 | 658 | 2010 |
Flow monitoring explained: From packet capture to data analysis with netflow and ipfix R Hofstede, P Čeleda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014 | 616 | 2014 |
Inside dropbox: understanding personal cloud storage services I Drago, M Mellia, M M. Munafo, A Sperotto, R Sadre, A Pras Proceedings of the 2012 internet measurement conference, 481-494, 2012 | 586 | 2012 |
A labeled data set for flow-based intrusion detection A Sperotto, R Sadre, F Van Vliet, A Pras IP Operations and Management: 9th IEEE International Workshop, IPOM 2009 …, 2009 | 226 | 2009 |
Fitting world-wide web request traces with the EM-algorithm REA Khayari, R Sadre, BR Haverkort Performance Evaluation 52 (2-3), 175-191, 2003 | 155 | 2003 |
Flow whitelisting in SCADA networks R Barbosa, R Sadre, A Pras International Journal of Critical Infrastructure Protection 6 (3-4), 150-158, 2013 | 127 | 2013 |
SSHCure: a flow-based SSH intrusion detection system L Hellemons, L Hendriks, R Hofstede, A Sperotto, R Sadre, A Pras Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012 | 118 | 2012 |
A first look into SCADA network traffic RRR Barbosa, R Sadre, A Pras 2012 IEEE Network Operations and Management Symposium, 518-521, 2012 | 94 | 2012 |
Pakcs: The portland aachen kiel curry system M Hanus, S Antoy, B Braßel, M Engelke, K Höppner, J Koj, P Niederau, ... | 93 | 2003 |
Towards periodicity based anomaly detection in SCADA networks RRR Barbosa, R Sadre, A Pras Proceedings of 2012 IEEE 17th International Conference on Emerging …, 2012 | 91 | 2012 |
Difficulties in modeling SCADA traffic: a comparative analysis RRR Barbosa, R Sadre, A Pras Passive and Active Measurement: 13th International Conference, PAM 2012 …, 2012 | 88 | 2012 |
Hidden Markov Model modeling of SSH brute-force attacks A Sperotto, R Sadre, PT de Boer, A Pras Integrated Management of Systems, Services, Processes and People in IT: 20th …, 2009 | 88 | 2009 |
Measuring the adoption of DDoS protection services M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras Proceedings of the 2016 Internet Measurement Conference, 279-285, 2016 | 87 | 2016 |
A Survey on Information Visualization for Network and Service Management VT Guimaraes, CM Dal Sasso Freitas, R Sadre, LMR Tarouco, ... IEEE Communications Surveys & Tutorials, 2015 | 85 | 2015 |
A Survey on Information Visualization for Network and Service Management V Guimaraes, C Dal Sasso Freitas, R Sadre, LM Tarouco, L Granville IEEE, 2015 | 85 | 2015 |
An abstract machine for Curry and its concurrent implementation in Java M Hanus, R Sadre Journal of Functional and Logic Programming 6 (1999), 78, 1999 | 52 | 1999 |
Attacks by “Anonymous‿ WikiLeaks Proponents not Anonymous A Pras, A Sperotto, GM Moura, I Drago, RRR Barbosa, R Sadre, ... Centre for Telematics and Information Technology (CTIT), 2010 | 51 | 2010 |
Exploiting traffic periodicity in industrial control networks RRR Barbosa, R Sadre, A Pras International journal of critical infrastructure protection 13, 52-62, 2016 | 48 | 2016 |
Simpleweb/university of twente traffic traces data repository RRR Barbosa, R Sadre, A Pras, R van de Meent Centre for Telematics and Information Technology (CTIT), 2010 | 42 | 2010 |
The effects of DDoS attacks on flow monitoring applications R Sadre, A Sperotto, A Pras 2012 IEEE Network Operations and Management Symposium, 269-277, 2012 | 40 | 2012 |