Networkprofiler: Towards automatic fingerprinting of android apps S Dai, A Tongaonkar, X Wang, A Nucci, D Song 2013 proceedings ieee infocom, 809-817, 2013 | 254 | 2013 |
Inferring Higher Level Policies from Firewall Rules. A Tongaonkar, N Inamdar, R Sekar LISA 7, 1-10, 2007 | 146 | 2007 |
Understanding mobile app usage patterns using in-app advertisements A Tongaonkar, S Dai, A Nucci, D Song International Conference on Passive and Active Network Measurement, 63-72, 2013 | 117 | 2013 |
Towards self adaptive network traffic classification A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci Computer Communications 56, 35-46, 2015 | 106 | 2015 |
Samples: Self adaptive mining of persistent lexical snippets for classifying mobile application traffic H Yao, G Ranjan, A Tongaonkar, Y Liao, ZM Mao Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015 | 100 | 2015 |
Fast pattern-matching techniques for packet filtering AS Tongaonkar State University of New York at Stony Brook, 2004 | 83 | 2004 |
Identifying personal information in internet traffic Y Liu, HH Song, I Bermudez, A Mislove, M Baldi, A Tongaonkar Proceedings of the 2015 ACM on Conference on Online Social Networks, 59-70, 2015 | 50 | 2015 |
System and method for using network application signatures based on modified term transition state machine R Keralapura, A Tongaonkar, A Nucci US Patent 8,494,985, 2013 | 45 | 2013 |
Challenges in Network Application Identification. A Tongaonkar, R Keralapura, A Nucci LEET, 2012 | 39 | 2012 |
System and method for using network application signatures based on term transition state machine R Keralapura, A Nucci, A Tongaonkar US Patent 8,577,817, 2013 | 37 | 2013 |
Transaction based network application signatures for text based protocols A Tongaonkar, R Keralapura, A Nucci US Patent 10,404,554, 2019 | 36 | 2019 |
Towards automatic protocol field inference I Bermudez, A Tongaonkar, M Iliofotou, M Mellia, MM Munafò Computer Communications 84, 40-51, 2016 | 32 | 2016 |
Botnet protocol inference in the presence of encrypted traffic L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 31 | 2017 |
Automatic protocol field inference for deeper protocol understanding I Bermudez, A Tongaonkar, M Iliofotou, M Mellia, MM Munafo 2015 IFIP Networking Conference (IFIP Networking), 1-9, 2015 | 30 | 2015 |
YouLighter: A cognitive approach to unveil YouTube CDN and changes D Giordano, S Traverso, L Grimaudo, M Mellia, E Baralis, A Tongaonkar, ... IEEE Transactions on Cognitive Communications and Networking 1 (2), 161-174, 2015 | 27 | 2015 |
Network application signatures for binary protocols R Keralapura, R Torres, M Iliofotou, A Tongaonkar, A Nucci US Patent 8,578,024, 2013 | 27 | 2013 |
Fast Packet Classification for Snort by Native Compilation of Rules. A Tongaonkar, S Vasudevan, R Sekar LISA 8, 159-165, 2008 | 26 | 2008 |
Transaction based network application signatures for text based protocols A Tongaonkar, R Keralapura, A Nucci US Patent 9,479,405, 2016 | 24 | 2016 |
Detecting malicious activities with user‐agent‐based profiles Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia International Journal of Network Management 25 (5), 306-319, 2015 | 24 | 2015 |
Systems and methods for reverse-engineering malware protocols RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha US Patent 10,050,982, 2018 | 22 | 2018 |