Search Results - "Cunha, Italo"

Refine Results
  1. 1

    Construction and maintenance of P2P overlays for live streaming by Miguel, Eliseu C., Silva, Cristiano M., Coelho, Fernando C., Cunha, Ítalo F. S., Campos, Sérgio V. A.

    Published in Multimedia tools and applications (01-05-2021)
    “…P2P live streaming requires low latency and low media discontinuity to provide users good quality of experience. When peers are connected to a large number of…”
    Get full text
    Journal Article
  2. 2

    State Disaggregation for Dynamic Scaling of Network Functions by Carvalho, Fabricio B., Ferreira, Ronaldo A., Cunha, Italo, Vieira, Marcos A. M., Ramanathan, Murali K.

    Published in IEEE/ACM transactions on networking (01-02-2024)
    “…Network Function Virtualization promises better utilization of computational resources by dynamically scaling resources on demand. However, most network…”
    Get full text
    Journal Article
  3. 3

    The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects by Rodday, Nils, Cunha, Italo, Bush, Randy, Katz-Bassett, Ethan, Rodosek, Gabi Dreo, Schmidt, Thomas C., Wahlisch, Matthias

    “…The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better understand and improve RPKI deployment, measuring route origin…”
    Get full text
    Journal Article
  4. 4

    BloomTime: space-efficient stateful tracking of time-dependent network performance metrics by Pacífico, Racyus D. G., Silva, Lucas B., Coelho, Gerferson R., Silva, Pablo G., Vieira, Alex B., Vieira, Marcos A. M., Cunha, Ítalo F. S., Vieira, Luiz F. M., Nacif, José A. M.

    Published in Telecommunication systems (01-06-2020)
    “…Network monitoring is essential to tasks ranging from planning to troubleshooting. Unfortunately, comprehensive real-time monitoring of complex networks with…”
    Get full text
    Journal Article
  5. 5

    DOD-ETL: distributed on-demand ETL for near real-time business intelligence by Machado, Gustavo V., Cunha, Ítalo, Pereira, Adriano C. M., Oliveira, Leonardo B.

    “…The competitive dynamics of the globalized market demand information on the internal and external reality of corporations. Information is a precious asset and…”
    Get full text
    Journal Article
  6. 6

    The Evolution of Bashlite and Mirai IoT Botnets by Marzano, Artur, Alexander, David, Fonseca, Osvaldo, Fazzion, Elverton, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P. C., Cunha, Italo, Guedes, Dorgival, Meira, Wagner

    “…Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar losses every year. In this work, we study Bashlite botnets and…”
    Get full text
    Conference Proceeding
  7. 7

    Beyond Herd Immunity Against Strategic Attackers by Rufino, Vilc Queupe, Pfleger De Aguiar, Leandro, Sadoc Menasche, Daniel, Lima, Cabral, Cunha, Italo, Altman, Eitan, El-Azouzi, Rachid, De Pellegrini, Francesco, Avritzer, Alberto, Grottke, Michael

    Published in IEEE access (2020)
    “…Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a large fraction of the population of devices is immune against a virus…”
    Get full text
    Journal Article
  8. 8

    Identifying and Characterizing Bashlite and Mirai C&C Servers by Bastos, Gabriel, Marzano, Artur, Fonseca, Osvaldo, Fazzion, Elverton, Hoepers, Cristine, Steding-Jessen, Klaus, Marcelo H. P. C., Chaves, Cunha, Italo, Guedes, Dorgival, Meira, Wagner

    “…IoT devices are often a vector for assembling massive botnets, as a consequence of being broadly available, having limited security protections, and…”
    Get full text
    Conference Proceeding
  9. 9

    Modeling large-scale live video streaming client behavior by Guarnieri, Thiago, Drago, Idilio, Cunha, Ítalo, Almeida, Breno, Almeida, Jussara M., Vieira, Alex B.

    Published in Multimedia systems (01-12-2021)
    “…The live streaming of large-scale events over the Internet attracts a highly diverse audience. Despite the progress in streaming technologies, which employ…”
    Get full text
    Journal Article
  10. 10

    Joint admission control and resource allocation in virtualized servers by Almeida, Jussara, Almeida, Virgílio, Ardagna, Danilo, Cunha, Ítalo, Francalanci, Chiara, Trubian, Marco

    “…In service oriented architectures, Quality of Service (QoS) is a key issue. Service requestors evaluate QoS at run time to address their service invocation to…”
    Get full text
    Journal Article
  11. 11

    NomadiKey: User authentication for smart devices based on nomadic keys by Souza, Artur, Cunha, Ítalo, B Oliveira, Leonardo

    “…Summary The growing importance of smart devices calls for effective user authentication mechanisms. We argue that state‐of‐the‐art authentication mechanisms…”
    Get full text
    Journal Article
  12. 12

    Predicting the level of cooperation in a Peer-to-Peer live streaming application by Gonçalves, Glauber D., Cunha, Ítalo, Vieira, Alex B., Almeida, Jussara M.

    Published in Multimedia systems (01-03-2016)
    “…The Peer-to-Peer (P2P) architecture has been successfully used to reduce costs and increase the scalability of Internet live streaming systems. However, the…”
    Get full text
    Journal Article
  13. 13

    Analyzing security and energy tradeoffs in autonomic capacity management by Cunha, I., Viana, I., Palotti, J., Almeida, J., Almeida, V.

    “…Capacity management of a hosting infrastructure has traditionally focused only on performance goals. However, the quality of service provided to the hosted…”
    Get full text
    Conference Proceeding
  14. 14

    Classification of Load Balancing in the Internet by Almeida, Rafael, Cunha, italo, Teixeira, Renata, Veitch, Darryl, Diot, Christophe

    “…Recent advances in programmable data planes, software-defined networking, and the adoption of IPv6 support novel, more complex load balancing strategies. We…”
    Get full text
    Conference Proceeding
  15. 15

    DTRACK: A System to Predict and Track Internet Path Changes by Cunha, Italo, Teixeira, Renata, Veitch, Darryl, Diot, Christophe

    Published in IEEE/ACM transactions on networking (01-08-2014)
    “…In this paper, we implement and evaluate a system that predicts and tracks Internet path changes to maintain an up-to-date network topology. Based on empirical…”
    Get full text
    Journal Article
  16. 16

    Efficient virtual network isolation in multi-tenant data centers on commodity ethernet switches by Moraes, Heitor, Vieira, Marcos A. M., Cunha, Italo, Guedes, Dorgival

    “…Infrastructure-as-a-Service providers need to provision and isolate their tenants's virtual networks. Current network isolation solutions either suffer from…”
    Get full text
    Conference Proceeding
  17. 17

    Impact of provider failures on the traffic at a university campus by Duarte, Rodrigo, Vieira, Alex B., Cunha, Italo, Almeida, Jussara M.

    “…In this paper we characterize the impact of failures in Brazil's national research network (RNP) on traffic at a large client university. We analyze…”
    Get full text
    Conference Proceeding
  18. 18

    Identifying Networks Vulnerable to IP Spoofing by Fonseca, Osvaldo, Cunha, Italo, Fazzion, Elverton, Meira, Wagner, Silva, Brivaldo Alves da, Ferreira, Ronaldo A., Katz-Bassett, Ethan

    “…The lack of authentication in the Internet's data plane allows hosts to falsify ( spoof ) the source IP address in packet headers. IP source spoofing is the…”
    Get full text
    Journal Article
  19. 19

    An SDN-based Framework for Managing Internet Exchange Points by Martins, Luis Felipe Cunha, Cunha, Italo, Guedes, Dorgival

    “…Internet Exchange Points (IXP) have become crucial building blocks of today's networked services, localizing traffic, improving performance, and reducing…”
    Get full text
    Conference Proceeding
  20. 20

    Dyssect: Dynamic Scaling of Stateful Network Functions by Carvalho, Fabricio B., Ferreira, Ronaldo A., Cunha, Italo, Vieira, Marcos A. M., Ramanathan, Murali K.

    “…Network Function Virtualization promises better utilization of computational resources by dynamically scaling resources on demand. However, most network…”
    Get full text
    Conference Proceeding