Search Results - "Cunha, Italo"
-
1
Construction and maintenance of P2P overlays for live streaming
Published in Multimedia tools and applications (01-05-2021)“…P2P live streaming requires low latency and low media discontinuity to provide users good quality of experience. When peers are connected to a large number of…”
Get full text
Journal Article -
2
State Disaggregation for Dynamic Scaling of Network Functions
Published in IEEE/ACM transactions on networking (01-02-2024)“…Network Function Virtualization promises better utilization of computational resources by dynamically scaling resources on demand. However, most network…”
Get full text
Journal Article -
3
The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects
Published in IEEE eTransactions on network and service management (01-04-2024)“…The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better understand and improve RPKI deployment, measuring route origin…”
Get full text
Journal Article -
4
BloomTime: space-efficient stateful tracking of time-dependent network performance metrics
Published in Telecommunication systems (01-06-2020)“…Network monitoring is essential to tasks ranging from planning to troubleshooting. Unfortunately, comprehensive real-time monitoring of complex networks with…”
Get full text
Journal Article -
5
DOD-ETL: distributed on-demand ETL for near real-time business intelligence
Published in Journal of internet services and applications (20-11-2019)“…The competitive dynamics of the globalized market demand information on the internal and external reality of corporations. Information is a precious asset and…”
Get full text
Journal Article -
6
The Evolution of Bashlite and Mirai IoT Botnets
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar losses every year. In this work, we study Bashlite botnets and…”
Get full text
Conference Proceeding -
7
Beyond Herd Immunity Against Strategic Attackers
Published in IEEE access (2020)“…Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a large fraction of the population of devices is immune against a virus…”
Get full text
Journal Article -
8
Identifying and Characterizing Bashlite and Mirai C&C Servers
Published in 2019 IEEE Symposium on Computers and Communications (ISCC) (01-06-2019)“…IoT devices are often a vector for assembling massive botnets, as a consequence of being broadly available, having limited security protections, and…”
Get full text
Conference Proceeding -
9
Modeling large-scale live video streaming client behavior
Published in Multimedia systems (01-12-2021)“…The live streaming of large-scale events over the Internet attracts a highly diverse audience. Despite the progress in streaming technologies, which employ…”
Get full text
Journal Article -
10
Joint admission control and resource allocation in virtualized servers
Published in Journal of parallel and distributed computing (01-04-2010)“…In service oriented architectures, Quality of Service (QoS) is a key issue. Service requestors evaluate QoS at run time to address their service invocation to…”
Get full text
Journal Article -
11
NomadiKey: User authentication for smart devices based on nomadic keys
Published in International journal of network management (01-01-2018)“…Summary The growing importance of smart devices calls for effective user authentication mechanisms. We argue that state‐of‐the‐art authentication mechanisms…”
Get full text
Journal Article -
12
Predicting the level of cooperation in a Peer-to-Peer live streaming application
Published in Multimedia systems (01-03-2016)“…The Peer-to-Peer (P2P) architecture has been successfully used to reduce costs and increase the scalability of Internet live streaming systems. However, the…”
Get full text
Journal Article -
13
Analyzing security and energy tradeoffs in autonomic capacity management
Published in NOMS 2008 - 2008 IEEE Network Operations and Management Symposium (01-04-2008)“…Capacity management of a hosting infrastructure has traditionally focused only on performance goals. However, the quality of service provided to the hosted…”
Get full text
Conference Proceeding -
14
Classification of Load Balancing in the Internet
Published in IEEE INFOCOM 2020 - IEEE Conference on Computer Communications (01-07-2020)“…Recent advances in programmable data planes, software-defined networking, and the adoption of IPv6 support novel, more complex load balancing strategies. We…”
Get full text
Conference Proceeding -
15
DTRACK: A System to Predict and Track Internet Path Changes
Published in IEEE/ACM transactions on networking (01-08-2014)“…In this paper, we implement and evaluate a system that predicts and tracks Internet path changes to maintain an up-to-date network topology. Based on empirical…”
Get full text
Journal Article -
16
Efficient virtual network isolation in multi-tenant data centers on commodity ethernet switches
Published in 2016 IFIP Networking Conference (IFIP Networking) and Workshops (01-05-2016)“…Infrastructure-as-a-Service providers need to provision and isolate their tenants's virtual networks. Current network isolation solutions either suffer from…”
Get full text
Conference Proceeding -
17
Impact of provider failures on the traffic at a university campus
Published in 2015 IFIP Networking Conference (IFIP Networking) (01-05-2015)“…In this paper we characterize the impact of failures in Brazil's national research network (RNP) on traffic at a large client university. We analyze…”
Get full text
Conference Proceeding -
18
Identifying Networks Vulnerable to IP Spoofing
Published in IEEE eTransactions on network and service management (01-09-2021)“…The lack of authentication in the Internet's data plane allows hosts to falsify ( spoof ) the source IP address in packet headers. IP source spoofing is the…”
Get full text
Journal Article -
19
An SDN-based Framework for Managing Internet Exchange Points
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Internet Exchange Points (IXP) have become crucial building blocks of today's networked services, localizing traffic, improving performance, and reducing…”
Get full text
Conference Proceeding -
20
Dyssect: Dynamic Scaling of Stateful Network Functions
Published in IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (02-05-2022)“…Network Function Virtualization promises better utilization of computational resources by dynamically scaling resources on demand. However, most network…”
Get full text
Conference Proceeding