Algoritmi | User | Paulo Jorge Salvador Serra Ferreira
Paulo Jorge Salvador Serra Ferreira
Paulo Jorge Salvador Serra Ferreira
Personal Email
Orcid
0000-0001-6832-9417Researcher ID
FCT Public Key
Ciência ID
F612-6014-3735Google Scholar
Publications (130)
Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0
Computer Networks
2024 | journal-article
Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks
IEEE Communications Magazine
2024 | journal-article
Detection of Internet‐wide traffic redirection attacks using machine learning techniques
IET Networks
2023 | journal-article
Prediction of low accessibility in 4G networks
Annals of Telecommunications
2022 | journal-article
A privacy-focused approach for anomaly detection in IoT networks
International Journal of Network Management
2021 | journal-article
Physical Layer Anomaly Detection Mechanisms in IoT Networks
IEEE/IFIP Network Operations and Management Symposium (NOMS 2020)
2020 | conference-paper
Root Cause Analysis of Reduced Accessibility in 4G Networks
Machine Learning for Networking
2020 | book-chapter
Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph
2019 | book-chapter
Detecting Internet-Scale Traffic Redirection Attacks Using Latent Class Models
Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)
2018 | conference-paper
Modular Platform for Customer-Side Detection of BGP Redirection Attacks
4th International Conference on Information Systems Security and Privacy (ICISSP 2018)
2018 | conference-paper
A Quasi-realistic Internet Graph
14th International Joint Conference on e-Business and Telecommunications
2017 | conference-paper
Socially-Aware Multimedia Dissemination in Personal Mobile Networks
Wireless Personal Communications, Springer
2017 | journal-article
Extracting Information from Interval Data Using Symbolic Principal Component Analysis
Austrian Journal of Statistics
2017 | journal-article
Supporting Unified Distributed Management and Autonomic Decisions: Design, Implementation and Deployment
Journal of Network and Systems Management, Springer
2017 | journal-article
Integrated Monitoring in Mobile Devices
10th Conference on Telecommunications (Conftele 2015)
2015 | conference-paper
Multi-scaling Analysis of Social Network Users Profiles
The Tenth International Conference on Internet Monitoring and Protection (ICIMP 2015), DataSys 2015
2015 | conference-paper
Tracking Social Networks Events
The Tenth International Conference on Internet Monitoring and Protection (ICIMP 2015), DataSys 2015
2015 | conference-paper
Do we need a perfect ground-truth for benchmarking Internet traffic classifiers?
The 34st Annual IEEE International Conference on Computer Communications (INFOCOM 2015)
2015 | conference-paper
Multiscale Internet Statistics: Unveiling the Hidden Behavior
Mathematics of Energy and Climate Change
2015 | book-chapter
A Peer-to-Peer System for Large Scale Traffic Measurements
16th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2014)
2014 | conference-paper
Customer-Side Detection of Internet-Scale Traffic Redirection
16th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2014)
2014 | conference-paper
Detecting DDoS Attacks at the Source Using Multiscaling Analysis
16th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2014)
2014 | conference-paper
Framework for Collecting Social Network Events
16th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2014)
2014 | conference-paper
Teaching Networking: A Hands-on Approach that Relies on Emulation-based Projects
The Fourth International Conference on Advanced Communications and Computation (INFOCOMP 2014)
2014 | conference-paper
A Facebook Event Collector Framework for Profile Monitoring Purposes
19th IEEE Symposium on Computers and Communications (ISCC 2014)
2014 | conference-paper
DICOM Interception System for Independent Image Backup
IEEE/IFIP Network, Operations and Management Symposium (NOMS 2014)
2014 | conference-paper
Statistical characterization of P2P-TV services and users
Telecommunication Systems, Springer US
2014 | journal-article
A Genetic Algorithm Approach to Improve Network Nodes Association
Globecom 2013 - Communications QoS, Reliability and Modelling Symposium
2013 | conference-paper
Detection of WPS Attacks Based on Multiscale Traffic Analysis
Recent Advances in Communications and Networking Technology, Bentham Science Publishers
2013 | journal-article
Network-based Wi-Fi Localization Solution
Recent Advances in Communications and Networking Technology, Bentham Science Publishers
2013 | journal-article
On the Analysis of Dissemination Management Information through an Eyesight Perspective
Globecom 2013 Workshop - Management of Emerging Networks and Services
2013 | conference-paper
Algorithms for Network Discovery and Detection of MAC and IP Spoofing Security Attacks
The Fifth International Conference on Emerging Network Intelligence (EMERGING 2013)
2013 | conference-paper
Detecting Social-Network Bots Based on Multiscale Behavioral Analysis
The Seventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013)
2013 | conference-paper
Inter-Operator Traffic Differentiation based on Multiscale Analysis
The Fifth International Conference on Advances in Future Internet (AFIN 2013)
2013 | conference-paper
Differentiation of HTTP Applications Based on Multiscale Analysis
Recent Advances in Communications and Networking Technology, Bentham Science Publishers
2013 | journal-article
Localization System for Wireless Networks
3rd IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA 2013), IEEE International Conference on Communications (ICC 2013)
2013 | conference-paper
Using Multiscale Traffic Analysis to Detect WPS Attacks
3rd IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA 2013), IEEE International Conference on Communications (ICC 2013)
2013 | conference-paper
Lightweight Discovery and Exchange of Network Information in Distributed Network Management
IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)
2013 | conference-paper
A Practical Approach to Corporate Networks Engineering
2013 | book
A Spanning Tree Protocol over mobile wireless ad hoc networks
2013 IEEE International Conference on Communications Workshops, ICC 2013
2013 | conference-paper
Methodologies for Network Topology Discovery and Detection of MAC and IP Spoofing Attacks
Network Protocols and Algorithms, Macrothink Institute
2013 | journal-article
Multi-Scale Profiling of Internet Traffic
Recent Advances in Communications and Networking Technology, Bentham Science Publishers
2012 | journal-article
Atas da 12a Conferencia sobre Redes de Computadores (CRC2012)
2012 | book
Fighting Botnets - A Systematic Approach
The Fourth International Conference on Emerging Network Intelligence (EMERGING 2012)
2012 | conference-paper
Characterization and Modeling of M2M Video Surveillance Traffic
The Fourth International Conference on Advances in Future Internet (AFIN 2012)
2012 | conference-paper
Characterizing and Predicting Internet Users Hidden Behaviors with Markovian Models
The Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012)
2012 | conference-paper
Analyzing the Behavior of Top Spam Botnets
2nd IEEE International Workshop on Smart Communication Protocols and Algorithms, IEEE International Conference on Communications (ICC 2012)
2012 | conference-paper
Improving MAC Layer Association through Social-Based Metrics in Mobile Networks
IEEE Communications Magazine
2012 | journal-article
Self-organizing decentralized wireless management through social-based metrics
IEEE Network Operations and Management Symposium (NOMS 2012)
2012 | conference-paper
Robust Feature Selection and Robust PCA for Internet Traffic Anomaly Detection
The 31st Annual IEEE International Conference on Computer Communications (INFOCOM 2012)
2012 | conference-paper
Characterization and Modeling of Top Spam Botnets
Network Protocols and Algorithms
2012 | journal-article
A Real-Time Traffic Classification Approach
The 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011)
2011 | conference-paper
Can multiscale traffic analysis be used to differentiate Internet applications?
Telecommunication Systems, Springer Netherlands
2011 | journal-article
Identification of Anomalies on Encrypted Communications based on Multi-Scale Behavior Modeling
3rd International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2011)
2011 | conference-paper
Statistical Characterization of the Botnets C&C Traffic
First World Conference on Innovation and Computer Sciences (INSODE 2011), Procedia Technology
2011 | conference-paper
A Multi-Variate Classification Approach for the Detection of Illicit Traffic
19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2011)
2011 | conference-paper
Classification of Hidden Users Profiles in Wireless Communications
3rd International ICST Conference on Mobile Networks And Management (MONAMI 2011), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
2011 | conference-paper
Joint Modeling of Network Related Events with Multi-Dimensional Markov Modulated Deterministic Processes
19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2011)
2011 | conference-paper
Nodes discovery in the In-Network Management communication framework
3rd International ICST Conference on Mobile Networks And Management (MONAMI 2011), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
2011 | conference-paper
IPTV Service Based on a Content-Zapping Paradigm
Multimedia Systems
2011 | journal-article
Detection of Illicit Network Activities based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics
IEEE International Conference on Communications (ICC2011)
2011 | conference-paper
Markov Modulated Bi-variate Gaussian Processes for Mobility Modeling and Location Prediction
IFIP Networking 2011, Lecture Notes in Computer Science
2011 | conference-paper
Markovian Modelling of Internet Traffic
Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet, Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg
2011 | journal-article
FTP@VDTN - A File Transfer Application for Vehicular Delay-Tolerant Networks
IEEE International Conference on Computer as a Tool (EUROCON2011)
2011 | conference-paper
Multimedia Content Aggregator applied to an IPTV Content-Zapping Service
IEEE International Conference on Computer as a Tool (EUROCON2011)
2011 | conference-paper
Classifying Users Profiles and Content in a Content-Zapping IPTV Service
Advances in Next Generation Services and Service Architectures
2011 | book-chapter
Modeling Self-Similar Traffic over Multiple Time Scales based on Hierarchical Markovian and L-System Models
Computer Communications, Special Issue - Heterogeneous Networks: Traffic Engineering and Performance Evaluation
2010 | journal-article
Analysis of the Internet Domain Names Re-registration Market
World Conference on Information Technology (WCIT 2010), Procedia Computer Science
2010 | conference-paper
Emulation Environment for Ground Truth Establishment
The Second International Conference on Emerging Network Intelligence (EMERGING 2010)
2010 | conference-paper
Gaussian Fitting of Multi-scale Traffic Properties for Discriminating IP Applications
The Second International Conference on Emerging Network Intelligence (EMERGING 2010)
2010 | conference-paper
Improving the Traffic Prediction Capability of Neural Networks Using Sliding Window and Multi-task Learning Mechanisms
Second International Conference on Evolving Internet (INTERNET 2010)
2010 | conference-paper
A Botnet Detection System based on Neural Networks
The Fifth International Conference on Digital Telecommunications (ICDT 2010)
2010 | conference-paper
P2P-TV Service and User Characterization
IEEE 10th International Conference on Computer and Information Technology (CIT 2010)
2010 | conference-paper
A Cooperative Hide and Seek Discovery over In Network Management
2nd IEEE/IFIP International Workshop on Management of the Future Internet (ManFI 2010), IEEE/IFIP Network Operations and Management Symposium Workshops (NOMS 2010 Workshops)
2010 | conference-paper
IPTV Service with Automatic Channels Personalization
First International Workshop on Networking and Games (N&G 2010), IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
2010 | conference-paper
Detection of illicit Traffic Based on Multiscale Analysis
17th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2009)
2009 | conference-paper
Differentiating Internet Applications using Principal Component Analysis
Ubiquitous Computing and Communication Journal (UBICC) - Special Issue on IEEE, IET International Symposium on Communication Systems, Networks and Digital Signal Processing
2009 | journal-article
Improvement of Messages Delivery Time on Vehicular Delay-Tolerant Networks
2nd International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN 2009), International Conference on Parallel Processing Workshops (ICPPW 2009)
2009 | conference-paper
On the Dependencies between Internet Flow Characteristics
Traffic Management and Traffic Engineering for the Future Internet, Lecture Notes in Computer Science
2009 | book-chapter
Peer-Level Analysis of Distributed Multimedia Content Sharing
Traffic Management and Traffic Engineering for the Future Internet, Lecture Notes in Computer Science
2009 | book-chapter
Traffic Management and Traffic Engineering for the Future Internet
2009 | book
Discriminating Internet Applications Based on Multiscale Analysis
5th Euro-NGI Conference on Next Generation Internet Networks (NGI2009)
2009 | conference-paper
Markovian Models for Medical Signals on Wireless Sensor Networks
ICC 2009 Workshop - First International Workshop on Medical Applications Networking (MAN 2009)
2009 | conference-paper
Framework for Zombie Detection using Neural Networks
The Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009)
2009 | conference-paper