Stebėti
Alok Tongaonkar
Alok Tongaonkar
Data Scientist Director, Palo Alto Networks
Patvirtintas el. paštas acm.org - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
Networkprofiler: Towards automatic fingerprinting of android apps
S Dai, A Tongaonkar, X Wang, A Nucci, D Song
2013 proceedings ieee infocom, 809-817, 2013
2612013
Inferring Higher Level Policies from Firewall Rules.
A Tongaonkar, N Inamdar, R Sekar
LISA 7, 1-10, 2007
1492007
Understanding mobile app usage patterns using in-app advertisements
A Tongaonkar, S Dai, A Nucci, D Song
International Conference on Passive and Active Network Measurement, 63-72, 2013
1182013
Towards self adaptive network traffic classification
A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci
Computer Communications 56, 35-46, 2015
1152015
Samples: Self adaptive mining of persistent lexical snippets for classifying mobile application traffic
H Yao, G Ranjan, A Tongaonkar, Y Liao, ZM Mao
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
1012015
Fast pattern-matching techniques for packet filtering
AS Tongaonkar
State University of New York at Stony Brook, 2004
832004
System and method for using network application signatures based on modified term transition state machine
R Keralapura, A Tongaonkar, A Nucci
US Patent 8,494,985, 2013
532013
Identifying personal information in internet traffic
Y Liu, HH Song, I Bermudez, A Mislove, M Baldi, A Tongaonkar
Proceedings of the 2015 ACM on Conference on Online Social Networks, 59-70, 2015
522015
Transaction based network application signatures for text based protocols
A Tongaonkar, R Keralapura, A Nucci
US Patent 10,404,554, 2019
402019
System and method for using network application signatures based on term transition state machine
R Keralapura, A Nucci, A Tongaonkar
US Patent 8,577,817, 2013
402013
Challenges in Network Application Identification.
A Tongaonkar, R Keralapura, A Nucci
LEET, 2012
402012
Botnet protocol inference in the presence of encrypted traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
372017
Towards automatic protocol field inference
I Bermudez, A Tongaonkar, M Iliofotou, M Mellia, MM Munafò
Computer Communications 84, 40-51, 2016
362016
Automatic protocol field inference for deeper protocol understanding
I Bermudez, A Tongaonkar, M Iliofotou, M Mellia, MM Munafo
2015 IFIP Networking Conference (IFIP Networking), 1-9, 2015
362015
YouLighter: A cognitive approach to unveil YouTube CDN and changes
D Giordano, S Traverso, L Grimaudo, M Mellia, E Baralis, A Tongaonkar, ...
IEEE Transactions on Cognitive Communications and Networking 1 (2), 161-174, 2015
332015
Network application signatures for binary protocols
R Keralapura, R Torres, M Iliofotou, A Tongaonkar, A Nucci
US Patent 8,578,024, 2013
292013
Detecting malicious activities with user‐agent‐based profiles
Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia
International Journal of Network Management 25 (5), 306-319, 2015
282015
Fast Packet Classification for Snort by Native Compilation of Rules.
A Tongaonkar, S Vasudevan, R Sekar
LISA 8, 159-165, 2008
272008
Transaction based network application signatures for text based protocols
A Tongaonkar, R Keralapura, A Nucci
US Patent 9,479,405, 2016
262016
Systems and methods for reverse-engineering malware protocols
RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha
US Patent 10,050,982, 2018
252018
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20