Marios Iliofotou, Ph.D.
Affiliations: | 2011 | Computer Science | University of California, Riverside, Riverside, CA, United States |
Area:
Computer ScienceGoogle:
"Marios Iliofotou"Parents
Sign in to add mentorMichalis Faloutsos | grad student | 2011 | UC Riverside | |
(Analyzing Network-Wide Interactions Using Graphs: Techniques and Applications.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bermudez I, Tongaonkar A, Iliofotou M, et al. (2016) Towards automatic protocol field inference Computer Communications. 84: 40-51 |
Bermudez I, Tongaonkar A, Iliofotou M, et al. (2015) Automatic protocol field inference for deeper protocol understanding Proceedings of 2015 14th Ifip Networking Conference, Ifip Networking 2015 |
Tongaonkar A, Torres R, Iliofotou M, et al. (2015) Towards self adaptive network traffic classification Computer Communications. 56: 35-46 |
Xia N, Song HH, Liao Y, et al. (2013) Mosaic: Quantifying privacy leakage in mobile networks Sigcomm 2013 - Proceedings of the Acm Sigcomm 2013 Conference On Applications, Technologies, Architectures, and Protocols For Computer Communication. 279-290 |
Wang Y, Iliofotou M, Faloutsos M, et al. (2013) Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies Computer Networks. 57: 2147-2158 |
Xie G, Iliofotou M, Karagiannis T, et al. (2013) ReSurf: Reconstructing web-surfing activity from network traffic 2013 Ifip Networking Conference, Ifip Networking 2013 |
Xie G, Iliofotou M, Keralapura R, et al. (2012) SubFlow: Towards practical flow-level traffic classification Proceedings - Ieee Infocom. 2541-2545 |
Bhattacharya P, Iliofotou M, Neamtiu I, et al. (2012) Graph-based analysis and prediction for software evolution Proceedings - International Conference On Software Engineering. 419-429 |
Pelechrinis K, Iliofotou M, Krishnamurthy SV. (2011) Denial of service attacks in wireless networks: The case of jammers Ieee Communications Surveys and Tutorials. 13: 245-257 |
Wang Y, Iliofotou M, Faloutsos M, et al. (2011) Analyzing interaction communication networks in enterprises and identifying hierarchies Proceedings of the 2011 Ieee 1st International Network Science Workshop, Nsw 2011. 17-24 |