Ramin Sadre
TitleCited byYear
Inside dropbox: understanding personal cloud storage services
I Drago, M Mellia, M M. Munafo, A Sperotto, R Sadre, A Pras
Proceedings of the 2012 Internet Measurement Conference, 481-494, 2012
4402012
An overview of IP flow-based intrusion detection
A Sperotto, G Schaffrath, R Sadre, C Morariu, A Pras, B Stiller
IEEE communications surveys & tutorials 12 (3), 343-356, 2010
4342010
Flow monitoring explained: From packet capture to data analysis with netflow and ipfix
R Hofstede, P Čeleda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras
IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014
2732014
Fitting world-wide web request traces with the EM-algorithm
REA Khayari, R Sadre, BR Haverkort
Performance Evaluation 52 (2-3), 175-191, 2003
1412003
A labeled data set for flow-based intrusion detection
A Sperotto, R Sadre, F Van Vliet, A Pras
International Workshop on IP Operations and Management, 39-50, 2009
1252009
Pakcs: The portland aachen kiel curry system
M Hanus, S Antoy, B Braßel, M Engelke, K Höppner, J Koj, P Niederau, ...
852003
SSHCure: a flow-based SSH intrusion detection system
L Hellemons, L Hendriks, R Hofstede, A Sperotto, R Sadre, A Pras
IFIP International Conference on Autonomous Infrastructure, Management and …, 2012
762012
Flow whitelisting in SCADA networks
R Barbosa, R Sadre, A Pras
International Journal of Critical Infrastructure Protection 6 (3-4), 150-158, 2013
712013
A first look into SCADA network traffic
RRR Barbosa, R Sadre, A Pras
2012 IEEE Network Operations and Management Symposium, 518-521, 2012
622012
Hidden Markov Model modeling of SSH brute-force attacks
A Sperotto, R Sadre, PT de Boer, A Pras
International Workshop on Distributed Systems: Operations and Management …, 2009
622009
Towards periodicity based anomaly detection in SCADA networks
RRR Barbosa, R Sadre, A Pras
Proceedings of 2012 IEEE 17th International Conference on Emerging …, 2012
532012
Difficulties in modeling SCADA traffic: a comparative analysis
RRR Barbosa, R Sadre, A Pras
International Conference on Passive and Active Network Measurement, 126-135, 2012
502012
An abstract machine for Curry and its concurrent implementation in Java
M Hanus, R Sadre
Journal of Functional and Logic Programming 6 (1999), 78, 1999
471999
Attacks by “Anonymous” WikiLeaks proponents not anonymous
A Pras, A Sperotto, GCM Moura, I Drago, R Barbosa, R Sadre, R Schmidt, ...
Design and Analysis of Communication Systems Group (DACS) CTIT Technical …, 2010
412010
A Survey on Information Visualization for Network and Service Management
VT Guimaraes, CM Dal Sasso Freitas, R Sadre, LMR Tarouco, ...
IEEE Communications Surveys & Tutorials, 2015
362015
A Survey on Information Visualization for Network and Service Management
V Guimaraes, C Dal Sasso Freitas, R Sadre, LM Tarouco, L Granville
IEEE, 2015
362015
Measuring the adoption of DDoS protection services
M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras
Proceedings of the 2016 Internet Measurement Conference, 279-285, 2016
322016
An efficient and accurate decomposition method for open finite-and infinite-buffer queueing networks
R Sadre, B Haverkort, A Ost
Proc. 3rd Int. Workshop on Numerical Solution of Markov Chains, 1-20, 1999
321999
PAKCS 1.2: The Portland Aachen Kiel Curry System User Manual
M Hanus, S Antoy, J Koj, R Sadre, F Steiner
Technical report, University of Kiel, Germany, 2000
292000
Anomaly characterization in flow-based traffic time series
A Sperotto, R Sadre, A Pras
International Workshop on IP Operations and Management, 15-27, 2008
282008
The system can't perform the operation now. Try again later.
Articles 1–20