To offload or not to offload? the bandwidth and energy costs of mobile cloud computing MV Barbera, S Kosta, A Mei, J Stefa 2013 Proceedings Ieee Infocom, 1285-1293, 2013 | 473 | 2013 |
Signals from the crowd: uncovering social relationships through smartphone probes MV Barbera, A Epasto, A Mei, VC Perta, J Stefa Proceedings of the 2013 conference on Internet measurement conference, 265-276, 2013 | 163 | 2013 |
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. S Chakravarty, MV Barbera, G Portokalidis, M Polychronakis, ... PAM, 247-257, 2014 | 94 | 2014 |
VIP delegation: Enabling VIPs to offload data in wireless social mobile networks MV Barbera, J Stefa, AC Viana, MD de Amorim, M Boc 2011 international conference on distributed computing in sensor systems and …, 2011 | 73 | 2011 |
A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients VC Perta, M Barbera, G Tyson, H Haddadi, A Mei | 63 | 2015 |
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system MV Barbera, S Kosta, A Mei, VC Perta, J Stefa IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2355-2363, 2014 | 62 | 2014 |
Data offloading in social mobile networks through VIP delegation MV Barbera, AC Viana, MD de Amorim, J Stefa Ad Hoc Networks 19, 92-110, 2014 | 60 | 2014 |
CellFlood: Attacking Tor onion routers on the cheap MV Barbera, VP Kemerlis, V Pappas, AD Keromytis Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 47 | 2013 |
CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud MV Barbera, S Kosta, J Stefa, P Hui, A Mei 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 50-56, 2012 | 34 | 2012 |
Cdroid: Towards a cloud-integrated mobile operating system MV Barbera, S Kosta, A Mei, VC Perta, J Stefa 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013 | 18 | 2013 |
CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10) MV Barbera, A Epasto, A Mei, S Kosta, VC Perta, J Stefa Sep, 2013 | 16 | 2013 |
Exploiting delay patterns for user ips identification in cellular networks VC Perta, MV Barbera, A Mei Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 9 | 2014 |
Personal marks and community certificates: Detecting clones in wireless mobile social networks MV Barbera, A Mei 2012 IEEE 8th International Conference on Distributed Computing in Sensor …, 2012 | 8* | 2012 |
CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10). Retrieved 10 November, 2015 MV Barbera, A Epasto, A Mei, S Kosta, VC Perta, J Stefa | 6 | 2013 |
A Needle in the Haystack-Delay Based User Identification in Cellular Networks. MV Barbera, S Bronzini, A Mei, VC Perta PAM, 265-267, 2014 | | 2014 |
On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow S Chakravarty, M Polychronakis, G Portokalidis, MV Barbera, ... | | 2013 |
FROM CELLULAR NETWORKS TO MOBILE CLOUD MV Barbera SAPIENZA UNIVERSITY OF ROME, 2012 | | 2012 |