To offload or not to offload? the bandwidth and energy costs of mobile cloud computing MV Barbera, S Kosta, A Mei, J Stefa 2013 Proceedings Ieee Infocom, 1285-1293, 2013 | 511 | 2013 |
Signals from the crowd: uncovering social relationships through smartphone probes MV Barbera, A Epasto, A Mei, VC Perta, J Stefa Proceedings of the 2013 conference on Internet measurement conference, 265-276, 2013 | 179 | 2013 |
On the effectiveness of traffic analysis against anonymity networks using flow records S Chakravarty, MV Barbera, G Portokalidis, M Polychronakis, ... Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014 | 114 | 2014 |
A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients VC Perta, M Barbera, G Tyson, H Haddadi, A Mei | 82 | 2015 |
VIP delegation: Enabling VIPs to offload data in wireless social mobile networks MV Barbera, J Stefa, AC Viana, MD De Amorim, M Boc 2011 international conference on distributed computing in sensor systems and …, 2011 | 72 | 2011 |
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system MV Barbera, S Kosta, A Mei, VC Perta, J Stefa IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2355-2363, 2014 | 65 | 2014 |
Data offloading in social mobile networks through VIP delegation MV Barbera, AC Viana, MD de Amorim, J Stefa Ad Hoc Networks 19, 92-110, 2014 | 59 | 2014 |
CellFlood: Attacking Tor onion routers on the cheap MV Barbera, VP Kemerlis, V Pappas, AD Keromytis Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 53 | 2013 |
CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud MV Barbera, S Kosta, J Stefa, P Hui, A Mei 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 50-56, 2012 | 33 | 2012 |
CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10) MV Barbera, A Epasto, A Mei, S Kosta, VC Perta, J Stefa Sep, 2013 | 21 | 2013 |
Cdroid: Towards a cloud-integrated mobile operating system MV Barbera, S Kosta, A Mei, VC Perta, J Stefa 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013 | 19 | 2013 |
Exploiting delay patterns for user ips identification in cellular networks VC Perta, MV Barbera, A Mei Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 10 | 2014 |
Personal marks and community certificates: Detecting clones in wireless mobile social networks MV Barbera, A Mei 2012 IEEE 8th International Conference on Distributed Computing in Sensor …, 2012 | 7* | 2012 |
CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10). Retrieved 10 November, 2015 MV Barbera, A Epasto, A Mei, S Kosta, VC Perta, J Stefa | 6 | 2013 |
A Needle in the Haystack-Delay Based User Identification in Cellular Networks MV Barbera, S Bronzini, A Mei, VC Perta Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014 | | 2014 |
From cellular networks to mobile cloud computing: security and efficiency of smartphone systems. MV Barbera Universitą degli Studi di Roma" La Sapienza", 2013 | | 2013 |
On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow S Chakravarty, M Polychronakis, G Portokalidis, MV Barbera, ... | | 2013 |