Follow
Alok Tongaonkar
Alok Tongaonkar
Data Scientist Director, Palo Alto Networks
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
Networkprofiler: Towards automatic fingerprinting of android apps
S Dai, A Tongaonkar, X Wang, A Nucci, D Song
2013 proceedings ieee infocom, 809-817, 2013
2562013
Inferring Higher Level Policies from Firewall Rules.
A Tongaonkar, N Inamdar, R Sekar
LISA 7, 1-10, 2007
1462007
Understanding mobile app usage patterns using in-app advertisements
A Tongaonkar, S Dai, A Nucci, D Song
International Conference on Passive and Active Network Measurement, 63-72, 2013
1172013
Towards self adaptive network traffic classification
A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci
Computer Communications 56, 35-46, 2015
1082015
Samples: Self adaptive mining of persistent lexical snippets for classifying mobile application traffic
H Yao, G Ranjan, A Tongaonkar, Y Liao, ZM Mao
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
1002015
Fast pattern-matching techniques for packet filtering
AS Tongaonkar
State University of New York at Stony Brook, 2004
832004
Identifying personal information in internet traffic
Y Liu, HH Song, I Bermudez, A Mislove, M Baldi, A Tongaonkar
Proceedings of the 2015 ACM on Conference on Online Social Networks, 59-70, 2015
502015
System and method for using network application signatures based on modified term transition state machine
R Keralapura, A Tongaonkar, A Nucci
US Patent 8,494,985, 2013
462013
Challenges in Network Application Identification.
A Tongaonkar, R Keralapura, A Nucci
LEET, 2012
392012
System and method for using network application signatures based on term transition state machine
R Keralapura, A Nucci, A Tongaonkar
US Patent 8,577,817, 2013
382013
Transaction based network application signatures for text based protocols
A Tongaonkar, R Keralapura, A Nucci
US Patent 10,404,554, 2019
372019
Botnet protocol inference in the presence of encrypted traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
342017
Towards automatic protocol field inference
I Bermudez, A Tongaonkar, M Iliofotou, M Mellia, MM Munafò
Computer Communications 84, 40-51, 2016
342016
Automatic protocol field inference for deeper protocol understanding
I Bermudez, A Tongaonkar, M Iliofotou, M Mellia, MM Munafo
2015 IFIP Networking Conference (IFIP Networking), 1-9, 2015
332015
YouLighter: A cognitive approach to unveil YouTube CDN and changes
D Giordano, S Traverso, L Grimaudo, M Mellia, E Baralis, A Tongaonkar, ...
IEEE Transactions on Cognitive Communications and Networking 1 (2), 161-174, 2015
292015
Network application signatures for binary protocols
R Keralapura, R Torres, M Iliofotou, A Tongaonkar, A Nucci
US Patent 8,578,024, 2013
272013
Fast Packet Classification for Snort by Native Compilation of Rules.
A Tongaonkar, S Vasudevan, R Sekar
LISA 8, 159-165, 2008
262008
Detecting malicious activities with user‐agent‐based profiles
Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia
International Journal of Network Management 25 (5), 306-319, 2015
252015
Transaction based network application signatures for text based protocols
A Tongaonkar, R Keralapura, A Nucci
US Patent 9,479,405, 2016
242016
Systems and methods for reverse-engineering malware protocols
RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha
US Patent 10,050,982, 2018
222018
The system can't perform the operation now. Try again later.
Articles 1–20