Carlos Sarraute
Carlos Sarraute

ORCID page

  Affiliation history
Bibliometrics: publication history
Average citations per article3.00
Citation Count30
Publication count10
Publication years2006-2017
Available for download6
Average downloads per article242.00
Downloads (cumulative)1,452
Downloads (12 Months)104
Downloads (6 Weeks)10
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


10 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 10 of 10
Sort by:

November 2017 Expert Systems with Applications: An International Journal: Volume 85 Issue C, November 2017
Publisher: Pergamon Press, Inc.
Citation Count: 0

Comparison of Social Networks Analytics methods for predicting churn in telco.Ranking of 24 relational learners with respect to predictive performance.Collective inferencing does not improve the performance of relational classifiers.The best models apply a classifier with network features and relational learner scores.Network construction matters for model performance. Social network analytics methods ...
Keywords: Relational learning, Collective inference, Social networks analytics, Churn prediction, Network construction, Telecommunication industry

January 2017 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 112 Issue C, January 2017
Publisher: Elsevier North-Holland, Inc.
Citation Count: 0

This paper presents a detailed measurement-driven model of mobile data traffic usage of smartphone subscribers, using a large-scale dataset collected from a major 3G network in a dense metropolitan area. Our main contribution is a synthetic, measurement-based, mobile data traffic generator capable of simulating traffic-related activity patterns over time for ...
Keywords: Mobile data, Traffic analysis, Clustering, Synthetic traffic

December 2016 Ad Hoc Networks: Volume 52 Issue C, December 2016
Publisher: Elsevier Science Publishers B. V.
Citation Count: 0

In urban areas, the population density is still growing (the population density starts exceeding 20.000 inhabitants per km2), and so, the density of mobile users becomes very important. People are moving from home to work, from work to active places. One can take benefit of the mobility and the density ...
Keywords: Computer communication networks, Network protocols, Performance of systems, Routing protocols, Network operations, Delay tolerant network, Network science

4 published by ACM
November 2015 PE-WASUN '15: Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 27,   Downloads (Overall): 36

Full text available: PDFPDF
In this paper, from a measurement study and analysis of SMS based on traces coming from a nationwide cellular telecommunication operator during a two month period, we propose a DTN (Delay Tolerant Network) like network protocol for delivering SMS. More precisely, we perform a temporal and spatial analysis of the ...
Keywords: dtn, network science, routing protocols

5 published by ACM
August 2014 SNAKDD'14: Proceedings of the 8th Workshop on Social Network Mining and Analysis
Publisher: ACM
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 28,   Downloads (Overall): 99

Full text available: PDFPDF
We study the structure of the social graph of mobile phone users in the country of Mexico, with a focus on demographic attributes of the users (more specifically the users' age). We examine assortativity patterns in the graph, and observe a strong age homophily in the communications preferences. We propose ...

6 published by ACM
August 2013 ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Publisher: ACM
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 13,   Downloads (Overall): 79

Full text available: PDFPDF
The massive amounts of geolocation data collected from mobile phone records has sparked an ongoing effort to understand and predict the mobility patterns of human beings. In this work, we study the extent to which social phenomena are reflected in mobile phone data, focusing in particular in the cases of ...

July 2012 AAAI'12: Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
Citation Count: 7

Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic testing. A key question is how to generate the attacks. This is naturally formulated as planning under uncertainty, i.e., under incomplete knowledge about the network configuration. ...

8 published by ACM
October 2011 AISec '11: Proceedings of the 4th ACM workshop on Security and artificial intelligence
Publisher: ACM
Citation Count: 9
Downloads (6 Weeks): 4,   Downloads (12 Months): 35,   Downloads (Overall): 312

Full text available: PDFPDF
As penetration testing frameworks have evolved and have become more complex, the problem of controlling automatically the pentesting tool has become an important question. This can be naturally addressed as an attack planning problem. Previous approaches to this problem were based on modeling the actions and assets in the PDDL ...
Keywords: network security, attack planning, exploit, automated pentesting

March 2009 Simutools '09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Citation Count: 8
Downloads (6 Weeks): 2,   Downloads (12 Months): 6,   Downloads (Overall): 198

Full text available: PDFPDF
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, ...
Keywords: network security, network simulation, exploit, 0-day, cyber-attack, penetration test, training, vulnerability

10 published by ACM
February 2006 ACM Transactions on Information and System Security (TISSEC): Volume 9 Issue 1, February 2006
Publisher: ACM
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 718

Full text available: PDFPDF
Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose, furthermore, that we want this done in a (possibly) malicious host. Say the confidential content is a piece of code belonging to a computer program that ...
Keywords: mobile code security, universally composable security, obfuscation, Malicious host problem, secure triggers

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us