Follow
Mario Di Mauro
Mario Di Mauro
University of Salerno, IEEE Senior Member
Verified email at unisa.it - Homepage
Title
Cited by
Cited by
Year
Smart anomaly detection in sensor systems: A multi-perspective review
L Erhan, M Ndubuaku, M Di Mauro, W Song, M Chen, G Fortino, ...
Information Fusion 67, 64-79, 2021
2662021
Supervised feature selection techniques in network intrusion detection: A critical review
M Di Mauro, G Galatro, G Fortino, A Liotta
Engineering Applications of Artificial Intelligence 101, 104216, 2021
1562021
Experimental review of neural-based approaches for network intrusion management
M Di Mauro, G Galatro, A Liotta
IEEE Transactions on Network and Service Management 17 (4), 2480-2495, 2020
902020
DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies
V Matta, M Di Mauro, M Longo
IEEE Transactions on Information Forensics and Security 12 (8), 1844-1859, 2017
742017
Availability evaluation of multi-tenant service function chaining infrastructures by multidimensional universal generating function
M Di Mauro, M Longo, F Postiglione
IEEE Transactions on Services Computing 14 (5), 1320-1332, 2018
512018
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection
M Di Mauro, C Di Sarno
Journal of information security and applications 38, 85-95, 2018
402018
A performance evaluation of WebRTC over LTE
G Carullo, M Tambasco, M Di Mauro, M Longo
2016 12th Annual Conference on Wireless On-demand Network Systems and …, 2016
372016
Revealing encrypted WebRTC traffic via machine learning tools
M Di Mauro, M Longo
2015 12th international joint conference on e-business and …, 2015
352015
Service function chaining deployed in an NFV environment: An availability modeling
M Di Mauro, M Longo, F Postiglione, G Carullo, M Tambasco
2017 IEEE Conference on Standards for Communications and Networking (CSCN …, 2017
342017
Statistical assessment of IP multimedia subsystem in a softwarized environment: A queueing networks approach
M Di Mauro, A Liotta
IEEE Transactions on Network and Service Management 16 (4), 1493-1506, 2019
252019
Availability modeling and evaluation of a network service deployed via NFV
M Di Mauro, M Longo, F Postiglione, M Tambasco
Digital Communication. Towards a Smart and Secure Future Internet: 28th …, 2017
242017
Skype traffic detection: a decision theory based tool
M Di Mauro, M Longo
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
242014
Botnet identification in randomized DDoS attacks
V Matta, M Di Mauro, M Longo
2016 24th European Signal Processing Conference (EUSIPCO), 2260-2264, 2016
232016
A framework for Internet data real-time processing: A machine-learning approach
M Di Mauro, C Di Sarno
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
222014
Botnet identification in multi-clustered DDoS attacks
V Matta, M Di Mauro, M Longo
2017 25th European Signal Processing Conference (EUSIPCO), 2171-2175, 2017
212017
Comparative performability assessment of SFCs: The case of containerized IP multimedia subsystem
M Di Mauro, G Galatro, M Longo, F Postiglione, M Tambasco
IEEE Transactions on Network and Service Management 18 (1), 258-272, 2020
202020
An experimental evaluation and characterization of VoIP over an LTE-A network
M Di Mauro, A Liotta
IEEE Transactions on Network and Service Management 17 (3), 1626-1639, 2020
192020
Adversarial Kendall’s model towards containment of distributed cyber-threats
P Addesso, M Barni, M Di Mauro, V Matta
IEEE Transactions on Information Forensics and Security 16, 3604-3619, 2021
182021
Botnet identification in DDoS attacks with multiple emulation dictionaries
M Cirillo, M Di Mauro, V Matta, M Tambasco
IEEE Transactions on Information Forensics and Security 16, 3554-3569, 2021
172021
Cyber-threat mitigation exploiting the birth–death–immigration model
V Matta, M Di Mauro, M Longo, A Farina
IEEE Transactions on Information Forensics and Security 13 (12), 3137-3152, 2018
172018
The system can't perform the operation now. Try again later.
Articles 1–20