Smart anomaly detection in sensor systems: A multi-perspective review L Erhan, M Ndubuaku, M Di Mauro, W Song, M Chen, G Fortino, ... Information Fusion 67, 64-79, 2021 | 266 | 2021 |
Supervised feature selection techniques in network intrusion detection: A critical review M Di Mauro, G Galatro, G Fortino, A Liotta Engineering Applications of Artificial Intelligence 101, 104216, 2021 | 156 | 2021 |
Experimental review of neural-based approaches for network intrusion management M Di Mauro, G Galatro, A Liotta IEEE Transactions on Network and Service Management 17 (4), 2480-2495, 2020 | 90 | 2020 |
DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies V Matta, M Di Mauro, M Longo IEEE Transactions on Information Forensics and Security 12 (8), 1844-1859, 2017 | 74 | 2017 |
Availability evaluation of multi-tenant service function chaining infrastructures by multidimensional universal generating function M Di Mauro, M Longo, F Postiglione IEEE Transactions on Services Computing 14 (5), 1320-1332, 2018 | 51 | 2018 |
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection M Di Mauro, C Di Sarno Journal of information security and applications 38, 85-95, 2018 | 40 | 2018 |
A performance evaluation of WebRTC over LTE G Carullo, M Tambasco, M Di Mauro, M Longo 2016 12th Annual Conference on Wireless On-demand Network Systems and …, 2016 | 37 | 2016 |
Revealing encrypted WebRTC traffic via machine learning tools M Di Mauro, M Longo 2015 12th international joint conference on e-business and …, 2015 | 35 | 2015 |
Service function chaining deployed in an NFV environment: An availability modeling M Di Mauro, M Longo, F Postiglione, G Carullo, M Tambasco 2017 IEEE Conference on Standards for Communications and Networking (CSCN …, 2017 | 34 | 2017 |
Statistical assessment of IP multimedia subsystem in a softwarized environment: A queueing networks approach M Di Mauro, A Liotta IEEE Transactions on Network and Service Management 16 (4), 1493-1506, 2019 | 25 | 2019 |
Availability modeling and evaluation of a network service deployed via NFV M Di Mauro, M Longo, F Postiglione, M Tambasco Digital Communication. Towards a Smart and Secure Future Internet: 28th …, 2017 | 24 | 2017 |
Skype traffic detection: a decision theory based tool M Di Mauro, M Longo 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 24 | 2014 |
Botnet identification in randomized DDoS attacks V Matta, M Di Mauro, M Longo 2016 24th European Signal Processing Conference (EUSIPCO), 2260-2264, 2016 | 23 | 2016 |
A framework for Internet data real-time processing: A machine-learning approach M Di Mauro, C Di Sarno 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 22 | 2014 |
Botnet identification in multi-clustered DDoS attacks V Matta, M Di Mauro, M Longo 2017 25th European Signal Processing Conference (EUSIPCO), 2171-2175, 2017 | 21 | 2017 |
Comparative performability assessment of SFCs: The case of containerized IP multimedia subsystem M Di Mauro, G Galatro, M Longo, F Postiglione, M Tambasco IEEE Transactions on Network and Service Management 18 (1), 258-272, 2020 | 20 | 2020 |
An experimental evaluation and characterization of VoIP over an LTE-A network M Di Mauro, A Liotta IEEE Transactions on Network and Service Management 17 (3), 1626-1639, 2020 | 19 | 2020 |
Adversarial Kendall’s model towards containment of distributed cyber-threats P Addesso, M Barni, M Di Mauro, V Matta IEEE Transactions on Information Forensics and Security 16, 3604-3619, 2021 | 18 | 2021 |
Botnet identification in DDoS attacks with multiple emulation dictionaries M Cirillo, M Di Mauro, V Matta, M Tambasco IEEE Transactions on Information Forensics and Security 16, 3554-3569, 2021 | 17 | 2021 |
Cyber-threat mitigation exploiting the birth–death–immigration model V Matta, M Di Mauro, M Longo, A Farina IEEE Transactions on Information Forensics and Security 13 (12), 3137-3152, 2018 | 17 | 2018 |