Claudio Mazzariello
Orcid: 0000-0001-9864-4610
According to our database1,
Claudio Mazzariello
authored at least 21 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Intelligent detection of warning bells at level crossings through deep transfer learning for smarter railway maintenance.
Eng. Appl. Artif. Intell., 2023
2022
A Survey on Audio-Video Based Defect Detection Through Deep Learning in Railway Maintenance.
IEEE Access, 2022
2018
Reliab. Eng. Syst. Saf., 2018
2013
Proceedings of the Handbook on Neural Information Processing, 2013
Comput. Networks, 2013
Proceedings of the IEEE International Conference on Communications, 2013
2012
Automatically building datasets of labeled IP traffic traces: A self-training approach.
Appl. Soft Comput., 2012
2011
Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011
2010
Performance assessment of a distributed intrusion detection system in a real network scenario.
Proceedings of the CRiSIS 2010, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Inf. Fusion, 2009
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers.
Proceedings of the Image Analysis and Processing, 2009
2008
Proceedings of the Computer Recognition Systems 2, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
A Multiple Classifier System for Intrusion Detection Using Behavior Knowledge Spaces and Temporal Information.
Proceedings of the ICEIS Doctoral Consortium, 2006
2005
Evaluating Pattern Recognition Techniques in Intrusion Detection Systems.
Proceedings of the Pattern Recognition in Information Systems, 2005
Combining Genetic-Based Misuse and Anomaly Detection for Reliably Detecting Intrusions in Computer Networks.
Proceedings of the Image Analysis and Processing, 2005
Real Time Detection of Novel Attacks by Means of Data Mining Techniques.
Proceedings of the ICEIS 2005, 2005
Using Behavior Knowledge Space and Temporal Information for Detecting Intrusions in Computer Networks.
Proceedings of the Pattern Recognition and Image Analysis, 2005