Mario Di Mauro

Orcid: 0000-0001-6574-2601

According to our database1, Mario Di Mauro authored at least 61 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Performance and Availability Challenges in Designing Resilient 5G Architectures.
IEEE Trans. Netw. Serv. Manag., October, 2024

Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture.
Computing, August, 2024

Multivariate Time Series Characterization and Forecasting of VoIP Traffic in Real Mobile Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024

Worthiness Benchmark: A novel concept for analyzing binary classification evaluation metrics.
Inf. Sci., 2024

Hybrid learning strategies for multivariate time series forecasting of network quality metrics.
Comput. Networks, 2024

Unsupervised Underwater Image Enhancement Combining Imaging Restoration and Prompt Learning.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Evaluating Recurrent Neural Networks for prediction of Multi- Variate time series VoIP metrics.
Proceedings of the 22nd Mediterranean Communication and Computer Networking Conference, 2024

Exploring Evaluation Metrics for Binary Classification in Data Analysis: the Worthiness Benchmark Concept.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2024

2023
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation.
IEEE Trans. Netw. Serv. Manag., December, 2023

Speeding Up Subjective Video Quality Assessment via Hybrid Active Learning.
IEEE Trans. Broadcast., March, 2023

A Latency-Driven Availability Assessment for Multi-Tenant Service Chains.
IEEE Trans. Serv. Comput., 2023

A REST-Based Framework for Performability Management of Service Function Chains.
Proceedings of the 13th International Workshop on Resilient Networks Design and Modeling, 2023

Relative Information Superiority (RIS): a Novel Evaluation Measure for Binary Rule-Based Classification Models.
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023

2022
Multivariate time series prediction of cellular traffic via Machine Learning.
Dataset, October, 2022

Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem.
IEEE Trans. Dependable Secur. Comput., 2022

Performability Analysis of Containerized IMS through Queueing Networks and Stochastic Models.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Efficient Subjective Video Quality Assessment Based on Active Learning and Clustering.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2022

Cyber-Threat Propagation over Network-Slicing Architectures.
Proceedings of the IEEE International Conference on Acoustics, 2022

Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
Availability Evaluation of Multi-Tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function.
IEEE Trans. Serv. Comput., 2021

Comparative Performability Assessment of SFCs: The Case of Containerized IP Multimedia Subsystem.
IEEE Trans. Netw. Serv. Manag., 2021

Botnet Identification in DDoS Attacks With Multiple Emulation Dictionaries.
IEEE Trans. Inf. Forensics Secur., 2021

Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats.
IEEE Trans. Inf. Forensics Secur., 2021

Embedded Data Imputation for Environmental Intelligent Sensing: A Case Study.
Sensors, 2021

Smart anomaly detection in sensor systems: A multi-perspective review.
Inf. Fusion, 2021

Supervised feature selection techniques in network intrusion detection: A critical review.
Eng. Appl. Artif. Intell., 2021

HASFC: A MANO-Compliant Framework for Availability Management of Service Chains.
IEEE Commun. Mag., 2021

A WNN-Based Approach for Network Intrusion Detection.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Critical Comparison of Data Imputation Techniques at IoT Edge.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Application-Layer DDOS Attacks with Multiple Emulation Dictionaries.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
An Experimental Evaluation and Characterization of VoIP Over an LTE-A Network.
IEEE Trans. Netw. Serv. Manag., 2020

Experimental Review of Neural-Based Approaches for Network Intrusion Management.
IEEE Trans. Netw. Serv. Manag., 2020

ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP.
IEEE Trans. Inf. Forensics Secur., 2020

Smart Anomaly Detection in Sensor Systems.
CoRR, 2020

Performability Management of Softwarized IP Multimedia Subsystem.
Proceedings of the NOMS 2020, 2020

Automated Generation of Availability Models for SFCs: The case of Virtualized IP Multimedia Subsystem.
Proceedings of the NOMS 2020, 2020

Statistical Characterization of Containerized IP Multimedia Subsystem through Queueing Networks.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

2019
Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: A Queueing Networks Approach.
IEEE Trans. Netw. Serv. Manag., 2019

An AI Approach to Collecting and Analyzing Human Interactions With Urban Environments.
IEEE Access, 2019

IP Multimedia Subsystem in a containerized environment: availability and sensitivity evaluation.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Availability Analysis of IP Multimedia Subsystem in Cloud Environments.
Proceedings of the 4th International Conference on System Reliability and Safety, 2019

Adversarial Detection of Concealed VoIP Traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model.
IEEE Trans. Inf. Forensics Secur., 2018

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection.
J. Inf. Secur. Appl., 2018

IP Multimedia Subsystem in an NFV environment: availability evaluation and sensitivity analysis.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies.
IEEE Trans. Inf. Forensics Secur., 2017

Availability Modeling and Evaluation of a Network Service Deployed via NFV.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

Software defined storage: Availability modeling and sensitivity analysis.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Object Storage in Cloud Computing Environments: An Availability Analysis.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Botnet identification in multi-clustered DDoS attacks.
Proceedings of the 25th European Signal Processing Conference, 2017

Service function chaining deployed in an NFV environment: An availability modeling.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017

2016
A performance evaluation of WebRTC over LTE.
Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services, 2016

Performability Evaluation of Software Defined Networking Infrastructures.
Proceedings of the 10th EAI International Conference on Performance Evaluation Methodologies and Tools, 2016

Botnet identification in randomized DDoS attacks.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
Revealing Encrypted WebRTC Traffic via Machine Learning Tools.
Proceedings of the SECRYPT 2015, 2015

A decision theory based tool for detection of encrypted WebRTC traffic.
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015

2014
A framework for Internet data real-time processing: A machine-learning approach.
Proceedings of the International Carnahan Conference on Security Technology, 2014

Skype traffic detection: A decision theory based tool.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
An Indoor Localization System within an IMS Service Infrastructure.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

2011
An architecture for threats detection in mobile operators networks.
Proceedings of the 19th International Conference on Software, 2011


  Loading...