Mario Lemes Proença Jr.

Orcid: 0000-0002-0492-322X

Affiliations:
  • State University of Londrina, Paraná, Brazil


According to our database1, Mario Lemes Proença Jr. authored at least 72 papers between 2001 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Generative adversarial networks to detect intrusion and anomaly in IP flow-based networks.
Future Gener. Comput. Syst., 2025

2024
Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks.
J. Netw. Syst. Manag., October, 2024

Anomaly and intrusion detection using deep learning for software-defined networks: A survey.
Expert Syst. Appl., 2024

An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN.
IEEE Access, 2024

2023
Multiple voice disorders in the same individual: Investigating handcrafted features, multi-label classification algorithms, and base-learners.
Speech Commun., July, 2023

2022
Unsupervised online anomaly detection in Software Defined Network environments.
Expert Syst. Appl., 2022

A Gated Recurrent Unit Deep Learning Model to Detect and Mitigate Distributed Denial of Service and Portscan Attacks.
IEEE Access, 2022

2021
A GRU deep learning system against attacks in software defined networks.
J. Netw. Comput. Appl., 2021

Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments.
Future Gener. Comput. Syst., 2021

2020
Machine learning-based models for spectrum sensing in cooperative radio networks.
IET Commun., 2020

Near real-time security system applied to SDN environments in IoT networks using convolutional neural network.
Comput. Electr. Eng., 2020

Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks.
IEEE Access, 2020

Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network Environment.
IEEE Access, 2020

2019
A comprehensive survey on network anomaly detection.
Telecommun. Syst., 2019

Improved MB Cognitive Radio Spectrum Sensing Using Wavelet Spectrum Filtering.
J. Circuits Syst. Comput., 2019

Wavelet against random forest for anomaly mitigation in software-defined networking.
Appl. Soft Comput., 2019

2018
Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets.
ACM Trans. Multim. Comput. Commun. Appl., 2018

Improved weighted average consensus in distributed cooperative spectrum sensing networks.
Trans. Emerg. Telecommun. Technol., 2018

Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic.
Expert Syst. Appl., 2018

An ecosystem for anomaly detection and mitigation in software-defined networking.
Expert Syst. Appl., 2018

Fast Defense System Against Attacks in Software Defined Networks.
IEEE Access, 2018

2017
Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment.
Inf. Sci., 2017

Deep IP flow inspection to detect beyond network anomalies.
Comput. Commun., 2017

A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks.
IEEE Access, 2017

A novel anomaly detection system to assist network management in SDN environment.
Proceedings of the IEEE International Conference on Communications, 2017

2016
MobiCoop: An Incentive-Based Cooperation Solution for Mobile Applications.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization.
J. Netw. Comput. Appl., 2016

Account classification in online social networks with LBCA and wavelets.
Inf. Sci., 2016

Digital signature to help network management using flow analysis.
Int. J. Netw. Manag., 2016

Unsupervised learning clustering and self-organized agents applied to help network management.
Expert Syst. Appl., 2016

2015
Scorpius: sFlow Network Anomaly Simulator.
J. Comput. Sci., 2015

Autonomous profile-based anomaly detection system using principal component analysis and flow analysis.
Appl. Soft Comput., 2015

ACO and GA metaheuristics for anomaly detection.
Proceedings of the 34th International Conference of the Chilean Computer Science Society, 2015

Statistical, forecasting and metaheuristic techniques for network anomaly detection.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2014
A seven-dimensional flow analysis to help autonomous network management.
Inf. Sci., 2014

Digital Signature of Network Segment Using Flow Analysis through Genetic Algorithm and ACO Metaheuristics.
Proceedings of the 33rd International Conference of the Chilean Computer Science Society, 2014

Anomaly detection using digital signature of network segment with adaptive ARIMA model and Paraconsistent Logic.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Correlational paraconsistent machine for anomaly detection.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Anomaly Detection Using Metaheuristic Firefly Harmonic Clustering.
J. Networks, 2013

Using Ant Colony Optimization metaheuristic and Dynamic Time Warping for anomaly detection.
Proceedings of the 21st International Conference on Software, 2013

A hybrid approach for anomaly detection on large-scale networks using HWDS and entropy.
Proceedings of the 21st International Conference on Software, 2013

Anomaly Detection Using Forecasting Methods ARIMA and HWDS.
Proceedings of the 32nd International Conference of the Chilean Computer Science Society, 2013

Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study.
Proceedings of the 32nd International Conference of the Chilean Computer Science Society, 2013

A mobile health application for outpatients medication management.
Proceedings of IEEE International Conference on Communications, 2013

Digital signature to help network management using principal component analysis and K-means clustering.
Proceedings of IEEE International Conference on Communications, 2013

Holt-Winters statistical forecasting and ACO metaheuristic for traffic characterization.
Proceedings of IEEE International Conference on Communications, 2013

A mobile health application for falls detection and biofeedback monitoring.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Digital Signature of Network Segment using PCA, ACO and Holt-Winters for network management.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

A novel anomaly detection system based on seven-dimensional flow analysis.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Inference of network anomaly propagation using spatio-temporal correlation.
J. Netw. Comput. Appl., 2012

Hybrid heuristic-waterfilling game theory approach in MC-CDMA resource allocation.
Appl. Soft Comput., 2012

Ant Colony Optimization for Creating Digital Signature of Network Segments Using Flow Analysis.
Proceedings of the 31st International Conference of the Chilean Computer Science Society, 2012

Time Series Forecasting Methods for Creating Digital Signature of Network Segments Using Flow Analysis.
Proceedings of the 31st International Conference of the Chilean Computer Science Society, 2012

E-learning solutions for cloud environments.
Proceedings of the IEEE Latin America Conference on Cloud Computing and Communications, 2012

Digital Signature of Network Segment using Flow Analysis.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012

Moni4VDTN: A monitoring system for vehicular delay-tolerant networks.
Proceedings of IEEE International Conference on Communications, 2012

Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm.
Proceedings of IEEE International Conference on Communications, 2012

2011
A mobile health monitoring solution for weight control.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

Anomaly Detection using Firefly Harmonic Clustering Algorithm.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

2010
Power-Rate Allocation in DS/CDMA Based on Discretized Verhulst Equilibrium
CoRR, 2010

Power Allocation in Multirate DS/CDMA Systems Based on Verhulst Equilibrium.
Proceedings of IEEE International Conference on Communications, 2010

Networking Anomaly Detection Using DSNs and Particle Swarm Optimization with Re-Clustering.
Proceedings of the Global Communications Conference, 2010

2009
Parameterized Anomaly Detection System with Automatic Configuration.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Metrics Application in Metropolitan Broadband Access Network Security Analysis.
Proceedings of the SECRYPT 2008, 2008

Dependency graph to improve notifications' semantic on anomaly detection.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Anomaly Detection Using DSNS and a Dependency Graph for SNMP Objects.
Proceedings of the Fourth Advanced International Conference on Telecommunications, 2008

2007
Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment.
J. Netw. Syst. Manag., 2007

2006
Baseline to help with network management.
Proceedings of the e-Business and Telecommunication Networks, 2006

2005
Anomaly Detection for Network Servers Using Digital Signature of Network Segment.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2004
The Hurst Parameter for Digital Signature of Network Segment.
Proceedings of the Telecommunications and Networking, 2004

Baseline to Help with Network Management.
Proceedings of the ICETE 2004, 2004

2001
Cell Transfer Delay Monitoring in ATM Networks.
Proceedings of the 2nd Latin American Network Operations and Management Symposium, 2001


  Loading...