


default search action
Mario Di Mauro
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Mario Di Mauro
, Giovanni Galatro, Fabio Postiglione, Wei Song, Antonio Liotta:
Hybrid learning strategies for multivariate time series forecasting of network quality metrics. Comput. Networks 243: 110286 (2024) - [j24]Iure Fé, Tuan Anh Nguyen
, Mario Di Mauro
, Fabio Postiglione, Alex Ramos, André Soares, Eunmi Choi, Dugki Min, Jae-Woo Lee, Francisco Airton Silva:
Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture. Computing 106(8): 2737-2783 (2024) - [j23]Mohammad Shirdel, Mario Di Mauro
, Antonio Liotta
:
Worthiness Benchmark: A novel concept for analyzing binary classification evaluation metrics. Inf. Sci. 678: 120882 (2024) - [j22]Mario Di Mauro
, Giovanni Galatro
, Fabio Postiglione
, Wei Song
, Antonio Liotta
:
Multivariate Time Series Characterization and Forecasting of VoIP Traffic in Real Mobile Networks. IEEE Trans. Netw. Serv. Manag. 21(1): 851-865 (2024) - [j21]Luigi De Simone
, Mario Di Mauro
, Roberto Natella
, Fabio Postiglione
:
Performance and Availability Challenges in Designing Resilient 5G Architectures. IEEE Trans. Netw. Serv. Manag. 21(5): 5291-5303 (2024) - [c35]Mohammad Shirdel, Mario Di Mauro
, Antonio Liotta:
Exploring Evaluation Metrics for Binary Classification in Data Analysis: the Worthiness Benchmark Concept. DaWaK 2024: 120-125 - [c34]Mario Di Mauro
, Giovanni Galatro, Fabio Postiglione, Wei Song, Antonio Liotta:
Evaluating Recurrent Neural Networks for prediction of Multi- Variate time series VoIP metrics. MedComNet 2024: 1-8 - [c33]Wei Song, Chengbing Liu, Mario Di Mauro
, Antonio Liotta:
Unsupervised Underwater Image Enhancement Combining Imaging Restoration and Prompt Learning. PRCV (2) 2024: 421-434 - [c32]Luigi De Simone, Mario Di Mauro, Roberto Natella, Fabio Postiglione:
Performability Evaluation of Softwarized Multi-Tenant 5G Architectures with Rejuvenation. RNDM 2024: 1-6 - 2023
- [j20]Xiaochen Liu
, Wei Song
, Qi He, Mario Di Mauro
, Antonio Liotta
:
Speeding Up Subjective Video Quality Assessment via Hybrid Active Learning. IEEE Trans. Broadcast. 69(1): 165-178 (2023) - [j19]Luigi De Simone
, Mario Di Mauro
, Maurizio Longo
, Roberto Natella
, Fabio Postiglione
:
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation. IEEE Trans. Netw. Serv. Manag. 20(4): 3984-3998 (2023) - [j18]Luigi De Simone
, Mario Di Mauro
, Roberto Natella
, Fabio Postiglione
:
A Latency-Driven Availability Assessment for Multi-Tenant Service Chains. IEEE Trans. Serv. Comput. 16(2): 815-829 (2023) - [c31]Mohammad Shirdel, Mario Di Mauro, Antonio Liotta:
Relative Information Superiority (RIS): a Novel Evaluation Measure for Binary Rule-Based Classification Models. EWSN 2023: 84-89 - [c30]Mario Di Mauro
, Giovanni Galatro, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
A REST-Based Framework for Performability Management of Service Function Chains. RNDM 2023: 1-6 - [e1]Diego Lopez, Marie-José Montpetit, Walter Cerroni, Mario Di Mauro, Piotr Borylo:
26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023, Paris, France, March 6-9, 2023. IEEE 2023, ISBN 979-8-3503-9804-5 [contents] - [i12]Mario Di Mauro, Giovanni Galatro, Fabio Postiglione, Wei Song, Antonio Liotta:
Multivariate Time Series characterization and forecasting of VoIP traffic in real mobile networks. CoRR abs/2307.06645 (2023) - 2022
- [j17]Mario Di Mauro
, Giovanni Galatro
, Fabio Postiglione
, Marco Tambasco
:
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem. IEEE Trans. Dependable Secur. Comput. 19(5): 3071-3086 (2022) - [c29]Luigi De Simone
, Mario Di Mauro
, Maurizio Longo, Roberto Natella, Fabio Postiglione
:
Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF. CNSM 2022: 145-153 - [c28]Michele Cirillo, Mario Di Mauro
, Vincenzo Matta, Giuseppe Basileo:
Cyber-Threat Propagation over Network-Slicing Architectures. ICASSP 2022: 2984-2988 - [c27]Xiaochen Liu
, Wei Song
, Wenbo Zhang
, Mario Di Mauro
, Antonio Liotta
:
Efficient Subjective Video Quality Assessment Based on Active Learning and Clustering. MoMM 2022: 47-56 - [c26]Mario Di Mauro
, Giovanni Galatro, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
Performability Analysis of Containerized IMS through Queueing Networks and Stochastic Models. NOMS 2022: 1-8 - [d1]Mario Di Mauro:
Multivariate time series prediction of cellular traffic via Machine Learning. IEEE DataPort, 2022 - [i11]Luigi De Simone, Mario Di Mauro, Roberto Natella, Fabio Postiglione:
A Latency-driven Availability Assessment for Multi-Tenant Service Chains. CoRR abs/2208.12770 (2022) - 2021
- [j16]Mario Di Mauro
, Giovanni Galatro
, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
HASFC: A MANO-Compliant Framework for Availability Management of Service Chains. IEEE Commun. Mag. 59(6): 52-58 (2021) - [j15]Mario Di Mauro
, Giovanni Galatro
, Giancarlo Fortino, Antonio Liotta
:
Supervised feature selection techniques in network intrusion detection: A critical review. Eng. Appl. Artif. Intell. 101: 104216 (2021) - [j14]Laura Erhan
, Maryleen U. Ndubuaku
, Mario Di Mauro
, Wei Song, Min Chen, Giancarlo Fortino, Ovidiu Bagdasar
, Antonio Liotta
:
Smart anomaly detection in sensor systems: A multi-perspective review. Inf. Fusion 67: 64-79 (2021) - [j13]Laura Erhan
, Mario Di Mauro
, Ashiq Anjum, Ovidiu Bagdasar
, Wei Song
, Antonio Liotta
:
Embedded Data Imputation for Environmental Intelligent Sensing: A Case Study. Sensors 21(23): 7774 (2021) - [j12]Michele Cirillo
, Mario Di Mauro
, Vincenzo Matta
, Marco Tambasco:
Botnet Identification in DDoS Attacks With Multiple Emulation Dictionaries. IEEE Trans. Inf. Forensics Secur. 16: 3554-3569 (2021) - [j11]Paolo Addesso
, Mauro Barni
, Mario Di Mauro
, Vincenzo Matta
:
Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats. IEEE Trans. Inf. Forensics Secur. 16: 3604-3619 (2021) - [j10]Mario Di Mauro
, Giovanni Galatro
, Maurizio Longo
, Fabio Postiglione
, Marco Tambasco:
Comparative Performability Assessment of SFCs: The Case of Containerized IP Multimedia Subsystem. IEEE Trans. Netw. Serv. Manag. 18(1): 258-272 (2021) - [j9]Mario Di Mauro
, Maurizio Longo
, Fabio Postiglione
:
Availability Evaluation of Multi-Tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function. IEEE Trans. Serv. Comput. 14(5): 1320-1332 (2021) - [c25]Michele Cirillo, Mario Di Mauro
, Vincenzo Matta, Marco Tambasco:
Application-Layer DDOS Attacks with Multiple Emulation Dictionaries. ICASSP 2021: 2610-2614 - [c24]Laura Erhan, Mario Di Mauro
, Ovidiu Bagdasar
, Antonio Liotta:
Critical Comparison of Data Imputation Techniques at IoT Edge. IDC 2021: 35-43 - [c23]Mario Di Mauro
, Giovanni Galatro, Antonio Liotta:
A WNN-Based Approach for Network Intrusion Detection. IDC 2021: 79-88 - [i10]Mario Di Mauro, Giovanni Galatro, Giancarlo Fortino, Antonio Liotta:
Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review. CoRR abs/2104.04958 (2021) - [i9]Mario Di Mauro, Giovanni Galatro, Maurizio Longo, Fabio Postiglione, Marco Tambasco:
HASFC: a MANO-compliant Framework for Availability Management of Service Chains. CoRR abs/2104.10135 (2021) - [i8]Mario Di Mauro, Giovanni Galatro, Fabio Postiglione, Marco Tambasco:
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem. CoRR abs/2105.09004 (2021) - 2020
- [j8]Paolo Addesso
, Michele Cirillo
, Mario Di Mauro
, Vincenzo Matta
:
ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP. IEEE Trans. Inf. Forensics Secur. 15: 943-958 (2020) - [j7]Mario Di Mauro
, Antonio Liotta
:
An Experimental Evaluation and Characterization of VoIP Over an LTE-A Network. IEEE Trans. Netw. Serv. Manag. 17(3): 1626-1639 (2020) - [j6]Mario Di Mauro
, Giovanni Galatro
, Antonio Liotta
:
Experimental Review of Neural-Based Approaches for Network Intrusion Management. IEEE Trans. Netw. Serv. Manag. 17(4): 2480-2495 (2020) - [c22]Mario Di Mauro
, Antonio Liotta, Maurizio Longo, Fabio Postiglione
:
Statistical Characterization of Containerized IP Multimedia Subsystem through Queueing Networks. NetSoft 2020: 100-105 - [c21]Mario Di Mauro
, Giovanni Galatro, Maurizio Longo, Arcangelo Palma, Fabio Postiglione
, Marco Tambasco:
Automated Generation of Availability Models for SFCs: The case of Virtualized IP Multimedia Subsystem. NOMS 2020: 1-6 - [c20]Mario Di Mauro
, Giovanni Galatro, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
Performability Management of Softwarized IP Multimedia Subsystem. NOMS 2020: 1-6 - [i7]Mario Di Mauro, Giovanni Galatro, Antonio Liotta:
Experimental Review of Neural-based approaches for Network Intrusion Management. CoRR abs/2009.09011 (2020) - [i6]Mario Di Mauro, Antonio Liotta:
An experimental evaluation and characterization of VoIP over an LTE-A network. CoRR abs/2009.12580 (2020) - [i5]Mario Di Mauro, Maurizio Longo, Fabio Postiglione:
Availability Evaluation of Multi-tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function. CoRR abs/2009.13141 (2020) - [i4]Mario Di Mauro, Antonio Liotta:
Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach. CoRR abs/2009.13149 (2020) - [i3]Laura Erhan, Maryleen U. Ndubuaku, Mario Di Mauro, Wei Song, Min Chen, Giancarlo Fortino, Ovidiu Bagdasar, Antonio Liotta:
Smart Anomaly Detection in Sensor Systems. CoRR abs/2010.14946 (2020)
2010 – 2019
- 2019
- [j5]Enrico Ferrara
, Luigi Fragale, Giancarlo Fortino, Wei Song
, Cristian Perra, Mario Di Mauro
, Antonio Liotta
:
An AI Approach to Collecting and Analyzing Human Interactions With Urban Environments. IEEE Access 7: 141476-141486 (2019) - [j4]Mario Di Mauro
, Antonio Liotta
:
Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: A Queueing Networks Approach. IEEE Trans. Netw. Serv. Manag. 16(4): 1493-1506 (2019) - [c19]Paolo Addesso, Michele Cirillo, Mario Di Mauro
, Maurizio Longo, Vincenzo Matta:
Adversarial Detection of Concealed VoIP Traffic. ICNC 2019: 437-441 - [c18]Mario Di Mauro
, Giovanni Galatro, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
Availability Analysis of IP Multimedia Subsystem in Cloud Environments. ICSRS 2019: 111-115 - [c17]Mario Di Mauro
, Giovanni Galatro, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
IP Multimedia Subsystem in a containerized environment: availability and sensitivity evaluation. NetSoft 2019: 42-47 - 2018
- [j3]Mario Di Mauro
, Cesario Di Sarno:
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection. J. Inf. Secur. Appl. 38: 85-95 (2018) - [j2]Vincenzo Matta
, Mario Di Mauro
, Maurizio Longo
, Alfonso Farina:
Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model. IEEE Trans. Inf. Forensics Secur. 13(12): 3137-3152 (2018) - [c16]Vincenzo Matta, Mario Di Mauro
, Maurizio Longo, Alfonso Farina:
Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model. EUSIPCO 2018: 2554-2558 - [c15]Mario Di Mauro
, Giovanni Galatro, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
IP Multimedia Subsystem in an NFV environment: availability evaluation and sensitivity analysis. NFV-SDN 2018: 1-6 - 2017
- [j1]Vincenzo Matta
, Mario Di Mauro
, Maurizio Longo:
DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies. IEEE Trans. Inf. Forensics Secur. 12(8): 1844-1859 (2017) - [c14]Mario Di Mauro
, Maurizio Longo, Fabio Postiglione
, Giuliana Carullo, Marco Tambasco:
Service function chaining deployed in an NFV environment: An availability modeling. CSCN 2017: 42-47 - [c13]Vincenzo Matta, Mario Di Mauro
, Maurizio Longo:
Botnet identification in multi-clustered DDoS attacks. EUSIPCO 2017: 2171-2175 - [c12]Giuliana Carullo, Mario Di Mauro
, Michele Galderisi, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
Object Storage in Cloud Computing Environments: An Availability Analysis. GPC 2017: 178-190 - [c11]Mario Di Mauro, Maurizio Longo, Fabio Postiglione
, Giuliana Carullo, Marco Tambasco:
Software defined storage: Availability modeling and sensitivity analysis. SPECTS 2017: 1-7 - [c10]Mario Di Mauro
, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
Availability Modeling and Evaluation of a Network Service Deployed via NFV. TIWDC 2017: 31-44 - [i2]Mario Di Mauro, Cesario Di Sarno:
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection. CoRR abs/1711.00524 (2017) - 2016
- [c9]Vincenzo Matta, Mario Di Mauro
, Maurizio Longo:
Botnet identification in randomized DDoS attacks. EUSIPCO 2016: 2260-2264 - [c8]Mario Di Mauro
, Maurizio Longo, Fabio Postiglione
:
Performability Evaluation of Software Defined Networking Infrastructures. VALUETOOLS 2016 - [c7]Giuliana Carullo, Marco Tambasco, Mario Di Mauro, Maurizio Longo:
A performance evaluation of WebRTC over LTE. WONS 2016: 170-175 - [i1]Vincenzo Matta, Mario Di Mauro, Maurizio Longo:
DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies. CoRR abs/1606.03986 (2016) - 2015
- [c6]Mario Di Mauro
, Maurizio Longo
:
A decision theory based tool for detection of encrypted WebRTC traffic. ICIN 2015: 89-94 - [c5]Mario Di Mauro
, Maurizio Longo:
Revealing Encrypted WebRTC Traffic via Machine Learning Tools. SECRYPT 2015: 259-266 - 2014
- [c4]Mario Di Mauro
, Maurizio Longo
:
Skype traffic detection: A decision theory based tool. ICCST 2014: 1-6 - [c3]Mario Di Mauro
, Cesario Di Sarno:
A framework for Internet data real-time processing: A machine-learning approach. ICCST 2014: 1-6 - 2013
- [c2]Paolo Addesso
, Mario Di Mauro
, Maurizio Longo
, G. Della Corte, Anton Luca Robustelli:
An Indoor Localization System within an IMS Service Infrastructure. MoMM 2013: 321 - 2011
- [c1]Mario Di Mauro, Roberto Garufi, Fabio Postiglione, Paolo Addesso, Rocco Restaino, Maurizio Longo, Andrea Senatore, Anton Luca Robustelli:
An architecture for threats detection in mobile operators networks. SoftCOM 2011: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 02:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint