default search action
Claudio Mazzariello
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Lorenzo De Donato, Stefano Marrone, Francesco Flammini, Carlo Sansone, Valeria Vittorini, Roberto Nardone, Claudio Mazzariello, Frédéric Bernaudin:
Intelligent detection of warning bells at level crossings through deep transfer learning for smarter railway maintenance. Eng. Appl. Artif. Intell. 123(Part C): 106405 (2023) - 2022
- [j6]Lorenzo De Donato, Francesco Flammini, Stefano Marrone, Claudio Mazzariello, Roberto Nardone, Carlo Sansone, Valeria Vittorini:
A Survey on Audio-Video Based Defect Detection Through Deep Learning in Railway Maintenance. IEEE Access 10: 65376-65400 (2022)
2010 – 2019
- 2018
- [j5]Giovanni Mazzeo, Luigi Coppolino, Salvatore D'Antonio, Claudio Mazzariello, Luigi Romano:
SIL2 assessment of an Active/Standby COTS-based Safety-Related system. Reliab. Eng. Syst. Saf. 176: 125-134 (2018) - 2013
- [j4]S. Chiappetta, Claudio Mazzariello, Roberta Presta, Simon Pietro Romano:
An anomaly-based approach to the analysis of the social behavior of VoIP users. Comput. Networks 57(6): 1545-1559 (2013) - [c12]Francesco Carpine, Claudio Mazzariello, Carlo Sansone:
Online IRC botnet detection using a SOINN classifier. ICC Workshops 2013: 1351-1356 - [p2]Francesco Gargiulo, Claudio Mazzariello, Carlo Sansone:
Multiple Classifier Systems: Theory, Applications and Tools. Handbook on Neural Information Processing 2013: 335-378 - 2012
- [j3]Francesco Gargiulo, Claudio Mazzariello, Carlo Sansone:
Automatically building datasets of labeled IP traffic traces: A self-training approach. Appl. Soft Comput. 12(6): 1640-1649 (2012) - 2011
- [j2]Claudio Mazzariello, Paolo De Lutiis, Dario Lombardo:
Clustering NGN user behavior for anomaly detection. Inf. Secur. Tech. Rep. 16(1): 20-28 (2011) - [c11]Stefano Avallone, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano:
Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper). CRITIS 2011: 209-212 - 2010
- [c10]Claudio Mazzariello, Roberto Bifulco, Roberto Canonico:
Integrating a network IDS into an open source Cloud Computing environment. IAS 2010: 265-270 - [c9]Salvatore D'Antonio, Valerio Formicola, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano:
Performance assessment of a distributed intrusion detection system in a real network scenario. CRiSIS 2010: 1-8
2000 – 2009
- 2009
- [j1]Igino Corona, Giorgio Giacinto, Claudio Mazzariello, Fabio Roli, Carlo Sansone:
Information fusion for computer security: State of the art and open issues. Inf. Fusion 10(4): 274-284 (2009) - [c8]Claudio Mazzariello, Carlo Sansone:
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. ICIAP 2009: 883-892 - 2008
- [c7]Claudio Mazzariello:
IRC Traffic Analysis for Botnet Detection. IAS 2008: 318-323 - [p1]Francesco Gargiulo, Claudio Mazzariello, Carlo Sansone:
A Self-training Approach for Automatically Labeling IP Traffic Traces. Computer Recognition Systems 2 2008: 705-717 - 2006
- [c6]Claudio Mazzariello, Carlo Sansone:
A Multiple Classifier System for Intrusion Detection Using Behavior Knowledge Spaces and Temporal Information. ICEIS Doctoral Consortium 2006: 16-23 - [c5]Claudio Mazzariello, Francesco Oliviero:
An Autonomic Intrusion Detection System Based on Behavioral Network Engineering. INFOCOM 2006 - 2005
- [c4]Luigi P. Cordella, I. Finizio, Claudio Mazzariello, Carlo Sansone:
Using Behavior Knowledge Space and Temporal Information for Detecting Intrusions in Computer Networks. ICAPR (2) 2005: 94-102 - [c3]Marcello Esposito, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano, Carlo Sansone:
Real Time Detection of Novel Attacks by Means of Data Mining Techniques. ICEIS (3) 2005: 120-127 - [c2]I. Finizio, Claudio Mazzariello, Carlo Sansone:
Combining Genetic-Based Misuse and Anomaly Detection for Reliably Detecting Intrusions in Computer Networks. ICIAP 2005: 66-74 - [c1]Marcello Esposito, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano, Carlo Sansone:
Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. PRIS 2005: 144-153
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 00:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint