Resources
Conference Speaker (Selected Talks)
- IEEE MedComNet 2024 Evaluating Recurrent Neural Networks for prediction of Multi-Variate time series VoIP metrics
- POSTER@VALUETOOLS 2023 A REST-compliant Tool for Performability Management of SFCs
- TUTORIAL @ NETSOFT 2022 Availability of Softwarized Networks: from Theory to Practice
- IEEE CNSM 2022 (Thessaloniki - Greece) Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF
- IEEE NOMS 2022 (virtual conf.) Performability Analysis of Containerized IMS through Queueing Networks and Stochastic Models
- IEEE ICASSP 2022 (virtual conf.) Cyber-Threat Propagation over Network-Slicing Architectures
- IDC 2021 (virtual conf.) A WNN-based approach for Network Intrusion Detection
- IEEE ICASSP 2021 (virtual conf.) Application-layer DDoS Attacks with Multiple Emulation Dictionaries
- IEEE NOMS 2020 (virtual conf.) Performability Management of Softwarized IP Multimedia Subsystem
- IEEE NETSOFT 2020 (virtual conf.) Statistical Characterization of Containerized IP Multimedia Subsystem through Queueing Networks
- IEEE NETSOFT 2019 (Paris - France) IP Multimedia Subsystem in a Containerized Environment: Availability and Sensitivity Evaluation
- IEEE NFV-SDN 2018 (Verona - Italy) IP Multimedia Subsystem in an NFV environment: availability evaluation and sensitivity analysis
- IEEE EUSIPCO 2018 (Rome - Italy) Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model
- IEEE CSCN 2017 (Helsinki – Finland) Service Function Chaining deployed in an NFV environment: an availability modelling
- Springer GPC 2017 (Cetara – Italy) Object Storage in Cloud Computing environments: an availability analysis
- IEEE WONS 2016 (Cortina D’Ampezzo – Italy) A Performance Evaluation of WebRTC over LTE
- ESREL 2016 (Glasgow – Scotland) Availability Evaluation of the Virtualized Infrastructure Manager in Network Function Virtualization Environments
- SECRYPT 2015 (Colmar - Alsace) Revealing Encrypted WebRTC traffic via Machine Learning tools
- IEEE ICIN 2015 (Paris – France) A Decision Theory Based Tool for Detection of Encrypted WebRTC Traffic
- ICWMCS 2014 (Lisbon – Portugal) A fusion architecture for mobile threats detection
- ACM MoMM 2013 (Wien - Austria) An Indoor Localization System within an IMS Service Infrastructure
Invited Speaker (Italian Technical Events)
- Engineer Professional Chamber of Salerno (Italy, 2021) 5G Security
- National Engineer Professional Chamber (Italy, 2020) Network Security
- SellaLab/Microsoft event (Italy, 2019) Cloud and Cybersecurity
- Engineer Professional Chamber of Napoli (Italy, 2016) System and network security
- Engineer Professional Chamber of Salerno (Italy, 2016) Internet of Things and security aspects
Available Material
- Dataset and code exploited in the article Hybrid learning strategies for multivariate time series forecasting of network quality metrics, Computer Networks 2024 (Di Mauro et al.) Network Traffic Forecasting via Statistical/Deep Learning strategies
- Dataset and code exploited in the article Multivariate Time Series characterization and forecasting of VoIP traffic in real mobile networks, IEEE TNSM 2023 (Di Mauro et al.) Network Traffic Forecasting
- Instructions to build the HASFC framework available in the article "HASFC: a MANO-compliant Framework for Availability Management of Service Chains", IEEE Comm. Mag. 2021 (Di Mauro et al.) HASFC Framework
- Part of Datasets used for the articles: "Experimental review of neural-based approaches for network intrusion management", IEEE TNSM 2020 (Di Mauro et al.), and "Supervised feature selection techniques in network intrusion detection: A critical review", Eng. Appl. of Artif. Intell. 2021 (Di Mauro et al.) Classification Data
- Datasets collected and exploited in the article "An experimental evaluation and characterization of VoIP over an LTE-A network”, IEEE TNSM 2020 (Di Mauro et al.) LTE-A Data