Resources
Conference Speaker (Selected Talks)
- POSTER@VALUETOOLS 2023 A REST-compliant Tool for Performability Management of SFCs
- TUTORIAL @ NETSOFT 2022 Availability of Softwarized Networks: from Theory to Practice
- IEEE CNSM 2022 (Thessaloniki - Greece) Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF
- IEEE NOMS 2022 (virtual conf.) Performability Analysis of Containerized IMS through Queueing Networks and Stochastic Models
- IEEE ICASSP 2022 (virtual conf.) Cyber-Threat Propagation over Network-Slicing Architectures
- IDC 2021 (virtual conf.) A WNN-based approach for Network Intrusion Detection
- IEEE ICASSP 2021 (virtual conf.) Application-layer DDoS Attacks with Multiple Emulation Dictionaries
- IEEE NOMS 2020 (virtual conf.) Performability Management of Softwarized IP Multimedia Subsystem
- IEEE NETSOFT 2020 (virtual conf.) Statistical Characterization of Containerized IP Multimedia Subsystem through Queueing Networks
- IEEE NETSOFT 2019 (Paris - France) IP Multimedia Subsystem in a Containerized Environment: Availability and Sensitivity Evaluation
- IEEE NFV-SDN 2018 (Verona - Italy) IP Multimedia Subsystem in an NFV environment: availability evaluation and sensitivity analysis
- IEEE EUSIPCO 2018 (Rome - Italy) Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model
- IEEE CSCN 2017 (Helsinki – Finland) Service Function Chaining deployed in an NFV environment: an availability modelling
- Springer GPC 2017 (Cetara – Italy) Object Storage in Cloud Computing environments: an availability analysis
- IEEE WONS 2016 (Cortina D’Ampezzo – Italy) A Performance Evaluation of WebRTC over LTE
- ESREL 2016 (Glasgow – Scotland) Availability Evaluation of the Virtualized Infrastructure Manager in Network Function Virtualization Environments
- SECRYPT 2015 (Colmar - Alsace) Revealing Encrypted WebRTC traffic via Machine Learning tools
- IEEE ICIN 2015 (Paris – France) A Decision Theory Based Tool for Detection of Encrypted WebRTC Traffic
- ICWMCS 2014 (Lisbon – Portugal) A fusion architecture for mobile threats detection
- ACM MoMM 2013 (Wien - Austria) An Indoor Localization System within an IMS Service Infrastructure
Invited Speaker (Italian Technical Events)
- Engineer Professional Chamber of Salerno (Italy, 2021) 5G Security
- National Engineer Professional Chamber (Italy, 2020) Network Security
- SellaLab/Microsoft event (Italy, 2019) Cloud and Cybersecurity
- Engineer Professional Chamber of Napoli (Italy, 2016) System and network security
- Engineer Professional Chamber of Salerno (Italy, 2016) Internet of Things and security aspects
Available Material
- Dataset and code exploited in the article Multivariate Time Series characterization and forecasting of VoIP traffic in real mobile networks, IEEE TNSM 2023 (Di Mauro et al.) Network Traffic Forecasting
- Instructions to build the HASFC framework available in the article "HASFC: a MANO-compliant Framework for Availability Management of Service Chains", IEEE Comm. Mag. 2021 (Di Mauro et al.) HASFC Framework
- Part of Datasets used for the articles: "Experimental review of neural-based approaches for network intrusion management", IEEE TNSM 2020 (Di Mauro et al.), and "Supervised feature selection techniques in network intrusion detection: A critical review", Eng. Appl. of Artif. Intell. 2021 (Di Mauro et al.) Classification Data
- Datasets collected and exploited in the article "An experimental evaluation and characterization of VoIP over an LTE-A network”, IEEE TNSM 2020 (Di Mauro et al.) LTE-A Data