DI MAURO, MARIO
 Distribuzione geografica
Continente #
NA - Nord America 1.595
EU - Europa 949
AS - Asia 678
SA - Sud America 72
AF - Africa 10
Continente sconosciuto - Info sul continente non disponibili 5
Totale 3.309
Nazione #
US - Stati Uniti d'America 1.585
IT - Italia 408
SG - Singapore 221
RU - Federazione Russa 220
VN - Vietnam 179
CN - Cina 174
DE - Germania 69
BR - Brasile 65
UA - Ucraina 63
IE - Irlanda 61
SE - Svezia 35
TR - Turchia 32
KR - Corea 19
NL - Olanda 19
AT - Austria 18
FI - Finlandia 18
GB - Regno Unito 15
HK - Hong Kong 14
IN - India 12
CA - Canada 10
JP - Giappone 7
FR - Francia 5
CZ - Repubblica Ceca 4
EU - Europa 4
ID - Indonesia 4
NG - Nigeria 4
ES - Italia 3
IR - Iran 3
JO - Giordania 3
MA - Marocco 3
RO - Romania 3
AR - Argentina 2
BD - Bangladesh 2
EE - Estonia 2
LB - Libano 2
PK - Pakistan 2
PL - Polonia 2
PY - Paraguay 2
ZA - Sudafrica 2
A1 - Anonimo 1
AE - Emirati Arabi Uniti 1
AL - Albania 1
BE - Belgio 1
BG - Bulgaria 1
EC - Ecuador 1
IL - Israele 1
IQ - Iraq 1
NO - Norvegia 1
PH - Filippine 1
SN - Senegal 1
UY - Uruguay 1
VE - Venezuela 1
Totale 3.309
Città #
Ann Arbor 407
Dong Ket 177
Chandler 176
Princeton 148
Woodbridge 141
Salerno 124
Jacksonville 97
Houston 90
Singapore 88
Wilmington 88
Dublin 55
Ashburn 52
Beijing 42
Moscow 36
Izmir 30
Andover 27
Nanjing 25
Naples 25
Dearborn 19
Boardman 18
Napoli 18
Amsterdam 16
Milan 16
Nuremberg 15
Pellezzano 15
Hong Kong 13
Vienna 11
Changsha 10
Macerata Campania 10
Norwalk 10
Mestre 9
Dallas 8
Fairfield 8
Seattle 8
Shenyang 8
Lappeenranta 7
Palermo 7
The Dalles 7
Nürnberg 6
Ottawa 6
Redwood City 6
Rome 6
Arienzo 5
Council Bluffs 5
Düsseldorf 5
Hebei 5
Jiaxing 5
Los Angeles 5
Perugia 5
Pune 5
Tokyo 5
Assago 4
Brno 4
Guangzhou 4
Munich 4
Nanchang 4
Santa Clara 4
Sarno 4
Washington 4
Zaria 4
Amman 3
Bandar Lampung 3
Belo Horizonte 3
Bolzano 3
Domicella 3
Fisciano 3
Guagnano 3
London 3
Rimini 3
San Diego 3
Shanghai 3
Tianjin 3
Zhengzhou 3
Anzio 2
Basingstoke 2
Bologna 2
Cambridge 2
Candiolo 2
Canoas 2
Chennai 2
Ciudad del Este 2
Contagem 2
Costa Mesa 2
Groningen 2
Grumello Cremonese 2
Guarulhos 2
Helsinki 2
Horia 2
Indiana 2
Jinan 2
Lahore 2
Manassas 2
Nagold 2
Nocera Inferiore 2
Ottaviano 2
Palma Campania 2
Pioltello 2
Redmond 2
Rio de Janeiro 2
Roccadaspide 2
Totale 2.259
Nome #
Availability evaluation of the virtualized infrastructure manager in network function virtualization environments 140
An Indoor Localization System within an IMS Service Infrastructure 133
A Localization Architecture for Indoor Parking Areas 126
A fusion architecture for mobile threats detection 121
Revealing Encrypted WebRTC Traffic via Machine Learning Tools 120
Reliability analysis of the controller architecture in software defined networks 112
An architecture for threats detection in mobile operators networks 108
Botnet Identification in Randomized DDoS Attacks 105
Data fusion strategies for mobile threats detection 104
A WLAN-Based Location System for Indoor Parking Areas 101
A Decision Theory Based Tool for Detection of Encrypted WebRTC Traffic 97
Object Storage in Cloud Computing Environments: An Availability Analysis 97
Skype traffic detection: a decision theory based tool 91
Software Defined Storage: availability modeling and sensitivity analysis 91
Availability Modeling and Evaluation of a Network Service Deployed via NFV 86
Availability evaluation of a virtualized IP multimedia subsystem for 5G network architectures 84
ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP 83
Availability modeling of a virtualized IP multimedia subsystem using non-Markovian stochastic reward nets 82
Performability Evaluation of Software Defined Networking Infrastructures 82
Service Function Chaining deployed in an NFV environment: an availability modeling 75
Availability Evaluation of Multi-Tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function 73
Availability Assessment of IP Multimedia Subsystem in an NFV-based Environment 66
DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies 64
Adversarial Detection of Concealed VoIP Traffic 62
Availability Analysis of IP Multimedia Subsystem in Cloud Environments 54
Automated Generation of Availability Models for SFCs: The case of Virtualized IP Multimedia Subsystem 53
Botnet Identification in DDoS Attacks with Multiple Emulation Dictionaries 48
IP Multimedia Subsystem in an NFV environment: availability evaluation and sensitivity analysis 47
Supervised feature selection techniques in network intrusion detection: A critical review 43
A Tool for Automated Generation of Availability Models for Service Function Chains 39
Steady-state Availability Evaluation of Multi-Tenant Service Chains 38
Performability Management of Softwarized IP Multimedia Subsystem 37
Comparative Performability Assessment of SFCs: The case of Containerized IP Multimedia Subsystem 37
Adversarial Kendall's Model towards Containment of Distributed Cyber-Threats 36
Multi-Provider IMS Infrastructure with Controlled Redundancy: A Performability Evaluation 35
Botnet Identification in Multi-Clustered DDoS Attacks 34
Speeding Up Subjective Video Quality Assessment via Hybrid Active Learning 33
Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF 33
Application-layer DDoS attacks with multiple emulation dictionaries 33
A Latency-driven Availability Assessment for Multi-Tenant Service Chains 30
A REST-compliant Tool for Performability Management of SFCs 30
Multivariate Time Series characterization and forecasting of VoIP traffic in real mobile networks 29
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem 27
Statistical Characterization of Containerized IP Multimedia Subsystem through Queueing Networks 27
A WNN-Based Approach for Network Intrusion Detection 26
IP Multimedia Subsystem in a containerized environment: availability and sensitivity evaluation 26
A REST-Based Framework for Performability Management of Service Function Chains 24
Performability analysis of containerized IMS through queueing networks and stochastic models 24
Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model 24
Unsupervised Underwater Image Enhancement Combining Imaging Restoration and Prompt Learning 23
CYBER-THREAT PROPAGATION OVER NETWORK-SLICING ARCHITECTURES 23
Efficient Subjective Video Quality Assessment Based on Active Learning and Clustering 22
Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture 21
HASFC: a MANO-compliant Framework for Availability Management of Service Chains 20
Hybrid learning strategies for multivariate time series forecasting of network quality metrics 19
Exploring Evaluation Metrics for Binary Classification in Data Analysis: the Worthiness Benchmark Concept 17
Smart anomaly detection in sensor systems: A multi-perspective review 17
SISTEMA DI TELECOMUNICAZIONE PER PERSONE CON DEFICIT UDITIVI 16
Worthiness Benchmark: A novel concept for analyzing binary classification evaluation metrics 16
Experimental Review of Neural-Based Approaches for Network Intrusion Management 16
A performance evaluation of WebRTC over LTE 14
Critical Comparison of Data Imputation Techniques at IoT Edge 14
An Experimental Evaluation and Characterization of VoIP over an LTE-A Network 13
Multiple Cyber-Threats Containment via Kendall's Birth-Death-Immigration Model 13
Performability of Service Chains with Rejuvenation: A Multidimensional Universal Generating Function Approach 12
Performance and Availability Challenges in Designing Resilient 5G Architectures 11
A framework for Internet data real-time processing: A machine-learning approach 11
Evaluating Recurrent Neural Networks for prediction of Multi- Variate time series VoIP metrics 10
An AI Approach to Collecting and Analyzing Human Interactions with Urban Environments 10
Embedded data imputation for environmental intelligent sensing: A case study 8
Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: A Queueing Networks Approach 7
Sicurezza nelle comunicazioni su rete. Dai princìpi fondamentali ai paradigmi di nuova generazione, con esempi ed applicazioni pratiche. Con Contenuto digitale per accesso on line 5
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection 3
Totale 3.511
Categoria #
all - tutte 14.834
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 14.834


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202063 0 0 0 0 0 0 0 0 0 0 45 18
2020/2021400 23 14 26 12 19 20 27 0 48 5 20 186
2021/2022288 7 0 0 5 14 7 7 15 31 33 31 138
2022/2023434 42 45 17 43 40 92 9 40 57 4 24 21
2023/2024299 20 30 16 7 30 47 17 10 13 26 15 68
2024/2025805 29 21 30 88 19 99 234 87 151 44 3 0
Totale 3.511