Остановите войну!
for scientists:
default search action
Michele Pagano
- > Home > Persons > Michele Pagano
Publications
- 2014
- [j19]Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe:
Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence. Int. J. Commun. Syst. 27(10): 1731-1751 (2014) - 2013
- [c50]Christian Callegari, Alessandro Casella, Stefano Giordano, Michele Pagano, Teresa Pepe:
Sketch-based multidimensional IDS: A new approach for network anomaly detection. CNS 2013: 350-358 - [p3]Christian Callegari, Angelo Coluccia, Alessandro D'Alconzo, Wendy Ellens, Stefano Giordano, Michel Mandjes, Michele Pagano, Teresa Pepe, Fabio Ricciato, Piotr Zuraniewski:
A Methodological Overview on Anomaly Detection. Data Traffic Monitoring and Analysis 2013: 148-183 - 2012
- [j17]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Behavior analysis of TCP Linux variants. Comput. Networks 56(1): 462-476 (2012) - [j16]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis. Comput. Secur. 31(5): 727-735 (2012) - [j14]Davide Adami, Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Skype-Hunter: A real-time system for the detection and classification of Skype traffic. Int. J. Commun. Syst. 25(3): 386-403 (2012) - [j13]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods. Int. J. Sens. Networks 11(4): 205-214 (2012) - [c46]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
A Friendliness Study of TCP Linux Variants. CN 2012: 14-23 - [c45]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Combining wavelet analysis and CUSUM algorithm for network anomaly detection. ICC 2012: 1091-1095 - 2011
- [j12]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Combining sketches and wavelet analysis for multi time-scale network anomaly detection. Comput. Secur. 30(8): 692-704 (2011) - [c41]Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe:
A Novel PCA-Based Network Anomaly Detection. ICC 2011: 1-5 - [c40]Christian Callegari, Michele Pagano, Stefano Giordano, Teresa Pepe:
Combining wavelet analysis and information theory for network anomaly detection. ISABEL 2011: 69:1-69:5 - [c39]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Detecting Heavy Change in the Heavy Hitter distribution of network traffic. IWCMC 2011: 1298-1303 - [c38]Davide Adami, Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
A Behavioral Study of TCP Linux Variants over Satellite Networks. SAINT 2011: 474-479 - [c37]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Forecasting the Distribution of Network Traffic for Anomaly Detection. TrustCom 2011: 173-180 - 2010
- [j9]Davide Adami, Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Optimal design of Service Overlay Networks with economic and performance constraints. Int. J. Commun. Syst. 23(3): 369-389 (2010) - [c29]Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
On the use of sketches and wavelet analysis for network anomaly detection. IWCMC 2010: 331-335 - [c28]Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe:
Detecting Network Anomalies in Backbone Networks. RAID 2010: 490-491 - 2009
- [c22]Davide Adami, Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Topology Design for Service Overlay Networks with Economic and QoS Constraints. Networking 2009: 847-858 - [c21]Davide Adami, Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
A Real-Time Algorithm for Skype Traffic Detection and Classification. NEW2AN 2009: 168-179
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-01 23:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint