Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

A comprehensive survey on container resource allocation approaches in cloud computing: State-of-the-art and research challenges

VK Netaji, GP Bhole - Web Intelligence, 2021 - content.iospress.com
The allocation of resources in the cloud environment is efficient and vital, as it directly
impacts versatility and operational expenses. Containers, like virtualization technology, are …

[HTML][HTML] A method for fast selection of machine-learning classifiers for spam filtering

S Rapacz, P Chołda, M Natkaniec - Electronics, 2021 - mdpi.com
The paper elaborates on how text analysis influences classification—a key part of the spam-
filtering process. The authors propose a multistage meta-algorithm for checking classifier …

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

M Di Mauro, C Di Sarno - Journal of information security and applications, 2018 - Elsevier
Abstract Nowadays, the Security Information and Event Management (SIEM) systems take
on great relevance in handling security issues for critical infrastructures as Internet Service …

Revealing encrypted WebRTC traffic via machine learning tools

M Di Mauro, M Longo - … 12th international joint conference on e …, 2015 - ieeexplore.ieee.org
The detection of encrypted real-time traffic, both streaming and conversational, is an
increasingly important issue for agencies in charge of lawful interception. Aside from well …

Mass surveillance of VoIP calls in the data plane

EC Kirci, M Apostolaki, R Meier, A Singla… - Proceedings of the …, 2022 - dl.acm.org
Over the last decade, programmable data planes have enabled highly customizable and
efficient packet processing in commercial off-the-shelf hardware. Although researchers have …

Impact of hybridized rider optimization with cuckoo search algorithm on optimal VANET routing

TS Gnanasekar, D Samiappan - International Journal of …, 2021 - Wiley Online Library
VANET routing is a serious concern due to some of the limitations in terms of routing costs.
More research has already worked on VANET routing strategies for enhancing the …

ADVoIP: Adversarial detection of encrypted and concealed VoIP

P Addesso, M Cirillo, M Di Mauro… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A network attacker wants to transmit Voice-over-IP (VoIP) traffic streams covertly. He tries to
evade the detection system by manipulating the VoIP streams through padding, shifting, and …

An integration method of classifiers for abnormal phone detection

Y Yuan, K Ji, R Sun, K Ma, Z Chen… - 2019 6th International …, 2019 - ieeexplore.ieee.org
Harassing and fraud calls have spread like viruses in people's lives, many researchers have
proposed some solutions to abnormal phone detection. However, most of these methods are …

A decision theory based tool for detection of encrypted WebRTC traffic

M Di Mauro, M Longo - 2015 18th International Conference on …, 2015 - ieeexplore.ieee.org
The detection of encrypted streamed traffic (like VoIP or Video) is an increasingly important
issue for authorities involved in lawful interception. Aside from well established technologies …