Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model R Rapuzzi, M Repetto Future Generation Computer Systems 85, 235-249, 2018 | 76 | 2018 |
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments L Caviglione, W Mazurczyk, M Repetto, A Schaffhauser, M Zuppelli Computer Networks 191, 108010, 2021 | 46 | 2021 |
A middleware for mobile edge computing A Carrega, M Repetto, P Gouvas, A Zafeiropoulos IEEE Cloud Computing 4 (4), 26-37, 2017 | 36 | 2017 |
An architecture to manage security operations for digital service chains M Repetto, A Carrega, R Rapuzzi Future Generation Computer Systems 115, 251-266, 2021 | 34 | 2021 |
Evaluating ML-based DDoS detection with grid search hyperparameter optimization OR Sanchez, M Repetto, A Carrega, R Bolla 2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021 | 30 | 2021 |
A comprehensive tutorial for mobility management in data networks R Bolla, M Repetto IEEE Communications Surveys & Tutorials 16 (2), 812-833, 2013 | 30 | 2013 |
Smart proxying for reducing network energy consumption R Khan, R Bolla, M Repetto, R Bruschi, M Giribaldi 2012 International Symposium on Performance Evaluation of Computer …, 2012 | 28 | 2012 |
Feature selection evaluation towards a lightweight deep learning DDoS detector OR Sanchez, M Repetto, A Carrega, R Bolla, JF Pajo ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 27 | 2021 |
Estimation of freeway traffic variables using information from mobile phones A Alessandri, R Bolla, M Repetto Proceedings of the 2003 American Control Conference, 2003. 5, 4089-4094, 2003 | 26 | 2003 |
Improving smartphones battery life by reducing energy waste of background applications R Bolla, R Khan, X Parra, M Repetto 2014 Eighth International Conference on Next Generation Mobile Apps …, 2014 | 25 | 2014 |
Programmable data gathering for detecting stegomalware A Carrega, L Caviglione, M Repetto, M Zuppelli 2020 6th IEEE Conference on Network Softwarization (NetSoft), 422-429, 2020 | 23 | 2020 |
An autonomous cybersecurity framework for next-generation digital service chains M Repetto, D Striccoli, G Piro, A Carrega, G Boggia, R Bolla Journal of Network and Systems Management 29 (4), 37, 2021 | 21 | 2021 |
Chloe@ University: an indoor, mobile mixed reality guidance system A Peternier, X Righetti, M Hopmann, D Thalmann, M Repettoy, ... Proceedings of the 2007 ACM symposium on Virtual reality software and …, 2007 | 21 | 2007 |
Boosting energy efficiency through smart grids F Davoli, M Repetto, C Tornelli, G Proserpio, F Cucchietti International Telecommunication Union (ITU) 7, 14-16, 2012 | 19 | 2012 |
Network connectivity proxy: An optimal strategy for reducing energy waste in network edge devices R Bolla, M Giribaldi, R Khan, M Repetto 2013 24th Tyrrhenian International Workshop on Digital Communications-Green …, 2013 | 18 | 2013 |
Design and implementation of cooperative network connectivity proxy using universal plug and play R Bolla, M Giribaldi, R Khan, M Repetto The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013 | 18 | 2013 |
bccstego: A framework for investigating network covert channels M Repetto, L Caviglione, M Zuppelli Proceedings of the 16th International Conference on Availability …, 2021 | 16 | 2021 |
Assessing the potential for saving energy by impersonating idle networked devices R Bolla, R Khan, M Repetto IEEE Journal on Selected Areas in Communications 34 (5), 1676-1689, 2016 | 16 | 2016 |
Smart proxying: An optimal strategy for improving battery life of mobile devices R Bolla, M Giribaldi, R Khan, M Repetto 2013 International Green Computing Conference Proceedings, 1-6, 2013 | 16 | 2013 |
A high performance ip traffic generation tool based on the intel ixp2400 network processor R Bolla, R Bruschi, M Canini, M Repetto Distributed Cooperative Laboratories: Networking, Instrumentation, and …, 2006 | 16 | 2006 |