DRAGO, Idilio
DRAGO, Idilio
INFORMATICA
A first look at HTTP/3 adoption and performance
2022-01-01 Perna G.; Trevisan M.; Giordano D.; Drago I.
A multi-measure nearest neighbor algorithm for time series classification
2008-01-01 Fabris, Fábio; DRAGO, IDILIO; Varejão, Flávio M.
A Study of Costs and Benefits of Content Sharing in Personal Cloud Storage
2021-01-01 Goncalves G.D.; Drago I.; Vieira A.B.; da Silva A.P.C.; de Almeida J.M.
A Survey on Big Data for Network Traffic Monitoring and Analysis
2019-01-01 DrAlconzo, Alessandro; Drago, Idilio; Morichetta, Andrea; Mellia, Marco; Casas, Pedro
AI for Cybersecurity: from Adversarial Anomaly Detection to Intelligent Network Security Systems
2022-01-01 Francesco Bergadano; Idilio Drago
AI-based Sound-Squatting Attack Made Possible
2022-01-01 Valentim, R; Drago, I; Cerutti, F; Mellia, M
Analysing Costs and Benefits of Content Sharing in Cloud Storage
2016-01-01 Gonçalves, Glauber Dias; DRAGO, IDILIO; Borges, Alex Vieira; Couto, Ana Paula; de Almeida, Jussara Marques
Analyzing the Impact of Dropbox Content Sharing on an Academic Network
2015-01-01 Gonçalves, Glauber; DRAGO, IDILIO; Da Silva, Ana Paula Couto; Vieira, Alex Borges; Almeida, Jussara M.
Are Darknets All The Same? On Darknet Visibility for Security Monitoring
2019-01-01 Soro, Francesca; Drago, Idilio; Trevisan, Martino; Mellia, Marco; Ceron, Joao; J. Santanna, Jose
Attacking DoH and ECH: Does server name encryption protect users’ privacy?
2022-01-01 Trevisan, Martino; Francesca Soro, null; Mellia, Marco; Drago, Idilio; Morla, Ricardo
Augmenting phishing squatting detection with GANs
2021-01-01 Valentim R.; Drago I.; Trevisan M.; Cerutti F.; Mellia M.
Automatic bearing fault pattern recognition using vibration signal analysis
2008-01-01 Mendel, E; Mariano, L. Z.; DRAGO, IDILIO; Loureiro, S.; Rauber, T. W.; Varejão, F. M.; Batista, R. J.
Automatic detection of DNS manipulations
2017-01-01 Trevisan, Martino; Drago, Idilio; Mellia, Marco; Munafo, Maurizio M.
Automatic rule generation for flow management in software defined networking networks
2017-01-01 Mario Baldi; Han Hee Song; Antonio Nucci; Marco Mellia; Martino Trevisan; Idilio Drago
AutoPenBench: Benchmarking Generative Agents for Penetration Testing
2024-01-01 Luca Gioacchini, Marco Mellia, Idilio Drago, Alexander Delsanto, Giuseppe Siracusano, Roberto Bifulco
AWESoME: Big Data for Automatic Web Service Management in SDN
2018-01-01 Trevisan, Martino; Drago, Idilio; Mellia, Marco; Song, Han Hee; Baldi, Mario
Benchmarking personal cloud storage
2013-01-01 DRAGO, IDILIO; BOCCHI, ENRICO; MELLIA, Marco; Herman Slatman; Aiko Pras
Big Data in Computer Network Monitoring
2018-01-01 Sherif Sakr Albert Zomaya; Drago, Idilio; Mellia, Marco; D’Alconzo, Alessandro
Campus Traffic and e-Learning during COVID-19 Pandemic
2020-01-01 Favale, Thomas; Soro, Francesca; Trevisan, Martino; Drago, Idilio; Mellia, Marco
Can Blocklists Explain Darknet Traffic?
2024-01-01 Ravalico, Damiano; Valentim, Rodolfo; Trevisan, Martino; Drago, Idilio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A first look at HTTP/3 adoption and performance | 2022 | Perna G.; Trevisan M.; Giordano D.; Drago I. | |
A multi-measure nearest neighbor algorithm for time series classification | 2008 | Fabris, Fábio; DRAGO, IDILIO; Varejão, Flávio M. | |
A Study of Costs and Benefits of Content Sharing in Personal Cloud Storage | 2021 | Goncalves G.D.; Drago I.; Vieira A.B.; da Silva A.P.C.; de Almeida J.M. | |
A Survey on Big Data for Network Traffic Monitoring and Analysis | 2019 | DrAlconzo, Alessandro; Drago, Idilio; Morichetta, Andrea; Mellia, Marco; Casas, Pedro | |
AI for Cybersecurity: from Adversarial Anomaly Detection to Intelligent Network Security Systems | 2022 | Francesco Bergadano; Idilio Drago | |
AI-based Sound-Squatting Attack Made Possible | 2022 | Valentim, R; Drago, I; Cerutti, F; Mellia, M | |
Analysing Costs and Benefits of Content Sharing in Cloud Storage | 2016 | Gonçalves, Glauber Dias; DRAGO, IDILIO; Borges, Alex Vieira; Couto, Ana Paula; de Almeida, Jussara Marques | |
Analyzing the Impact of Dropbox Content Sharing on an Academic Network | 2015 | Gonçalves, Glauber; DRAGO, IDILIO; Da Silva, Ana Paula Couto; Vieira, Alex Borges; Almeida, Jussara M. | |
Are Darknets All The Same? On Darknet Visibility for Security Monitoring | 2019 | Soro, Francesca; Drago, Idilio; Trevisan, Martino; Mellia, Marco; Ceron, Joao; J. Santanna, Jose | |
Attacking DoH and ECH: Does server name encryption protect users’ privacy? | 2022 | Trevisan, Martino; Francesca Soro, null; Mellia, Marco; Drago, Idilio; Morla, Ricardo | |
Augmenting phishing squatting detection with GANs | 2021 | Valentim R.; Drago I.; Trevisan M.; Cerutti F.; Mellia M. | |
Automatic bearing fault pattern recognition using vibration signal analysis | 2008 | Mendel, E; Mariano, L. Z.; DRAGO, IDILIO; Loureiro, S.; Rauber, T. W.; Varejão, F. M.; Batista, R. J. | |
Automatic detection of DNS manipulations | 2017 | Trevisan, Martino; Drago, Idilio; Mellia, Marco; Munafo, Maurizio M. | |
Automatic rule generation for flow management in software defined networking networks | 2017 | Mario Baldi; Han Hee Song; Antonio Nucci; Marco Mellia; Martino Trevisan; Idilio Drago | |
AutoPenBench: Benchmarking Generative Agents for Penetration Testing | 2024 | Luca Gioacchini, Marco Mellia, Idilio Drago, Alexander Delsanto, Giuseppe Siracusano, Roberto Bifulco | |
AWESoME: Big Data for Automatic Web Service Management in SDN | 2018 | Trevisan, Martino; Drago, Idilio; Mellia, Marco; Song, Han Hee; Baldi, Mario | |
Benchmarking personal cloud storage | 2013 | DRAGO, IDILIO; BOCCHI, ENRICO; MELLIA, Marco; Herman Slatman; Aiko Pras | |
Big Data in Computer Network Monitoring | 2018 | Sherif Sakr Albert Zomaya; Drago, Idilio; Mellia, Marco; D’Alconzo, Alessandro | |
Campus Traffic and e-Learning during COVID-19 Pandemic | 2020 | Favale, Thomas; Soro, Francesca; Trevisan, Martino; Drago, Idilio; Mellia, Marco | |
Can Blocklists Explain Darknet Traffic? | 2024 | Ravalico, Damiano; Valentim, Rodolfo; Trevisan, Martino; Drago, Idilio |