Campus traffic and e-Learning during COVID-19 pandemic T Favale, F Soro, M Trevisan, I Drago, M Mellia Computer networks 176, 107290, 2020 | 908 | 2020 |
Network security and anomaly detection with Big-DAMA, a big data analytics framework P Casas, F Soro, J Vanerio, G Settanni, A D'Alconzo 2017 IEEE 6th international conference on cloud networking (CloudNet), 1-7, 2017 | 59 | 2017 |
A machine learning application for latency prediction in operational 4g networks AS Khatouni, F Soro, D Giordano 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 34 | 2019 |
Are darknets all the same? On darknet visibility for security monitoring F Soro, I Drago, M Trevisan, M Mellia, J Ceron, JJ Santanna 2019 IEEE international symposium on local and metropolitan area networks …, 2019 | 29 | 2019 |
Does domain name encryption increase users' privacy? M Trevisan, F Soro, M Mellia, I Drago, R Morla ACM SIGCOMM Computer Communication Review 50 (3), 16-22, 2020 | 22 | 2020 |
Sensing the noise: Uncovering communities in darknet traffic F Soro, M Allegretta, M Mellia, I Drago, LM Bertholdo 2020 Mediterranean Communication and Computer Networking Conference …, 2020 | 19 | 2020 |
AI-based detection of DNS misuse for network security I Chiscop, F Soro, P Smith Proceedings of the 1st International Workshop on Native Network Intelligence …, 2022 | 7 | 2022 |
Achieving horizontal scalability in density-based clustering for urls A Faroughi, R Javidan, M Mellia, A Morichetta, F Soro, M Trevisan 2018 IEEE International Conference on Big Data (Big Data), 3841-3846, 2018 | 7 | 2018 |
Attacking DoH and ECH: Does Server Name Encryption Protect Users’ Privacy? M Trevisan, F Soro, M Mellia, I Drago, R Morla ACM Transactions on Internet Technology 23 (1), 1-22, 2023 | 5 | 2023 |
The New Abnormal: Network Anomalies in the AI Era F Soro, T Favale, D Giordano, L Vassio, Z Ben Houidi, I Drago Communication Networks and Service Management in the Era of Artificial …, 2021 | 5 | 2021 |
DPI solutions in practice: Benchmark and comparison T Rescio, T Favale, F Soro, M Mellia, I Drago 2021 IEEE Security and Privacy Workshops (SPW), 37-42, 2021 | 5 | 2021 |
Enlightening the darknets: Augmenting darknet visibility with active probes F Soro, T Favale, D Giordano, I Drago, T Rescio, M Mellia, ZB Houidi, ... IEEE Transactions on Network and Service Management 20 (4), 5012-5025, 2023 | 3 | 2023 |
Regular Pattern and Anomaly Detection on Corporate Transaction Time Series. F Soro, M Mellia, N Russo EDBT/ICDT Workshops, 2020 | 3 | 2020 |
Cybersecurity Analysis in the UAV Domain: the Practical Approach of the Labyrinth Project MÁ Fas-Millán, F Soro, O Jung, A Shaaban Proceedings of the 2023 ACM Conference on Information Technology for Social …, 2023 | | 2023 |
An AI and data-driven approach to unwanted network traffic inspection F Soro Politecnico di Torino, 2022 | | 2022 |
Home IoT devices: analysis of the communication protocols D Giordano, F Soro, MA Greco | | 2020 |
Experimental comparison of supervised machine-learning algorithms for network monitoring F Soro Politecnico di Torino, 2018 | | 2018 |
Big-DAMA-a Big Data Analytics Framework for Large-Scale Network Traffic Monitoring and Analysis F Soro, P Casas-Hernandez 6th ACM SIGCOMM Networking Networking Women Workshop, N2Women 2017, 2017 | | 2017 |
Big-DAMA-Big Data Analytics for Large-Scale Network Traffic Monitoring and Analysis P Casas-Hernandez, F Soro, J Vanerio ACM Internet Measurement Conference, IMC 2017, 2017 | | 2017 |