Author of the publication

Suspicious Network Event Recognition Leveraging on Machine Learning.

, , , and . IEEE BigData, page 5915-5920. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a passive DNS monitoring system., , , and . SAC, page 629-630. ACM, (2012)Analysis of the Internet diffusion in the non-profit sector: the social digital divide in Italy., , and . Scientometrics, 66 (1): 155-170 (2006)The use of detection systems to improve the quality of the Italian Public Administration., , , and . ICITST, page 724-725. IEEE, (2011)E-Procurement Adoption among Italian Firms by Using Domain Names., , and . ICEIS (4), page 124-131. (2006)Measuring Internet Diffusion in Italy., , , , and . WITASI, volume 232 of IFIP Conference Proceedings, page 175-186. Kluwer, (2002)nDPI: Open-source high-speed deep packet inspection., , , and . IWCMC, page 617-622. IEEE, (2014)Exploiting DNS traffic to rank internet domains., , , and . ICC Workshops, page 1325-1329. IEEE, (2013)Large Scale Web-Content Classification., , , and . KDIR, page 545-554. SciTePress, (2015)Internet Diffusion among Italian Firms: The Digital Divide Exists., , and . WEBIST, page 431-435. INSTICC Press, (2005)Internet diffusion in the non profit sector in Italy., , , and . ICWI, page 1212-1217. IADIS, (2004)