Folgen
Stefano Giordano
Stefano Giordano
Professore di Reti di Telecomunicazioni, Università di Pisa
Bestätigte E-Mail-Adresse bei iet.unipi.it
Titel
Zitiert von
Zitiert von
Jahr
An improved DFA for fast regular expression matching
D Ficara, S Giordano, G Procissi, F Vitucci, G Antichi, A Di Pietro
ACM SIGCOMM Computer Communication Review 38 (5), 29-40, 2008
2312008
A SDN-IoT architecture with NFV implementation
M Ojo, D Adami, S Giordano
2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016
1602016
A review of low-end, middle-end, and high-end iot devices
MO Ojo, S Giordano, G Procissi, IN Seitanidis
IEEE Access 6, 70528-70554, 2018
1372018
A survey on multi-constrained optimal path computation: Exact and approximate algorithms
RG Garroppo, S Giordano, L Tavanti
Computer Networks 54 (17), 3081-3107, 2010
1322010
Crowdsensim: a simulation platform for mobile crowdsensing in realistic urban environments
C Fiandrino, A Capponi, G Cacciatore, D Kliazovich, U Sorger, P Bouvry, ...
Ieee access 5, 3490-3503, 2017
1052017
Experimental assessment of the coexistence of Wi-Fi, ZigBee, and Bluetooth devices
RG Garroppo, L Gazzarrini, S Giordano, L Tavanti
2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011
1002011
On multi–gigabit packet capturing with multi–core commodity hardware
N Bonelli, A Di Pietro, S Giordano, G Procissi
Passive and Active Measurement: 13th International Conference, PAM 2012 …, 2012
892012
A cost-effective distributed framework for data collection in cloud-based mobile crowd sensing architectures
A Capponi, C Fiandrino, D Kliazovich, P Bouvry, S Giordano
IEEE Transactions on Sustainable Computing 2 (1), 3-16, 2017
852017
Multilayer compressed counting bloom filters
D Ficara, S Giordano, G Procissi, F Vitucci
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 311-315, 2008
782008
IoT solutions for crop protection against wild animal attacks
S Giordano, I Seitanidis, M Ojo, D Adami, F Vignoli
2018 IEEE international conference on Environmental Engineering (EE), 1-5, 2018
772018
SIP intrusion detection and prevention: recommendations and prototype implementation
S Niccolini, RG Garroppo, S Giordano, G Risi, S Ventura
1st IEEE Workshop on VoIP Management and Security, 2006., 47-52, 2006
672006
Combining wavelet analysis and information theory for network anomaly detection
C Callegari, M Pagano, S Giordano, T Pepe
Proceedings of the 4th International Symposium on Applied Sciences in …, 2011
622011
A power efficient genetic algorithm for resource allocation in cloud computing data centers
G Portaluri, S Giordano, D Kliazovich, B Dorronsoro
2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 58-63, 2014
602014
Skype‐hunter: A real‐time system for the detection and classification of skype traffic
D Adami, C Callegari, S Giordano, M Pagano, T Pepe
International Journal of Communication Systems 25 (3), 386-403, 2012
582012
Behavior analysis of TCP Linux variants
C Callegari, S Giordano, M Pagano, T Pepe
Computer Networks 56 (1), 462-476, 2012
572012
Brute: A high performance and extensibile traffic generator
N Bonelli, S Giordano, G Procissi, S Raffaello
Proc. of SPECTS 2005 1, 222-227, 2005
512005
Differential encoding of DFAs for fast regular expression matching
D Ficara, A Di Pietro, S Giordano, G Procissi, F Vitucci, G Antichi
IEEE/ACM Transactions On Networking 19 (3), 683-694, 2010
502010
Experimental evaluation of two open source solutions for wireless mesh routing at layer two
RG Garroppo, S Giordano, L Tavanti
IEEE 5th International Symposium on Wireless Pervasive Computing 2010, 232-237, 2010
502010
Analysis of f-ARIMA processes in the modelling of broadband traffic
M Corradi, RG Garroppo, S Giordano, M Pagano
ICC 2001. IEEE International Conference on Communications. Conference Record …, 2001
492001
Improving PCA‐based anomaly detection by using multiple time scale analysis and Kullback–Leibler divergence
C Callegari, L Gazzarrini, S Giordano, M Pagano, T Pepe
International Journal of Communication Systems 27 (10), 1731-1751, 2014
452014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20