Name
Affiliation
Papers
MICHELE PAGANO
Univ Pisa, Dept Informat Engn, I-56100 Pisa, Italy
75
Collaborators
Citations 
PageRank 
71
198
31.51
Referers 
Referees 
References 
464
807
552
Search Limit
100807
Title
Citations
PageRank
Year
Influence of Voltage Harmonics on Partial Discharge Diagnostics in Electric Motors Fed by Variable-Frequency Drives00.342022
Design, Implementation and Evaluation of a LoRa Packet Generator for Forest Environments00.342021
Rare-Event Simulation for the Hitting Time of Gaussian Processes.00.342020
Real Time Attack Detection with Deep Learning00.342019
A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks.00.342018
Improving Stability Of Pca-Based Network Anomaly Detection By Means Of Kernel-Pca20.442018
Waterfall Traffic Classification: A Quick Approach to Optimizing Cascade Classifiers.00.342017
Power Consumption-Aware Virtual Machine Placement in Cloud Data Center.30.392017
An energy efficient centralized scheduling scheme in TSCH networks40.392017
A novel allocation strategy for virtual machines in software defined data center00.342017
Impact of Histogram Construction Techniques on Information - Theoretic Anomaly Detection.00.342017
A secure and privacy-preserving approach to communications in smart grids.00.342016
Statistical Network Anomaly Detection: An Experimental Study.10.422016
A Novel Histogram-based Network Anomaly Detection.00.342016
A novel SDN controller for traffic recovery and load balancing in data centers00.342016
A SIP-Based Home Gateway for Domotics Systems: From the Architecture to the Prototype.00.342016
Delays in IP Routers, a Markov Model.00.342016
The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism.10.392016
Histogram cloning and CuSum: An experimental comparison between different approaches to Anomaly Detection00.342015
Waterfall Traffic Identification: Optimizing Classification Cascades.10.352015
Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection.00.342015
A Fuzzy Logic Approach For Resources Allocation In Cloud Data Center10.362015
OpenCounter: Counting unknown flows in Software Defined Networks10.352015
Improving Pca-Based Anomaly Detection By Using Multiple Time Scale Analysis And Kullback-Leibler Divergence130.642014
Dns-Class: Immediate Classification Of Ip Flows Using Dns60.522014
Waterfall: Rapid Identification of IP Flows Using Cascade Classification.100.542014
A Distributed Privacy-Aware Architecture for Communication in Smart Grids00.342013
Design and Implementation of a Testbed for the Security Assessment of MANETs.00.342013
Virtual Machines Migration In A Cloud Data Center Scenario: An Experimental Analysis40.472013
Sketch-based multidimensional IDS: A new approach for network anomaly detection60.532013
Skype-Hunter: A real-time system for the detection and classification of Skype traffic210.962012
Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods130.612012
Energy saving heuristics in backbone networks.60.392012
A Friendliness Study of TCP Linux Variants.00.342012
Behavior analysis of TCP Linux variants90.572012
WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis70.572012
Combining wavelet analysis and CUSUM algorithm for network anomaly detection00.342012
A Novel PCA-Based Network Anomaly Detection50.502011
Design and performance evaluation of service overlay networks topologies30.422011
A Behavioral Study of TCP Linux Variants over Satellite Networks00.342011
Forecasting the Distribution of Network Traffic for Anomaly Detection20.382011
Detecting Heavy Change in the Heavy Hitter distribution of network traffic20.372011
Combining sketches and wavelet analysis for multi time-scale network anomaly detection60.462011
Combining wavelet analysis and information theory for network anomaly detection10.352011
A new statistical method for detecting network anomalies in TCP traffic30.432010
Optimal design of Service Overlay Networks with economic and performance constraints30.402010
On the use of sketches and wavelet analysis for network anomaly detection70.522010
Regenerative analysis of a finite buffer fluid queue.00.342010
Detecting network anomalies in backbone networks10.352010
On the use of co-occurrence matrices for network anomaly detection10.352009
  • 1
  • 2