Christian Callegari

Orcid: 0000-0001-7323-8069

According to our database1, Christian Callegari authored at least 83 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Using Deep Learning with Attention to Detect Data Exfiltration by POS Malware.
Proceedings of the 25th International Conference on Enterprise Information Systems, 2023

2021
Critical infrastructure protection system design based on SCOUT multitech seCurity system for intercOnnected space control groUnd staTions.
Int. J. Crit. Infrastructure Prot., 2021

2020
Prediction of mobile networks traffic: enhancement of the NMLS technique.
Proceedings of the 25th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2020

2019
Network level perspective in web sessions troubleshooting.
Int. J. Commun. Syst., 2019

A Probabilistic Counting Framework for Distributed Measurements.
IEEE Access, 2019

Real Time Attack Detection with Deep Learning.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

2018
Improving stability of PCA-based network anomaly detection by means of kernel-PCA.
Int. J. Comput. Sci. Eng., 2018

Experimental Analysis of ViLTE Service.
IEEE Access, 2018

2017
Waterfall Traffic Classification: A Quick Approach to Optimizing Cascade Classifiers.
Wirel. Pers. Commun., 2017

An information-theoretic method for the detection of anomalies in network traffic.
Comput. Secur., 2017

A Novel Bivariate Entropy-Based Network Anomaly Detection System.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

CUSUM-based and entropy-based network anomaly detection: An experimental comparison.
Proceedings of the 8th International Conference on the Network of the Future, 2017

Entropy-based network anomaly Detection.
Proceedings of the 2017 International Conference on Computing, 2017

Inferring social information on foreign people from mobile traffic data.
Proceedings of the IEEE International Conference on Communications, 2017

Impact of Histogram Construction Techniques on Information - Theoretic Anomaly Detection.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
A secure and privacy-preserving approach to communications in smart grids.
Int. J. Trust. Manag. Comput. Commun., 2016

Detecting and diagnosing anomalies in cellular networks using Random Neural Networks.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Distributed Physical Sensors Network for the Protection of Critical Infrastractures Against Physical Attacks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Novel Histogram-based Network Anomaly Detection.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

An Architecture for Securing Communications in Critical Infrastructure.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Statistical Network Anomaly Detection: An Experimental Study.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

2015
OpenCounter: counting unknown flows in software defined networks.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2015

Histogram cloning and CuSum: an experimental comparison between different approaches to anomaly detection.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2015

Cloud and network service orchestration in software defined data centers.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2015

Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015

Troubleshooting web sessions with CUSUM.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Waterfall Traffic Identification: Optimizing Classification Cascades.
Proceedings of the Computer Networks - 22nd International Conference, 2015

2014
DNS-Class: immediate classification of IP flows using DNS.
Int. J. Netw. Manag., 2014

Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence.
Int. J. Commun. Syst., 2014

JA-trie: Entropy-based packet classification.
Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing, 2014

Bivariate Non-parametric Anomaly Detection.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

A Bloom Filter Bank Based Hash Table for High Speed Packet Processing.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Waterfall: Rapid Identification of IP Flows Using Cascade Classification.
Proceedings of the Computer Networks - 21st International Conference, 2014

Neural network based anomaly detection.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

2013
A Methodological Overview on Anomaly Detection.
Proceedings of the Data Traffic Monitoring and Analysis, 2013

Experimental study and modelling of Networked Virtual Environment server traffic.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Implementation of TCP large receive offload on open hardware platform.
Proceedings of the first edition workshop on High performance and programmable networking, 2013

A Distributed Privacy-Aware Architecture for Communication in Smart Grids.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Design and Implementation of a Testbed for the Security Assessment of MANETs.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Sketch-based multidimensional IDS: A new approach for network anomaly detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods.
Int. J. Sens. Networks, 2012

Skype-Hunter: A real-time system for the detection and classification of Skype traffic.
Int. J. Commun. Syst., 2012

Single-path and multi-path label switched path allocation algorithms with quality-of-service constraints: performance analysis and implementation in NS2.
IET Commun., 2012

WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis.
Comput. Secur., 2012

Behavior analysis of TCP Linux variants.
Comput. Networks, 2012

Distributed PCA-based anomaly detection in telephone networks through legitimate-user profiling.
Proceedings of IEEE International Conference on Communications, 2012

The LogLog counting reversible sketch: A distributed architecture for detecting anomalies in backbone networks.
Proceedings of IEEE International Conference on Communications, 2012

Combining wavelet analysis and CUSUM algorithm for network anomaly detection.
Proceedings of IEEE International Conference on Communications, 2012

A hybrid multidimensional Algorithm for network-aware resource scheduling in clouds and grids.
Proceedings of IEEE International Conference on Communications, 2012

An open hardware implementation of CUSUM based network anomaly detection.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A Friendliness Study of TCP Linux Variants.
Proceedings of the Computer Networks - 19th International Conference, 2012

2011
Design and Performance Evaluation of Service Overlay Networks Topologies.
J. Networks, 2011

Combining sketches and wavelet analysis for multi time-scale network anomaly detection.
Comput. Secur., 2011

Power measurement campaign for evaluating the energy efficiency of current NICs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Forecasting the Distribution of Network Traffic for Anomaly Detection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Identifying Skype Traffic in a Large-Scale Flow Data Repository.
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

A Behavioral Study of TCP Linux Variants over Satellite Networks.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Detecting Heavy Change in the Heavy Hitter distribution of network traffic.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Combining wavelet analysis and information theory for network anomaly detection.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

A Novel PCA-Based Network Anomaly Detection.
Proceedings of IEEE International Conference on Communications, 2011

2010
Optimal design of Service Overlay Networks with economic and performance constraints.
Int. J. Commun. Syst., 2010

A new statistical method for detecting network anomalies in TCP traffic.
Eur. Trans. Telecommun., 2010

Detecting Network Anomalies in Backbone Networks.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

On the use of sketches and wavelet analysis for network anomaly detection.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

NS2 Extensions for the Simulation of RDM and G-RDM in DS-TE Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Three-Dimensional Resource Scheduling Algorithm for a Network-Aware Grid.
Proceedings of the Global Communications Conference, 2010

2009
New statistical approaches for anomaly detection.
Secur. Commun. Networks, 2009

Security and delay issues in SIP systems.
Int. J. Commun. Syst., 2009

A Real-Time Algorithm for Skype Traffic Detection and Classification.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2009

Topology Design for Service Overlay Networks with Economic and QoS Constraints.
Proceedings of the NETWORKING 2009, 2009

On the use of co-occurrence matrices for network anomaly detection.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Design and Deployment of a Network-Aware Grid for e-Science Applications.
Proceedings of IEEE International Conference on Communications, 2009

On the Use of Compression Algorithms for Network Anomaly Detection.
Proceedings of IEEE International Conference on Communications, 2009

A New NS2 Module for the Simulation of MPLS Networks with Point-to-Multipoint LSP Support.
Proceedings of IEEE International Conference on Communications, 2009

2008
Path computation algorithms in NS2.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

Application of Wavelet Packet Transform to Network Anomaly Detection.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2008

Distributed and Centralized Path Computation Algorithms: Implementation in NS2 and Performance Comparison.
Proceedings of IEEE International Conference on Communications, 2008

2007
A New Path Computation Algorithm and Its Implementation in NS2.
Proceedings of IEEE International Conference on Communications, 2007

G-RDM: A New Bandwidth Constraints Model for DS-TE Networks.
Proceedings of the Global Communications Conference, 2007

2006
Design and Development of MPLS-based Recovery Strategies in NS2.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Design, development and validation of an NS2 module for dynamic LSP rerouting.
Proceedings of the IEEE 11th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2006

2005
Signalling protocols in diffserv-aware MPLS networks: design and implementation of RSVP-TE network simulator.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Teaching Experiences with E-Learning Network Infrastructures.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005


  Loading...