| Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model R Rapuzzi, M Repetto Future Generation Computer Systems 85, 235-249, 2018 | 87 | 2018 |
| Kernel-level tracing for detecting stegomalware and covert channels in Linux environments L Caviglione, W Mazurczyk, M Repetto, A Schaffhauser, M Zuppelli Computer Networks 191, 108010, 2021 | 60 | 2021 |
| An architecture to manage security operations for digital service chains M Repetto, A Carrega, R Rapuzzi Future generation computer systems 115, 251-266, 2021 | 50 | 2021 |
| Evaluating ML-based DDoS detection with grid search hyperparameter optimization OR Sanchez, M Repetto, A Carrega, R Bolla 2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021 | 49 | 2021 |
| An autonomous cybersecurity framework for next-generation digital service chains M Repetto, D Striccoli, G Piro, A Carrega, G Boggia, R Bolla Journal of Network and Systems Management 29 (4), 37, 2021 | 46 | 2021 |
| Feature selection evaluation towards a lightweight deep learning DDoS detector OR Sanchez, M Repetto, A Carrega, R Bolla, JF Pajo ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 42 | 2021 |
| A middleware for mobile edge computing A Carrega, M Repetto, P Gouvas, A Zafeiropoulos IEEE Cloud Computing 4 (4), 26-37, 2017 | 42 | 2017 |
| Adaptive monitoring, detection, and response for agile digital service chains M Repetto Computers & Security 132, 103343, 2023 | 33 | 2023 |
| A comprehensive tutorial for mobility management in data networks R Bolla, M Repetto IEEE Communications Surveys & Tutorials 16 (2), 812-833, 2013 | 32 | 2013 |
| Smart proxying for reducing network energy consumption R Khan, R Bolla, M Repetto, R Bruschi, M Giribaldi 2012 International Symposium on Performance Evaluation of Computer …, 2012 | 28 | 2012 |
| Programmable data gathering for detecting stegomalware A Carrega, L Caviglione, M Repetto, M Zuppelli 2020 6th IEEE Conference on Network Softwarization (NetSoft), 422-429, 2020 | 27 | 2020 |
| Estimation of freeway traffic variables using information from mobile phones A Alessandri, R Bolla, M Repetto Proceedings of the 2003 American Control Conference, 2003. 5, 4089-4094, 2003 | 26 | 2003 |
| Improving smartphones battery life by reducing energy waste of background applications R Bolla, R Khan, X Parra, M Repetto 2014 Eighth International Conference on Next Generation Mobile Apps …, 2014 | 23 | 2014 |
| Boosting energy efficiency through smart grids F Davoli, M Repetto, C Tornelli, G Proserpio, F Cucchietti International Telecommunication Union, 2012 | 20 | 2012 |
| Chloe@ University: an indoor, mobile mixed reality guidance system A Peternier, X Righetti, M Hopmann, D Thalmann, M Repettoy, ... Proceedings of the 2007 ACM symposium on Virtual reality software and …, 2007 | 20 | 2007 |
| bccstego: A framework for investigating network covert channels M Repetto, L Caviglione, M Zuppelli Proceedings of the 16th International Conference on Availability …, 2021 | 19 | 2021 |
| Network connectivity proxy: An optimal strategy for reducing energy waste in network edge devices R Bolla, M Giribaldi, R Khan, M Repetto 2013 24th Tyrrhenian International Workshop on Digital Communications-Green …, 2013 | 19 | 2013 |
| Design and implementation of cooperative network connectivity proxy using universal plug and play R Bolla, M Giribaldi, R Khan, M Repetto The future internet assembly, 323-335, 2013 | 19 | 2013 |
| A high performance ip traffic generation tool based on the intel ixp2400 network processor R Bolla, R Bruschi, M Canini, M Repetto Distributed Cooperative Laboratories: Networking, Instrumentation, and …, 2006 | 17 | 2006 |
| Assessing the potential for saving energy by impersonating idle networked devices R Bolla, R Khan, M Repetto IEEE Journal on Selected Areas in Communications 34 (5), 1676-1689, 2016 | 16 | 2016 |