Angelo Coluccia

Learn More
Current Radio-Frequency Identification (RFID) technology involves two types of physical devices: tags and reader. The reader combines in a single physical device transmission (to the tags) and reception (from the tags) functions. In this paper we discuss an alternative approach, where receive functions are performed by a separate device called "RFID(More)
—In this work we present a novel scheme for statistical-based anomaly detection in 3G cellular networks. The traffic data collected by a passive monitoring system are reduced to a set of per-mobile user counters, from which time-series of unidimensional feature distributions are derived. An example of feature is the number of TCP SYN packets seen in uplink(More)
In this work a basic Resource Allocation (RA) problem is considered, where a fixed capacity must be shared among a set of users. The RA task can be formulated as an optimization problem, with a set of simple constraints and an objective function to be minimized. A fundamental relation between the RA optimization problem and the notion of max-min fairness is(More)
Third-generation cellular networks are exposed to novel forms of denial-of-service attacks that only recently have started to be recognized and documented by the scientific community. In this contribution, we review some recently published attack models specific for cellular networks. We review them collectively in order to identify the main system-design(More)
In this paper we investigate the dynamics of one-way delays in an operational mobile core network. Our final goal is to develop anomaly detection schemes for the packet delay process in order to reveal network and equipment problems. This requires a preliminary exploration of the delay process in the core network, which we undertake in this study. We(More)