D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
EU - Europa 432
NA - Nord America 32
AS - Asia 20
Totale 484
Nazione #
IT - Italia 408
US - Stati Uniti d'America 32
GB - Regno Unito 19
PK - Pakistan 13
HK - Hong Kong 4
ES - Italia 3
JP - Giappone 2
DE - Germania 1
NL - Olanda 1
SA - Arabia Saudita 1
Totale 484
Città #
Lancaster 18
Islamabad 13
Redmond 6
Napoli 5
Ashburn 3
Chicago 3
Pignataro Maggiore 3
Seattle 3
Girona 2
Los Angeles 2
Boardman 1
Cedar Knolls 1
Fremont 1
Groningen 1
Herndon 1
Houston 1
Jeddah 1
Kowloon 1
Livonia 1
London 1
Mariglianella 1
Mascalucia 1
Minamisuna 1
New York 1
Norman 1
Portland 1
San Antonio 1
San Bernardino 1
San Francisco 1
Spinea 1
Tokyo 1
Tseung Kwan O 1
Woodbridge 1
Totale 81
Nome #
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems, file dfe4d05d-7932-eb50-e053-6605fe0a26fa 70
Behavioral network engineering: making intrusion detection become autonomic, file dfe4d05c-9306-eb50-e053-6605fe0a26fa 18
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring, file dfe4d05c-b08a-eb50-e053-6605fe0a26fa 16
Security Analysis of Smart Grid Data Collection Technologies, file dfe4d05c-8eda-eb50-e053-6605fe0a26fa 13
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure, file dfe4d05c-916b-eb50-e053-6605fe0a26fa 12
Applying extensions of evidence theory to detect frauds in financial infrastructures, file dfe4d05c-af0e-eb50-e053-6605fe0a26fa 12
Managing service level agreements in Premium IP networks: a business-oriented approach, file dfe4d05c-aee8-eb50-e053-6605fe0a26fa 11
Resource allocation in multi-domain networks based on Service Level Specifications, file dfe4d05c-b08b-eb50-e053-6605fe0a26fa 11
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks, file dfe4d05c-8e34-eb50-e053-6605fe0a26fa 10
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People, file dfe4d05c-9213-eb50-e053-6605fe0a26fa 10
Cloud security: Emerging threats and current solutions, file dfe4d05c-aedf-eb50-e053-6605fe0a26fa 10
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services, file dfe4d05c-b104-eb50-e053-6605fe0a26fa 10
Effective QoS Monitoring in Large Scale Social Networks, file dfe4d05c-88d8-eb50-e053-6605fe0a26fa 9
INTERSECTION Approach to Vulnerability Handling, file dfe4d05c-8e2b-eb50-e053-6605fe0a26fa 9
Enhancing SIEM Technology to Protect Critical Infrastructures, file dfe4d05c-915b-eb50-e053-6605fe0a26fa 9
Techniques for available bandwidth measurement in IP networks: a performance comparison, file dfe4d05c-b008-eb50-e053-6605fe0a26fa 9
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns, file dfe4d05c-7c93-eb50-e053-6605fe0a26fa 8
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario, file dfe4d05c-8741-eb50-e053-6605fe0a26fa 8
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies, file dfe4d05c-8b32-eb50-e053-6605fe0a26fa 8
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System, file dfe4d05c-8cf2-eb50-e053-6605fe0a26fa 8
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach, file dfe4d05c-8dee-eb50-e053-6605fe0a26fa 8
Use of traffic engineering techniques to increase resilience of SCADA networks, file dfe4d05c-8e87-eb50-e053-6605fe0a26fa 8
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project, file dfe4d05c-93bb-eb50-e053-6605fe0a26fa 8
Time-aware admission control on top of time-unaware network infrastructures, file dfe4d05c-b00a-eb50-e053-6605fe0a26fa 8
High-speed intrusion detection in support of critical infrastructure protection, file dfe4d05c-8a09-eb50-e053-6605fe0a26fa 7
Exploiting diversity and correlation to improve the performance of intrusion detection systems, file dfe4d05c-8f06-eb50-e053-6605fe0a26fa 7
International cooperation experiences: Results achieved, lessons learned, and way ahead, file dfe4d05c-91a3-eb50-e053-6605fe0a26fa 7
A framework for mastering heterogeneity in multi-layer security information and event correlation, file dfe4d05c-b007-eb50-e053-6605fe0a26fa 7
The human role in tools for improving robustness and resilience of critical infrastructures, file dfe4d05b-be73-eb50-e053-6605fe0a26fa 6
A GPS Spoofing Resilient WAMS for Smart Grid, file dfe4d05c-8c3f-eb50-e053-6605fe0a26fa 6
Increasing security and protection of SCADA systems through infrastructure resilience, file dfe4d05c-8c4e-eb50-e053-6605fe0a26fa 6
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study, file dfe4d05c-91aa-eb50-e053-6605fe0a26fa 6
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach, file dfe4d05c-aed6-eb50-e053-6605fe0a26fa 6
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks, file dfe4d05c-af0d-eb50-e053-6605fe0a26fa 6
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems, file dfe4d05c-b25d-eb50-e053-6605fe0a26fa 6
An OpenNCP-based Solution for Secure eHealth Data Exchange, file dfe4d05d-2cde-eb50-e053-6605fe0a26fa 6
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems, file dfe4d05d-8155-eb50-e053-6605fe0a26fa 6
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery, file dfe4d05c-88dc-eb50-e053-6605fe0a26fa 5
Effective visualization of a big data banking application, file dfe4d05c-8c9a-eb50-e053-6605fe0a26fa 5
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks, file dfe4d05c-8d05-eb50-e053-6605fe0a26fa 5
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach, file dfe4d05c-8e58-eb50-e053-6605fe0a26fa 5
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach, file dfe4d05c-8ef3-eb50-e053-6605fe0a26fa 5
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems, file dfe4d05c-9031-eb50-e053-6605fe0a26fa 5
Real-time Security & Dependability monitoring: Make it a bundle, file dfe4d05c-9509-eb50-e053-6605fe0a26fa 5
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks, file dfe4d05c-957d-eb50-e053-6605fe0a26fa 5
Exposing vulnerabilities in electric power grids: An experimental approach, file dfe4d05c-b086-eb50-e053-6605fe0a26fa 5
A comparative analysis of emerging approaches for securing java software with Intel SGX, file dfe4d05d-44a7-eb50-e053-6605fe0a26fa 5
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology, file dfe4d05c-877d-eb50-e053-6605fe0a26fa 4
Enabling convergence of physical and logical security through intelligent event correlation, file dfe4d05c-88f3-eb50-e053-6605fe0a26fa 4
Runtime model checking for sla compliance monitoring and qos prediction, file dfe4d05c-901a-eb50-e053-6605fe0a26fa 4
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project, file dfe4d05c-91a8-eb50-e053-6605fe0a26fa 4
Advanced SIEM Technology for Critical Infrastructure Protection, file dfe4d05c-91e5-eb50-e053-6605fe0a26fa 4
My smart home is under attack, file dfe4d05c-a8fa-eb50-e053-6605fe0a26fa 4
Efficient Supply Chain Management via federation-based integration of legacy ERP systems, file dfe4d05c-8a59-eb50-e053-6605fe0a26fa 3
An abstract reasoning architecture for privacy policies monitoring, file dfe4d05d-7a5e-eb50-e053-6605fe0a26fa 3
Privacy-Preserving Credit Scoring via Functional Encryption, file dfe4d05d-bb7d-eb50-e053-6605fe0a26fa 3
A DBSCAN based approach for jointly segment and classify brain MR images, file dfe4d05c-893f-eb50-e053-6605fe0a26fa 2
Distributed Framework for Cybersecurity of Critical Infrastructures, file dfe4d05c-8e96-eb50-e053-6605fe0a26fa 2
Network Resilience, file dfe4d05c-93fc-eb50-e053-6605fe0a26fa 2
BET: a hybrid bandwidth estimation tool, file dfe4d05c-9757-eb50-e053-6605fe0a26fa 2
A semantic approach to policy-based management: linking policies to ontologies, file dfe4d05c-9d90-eb50-e053-6605fe0a26fa 2
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation, file dfe4d05c-9efe-eb50-e053-6605fe0a26fa 2
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach, file b69f53a9-f6e9-44b1-b8bc-e60a1a0caf6b 1
Dependability and resilience of computer networks (SCADA / cyber-security), file dfe4d05c-3cb0-eb50-e053-6605fe0a26fa 1
A workflow service mediator for automated information processing and scheduling delivery to an archive, file dfe4d05c-87f0-eb50-e053-6605fe0a26fa 1
SIL2 assessment of an Active/Standby COTS-based Safety-Related system, file dfe4d05d-32e0-eb50-e053-6605fe0a26fa 1
Totale 484
Categoria #
all - tutte 636
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 636


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202 0 0 0 1 1 0 0 0 0 0 0 0
2020/202110 0 0 0 0 0 0 0 0 0 0 10 0
2021/202231 0 0 0 31 0 0 0 0 0 0 0 0
2022/202376 0 5 5 11 32 2 2 9 0 8 2 0
2023/20244 0 0 0 0 0 0 0 3 0 1 0 0
Totale 484