D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 10.345
EU - Europa 5.750
AS - Asia 1.751
SA - Sud America 416
AF - Africa 26
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 8
Totale 18.313
Nazione #
US - Stati Uniti d'America 10.286
RU - Federazione Russa 2.371
UA - Ucraina 933
SG - Singapore 555
VN - Vietnam 548
IT - Italia 505
CN - Cina 483
DE - Germania 458
GB - Regno Unito 451
SE - Svezia 419
BR - Brasile 369
FR - Francia 274
FI - Finlandia 101
BE - Belgio 35
HK - Hong Kong 34
RO - Romania 31
CA - Canada 29
CZ - Repubblica Ceca 23
PL - Polonia 22
AT - Austria 21
IN - India 21
GR - Grecia 18
IE - Irlanda 18
EU - Europa 17
NL - Olanda 17
AR - Argentina 15
EC - Ecuador 13
BD - Bangladesh 12
TR - Turchia 12
MX - Messico 11
ES - Italia 10
MA - Marocco 9
AE - Emirati Arabi Uniti 8
IQ - Iraq 8
PA - Panama 8
PK - Pakistan 7
AU - Australia 6
CL - Cile 6
PT - Portogallo 6
AL - Albania 5
CO - Colombia 5
HU - Ungheria 5
JP - Giappone 5
MY - Malesia 5
QA - Qatar 5
ZA - Sudafrica 5
AZ - Azerbaigian 4
BG - Bulgaria 4
IR - Iran 4
KR - Corea 4
PS - Palestinian Territory 4
UZ - Uzbekistan 4
VE - Venezuela 4
CR - Costa Rica 3
DK - Danimarca 3
HR - Croazia 3
IL - Israele 3
LT - Lituania 3
LV - Lettonia 3
NO - Norvegia 3
TN - Tunisia 3
AM - Armenia 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
GE - Georgia 2
ID - Indonesia 2
KG - Kirghizistan 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
NG - Nigeria 2
NZ - Nuova Zelanda 2
PH - Filippine 2
SA - Arabia Saudita 2
SK - Slovacchia (Repubblica Slovacca) 2
TW - Taiwan 2
UG - Uganda 2
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CY - Cipro 1
EG - Egitto 1
GT - Guatemala 1
HN - Honduras 1
IM - Isola di Man 1
IS - Islanda 1
JM - Giamaica 1
KW - Kuwait 1
LU - Lussemburgo 1
NI - Nicaragua 1
NP - Nepal 1
OM - Oman 1
PE - Perù 1
RS - Serbia 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TT - Trinidad e Tobago 1
TZ - Tanzania 1
Totale 18.312
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Chandler 702
Seattle 632
Ashburn 627
Wilmington 596
Cambridge 548
Dong Ket 543
Dearborn 313
Nyköping 275
Singapore 261
Jacksonville 254
Moscow 245
Boardman 222
Southend 222
The Dalles 209
Beijing 116
Naples 98
Princeton 96
Lawrence 90
Shanghai 74
Ogden 66
Düsseldorf 65
Council Bluffs 59
San Diego 58
Munich 57
Des Moines 52
Rome 51
Yubileyny 49
Norwalk 42
Bremen 38
Brussels 35
New York 35
Jinan 31
Los Angeles 31
Boydton 29
Nanjing 29
London 28
Hong Kong 27
São Paulo 27
Timisoara 27
Hefei 24
Frankfurt am Main 22
Kunming 21
Belo Horizonte 19
Guangzhou 18
Dublin 17
Falls Church 17
Brno 16
Helsinki 16
Lauterbourg 16
Ottawa 16
Scottsdale 16
Tappahannock 16
Grafing 15
Milan 15
San Mateo 13
Napoli 11
Dallas 10
Hebei 10
Kraków 10
Santa Clara 10
Lappeenranta 9
Nanchang 9
Portsmouth 9
Quito 9
Redwood City 9
Shenyang 9
New Bedfont 8
Ningbo 8
Rio de Janeiro 8
Toronto 8
Vienna 8
Zhengzhou 8
Amsterdam 7
Auburn Hills 7
Curitiba 7
Fuzhou 7
Hounslow 7
Pomigliano d'Arco 7
Washington 7
Atlanta 6
Bexley 6
Campinas 6
Changsha 6
Halle 6
Hangzhou 6
Islington 6
Kilburn 6
Mumbai 6
Redmond 6
Berlin 5
Betim 5
Brasília 5
Bydgoszcz 5
Fortaleza 5
Indiana 5
Jiaxing 5
Totale 12.198
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 314
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 300
Enabling convergence of physical and logical security through intelligent event correlation 290
Effective QoS Monitoring in Large Scale Social Networks 272
Resource allocation in multi-domain networks based on Service Level Specifications 263
Cloud security: Emerging threats and current solutions 262
A comparative analysis of emerging approaches for securing java software with Intel SGX 261
A multi-sensor data fusion approach for detecting direct debit frauds 261
High-speed intrusion detection in support of critical infrastructure protection 250
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 248
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 243
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 243
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 239
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 238
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 237
A GPS Spoofing Resilient WAMS for Smart Grid 235
Increasing security and protection of SCADA systems through infrastructure resilience 235
The human role in tools for improving robustness and resilience of critical infrastructures 230
Techniques for available bandwidth measurement in IP networks: a performance comparison 228
A framework for mastering heterogeneity in multi-layer security information and event correlation 228
An Approach for Securing Critical Applications in Untrusted Clouds 228
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 228
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 227
Enhancing SIEM Technology to Protect Critical Infrastructures 221
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 221
A workflow service mediator for automated information processing and scheduling delivery to an archive 217
Effective visualization of a big data banking application 216
Applying extensions of evidence theory to detect frauds in financial infrastructures 215
An OpenNCP-based Solution for Secure eHealth Data Exchange 215
Security Analysis of Smart Grid Data Collection Technologies 214
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 213
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 212
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 207
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 207
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 207
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 206
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 206
An abstract reasoning architecture for privacy policies monitoring 205
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 203
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 203
Real-time QoS monitoring from the end user perspective in large scale social networks 203
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 203
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 201
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 200
Performance comparison of different techniques for available bandwidth measurement in packet switched network 200
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 197
An architecture for automatic configuration of integrated networks 197
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 196
My smart home is under attack 196
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 195
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 194
Managing service level agreements in Premium IP networks: a business-oriented approach 193
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 192
A resilient architecture for forensic storage of events in critical infrastructures 192
Using metadata in SLA negotiation over Premium IP networks 192
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 190
Behavioral network engineering: making intrusion detection become autonomic 185
Time-aware admission control on top of time-unaware network infrastructures 185
BET: a hybrid bandwidth estimation tool 184
Exposing vulnerabilities in electric power grids: An experimental approach 184
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 183
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 179
Designing service negotiation entities for the electronic market-place 176
International cooperation experiences: Results achieved, lessons learned, and way ahead 173
A semantic approach to policy-based management: linking policies to ontologies 169
Use of traffic engineering techniques to increase resilience of SCADA networks 169
How to protect public administration from cybersecurity threats: The COMPACT project 169
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 164
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 162
INTERSECTION Approach to Vulnerability Handling 157
Advanced SIEM Technology for Critical Infrastructure Protection 157
Traffic management 155
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 155
Protecting critical business processes of smart hospitals from cyber attacks 153
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 150
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 147
null 138
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 137
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 137
Exploiting diversity and correlation to improve the performance of intrusion detection systems 135
Network Resilience 133
An e-commerce framework for service assurance in the Internet 132
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 131
Real-time Security & Dependability monitoring: Make it a bundle 130
Assessing the scalability of component-based frameworks: the CADENUS case study 129
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 126
Runtime model checking for sla compliance monitoring and qos prediction 120
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 116
Distributed Framework for Cybersecurity of Critical Infrastructures 113
Dependability and resilience of computer networks (SCADA / cyber-security) 112
Innovative solutions for inclusion of totally blind people 105
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 93
A Tamper-Resistant Storage Framework for Smart Grid security 72
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 71
An Innovative Approach to Real-Time Concept Drift Detection in Network Security 60
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 59
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 58
PriSIEM: Enabling privacy-preserving Managed Security Services 57
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 55
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks 55
Totale 18.319
Categoria #
all - tutte 64.918
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 64.918


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202092 0 0 0 0 0 0 0 0 0 0 0 92
2020/20212.643 177 127 220 208 310 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.572 66 301 30 128 240 595 1.004 1.521 194 157 277 59
Totale 18.717