D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 11.726
EU - Europa 5.945
AS - Asia 2.429
SA - Sud America 639
AF - Africa 45
Continente sconosciuto - Info sul continente non disponibili 18
OC - Oceania 8
Totale 20.810
Nazione #
US - Stati Uniti d'America 11.628
RU - Federazione Russa 2.378
UA - Ucraina 939
SG - Singapore 867
VN - Vietnam 683
CN - Cina 590
IT - Italia 568
BR - Brasile 532
DE - Germania 493
GB - Regno Unito 475
SE - Svezia 428
FR - Francia 277
FI - Finlandia 106
HK - Hong Kong 67
CA - Canada 52
AR - Argentina 41
BE - Belgio 35
IN - India 34
RO - Romania 32
PL - Polonia 28
EC - Ecuador 26
NL - Olanda 24
CZ - Repubblica Ceca 23
MX - Messico 23
AT - Austria 22
BD - Bangladesh 21
TR - Turchia 20
GR - Grecia 18
IE - Irlanda 18
ES - Italia 17
EU - Europa 17
IQ - Iraq 15
JP - Giappone 15
LV - Lettonia 15
MA - Marocco 12
ZA - Sudafrica 12
AE - Emirati Arabi Uniti 10
CO - Colombia 10
SA - Arabia Saudita 10
CL - Cile 9
PK - Pakistan 9
VE - Venezuela 9
ID - Indonesia 8
PA - Panama 8
MY - Malesia 7
PY - Paraguay 7
TW - Taiwan 7
AU - Australia 6
AZ - Azerbaigian 6
HU - Ungheria 6
LT - Lituania 6
PT - Portogallo 6
QA - Qatar 6
AL - Albania 5
HR - Croazia 5
PH - Filippine 5
UZ - Uzbekistan 5
BG - Bulgaria 4
CR - Costa Rica 4
DZ - Algeria 4
IR - Iran 4
KR - Corea 4
PS - Palestinian Territory 4
TN - Tunisia 4
DK - Danimarca 3
IL - Israele 3
JO - Giordania 3
KG - Kirghizistan 3
NO - Norvegia 3
TH - Thailandia 3
AM - Armenia 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
EG - Egitto 2
GE - Georgia 2
JM - Giamaica 2
KE - Kenya 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
NG - Nigeria 2
NP - Nepal 2
NZ - Nuova Zelanda 2
PE - Perù 2
SK - Slovacchia (Repubblica Slovacca) 2
SY - Repubblica araba siriana 2
UG - Uganda 2
AF - Afghanistan, Repubblica islamica di 1
AO - Angola 1
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CI - Costa d'Avorio 1
CY - Cipro 1
GT - Guatemala 1
HN - Honduras 1
Totale 20.794
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Ashburn 730
Dallas 723
Chandler 702
Seattle 635
Wilmington 600
Cambridge 548
Dong Ket 543
Singapore 347
Dearborn 313
Nyköping 275
Jacksonville 254
Moscow 245
The Dalles 245
Boardman 224
Southend 222
Beijing 181
San Jose 161
Naples 119
Princeton 96
Lawrence 90
Munich 86
Shanghai 76
Rome 68
Ogden 66
Düsseldorf 65
Hong Kong 60
Council Bluffs 59
Columbus 58
Ho Chi Minh City 58
San Diego 58
Los Angeles 57
Des Moines 52
Yubileyny 49
New York 46
Norwalk 42
São Paulo 42
London 40
Bremen 38
Brussels 35
Jinan 31
Boydton 29
Nanjing 29
Timisoara 27
Frankfurt am Main 24
Hanoi 24
Hefei 24
Belo Horizonte 22
Chicago 22
Kunming 21
Guangzhou 19
Dublin 17
Falls Church 17
Helsinki 17
Lauterbourg 17
Milan 17
Santa Clara 17
Brno 16
Ottawa 16
Scottsdale 16
Tappahannock 16
Grafing 15
Riga 15
Tokyo 14
Atlanta 13
Rio de Janeiro 13
San Mateo 13
Amsterdam 12
Brooklyn 12
Curitiba 12
Da Nang 12
Montreal 12
Napoli 11
Quito 11
Stockholm 11
Hebei 10
Kraków 10
Portsmouth 10
Toronto 10
Lappeenranta 9
Nanchang 9
Redwood City 9
Shenyang 9
Brasília 8
Guayaquil 8
Johannesburg 8
New Bedfont 8
Ningbo 8
San Francisco 8
Vienna 8
Warsaw 8
Zhengzhou 8
Auburn Hills 7
Duque de Caxias 7
Fortaleza 7
Fuzhou 7
Hounslow 7
Totale 13.770
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 369
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 324
Enabling convergence of physical and logical security through intelligent event correlation 313
A comparative analysis of emerging approaches for securing java software with Intel SGX 300
A multi-sensor data fusion approach for detecting direct debit frauds 293
Effective QoS Monitoring in Large Scale Social Networks 288
Cloud security: Emerging threats and current solutions 286
Resource allocation in multi-domain networks based on Service Level Specifications 278
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 277
A framework for mastering heterogeneity in multi-layer security information and event correlation 271
High-speed intrusion detection in support of critical infrastructure protection 270
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 269
A GPS Spoofing Resilient WAMS for Smart Grid 265
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 265
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 264
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 259
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 257
A workflow service mediator for automated information processing and scheduling delivery to an archive 257
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 254
An Approach for Securing Critical Applications in Untrusted Clouds 253
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 251
Increasing security and protection of SCADA systems through infrastructure resilience 245
Applying extensions of evidence theory to detect frauds in financial infrastructures 245
An abstract reasoning architecture for privacy policies monitoring 245
The human role in tools for improving robustness and resilience of critical infrastructures 243
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 243
Enhancing SIEM Technology to Protect Critical Infrastructures 242
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 242
Techniques for available bandwidth measurement in IP networks: a performance comparison 241
Effective visualization of a big data banking application 238
An OpenNCP-based Solution for Secure eHealth Data Exchange 236
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 234
Security Analysis of Smart Grid Data Collection Technologies 233
A resilient architecture for forensic storage of events in critical infrastructures 229
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 228
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 227
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 225
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 225
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 222
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 221
Real-time QoS monitoring from the end user perspective in large scale social networks 221
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 220
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 220
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 219
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 219
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 218
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 216
Managing service level agreements in Premium IP networks: a business-oriented approach 213
Performance comparison of different techniques for available bandwidth measurement in packet switched network 213
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 212
My smart home is under attack 211
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 210
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 210
An architecture for automatic configuration of integrated networks 209
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 208
Using metadata in SLA negotiation over Premium IP networks 206
How to protect public administration from cybersecurity threats: The COMPACT project 205
A semantic approach to policy-based management: linking policies to ontologies 204
Exposing vulnerabilities in electric power grids: An experimental approach 199
Time-aware admission control on top of time-unaware network infrastructures 198
Behavioral network engineering: making intrusion detection become autonomic 196
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 195
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 194
BET: a hybrid bandwidth estimation tool 193
Protecting critical business processes of smart hospitals from cyber attacks 191
Advanced SIEM Technology for Critical Infrastructure Protection 190
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 187
International cooperation experiences: Results achieved, lessons learned, and way ahead 186
Use of traffic engineering techniques to increase resilience of SCADA networks 185
Designing service negotiation entities for the electronic market-place 184
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 184
Traffic management 180
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 179
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 175
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 171
INTERSECTION Approach to Vulnerability Handling 170
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 166
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 164
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 162
Network Resilience 148
Exploiting diversity and correlation to improve the performance of intrusion detection systems 146
Real-time Security & Dependability monitoring: Make it a bundle 145
An e-commerce framework for service assurance in the Internet 142
Assessing the scalability of component-based frameworks: the CADENUS case study 142
Runtime model checking for sla compliance monitoring and qos prediction 141
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 139
null 138
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 135
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 134
Dependability and resilience of computer networks (SCADA / cyber-security) 127
Distributed Framework for Cybersecurity of Critical Infrastructures 126
Innovative solutions for inclusion of totally blind people 126
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 109
A Tamper-Resistant Storage Framework for Smart Grid security 105
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 99
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 96
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks 89
Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation 87
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 85
An Innovative Approach to Real-Time Concept Drift Detection in Network Security 84
Totale 20.553
Categoria #
all - tutte 77.440
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 77.440


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.477 0 0 0 0 0 0 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.723 66 301 30 128 240 595 1.004 1.521 194 157 277 210
2025/20262.347 335 494 658 310 234 120 196 0 0 0 0 0
Totale 21.215