D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 10.153
EU - Europa 5.660
AS - Asia 1.723
SA - Sud America 308
AF - Africa 26
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 8
Totale 17.895
Nazione #
US - Stati Uniti d'America 10.103
RU - Federazione Russa 2.366
UA - Ucraina 932
VN - Vietnam 547
SG - Singapore 545
IT - Italia 498
CN - Cina 483
GB - Regno Unito 441
DE - Germania 439
SE - Svezia 419
BR - Brasile 266
FR - Francia 239
FI - Finlandia 100
BE - Belgio 35
HK - Hong Kong 30
RO - Romania 30
CA - Canada 26
CZ - Repubblica Ceca 22
AT - Austria 20
IN - India 19
IE - Irlanda 18
EU - Europa 17
NL - Olanda 17
PL - Polonia 17
GR - Grecia 14
EC - Ecuador 13
AR - Argentina 12
BD - Bangladesh 11
ES - Italia 10
TR - Turchia 10
MA - Marocco 9
MX - Messico 8
PA - Panama 8
AE - Emirati Arabi Uniti 7
IQ - Iraq 7
PK - Pakistan 7
AU - Australia 6
CL - Cile 6
PT - Portogallo 6
AL - Albania 5
CO - Colombia 5
HU - Ungheria 5
MY - Malesia 5
QA - Qatar 5
ZA - Sudafrica 5
BG - Bulgaria 4
IR - Iran 4
JP - Giappone 4
KR - Corea 4
PS - Palestinian Territory 4
CR - Costa Rica 3
DK - Danimarca 3
HR - Croazia 3
IL - Israele 3
LT - Lituania 3
LV - Lettonia 3
NO - Norvegia 3
TN - Tunisia 3
VE - Venezuela 3
AM - Armenia 2
AZ - Azerbaigian 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
ID - Indonesia 2
KG - Kirghizistan 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
NG - Nigeria 2
NZ - Nuova Zelanda 2
PH - Filippine 2
SA - Arabia Saudita 2
SK - Slovacchia (Repubblica Slovacca) 2
TW - Taiwan 2
UG - Uganda 2
UZ - Uzbekistan 2
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CY - Cipro 1
EG - Egitto 1
GE - Georgia 1
HN - Honduras 1
IM - Isola di Man 1
IS - Islanda 1
KW - Kuwait 1
LU - Lussemburgo 1
NI - Nicaragua 1
NP - Nepal 1
OM - Oman 1
RS - Serbia 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TZ - Tanzania 1
UY - Uruguay 1
Totale 17.895
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Chandler 702
Seattle 631
Ashburn 627
Wilmington 596
Cambridge 548
Dong Ket 543
Dearborn 313
Nyköping 275
Singapore 258
Jacksonville 254
Moscow 244
Boardman 222
Southend 222
Beijing 116
Princeton 96
Naples 95
Lawrence 90
Shanghai 74
Ogden 66
Düsseldorf 65
Council Bluffs 59
San Diego 58
Munich 53
Des Moines 52
Rome 51
The Dalles 49
Yubileyny 49
Norwalk 42
Bremen 38
Brussels 35
New York 35
Jinan 31
Los Angeles 31
Boydton 29
Nanjing 29
London 28
Timisoara 27
Hefei 24
Hong Kong 23
Kunming 21
São Paulo 19
Guangzhou 18
Dublin 17
Falls Church 17
Brno 16
Helsinki 16
Lauterbourg 16
Ottawa 16
Scottsdale 16
Tappahannock 16
Grafing 15
Milan 15
San Mateo 13
Napoli 11
Belo Horizonte 10
Hebei 10
Kraków 10
Santa Clara 10
Lappeenranta 9
Nanchang 9
Portsmouth 9
Quito 9
Redwood City 9
Shenyang 9
New Bedfont 8
Ningbo 8
Vienna 8
Zhengzhou 8
Amsterdam 7
Auburn Hills 7
Frankfurt am Main 7
Fuzhou 7
Hounslow 7
Pomigliano d'Arco 7
Toronto 7
Washington 7
Changsha 6
Dallas 6
Halle 6
Hangzhou 6
Islington 6
Kilburn 6
Mumbai 6
Redmond 6
Atlanta 5
Berlin 5
Brasília 5
Bydgoszcz 5
Indiana 5
Jiaxing 5
Lanzhou 5
Nürnberg 5
Padova 5
Pagani 5
Paris 5
Avellino 4
Totale 11.976
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 311
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 288
Enabling convergence of physical and logical security through intelligent event correlation 284
Effective QoS Monitoring in Large Scale Social Networks 266
Resource allocation in multi-domain networks based on Service Level Specifications 262
A comparative analysis of emerging approaches for securing java software with Intel SGX 258
Cloud security: Emerging threats and current solutions 256
A multi-sensor data fusion approach for detecting direct debit frauds 255
High-speed intrusion detection in support of critical infrastructure protection 250
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 248
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 241
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 239
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 238
A GPS Spoofing Resilient WAMS for Smart Grid 234
Increasing security and protection of SCADA systems through infrastructure resilience 234
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 231
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 230
The human role in tools for improving robustness and resilience of critical infrastructures 228
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 225
Techniques for available bandwidth measurement in IP networks: a performance comparison 224
A framework for mastering heterogeneity in multi-layer security information and event correlation 224
An Approach for Securing Critical Applications in Untrusted Clouds 224
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 220
Enhancing SIEM Technology to Protect Critical Infrastructures 217
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 215
An OpenNCP-based Solution for Secure eHealth Data Exchange 213
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 211
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 211
Security Analysis of Smart Grid Data Collection Technologies 210
Effective visualization of a big data banking application 209
Applying extensions of evidence theory to detect frauds in financial infrastructures 208
A workflow service mediator for automated information processing and scheduling delivery to an archive 206
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 204
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 204
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 204
Real-time QoS monitoring from the end user perspective in large scale social networks 202
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 201
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 200
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 200
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 200
An abstract reasoning architecture for privacy policies monitoring 200
Performance comparison of different techniques for available bandwidth measurement in packet switched network 198
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 197
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 195
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 195
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 195
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 195
An architecture for automatic configuration of integrated networks 194
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 193
Using metadata in SLA negotiation over Premium IP networks 192
My smart home is under attack 192
Managing service level agreements in Premium IP networks: a business-oriented approach 191
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 188
A resilient architecture for forensic storage of events in critical infrastructures 187
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 186
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 184
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 183
BET: a hybrid bandwidth estimation tool 182
Time-aware admission control on top of time-unaware network infrastructures 182
Exposing vulnerabilities in electric power grids: An experimental approach 181
Behavioral network engineering: making intrusion detection become autonomic 180
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 175
Designing service negotiation entities for the electronic market-place 173
International cooperation experiences: Results achieved, lessons learned, and way ahead 172
Use of traffic engineering techniques to increase resilience of SCADA networks 168
How to protect public administration from cybersecurity threats: The COMPACT project 165
A semantic approach to policy-based management: linking policies to ontologies 164
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 161
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 159
INTERSECTION Approach to Vulnerability Handling 156
Advanced SIEM Technology for Critical Infrastructure Protection 154
Traffic management 153
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 151
Protecting critical business processes of smart hospitals from cyber attacks 147
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 146
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 143
null 138
Exploiting diversity and correlation to improve the performance of intrusion detection systems 135
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 133
Network Resilience 132
An e-commerce framework for service assurance in the Internet 131
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 127
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 126
Real-time Security & Dependability monitoring: Make it a bundle 125
Assessing the scalability of component-based frameworks: the CADENUS case study 125
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 122
Runtime model checking for sla compliance monitoring and qos prediction 118
Distributed Framework for Cybersecurity of Critical Infrastructures 112
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 111
Dependability and resilience of computer networks (SCADA / cyber-security) 110
Innovative solutions for inclusion of totally blind people 103
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 87
A Tamper-Resistant Storage Framework for Smart Grid security 66
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 66
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 55
An Innovative Approach to Real-Time Concept Drift Detection in Network Security 55
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 52
PriSIEM: Enabling privacy-preserving Managed Security Services 51
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 51
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 49
Totale 17.942
Categoria #
all - tutte 62.342
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 62.342


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020382 0 0 0 0 0 0 0 0 0 110 180 92
2020/20212.643 177 127 220 208 310 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.154 66 301 30 128 240 595 1.004 1.521 194 75 0 0
Totale 18.299