D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 9.965
EU - Europa 3.142
AS - Asia 1.389
SA - Sud America 103
AF - Africa 17
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 8
Totale 14.641
Nazione #
US - Stati Uniti d'America 9.935
UA - Ucraina 929
VN - Vietnam 547
IT - Italia 456
GB - Regno Unito 418
SE - Svezia 416
DE - Germania 390
CN - Cina 381
SG - Singapore 377
FR - Francia 223
FI - Finlandia 99
BR - Brasile 82
RO - Romania 30
BE - Belgio 27
CZ - Repubblica Ceca 22
IE - Irlanda 18
EU - Europa 17
CA - Canada 16
PL - Polonia 16
GR - Grecia 14
IN - India 14
NL - Olanda 13
AT - Austria 11
RU - Federazione Russa 11
ES - Italia 10
BD - Bangladesh 8
PA - Panama 8
AE - Emirati Arabi Uniti 7
EC - Ecuador 7
HK - Hong Kong 7
AR - Argentina 6
AU - Australia 6
MA - Marocco 6
PT - Portogallo 6
AL - Albania 5
HU - Ungheria 5
QA - Qatar 5
TR - Turchia 5
JP - Giappone 4
KR - Corea 4
PK - Pakistan 4
BG - Bulgaria 3
CL - Cile 3
DK - Danimarca 3
HR - Croazia 3
IQ - Iraq 3
IR - Iran 3
LV - Lettonia 3
MX - Messico 3
NO - Norvegia 3
ZA - Sudafrica 3
AM - Armenia 2
BO - Bolivia 2
CO - Colombia 2
IL - Israele 2
LA - Repubblica Popolare Democratica del Laos 2
NG - Nigeria 2
NZ - Nuova Zelanda 2
SA - Arabia Saudita 2
SK - Slovacchia (Repubblica Slovacca) 2
UG - Uganda 2
AZ - Azerbaigian 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CR - Costa Rica 1
CY - Cipro 1
DO - Repubblica Dominicana 1
DZ - Algeria 1
EG - Egitto 1
ID - Indonesia 1
IM - Isola di Man 1
IS - Islanda 1
KG - Kirghizistan 1
LU - Lussemburgo 1
MY - Malesia 1
OM - Oman 1
PH - Filippine 1
PS - Palestinian Territory 1
RS - Serbia 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TZ - Tanzania 1
UZ - Uzbekistan 1
VE - Venezuela 1
Totale 14.641
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Chandler 702
Seattle 631
Ashburn 625
Wilmington 596
Cambridge 548
Dong Ket 543
Dearborn 313
Nyköping 275
Jacksonville 254
Singapore 228
Boardman 222
Southend 222
Beijing 107
Princeton 96
Lawrence 90
Naples 83
Ogden 66
San Diego 58
Munich 52
Des Moines 51
Rome 43
Norwalk 42
Bremen 38
New York 35
Düsseldorf 32
Jinan 31
Los Angeles 31
Boydton 29
Nanjing 29
Brussels 27
Timisoara 27
London 25
Hefei 24
Kunming 21
Dublin 17
Falls Church 17
Guangzhou 17
Brno 16
Scottsdale 16
Tappahannock 16
Grafing 15
Helsinki 15
Ottawa 14
San Mateo 13
Napoli 11
Hebei 10
Kraków 10
Lappeenranta 9
Milan 9
Nanchang 9
Redwood City 9
Santa Clara 9
Shenyang 9
São Paulo 9
New Bedfont 8
Ningbo 8
Zhengzhou 8
Auburn Hills 7
Fuzhou 7
Hounslow 7
Pomigliano d'Arco 7
Washington 7
Amsterdam 6
Changsha 6
Dallas 6
Halle 6
Islington 6
Kilburn 6
Redmond 6
Atlanta 5
Bydgoszcz 5
Hangzhou 5
Indiana 5
Jiaxing 5
Lanzhou 5
Nürnberg 5
Padova 5
Paris 5
Avellino 4
Berlin 4
Budapest 4
Cava de' Tirreni 4
Haikou 4
Madrid 4
Matawan 4
Mumbai 4
Quito 4
San Mango 4
Stockholm 4
Subiaco 4
Taiyuan 4
Tianjin 4
Tokyo 4
Villaricca 4
Andover 3
Athens 3
Totale 11.327
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 257
Enabling convergence of physical and logical security through intelligent event correlation 245
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 245
Resource allocation in multi-domain networks based on Service Level Specifications 231
Effective QoS Monitoring in Large Scale Social Networks 230
Cloud security: Emerging threats and current solutions 224
A comparative analysis of emerging approaches for securing java software with Intel SGX 219
High-speed intrusion detection in support of critical infrastructure protection 218
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 216
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 215
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 211
The human role in tools for improving robustness and resilience of critical infrastructures 211
A multi-sensor data fusion approach for detecting direct debit frauds 210
Increasing security and protection of SCADA systems through infrastructure resilience 207
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 204
Techniques for available bandwidth measurement in IP networks: a performance comparison 200
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 199
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 194
A GPS Spoofing Resilient WAMS for Smart Grid 193
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 193
Enhancing SIEM Technology to Protect Critical Infrastructures 191
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 187
A framework for mastering heterogeneity in multi-layer security information and event correlation 187
Security Analysis of Smart Grid Data Collection Technologies 183
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 183
Effective visualization of a big data banking application 182
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 181
An Approach for Securing Critical Applications in Untrusted Clouds 181
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 180
Applying extensions of evidence theory to detect frauds in financial infrastructures 179
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 179
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 178
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 178
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 177
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 176
An architecture for automatic configuration of integrated networks 176
Real-time QoS monitoring from the end user perspective in large scale social networks 175
Performance comparison of different techniques for available bandwidth measurement in packet switched network 175
A workflow service mediator for automated information processing and scheduling delivery to an archive 174
My smart home is under attack 174
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 172
An OpenNCP-based Solution for Secure eHealth Data Exchange 172
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 171
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 170
Managing service level agreements in Premium IP networks: a business-oriented approach 168
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 168
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 168
Using metadata in SLA negotiation over Premium IP networks 166
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 165
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 164
BET: a hybrid bandwidth estimation tool 163
Exposing vulnerabilities in electric power grids: An experimental approach 162
Behavioral network engineering: making intrusion detection become autonomic 161
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 161
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 160
Time-aware admission control on top of time-unaware network infrastructures 160
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 156
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 156
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 155
Designing service negotiation entities for the electronic market-place 154
International cooperation experiences: Results achieved, lessons learned, and way ahead 148
A resilient architecture for forensic storage of events in critical infrastructures 148
An abstract reasoning architecture for privacy policies monitoring 148
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 144
Use of traffic engineering techniques to increase resilience of SCADA networks 141
A semantic approach to policy-based management: linking policies to ontologies 134
INTERSECTION Approach to Vulnerability Handling 134
Traffic management 133
How to protect public administration from cybersecurity threats: The COMPACT project 130
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 130
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 128
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 126
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 125
Advanced SIEM Technology for Critical Infrastructure Protection 116
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 116
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 115
Exploiting diversity and correlation to improve the performance of intrusion detection systems 111
Protecting critical business processes of smart hospitals from cyber attacks 111
An e-commerce framework for service assurance in the Internet 110
Network Resilience 107
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 105
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 101
Assessing the scalability of component-based frameworks: the CADENUS case study 98
Real-time Security & Dependability monitoring: Make it a bundle 96
Distributed Framework for Cybersecurity of Critical Infrastructures 95
Dependability and resilience of computer networks (SCADA / cyber-security) 92
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 91
Runtime model checking for sla compliance monitoring and qos prediction 91
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 87
Innovative solutions for inclusion of totally blind people 84
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 84
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 54
A Tamper-Resistant Storage Framework for Smart Grid security 23
Privacy-Preserving Credit Scoring via Functional Encryption 23
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 20
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 20
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 20
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 20
Detection of Radio Frequency Interference in Satellite Ground Segments 17
PriSIEM: Enabling privacy-preserving Managed Security Services 15
Totale 14.981
Categoria #
all - tutte 53.757
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 53.757


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202.056 0 0 0 0 0 430 531 319 394 110 180 92
2020/20212.643 177 127 220 208 310 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/2025888 66 301 30 128 240 123 0 0 0 0 0 0
Totale 15.033