D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 9.709
EU - Europa 2.966
AS - Asia 946
Continente sconosciuto - Info sul continente non disponibili 17
AF - Africa 8
SA - Sud America 7
OC - Oceania 6
Totale 13.659
Nazione #
US - Stati Uniti d'America 9.686
UA - Ucraina 929
VN - Vietnam 546
GB - Regno Unito 418
SE - Svezia 415
IT - Italia 396
CN - Cina 344
DE - Germania 336
FR - Francia 219
FI - Finlandia 91
RO - Romania 29
BE - Belgio 27
EU - Europa 17
PL - Polonia 16
IE - Irlanda 15
CA - Canada 14
GR - Grecia 14
IN - India 12
RU - Federazione Russa 10
AT - Austria 9
ES - Italia 9
PA - Panama 7
AE - Emirati Arabi Uniti 6
AU - Australia 6
HK - Hong Kong 6
NL - Olanda 6
SG - Singapore 6
AL - Albania 5
QA - Qatar 5
CZ - Repubblica Ceca 4
HU - Ungheria 4
KR - Corea 4
PT - Portogallo 4
TR - Turchia 4
BR - Brasile 3
HR - Croazia 3
JP - Giappone 3
BG - Bulgaria 2
CL - Cile 2
DK - Danimarca 2
IR - Iran 2
UG - Uganda 2
ZA - Sudafrica 2
BD - Bangladesh 1
BT - Bhutan 1
BW - Botswana 1
BZ - Belize 1
CO - Colombia 1
CR - Costa Rica 1
CY - Cipro 1
DZ - Algeria 1
IL - Israele 1
NG - Nigeria 1
NO - Norvegia 1
PK - Pakistan 1
RS - Serbia 1
SA - Arabia Saudita 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TZ - Tanzania 1
VE - Venezuela 1
Totale 13.659
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Chandler 702
Seattle 631
Ashburn 618
Wilmington 596
Cambridge 548
Dong Ket 543
Dearborn 313
Nyköping 275
Jacksonville 254
Southend 222
Beijing 103
Princeton 96
Lawrence 90
Boardman 76
Ogden 66
Naples 62
San Diego 58
Des Moines 51
Norwalk 42
Bremen 38
New York 35
Rome 33
Düsseldorf 32
Jinan 31
Boydton 29
Nanjing 29
Brussels 27
Timisoara 27
London 25
Hefei 24
Los Angeles 22
Kunming 21
Falls Church 17
Scottsdale 16
Tappahannock 16
Grafing 15
Dublin 14
Guangzhou 14
Ottawa 13
San Mateo 13
Napoli 11
Hebei 10
Kraków 10
Nanchang 9
Redwood City 9
Shenyang 9
Helsinki 8
Lappeenranta 8
New Bedfont 8
Ningbo 8
Zhengzhou 8
Auburn Hills 7
Fuzhou 7
Hounslow 7
Washington 7
Halle 6
Islington 6
Kilburn 6
Redmond 6
Atlanta 5
Bydgoszcz 5
Changsha 5
Indiana 5
Jiaxing 5
Munich 5
Nürnberg 5
Padova 5
Paris 5
Budapest 4
Cava de' Tirreni 4
Haikou 4
Hangzhou 4
Lanzhou 4
Madrid 4
Matawan 4
San Mango 4
Subiaco 4
Taiyuan 4
Tianjin 4
Villaricca 4
Andover 3
Athens 3
Berlin 3
Brisbane 3
Hanover 3
Milan 3
Montoro 3
Pisa 3
Puranpur 3
San Francisco 3
Savona 3
Shaoxing 3
Stockholm 3
Taizhou 3
Tokyo 3
Tooting 3
Totale 10.793
Nome #
Enabling convergence of physical and logical security through intelligent event correlation 239
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 232
Effective QoS Monitoring in Large Scale Social Networks 228
A DBSCAN based approach for jointly segment and classify brain MR images 219
Cloud security: Emerging threats and current solutions 216
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 211
A comparative analysis of emerging approaches for securing java software with Intel SGX 209
The human role in tools for improving robustness and resilience of critical infrastructures 207
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 203
Resource allocation in multi-domain networks based on Service Level Specifications 203
A multi-sensor data fusion approach for detecting direct debit frauds 201
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 198
Techniques for available bandwidth measurement in IP networks: a performance comparison 193
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 191
High-speed intrusion detection in support of critical infrastructure protection 190
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 189
A GPS Spoofing Resilient WAMS for Smart Grid 183
Enhancing SIEM Technology to Protect Critical Infrastructures 182
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 182
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 181
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 181
Increasing security and protection of SCADA systems through infrastructure resilience 179
A framework for mastering heterogeneity in multi-layer security information and event correlation 179
Security Analysis of Smart Grid Data Collection Technologies 178
Effective visualization of a big data banking application 175
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 174
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 174
An Approach for Securing Critical Applications in Untrusted Clouds 172
Performance comparison of different techniques for available bandwidth measurement in packet switched network 171
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 171
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 170
Real-time QoS monitoring from the end user perspective in large scale social networks 170
Applying extensions of evidence theory to detect frauds in financial infrastructures 169
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 169
An architecture for automatic configuration of integrated networks 169
My smart home is under attack 169
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 168
A workflow service mediator for automated information processing and scheduling delivery to an archive 168
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 168
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 166
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 165
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 163
Managing service level agreements in Premium IP networks: a business-oriented approach 162
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 162
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 160
An OpenNCP-based Solution for Secure eHealth Data Exchange 159
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 159
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 158
Exposing vulnerabilities in electric power grids: An experimental approach 157
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 157
Behavioral network engineering: making intrusion detection become autonomic 156
Time-aware admission control on top of time-unaware network infrastructures 155
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 154
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 153
BET: a hybrid bandwidth estimation tool 153
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 152
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 151
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 149
Designing service negotiation entities for the electronic market-place 147
International cooperation experiences: Results achieved, lessons learned, and way ahead 144
A resilient architecture for forensic storage of events in critical infrastructures 139
Use of traffic engineering techniques to increase resilience of SCADA networks 138
An abstract reasoning architecture for privacy policies monitoring 138
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 138
Using metadata in SLA negotiation over Premium IP networks 137
INTERSECTION Approach to Vulnerability Handling 131
A semantic approach to policy-based management: linking policies to ontologies 127
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 127
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 125
How to protect public administration from cybersecurity threats: The COMPACT project 121
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 118
Exploiting diversity and correlation to improve the performance of intrusion detection systems 108
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 107
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 107
Advanced SIEM Technology for Critical Infrastructure Protection 106
Protecting critical business processes of smart hospitals from cyber attacks 104
An e-commerce framework for service assurance in the Internet 103
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 98
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 98
Traffic management 96
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 95
Assessing the scalability of component-based frameworks: the CADENUS case study 95
Distributed Framework for Cybersecurity of Critical Infrastructures 92
Network Resilience 91
Real-time Security & Dependability monitoring: Make it a bundle 91
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 88
Runtime model checking for sla compliance monitoring and qos prediction 88
Dependability and resilience of computer networks (SCADA / cyber-security) 87
Innovative solutions for inclusion of totally blind people 81
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 74
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 63
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 39
Privacy-Preserving Credit Scoring via Functional Encryption 19
A Tamper-Resistant Storage Framework for Smart Grid security 14
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 12
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 10
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 7
PriSIEM: Enabling privacy-preserving Managed Security Services 5
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 4
Detection of Radio Frequency Interference in Satellite Ground Segments 4
Totale 14.038
Categoria #
all - tutte 43.722
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 43.722


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019616 0 0 0 0 0 0 0 0 0 0 342 274
2019/20204.042 248 253 253 830 402 430 531 319 394 110 180 92
2020/20212.643 177 127 220 208 310 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024493 74 40 41 30 31 54 21 50 113 34 5 0
Totale 14.042