D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 12.192
EU - Europa 6.082
AS - Asia 3.124
SA - Sud America 749
AF - Africa 89
Continente sconosciuto - Info sul continente non disponibili 19
OC - Oceania 8
Totale 22.263
Nazione #
US - Stati Uniti d'America 12.076
RU - Federazione Russa 2.384
SG - Singapore 988
UA - Ucraina 943
CN - Cina 829
VN - Vietnam 823
IT - Italia 627
BR - Brasile 581
DE - Germania 506
GB - Regno Unito 483
SE - Svezia 430
FR - Francia 293
FI - Finlandia 111
HK - Hong Kong 103
IN - India 62
AR - Argentina 57
CA - Canada 55
BD - Bangladesh 39
BE - Belgio 37
EC - Ecuador 36
PL - Polonia 35
TR - Turchia 35
RO - Romania 33
NL - Olanda 29
MX - Messico 27
PK - Pakistan 26
CZ - Repubblica Ceca 24
AT - Austria 23
IQ - Iraq 21
ZA - Sudafrica 21
ES - Italia 20
ID - Indonesia 20
SA - Arabia Saudita 20
VE - Venezuela 20
GR - Grecia 19
IE - Irlanda 19
JP - Giappone 19
CO - Colombia 18
MA - Marocco 18
EU - Europa 17
PH - Filippine 16
CL - Cile 15
LV - Lettonia 15
AE - Emirati Arabi Uniti 12
CI - Costa d'Avorio 10
MY - Malesia 10
PY - Paraguay 10
UZ - Uzbekistan 10
JO - Giordania 9
PA - Panama 9
TN - Tunisia 9
AZ - Azerbaigian 7
CR - Costa Rica 7
DZ - Algeria 7
PS - Palestinian Territory 7
PT - Portogallo 7
TW - Taiwan 7
AU - Australia 6
HU - Ungheria 6
LT - Lituania 6
QA - Qatar 6
AL - Albania 5
BG - Bulgaria 5
BO - Bolivia 5
HR - Croazia 5
KE - Kenya 5
KG - Kirghizistan 5
OM - Oman 5
EG - Egitto 4
IL - Israele 4
IR - Iran 4
KR - Corea 4
NP - Nepal 4
SY - Repubblica araba siriana 4
TH - Thailandia 4
UY - Uruguay 4
BH - Bahrain 3
DK - Danimarca 3
DO - Repubblica Dominicana 3
JM - Giamaica 3
KZ - Kazakistan 3
NO - Norvegia 3
PE - Perù 3
SN - Senegal 3
AM - Armenia 2
AO - Angola 2
ET - Etiopia 2
GE - Georgia 2
GT - Guatemala 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
LU - Lussemburgo 2
NG - Nigeria 2
NI - Nicaragua 2
NZ - Nuova Zelanda 2
SK - Slovacchia (Repubblica Slovacca) 2
TT - Trinidad e Tobago 2
UG - Uganda 2
AF - Afghanistan, Repubblica islamica di 1
BA - Bosnia-Erzegovina 1
Totale 22.239
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 946
Ann Arbor 853
Ashburn 792
Dallas 725
Chandler 702
Seattle 635
Wilmington 600
Cambridge 548
Dong Ket 543
Singapore 441
San Jose 341
Dearborn 313
Nyköping 275
The Dalles 258
Jacksonville 254
Moscow 246
Boardman 224
Southend 222
Beijing 207
Naples 146
Ho Chi Minh City 103
Princeton 96
Hong Kong 93
Lawrence 90
Munich 86
Shanghai 77
Rome 71
Ogden 66
Düsseldorf 65
Council Bluffs 62
Hanoi 62
Columbus 58
San Diego 58
Los Angeles 57
Des Moines 52
Yubileyny 49
New York 48
São Paulo 45
Norwalk 42
London 40
Bremen 38
Brussels 36
Frankfurt am Main 32
Jinan 31
Santa Clara 31
Boydton 29
Nanjing 29
Timisoara 27
Chicago 24
Hefei 24
Belo Horizonte 23
Helsinki 22
Da Nang 21
Kunming 21
Guangzhou 19
Milan 18
Tokyo 18
Dublin 17
Falls Church 17
Lauterbourg 17
Brno 16
Ottawa 16
Scottsdale 16
Tappahannock 16
Amsterdam 15
Atlanta 15
Grafing 15
Quito 15
Riga 15
Curitiba 14
Brooklyn 13
Rio de Janeiro 13
San Mateo 13
Warsaw 13
Johannesburg 12
Montreal 12
Guayaquil 11
Napoli 11
Stockholm 11
Abidjan 10
Haiphong 10
Hebei 10
Kraków 10
Portsmouth 10
Santiago 10
Toronto 10
Brasília 9
Hillsboro 9
Hải Dương 9
Kuala Lumpur 9
Lappeenranta 9
Nanchang 9
Redwood City 9
Riyadh 9
San Francisco 9
Shenyang 9
Vienna 9
Amman 8
Totale 14.391
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 382
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 338
Enabling convergence of physical and logical security through intelligent event correlation 325
A comparative analysis of emerging approaches for securing java software with Intel SGX 315
A multi-sensor data fusion approach for detecting direct debit frauds 311
Effective QoS Monitoring in Large Scale Social Networks 302
Cloud security: Emerging threats and current solutions 300
Resource allocation in multi-domain networks based on Service Level Specifications 289
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 289
A GPS Spoofing Resilient WAMS for Smart Grid 285
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 285
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 281
A framework for mastering heterogeneity in multi-layer security information and event correlation 280
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 278
High-speed intrusion detection in support of critical infrastructure protection 276
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 274
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 271
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 267
A workflow service mediator for automated information processing and scheduling delivery to an archive 266
An Approach for Securing Critical Applications in Untrusted Clouds 266
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 261
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 260
An abstract reasoning architecture for privacy policies monitoring 260
Applying extensions of evidence theory to detect frauds in financial infrastructures 258
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 255
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 254
The human role in tools for improving robustness and resilience of critical infrastructures 253
Increasing security and protection of SCADA systems through infrastructure resilience 253
Enhancing SIEM Technology to Protect Critical Infrastructures 252
An OpenNCP-based Solution for Secure eHealth Data Exchange 251
Techniques for available bandwidth measurement in IP networks: a performance comparison 250
Effective visualization of a big data banking application 249
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 248
Security Analysis of Smart Grid Data Collection Technologies 246
A resilient architecture for forensic storage of events in critical infrastructures 243
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 242
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 239
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 239
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 236
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 235
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 235
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 233
Real-time QoS monitoring from the end user perspective in large scale social networks 231
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 229
Managing service level agreements in Premium IP networks: a business-oriented approach 227
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 227
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 227
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 225
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 224
Performance comparison of different techniques for available bandwidth measurement in packet switched network 222
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 221
My smart home is under attack 221
A semantic approach to policy-based management: linking policies to ontologies 220
An architecture for automatic configuration of integrated networks 218
How to protect public administration from cybersecurity threats: The COMPACT project 218
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 216
Using metadata in SLA negotiation over Premium IP networks 216
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 214
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 212
Time-aware admission control on top of time-unaware network infrastructures 212
Behavioral network engineering: making intrusion detection become autonomic 208
Exposing vulnerabilities in electric power grids: An experimental approach 208
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 205
Protecting critical business processes of smart hospitals from cyber attacks 205
Advanced SIEM Technology for Critical Infrastructure Protection 204
BET: a hybrid bandwidth estimation tool 202
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 199
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 198
International cooperation experiences: Results achieved, lessons learned, and way ahead 197
Use of traffic engineering techniques to increase resilience of SCADA networks 197
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 194
Designing service negotiation entities for the electronic market-place 192
Traffic management 188
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 184
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 183
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 182
INTERSECTION Approach to Vulnerability Handling 180
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 176
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 175
Network Resilience 162
Exploiting diversity and correlation to improve the performance of intrusion detection systems 159
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 158
Real-time Security & Dependability monitoring: Make it a bundle 157
An e-commerce framework for service assurance in the Internet 155
Runtime model checking for sla compliance monitoring and qos prediction 155
Assessing the scalability of component-based frameworks: the CADENUS case study 154
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 153
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 148
Dependability and resilience of computer networks (SCADA / cyber-security) 142
null 138
Innovative solutions for inclusion of totally blind people 135
Distributed Framework for Cybersecurity of Critical Infrastructures 133
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 128
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 125
A Tamper-Resistant Storage Framework for Smart Grid security 118
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 116
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks 103
Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation 101
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach 101
An Innovative Approach to Real-Time Concept Drift Detection in Network Security 100
Totale 21.830
Categoria #
all - tutte 80.380
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 80.380


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021787 0 0 0 0 0 0 0 0 0 0 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.723 66 301 30 128 240 595 1.004 1.521 194 157 277 210
2025/20263.801 335 494 658 310 234 120 441 256 534 351 68 0
Totale 22.669