D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 10.673
EU - Europa 5.875
AS - Asia 1.925
SA - Sud America 464
AF - Africa 32
Continente sconosciuto - Info sul continente non disponibili 18
OC - Oceania 8
Totale 18.995
Nazione #
US - Stati Uniti d'America 10.584
RU - Federazione Russa 2.374
UA - Ucraina 936
SG - Singapore 607
VN - Vietnam 560
CN - Cina 544
IT - Italia 544
DE - Germania 489
GB - Regno Unito 470
SE - Svezia 424
BR - Brasile 411
FR - Francia 277
FI - Finlandia 105
CA - Canada 50
HK - Hong Kong 45
BE - Belgio 35
RO - Romania 31
PL - Polonia 28
IN - India 27
CZ - Repubblica Ceca 23
AT - Austria 22
NL - Olanda 19
AR - Argentina 18
GR - Grecia 18
IE - Irlanda 18
MX - Messico 18
EU - Europa 17
BD - Bangladesh 16
ES - Italia 16
TR - Turchia 16
EC - Ecuador 13
IQ - Iraq 11
JP - Giappone 11
AE - Emirati Arabi Uniti 10
MA - Marocco 10
SA - Arabia Saudita 9
PA - Panama 8
PK - Pakistan 8
ZA - Sudafrica 8
AU - Australia 6
CL - Cile 6
CO - Colombia 6
LT - Lituania 6
PT - Portogallo 6
AL - Albania 5
AZ - Azerbaigian 5
HU - Ungheria 5
MY - Malesia 5
QA - Qatar 5
UZ - Uzbekistan 5
VE - Venezuela 5
BG - Bulgaria 4
IR - Iran 4
KR - Corea 4
PS - Palestinian Territory 4
CR - Costa Rica 3
DK - Danimarca 3
DZ - Algeria 3
HR - Croazia 3
IL - Israele 3
LV - Lettonia 3
NO - Norvegia 3
TN - Tunisia 3
AM - Armenia 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
GE - Georgia 2
ID - Indonesia 2
JM - Giamaica 2
JO - Giordania 2
KG - Kirghizistan 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
NG - Nigeria 2
NZ - Nuova Zelanda 2
PH - Filippine 2
SK - Slovacchia (Repubblica Slovacca) 2
TW - Taiwan 2
UG - Uganda 2
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CI - Costa d'Avorio 1
CY - Cipro 1
EG - Egitto 1
GT - Guatemala 1
HN - Honduras 1
IM - Isola di Man 1
IS - Islanda 1
KW - Kuwait 1
LB - Libano 1
LU - Lussemburgo 1
NI - Nicaragua 1
NP - Nepal 1
OM - Oman 1
PE - Perù 1
PY - Paraguay 1
RS - Serbia 1
Totale 18.988
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Chandler 702
Ashburn 672
Seattle 635
Wilmington 596
Cambridge 548
Dong Ket 543
Dearborn 313
Nyköping 275
Singapore 272
Jacksonville 254
Moscow 245
Boardman 222
Southend 222
The Dalles 209
Beijing 177
Naples 105
Princeton 96
Lawrence 90
Munich 86
Shanghai 74
Ogden 66
Düsseldorf 65
Rome 62
Council Bluffs 59
Columbus 58
San Diego 58
Des Moines 52
Yubileyny 49
Los Angeles 46
New York 44
Norwalk 42
London 39
Bremen 38
Hong Kong 38
Brussels 35
São Paulo 34
Dallas 31
Jinan 31
Boydton 29
Nanjing 29
Timisoara 27
Hefei 24
Frankfurt am Main 22
Kunming 21
Belo Horizonte 20
Guangzhou 18
Dublin 17
Falls Church 17
Helsinki 17
Lauterbourg 17
Milan 17
Brno 16
Ottawa 16
Santa Clara 16
Scottsdale 16
Tappahannock 16
Grafing 15
Atlanta 13
San Mateo 13
Brooklyn 12
Montreal 11
Napoli 11
Hebei 10
Kraków 10
Portsmouth 10
Tokyo 10
Toronto 10
Curitiba 9
Lappeenranta 9
Nanchang 9
Quito 9
Redwood City 9
Rio de Janeiro 9
Shenyang 9
Stockholm 9
Amsterdam 8
Chicago 8
New Bedfont 8
Ningbo 8
San Francisco 8
Vienna 8
Warsaw 8
Zhengzhou 8
Auburn Hills 7
Fuzhou 7
Hounslow 7
Pomigliano d'Arco 7
Washington 7
Bexley 6
Calvi Risorta 6
Campinas 6
Changsha 6
Fortaleza 6
Halle 6
Hangzhou 6
Islington 6
Totale 12.547
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 324
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 308
Enabling convergence of physical and logical security through intelligent event correlation 298
Effective QoS Monitoring in Large Scale Social Networks 278
Cloud security: Emerging threats and current solutions 270
A comparative analysis of emerging approaches for securing java software with Intel SGX 268
A multi-sensor data fusion approach for detecting direct debit frauds 268
Resource allocation in multi-domain networks based on Service Level Specifications 267
High-speed intrusion detection in support of critical infrastructure protection 253
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 252
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 250
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 248
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 248
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 246
A GPS Spoofing Resilient WAMS for Smart Grid 242
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 242
Increasing security and protection of SCADA systems through infrastructure resilience 238
A framework for mastering heterogeneity in multi-layer security information and event correlation 236
An Approach for Securing Critical Applications in Untrusted Clouds 235
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 235
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 234
The human role in tools for improving robustness and resilience of critical infrastructures 234
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 232
Techniques for available bandwidth measurement in IP networks: a performance comparison 231
Enhancing SIEM Technology to Protect Critical Infrastructures 228
A workflow service mediator for automated information processing and scheduling delivery to an archive 226
Effective visualization of a big data banking application 223
Security Analysis of Smart Grid Data Collection Technologies 222
Applying extensions of evidence theory to detect frauds in financial infrastructures 222
An OpenNCP-based Solution for Secure eHealth Data Exchange 221
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 219
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 219
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 217
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 216
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 213
An abstract reasoning architecture for privacy policies monitoring 213
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 211
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 210
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 209
Real-time QoS monitoring from the end user perspective in large scale social networks 209
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 208
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 208
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 207
Performance comparison of different techniques for available bandwidth measurement in packet switched network 205
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 203
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 201
An architecture for automatic configuration of integrated networks 201
Managing service level agreements in Premium IP networks: a business-oriented approach 200
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 200
My smart home is under attack 200
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 199
A resilient architecture for forensic storage of events in critical infrastructures 199
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 198
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 198
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 197
Using metadata in SLA negotiation over Premium IP networks 195
Time-aware admission control on top of time-unaware network infrastructures 190
Behavioral network engineering: making intrusion detection become autonomic 189
Exposing vulnerabilities in electric power grids: An experimental approach 188
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 188
BET: a hybrid bandwidth estimation tool 186
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 183
A semantic approach to policy-based management: linking policies to ontologies 180
Designing service negotiation entities for the electronic market-place 179
International cooperation experiences: Results achieved, lessons learned, and way ahead 177
How to protect public administration from cybersecurity threats: The COMPACT project 177
Use of traffic engineering techniques to increase resilience of SCADA networks 175
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 170
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 169
Protecting critical business processes of smart hospitals from cyber attacks 164
INTERSECTION Approach to Vulnerability Handling 162
Advanced SIEM Technology for Critical Infrastructure Protection 162
Traffic management 162
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 159
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 154
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 154
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 153
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 141
Network Resilience 140
Exploiting diversity and correlation to improve the performance of intrusion detection systems 140
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 138
null 138
Real-time Security & Dependability monitoring: Make it a bundle 137
An e-commerce framework for service assurance in the Internet 136
Assessing the scalability of component-based frameworks: the CADENUS case study 132
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 130
Runtime model checking for sla compliance monitoring and qos prediction 128
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 121
Dependability and resilience of computer networks (SCADA / cyber-security) 116
Distributed Framework for Cybersecurity of Critical Infrastructures 115
Innovative solutions for inclusion of totally blind people 107
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 103
A Tamper-Resistant Storage Framework for Smart Grid security 79
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 76
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 73
An Innovative Approach to Real-Time Concept Drift Detection in Network Security 70
PriSIEM: Enabling privacy-preserving Managed Security Services 69
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 64
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach 62
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 61
Totale 18.931
Categoria #
all - tutte 68.589
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 68.589


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.466 0 127 220 208 310 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.723 66 301 30 128 240 595 1.004 1.521 194 157 277 210
2025/2026532 335 197 0 0 0 0 0 0 0 0 0 0
Totale 19.400