D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 10.495
EU - Europa 5.822
AS - Asia 1.775
SA - Sud America 425
AF - Africa 28
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 8
Totale 18.570
Nazione #
US - Stati Uniti d'America 10.428
RU - Federazione Russa 2.372
UA - Ucraina 934
SG - Singapore 559
VN - Vietnam 550
IT - Italia 530
CN - Cina 483
DE - Germania 483
GB - Regno Unito 460
SE - Svezia 420
BR - Brasile 376
FR - Francia 275
FI - Finlandia 105
CA - Canada 36
BE - Belgio 35
HK - Hong Kong 35
RO - Romania 31
IN - India 25
PL - Polonia 24
CZ - Repubblica Ceca 23
AT - Austria 21
GR - Grecia 18
IE - Irlanda 18
NL - Olanda 18
EU - Europa 17
AR - Argentina 16
BD - Bangladesh 14
EC - Ecuador 13
MX - Messico 12
TR - Turchia 12
AE - Emirati Arabi Uniti 10
ES - Italia 10
IQ - Iraq 10
MA - Marocco 9
JP - Giappone 8
PA - Panama 8
PK - Pakistan 8
AU - Australia 6
CL - Cile 6
PT - Portogallo 6
ZA - Sudafrica 6
AL - Albania 5
CO - Colombia 5
HU - Ungheria 5
LT - Lituania 5
MY - Malesia 5
QA - Qatar 5
VE - Venezuela 5
AZ - Azerbaigian 4
BG - Bulgaria 4
IR - Iran 4
KR - Corea 4
PS - Palestinian Territory 4
UZ - Uzbekistan 4
CR - Costa Rica 3
DK - Danimarca 3
HR - Croazia 3
IL - Israele 3
LV - Lettonia 3
NO - Norvegia 3
SA - Arabia Saudita 3
TN - Tunisia 3
AM - Armenia 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
GE - Georgia 2
ID - Indonesia 2
JO - Giordania 2
KG - Kirghizistan 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
NG - Nigeria 2
NZ - Nuova Zelanda 2
PH - Filippine 2
SK - Slovacchia (Repubblica Slovacca) 2
TW - Taiwan 2
UG - Uganda 2
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CI - Costa d'Avorio 1
CY - Cipro 1
EG - Egitto 1
GT - Guatemala 1
HN - Honduras 1
IM - Isola di Man 1
IS - Islanda 1
JM - Giamaica 1
KW - Kuwait 1
LU - Lussemburgo 1
NI - Nicaragua 1
NP - Nepal 1
OM - Oman 1
PE - Perù 1
RS - Serbia 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
Totale 18.567
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Chandler 702
Ashburn 640
Seattle 634
Wilmington 596
Cambridge 548
Dong Ket 543
Dearborn 313
Nyköping 275
Singapore 264
Jacksonville 254
Moscow 245
Boardman 222
Southend 222
The Dalles 209
Beijing 116
Naples 105
Princeton 96
Lawrence 90
Munich 82
Shanghai 74
Ogden 66
Düsseldorf 65
Rome 60
Council Bluffs 59
Columbus 58
San Diego 58
Des Moines 52
Yubileyny 49
Norwalk 42
Bremen 38
Los Angeles 38
New York 36
Brussels 35
London 33
Jinan 31
Boydton 29
Nanjing 29
Hong Kong 28
São Paulo 27
Timisoara 27
Hefei 24
Frankfurt am Main 22
Kunming 21
Belo Horizonte 19
Guangzhou 18
Dublin 17
Falls Church 17
Helsinki 17
Milan 17
Brno 16
Lauterbourg 16
Ottawa 16
Scottsdale 16
Tappahannock 16
Grafing 15
Santa Clara 14
San Mateo 13
Napoli 11
Atlanta 10
Dallas 10
Hebei 10
Kraków 10
Lappeenranta 9
Nanchang 9
Portsmouth 9
Quito 9
Redwood City 9
Shenyang 9
Toronto 9
Amsterdam 8
Brooklyn 8
New Bedfont 8
Ningbo 8
Rio de Janeiro 8
Vienna 8
Zhengzhou 8
Auburn Hills 7
Curitiba 7
Fuzhou 7
Hounslow 7
Pomigliano d'Arco 7
Tokyo 7
Washington 7
Bexley 6
Campinas 6
Changsha 6
Halle 6
Hangzhou 6
Islington 6
Kilburn 6
Mumbai 6
Redmond 6
San Francisco 6
Berlin 5
Betim 5
Brasília 5
Totale 12.343
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 318
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 303
Enabling convergence of physical and logical security through intelligent event correlation 294
Effective QoS Monitoring in Large Scale Social Networks 275
Cloud security: Emerging threats and current solutions 265
Resource allocation in multi-domain networks based on Service Level Specifications 265
A comparative analysis of emerging approaches for securing java software with Intel SGX 265
A multi-sensor data fusion approach for detecting direct debit frauds 264
High-speed intrusion detection in support of critical infrastructure protection 251
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 250
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 245
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 245
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 243
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 241
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 241
Increasing security and protection of SCADA systems through infrastructure resilience 237
A GPS Spoofing Resilient WAMS for Smart Grid 236
An Approach for Securing Critical Applications in Untrusted Clouds 232
The human role in tools for improving robustness and resilience of critical infrastructures 231
A framework for mastering heterogeneity in multi-layer security information and event correlation 230
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 230
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 229
Techniques for available bandwidth measurement in IP networks: a performance comparison 229
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 226
Enhancing SIEM Technology to Protect Critical Infrastructures 223
A workflow service mediator for automated information processing and scheduling delivery to an archive 220
Effective visualization of a big data banking application 220
Applying extensions of evidence theory to detect frauds in financial infrastructures 218
Security Analysis of Smart Grid Data Collection Technologies 217
An OpenNCP-based Solution for Secure eHealth Data Exchange 216
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 215
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 214
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 212
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 212
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 209
Real-time QoS monitoring from the end user perspective in large scale social networks 208
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 207
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 207
An abstract reasoning architecture for privacy policies monitoring 207
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 205
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 205
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 204
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 203
Performance comparison of different techniques for available bandwidth measurement in packet switched network 202
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 201
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 200
An architecture for automatic configuration of integrated networks 199
My smart home is under attack 198
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 197
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 197
Managing service level agreements in Premium IP networks: a business-oriented approach 196
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 196
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 194
A resilient architecture for forensic storage of events in critical infrastructures 194
Using metadata in SLA negotiation over Premium IP networks 194
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 191
Time-aware admission control on top of time-unaware network infrastructures 189
Behavioral network engineering: making intrusion detection become autonomic 187
Exposing vulnerabilities in electric power grids: An experimental approach 186
BET: a hybrid bandwidth estimation tool 185
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 185
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 182
Designing service negotiation entities for the electronic market-place 178
International cooperation experiences: Results achieved, lessons learned, and way ahead 175
A semantic approach to policy-based management: linking policies to ontologies 173
Use of traffic engineering techniques to increase resilience of SCADA networks 172
How to protect public administration from cybersecurity threats: The COMPACT project 170
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 166
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 164
INTERSECTION Approach to Vulnerability Handling 160
Advanced SIEM Technology for Critical Infrastructure Protection 159
Traffic management 159
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 157
Protecting critical business processes of smart hospitals from cyber attacks 154
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 152
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 150
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 144
null 138
Exploiting diversity and correlation to improve the performance of intrusion detection systems 137
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 137
Network Resilience 135
An e-commerce framework for service assurance in the Internet 134
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 134
Real-time Security & Dependability monitoring: Make it a bundle 132
Assessing the scalability of component-based frameworks: the CADENUS case study 131
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 129
Runtime model checking for sla compliance monitoring and qos prediction 122
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 119
Dependability and resilience of computer networks (SCADA / cyber-security) 115
Distributed Framework for Cybersecurity of Critical Infrastructures 114
Innovative solutions for inclusion of totally blind people 106
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 96
A Tamper-Resistant Storage Framework for Smart Grid security 73
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 72
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 63
PriSIEM: Enabling privacy-preserving Managed Security Services 62
An Innovative Approach to Real-Time Concept Drift Detection in Network Security 61
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 60
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach 57
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 57
Totale 18.557
Categoria #
all - tutte 66.195
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 66.195


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.643 177 127 220 208 310 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.723 66 301 30 128 240 595 1.004 1.521 194 157 277 210
2025/2026107 107 0 0 0 0 0 0 0 0 0 0 0
Totale 18.975