D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 11.465
EU - Europa 5.917
AS - Asia 2.195
SA - Sud America 616
AF - Africa 43
Continente sconosciuto - Info sul continente non disponibili 18
OC - Oceania 8
Totale 20.262
Nazione #
US - Stati Uniti d'America 11.370
RU - Federazione Russa 2.376
UA - Ucraina 939
SG - Singapore 753
VN - Vietnam 634
IT - Italia 559
CN - Cina 558
BR - Brasile 522
DE - Germania 491
GB - Regno Unito 474
SE - Svezia 426
FR - Francia 277
FI - Finlandia 105
CA - Canada 52
HK - Hong Kong 51
BE - Belgio 35
AR - Argentina 33
RO - Romania 32
IN - India 29
PL - Polonia 28
EC - Ecuador 24
NL - Olanda 24
CZ - Repubblica Ceca 23
AT - Austria 22
BD - Bangladesh 21
MX - Messico 21
TR - Turchia 20
GR - Grecia 18
IE - Irlanda 18
EU - Europa 17
ES - Italia 16
IQ - Iraq 14
JP - Giappone 12
ZA - Sudafrica 12
MA - Marocco 11
AE - Emirati Arabi Uniti 10
CO - Colombia 10
SA - Arabia Saudita 10
VE - Venezuela 9
CL - Cile 8
PA - Panama 8
PK - Pakistan 8
AU - Australia 6
HU - Ungheria 6
ID - Indonesia 6
LT - Lituania 6
MY - Malesia 6
PT - Portogallo 6
PY - Paraguay 6
QA - Qatar 6
AL - Albania 5
AZ - Azerbaigian 5
HR - Croazia 5
LV - Lettonia 5
UZ - Uzbekistan 5
BG - Bulgaria 4
IR - Iran 4
KR - Corea 4
PS - Palestinian Territory 4
TN - Tunisia 4
CR - Costa Rica 3
DK - Danimarca 3
DZ - Algeria 3
IL - Israele 3
JO - Giordania 3
KG - Kirghizistan 3
NO - Norvegia 3
PH - Filippine 3
AM - Armenia 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
EG - Egitto 2
GE - Georgia 2
JM - Giamaica 2
KE - Kenya 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
NG - Nigeria 2
NP - Nepal 2
NZ - Nuova Zelanda 2
SK - Slovacchia (Repubblica Slovacca) 2
TH - Thailandia 2
TW - Taiwan 2
UG - Uganda 2
AF - Afghanistan, Repubblica islamica di 1
AO - Angola 1
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CI - Costa d'Avorio 1
CY - Cipro 1
GT - Guatemala 1
HN - Honduras 1
IM - Isola di Man 1
IS - Islanda 1
Totale 20.246
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Dallas 723
Chandler 702
Ashburn 681
Seattle 635
Wilmington 600
Cambridge 548
Dong Ket 543
Dearborn 313
Singapore 276
Nyköping 275
Jacksonville 254
Moscow 245
Boardman 222
Southend 222
The Dalles 209
Beijing 180
Naples 114
Princeton 96
Lawrence 90
Munich 86
Shanghai 74
Ogden 66
Düsseldorf 65
Rome 65
Council Bluffs 59
Columbus 58
San Diego 58
Los Angeles 57
Des Moines 52
Yubileyny 49
New York 45
Hong Kong 44
Norwalk 42
São Paulo 42
Ho Chi Minh City 40
London 39
Bremen 38
Brussels 35
Jinan 31
Boydton 29
Nanjing 29
Timisoara 27
Hefei 24
Frankfurt am Main 23
Chicago 22
Belo Horizonte 21
Kunming 21
Guangzhou 18
Dublin 17
Falls Church 17
Helsinki 17
Lauterbourg 17
Milan 17
Santa Clara 17
Brno 16
Ottawa 16
Scottsdale 16
Tappahannock 16
Grafing 15
Hanoi 15
Atlanta 13
Rio de Janeiro 13
San Mateo 13
Amsterdam 12
Brooklyn 12
Curitiba 12
Montreal 12
Napoli 11
Quito 11
Tokyo 11
Hebei 10
Kraków 10
Portsmouth 10
Toronto 10
Lappeenranta 9
Nanchang 9
Redwood City 9
Shenyang 9
Stockholm 9
Johannesburg 8
New Bedfont 8
Ningbo 8
San Francisco 8
Vienna 8
Warsaw 8
Zhengzhou 8
Auburn Hills 7
Brasília 7
Da Nang 7
Fortaleza 7
Fuzhou 7
Hounslow 7
Pomigliano d'Arco 7
Salvador 7
Washington 7
Bexley 6
Totale 13.378
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 363
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 318
Enabling convergence of physical and logical security through intelligent event correlation 308
A comparative analysis of emerging approaches for securing java software with Intel SGX 292
Effective QoS Monitoring in Large Scale Social Networks 287
A multi-sensor data fusion approach for detecting direct debit frauds 284
Cloud security: Emerging threats and current solutions 283
Resource allocation in multi-domain networks based on Service Level Specifications 273
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 271
High-speed intrusion detection in support of critical infrastructure protection 263
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 262
A GPS Spoofing Resilient WAMS for Smart Grid 261
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 261
A framework for mastering heterogeneity in multi-layer security information and event correlation 260
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 257
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 255
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 249
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 248
A workflow service mediator for automated information processing and scheduling delivery to an archive 248
An Approach for Securing Critical Applications in Untrusted Clouds 246
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 244
Increasing security and protection of SCADA systems through infrastructure resilience 244
The human role in tools for improving robustness and resilience of critical infrastructures 240
An abstract reasoning architecture for privacy policies monitoring 240
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 237
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 237
Techniques for available bandwidth measurement in IP networks: a performance comparison 236
Applying extensions of evidence theory to detect frauds in financial infrastructures 236
Enhancing SIEM Technology to Protect Critical Infrastructures 235
Effective visualization of a big data banking application 230
An OpenNCP-based Solution for Secure eHealth Data Exchange 230
Security Analysis of Smart Grid Data Collection Technologies 228
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 226
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 224
A resilient architecture for forensic storage of events in critical infrastructures 223
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 222
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 219
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 217
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 217
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 217
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 217
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 216
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 216
Real-time QoS monitoring from the end user perspective in large scale social networks 215
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 215
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 214
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 212
Performance comparison of different techniques for available bandwidth measurement in packet switched network 211
My smart home is under attack 210
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 208
Managing service level agreements in Premium IP networks: a business-oriented approach 207
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 206
An architecture for automatic configuration of integrated networks 206
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 204
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 202
Using metadata in SLA negotiation over Premium IP networks 201
A semantic approach to policy-based management: linking policies to ontologies 200
How to protect public administration from cybersecurity threats: The COMPACT project 199
Behavioral network engineering: making intrusion detection become autonomic 195
Exposing vulnerabilities in electric power grids: An experimental approach 195
Time-aware admission control on top of time-unaware network infrastructures 195
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 192
BET: a hybrid bandwidth estimation tool 191
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 190
Protecting critical business processes of smart hospitals from cyber attacks 188
Advanced SIEM Technology for Critical Infrastructure Protection 184
International cooperation experiences: Results achieved, lessons learned, and way ahead 182
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 182
Designing service negotiation entities for the electronic market-place 181
Use of traffic engineering techniques to increase resilience of SCADA networks 180
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 180
Traffic management 176
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 176
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 175
INTERSECTION Approach to Vulnerability Handling 169
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 167
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 165
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 160
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 159
Network Resilience 146
Exploiting diversity and correlation to improve the performance of intrusion detection systems 145
Real-time Security & Dependability monitoring: Make it a bundle 144
An e-commerce framework for service assurance in the Internet 140
Runtime model checking for sla compliance monitoring and qos prediction 139
Assessing the scalability of component-based frameworks: the CADENUS case study 139
null 138
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 136
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 129
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 128
Innovative solutions for inclusion of totally blind people 126
Distributed Framework for Cybersecurity of Critical Infrastructures 122
Dependability and resilience of computer networks (SCADA / cyber-security) 122
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 102
A Tamper-Resistant Storage Framework for Smart Grid security 96
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 95
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 82
Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation 79
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks 79
PriSIEM: Enabling privacy-preserving Managed Security Services 77
An Innovative Approach to Real-Time Concept Drift Detection in Network Security 77
Totale 20.073
Categoria #
all - tutte 74.895
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 74.895


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.911 0 0 0 0 310 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.723 66 301 30 128 240 595 1.004 1.521 194 157 277 210
2025/20261.799 335 494 658 310 2 0 0 0 0 0 0 0
Totale 20.667