D'ANTONIO, Salvatore
 Distribuzione geografica
Continente #
NA - Nord America 11.500
EU - Europa 5.937
AS - Asia 2.364
SA - Sud America 630
AF - Africa 44
Continente sconosciuto - Info sul continente non disponibili 18
OC - Oceania 8
Totale 20.501
Nazione #
US - Stati Uniti d'America 11.403
RU - Federazione Russa 2.378
UA - Ucraina 939
SG - Singapore 843
VN - Vietnam 682
CN - Cina 567
IT - Italia 565
BR - Brasile 527
DE - Germania 493
GB - Regno Unito 474
SE - Svezia 426
FR - Francia 277
FI - Finlandia 106
HK - Hong Kong 66
CA - Canada 52
AR - Argentina 39
BE - Belgio 35
RO - Romania 32
IN - India 29
PL - Polonia 28
EC - Ecuador 25
NL - Olanda 24
CZ - Repubblica Ceca 23
MX - Messico 23
AT - Austria 22
BD - Bangladesh 21
TR - Turchia 20
GR - Grecia 18
IE - Irlanda 18
EU - Europa 17
ES - Italia 16
IQ - Iraq 14
LV - Lettonia 14
JP - Giappone 12
ZA - Sudafrica 12
MA - Marocco 11
AE - Emirati Arabi Uniti 10
CO - Colombia 10
SA - Arabia Saudita 10
CL - Cile 9
PK - Pakistan 9
VE - Venezuela 9
ID - Indonesia 8
PA - Panama 8
MY - Malesia 7
AU - Australia 6
HU - Ungheria 6
LT - Lituania 6
PT - Portogallo 6
PY - Paraguay 6
QA - Qatar 6
AL - Albania 5
AZ - Azerbaigian 5
HR - Croazia 5
UZ - Uzbekistan 5
BG - Bulgaria 4
DZ - Algeria 4
IR - Iran 4
KR - Corea 4
PH - Filippine 4
PS - Palestinian Territory 4
TN - Tunisia 4
CR - Costa Rica 3
DK - Danimarca 3
IL - Israele 3
JO - Giordania 3
KG - Kirghizistan 3
NO - Norvegia 3
TW - Taiwan 3
AM - Armenia 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
EG - Egitto 2
GE - Georgia 2
JM - Giamaica 2
KE - Kenya 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
NG - Nigeria 2
NP - Nepal 2
NZ - Nuova Zelanda 2
PE - Perù 2
SK - Slovacchia (Repubblica Slovacca) 2
SY - Repubblica araba siriana 2
TH - Thailandia 2
UG - Uganda 2
AF - Afghanistan, Repubblica islamica di 1
AO - Angola 1
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
CI - Costa d'Avorio 1
CY - Cipro 1
GT - Guatemala 1
HN - Honduras 1
Totale 20.485
Città #
Fairfield 1.532
Woodbridge 1.335
Houston 945
Ann Arbor 853
Dallas 723
Ashburn 705
Chandler 702
Seattle 635
Wilmington 600
Cambridge 548
Dong Ket 543
Singapore 324
Dearborn 313
Nyköping 275
Jacksonville 254
Moscow 245
Boardman 223
Southend 222
The Dalles 214
Beijing 180
Naples 118
Princeton 96
Lawrence 90
Munich 86
Shanghai 74
Rome 67
Ogden 66
Düsseldorf 65
Council Bluffs 59
Hong Kong 59
Columbus 58
Ho Chi Minh City 58
San Diego 58
Los Angeles 57
Des Moines 52
Yubileyny 49
New York 45
Norwalk 42
São Paulo 42
London 39
Bremen 38
Brussels 35
Jinan 31
Boydton 29
Nanjing 29
Timisoara 27
Frankfurt am Main 24
Hanoi 24
Hefei 24
Chicago 22
Belo Horizonte 21
Kunming 21
Guangzhou 19
Dublin 17
Falls Church 17
Helsinki 17
Lauterbourg 17
Milan 17
Santa Clara 17
Brno 16
Ottawa 16
Scottsdale 16
Tappahannock 16
Grafing 15
Riga 14
Atlanta 13
Rio de Janeiro 13
San Mateo 13
Amsterdam 12
Brooklyn 12
Curitiba 12
Da Nang 12
Montreal 12
Napoli 11
Quito 11
Tokyo 11
Hebei 10
Kraków 10
Portsmouth 10
Toronto 10
Lappeenranta 9
Nanchang 9
Redwood City 9
Shenyang 9
Stockholm 9
Brasília 8
Johannesburg 8
New Bedfont 8
Ningbo 8
San Francisco 8
Vienna 8
Warsaw 8
Zhengzhou 8
Auburn Hills 7
Fortaleza 7
Fuzhou 7
Guayaquil 7
Hounslow 7
Pomigliano d'Arco 7
Salvador 7
Totale 13.520
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 365
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 321
Enabling convergence of physical and logical security through intelligent event correlation 310
A comparative analysis of emerging approaches for securing java software with Intel SGX 295
A multi-sensor data fusion approach for detecting direct debit frauds 288
Effective QoS Monitoring in Large Scale Social Networks 287
Cloud security: Emerging threats and current solutions 285
Resource allocation in multi-domain networks based on Service Level Specifications 275
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 274
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 266
High-speed intrusion detection in support of critical infrastructure protection 265
A framework for mastering heterogeneity in multi-layer security information and event correlation 264
A GPS Spoofing Resilient WAMS for Smart Grid 263
Design Principles and Algorithms for Effective High Speed IP Flow Monitoring 262
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 260
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 255
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 252
A workflow service mediator for automated information processing and scheduling delivery to an archive 251
An Approach for Securing Critical Applications in Untrusted Clouds 251
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 248
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 247
Increasing security and protection of SCADA systems through infrastructure resilience 245
Applying extensions of evidence theory to detect frauds in financial infrastructures 245
An abstract reasoning architecture for privacy policies monitoring 243
The human role in tools for improving robustness and resilience of critical infrastructures 241
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 240
Enhancing SIEM Technology to Protect Critical Infrastructures 238
Techniques for available bandwidth measurement in IP networks: a performance comparison 238
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks 238
Effective visualization of a big data banking application 233
An OpenNCP-based Solution for Secure eHealth Data Exchange 232
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 230
Security Analysis of Smart Grid Data Collection Technologies 229
A resilient architecture for forensic storage of events in critical infrastructures 226
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems 224
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 224
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 220
How To Monitor QoS in Cloud Infrastructures: the QoSMONaaS approach 219
Performance Assessment of a Distributed Intrusion Detection System in a Real Network Scenario 219
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 219
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 219
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 218
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 218
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 217
CADENUS: Creation and Deployment of End-User Services in Premium IP Networks 216
Real-time QoS monitoring from the end user perspective in large scale social networks 215
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 214
Performance comparison of different techniques for available bandwidth measurement in packet switched network 212
INTERMON: an Architecture for Inter-domain Monitoring, Modelling and Simulation 211
My smart home is under attack 211
Managing service level agreements in Premium IP networks: a business-oriented approach 209
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 207
An architecture for automatic configuration of integrated networks 207
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 206
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 205
A semantic approach to policy-based management: linking policies to ontologies 203
Using metadata in SLA negotiation over Premium IP networks 202
How to protect public administration from cybersecurity threats: The COMPACT project 202
Time-aware admission control on top of time-unaware network infrastructures 196
Behavioral network engineering: making intrusion detection become autonomic 195
Exposing vulnerabilities in electric power grids: An experimental approach 195
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People 193
Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems 193
BET: a hybrid bandwidth estimation tool 192
Protecting critical business processes of smart hospitals from cyber attacks 191
Advanced SIEM Technology for Critical Infrastructure Protection 186
Adaptive streaming of multimedia content: dealing with both terminal and network heterogeneity 183
International cooperation experiences: Results achieved, lessons learned, and way ahead 182
Designing service negotiation entities for the electronic market-place 182
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 182
Use of traffic engineering techniques to increase resilience of SCADA networks 181
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 179
Traffic management 178
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 175
INTERSECTION Approach to Vulnerability Handling 170
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 168
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 166
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 162
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 159
Network Resilience 146
Exploiting diversity and correlation to improve the performance of intrusion detection systems 146
Real-time Security & Dependability monitoring: Make it a bundle 145
An e-commerce framework for service assurance in the Internet 141
Assessing the scalability of component-based frameworks: the CADENUS case study 140
Runtime model checking for sla compliance monitoring and qos prediction 139
null 138
Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks 137
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 134
Pinball caching: improving performance of a framework for dynamic web-content adaptation and delivery 131
Innovative solutions for inclusion of totally blind people 126
Distributed Framework for Cybersecurity of Critical Infrastructures 123
Dependability and resilience of computer networks (SCADA / cyber-security) 122
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 105
A Tamper-Resistant Storage Framework for Smart Grid security 101
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 97
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 87
Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation 85
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 85
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks 83
PriSIEM: Enabling privacy-preserving Managed Security Services 80
Totale 20.278
Categoria #
all - tutte 76.184
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 76.184


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.601 0 0 0 0 0 124 273 71 112 234 129 658
2021/20221.137 126 178 36 267 49 60 119 90 56 83 47 26
2022/20231.942 240 167 110 242 203 340 53 225 190 47 79 46
2023/2024596 74 40 41 30 31 54 21 50 113 34 20 88
2024/20254.723 66 301 30 128 240 595 1.004 1.521 194 157 277 210
2025/20262.038 335 494 658 310 234 7 0 0 0 0 0 0
Totale 20.906