ROMANO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 9.918
EU - Europa 5.955
AS - Asia 1.783
SA - Sud America 367
AF - Africa 26
Continente sconosciuto - Info sul continente non disponibili 25
OC - Oceania 8
Totale 18.082
Nazione #
US - Stati Uniti d'America 9.855
RU - Federazione Russa 2.353
UA - Ucraina 987
IT - Italia 614
VN - Vietnam 614
CN - Cina 504
DE - Germania 481
GB - Regno Unito 479
SG - Singapore 469
SE - Svezia 460
BR - Brasile 332
FR - Francia 253
FI - Finlandia 105
CA - Canada 45
HK - Hong Kong 43
IN - India 30
RO - Romania 29
BE - Belgio 27
EU - Europa 24
CZ - Repubblica Ceca 23
IE - Irlanda 20
AT - Austria 18
PL - Polonia 18
TR - Turchia 17
NL - Olanda 16
ES - Italia 13
AE - Emirati Arabi Uniti 12
AR - Argentina 12
GR - Grecia 12
SA - Arabia Saudita 11
BD - Bangladesh 9
JP - Giappone 9
IQ - Iraq 8
LT - Lituania 8
MA - Marocco 7
PK - Pakistan 7
AU - Australia 6
CO - Colombia 6
ZA - Sudafrica 6
AL - Albania 5
AZ - Azerbaigian 5
CL - Cile 5
KR - Corea 5
PA - Panama 5
PT - Portogallo 5
QA - Qatar 5
HR - Croazia 4
IL - Israele 4
MX - Messico 4
SK - Slovacchia (Repubblica Slovacca) 4
UZ - Uzbekistan 4
VE - Venezuela 4
BG - Bulgaria 3
DK - Danimarca 3
EG - Egitto 3
IR - Iran 3
PH - Filippine 3
AM - Armenia 2
BO - Bolivia 2
CH - Svizzera 2
CR - Costa Rica 2
EC - Ecuador 2
EE - Estonia 2
GE - Georgia 2
HU - Ungheria 2
ID - Indonesia 2
KE - Kenya 2
KG - Kirghizistan 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
LU - Lussemburgo 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
NZ - Nuova Zelanda 2
TT - Trinidad e Tobago 2
UG - Uganda 2
UY - Uruguay 2
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
DO - Repubblica Dominicana 1
DZ - Algeria 1
GT - Guatemala 1
HN - Honduras 1
IS - Islanda 1
JM - Giamaica 1
JO - Giordania 1
LK - Sri Lanka 1
MD - Moldavia 1
MY - Malesia 1
NP - Nepal 1
PE - Perù 1
PS - Palestinian Territory 1
PY - Paraguay 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
TW - Taiwan 1
Totale 18.080
Città #
Fairfield 1.398
Woodbridge 1.257
Houston 811
Ann Arbor 749
Chandler 722
Ashburn 613
Dong Ket 606
Seattle 594
Wilmington 547
Cambridge 483
Dearborn 350
Moscow 306
Nyköping 298
Jacksonville 271
Singapore 233
Southend 232
Boardman 228
The Dalles 182
Beijing 168
Naples 140
Princeton 107
Lawrence 95
Munich 75
Shanghai 70
Ogden 69
Düsseldorf 67
Bremen 53
Rome 53
San Diego 52
Yubileyny 52
Des Moines 47
Columbus 46
London 45
Los Angeles 45
Norwalk 43
New York 41
Hong Kong 37
Grafing 36
Council Bluffs 34
Nanjing 34
Brussels 27
Hefei 27
Timisoara 25
Dallas 24
Kunming 24
São Paulo 23
Frankfurt am Main 22
Guangzhou 21
Brno 20
Milan 20
Dublin 19
Lauterbourg 19
Ottawa 19
Belo Horizonte 16
Scottsdale 16
Atlanta 15
Jinan 15
Santa Clara 15
Helsinki 14
Napoli 14
Shenyang 12
Tappahannock 12
San Francisco 11
Chicago 10
Redwood City 10
Brooklyn 9
Falls Church 9
Lappeenranta 9
Rio de Janeiro 9
Tokyo 9
Curitiba 8
Fortaleza 8
Hebei 8
Kraków 8
Nanchang 8
San Mateo 8
Stockholm 8
Toronto 8
Auburn Hills 7
Brasília 7
Fuzhou 7
Hounslow 7
Istanbul 7
Redmond 7
Afragola 6
Cava de' Tirreni 6
Indiana 6
Mumbai 6
Portsmouth 6
Salvador 6
Warsaw 6
Amsterdam 5
Baku 5
Bexley 5
Campinas 5
Changsha 5
Halle 5
Hangzhou 5
Jiaxing 5
Kilburn 5
Totale 11.977
Nome #
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 306
Effective QoS Monitoring in Large Scale Social Networks 276
Cloud security: Emerging threats and current solutions 267
A comparative analysis of emerging approaches for securing java software with Intel SGX 267
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 248
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 247
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 246
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 244
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 242
Secure access to personalized web services 242
A healthcare real-time monitoring system for multiple sensors data collection and correlation 239
A hidden Markov model based intrusion detection system for wireless sensor networks 237
Increasing security and protection of SCADA systems through infrastructure resilience 237
A framework for mastering heterogeneity in multi-layer security information and event correlation 234
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 234
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 232
A Business Process Monitor for a Mobile Phone Recharging System 228
Enhancing SIEM Technology to Protect Critical Infrastructures 226
A workflow service mediator for automated information processing and scheduling delivery to an archive 224
Effective visualization of a big data banking application 222
Security Analysis of Smart Grid Data Collection Technologies 220
Applying extensions of evidence theory to detect frauds in financial infrastructures 220
An OpenNCP-based Solution for Secure eHealth Data Exchange 219
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 216
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 215
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 214
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 212
Adaptable parsing of real-time data streams 211
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 209
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 209
Real-time QoS monitoring from the end user perspective in large scale social networks 208
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 207
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 206
A Novel Unified Architecture for Public-Key Cryptography 205
A Correlation Approach to Intrusion Detection 204
My smart home is under attack 199
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 198
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 198
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 198
A resilient architecture for forensic storage of events in critical infrastructures 197
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 196
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 195
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 194
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 193
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 188
Exposing vulnerabilities in electric power grids: An experimental approach 187
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation 182
Innovative healthcare services for nomadic users 181
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 180
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 177
International cooperation experiences: Results achieved, lessons learned, and way ahead 176
High-Performance and Interoperable Security Services for Mobile Environments 176
Improving the QoS of MPEG2 Streaming over Wireless LANs 175
Elliptic curve cryptography engineering 175
Scalable Network Traffic Classification Using Distributed Support Vector Machines 172
How to protect public administration from cybersecurity threats: The COMPACT project 172
MASSIF: A Promising Solution to Enhance Olympic Games IT Security 170
Security Engineering of SOA Applications Via Reliability Patterns 170
Performance Evaluation of Security Services: An Experimental Approach 168
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 168
Providing digital time stamping services to mobile devices 165
Implementation of Threshold-based Diagnostic Mechanisms for COTS-based Applications 164
Hardware Support for High-Performance,Intrusion- and Fault- Tolerant Systems 162
Advanced SIEM Technology for Critical Infrastructure Protection 161
An FPGA-based Key-Store for Improving the Dependability of Security Services 160
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 158
Protecting critical business processes of smart hospitals from cyber attacks 158
A Novel Approach to QoS Monitoring in the Cloud 154
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 153
Web Services Workflow Reliability Estimation Through Reliability Patterns 152
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 152
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 152
An event correlation approach for fault diagnosis in SCADA infrastructures 149
Network Resilience 139
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 139
null 138
Exploiting diversity and correlation to improve the performance of intrusion detection systems 138
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 136
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 135
A Fault Tolerance Access to Legacy Database Systems using CORBA Technology 134
Real-time Security & Dependability monitoring: Make it a bundle 134
An Architecture for Security Oriented Perfective Maintenance of Legacy Software 130
Building a dependable system from a legacy application with CORBA 128
Integrating Reactive Cloud Applications in SERECA 128
Runtime model checking for sla compliance monitoring and qos prediction 126
SLA compliance monitoring through semantic processing 125
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices 120
Using Web Services Technology for Inter-Enterprise Integration of Digital Time Stamping 116
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" 115
Dependability and resilience of computer networks (SCADA / cyber-security) 115
FPGA-based Implementation of a serial RSA processor 110
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware 109
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems, SRDS 2008: Message from the general chair 107
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications 106
“Architecture and FPGA Implementation of a Digit-Serial RSA Processor” 105
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 101
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 94
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 88
An Intrusion Detection System for Next Generation Critical Infrastructures 85
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 74
Totale 17.873
Categoria #
all - tutte 70.237
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 70.237


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.340 0 107 184 148 271 102 274 76 90 238 118 732
2021/20221.186 119 193 36 284 40 53 146 100 59 78 56 22
2022/20232.064 261 164 123 240 240 346 45 256 197 54 79 59
2023/2024598 60 43 42 25 37 50 21 50 124 27 22 97
2024/20254.342 69 291 26 95 106 516 971 1.500 177 161 256 174
2025/2026357 334 23 0 0 0 0 0 0 0 0 0 0
Totale 18.491