ROMANO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 11.384
EU - Europa 6.147
AS - Asia 3.023
SA - Sud America 704
AF - Africa 82
Continente sconosciuto - Info sul continente non disponibili 26
OC - Oceania 9
Totale 21.375
Nazione #
US - Stati Uniti d'America 11.289
RU - Federazione Russa 2.363
UA - Ucraina 992
SG - Singapore 890
VN - Vietnam 867
CN - Cina 800
IT - Italia 692
BR - Brasile 546
DE - Germania 500
GB - Regno Unito 490
SE - Svezia 467
FR - Francia 264
FI - Finlandia 111
HK - Hong Kong 93
IN - India 75
AR - Argentina 57
CA - Canada 53
TR - Turchia 32
RO - Romania 29
BE - Belgio 28
PK - Pakistan 27
PL - Polonia 26
EC - Ecuador 24
EU - Europa 24
BD - Bangladesh 23
CZ - Repubblica Ceca 23
ES - Italia 23
IQ - Iraq 23
SA - Arabia Saudita 23
CO - Colombia 22
ID - Indonesia 22
NL - Olanda 22
AT - Austria 20
IE - Irlanda 20
ZA - Sudafrica 20
PH - Filippine 19
JP - Giappone 16
VE - Venezuela 16
AE - Emirati Arabi Uniti 15
CL - Cile 14
MX - Messico 14
GR - Grecia 12
LV - Lettonia 11
MA - Marocco 11
MY - Malesia 11
UZ - Uzbekistan 11
PY - Paraguay 10
CI - Costa d'Avorio 9
LT - Lituania 9
AZ - Azerbaigian 8
KE - Kenya 8
AL - Albania 7
CR - Costa Rica 7
DZ - Algeria 7
AU - Australia 6
BO - Bolivia 6
EG - Egitto 6
IL - Israele 6
JO - Giordania 6
KG - Kirghizistan 6
QA - Qatar 6
KR - Corea 5
PA - Panama 5
PE - Perù 5
PS - Palestinian Territory 5
PT - Portogallo 5
TN - Tunisia 5
BG - Bulgaria 4
HR - Croazia 4
SK - Slovacchia (Repubblica Slovacca) 4
UY - Uruguay 4
BA - Bosnia-Erzegovina 3
DK - Danimarca 3
ET - Etiopia 3
HN - Honduras 3
HU - Ungheria 3
IR - Iran 3
LB - Libano 3
NP - Nepal 3
OM - Oman 3
SN - Senegal 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
TW - Taiwan 3
AM - Armenia 2
AO - Angola 2
BH - Bahrain 2
CH - Svizzera 2
EE - Estonia 2
GE - Georgia 2
GT - Guatemala 2
JM - Giamaica 2
LA - Repubblica Popolare Democratica del Laos 2
LK - Sri Lanka 2
LU - Lussemburgo 2
MD - Moldavia 2
NG - Nigeria 2
NO - Norvegia 2
NZ - Nuova Zelanda 2
PR - Porto Rico 2
Totale 21.354
Città #
Fairfield 1.398
Woodbridge 1.257
Houston 812
Ann Arbor 749
Ashburn 748
Chandler 722
Dallas 665
Dong Ket 606
Seattle 594
Wilmington 550
Cambridge 483
Singapore 413
Dearborn 350
San Jose 323
Moscow 307
Nyköping 298
Jacksonville 271
The Dalles 248
Southend 232
Boardman 230
Beijing 195
Naples 180
Princeton 107
Lawrence 95
Hong Kong 85
Ho Chi Minh City 83
Munich 75
Shanghai 73
Ogden 69
Düsseldorf 67
Hanoi 66
Rome 64
Los Angeles 59
Bremen 53
San Diego 52
Yubileyny 52
Des Moines 48
New York 48
London 47
Columbus 46
Norwalk 43
São Paulo 42
Council Bluffs 36
Frankfurt am Main 36
Grafing 36
Nanjing 34
Brussels 28
Santa Clara 28
Hefei 27
Chicago 25
Timisoara 25
Kunming 24
Belo Horizonte 21
Guangzhou 21
Milan 21
Brno 20
Dublin 19
Helsinki 19
Lauterbourg 19
Ottawa 19
Atlanta 18
Da Nang 16
Scottsdale 16
Tokyo 16
Curitiba 15
Jinan 15
San Francisco 15
Napoli 14
Rio de Janeiro 13
Brooklyn 12
Johannesburg 12
Shenyang 12
Stockholm 12
Tappahannock 12
Warsaw 12
Baghdad 11
Riga 11
Riyadh 11
Brasília 10
Fortaleza 10
Guayaquil 10
Haiphong 10
Istanbul 10
Mumbai 10
Redwood City 10
Salvador 10
Tashkent 10
Abidjan 9
Amsterdam 9
Falls Church 9
Hải Dương 9
Kuala Lumpur 9
Lappeenranta 9
Toronto 9
Hebei 8
Kraków 8
Nanchang 8
Orem 8
San Mateo 8
Santiago 8
Totale 13.807
Nome #
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 338
A comparative analysis of emerging approaches for securing java software with Intel SGX 315
Effective QoS Monitoring in Large Scale Social Networks 301
Cloud security: Emerging threats and current solutions 300
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 288
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 284
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 279
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 278
A framework for mastering heterogeneity in multi-layer security information and event correlation 278
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 271
A hidden Markov model based intrusion detection system for wireless sensor networks 267
A healthcare real-time monitoring system for multiple sensors data collection and correlation 267
A workflow service mediator for automated information processing and scheduling delivery to an archive 266
A Business Process Monitor for a Mobile Phone Recharging System 265
Secure access to personalized web services 262
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 258
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 258
Applying extensions of evidence theory to detect frauds in financial infrastructures 255
Increasing security and protection of SCADA systems through infrastructure resilience 253
An OpenNCP-based Solution for Secure eHealth Data Exchange 251
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 250
Enhancing SIEM Technology to Protect Critical Infrastructures 249
Effective visualization of a big data banking application 249
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 247
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 247
Security Analysis of Smart Grid Data Collection Technologies 244
A resilient architecture for forensic storage of events in critical infrastructures 242
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 240
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 239
A Correlation Approach to Intrusion Detection 238
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 235
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 235
Adaptable parsing of real-time data streams 234
A Novel Unified Architecture for Public-Key Cryptography 233
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 232
Real-time QoS monitoring from the end user perspective in large scale social networks 231
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 230
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 227
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 225
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 224
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 223
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 222
My smart home is under attack 220
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 218
How to protect public administration from cybersecurity threats: The COMPACT project 218
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation 215
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 214
Exposing vulnerabilities in electric power grids: An experimental approach 208
Protecting critical business processes of smart hospitals from cyber attacks 205
Advanced SIEM Technology for Critical Infrastructure Protection 202
Improving the QoS of MPEG2 Streaming over Wireless LANs 201
Elliptic curve cryptography engineering 201
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 201
Innovative healthcare services for nomadic users 200
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 199
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 198
High-Performance and Interoperable Security Services for Mobile Environments 196
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 194
Security Engineering of SOA Applications Via Reliability Patterns 193
International cooperation experiences: Results achieved, lessons learned, and way ahead 192
Scalable Network Traffic Classification Using Distributed Support Vector Machines 191
Providing digital time stamping services to mobile devices 190
A Novel Approach to QoS Monitoring in the Cloud 187
MASSIF: A Promising Solution to Enhance Olympic Games IT Security 186
Performance Evaluation of Security Services: An Experimental Approach 185
An FPGA-based Key-Store for Improving the Dependability of Security Services 185
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 183
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 182
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 181
Hardware Support for High-Performance,Intrusion- and Fault- Tolerant Systems 180
A Fault Tolerance Access to Legacy Database Systems using CORBA Technology 177
Web Services Workflow Reliability Estimation Through Reliability Patterns 177
Implementation of Threshold-based Diagnostic Mechanisms for COTS-based Applications 177
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 176
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 174
An event correlation approach for fault diagnosis in SCADA infrastructures 165
Network Resilience 161
Real-time Security & Dependability monitoring: Make it a bundle 157
Exploiting diversity and correlation to improve the performance of intrusion detection systems 156
Runtime model checking for sla compliance monitoring and qos prediction 155
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 153
Integrating Reactive Cloud Applications in SERECA 152
An Architecture for Security Oriented Perfective Maintenance of Legacy Software 149
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" 149
Building a dependable system from a legacy application with CORBA 148
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 147
Dependability and resilience of computer networks (SCADA / cyber-security) 142
SLA compliance monitoring through semantic processing 141
Using Web Services Technology for Inter-Enterprise Integration of Digital Time Stamping 139
null 138
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices 136
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware 131
“Architecture and FPGA Implementation of a Digit-Serial RSA Processor” 129
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 129
FPGA-based Implementation of a serial RSA processor 128
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 127
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications 125
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 121
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems, SRDS 2008: Message from the general chair 116
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 115
Totale 20.645
Categoria #
all - tutte 82.117
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 82.117


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.088 0 0 0 0 0 0 0 0 0 238 118 732
2021/20221.186 119 193 36 284 40 53 146 100 59 78 56 22
2022/20232.064 261 164 123 240 240 346 45 256 197 54 79 59
2023/2024598 60 43 42 25 37 50 21 50 124 27 22 97
2024/20254.342 69 291 26 95 106 516 971 1.500 177 161 256 174
2025/20263.652 334 480 602 346 249 113 433 261 530 304 0 0
Totale 21.786