ROMANO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 9.547
EU - Europa 5.777
AS - Asia 1.625
SA - Sud America 212
Continente sconosciuto - Info sul continente non disponibili 24
AF - Africa 21
OC - Oceania 8
Totale 17.214
Nazione #
US - Stati Uniti d'America 9.506
RU - Federazione Russa 2.347
UA - Ucraina 986
VN - Vietnam 610
IT - Italia 575
GB - Regno Unito 457
SE - Svezia 455
SG - Singapore 443
CN - Cina 441
DE - Germania 438
FR - Francia 218
BR - Brasile 190
FI - Finlandia 102
CA - Canada 28
HK - Hong Kong 28
RO - Romania 28
BE - Belgio 27
EU - Europa 24
CZ - Repubblica Ceca 23
IE - Irlanda 20
IN - India 20
AT - Austria 17
NL - Olanda 13
TR - Turchia 12
ES - Italia 10
PL - Polonia 9
AE - Emirati Arabi Uniti 8
GR - Grecia 8
AU - Australia 6
PK - Pakistan 6
AL - Albania 5
AR - Argentina 5
BD - Bangladesh 5
CL - Cile 5
CO - Colombia 5
KR - Corea 5
LT - Lituania 5
MA - Marocco 5
PA - Panama 5
PT - Portogallo 5
QA - Qatar 5
HR - Croazia 4
IQ - Iraq 4
JP - Giappone 4
SK - Slovacchia (Repubblica Slovacca) 4
ZA - Sudafrica 4
BG - Bulgaria 3
DK - Danimarca 3
IL - Israele 3
IR - Iran 3
MX - Messico 3
PH - Filippine 3
UZ - Uzbekistan 3
AM - Armenia 2
AZ - Azerbaigian 2
BO - Bolivia 2
CH - Svizzera 2
CR - Costa Rica 2
EC - Ecuador 2
EE - Estonia 2
EG - Egitto 2
HU - Ungheria 2
ID - Indonesia 2
KE - Kenya 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
NZ - Nuova Zelanda 2
SA - Arabia Saudita 2
UG - Uganda 2
VE - Venezuela 2
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
DO - Repubblica Dominicana 1
DZ - Algeria 1
GE - Georgia 1
GT - Guatemala 1
IS - Islanda 1
JO - Giordania 1
KG - Kirghizistan 1
LB - Libano 1
LK - Sri Lanka 1
MD - Moldavia 1
MY - Malesia 1
NP - Nepal 1
PS - Palestinian Territory 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
TW - Taiwan 1
TZ - Tanzania 1
UY - Uruguay 1
Totale 17.214
Città #
Fairfield 1.398
Woodbridge 1.257
Houston 810
Ann Arbor 749
Chandler 722
Dong Ket 606
Ashburn 596
Seattle 592
Wilmington 547
Cambridge 483
Dearborn 350
Moscow 305
Nyköping 298
Jacksonville 271
Southend 232
Boardman 228
Singapore 211
Naples 130
Princeton 107
Beijing 105
Lawrence 95
Shanghai 70
Ogden 69
Düsseldorf 67
Bremen 53
Yubileyny 52
San Diego 51
Munich 48
The Dalles 48
Des Moines 47
Norwalk 43
Rome 42
Grafing 36
London 36
Nanjing 34
Los Angeles 33
Council Bluffs 32
New York 32
Brussels 27
Hefei 27
Timisoara 25
Kunming 24
Hong Kong 22
Guangzhou 21
Brno 20
Dublin 19
Lauterbourg 19
Ottawa 18
Milan 17
Scottsdale 16
Jinan 15
Napoli 14
Helsinki 13
Dallas 12
Shenyang 12
Tappahannock 12
Redwood City 10
Santa Clara 10
Belo Horizonte 9
Falls Church 9
Lappeenranta 9
São Paulo 9
Hebei 8
Kraków 8
Nanchang 8
San Mateo 8
Atlanta 7
Auburn Hills 7
Frankfurt am Main 7
Fuzhou 7
Hounslow 7
Redmond 7
Brasília 6
Cava de' Tirreni 6
Indiana 6
Istanbul 6
Mumbai 6
Portsmouth 6
San Francisco 6
Toronto 6
Changsha 5
Halle 5
Hangzhou 5
Jiaxing 5
Kilburn 5
Madrid 5
New Bedfont 5
Ningbo 5
Padova 5
Pagani 5
Rio de Janeiro 5
Vienna 5
Washington 5
Zhengzhou 5
Acton 4
Avellino 4
Caivano 4
Chicago 4
Chongqing 4
Edinburgh 4
Totale 11.490
Nome #
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 288
Effective QoS Monitoring in Large Scale Social Networks 266
A comparative analysis of emerging approaches for securing java software with Intel SGX 258
Cloud security: Emerging threats and current solutions 256
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 241
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 239
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 238
Increasing security and protection of SCADA systems through infrastructure resilience 234
Secure access to personalized web services 234
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 231
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 230
A healthcare real-time monitoring system for multiple sensors data collection and correlation 227
A hidden Markov model based intrusion detection system for wireless sensor networks 226
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 225
A framework for mastering heterogeneity in multi-layer security information and event correlation 224
A Business Process Monitor for a Mobile Phone Recharging System 221
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 220
Enhancing SIEM Technology to Protect Critical Infrastructures 217
An OpenNCP-based Solution for Secure eHealth Data Exchange 213
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 211
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 211
Security Analysis of Smart Grid Data Collection Technologies 210
Effective visualization of a big data banking application 209
Applying extensions of evidence theory to detect frauds in financial infrastructures 208
A workflow service mediator for automated information processing and scheduling delivery to an archive 206
Adaptable parsing of real-time data streams 205
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 204
Real-time QoS monitoring from the end user perspective in large scale social networks 202
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 201
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 198
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 197
A Correlation Approach to Intrusion Detection 196
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 195
A Novel Unified Architecture for Public-Key Cryptography 195
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 195
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 195
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 193
My smart home is under attack 192
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 189
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 188
A resilient architecture for forensic storage of events in critical infrastructures 187
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 186
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 186
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 184
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 183
Exposing vulnerabilities in electric power grids: An experimental approach 181
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation 175
Innovative healthcare services for nomadic users 175
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 174
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 174
High-Performance and Interoperable Security Services for Mobile Environments 173
International cooperation experiences: Results achieved, lessons learned, and way ahead 172
Elliptic curve cryptography engineering 172
Security Engineering of SOA Applications Via Reliability Patterns 169
Scalable Network Traffic Classification Using Distributed Support Vector Machines 167
Improving the QoS of MPEG2 Streaming over Wireless LANs 166
How to protect public administration from cybersecurity threats: The COMPACT project 165
MASSIF: A Promising Solution to Enhance Olympic Games IT Security 163
Performance Evaluation of Security Services: An Experimental Approach 162
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 161
Implementation of Threshold-based Diagnostic Mechanisms for COTS-based Applications 159
Hardware Support for High-Performance,Intrusion- and Fault- Tolerant Systems 158
Providing digital time stamping services to mobile devices 158
An FPGA-based Key-Store for Improving the Dependability of Security Services 156
Advanced SIEM Technology for Critical Infrastructure Protection 154
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 151
A Novel Approach to QoS Monitoring in the Cloud 148
Web Services Workflow Reliability Estimation Through Reliability Patterns 147
Protecting critical business processes of smart hospitals from cyber attacks 147
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 146
An event correlation approach for fault diagnosis in SCADA infrastructures 144
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 143
null 138
Exploiting diversity and correlation to improve the performance of intrusion detection systems 135
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 133
Network Resilience 132
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 130
A Fault Tolerance Access to Legacy Database Systems using CORBA Technology 128
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 127
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 126
An Architecture for Security Oriented Perfective Maintenance of Legacy Software 125
Real-time Security & Dependability monitoring: Make it a bundle 125
Building a dependable system from a legacy application with CORBA 123
SLA compliance monitoring through semantic processing 121
Integrating Reactive Cloud Applications in SERECA 121
Runtime model checking for sla compliance monitoring and qos prediction 118
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices 117
Using Web Services Technology for Inter-Enterprise Integration of Digital Time Stamping 111
Dependability and resilience of computer networks (SCADA / cyber-security) 110
FPGA-based Implementation of a serial RSA processor 106
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" 106
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems, SRDS 2008: Message from the general chair 106
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications 103
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware 102
“Architecture and FPGA Implementation of a Digit-Serial RSA Processor” 100
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 91
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 87
An Intrusion Detection System for Next Generation Critical Infrastructures 83
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 78
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 66
Totale 17.122
Categoria #
all - tutte 64.798
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 64.798


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020340 0 0 0 0 0 0 0 0 0 84 175 81
2020/20212.504 164 107 184 148 271 102 274 76 90 238 118 732
2021/20221.186 119 193 36 284 40 53 146 100 59 78 56 22
2022/20232.064 261 164 123 240 240 346 45 256 197 54 79 59
2023/2024598 60 43 42 25 37 50 21 50 124 27 22 97
2024/20253.829 69 291 26 95 106 516 971 1.500 177 78 0 0
Totale 17.621