ROMANO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 9.758
EU - Europa 5.879
AS - Asia 1.653
SA - Sud America 324
Continente sconosciuto - Info sul continente non disponibili 24
AF - Africa 23
OC - Oceania 8
Totale 17.669
Nazione #
US - Stati Uniti d'America 9.707
RU - Federazione Russa 2.352
UA - Ucraina 987
VN - Vietnam 610
IT - Italia 589
GB - Regno Unito 470
DE - Germania 458
SE - Svezia 457
SG - Singapore 448
CN - Cina 441
BR - Brasile 296
FR - Francia 253
FI - Finlandia 104
CA - Canada 36
HK - Hong Kong 33
RO - Romania 29
BE - Belgio 27
EU - Europa 24
CZ - Repubblica Ceca 23
IN - India 23
IE - Irlanda 20
AT - Austria 18
TR - Turchia 14
NL - Olanda 13
GR - Grecia 12
PL - Polonia 12
AE - Emirati Arabi Uniti 10
ES - Italia 10
AR - Argentina 9
BD - Bangladesh 7
AU - Australia 6
JP - Giappone 6
LT - Lituania 6
MA - Marocco 6
PK - Pakistan 6
AL - Albania 5
CL - Cile 5
CO - Colombia 5
IQ - Iraq 5
KR - Corea 5
PA - Panama 5
PT - Portogallo 5
QA - Qatar 5
ZA - Sudafrica 5
AZ - Azerbaigian 4
HR - Croazia 4
SA - Arabia Saudita 4
SK - Slovacchia (Repubblica Slovacca) 4
BG - Bulgaria 3
DK - Danimarca 3
IL - Israele 3
IR - Iran 3
MX - Messico 3
PH - Filippine 3
UZ - Uzbekistan 3
VE - Venezuela 3
AM - Armenia 2
BO - Bolivia 2
CH - Svizzera 2
CR - Costa Rica 2
EC - Ecuador 2
EE - Estonia 2
EG - Egitto 2
GE - Georgia 2
HU - Ungheria 2
ID - Indonesia 2
KE - Kenya 2
KG - Kirghizistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
NZ - Nuova Zelanda 2
UG - Uganda 2
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
DO - Repubblica Dominicana 1
DZ - Algeria 1
GT - Guatemala 1
IS - Islanda 1
JM - Giamaica 1
JO - Giordania 1
LB - Libano 1
LK - Sri Lanka 1
MD - Moldavia 1
MY - Malesia 1
NP - Nepal 1
PE - Perù 1
PS - Palestinian Territory 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
TW - Taiwan 1
TZ - Tanzania 1
UY - Uruguay 1
Totale 17.669
Città #
Fairfield 1.398
Woodbridge 1.257
Houston 810
Ann Arbor 749
Chandler 722
Dong Ket 606
Ashburn 603
Seattle 593
Wilmington 547
Cambridge 483
Dearborn 350
Moscow 306
Nyköping 298
Jacksonville 271
Southend 232
Boardman 228
Singapore 213
The Dalles 182
Naples 136
Princeton 107
Beijing 105
Lawrence 95
Shanghai 70
Ogden 69
Düsseldorf 67
Bremen 53
Munich 53
San Diego 52
Yubileyny 52
Des Moines 47
Rome 45
Norwalk 43
London 41
Los Angeles 39
Grafing 36
New York 36
Nanjing 34
Council Bluffs 32
Brussels 27
Hefei 27
Hong Kong 27
Timisoara 25
Kunming 24
Frankfurt am Main 22
Guangzhou 21
Brno 20
Milan 20
Dublin 19
Lauterbourg 19
Dallas 18
Ottawa 18
São Paulo 18
Scottsdale 16
Belo Horizonte 15
Jinan 15
Helsinki 14
Napoli 14
Shenyang 12
Tappahannock 12
Santa Clara 11
Atlanta 10
Redwood City 10
Falls Church 9
Lappeenranta 9
Fortaleza 8
Hebei 8
Kraków 8
Nanchang 8
San Francisco 8
San Mateo 8
Toronto 8
Auburn Hills 7
Brasília 7
Fuzhou 7
Hounslow 7
Istanbul 7
Redmond 7
Rio de Janeiro 7
Cava de' Tirreni 6
Curitiba 6
Indiana 6
Mumbai 6
Portsmouth 6
Tokyo 6
Bexley 5
Brooklyn 5
Campinas 5
Changsha 5
Halle 5
Hangzhou 5
Jiaxing 5
Kilburn 5
Madrid 5
New Bedfont 5
Ningbo 5
Padova 5
Pagani 5
Stockholm 5
Vienna 5
Washington 5
Totale 11.733
Nome #
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 302
Effective QoS Monitoring in Large Scale Social Networks 272
Cloud security: Emerging threats and current solutions 263
A comparative analysis of emerging approaches for securing java software with Intel SGX 262
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 244
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 244
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 240
Secure access to personalized web services 239
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 238
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 238
Increasing security and protection of SCADA systems through infrastructure resilience 235
A hidden Markov model based intrusion detection system for wireless sensor networks 233
A healthcare real-time monitoring system for multiple sensors data collection and correlation 232
A framework for mastering heterogeneity in multi-layer security information and event correlation 229
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 229
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 228
A Business Process Monitor for a Mobile Phone Recharging System 224
Enhancing SIEM Technology to Protect Critical Infrastructures 222
A workflow service mediator for automated information processing and scheduling delivery to an archive 218
Effective visualization of a big data banking application 217
Applying extensions of evidence theory to detect frauds in financial infrastructures 216
An OpenNCP-based Solution for Secure eHealth Data Exchange 216
Security Analysis of Smart Grid Data Collection Technologies 215
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 214
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 212
Adaptable parsing of real-time data streams 208
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 208
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 207
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 207
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 206
Real-time QoS monitoring from the end user perspective in large scale social networks 205
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 204
A Novel Unified Architecture for Public-Key Cryptography 202
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 202
A Correlation Approach to Intrusion Detection 200
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 197
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 196
My smart home is under attack 196
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 194
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 193
A resilient architecture for forensic storage of events in critical infrastructures 193
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 192
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 191
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 190
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 185
Exposing vulnerabilities in electric power grids: An experimental approach 184
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation 179
Innovative healthcare services for nomadic users 177
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 175
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 175
High-Performance and Interoperable Security Services for Mobile Environments 175
Elliptic curve cryptography engineering 174
International cooperation experiences: Results achieved, lessons learned, and way ahead 173
Improving the QoS of MPEG2 Streaming over Wireless LANs 170
Security Engineering of SOA Applications Via Reliability Patterns 170
How to protect public administration from cybersecurity threats: The COMPACT project 170
Scalable Network Traffic Classification Using Distributed Support Vector Machines 169
MASSIF: A Promising Solution to Enhance Olympic Games IT Security 168
Performance Evaluation of Security Services: An Experimental Approach 165
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 165
Providing digital time stamping services to mobile devices 161
Hardware Support for High-Performance,Intrusion- and Fault- Tolerant Systems 159
Implementation of Threshold-based Diagnostic Mechanisms for COTS-based Applications 159
Advanced SIEM Technology for Critical Infrastructure Protection 158
An FPGA-based Key-Store for Improving the Dependability of Security Services 158
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 155
Protecting critical business processes of smart hospitals from cyber attacks 154
A Novel Approach to QoS Monitoring in the Cloud 150
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 150
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 148
Web Services Workflow Reliability Estimation Through Reliability Patterns 148
An event correlation approach for fault diagnosis in SCADA infrastructures 146
null 138
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 138
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 137
Exploiting diversity and correlation to improve the performance of intrusion detection systems 135
Network Resilience 133
A Fault Tolerance Access to Legacy Database Systems using CORBA Technology 131
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 131
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 131
Real-time Security & Dependability monitoring: Make it a bundle 131
An Architecture for Security Oriented Perfective Maintenance of Legacy Software 128
Building a dependable system from a legacy application with CORBA 125
Integrating Reactive Cloud Applications in SERECA 124
SLA compliance monitoring through semantic processing 122
Runtime model checking for sla compliance monitoring and qos prediction 121
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices 118
Using Web Services Technology for Inter-Enterprise Integration of Digital Time Stamping 113
Dependability and resilience of computer networks (SCADA / cyber-security) 112
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" 111
FPGA-based Implementation of a serial RSA processor 107
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems, SRDS 2008: Message from the general chair 106
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications 103
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware 103
“Architecture and FPGA Implementation of a Digit-Serial RSA Processor” 102
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 96
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 92
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 85
An Intrusion Detection System for Next Generation Critical Infrastructures 83
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 71
Totale 17.520
Categoria #
all - tutte 67.992
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 67.992


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202081 0 0 0 0 0 0 0 0 0 0 0 81
2020/20212.504 164 107 184 148 271 102 274 76 90 238 118 732
2021/20221.186 119 193 36 284 40 53 146 100 59 78 56 22
2022/20232.064 261 164 123 240 240 346 45 256 197 54 79 59
2023/2024598 60 43 42 25 37 50 21 50 124 27 22 97
2024/20254.285 69 291 26 95 106 516 971 1.500 177 161 256 117
Totale 18.077