ROMANO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 10.716
EU - Europa 6.007
AS - Asia 1.931
SA - Sud America 497
AF - Africa 39
Continente sconosciuto - Info sul continente non disponibili 25
OC - Oceania 9
Totale 19.224
Nazione #
US - Stati Uniti d'America 10.637
RU - Federazione Russa 2.354
UA - Ucraina 989
VN - Vietnam 666
IT - Italia 633
SG - Singapore 515
CN - Cina 510
DE - Germania 482
GB - Regno Unito 482
SE - Svezia 464
BR - Brasile 432
FR - Francia 254
FI - Finlandia 105
CA - Canada 52
HK - Hong Kong 46
IN - India 34
RO - Romania 29
BE - Belgio 27
EU - Europa 24
CZ - Repubblica Ceca 23
TR - Turchia 22
PL - Polonia 21
IE - Irlanda 20
NL - Olanda 20
AR - Argentina 19
AT - Austria 18
ES - Italia 18
BD - Bangladesh 14
AE - Emirati Arabi Uniti 13
EC - Ecuador 13
SA - Arabia Saudita 13
GR - Grecia 12
IQ - Iraq 12
CO - Colombia 10
ID - Indonesia 10
JP - Giappone 10
ZA - Sudafrica 10
LT - Lituania 9
MA - Marocco 9
MX - Messico 9
PK - Pakistan 8
AL - Albania 7
CL - Cile 7
AU - Australia 6
QA - Qatar 6
AZ - Azerbaigian 5
KR - Corea 5
PA - Panama 5
PT - Portogallo 5
PY - Paraguay 5
DZ - Algeria 4
HR - Croazia 4
IL - Israele 4
KG - Kirghizistan 4
LV - Lettonia 4
PH - Filippine 4
SK - Slovacchia (Repubblica Slovacca) 4
UZ - Uzbekistan 4
VE - Venezuela 4
BG - Bulgaria 3
BO - Bolivia 3
DK - Danimarca 3
EG - Egitto 3
HN - Honduras 3
HU - Ungheria 3
IR - Iran 3
JO - Giordania 3
KE - Kenya 3
AM - Armenia 2
BA - Bosnia-Erzegovina 2
CH - Svizzera 2
CR - Costa Rica 2
EE - Estonia 2
GE - Georgia 2
JM - Giamaica 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
LU - Lussemburgo 2
MD - Moldavia 2
MY - Malesia 2
NG - Nigeria 2
NO - Norvegia 2
NZ - Nuova Zelanda 2
PE - Perù 2
PS - Palestinian Territory 2
TN - Tunisia 2
TT - Trinidad e Tobago 2
UG - Uganda 2
UY - Uruguay 2
AO - Angola 1
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
DO - Repubblica Dominicana 1
ET - Etiopia 1
GT - Guatemala 1
IS - Islanda 1
KI - Kiribati 1
Totale 19.215
Città #
Fairfield 1.398
Woodbridge 1.257
Houston 811
Ann Arbor 749
Chandler 722
Dallas 661
Ashburn 634
Dong Ket 606
Seattle 594
Wilmington 550
Cambridge 483
Dearborn 350
Moscow 306
Nyköping 298
Jacksonville 271
Singapore 244
Southend 232
Boardman 228
The Dalles 182
Beijing 173
Naples 149
Princeton 107
Lawrence 95
Munich 75
Shanghai 70
Ogden 69
Düsseldorf 67
Los Angeles 58
Rome 56
Bremen 53
San Diego 52
Yubileyny 52
Des Moines 47
London 47
Columbus 46
New York 45
Norwalk 43
Hong Kong 40
Grafing 36
São Paulo 36
Council Bluffs 34
Nanjing 34
Brussels 27
Hefei 27
Timisoara 25
Chicago 24
Kunming 24
Frankfurt am Main 22
Guangzhou 21
Brno 20
Milan 20
Belo Horizonte 19
Dublin 19
Ho Chi Minh City 19
Lauterbourg 19
Ottawa 19
Atlanta 17
Santa Clara 16
Scottsdale 16
Jinan 15
Helsinki 14
Napoli 14
San Francisco 13
Shenyang 12
Stockholm 12
Tappahannock 12
Curitiba 11
Rio de Janeiro 11
Brooklyn 10
Redwood City 10
Tokyo 10
Falls Church 9
Fortaleza 9
Hanoi 9
Lappeenranta 9
Toronto 9
Amsterdam 8
Hebei 8
Johannesburg 8
Kraków 8
Nanchang 8
Salvador 8
San Mateo 8
Warsaw 8
Auburn Hills 7
Brasília 7
Fuzhou 7
Hounslow 7
Istanbul 7
Redmond 7
Salt Lake City 7
Afragola 6
Baghdad 6
Boston 6
Cava de' Tirreni 6
Da Nang 6
Indiana 6
Montreal 6
Mumbai 6
Portsmouth 6
Totale 12.770
Nome #
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 315
A comparative analysis of emerging approaches for securing java software with Intel SGX 290
Effective QoS Monitoring in Large Scale Social Networks 286
Cloud security: Emerging threats and current solutions 281
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 269
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 259
A framework for mastering heterogeneity in multi-layer security information and event correlation 258
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 256
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 253
A hidden Markov model based intrusion detection system for wireless sensor networks 251
A healthcare real-time monitoring system for multiple sensors data collection and correlation 251
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 248
Secure access to personalized web services 248
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 247
A workflow service mediator for automated information processing and scheduling delivery to an archive 246
A Business Process Monitor for a Mobile Phone Recharging System 244
Increasing security and protection of SCADA systems through infrastructure resilience 243
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 236
Enhancing SIEM Technology to Protect Critical Infrastructures 234
Applying extensions of evidence theory to detect frauds in financial infrastructures 232
Effective visualization of a big data banking application 230
An OpenNCP-based Solution for Secure eHealth Data Exchange 229
Security Analysis of Smart Grid Data Collection Technologies 227
A Correlation Approach to Intrusion Detection 226
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 225
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 225
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 223
A resilient architecture for forensic storage of events in critical infrastructures 221
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 218
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 216
Adaptable parsing of real-time data streams 215
A Novel Unified Architecture for Public-Key Cryptography 215
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 215
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 214
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 214
Real-time QoS monitoring from the end user perspective in large scale social networks 213
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 212
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 211
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 210
My smart home is under attack 208
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 206
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 205
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 203
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 200
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation 195
Exposing vulnerabilities in electric power grids: An experimental approach 194
How to protect public administration from cybersecurity threats: The COMPACT project 193
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 191
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 187
Improving the QoS of MPEG2 Streaming over Wireless LANs 185
Innovative healthcare services for nomadic users 185
Elliptic curve cryptography engineering 184
Protecting critical business processes of smart hospitals from cyber attacks 184
Advanced SIEM Technology for Critical Infrastructure Protection 182
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 181
International cooperation experiences: Results achieved, lessons learned, and way ahead 181
High-Performance and Interoperable Security Services for Mobile Environments 181
Scalable Network Traffic Classification Using Distributed Support Vector Machines 177
MASSIF: A Promising Solution to Enhance Olympic Games IT Security 176
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 174
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 174
Providing digital time stamping services to mobile devices 173
Performance Evaluation of Security Services: An Experimental Approach 172
Security Engineering of SOA Applications Via Reliability Patterns 172
Implementation of Threshold-based Diagnostic Mechanisms for COTS-based Applications 171
A Novel Approach to QoS Monitoring in the Cloud 168
An FPGA-based Key-Store for Improving the Dependability of Security Services 168
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 166
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 166
Hardware Support for High-Performance,Intrusion- and Fault- Tolerant Systems 165
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 159
Web Services Workflow Reliability Estimation Through Reliability Patterns 158
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 157
An event correlation approach for fault diagnosis in SCADA infrastructures 154
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 153
A Fault Tolerance Access to Legacy Database Systems using CORBA Technology 150
Network Resilience 144
Exploiting diversity and correlation to improve the performance of intrusion detection systems 144
Real-time Security & Dependability monitoring: Make it a bundle 143
Integrating Reactive Cloud Applications in SERECA 139
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 139
Runtime model checking for sla compliance monitoring and qos prediction 138
null 138
Building a dependable system from a legacy application with CORBA 136
An Architecture for Security Oriented Perfective Maintenance of Legacy Software 135
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" 132
SLA compliance monitoring through semantic processing 128
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices 125
Using Web Services Technology for Inter-Enterprise Integration of Digital Time Stamping 123
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 123
Dependability and resilience of computer networks (SCADA / cyber-security) 120
FPGA-based Implementation of a serial RSA processor 116
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware 116
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications 111
“Architecture and FPGA Implementation of a Digit-Serial RSA Processor” 109
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems, SRDS 2008: Message from the general chair 109
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 106
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 101
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 97
An Intrusion Detection System for Next Generation Critical Infrastructures 89
Totale 18.865
Categoria #
all - tutte 75.835
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 75.835


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.049 0 0 0 148 271 102 274 76 90 238 118 732
2021/20221.186 119 193 36 284 40 53 146 100 59 78 56 22
2022/20232.064 261 164 123 240 240 346 45 256 197 54 79 59
2023/2024598 60 43 42 25 37 50 21 50 124 27 22 97
2024/20254.342 69 291 26 95 106 516 971 1.500 177 161 256 174
2025/20261.499 334 480 602 83 0 0 0 0 0 0 0 0
Totale 19.633