ROMANO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 9.133
EU - Europa 3.101
AS - Asia 996
Continente sconosciuto - Info sul continente non disponibili 24
AF - Africa 8
OC - Oceania 6
SA - Sud America 6
Totale 13.274
Nazione #
US - Stati Uniti d'America 9.106
UA - Ucraina 985
VN - Vietnam 609
IT - Italia 469
SE - Svezia 454
GB - Regno Unito 435
DE - Germania 336
CN - Cina 328
FR - Francia 196
FI - Finlandia 90
RO - Romania 27
EU - Europa 24
CA - Canada 21
BE - Belgio 18
IE - Irlanda 16
IN - India 12
ES - Italia 10
AT - Austria 9
PL - Polonia 9
GR - Grecia 8
AE - Emirati Arabi Uniti 7
RU - Federazione Russa 7
TR - Turchia 7
AU - Australia 6
HK - Hong Kong 6
AL - Albania 5
KR - Corea 5
QA - Qatar 5
NL - Olanda 4
PA - Panama 4
SG - Singapore 4
CZ - Repubblica Ceca 3
DK - Danimarca 3
HR - Croazia 3
IL - Israele 3
PT - Portogallo 3
BR - Brasile 2
CL - Cile 2
EE - Estonia 2
HU - Ungheria 2
IR - Iran 2
JP - Giappone 2
SK - Slovacchia (Repubblica Slovacca) 2
UG - Uganda 2
ZA - Sudafrica 2
BD - Bangladesh 1
BG - Bulgaria 1
BT - Bhutan 1
BW - Botswana 1
BZ - Belize 1
CH - Svizzera 1
CO - Colombia 1
CR - Costa Rica 1
DZ - Algeria 1
LK - Sri Lanka 1
LU - Lussemburgo 1
MD - Moldavia 1
NG - Nigeria 1
NO - Norvegia 1
PK - Pakistan 1
SA - Arabia Saudita 1
SY - Repubblica araba siriana 1
TZ - Tanzania 1
VE - Venezuela 1
Totale 13.274
Città #
Fairfield 1.398
Woodbridge 1.257
Houston 810
Ann Arbor 749
Chandler 722
Dong Ket 606
Seattle 592
Ashburn 587
Wilmington 547
Cambridge 483
Dearborn 350
Nyköping 298
Jacksonville 271
Southend 232
Princeton 107
Beijing 103
Lawrence 95
Naples 83
Boardman 72
Ogden 69
Bremen 53
San Diego 51
Des Moines 47
Norwalk 43
Düsseldorf 36
Grafing 36
Nanjing 34
New York 32
London 29
Rome 29
Hefei 27
Timisoara 25
Kunming 24
Los Angeles 21
Brussels 18
Guangzhou 18
Dublin 16
Ottawa 16
Scottsdale 16
Jinan 15
Napoli 14
Shenyang 12
Tappahannock 12
Helsinki 10
Redwood City 10
Falls Church 9
Hebei 8
Kraków 8
Nanchang 8
San Mateo 8
Atlanta 7
Auburn Hills 7
Hounslow 7
Milan 7
Redmond 7
Cava de' Tirreni 6
Fuzhou 6
Indiana 6
Halle 5
Jiaxing 5
Kilburn 5
Madrid 5
New Bedfont 5
Ningbo 5
Padova 5
San Francisco 5
Washington 5
Zhengzhou 5
Acton 4
Caivano 4
Changsha 4
Chicago 4
Chongqing 4
Edinburgh 4
Hangzhou 4
Islington 4
Kocaeli 4
San Mango 4
Subiaco 4
Taiyuan 4
Villaricca 4
Athens 3
Boydton 3
Hanover 3
Istanbul 3
Montoro 3
Munich 3
Nürnberg 3
Puranpur 3
Savona 3
Sydney 3
Taizhou 3
Zagreb 3
Andover 2
Berlin 2
Bucharest 2
Budapest 2
Casavatore 2
Cava De' Tirreni 2
Dallas 2
Totale 10.321
Nome #
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 232
Effective QoS Monitoring in Large Scale Social Networks 228
Cloud security: Emerging threats and current solutions 215
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 211
A comparative analysis of emerging approaches for securing java software with Intel SGX 208
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 202
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 198
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 191
Secure access to personalized web services 191
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 189
A Business Process Monitor for a Mobile Phone Recharging System 183
Enhancing SIEM Technology to Protect Critical Infrastructures 182
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 181
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 181
A hidden Markov model based intrusion detection system for wireless sensor networks 179
Increasing security and protection of SCADA systems through infrastructure resilience 179
A framework for mastering heterogeneity in multi-layer security information and event correlation 179
Security Analysis of Smart Grid Data Collection Technologies 177
Effective visualization of a big data banking application 175
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 174
A healthcare real-time monitoring system for multiple sensors data collection and correlation 173
Real-time QoS monitoring from the end user perspective in large scale social networks 170
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 169
My smart home is under attack 169
A workflow service mediator for automated information processing and scheduling delivery to an archive 168
Applying extensions of evidence theory to detect frauds in financial infrastructures 168
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 166
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 162
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 160
An OpenNCP-based Solution for Secure eHealth Data Exchange 159
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 159
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 158
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 157
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 157
Exposing vulnerabilities in electric power grids: An experimental approach 156
High-Performance and Interoperable Security Services for Mobile Environments 154
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 154
Innovative healthcare services for nomadic users 152
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 151
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 151
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 149
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 149
Elliptic curve cryptography engineering 148
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 147
A Correlation Approach to Intrusion Detection 146
A Novel Unified Architecture for Public-Key Cryptography 145
International cooperation experiences: Results achieved, lessons learned, and way ahead 144
Improving the QoS of MPEG2 Streaming over Wireless LANs 143
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 143
Adaptable parsing of real-time data streams 142
Scalable Network Traffic Classification Using Distributed Support Vector Machines 141
MASSIF: A Promising Solution to Enhance Olympic Games IT Security 140
A resilient architecture for forensic storage of events in critical infrastructures 139
Security Engineering of SOA Applications Via Reliability Patterns 138
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 138
Performance Evaluation of Security Services: An Experimental Approach 136
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation 135
Implementation of Threshold-based Diagnostic Mechanisms for COTS-based Applications 134
Hardware Support for High-Performance,Intrusion- and Fault- Tolerant Systems 133
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 128
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 127
An event correlation approach for fault diagnosis in SCADA infrastructures 126
Providing digital time stamping services to mobile devices 126
Web Services Workflow Reliability Estimation Through Reliability Patterns 126
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 125
An FPGA-based Key-Store for Improving the Dependability of Security Services 124
A Novel Approach to QoS Monitoring in the Cloud 120
How to protect public administration from cybersecurity threats: The COMPACT project 120
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 118
Exploiting diversity and correlation to improve the performance of intrusion detection systems 108
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 107
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 106
Advanced SIEM Technology for Critical Infrastructure Protection 106
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 106
Building a dependable system from a legacy application with CORBA 104
Protecting critical business processes of smart hospitals from cyber attacks 104
An Architecture for Security Oriented Perfective Maintenance of Legacy Software 101
SLA compliance monitoring through semantic processing 100
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 98
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices 93
Network Resilience 91
Real-time Security & Dependability monitoring: Make it a bundle 91
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems, SRDS 2008: Message from the general chair 89
Runtime model checking for sla compliance monitoring and qos prediction 88
Dependability and resilience of computer networks (SCADA / cyber-security) 87
Integrating Reactive Cloud Applications in SERECA 87
A Fault Tolerance Access to Legacy Database Systems using CORBA Technology 86
FPGA-based Implementation of a serial RSA processor 84
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications 79
“Architecture and FPGA Implementation of a Digit-Serial RSA Processor” 79
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware 79
Using Web Services Technology for Inter-Enterprise Integration of Digital Time Stamping 74
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 74
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 69
An Intrusion Detection System for Next Generation Critical Infrastructures 64
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 63
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" 62
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 39
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 34
Secure cross-border exchange of health related data: The KONFIDO approach 19
Totale 13.569
Categoria #
all - tutte 45.496
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 45.496


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019759 0 0 0 0 0 0 0 0 0 138 347 274
2019/20203.863 252 260 257 827 402 393 526 272 334 84 175 81
2020/20212.504 164 107 184 148 271 102 274 76 90 238 118 732
2021/20221.186 119 193 36 284 40 53 146 100 59 78 56 22
2022/20232.064 261 164 123 240 240 346 45 256 197 54 79 59
2023/2024471 60 43 42 25 37 50 21 50 124 19 0 0
Totale 13.665