ROMANO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 10.754
EU - Europa 6.028
AS - Asia 2.303
SA - Sud America 574
AF - Africa 44
Continente sconosciuto - Info sul continente non disponibili 25
OC - Oceania 9
Totale 19.737
Nazione #
US - Stati Uniti d'America 10.674
RU - Federazione Russa 2.357
UA - Ucraina 990
SG - Singapore 771
VN - Vietnam 732
IT - Italia 640
CN - Cina 531
BR - Brasile 485
DE - Germania 483
GB - Regno Unito 483
SE - Svezia 465
FR - Francia 254
FI - Finlandia 106
HK - Hong Kong 62
CA - Canada 52
AR - Argentina 35
IN - India 35
RO - Romania 29
BE - Belgio 27
EU - Europa 24
CZ - Repubblica Ceca 23
TR - Turchia 22
PL - Polonia 21
IE - Irlanda 20
NL - Olanda 20
AT - Austria 18
ES - Italia 18
BD - Bangladesh 15
EC - Ecuador 15
AE - Emirati Arabi Uniti 13
ID - Indonesia 13
IQ - Iraq 13
SA - Arabia Saudita 13
GR - Grecia 12
CO - Colombia 11
ZA - Sudafrica 11
JP - Giappone 10
LV - Lettonia 10
MX - Messico 10
PK - Pakistan 10
LT - Lituania 9
MA - Marocco 9
CL - Cile 8
AL - Albania 7
AU - Australia 6
AZ - Azerbaigian 6
PY - Paraguay 6
QA - Qatar 6
VE - Venezuela 6
DZ - Algeria 5
KR - Corea 5
PA - Panama 5
PH - Filippine 5
PT - Portogallo 5
EG - Egitto 4
HR - Croazia 4
IL - Israele 4
KG - Kirghizistan 4
SK - Slovacchia (Repubblica Slovacca) 4
UZ - Uzbekistan 4
BG - Bulgaria 3
BO - Bolivia 3
DK - Danimarca 3
HN - Honduras 3
HU - Ungheria 3
IR - Iran 3
JO - Giordania 3
KE - Kenya 3
PE - Perù 3
AM - Armenia 2
BA - Bosnia-Erzegovina 2
CH - Svizzera 2
CR - Costa Rica 2
EE - Estonia 2
GE - Georgia 2
JM - Giamaica 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
LU - Lussemburgo 2
MD - Moldavia 2
MY - Malesia 2
NG - Nigeria 2
NO - Norvegia 2
NZ - Nuova Zelanda 2
PS - Palestinian Territory 2
SY - Repubblica araba siriana 2
TN - Tunisia 2
TT - Trinidad e Tobago 2
TW - Taiwan 2
UG - Uganda 2
UY - Uruguay 2
AO - Angola 1
BH - Bahrain 1
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CG - Congo 1
DO - Repubblica Dominicana 1
Totale 19.725
Città #
Fairfield 1.398
Woodbridge 1.257
Houston 811
Ann Arbor 749
Chandler 722
Dallas 662
Ashburn 657
Dong Ket 606
Seattle 594
Wilmington 550
Cambridge 483
Dearborn 350
Moscow 306
Singapore 306
Nyköping 298
Jacksonville 271
Southend 232
Boardman 229
The Dalles 190
Beijing 174
Naples 152
Princeton 107
Lawrence 95
Munich 75
Shanghai 70
Ogden 69
Düsseldorf 67
Rome 59
Los Angeles 58
Hong Kong 56
Bremen 53
San Diego 52
Yubileyny 52
Des Moines 47
London 47
Columbus 46
New York 45
Ho Chi Minh City 44
Norwalk 43
São Paulo 40
Grafing 36
Council Bluffs 34
Nanjing 34
Hanoi 29
Brussels 27
Hefei 27
Timisoara 25
Chicago 24
Kunming 24
Frankfurt am Main 23
Guangzhou 21
Belo Horizonte 20
Brno 20
Milan 20
Dublin 19
Lauterbourg 19
Ottawa 19
Atlanta 17
Santa Clara 16
Scottsdale 16
Jinan 15
Helsinki 14
Napoli 14
Rio de Janeiro 13
San Francisco 13
Curitiba 12
Shenyang 12
Stockholm 12
Tappahannock 12
Brooklyn 10
Redwood City 10
Riga 10
Salvador 10
Tokyo 10
Brasília 9
Falls Church 9
Fortaleza 9
Lappeenranta 9
Toronto 9
Amsterdam 8
Da Nang 8
Hebei 8
Johannesburg 8
Kraków 8
Nanchang 8
San Mateo 8
Warsaw 8
Auburn Hills 7
Baghdad 7
Fuzhou 7
Hounslow 7
Istanbul 7
Mumbai 7
Redmond 7
Salt Lake City 7
Afragola 6
Boston 6
Cava de' Tirreni 6
Guayaquil 6
Indiana 6
Totale 12.954
Nome #
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 321
A comparative analysis of emerging approaches for securing java software with Intel SGX 295
Effective QoS Monitoring in Large Scale Social Networks 287
Cloud security: Emerging threats and current solutions 285
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 274
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 266
A framework for mastering heterogeneity in multi-layer security information and event correlation 264
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 260
A healthcare real-time monitoring system for multiple sensors data collection and correlation 256
A hidden Markov model based intrusion detection system for wireless sensor networks 255
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 255
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System 252
A workflow service mediator for automated information processing and scheduling delivery to an archive 251
Secure access to personalized web services 250
A Business Process Monitor for a Mobile Phone Recharging System 249
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 248
Increasing security and protection of SCADA systems through infrastructure resilience 245
Applying extensions of evidence theory to detect frauds in financial infrastructures 245
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 240
Enhancing SIEM Technology to Protect Critical Infrastructures 238
Effective visualization of a big data banking application 233
An OpenNCP-based Solution for Secure eHealth Data Exchange 232
A Correlation Approach to Intrusion Detection 230
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 230
Security Analysis of Smart Grid Data Collection Technologies 229
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 229
A resilient architecture for forensic storage of events in critical infrastructures 226
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 224
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 220
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 219
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 219
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 218
Adaptable parsing of real-time data streams 218
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project 218
A Novel Unified Architecture for Public-Key Cryptography 218
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 217
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 216
Real-time QoS monitoring from the end user perspective in large scale social networks 215
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 214
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 213
My smart home is under attack 211
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 207
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 206
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 205
How to protect public administration from cybersecurity threats: The COMPACT project 202
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation 200
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 199
Exposing vulnerabilities in electric power grids: An experimental approach 195
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 193
Protecting critical business processes of smart hospitals from cyber attacks 191
Improving the QoS of MPEG2 Streaming over Wireless LANs 188
Innovative healthcare services for nomadic users 188
Advanced SIEM Technology for Critical Infrastructure Protection 186
Elliptic curve cryptography engineering 186
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 183
High-Performance and Interoperable Security Services for Mobile Environments 183
International cooperation experiences: Results achieved, lessons learned, and way ahead 182
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 182
Scalable Network Traffic Classification Using Distributed Support Vector Machines 180
MASSIF: A Promising Solution to Enhance Olympic Games IT Security 179
Providing digital time stamping services to mobile devices 179
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 179
Performance Evaluation of Security Services: An Experimental Approach 175
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 175
A Novel Approach to QoS Monitoring in the Cloud 173
Security Engineering of SOA Applications Via Reliability Patterns 173
Implementation of Threshold-based Diagnostic Mechanisms for COTS-based Applications 171
An FPGA-based Key-Store for Improving the Dependability of Security Services 171
Hardware Support for High-Performance,Intrusion- and Fault- Tolerant Systems 168
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 168
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 166
Web Services Workflow Reliability Estimation Through Reliability Patterns 165
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 162
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 159
An event correlation approach for fault diagnosis in SCADA infrastructures 155
A Fault Tolerance Access to Legacy Database Systems using CORBA Technology 155
Network Resilience 146
Exploiting diversity and correlation to improve the performance of intrusion detection systems 146
Real-time Security & Dependability monitoring: Make it a bundle 145
Integrating Reactive Cloud Applications in SERECA 144
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 141
Building a dependable system from a legacy application with CORBA 140
Runtime model checking for sla compliance monitoring and qos prediction 139
null 138
An Architecture for Security Oriented Perfective Maintenance of Legacy Software 137
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" 135
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 134
SLA compliance monitoring through semantic processing 130
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices 129
Using Web Services Technology for Inter-Enterprise Integration of Digital Time Stamping 127
Dependability and resilience of computer networks (SCADA / cyber-security) 122
FPGA-based Implementation of a serial RSA processor 119
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware 119
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 116
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications 113
“Architecture and FPGA Implementation of a Digit-Serial RSA Processor” 111
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems, SRDS 2008: Message from the general chair 111
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 105
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 101
An Intrusion Detection System for Next Generation Critical Infrastructures 93
Totale 19.255
Categoria #
all - tutte 78.957
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 78.957


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.630 0 0 0 0 0 102 274 76 90 238 118 732
2021/20221.186 119 193 36 284 40 53 146 100 59 78 56 22
2022/20232.064 261 164 123 240 240 346 45 256 197 54 79 59
2023/2024598 60 43 42 25 37 50 21 50 124 27 22 97
2024/20254.342 69 291 26 95 106 516 971 1.500 177 161 256 174
2025/20262.012 334 480 602 346 249 1 0 0 0 0 0 0
Totale 20.146