COPPOLINO, Luigi
 Distribuzione geografica
Continente #
EU - Europa 256
NA - Nord America 43
AS - Asia 26
OC - Oceania 1
Totale 326
Nazione #
IT - Italia 231
US - Stati Uniti d'America 43
GB - Regno Unito 20
PK - Pakistan 15
HK - Hong Kong 6
ES - Italia 3
JP - Giappone 2
SA - Arabia Saudita 2
AU - Australia 1
DE - Germania 1
NL - Olanda 1
SG - Singapore 1
Totale 326
Città #
Lancaster 18
Islamabad 13
Pignataro Maggiore 6
Redmond 6
Chicago 5
Ashburn 4
Naples 3
Seattle 3
Boardman 2
Girona 2
Gujranwala 2
Los Angeles 2
New York 2
Adelaide 1
At Tuwal 1
Brooklyn 1
Cedar Knolls 1
Columbia 1
Fremont 1
Glasgow 1
Groningen 1
Herndon 1
Houston 1
Jeddah 1
Kowloon 1
Livonia 1
London 1
Mascalucia 1
Miami 1
Minamisuna 1
Norman 1
Portland 1
San Antonio 1
San Bernardino 1
San Francisco 1
Santa Clara 1
Spinea 1
Tokyo 1
Tseung Kwan O 1
Totale 94
Nome #
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems, file dfe4d05d-7932-eb50-e053-6605fe0a26fa 71
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain, file dfe4d05d-7a13-eb50-e053-6605fe0a26fa 21
Security Analysis of Smart Grid Data Collection Technologies, file dfe4d05c-8eda-eb50-e053-6605fe0a26fa 13
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure, file dfe4d05c-916b-eb50-e053-6605fe0a26fa 12
Applying extensions of evidence theory to detect frauds in financial infrastructures, file dfe4d05c-af0e-eb50-e053-6605fe0a26fa 12
Cloud security: Emerging threats and current solutions, file dfe4d05c-aedf-eb50-e053-6605fe0a26fa 10
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services, file dfe4d05c-b104-eb50-e053-6605fe0a26fa 10
Effective QoS Monitoring in Large Scale Social Networks, file dfe4d05c-88d8-eb50-e053-6605fe0a26fa 9
Enhancing SIEM Technology to Protect Critical Infrastructures, file dfe4d05c-915b-eb50-e053-6605fe0a26fa 9
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns, file dfe4d05c-7c93-eb50-e053-6605fe0a26fa 8
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies, file dfe4d05c-8b32-eb50-e053-6605fe0a26fa 8
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach, file dfe4d05c-8dee-eb50-e053-6605fe0a26fa 8
Exploiting diversity and correlation to improve the performance of intrusion detection systems, file dfe4d05c-8f06-eb50-e053-6605fe0a26fa 7
A framework for mastering heterogeneity in multi-layer security information and event correlation, file dfe4d05c-b007-eb50-e053-6605fe0a26fa 7
A GPS Spoofing Resilient WAMS for Smart Grid, file dfe4d05c-8c3f-eb50-e053-6605fe0a26fa 6
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study, file dfe4d05c-91aa-eb50-e053-6605fe0a26fa 6
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach, file dfe4d05c-aed6-eb50-e053-6605fe0a26fa 6
An OpenNCP-based Solution for Secure eHealth Data Exchange, file dfe4d05d-2cde-eb50-e053-6605fe0a26fa 6
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems, file dfe4d05d-8155-eb50-e053-6605fe0a26fa 6
Effective visualization of a big data banking application, file dfe4d05c-8c9a-eb50-e053-6605fe0a26fa 5
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks, file dfe4d05c-8d05-eb50-e053-6605fe0a26fa 5
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach, file dfe4d05c-8e58-eb50-e053-6605fe0a26fa 5
Runtime model checking for sla compliance monitoring and qos prediction, file dfe4d05c-901a-eb50-e053-6605fe0a26fa 5
Real-time Security & Dependability monitoring: Make it a bundle, file dfe4d05c-9509-eb50-e053-6605fe0a26fa 5
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks, file dfe4d05c-957d-eb50-e053-6605fe0a26fa 5
Exposing vulnerabilities in electric power grids: An experimental approach, file dfe4d05c-b086-eb50-e053-6605fe0a26fa 5
A comparative analysis of emerging approaches for securing java software with Intel SGX, file dfe4d05d-44a7-eb50-e053-6605fe0a26fa 5
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology, file dfe4d05c-877d-eb50-e053-6605fe0a26fa 4
Enabling convergence of physical and logical security through intelligent event correlation, file dfe4d05c-88f3-eb50-e053-6605fe0a26fa 4
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project, file dfe4d05c-91a8-eb50-e053-6605fe0a26fa 4
Advanced SIEM Technology for Critical Infrastructure Protection, file dfe4d05c-91e5-eb50-e053-6605fe0a26fa 4
My smart home is under attack, file dfe4d05c-a8fa-eb50-e053-6605fe0a26fa 4
Efficient Supply Chain Management via federation-based integration of legacy ERP systems, file dfe4d05c-8a59-eb50-e053-6605fe0a26fa 3
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems, file dfe4d05d-2a76-eb50-e053-6605fe0a26fa 3
An abstract reasoning architecture for privacy policies monitoring, file dfe4d05d-7a5e-eb50-e053-6605fe0a26fa 3
Privacy-Preserving Credit Scoring via Functional Encryption, file dfe4d05d-bb7d-eb50-e053-6605fe0a26fa 3
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project, file dfe4d05d-c17b-eb50-e053-6605fe0a26fa 3
A DBSCAN based approach for jointly segment and classify brain MR images, file dfe4d05c-893f-eb50-e053-6605fe0a26fa 2
Distributed Framework for Cybersecurity of Critical Infrastructures, file dfe4d05c-8e96-eb50-e053-6605fe0a26fa 2
Network Resilience, file dfe4d05c-93fc-eb50-e053-6605fe0a26fa 2
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study, file dfe4d05d-948c-eb50-e053-6605fe0a26fa 2
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids, file 53d011a7-3223-47ff-85a4-f9437fcd9f02 1
TrustedSIM: Towards Unified Mobile Security, file dfe4d05b-cabf-eb50-e053-6605fe0a26fa 1
Dependability and resilience of computer networks (SCADA / cyber-security), file dfe4d05c-3cb0-eb50-e053-6605fe0a26fa 1
Trust establishment in cooperating cyber-physical systems, file dfe4d05c-95c7-eb50-e053-6605fe0a26fa 1
Adaptable parsing of real-time data streams, file dfe4d05c-9866-eb50-e053-6605fe0a26fa 1
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks, file dfe4d05c-a2dc-eb50-e053-6605fe0a26fa 1
Web Services Workflow Reliability Estimation Through Reliability Patterns, file dfe4d05c-a8f3-eb50-e053-6605fe0a26fa 1
SIL2 assessment of an Active/Standby COTS-based Safety-Related system, file dfe4d05d-32e0-eb50-e053-6605fe0a26fa 1
Totale 326
Categoria #
all - tutte 497
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 497


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20191 0 0 0 0 0 0 0 0 0 0 1 0
2019/20201 0 0 0 1 0 0 0 0 0 0 0 0
2020/202114 2 0 0 0 0 0 1 0 0 0 11 0
2021/202216 0 0 0 16 0 0 0 0 0 0 0 0
2022/202396 1 7 6 16 33 2 5 14 0 9 3 0
2023/20249 0 0 0 1 0 0 0 6 2 0 0 0
Totale 326