COPPOLINO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 8.711
EU - Europa 5.292
AS - Asia 1.480
SA - Sud America 217
AF - Africa 22
Continente sconosciuto - Info sul continente non disponibili 16
OC - Oceania 10
Totale 15.748
Nazione #
US - Stati Uniti d'America 8.670
RU - Federazione Russa 2.170
UA - Ucraina 819
IT - Italia 590
VN - Vietnam 510
DE - Germania 448
SG - Singapore 428
CN - Cina 401
GB - Regno Unito 389
SE - Svezia 375
FR - Francia 195
BR - Brasile 190
FI - Finlandia 84
BE - Belgio 35
RO - Romania 30
HK - Hong Kong 28
CA - Canada 27
CZ - Repubblica Ceca 26
IN - India 21
AT - Austria 20
IE - Irlanda 18
GR - Grecia 17
EU - Europa 16
NL - Olanda 14
TR - Turchia 11
ES - Italia 10
PL - Polonia 10
AE - Emirati Arabi Uniti 9
KR - Corea 9
AR - Argentina 8
AU - Australia 7
CO - Colombia 6
MX - Messico 6
AL - Albania 5
BD - Bangladesh 5
EC - Ecuador 5
HU - Ungheria 5
MA - Marocco 5
PT - Portogallo 5
QA - Qatar 5
CL - Cile 4
DK - Danimarca 4
HR - Croazia 4
IL - Israele 4
JP - Giappone 4
PA - Panama 4
PK - Pakistan 4
BG - Bulgaria 3
CR - Costa Rica 3
DZ - Algeria 3
IQ - Iraq 3
IR - Iran 3
LK - Sri Lanka 3
LT - Lituania 3
NZ - Nuova Zelanda 3
PH - Filippine 3
PS - Palestinian Territory 3
SK - Slovacchia (Repubblica Slovacca) 3
ZA - Sudafrica 3
AM - Armenia 2
AZ - Azerbaigian 2
BO - Bolivia 2
EG - Egitto 2
ID - Indonesia 2
KE - Kenya 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
SA - Arabia Saudita 2
TW - Taiwan 2
UG - Uganda 2
UZ - Uzbekistan 2
VE - Venezuela 2
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
EE - Estonia 1
GE - Georgia 1
IS - Islanda 1
JO - Giordania 1
KG - Kirghizistan 1
KW - Kuwait 1
MY - Malesia 1
NP - Nepal 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TN - Tunisia 1
TZ - Tanzania 1
Totale 15.748
Città #
Fairfield 1.337
Woodbridge 1.042
Houston 674
Chandler 672
Ann Arbor 636
Seattle 554
Ashburn 534
Dong Ket 506
Wilmington 492
Cambridge 461
Dearborn 272
Moscow 254
Nyköping 249
Singapore 222
Jacksonville 219
Boardman 204
The Dalles 201
Southend 196
Naples 123
Beijing 100
Princeton 89
Lawrence 79
Shanghai 67
Ogden 62
Bremen 59
Düsseldorf 58
San Diego 57
Rome 55
Munich 48
Des Moines 45
Norwalk 44
Council Bluffs 40
Yubileyny 39
New York 37
Brussels 35
Boydton 29
Nanjing 29
Los Angeles 28
London 26
Timisoara 26
Kunming 22
Brno 21
Hong Kong 21
Hefei 20
Frankfurt am Main 19
Grafing 18
Lauterbourg 18
Dublin 17
Helsinki 16
Jinan 16
Milan 16
Ottawa 16
Scottsdale 16
Guangzhou 15
São Paulo 14
Falls Church 13
Napoli 13
Redwood City 12
San Mateo 12
Tappahannock 12
Santa Clara 11
Redmond 10
Dallas 9
Belo Horizonte 8
Fuzhou 8
Hebei 8
Atlanta 7
Lappeenranta 7
Shenyang 7
Vienna 7
Auburn Hills 6
Brasília 6
Cava de' Tirreni 6
Fortaleza 6
Halle 6
Mumbai 6
Nanchang 6
Ningbo 6
Portsmouth 6
Toronto 6
Washington 6
Bexley 5
Bogotá 5
Curitiba 5
Hounslow 5
Indiana 5
Islington 5
Madrid 5
Padova 5
Pagani 5
Pomigliano d'Arco 5
Taiyuan 5
Wroclaw 5
Acerra 4
Avellino 4
Caivano 4
Chicago 4
Chongqing 4
Islamabad 4
Kocaeli 4
Totale 10.463
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 314
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 296
Enabling convergence of physical and logical security through intelligent event correlation 290
Effective QoS Monitoring in Large Scale Social Networks 271
Cloud security: Emerging threats and current solutions 261
A comparative analysis of emerging approaches for securing java software with Intel SGX 261
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 243
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 242
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 238
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 236
A GPS Spoofing Resilient WAMS for Smart Grid 235
A hidden Markov model based intrusion detection system for wireless sensor networks 231
A healthcare real-time monitoring system for multiple sensors data collection and correlation 229
A framework for mastering heterogeneity in multi-layer security information and event correlation 228
An Approach for Securing Critical Applications in Untrusted Clouds 227
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 226
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 225
A Business Process Monitor for a Mobile Phone Recharging System 223
Enhancing SIEM Technology to Protect Critical Infrastructures 219
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 219
Effective visualization of a big data banking application 215
An OpenNCP-based Solution for Secure eHealth Data Exchange 215
Security Analysis of Smart Grid Data Collection Technologies 213
Applying extensions of evidence theory to detect frauds in financial infrastructures 213
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 213
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 212
Adaptable parsing of real-time data streams 207
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 206
An abstract reasoning architecture for privacy policies monitoring 205
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 205
Real-time QoS monitoring from the end user perspective in large scale social networks 203
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 203
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 199
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 199
Trust establishment in cooperating cyber-physical systems 197
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 196
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 194
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 193
My smart home is under attack 193
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 190
A resilient architecture for forensic storage of events in critical infrastructures 190
Virtual Scan Chains for online testing of FPGA-based embedded systems 189
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 189
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 188
Exposing vulnerabilities in electric power grids: An experimental approach 184
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 184
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 175
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 175
High-Performance and Interoperable Security Services for Mobile Environments 175
Elliptic curve cryptography engineering 173
Security Engineering of SOA Applications Via Reliability Patterns 169
How to protect public administration from cybersecurity threats: The COMPACT project 169
Combination approach to select optimal countermeasures based on the RORI index 166
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 164
Performance Evaluation of Security Services: An Experimental Approach 162
Advanced SIEM Technology for Critical Infrastructure Protection 156
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 154
KONFIDO: An OpenNCP-based secure ehealth data exchange system 154
Security and Reliability Requirements for Advanced Security Event Management 153
Protecting critical business processes of smart hospitals from cyber attacks 151
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain 149
Web Services Workflow Reliability Estimation Through Reliability Patterns 148
An event correlation approach for fault diagnosis in SCADA infrastructures 146
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 146
CAN-Bus Attack Detection With Deep Learning 146
TrustedSIM: Towards Unified Mobile Security 145
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 145
null 138
A Trusted Information Agent for Security Information and Event Management 137
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 136
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 136
Exploiting diversity and correlation to improve the performance of intrusion detection systems 135
Network Resilience 133
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 130
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 130
Real-time Security & Dependability monitoring: Make it a bundle 129
SLA compliance monitoring through semantic processing 121
A framework for the Design of Distributed Reconfigurable Embedded Systems 119
Runtime model checking for sla compliance monitoring and qos prediction 119
Distributed Framework for Cybersecurity of Critical Infrastructures 112
Dependability and resilience of computer networks (SCADA / cyber-security) 110
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 92
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 91
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 83
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 70
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 57
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 57
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 54
PriSIEM: Enabling privacy-preserving Managed Security Services 54
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 53
Detection of Radio Frequency Interference in Satellite Ground Segments 51
Secure cross-border exchange of health related data: The KONFIDO approach 46
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids 44
Securing FIWARE with TEE Technology 40
Privacy-Preserving Credit Scoring via Functional Encryption 40
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces 37
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 25
Increasing the Cybersecurity of Smart Grids by Prosumer Monitoring 21
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 12
Totale 16.142
Categoria #
all - tutte 58.073
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 58.073


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020231 0 0 0 0 0 0 0 0 0 0 144 87
2020/20212.360 148 106 160 153 254 112 263 99 90 232 123 620
2021/20221.123 121 172 40 246 55 57 117 96 56 81 50 32
2022/20231.842 234 155 115 211 231 307 45 210 171 51 71 41
2023/2024567 59 40 37 29 30 58 15 52 111 29 18 89
2024/20253.877 75 264 26 94 114 490 872 1.412 172 143 215 0
Totale 16.142