COPPOLINO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 8.869
EU - Europa 5.383
AS - Asia 1.531
SA - Sud America 305
AF - Africa 24
Continente sconosciuto - Info sul continente non disponibili 16
OC - Oceania 10
Totale 16.138
Nazione #
US - Stati Uniti d'America 8.812
RU - Federazione Russa 2.171
UA - Ucraina 821
IT - Italia 623
VN - Vietnam 512
DE - Germania 479
SG - Singapore 434
CN - Cina 401
GB - Regno Unito 400
SE - Svezia 377
BR - Brasile 269
FR - Francia 196
FI - Finlandia 87
CA - Canada 39
BE - Belgio 35
HK - Hong Kong 35
RO - Romania 30
IN - India 28
CZ - Repubblica Ceca 26
AT - Austria 21
GR - Grecia 18
IE - Irlanda 18
EU - Europa 16
AE - Emirati Arabi Uniti 14
NL - Olanda 14
AR - Argentina 13
PL - Polonia 12
TR - Turchia 12
ES - Italia 11
KR - Corea 9
SA - Arabia Saudita 8
AU - Australia 7
BD - Bangladesh 7
JP - Giappone 7
CO - Colombia 6
IQ - Iraq 6
MX - Messico 6
AL - Albania 5
AZ - Azerbaigian 5
EC - Ecuador 5
HU - Ungheria 5
IL - Israele 5
LT - Lituania 5
MA - Marocco 5
PK - Pakistan 5
PT - Portogallo 5
QA - Qatar 5
CL - Cile 4
DK - Danimarca 4
HR - Croazia 4
PA - Panama 4
VE - Venezuela 4
ZA - Sudafrica 4
BG - Bulgaria 3
CR - Costa Rica 3
DZ - Algeria 3
EG - Egitto 3
IR - Iran 3
JO - Giordania 3
LK - Sri Lanka 3
NZ - Nuova Zelanda 3
PH - Filippine 3
PS - Palestinian Territory 3
SK - Slovacchia (Repubblica Slovacca) 3
UZ - Uzbekistan 3
AM - Armenia 2
BO - Bolivia 2
GE - Georgia 2
ID - Indonesia 2
KE - Kenya 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
TT - Trinidad e Tobago 2
TW - Taiwan 2
UG - Uganda 2
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
EE - Estonia 1
GT - Guatemala 1
IS - Islanda 1
JM - Giamaica 1
KG - Kirghizistan 1
KW - Kuwait 1
MY - Malesia 1
NP - Nepal 1
PE - Perù 1
PY - Paraguay 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TN - Tunisia 1
TZ - Tanzania 1
Totale 16.138
Città #
Fairfield 1.337
Woodbridge 1.042
Houston 674
Chandler 672
Ann Arbor 636
Seattle 555
Ashburn 545
Dong Ket 506
Wilmington 492
Cambridge 461
Dearborn 272
Moscow 254
Nyköping 249
Singapore 227
Jacksonville 219
Boardman 204
The Dalles 201
Southend 196
Naples 129
Beijing 100
Princeton 89
Lawrence 79
Munich 78
Shanghai 67
Rome 63
Ogden 62
Bremen 59
Düsseldorf 58
San Diego 57
Des Moines 45
Columbus 44
Norwalk 44
Council Bluffs 40
Yubileyny 39
New York 38
Los Angeles 36
Brussels 35
London 31
Boydton 29
Nanjing 29
Hong Kong 28
Timisoara 26
Kunming 22
Brno 21
Hefei 20
Frankfurt am Main 19
São Paulo 19
Grafing 18
Lauterbourg 18
Milan 18
Dublin 17
Helsinki 17
Ottawa 17
Jinan 16
Scottsdale 16
Guangzhou 15
Dallas 14
Santa Clara 14
Atlanta 13
Falls Church 13
Napoli 13
Redwood City 12
San Mateo 12
Tappahannock 12
Belo Horizonte 11
Redmond 10
Brooklyn 8
Chicago 8
Curitiba 8
Fuzhou 8
Hebei 8
Toronto 8
Calvi Risorta 7
Lappeenranta 7
Rio de Janeiro 7
Shenyang 7
Tokyo 7
Vienna 7
Afragola 6
Auburn Hills 6
Brasília 6
Cava de' Tirreni 6
Fortaleza 6
Halle 6
Mumbai 6
Nanchang 6
Ningbo 6
Portsmouth 6
Salvador 6
Washington 6
Baku 5
Bexley 5
Bogotá 5
Hounslow 5
Indiana 5
Islington 5
Madrid 5
Montreal 5
Padova 5
Pagani 5
Totale 10.636
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 318
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 303
Enabling convergence of physical and logical security through intelligent event correlation 294
Effective QoS Monitoring in Large Scale Social Networks 276
Cloud security: Emerging threats and current solutions 265
A comparative analysis of emerging approaches for securing java software with Intel SGX 265
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 246
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 246
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 244
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 241
A GPS Spoofing Resilient WAMS for Smart Grid 237
A healthcare real-time monitoring system for multiple sensors data collection and correlation 236
A hidden Markov model based intrusion detection system for wireless sensor networks 234
A framework for mastering heterogeneity in multi-layer security information and event correlation 232
An Approach for Securing Critical Applications in Untrusted Clouds 232
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 232
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 230
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 227
A Business Process Monitor for a Mobile Phone Recharging System 226
Enhancing SIEM Technology to Protect Critical Infrastructures 223
Effective visualization of a big data banking application 221
Applying extensions of evidence theory to detect frauds in financial infrastructures 218
Security Analysis of Smart Grid Data Collection Technologies 217
An OpenNCP-based Solution for Secure eHealth Data Exchange 216
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 215
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 215
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 212
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 211
Adaptable parsing of real-time data streams 209
Real-time QoS monitoring from the end user perspective in large scale social networks 208
An abstract reasoning architecture for privacy policies monitoring 208
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 207
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 204
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 204
Trust establishment in cooperating cyber-physical systems 199
My smart home is under attack 198
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 197
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 197
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 196
A resilient architecture for forensic storage of events in critical infrastructures 195
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 194
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 192
Virtual Scan Chains for online testing of FPGA-based embedded systems 192
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 191
Exposing vulnerabilities in electric power grids: An experimental approach 187
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 187
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 180
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 176
High-Performance and Interoperable Security Services for Mobile Environments 176
Elliptic curve cryptography engineering 175
How to protect public administration from cybersecurity threats: The COMPACT project 171
Security Engineering of SOA Applications Via Reliability Patterns 170
Combination approach to select optimal countermeasures based on the RORI index 169
Performance Evaluation of Security Services: An Experimental Approach 168
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 166
Advanced SIEM Technology for Critical Infrastructure Protection 159
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 157
Protecting critical business processes of smart hospitals from cyber attacks 156
Security and Reliability Requirements for Advanced Security Event Management 155
KONFIDO: An OpenNCP-based secure ehealth data exchange system 155
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 152
Web Services Workflow Reliability Estimation Through Reliability Patterns 152
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 151
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain 150
An event correlation approach for fault diagnosis in SCADA infrastructures 148
CAN-Bus Attack Detection With Deep Learning 148
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 148
TrustedSIM: Towards Unified Mobile Security 147
A Trusted Information Agent for Security Information and Event Management 141
Network Resilience 138
null 138
Exploiting diversity and correlation to improve the performance of intrusion detection systems 138
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 138
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 134
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 133
Real-time Security & Dependability monitoring: Make it a bundle 132
A framework for the Design of Distributed Reconfigurable Embedded Systems 125
SLA compliance monitoring through semantic processing 124
Runtime model checking for sla compliance monitoring and qos prediction 122
Dependability and resilience of computer networks (SCADA / cyber-security) 115
Distributed Framework for Cybersecurity of Critical Infrastructures 114
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 97
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 93
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 86
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 73
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 70
PriSIEM: Enabling privacy-preserving Managed Security Services 63
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 62
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 57
Detection of Radio Frequency Interference in Satellite Ground Segments 56
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 55
Secure cross-border exchange of health related data: The KONFIDO approach 51
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids 48
Securing FIWARE with TEE Technology 43
Privacy-Preserving Credit Scoring via Functional Encryption 43
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces 38
Increasing the Cybersecurity of Smart Grids by Prosumer Monitoring 30
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 27
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 15
An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX 9
Totale 16.534
Categoria #
all - tutte 60.589
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 60.589


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.360 148 106 160 153 254 112 263 99 90 232 123 620
2021/20221.123 121 172 40 246 55 57 117 96 56 81 50 32
2022/20231.842 234 155 115 211 231 307 45 210 171 51 71 41
2023/2024567 59 40 37 29 30 58 15 52 111 29 18 89
2024/20254.104 75 264 26 94 114 490 872 1.412 172 143 274 168
2025/2026165 165 0 0 0 0 0 0 0 0 0 0 0
Totale 16.534