COPPOLINO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 9.184
EU - Europa 5.419
AS - Asia 1.663
SA - Sud America 338
AF - Africa 30
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 11
Totale 16.662
Nazione #
US - Stati Uniti d'America 9.111
RU - Federazione Russa 2.171
UA - Ucraina 822
IT - Italia 636
VN - Vietnam 520
DE - Germania 480
SG - Singapore 474
CN - Cina 468
GB - Regno Unito 406
SE - Svezia 380
BR - Brasile 296
FR - Francia 198
FI - Finlandia 87
CA - Canada 49
HK - Hong Kong 38
BE - Belgio 35
IN - India 30
RO - Romania 30
CZ - Repubblica Ceca 26
AT - Austria 22
GR - Grecia 18
IE - Irlanda 18
EU - Europa 16
NL - Olanda 16
AR - Argentina 15
AE - Emirati Arabi Uniti 14
ES - Italia 14
PL - Polonia 14
TR - Turchia 14
JP - Giappone 11
SA - Arabia Saudita 11
KR - Corea 9
MX - Messico 9
BD - Bangladesh 8
MA - Marocco 8
AU - Australia 7
CO - Colombia 7
LT - Lituania 7
EC - Ecuador 6
IQ - Iraq 6
PK - Pakistan 6
AL - Albania 5
AZ - Azerbaigian 5
HU - Ungheria 5
IL - Israele 5
PT - Portogallo 5
QA - Qatar 5
VE - Venezuela 5
ZA - Sudafrica 5
CL - Cile 4
DK - Danimarca 4
DZ - Algeria 4
HR - Croazia 4
PA - Panama 4
UZ - Uzbekistan 4
BG - Bulgaria 3
CR - Costa Rica 3
EG - Egitto 3
IR - Iran 3
JO - Giordania 3
LK - Sri Lanka 3
NZ - Nuova Zelanda 3
PH - Filippine 3
PS - Palestinian Territory 3
SK - Slovacchia (Repubblica Slovacca) 3
TT - Trinidad e Tobago 3
AM - Armenia 2
BO - Bolivia 2
GE - Georgia 2
ID - Indonesia 2
JM - Giamaica 2
KE - Kenya 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
PY - Paraguay 2
TW - Taiwan 2
UG - Uganda 2
AO - Angola 1
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
EE - Estonia 1
GT - Guatemala 1
IS - Islanda 1
KG - Kirghizistan 1
KI - Kiribati 1
KW - Kuwait 1
MY - Malesia 1
NP - Nepal 1
PE - Perù 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TN - Tunisia 1
Totale 16.659
Città #
Fairfield 1.337
Woodbridge 1.042
Houston 674
Chandler 672
Ann Arbor 636
Ashburn 568
Seattle 556
Dong Ket 506
Wilmington 492
Cambridge 461
Dearborn 272
Moscow 254
Nyköping 249
Singapore 235
Dallas 219
Jacksonville 219
Boardman 204
The Dalles 201
Southend 196
Beijing 167
Naples 129
Princeton 89
Lawrence 79
Munich 78
Shanghai 67
Rome 64
Ogden 62
Bremen 59
Düsseldorf 58
San Diego 57
Des Moines 45
New York 45
Columbus 44
Norwalk 44
Council Bluffs 40
Los Angeles 39
Yubileyny 39
Brussels 35
London 35
Hong Kong 31
Boydton 29
Nanjing 29
São Paulo 26
Timisoara 26
Kunming 22
Brno 21
Hefei 20
Frankfurt am Main 19
Grafing 18
Lauterbourg 18
Milan 18
Dublin 17
Helsinki 17
Ottawa 17
Atlanta 16
Jinan 16
Scottsdale 16
Guangzhou 15
Santa Clara 15
Falls Church 13
Napoli 13
Redwood City 12
San Mateo 12
Tappahannock 12
Belo Horizonte 11
Chicago 11
Tokyo 11
Curitiba 10
Redmond 10
Brooklyn 9
Toronto 9
Fuzhou 8
Hebei 8
Montreal 8
Rio de Janeiro 8
Stockholm 8
Calvi Risorta 7
Lappeenranta 7
Salvador 7
San Francisco 7
Shenyang 7
Vienna 7
Afragola 6
Auburn Hills 6
Brasília 6
Cava de' Tirreni 6
Fortaleza 6
Halle 6
Mumbai 6
Nanchang 6
Ningbo 6
Portsmouth 6
Washington 6
Baku 5
Bexley 5
Bogotá 5
Hounslow 5
Indiana 5
Islington 5
Madrid 5
Totale 10.990
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 326
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 310
Enabling convergence of physical and logical security through intelligent event correlation 301
Effective QoS Monitoring in Large Scale Social Networks 283
Cloud security: Emerging threats and current solutions 272
A comparative analysis of emerging approaches for securing java software with Intel SGX 272
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 252
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 248
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 248
A GPS Spoofing Resilient WAMS for Smart Grid 245
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 244
A hidden Markov model based intrusion detection system for wireless sensor networks 241
A healthcare real-time monitoring system for multiple sensors data collection and correlation 241
A framework for mastering heterogeneity in multi-layer security information and event correlation 237
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 236
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 236
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 235
An Approach for Securing Critical Applications in Untrusted Clouds 235
A Business Process Monitor for a Mobile Phone Recharging System 231
Enhancing SIEM Technology to Protect Critical Infrastructures 229
Security Analysis of Smart Grid Data Collection Technologies 225
Applying extensions of evidence theory to detect frauds in financial infrastructures 225
Effective visualization of a big data banking application 225
An OpenNCP-based Solution for Secure eHealth Data Exchange 223
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 222
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 221
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 218
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 217
An abstract reasoning architecture for privacy policies monitoring 216
Adaptable parsing of real-time data streams 213
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 212
Real-time QoS monitoring from the end user perspective in large scale social networks 211
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 210
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 208
My smart home is under attack 205
Trust establishment in cooperating cyber-physical systems 204
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 204
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 202
A resilient architecture for forensic storage of events in critical infrastructures 200
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 200
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 199
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 199
Virtual Scan Chains for online testing of FPGA-based embedded systems 198
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 198
Exposing vulnerabilities in electric power grids: An experimental approach 190
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 190
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 183
Elliptic curve cryptography engineering 180
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 179
High-Performance and Interoperable Security Services for Mobile Environments 178
How to protect public administration from cybersecurity threats: The COMPACT project 178
Combination approach to select optimal countermeasures based on the RORI index 174
Performance Evaluation of Security Services: An Experimental Approach 171
Security Engineering of SOA Applications Via Reliability Patterns 171
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 171
Protecting critical business processes of smart hospitals from cyber attacks 168
Advanced SIEM Technology for Critical Infrastructure Protection 166
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 164
Security and Reliability Requirements for Advanced Security Event Management 159
KONFIDO: An OpenNCP-based secure ehealth data exchange system 158
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 157
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 156
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain 155
An event correlation approach for fault diagnosis in SCADA infrastructures 154
Web Services Workflow Reliability Estimation Through Reliability Patterns 154
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 154
CAN-Bus Attack Detection With Deep Learning 153
A Trusted Information Agent for Security Information and Event Management 151
TrustedSIM: Towards Unified Mobile Security 150
Network Resilience 143
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 143
Exploiting diversity and correlation to improve the performance of intrusion detection systems 141
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 140
Real-time Security & Dependability monitoring: Make it a bundle 140
null 138
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 137
Runtime model checking for sla compliance monitoring and qos prediction 131
A framework for the Design of Distributed Reconfigurable Embedded Systems 129
SLA compliance monitoring through semantic processing 126
Dependability and resilience of computer networks (SCADA / cyber-security) 118
Distributed Framework for Cybersecurity of Critical Infrastructures 117
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 104
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 94
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 91
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 79
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 75
PriSIEM: Enabling privacy-preserving Managed Security Services 69
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 65
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 64
Detection of Radio Frequency Interference in Satellite Ground Segments 61
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 60
Secure cross-border exchange of health related data: The KONFIDO approach 55
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids 54
Securing FIWARE with TEE Technology 47
Privacy-Preserving Credit Scoring via Functional Encryption 47
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces 41
Increasing the Cybersecurity of Smart Grids by Prosumer Monitoring 39
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 32
An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX 20
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 17
Totale 17.058
Categoria #
all - tutte 62.762
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 62.762


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.212 0 106 160 153 254 112 263 99 90 232 123 620
2021/20221.123 121 172 40 246 55 57 117 96 56 81 50 32
2022/20231.842 234 155 115 211 231 307 45 210 171 51 71 41
2023/2024567 59 40 37 29 30 58 15 52 111 29 18 89
2024/20254.104 75 264 26 94 114 490 872 1.412 172 143 274 168
2025/2026689 312 377 0 0 0 0 0 0 0 0 0 0
Totale 17.058