COPPOLINO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 9.691
EU - Europa 5.457
AS - Asia 1.770
SA - Sud America 476
AF - Africa 40
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 11
Totale 17.462
Nazione #
US - Stati Uniti d'America 9.610
RU - Federazione Russa 2.173
UA - Ucraina 822
IT - Italia 653
VN - Vietnam 575
DE - Germania 481
SG - Singapore 477
CN - Cina 472
GB - Regno Unito 407
BR - Brasile 399
SE - Svezia 380
FR - Francia 198
FI - Finlandia 87
CA - Canada 52
HK - Hong Kong 45
BE - Belgio 35
IN - India 34
RO - Romania 31
AR - Argentina 27
CZ - Repubblica Ceca 26
AT - Austria 22
NL - Olanda 21
GR - Grecia 18
IE - Irlanda 18
TR - Turchia 18
EC - Ecuador 16
ES - Italia 16
EU - Europa 16
PL - Polonia 16
AE - Emirati Arabi Uniti 15
BD - Bangladesh 13
CO - Colombia 12
IQ - Iraq 12
MX - Messico 12
JP - Giappone 11
SA - Arabia Saudita 11
ID - Indonesia 10
KR - Corea 9
MA - Marocco 9
ZA - Sudafrica 9
AL - Albania 7
AU - Australia 7
LT - Lituania 7
PK - Pakistan 7
VE - Venezuela 7
QA - Qatar 6
AZ - Azerbaigian 5
CL - Cile 5
DZ - Algeria 5
HR - Croazia 5
HU - Ungheria 5
IL - Israele 5
PT - Portogallo 5
PY - Paraguay 5
DK - Danimarca 4
EG - Egitto 4
JO - Giordania 4
PA - Panama 4
PH - Filippine 4
UZ - Uzbekistan 4
BG - Bulgaria 3
BO - Bolivia 3
CR - Costa Rica 3
IR - Iran 3
KE - Kenya 3
LK - Sri Lanka 3
LV - Lettonia 3
NZ - Nuova Zelanda 3
PS - Palestinian Territory 3
SK - Slovacchia (Repubblica Slovacca) 3
TT - Trinidad e Tobago 3
AM - Armenia 2
BA - Bosnia-Erzegovina 2
GE - Georgia 2
JM - Giamaica 2
KG - Kirghizistan 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
MY - Malesia 2
NG - Nigeria 2
NO - Norvegia 2
NP - Nepal 2
PE - Perù 2
TH - Thailandia 2
TN - Tunisia 2
TW - Taiwan 2
UG - Uganda 2
AO - Angola 1
BH - Bahrain 1
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CG - Congo 1
CH - Svizzera 1
EE - Estonia 1
GT - Guatemala 1
HN - Honduras 1
Totale 17.452
Città #
Fairfield 1.337
Woodbridge 1.042
Houston 674
Chandler 672
Dallas 638
Ann Arbor 636
Ashburn 573
Seattle 556
Dong Ket 506
Wilmington 495
Cambridge 461
Dearborn 272
Moscow 254
Nyköping 249
Singapore 237
Jacksonville 219
Boardman 204
The Dalles 201
Southend 196
Beijing 168
Naples 142
Princeton 89
Lawrence 79
Munich 78
Rome 67
Shanghai 67
Ogden 62
Bremen 59
Düsseldorf 58
San Diego 57
Los Angeles 48
New York 46
Des Moines 45
Columbus 44
Norwalk 44
Council Bluffs 40
Yubileyny 39
Hong Kong 38
São Paulo 36
Brussels 35
London 35
Boydton 29
Nanjing 29
Timisoara 26
Ho Chi Minh City 25
Chicago 24
Kunming 22
Brno 21
Hefei 20
Frankfurt am Main 19
Grafing 18
Lauterbourg 18
Milan 18
Dublin 17
Helsinki 17
Ottawa 17
Atlanta 16
Jinan 16
Scottsdale 16
Guangzhou 15
Santa Clara 15
Curitiba 13
Falls Church 13
Napoli 13
Belo Horizonte 12
Hanoi 12
Redwood City 12
Rio de Janeiro 12
San Mateo 12
Tappahannock 12
Tokyo 11
Montreal 10
Redmond 10
Brooklyn 9
Toronto 9
Amsterdam 8
Brasília 8
Fuzhou 8
Hebei 8
Salvador 8
Stockholm 8
Calvi Risorta 7
Fortaleza 7
Guayaquil 7
Lappeenranta 7
San Francisco 7
Shenyang 7
Vienna 7
Afragola 6
Auburn Hills 6
Baghdad 6
Cava de' Tirreni 6
Halle 6
Mumbai 6
Nanchang 6
Ningbo 6
Portsmouth 6
Salt Lake City 6
Warsaw 6
Washington 6
Totale 11.525
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 362
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 315
Enabling convergence of physical and logical security through intelligent event correlation 307
A comparative analysis of emerging approaches for securing java software with Intel SGX 290
Effective QoS Monitoring in Large Scale Social Networks 286
Cloud security: Emerging threats and current solutions 281
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 269
A GPS Spoofing Resilient WAMS for Smart Grid 260
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 259
A framework for mastering heterogeneity in multi-layer security information and event correlation 258
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 256
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 253
A hidden Markov model based intrusion detection system for wireless sensor networks 251
A healthcare real-time monitoring system for multiple sensors data collection and correlation 251
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 247
An Approach for Securing Critical Applications in Untrusted Clouds 245
A Business Process Monitor for a Mobile Phone Recharging System 244
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 243
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 236
An abstract reasoning architecture for privacy policies monitoring 236
Applying extensions of evidence theory to detect frauds in financial infrastructures 235
Enhancing SIEM Technology to Protect Critical Infrastructures 234
Effective visualization of a big data banking application 230
An OpenNCP-based Solution for Secure eHealth Data Exchange 229
Security Analysis of Smart Grid Data Collection Technologies 227
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 225
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 225
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 223
A resilient architecture for forensic storage of events in critical infrastructures 222
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 218
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 216
Adaptable parsing of real-time data streams 215
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 215
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 214
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 214
Real-time QoS monitoring from the end user perspective in large scale social networks 213
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 212
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 211
My smart home is under attack 208
Trust establishment in cooperating cyber-physical systems 207
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 205
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 203
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 200
Virtual Scan Chains for online testing of FPGA-based embedded systems 200
How to protect public administration from cybersecurity threats: The COMPACT project 198
Exposing vulnerabilities in electric power grids: An experimental approach 194
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 191
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 187
Protecting critical business processes of smart hospitals from cyber attacks 186
Elliptic curve cryptography engineering 184
Advanced SIEM Technology for Critical Infrastructure Protection 182
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 181
High-Performance and Interoperable Security Services for Mobile Environments 181
Combination approach to select optimal countermeasures based on the RORI index 176
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 175
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 174
Performance Evaluation of Security Services: An Experimental Approach 172
Security Engineering of SOA Applications Via Reliability Patterns 172
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 170
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 166
KONFIDO: An OpenNCP-based secure ehealth data exchange system 162
Security and Reliability Requirements for Advanced Security Event Management 161
A Trusted Information Agent for Security Information and Event Management 160
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 159
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 159
Web Services Workflow Reliability Estimation Through Reliability Patterns 158
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain 158
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 157
CAN-Bus Attack Detection With Deep Learning 155
An event correlation approach for fault diagnosis in SCADA infrastructures 154
TrustedSIM: Towards Unified Mobile Security 151
A framework for the Design of Distributed Reconfigurable Embedded Systems 144
Network Resilience 144
Exploiting diversity and correlation to improve the performance of intrusion detection systems 144
Real-time Security & Dependability monitoring: Make it a bundle 143
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 139
Runtime model checking for sla compliance monitoring and qos prediction 138
null 138
SLA compliance monitoring through semantic processing 128
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 125
Distributed Framework for Cybersecurity of Critical Infrastructures 121
Dependability and resilience of computer networks (SCADA / cyber-security) 120
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 110
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 101
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 97
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 93
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 79
PriSIEM: Enabling privacy-preserving Managed Security Services 74
Secure cross-border exchange of health related data: The KONFIDO approach 73
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 67
Detection of Radio Frequency Interference in Satellite Ground Segments 64
Privacy-Preserving Credit Scoring via Functional Encryption 64
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 62
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids 56
Increasing the Cybersecurity of Smart Grids by Prosumer Monitoring 56
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces 56
Securing FIWARE with TEE Technology 53
An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX 41
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 34
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 21
Totale 17.858
Categoria #
all - tutte 67.686
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 67.686


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.946 0 0 0 153 254 112 263 99 90 232 123 620
2021/20221.123 121 172 40 246 55 57 117 96 56 81 50 32
2022/20231.842 234 155 115 211 231 307 45 210 171 51 71 41
2023/2024567 59 40 37 29 30 58 15 52 111 29 18 89
2024/20254.104 75 264 26 94 114 490 872 1.412 172 143 274 168
2025/20261.489 312 434 603 140 0 0 0 0 0 0 0 0
Totale 17.858