COPPOLINO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 10.317
EU - Europa 5.608
AS - Asia 2.775
SA - Sud America 632
AF - Africa 84
Continente sconosciuto - Info sul continente non disponibili 18
OC - Oceania 11
Totale 19.445
Nazione #
US - Stati Uniti d'America 10.212
RU - Federazione Russa 2.182
SG - Singapore 831
UA - Ucraina 824
VN - Vietnam 757
CN - Cina 727
IT - Italia 722
DE - Germania 500
BR - Brasile 482
GB - Regno Unito 415
SE - Svezia 383
FR - Francia 209
FI - Finlandia 93
HK - Hong Kong 90
IN - India 68
AR - Argentina 54
CA - Canada 54
BE - Belgio 36
RO - Romania 32
TR - Turchia 28
BD - Bangladesh 26
CZ - Repubblica Ceca 26
ID - Indonesia 26
EC - Ecuador 25
NL - Olanda 24
AT - Austria 23
CO - Colombia 23
IQ - Iraq 23
PK - Pakistan 22
PL - Polonia 21
ES - Italia 20
MX - Messico 20
SA - Arabia Saudita 20
GR - Grecia 18
IE - Irlanda 18
EU - Europa 16
PH - Filippine 16
VE - Venezuela 16
ZA - Sudafrica 16
AE - Emirati Arabi Uniti 15
JP - Giappone 15
CL - Cile 12
MA - Marocco 12
MY - Malesia 11
UZ - Uzbekistan 11
CI - Costa d'Avorio 10
KR - Corea 10
AZ - Azerbaigian 9
CR - Costa Rica 9
LV - Lettonia 9
DZ - Algeria 8
KE - Kenya 8
PY - Paraguay 8
AL - Albania 7
AU - Australia 7
JO - Giordania 7
LT - Lituania 7
TN - Tunisia 7
BO - Bolivia 6
EG - Egitto 6
IL - Israele 6
PA - Panama 6
PS - Palestinian Territory 6
QA - Qatar 6
HR - Croazia 5
HU - Ungheria 5
PE - Perù 5
PT - Portogallo 5
BG - Bulgaria 4
DK - Danimarca 4
LK - Sri Lanka 4
NP - Nepal 4
SN - Senegal 4
SY - Repubblica araba siriana 4
TH - Thailandia 4
TT - Trinidad e Tobago 4
TW - Taiwan 4
BA - Bosnia-Erzegovina 3
IR - Iran 3
JM - Giamaica 3
KG - Kirghizistan 3
KZ - Kazakistan 3
NZ - Nuova Zelanda 3
OM - Oman 3
SK - Slovacchia (Repubblica Slovacca) 3
AM - Armenia 2
AO - Angola 2
BH - Bahrain 2
BY - Bielorussia 2
ET - Etiopia 2
GE - Georgia 2
GT - Guatemala 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
NG - Nigeria 2
NO - Norvegia 2
UG - Uganda 2
XK - ???statistics.table.value.countryCode.XK??? 2
BN - Brunei Darussalam 1
BT - Bhutan 1
Totale 19.424
Città #
Fairfield 1.337
Woodbridge 1.042
Houston 674
Chandler 672
Ashburn 668
Dallas 639
Ann Arbor 636
Seattle 556
Dong Ket 506
Wilmington 495
Cambridge 461
Singapore 409
San Jose 295
The Dalles 275
Dearborn 272
Moscow 255
Nyköping 249
Jacksonville 219
Boardman 206
Southend 196
Beijing 194
Naples 178
Princeton 89
Ho Chi Minh City 83
Hong Kong 82
Lawrence 79
Munich 78
Rome 75
Shanghai 70
Ogden 62
Hanoi 61
Bremen 59
Düsseldorf 58
San Diego 57
Los Angeles 49
New York 49
Des Moines 45
Columbus 44
Council Bluffs 44
Norwalk 44
São Paulo 41
Yubileyny 39
Brussels 36
London 35
Frankfurt am Main 32
Boydton 29
Nanjing 29
Timisoara 26
Chicago 24
Santa Clara 24
Helsinki 22
Kunming 22
Brno 21
Hefei 20
Milan 20
Grafing 18
Lauterbourg 18
Atlanta 17
Dublin 17
Ottawa 17
Jinan 16
Scottsdale 16
Curitiba 15
Guangzhou 15
Tokyo 15
Belo Horizonte 13
Falls Church 13
Napoli 13
Da Nang 12
Hải Dương 12
Redwood City 12
Rio de Janeiro 12
Salvador 12
San Mateo 12
Tappahannock 12
Montreal 11
Abidjan 10
Amsterdam 10
Brooklyn 10
Guayaquil 10
Kuala Lumpur 10
Redmond 10
Tashkent 10
Warsaw 10
Baghdad 9
Bogotá 9
Brasília 9
Mumbai 9
Riga 9
Riyadh 9
Toronto 9
Baku 8
Fortaleza 8
Fuzhou 8
Hebei 8
Johannesburg 8
San Francisco 8
Stockholm 8
Vienna 8
Calvi Risorta 7
Totale 12.494
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 381
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 338
Enabling convergence of physical and logical security through intelligent event correlation 325
A comparative analysis of emerging approaches for securing java software with Intel SGX 315
Effective QoS Monitoring in Large Scale Social Networks 301
Cloud security: Emerging threats and current solutions 300
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 288
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 284
A GPS Spoofing Resilient WAMS for Smart Grid 283
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 279
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 278
A framework for mastering heterogeneity in multi-layer security information and event correlation 278
A hidden Markov model based intrusion detection system for wireless sensor networks 267
A healthcare real-time monitoring system for multiple sensors data collection and correlation 267
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 266
A Business Process Monitor for a Mobile Phone Recharging System 265
An Approach for Securing Critical Applications in Untrusted Clouds 265
An abstract reasoning architecture for privacy policies monitoring 259
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 258
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 258
Applying extensions of evidence theory to detect frauds in financial infrastructures 255
An OpenNCP-based Solution for Secure eHealth Data Exchange 251
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 250
Enhancing SIEM Technology to Protect Critical Infrastructures 249
Effective visualization of a big data banking application 249
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 247
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 247
Security Analysis of Smart Grid Data Collection Technologies 244
A resilient architecture for forensic storage of events in critical infrastructures 242
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 240
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 239
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 235
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 235
Adaptable parsing of real-time data streams 234
Real-time QoS monitoring from the end user perspective in large scale social networks 231
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 230
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 227
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 225
Trust establishment in cooperating cyber-physical systems 224
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 223
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 222
My smart home is under attack 220
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 218
How to protect public administration from cybersecurity threats: The COMPACT project 218
Virtual Scan Chains for online testing of FPGA-based embedded systems 217
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 214
Exposing vulnerabilities in electric power grids: An experimental approach 208
Protecting critical business processes of smart hospitals from cyber attacks 205
Advanced SIEM Technology for Critical Infrastructure Protection 202
Elliptic curve cryptography engineering 201
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 201
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 199
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 198
High-Performance and Interoperable Security Services for Mobile Environments 196
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 194
Security Engineering of SOA Applications Via Reliability Patterns 193
Combination approach to select optimal countermeasures based on the RORI index 185
Performance Evaluation of Security Services: An Experimental Approach 185
A Trusted Information Agent for Security Information and Event Management 183
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 183
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 182
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 181
KONFIDO: An OpenNCP-based secure ehealth data exchange system 179
Web Services Workflow Reliability Estimation Through Reliability Patterns 177
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 176
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 174
Security and Reliability Requirements for Advanced Security Event Management 173
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain 173
CAN-Bus Attack Detection With Deep Learning 169
A framework for the Design of Distributed Reconfigurable Embedded Systems 167
An event correlation approach for fault diagnosis in SCADA infrastructures 165
TrustedSIM: Towards Unified Mobile Security 163
Network Resilience 161
Real-time Security & Dependability monitoring: Make it a bundle 157
Exploiting diversity and correlation to improve the performance of intrusion detection systems 156
Runtime model checking for sla compliance monitoring and qos prediction 155
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 153
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 147
Dependability and resilience of computer networks (SCADA / cyber-security) 142
SLA compliance monitoring through semantic processing 141
null 138
Distributed Framework for Cybersecurity of Critical Infrastructures 132
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 129
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 127
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 121
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 115
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 112
Secure cross-border exchange of health related data: The KONFIDO approach 97
PriSIEM: Enabling privacy-preserving Managed Security Services 94
Increasing the Cybersecurity of Smart Grids by Prosumer Monitoring 92
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 91
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 82
Privacy-Preserving Credit Scoring via Functional Encryption 81
Detection of Radio Frequency Interference in Satellite Ground Segments 75
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces 73
Securing FIWARE with TEE Technology 68
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids 65
An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX 61
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 55
A Blockchain Solution for Decentralized Content Verification and its Application to Deepfake Detection and Fintech Credit Scoring 40
Totale 19.713
Categoria #
all - tutte 72.341
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 72.341


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021975 0 0 0 0 0 0 0 0 0 232 123 620
2021/20221.123 121 172 40 246 55 57 117 96 56 81 50 32
2022/20231.842 234 155 115 211 231 307 45 210 171 51 71 41
2023/2024567 59 40 37 29 30 58 15 52 111 29 18 89
2024/20254.104 75 264 26 94 114 490 872 1.412 172 143 274 168
2025/20263.477 312 434 603 305 237 108 440 253 501 284 0 0
Totale 19.846