COPPOLINO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 8.506
EU - Europa 5.218
AS - Asia 1.464
SA - Sud America 169
AF - Africa 22
Continente sconosciuto - Info sul continente non disponibili 16
OC - Oceania 10
Totale 15.405
Nazione #
US - Stati Uniti d'America 8.468
RU - Federazione Russa 2.169
UA - Ucraina 819
IT - Italia 580
VN - Vietnam 510
DE - Germania 435
SG - Singapore 422
CN - Cina 401
GB - Regno Unito 384
SE - Svezia 374
FR - Francia 160
BR - Brasile 143
FI - Finlandia 84
BE - Belgio 35
RO - Romania 29
CZ - Repubblica Ceca 26
CA - Canada 25
HK - Hong Kong 21
IN - India 21
AT - Austria 20
IE - Irlanda 18
EU - Europa 16
GR - Grecia 14
NL - Olanda 14
TR - Turchia 11
ES - Italia 10
AE - Emirati Arabi Uniti 9
KR - Corea 9
AR - Argentina 7
AU - Australia 7
CO - Colombia 6
AL - Albania 5
EC - Ecuador 5
HU - Ungheria 5
MA - Marocco 5
MX - Messico 5
PL - Polonia 5
PT - Portogallo 5
QA - Qatar 5
BD - Bangladesh 4
CL - Cile 4
DK - Danimarca 4
HR - Croazia 4
IL - Israele 4
JP - Giappone 4
PA - Panama 4
PK - Pakistan 4
BG - Bulgaria 3
CR - Costa Rica 3
DZ - Algeria 3
IQ - Iraq 3
IR - Iran 3
LK - Sri Lanka 3
LT - Lituania 3
NZ - Nuova Zelanda 3
PH - Filippine 3
PS - Palestinian Territory 3
SK - Slovacchia (Repubblica Slovacca) 3
ZA - Sudafrica 3
AM - Armenia 2
AZ - Azerbaigian 2
BO - Bolivia 2
EG - Egitto 2
ID - Indonesia 2
KE - Kenya 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LU - Lussemburgo 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
SA - Arabia Saudita 2
UG - Uganda 2
UZ - Uzbekistan 2
VE - Venezuela 2
BN - Brunei Darussalam 1
BT - Bhutan 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CH - Svizzera 1
EE - Estonia 1
GE - Georgia 1
IS - Islanda 1
JO - Giordania 1
KG - Kirghizistan 1
KW - Kuwait 1
MY - Malesia 1
NP - Nepal 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TN - Tunisia 1
TZ - Tanzania 1
Totale 15.405
Città #
Fairfield 1.337
Woodbridge 1.042
Houston 674
Chandler 672
Ann Arbor 636
Seattle 554
Ashburn 534
Dong Ket 506
Wilmington 492
Cambridge 461
Dearborn 272
Moscow 254
Nyköping 249
Jacksonville 219
Singapore 219
Boardman 204
Southend 196
Naples 119
Beijing 100
Princeton 89
Lawrence 79
Shanghai 67
Ogden 62
Bremen 59
Düsseldorf 58
San Diego 57
Rome 53
Munich 48
Des Moines 45
Norwalk 44
Council Bluffs 40
Yubileyny 39
New York 37
Brussels 35
Boydton 29
Nanjing 29
Los Angeles 28
London 26
Timisoara 26
Kunming 22
Brno 21
Hefei 20
Grafing 18
Lauterbourg 18
Dublin 17
Helsinki 16
Jinan 16
Ottawa 16
Scottsdale 16
Guangzhou 15
Hong Kong 14
Milan 14
Falls Church 13
Napoli 13
Redwood City 12
San Mateo 12
Tappahannock 12
Santa Clara 11
Redmond 10
São Paulo 10
Dallas 9
Fuzhou 8
Hebei 8
Atlanta 7
Lappeenranta 7
Shenyang 7
Vienna 7
Auburn Hills 6
Belo Horizonte 6
Cava de' Tirreni 6
Frankfurt am Main 6
Halle 6
Mumbai 6
Nanchang 6
Ningbo 6
Portsmouth 6
The Dalles 6
Washington 6
Bogotá 5
Hounslow 5
Indiana 5
Islington 5
Madrid 5
Padova 5
Pagani 5
Pomigliano d'Arco 5
Taiyuan 5
Toronto 5
Acerra 4
Avellino 4
Caivano 4
Chicago 4
Chongqing 4
Islamabad 4
Kocaeli 4
Kraków 4
Matawan 4
New Bedfont 4
Nürnberg 4
Salerno 4
Totale 10.223
Nome #
A DBSCAN based approach for jointly segment and classify brain MR images 307
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 287
Enabling convergence of physical and logical security through intelligent event correlation 282
Effective QoS Monitoring in Large Scale Social Networks 266
A comparative analysis of emerging approaches for securing java software with Intel SGX 257
Cloud security: Emerging threats and current solutions 256
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 241
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 239
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 236
A GPS Spoofing Resilient WAMS for Smart Grid 230
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 230
A healthcare real-time monitoring system for multiple sensors data collection and correlation 223
An Approach for Securing Critical Applications in Untrusted Clouds 222
A hidden Markov model based intrusion detection system for wireless sensor networks 221
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 221
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 220
A framework for mastering heterogeneity in multi-layer security information and event correlation 220
A Business Process Monitor for a Mobile Phone Recharging System 220
Enhancing SIEM Technology to Protect Critical Infrastructures 217
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 215
An OpenNCP-based Solution for Secure eHealth Data Exchange 213
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 211
Security Analysis of Smart Grid Data Collection Technologies 210
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 209
Effective visualization of a big data banking application 209
Applying extensions of evidence theory to detect frauds in financial infrastructures 208
Adaptable parsing of real-time data streams 204
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 201
Real-time QoS monitoring from the end user perspective in large scale social networks 200
An abstract reasoning architecture for privacy policies monitoring 198
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 198
Trust establishment in cooperating cyber-physical systems 197
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 197
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 195
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 195
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 195
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 193
My smart home is under attack 192
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 188
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 185
A resilient architecture for forensic storage of events in critical infrastructures 185
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 184
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 183
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 183
Virtual Scan Chains for online testing of FPGA-based embedded systems 183
Exposing vulnerabilities in electric power grids: An experimental approach 180
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 174
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 173
High-Performance and Interoperable Security Services for Mobile Environments 173
Elliptic curve cryptography engineering 171
Security Engineering of SOA Applications Via Reliability Patterns 169
How to protect public administration from cybersecurity threats: The COMPACT project 165
Combination approach to select optimal countermeasures based on the RORI index 164
Performance Evaluation of Security Services: An Experimental Approach 162
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 161
Advanced SIEM Technology for Critical Infrastructure Protection 151
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 151
Security and Reliability Requirements for Advanced Security Event Management 149
Web Services Workflow Reliability Estimation Through Reliability Patterns 147
KONFIDO: An OpenNCP-based secure ehealth data exchange system 147
Protecting critical business processes of smart hospitals from cyber attacks 147
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 146
CAN-Bus Attack Detection With Deep Learning 146
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain 145
An event correlation approach for fault diagnosis in SCADA infrastructures 144
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 143
TrustedSIM: Towards Unified Mobile Security 142
null 138
Exploiting diversity and correlation to improve the performance of intrusion detection systems 134
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 133
Network Resilience 131
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 130
A Trusted Information Agent for Security Information and Event Management 127
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 127
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 126
Real-time Security & Dependability monitoring: Make it a bundle 125
SLA compliance monitoring through semantic processing 121
Runtime model checking for sla compliance monitoring and qos prediction 118
A framework for the Design of Distributed Reconfigurable Embedded Systems 115
Distributed Framework for Cybersecurity of Critical Infrastructures 112
Dependability and resilience of computer networks (SCADA / cyber-security) 110
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 91
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 87
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 78
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 63
The good, the bad, and the algorithm: The impact of generative AI on cybersecurity 55
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems 52
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 51
PriSIEM: Enabling privacy-preserving Managed Security Services 50
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 49
Detection of Radio Frequency Interference in Satellite Ground Segments 45
Secure cross-border exchange of health related data: The KONFIDO approach 44
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids 42
Securing FIWARE with TEE Technology 40
Privacy-Preserving Credit Scoring via Functional Encryption 40
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces 37
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 25
Increasing the Cybersecurity of Smart Grids by Prosumer Monitoring 19
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 8
Totale 15.799
Categoria #
all - tutte 56.173
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 56.173


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020316 0 0 0 0 0 0 0 0 0 85 144 87
2020/20212.360 148 106 160 153 254 112 263 99 90 232 123 620
2021/20221.123 121 172 40 246 55 57 117 96 56 81 50 32
2022/20231.842 234 155 115 211 231 307 45 210 171 51 71 41
2023/2024567 59 40 37 29 30 58 15 52 111 29 18 89
2024/20253.534 75 264 26 94 114 490 872 1.412 172 15 0 0
Totale 15.799