COPPOLINO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 8.149
EU - Europa 2.724
AS - Asia 856
Continente sconosciuto - Info sul continente non disponibili 16
AF - Africa 8
OC - Oceania 8
SA - Sud America 5
Totale 11.766
Nazione #
US - Stati Uniti d'America 8.125
UA - Ucraina 818
VN - Vietnam 509
IT - Italia 461
SE - Svezia 373
GB - Regno Unito 366
DE - Germania 335
CN - Cina 280
FR - Francia 139
FI - Finlandia 70
RO - Romania 28
BE - Belgio 27
CA - Canada 18
RU - Federazione Russa 17
EU - Europa 16
IE - Irlanda 15
GR - Grecia 14
IN - India 13
AT - Austria 11
ES - Italia 10
KR - Corea 9
AE - Emirati Arabi Uniti 7
AU - Australia 7
HK - Hong Kong 7
AL - Albania 5
CZ - Repubblica Ceca 5
HU - Ungheria 5
NL - Olanda 5
PL - Polonia 5
QA - Qatar 5
SG - Singapore 5
TR - Turchia 5
PA - Panama 4
PT - Portogallo 4
DK - Danimarca 3
DZ - Algeria 3
HR - Croazia 3
IL - Israele 3
LK - Sri Lanka 3
BR - Brasile 2
CL - Cile 2
IR - Iran 2
JP - Giappone 2
UG - Uganda 2
BD - Bangladesh 1
BG - Bulgaria 1
BT - Bhutan 1
BW - Botswana 1
BZ - Belize 1
CO - Colombia 1
CR - Costa Rica 1
EE - Estonia 1
LU - Lussemburgo 1
NG - Nigeria 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
PK - Pakistan 1
SA - Arabia Saudita 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TZ - Tanzania 1
Totale 11.766
Città #
Fairfield 1.337
Woodbridge 1.042
Houston 674
Chandler 672
Ann Arbor 636
Seattle 554
Ashburn 526
Dong Ket 506
Wilmington 492
Cambridge 461
Dearborn 272
Nyköping 249
Jacksonville 219
Southend 196
Beijing 90
Princeton 89
Lawrence 79
Naples 67
Boardman 65
Ogden 62
Bremen 59
San Diego 57
Des Moines 44
Norwalk 44
New York 37
Rome 32
Boydton 29
Nanjing 29
Brussels 27
Düsseldorf 26
Timisoara 26
Kunming 22
London 21
Hefei 20
Grafing 18
Jinan 16
Scottsdale 16
Dublin 14
Ottawa 14
Falls Church 13
Guangzhou 13
Napoli 13
Redwood City 12
San Mateo 12
Tappahannock 12
Redmond 10
Helsinki 9
Hebei 8
Atlanta 7
Fuzhou 7
Los Angeles 7
Milan 7
Shenyang 7
Auburn Hills 6
Cava de' Tirreni 6
Halle 6
Nanchang 6
Ningbo 6
Washington 6
Hounslow 5
Indiana 5
Islington 5
Madrid 5
Padova 5
Taiyuan 5
Acerra 4
Caivano 4
Chicago 4
Chongqing 4
Kocaeli 4
Kraków 4
Matawan 4
New Bedfont 4
Nürnberg 4
San Mango 4
Subiaco 4
Villaricca 4
Acton 3
Andover 3
Athens 3
Avissawella 3
Changsha 3
Chiswick 3
Edinburgh 3
Hanover 3
Jiaxing 3
Leawood 3
Montoro 3
Munich 3
Pisa 3
Puranpur 3
Salerno 3
San Francisco 3
Savona 3
Shaoxing 3
Sydney 3
Tooting 3
Vienna 3
Zagreb 3
Berlin 2
Totale 9.158
Nome #
Enabling convergence of physical and logical security through intelligent event correlation 239
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns 232
Effective QoS Monitoring in Large Scale Social Networks 228
A DBSCAN based approach for jointly segment and classify brain MR images 218
Cloud security: Emerging threats and current solutions 215
How to monitor QoS in cloud infrastructures: The QoSMONaaS approach 211
A comparative analysis of emerging approaches for securing java software with Intel SGX 208
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study 201
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach 198
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 188
A Business Process Monitor for a Mobile Phone Recharging System 183
A GPS Spoofing Resilient WAMS for Smart Grid 182
Enhancing SIEM Technology to Protect Critical Infrastructures 182
An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies 181
A Comprehensive Survey of Hardware-assisted Security: from the Edge to the Cloud 181
A hidden Markov model based intrusion detection system for wireless sensor networks 179
A framework for mastering heterogeneity in multi-layer security information and event correlation 179
Security Analysis of Smart Grid Data Collection Technologies 177
Effective visualization of a big data banking application 175
A healthcare real-time monitoring system for multiple sensors data collection and correlation 173
Trust establishment in cooperating cyber-physical systems 173
An Approach for Securing Critical Applications in Untrusted Clouds 172
Real-time QoS monitoring from the end user perspective in large scale social networks 170
Efficient Supply Chain Management via federation-based integration of legacy ERP systems 169
My smart home is under attack 169
Applying extensions of evidence theory to detect frauds in financial infrastructures 168
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions 166
Security Issues of a Phasor Data Concentrator for Smart Grid Infrastructure 164
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks 162
On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project 160
An OpenNCP-based Solution for Secure eHealth Data Exchange 159
SIL2 assessment of an Active/Standby COTS-based Safety-Related system 159
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach 158
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security 157
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services 157
Exposing vulnerabilities in electric power grids: An experimental approach 156
High-Performance and Interoperable Security Services for Mobile Environments 154
Cloudifying Critical Applications: A Use Case from the Power Grid Domain 154
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology 151
Open Issues in IDS Design for Wireless Biomedical Sensor Networks 151
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study 149
Elliptic curve cryptography engineering 148
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud 147
Virtual Scan Chains for online testing of FPGA-based embedded systems 146
Combination approach to select optimal countermeasures based on the RORI index 144
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 143
Adaptable parsing of real-time data streams 142
A resilient architecture for forensic storage of events in critical infrastructures 139
Security Engineering of SOA Applications Via Reliability Patterns 138
An abstract reasoning architecture for privacy policies monitoring 138
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level 138
Performance Evaluation of Security Services: An Experimental Approach 136
Security and Reliability Requirements for Advanced Security Event Management 128
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study 128
Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements 127
An event correlation approach for fault diagnosis in SCADA infrastructures 126
Web Services Workflow Reliability Estimation Through Reliability Patterns 126
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe 125
TrustedSIM: Towards Unified Mobile Security 123
How to protect public administration from cybersecurity threats: The COMPACT project 120
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain 118
CAN-Bus Attack Detection With Deep Learning 118
Exploiting diversity and correlation to improve the performance of intrusion detection systems 108
Privacy Preserving Intrusion Detection Via Homomorphic Encryption 107
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking 106
Advanced SIEM Technology for Critical Infrastructure Protection 106
KONFIDO: An OpenNCP-based secure ehealth data exchange system 106
Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach 105
Protecting critical business processes of smart hospitals from cyber attacks 104
SLA compliance monitoring through semantic processing 100
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems 98
Enhancing Random Forest Classification with NLP in DAMEH: A system for DAta Management in EHealth Domain 97
A Trusted Information Agent for Security Information and Event Management 94
Distributed Framework for Cybersecurity of Critical Infrastructures 92
Network Resilience 91
Real-time Security & Dependability monitoring: Make it a bundle 91
Runtime model checking for sla compliance monitoring and qos prediction 88
Dependability and resilience of computer networks (SCADA / cyber-security) 87
A framework for the Design of Distributed Reconfigurable Embedded Systems 76
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems 74
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems 69
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants 62
Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing 39
Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project 34
Secure cross-border exchange of health related data: The KONFIDO approach 19
Privacy-Preserving Credit Scoring via Functional Encryption 19
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids 14
Critical Infrastructure Protection: Where Convergence of Logical and Physical Security Technologies is a Must 12
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes 10
Securing FIWARE with TEE Technology 6
A self-adaptation-based approach to resilience improvement of complex internets of utility systems 6
PriSIEM: Enabling privacy-preserving Managed Security Services 5
The protection of LP-WAN Endpoints via TEE: A Chemical Storage Case Study 3
Detection of Radio Frequency Interference in Satellite Ground Segments 2
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces 2
Totale 12.138
Categoria #
all - tutte 38.846
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 38.846


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019687 0 0 0 0 0 0 0 0 0 124 315 248
2019/20203.395 219 222 222 739 335 333 445 241 323 85 144 87
2020/20212.360 148 106 160 153 254 112 263 99 90 232 123 620
2021/20221.123 121 172 40 246 55 57 117 96 56 81 50 32
2022/20231.842 234 155 115 211 231 307 45 210 171 51 71 41
2023/2024440 59 40 37 29 30 58 15 52 111 9 0 0
Totale 12.138