CASTIGLIONE, ANIELLO
 Distribuzione geografica
Continente #
NA - Nord America 18.796
EU - Europa 7.255
AS - Asia 2.960
SA - Sud America 304
Continente sconosciuto - Info sul continente non disponibili 41
AF - Africa 26
OC - Oceania 4
Totale 29.386
Nazione #
US - Stati Uniti d'America 18.737
RU - Federazione Russa 3.306
UA - Ucraina 1.889
VN - Vietnam 1.409
SE - Svezia 764
SG - Singapore 704
CN - Cina 703
DE - Germania 358
GB - Regno Unito 356
BR - Brasile 278
IT - Italia 224
FI - Finlandia 117
FR - Francia 117
CA - Canada 50
EU - Europa 40
TR - Turchia 27
HK - Hong Kong 26
RO - Romania 23
IN - India 21
BE - Belgio 14
CH - Svizzera 13
IE - Irlanda 13
DK - Danimarca 11
ES - Italia 10
NL - Olanda 10
ZA - Sudafrica 10
PL - Polonia 8
AE - Emirati Arabi Uniti 6
AR - Argentina 6
CZ - Repubblica Ceca 6
KR - Corea 6
AT - Austria 5
BD - Bangladesh 5
EC - Ecuador 5
KZ - Kazakistan 5
CO - Colombia 4
IQ - Iraq 4
IR - Iran 4
JP - Giappone 4
KG - Kirghizistan 4
MX - Messico 4
UZ - Uzbekistan 4
EG - Egitto 3
KE - Kenya 3
LT - Lituania 3
MA - Marocco 3
NZ - Nuova Zelanda 3
PE - Perù 3
TN - Tunisia 3
TW - Taiwan 3
VE - Venezuela 3
AZ - Azerbaigian 2
BO - Bolivia 2
GE - Georgia 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
LK - Sri Lanka 2
MY - Malesia 2
NP - Nepal 2
OM - Oman 2
PH - Filippine 2
SA - Arabia Saudita 2
UY - Uruguay 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
AO - Angola 1
AU - Australia 1
BG - Bulgaria 1
BH - Bahrain 1
CG - Congo 1
CL - Cile 1
CR - Costa Rica 1
DZ - Algeria 1
HN - Honduras 1
HR - Croazia 1
HU - Ungheria 1
ID - Indonesia 1
JM - Giamaica 1
KH - Cambogia 1
LU - Lussemburgo 1
MK - Macedonia 1
PA - Panama 1
PK - Pakistan 1
PT - Portogallo 1
RS - Serbia 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
SV - El Salvador 1
Totale 29.386
Città #
Fairfield 4.038
Woodbridge 1.889
Seattle 1.603
Ashburn 1.579
Houston 1.461
Cambridge 1.410
Dong Ket 1.406
Wilmington 1.375
Dearborn 707
Ann Arbor 679
Chandler 673
Jacksonville 569
Nyköping 553
Moscow 368
Boardman 361
Singapore 310
Lawrence 249
Princeton 249
Beijing 221
Ogden 163
Shanghai 149
San Diego 121
Helsinki 109
Southend 78
New York 73
The Dalles 70
London 62
Chieti 61
Yubileyny 55
Ottawa 41
Norwalk 40
Des Moines 39
Nanjing 36
Atlanta 34
Jinan 34
São Paulo 30
Hefei 29
Boydton 27
Hong Kong 25
Hounslow 22
Kilburn 22
Naples 22
Kocaeli 20
Shenyang 19
Kunming 18
Munich 18
San Mateo 18
Nanchang 17
New Bedfont 16
Ningbo 16
Los Angeles 15
Redmond 15
Brussels 14
Kyiv 14
Lauterbourg 14
Bucharest 13
Council Bluffs 13
Haikou 13
Redwood City 13
Guangzhou 12
Hangzhou 12
Zurich 12
Chiswick 11
Dublin 11
Portsmouth 11
Philadelphia 10
Salerno 10
Santa Clara 10
Zhengzhou 10
Bremen 9
Dallas 9
Falls Church 9
Hebei 9
Taizhou 9
Madrid 8
Tappahannock 8
Tianjin 8
Düsseldorf 7
Lappeenranta 7
Milan 7
Rome 7
Timisoara 7
Trecase 7
Wandsworth 7
Wuhan 7
Acton 6
Brno 6
Matawan 6
Nuremberg 6
Auburn Hills 5
Brasília 5
Curitiba 5
Delhi 5
Fuzhou 5
Halle 5
Hanover 5
Ilmenau 5
Islington 5
Marigliano 5
Rio de Janeiro 5
Totale 21.621
Nome #
Text Compression and Encryption through Smart Devices for Mobile Communication 246
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 239
A forensic analysis of images on Online Social Networks 222
Exploiting mean field analysis to model performances of big data architectures 216
Welcome Message from IMIS 2013 Workshops co-Chairs 209
A distributed approach to network anomaly detection based on independent component analysis 201
A novel anti-forensics technique for the Android OS 200
A botnet-based command and control approach relying on swarm intelligence 199
Biometrics in the Cloud: Challenges and Research Opportunities 195
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 192
Message from the CWECS 2015 Workshop Organizers 191
A secure distributed video surveillance system based on portable devices 191
Message from BWCCA 2012 international Conference Organizers 187
Welcome message from MCNCS-2012 international Workshop Organizers 186
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources 185
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 184
Network anomaly detection with the restricted Boltzmann machine 183
Walking on the cloud: Gait recognition, a wearable solution 182
Engineering a secure mobile messaging framework 181
A multi-scheme and multi-channel framework for micropayment systems 181
Biometric data on the edge for secure, smart and user tailored access to cloud services 181
A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness 179
A cloud-based architecture for emergency management and first responders localization in smart city environments 178
Analyzing the Internet stability in presence of disasters 178
Trustworthy opportunistic access to the internet of services 177
Message from the NBiS 2015 workshops co-chairs 177
Message from CWECS 2012 international workshop organizers 176
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 175
Welcome Message from MCNCS-2013 International Workshop Organizers 174
Hybrid indoor and outdoor location services for new generation mobile terminals 173
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 173
Welcome Message from NBiS 2014 Program Committee Co-Chairs 172
Message from MCNCS 2016 workshop co-chairs 172
A cluster-based data-centric model for network-aware task scheduling in distributed systems 171
On the construction of a false digital alibi on the Android OS 171
3D Face 170
An intelligent security architecture for distributed firewalling environments 169
How to forge a digital alibi on Mac OS X 169
Creating and managing realism in the next-generation cyber range 169
An asynchronous covert channel using spam 167
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 167
SECR3T: Secure end-to-end communication over 3G telecommunication networks 166
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata 166
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks 166
Countering browser fingerprinting techniques: Constructing a fake profile with google chrome 165
Interconnecting Federated Clouds by Using Publish-Subscribe Service 165
The digital profiling techniques applied to the analysis of a GPS navigation device 165
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 164
The forensic analysis of a false digital alibi 164
A triadic closure and homophily-based recommendation system for online social networks 163
Device tracking in private networks via NAPT log analysis 162
An energy-aware framework for reliable and secure end-to-end ubiquitous data communications 162
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 162
An enhanced firewall scheme for dynamic and adaptive containment of emerging security threats 161
Secure and distributed video surveillance via portable devices 160
Special issue on cloud, wireless and e-commerce security 159
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies 158
FeelTrust: Providing trustworthy communications in Ubiquitous Mobile environment 156
SPEECH: Secure personal end-to-end communication with handheld 156
Dealing with Reliable Event-Based Communications by Means of Layered Multicast 156
GRASP-based resource re-optimization for effective big data access in federated clouds 155
Steganography and secure communication on online social networks and online photo sharing 153
E-mail-based covert channels for asynchronous message steganography 152
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices 152
Distributed strategic learning and game theoretic formulation of network embedded coding 151
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 150
Layered multicast for reliable event notification over large-scale networks 149
Modeling performances of concurrent big data applications 148
CHIS: A big data infrastructure to manage digital cultural items 147
Towards a lawfully secure and privacy preserving video surveillance system 147
Soft Computing for Security Services in Smart and Ubiquitous Environments 147
A secure file sharing service for distributed computing environments 146
Automatic, selective and secure deletion of digital evidence 145
Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks 144
Network profiling: Content analysis of users behavior in digital communication channel 144
Message from the UbiSafe 2016 Symposium Chairs 144
A semantic-based methodology for digital forensics analysis 144
On Secure Data Management in Health-Care Environment 142
Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond 142
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 140
Using Screen Brightness to Improve Security in Mobile Social Network Access 138
Encryption-Based Solution for Data Sovereignty in Federated Clouds 137
Message from MCNCS 2011 international Workshop Organizers 137
Experimentations with source camera identification and Online Social Networks 136
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace 135
Foreword to the special issue on security, privacy, and social networks 135
Inter-Beam Interference Cancellation and Physical Layer Security Constraints by 3D Polarized Beamforming in Power Domain NOMA Systems 135
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 134
Industrial Control System Cyber Threats Indicators in Smart Grid Technology 134
Human Continuous Activity Recognition Based on Energy-Efficient Schemes Considering Cloud Security Technology 134
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 133
Cloud-based adaptive compression and secure management services for 3D healthcare data 133
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network 133
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity 133
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 133
Automatic security assessment for next generation wireless mobile networks 131
Healthcare-Related Data in the Cloud: Challenges and Opportunities 131
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 130
Do you trust your phone? 129
An Extensible Framework for Efficient Secure SMS 128
Totale 16.295
Categoria #
all - tutte 137.410
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 137.410


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020549 0 0 0 0 0 0 0 0 0 0 445 104
2020/20215.712 383 148 520 249 919 221 761 126 241 350 249 1.545
2021/20222.249 269 250 187 396 88 75 195 239 148 159 84 159
2022/20232.521 416 366 127 233 198 440 98 224 255 54 57 53
2023/2024989 79 55 82 39 45 86 41 26 264 36 21 215
2024/20255.169 47 380 26 106 57 483 1.710 1.736 405 198 21 0
Totale 29.735