CASTIGLIONE, ANIELLO
 Distribuzione geografica
Continente #
NA - Nord America 20.583
EU - Europa 7.454
AS - Asia 3.752
SA - Sud America 1.403
AF - Africa 95
Continente sconosciuto - Info sul continente non disponibili 44
OC - Oceania 9
Totale 33.340
Nazione #
US - Stati Uniti d'America 20.453
RU - Federazione Russa 3.335
UA - Ucraina 1.904
VN - Vietnam 1.822
BR - Brasile 1.181
CN - Cina 784
SE - Svezia 772
SG - Singapore 768
GB - Regno Unito 387
DE - Germania 386
IT - Italia 232
FR - Francia 138
FI - Finlandia 122
AR - Argentina 83
CA - Canada 66
EC - Ecuador 51
IN - India 50
HK - Hong Kong 49
ID - Indonesia 43
EU - Europa 40
TR - Turchia 38
BD - Bangladesh 37
MX - Messico 36
ZA - Sudafrica 35
IQ - Iraq 31
CO - Colombia 26
RO - Romania 24
PL - Polonia 23
ES - Italia 21
PY - Paraguay 19
JP - Giappone 16
BE - Belgio 14
CH - Svizzera 14
IE - Irlanda 14
MA - Marocco 13
SA - Arabia Saudita 13
CL - Cile 11
DK - Danimarca 11
EG - Egitto 11
NL - Olanda 11
UZ - Uzbekistan 11
AE - Emirati Arabi Uniti 10
PE - Perù 10
PK - Pakistan 9
TN - Tunisia 9
VE - Venezuela 9
CZ - Repubblica Ceca 8
UY - Uruguay 8
KE - Kenya 7
KR - Corea 7
KZ - Kazakistan 7
NP - Nepal 7
DZ - Algeria 6
KG - Kirghizistan 6
AT - Austria 5
AU - Australia 5
BA - Bosnia-Erzegovina 5
BO - Bolivia 5
IR - Iran 5
LT - Lituania 5
PA - Panama 5
AL - Albania 4
AZ - Azerbaigian 4
DO - Repubblica Dominicana 4
HN - Honduras 4
LB - Libano 4
OM - Oman 4
TT - Trinidad e Tobago 4
BG - Bulgaria 3
JM - Giamaica 3
KW - Kuwait 3
NZ - Nuova Zelanda 3
PS - Palestinian Territory 3
SV - El Salvador 3
TW - Taiwan 3
BB - Barbados 2
BH - Bahrain 2
ET - Etiopia 2
GE - Georgia 2
HR - Croazia 2
JO - Giordania 2
LA - Repubblica Popolare Democratica del Laos 2
LK - Sri Lanka 2
LV - Lettonia 2
MK - Macedonia 2
MY - Malesia 2
PH - Filippine 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
XK - ???statistics.table.value.countryCode.XK??? 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
AO - Angola 1
BW - Botswana 1
CG - Congo 1
CR - Costa Rica 1
CW - ???statistics.table.value.countryCode.CW??? 1
DJ - Gibuti 1
GD - Grenada 1
GI - Gibilterra 1
Totale 33.322
Città #
Fairfield 4.038
Woodbridge 1.889
Ashburn 1.628
Seattle 1.609
Houston 1.462
Cambridge 1.410
Dong Ket 1.406
Wilmington 1.380
Dallas 1.127
Dearborn 708
Ann Arbor 679
Chandler 673
Jacksonville 570
Nyköping 553
Moscow 369
Singapore 363
Boardman 361
Beijing 294
Lawrence 249
Princeton 249
Ogden 163
Shanghai 149
Ho Chi Minh City 145
San Diego 122
Helsinki 109
The Dalles 101
São Paulo 98
New York 94
Hanoi 89
Southend 78
London 68
Los Angeles 68
Chicago 65
Chieti 61
Yubileyny 55
Hong Kong 48
Ottawa 41
Norwalk 40
Des Moines 39
Atlanta 37
Nanjing 36
Jinan 34
Munich 34
Columbus 33
Hefei 29
Rio de Janeiro 28
Boydton 27
Curitiba 26
Haiphong 25
Brasília 24
Hounslow 22
Kilburn 22
Naples 22
Guayaquil 21
Santa Clara 21
Kocaeli 20
Salt Lake City 20
Shenyang 19
Tampa 19
Kunming 18
San Mateo 18
Da Nang 17
Kyiv 17
Nanchang 17
Salvador 17
New Bedfont 16
Ningbo 16
Porto Alegre 16
Thái Bình 16
Council Bluffs 15
Redmond 15
Baghdad 14
Belo Horizonte 14
Brussels 14
Elk Grove Village 14
Lauterbourg 14
Biên Hòa 13
Bucharest 13
Guangzhou 13
Haikou 13
Redwood City 13
Campinas 12
Dublin 12
Hangzhou 12
Johannesburg 12
St Petersburg 12
Zurich 12
Bauru 11
Boston 11
Chiswick 11
Goiânia 11
Guarulhos 11
Juiz de Fora 11
Portsmouth 11
Quito 11
Santo André 11
Tokyo 11
Frankfurt am Main 10
Philadelphia 10
Ribeirão Preto 10
Totale 23.714
Nome #
Text Compression and Encryption through Smart Devices for Mobile Communication 249
A forensic analysis of images on Online Social Networks 249
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 249
A distributed approach to network anomaly detection based on independent component analysis 236
A novel anti-forensics technique for the Android OS 231
Exploiting mean field analysis to model performances of big data architectures 231
A botnet-based command and control approach relying on swarm intelligence 227
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 223
Welcome Message from IMIS 2013 Workshops co-Chairs 218
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 214
A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness 212
3D Face 208
Biometric data on the edge for secure, smart and user tailored access to cloud services 207
Biometrics in the Cloud: Challenges and Research Opportunities 206
A multi-scheme and multi-channel framework for micropayment systems 205
A secure distributed video surveillance system based on portable devices 205
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 204
A cloud-based architecture for emergency management and first responders localization in smart city environments 202
Engineering a secure mobile messaging framework 201
Message from BWCCA 2012 international Conference Organizers 201
A cluster-based data-centric model for network-aware task scheduling in distributed systems 200
Message from the CWECS 2015 Workshop Organizers 198
Walking on the cloud: Gait recognition, a wearable solution 197
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources 195
An asynchronous covert channel using spam 194
Network anomaly detection with the restricted Boltzmann machine 194
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 194
An intelligent security architecture for distributed firewalling environments 193
Welcome message from MCNCS-2012 international Workshop Organizers 193
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 192
Hybrid indoor and outdoor location services for new generation mobile terminals 192
Interconnecting Federated Clouds by Using Publish-Subscribe Service 190
An enhanced firewall scheme for dynamic and adaptive containment of emerging security threats 188
How to forge a digital alibi on Mac OS X 188
Analyzing the Internet stability in presence of disasters 187
Message from MCNCS 2016 workshop co-chairs 184
An energy-aware framework for reliable and secure end-to-end ubiquitous data communications 183
Trustworthy opportunistic access to the internet of services 183
Message from the NBiS 2015 workshops co-chairs 183
Creating and managing realism in the next-generation cyber range 183
A triadic closure and homophily-based recommendation system for online social networks 182
Welcome Message from MCNCS-2013 International Workshop Organizers 182
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies 182
A secure file sharing service for distributed computing environments 181
Message from CWECS 2012 international workshop organizers 181
On the construction of a false digital alibi on the Android OS 180
SPEECH: Secure personal end-to-end communication with handheld 180
Device tracking in private networks via NAPT log analysis 178
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 178
SECR3T: Secure end-to-end communication over 3G telecommunication networks 178
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 178
Countering browser fingerprinting techniques: Constructing a fake profile with google chrome 177
Welcome Message from NBiS 2014 Program Committee Co-Chairs 176
Modeling performances of concurrent big data applications 175
The digital profiling techniques applied to the analysis of a GPS navigation device 174
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 173
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks 173
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata 172
Dealing with Reliable Event-Based Communications by Means of Layered Multicast 172
The forensic analysis of a false digital alibi 171
GRASP-based resource re-optimization for effective big data access in federated clouds 169
Secure and distributed video surveillance via portable devices 169
Special issue on cloud, wireless and e-commerce security 167
FeelTrust: Providing trustworthy communications in Ubiquitous Mobile environment 166
Layered multicast for reliable event notification over large-scale networks 166
Automatic, selective and secure deletion of digital evidence 165
E-mail-based covert channels for asynchronous message steganography 163
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices 163
Distributed strategic learning and game theoretic formulation of network embedded coding 162
Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond 162
CHIS: A big data infrastructure to manage digital cultural items 162
Steganography and secure communication on online social networks and online photo sharing 162
A semantic-based methodology for digital forensics analysis 161
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 158
Encryption-Based Solution for Data Sovereignty in Federated Clouds 157
Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks 157
Network profiling: Content analysis of users behavior in digital communication channel 157
Towards a lawfully secure and privacy preserving video surveillance system 156
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace 156
Soft Computing for Security Services in Smart and Ubiquitous Environments 156
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 153
Foreword to the special issue on security, privacy, and social networks 153
Message from the UbiSafe 2016 Symposium Chairs 153
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 152
Healthcare-Related Data in the Cloud: Challenges and Opportunities 152
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network 152
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 152
Industrial Control System Cyber Threats Indicators in Smart Grid Technology 151
Cloud-based adaptive compression and secure management services for 3D healthcare data 151
Do you trust your phone? 151
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 150
Human Continuous Activity Recognition Based on Energy-Efficient Schemes Considering Cloud Security Technology 150
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity 149
On Secure Data Management in Health-Care Environment 148
Enhanced Network Support for Federated Cloud Infrastructures 147
Experimentations with source camera identification and Online Social Networks 146
On-board format-independent security of functional magnetic resonance images 145
Message from MCNCS 2011 international Workshop Organizers 145
A secure payment system for multimedia on demand on mobile VANET clouds 145
An Extensible Framework for Efficient Secure SMS 145
Totale 17.956
Categoria #
all - tutte 159.154
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 159.154


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20214.661 0 0 0 249 919 221 761 126 241 350 249 1.545
2021/20222.249 269 250 187 396 88 75 195 239 148 159 84 159
2022/20232.521 416 366 127 233 198 440 98 224 255 54 57 53
2023/2024989 79 55 82 39 45 86 41 26 264 36 21 215
2024/20255.609 47 380 26 106 57 483 1.710 1.736 405 198 238 223
2025/20263.514 461 965 1.262 826 0 0 0 0 0 0 0 0
Totale 33.689