CASTIGLIONE, ANIELLO
 Distribuzione geografica
Continente #
NA - Nord America 19.210
EU - Europa 7.379
AS - Asia 3.190
SA - Sud America 535
AF - Africa 44
Continente sconosciuto - Info sul continente non disponibili 42
OC - Oceania 9
Totale 30.409
Nazione #
US - Stati Uniti d'America 19.111
RU - Federazione Russa 3.308
UA - Ucraina 1.894
VN - Vietnam 1.427
SE - Svezia 769
CN - Cina 763
SG - Singapore 738
BR - Brasile 491
DE - Germania 383
GB - Regno Unito 381
IT - Italia 230
FR - Francia 138
FI - Finlandia 122
CA - Canada 64
IN - India 44
HK - Hong Kong 43
EU - Europa 40
TR - Turchia 38
RO - Romania 24
BD - Bangladesh 22
PL - Polonia 22
MX - Messico 20
ZA - Sudafrica 19
ES - Italia 17
IQ - Iraq 17
AR - Argentina 14
BE - Belgio 14
JP - Giappone 14
CH - Svizzera 13
IE - Irlanda 13
DK - Danimarca 11
NL - Olanda 11
SA - Arabia Saudita 10
AE - Emirati Arabi Uniti 8
UZ - Uzbekistan 8
CO - Colombia 7
CZ - Repubblica Ceca 7
MA - Marocco 7
PK - Pakistan 7
EC - Ecuador 6
KE - Kenya 6
KG - Kirghizistan 6
KR - Corea 6
VE - Venezuela 6
AT - Austria 5
AU - Australia 5
KZ - Kazakistan 5
AZ - Azerbaigian 4
EG - Egitto 4
IR - Iran 4
LT - Lituania 4
PE - Perù 4
TT - Trinidad e Tobago 4
BO - Bolivia 3
JM - Giamaica 3
NP - Nepal 3
NZ - Nuova Zelanda 3
TN - Tunisia 3
TW - Taiwan 3
BB - Barbados 2
BG - Bulgaria 2
GE - Georgia 2
HN - Honduras 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
LK - Sri Lanka 2
MY - Malesia 2
OM - Oman 2
PH - Filippine 2
UY - Uruguay 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AL - Albania 1
AM - Armenia 1
AO - Angola 1
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
CG - Congo 1
CL - Cile 1
CR - Costa Rica 1
DZ - Algeria 1
GD - Grenada 1
GI - Gibilterra 1
HR - Croazia 1
HU - Ungheria 1
ID - Indonesia 1
JO - Giordania 1
KH - Cambogia 1
LU - Lussemburgo 1
LV - Lettonia 1
MK - Macedonia 1
NG - Nigeria 1
PA - Panama 1
PS - Palestinian Territory 1
PT - Portogallo 1
PY - Paraguay 1
RS - Serbia 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
SV - El Salvador 1
TV - Tuvalu 1
Totale 30.408
Città #
Fairfield 4.038
Woodbridge 1.889
Ashburn 1.622
Seattle 1.608
Houston 1.462
Cambridge 1.410
Dong Ket 1.406
Wilmington 1.376
Dearborn 708
Ann Arbor 679
Chandler 673
Jacksonville 570
Nyköping 553
Moscow 368
Boardman 361
Singapore 339
Beijing 278
Lawrence 249
Princeton 249
Ogden 163
Shanghai 149
San Diego 121
Helsinki 109
The Dalles 101
New York 85
Southend 78
London 68
Chieti 61
Yubileyny 55
São Paulo 46
Hong Kong 42
Ottawa 41
Norwalk 40
Des Moines 39
Atlanta 37
Nanjing 36
Jinan 34
Los Angeles 34
Munich 34
Columbus 33
Dallas 31
Hefei 29
Boydton 27
Hounslow 22
Kilburn 22
Naples 22
Santa Clara 21
Kocaeli 20
Shenyang 19
Kunming 18
San Mateo 18
Nanchang 17
New Bedfont 16
Ningbo 16
Council Bluffs 15
Redmond 15
Brussels 14
Kyiv 14
Lauterbourg 14
Bucharest 13
Chicago 13
Guangzhou 13
Haikou 13
Redwood City 13
Hangzhou 12
Zurich 12
Chiswick 11
Dublin 11
Portsmouth 11
Rio de Janeiro 11
Baghdad 10
Boston 10
Johannesburg 10
Philadelphia 10
Salerno 10
Zhengzhou 10
Brasília 9
Bremen 9
Falls Church 9
Hebei 9
Madrid 9
Salvador 9
Taizhou 9
Tokyo 9
Warsaw 9
Belo Horizonte 8
Rome 8
Tappahannock 8
Tianjin 8
Ankara 7
Brooklyn 7
Curitiba 7
Delhi 7
Düsseldorf 7
Frankfurt am Main 7
Goiânia 7
Hanoi 7
Lappeenranta 7
Milan 7
Montreal 7
Totale 21.997
Nome #
Text Compression and Encryption through Smart Devices for Mobile Communication 247
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 245
A forensic analysis of images on Online Social Networks 226
Exploiting mean field analysis to model performances of big data architectures 218
Welcome Message from IMIS 2013 Workshops co-Chairs 214
A novel anti-forensics technique for the Android OS 210
A distributed approach to network anomaly detection based on independent component analysis 209
A botnet-based command and control approach relying on swarm intelligence 203
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 203
Biometrics in the Cloud: Challenges and Research Opportunities 200
A secure distributed video surveillance system based on portable devices 196
Message from BWCCA 2012 international Conference Organizers 195
Message from the CWECS 2015 Workshop Organizers 195
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 192
Walking on the cloud: Gait recognition, a wearable solution 192
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources 191
Network anomaly detection with the restricted Boltzmann machine 189
Welcome message from MCNCS-2012 international Workshop Organizers 189
A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness 188
A multi-scheme and multi-channel framework for micropayment systems 188
Biometric data on the edge for secure, smart and user tailored access to cloud services 187
Engineering a secure mobile messaging framework 185
A cloud-based architecture for emergency management and first responders localization in smart city environments 185
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 184
Analyzing the Internet stability in presence of disasters 184
Trustworthy opportunistic access to the internet of services 181
Message from the NBiS 2015 workshops co-chairs 181
An intelligent security architecture for distributed firewalling environments 180
Welcome Message from MCNCS-2013 International Workshop Organizers 179
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 178
Message from CWECS 2012 international workshop organizers 178
3D Face 178
A cluster-based data-centric model for network-aware task scheduling in distributed systems 177
Hybrid indoor and outdoor location services for new generation mobile terminals 177
An asynchronous covert channel using spam 176
On the construction of a false digital alibi on the Android OS 175
Welcome Message from NBiS 2014 Program Committee Co-Chairs 175
Message from MCNCS 2016 workshop co-chairs 175
Creating and managing realism in the next-generation cyber range 175
How to forge a digital alibi on Mac OS X 174
Countering browser fingerprinting techniques: Constructing a fake profile with google chrome 172
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 172
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata 171
Interconnecting Federated Clouds by Using Publish-Subscribe Service 171
An energy-aware framework for reliable and secure end-to-end ubiquitous data communications 170
SECR3T: Secure end-to-end communication over 3G telecommunication networks 170
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 170
The digital profiling techniques applied to the analysis of a GPS navigation device 170
An enhanced firewall scheme for dynamic and adaptive containment of emerging security threats 168
Device tracking in private networks via NAPT log analysis 168
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks 168
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 167
A triadic closure and homophily-based recommendation system for online social networks 167
Special issue on cloud, wireless and e-commerce security 165
The forensic analysis of a false digital alibi 165
Secure and distributed video surveillance via portable devices 165
FeelTrust: Providing trustworthy communications in Ubiquitous Mobile environment 163
GRASP-based resource re-optimization for effective big data access in federated clouds 162
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies 162
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 161
SPEECH: Secure personal end-to-end communication with handheld 161
Distributed strategic learning and game theoretic formulation of network embedded coding 158
Dealing with Reliable Event-Based Communications by Means of Layered Multicast 158
E-mail-based covert channels for asynchronous message steganography 157
A secure file sharing service for distributed computing environments 157
Steganography and secure communication on online social networks and online photo sharing 156
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices 155
CHIS: A big data infrastructure to manage digital cultural items 155
Layered multicast for reliable event notification over large-scale networks 153
Soft Computing for Security Services in Smart and Ubiquitous Environments 152
Modeling performances of concurrent big data applications 151
Towards a lawfully secure and privacy preserving video surveillance system 150
A semantic-based methodology for digital forensics analysis 149
Automatic, selective and secure deletion of digital evidence 148
Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks 148
Network profiling: Content analysis of users behavior in digital communication channel 148
Message from the UbiSafe 2016 Symposium Chairs 148
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 147
Experimentations with source camera identification and Online Social Networks 145
Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond 145
On Secure Data Management in Health-Care Environment 143
Encryption-Based Solution for Data Sovereignty in Federated Clouds 141
Message from MCNCS 2011 international Workshop Organizers 141
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity 141
Using Screen Brightness to Improve Security in Mobile Social Network Access 141
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 140
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 138
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace 138
Foreword to the special issue on security, privacy, and social networks 138
Inter-Beam Interference Cancellation and Physical Layer Security Constraints by 3D Polarized Beamforming in Power Domain NOMA Systems 138
Automatic security assessment for next generation wireless mobile networks 137
Healthcare-Related Data in the Cloud: Challenges and Opportunities 137
Human Continuous Activity Recognition Based on Energy-Efficient Schemes Considering Cloud Security Technology 137
Industrial Control System Cyber Threats Indicators in Smart Grid Technology 136
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 136
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 135
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 135
Cloud-based adaptive compression and secure management services for 3D healthcare data 135
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network 135
Do you trust your phone? 134
Totale 16.818
Categoria #
all - tutte 145.950
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 145.950


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20215.329 0 148 520 249 919 221 761 126 241 350 249 1.545
2021/20222.249 269 250 187 396 88 75 195 239 148 159 84 159
2022/20232.521 416 366 127 233 198 440 98 224 255 54 57 53
2023/2024989 79 55 82 39 45 86 41 26 264 36 21 215
2024/20255.609 47 380 26 106 57 483 1.710 1.736 405 198 238 223
2025/2026583 461 122 0 0 0 0 0 0 0 0 0 0
Totale 30.758