CASTIGLIONE, ANIELLO
 Distribuzione geografica
Continente #
NA - Nord America 20.650
EU - Europa 7.500
AS - Asia 4.386
SA - Sud America 1.682
AF - Africa 115
Continente sconosciuto - Info sul continente non disponibili 45
OC - Oceania 9
Totale 34.387
Nazione #
US - Stati Uniti d'America 20.510
RU - Federazione Russa 3.337
VN - Vietnam 1.979
UA - Ucraina 1.904
BR - Brasile 1.414
SG - Singapore 1.170
CN - Cina 804
SE - Svezia 772
GB - Regno Unito 389
DE - Germania 386
IT - Italia 246
FR - Francia 139
FI - Finlandia 122
AR - Argentina 106
CA - Canada 67
ID - Indonesia 67
EC - Ecuador 58
IN - India 54
HK - Hong Kong 49
BD - Bangladesh 44
MX - Messico 43
ZA - Sudafrica 41
EU - Europa 40
TR - Turchia 38
IQ - Iraq 32
CO - Colombia 31
RO - Romania 26
LV - Lettonia 23
PL - Polonia 23
PY - Paraguay 22
ES - Italia 21
JP - Giappone 16
CH - Svizzera 15
EG - Egitto 15
UZ - Uzbekistan 15
BE - Belgio 14
IE - Irlanda 14
CL - Cile 13
MA - Marocco 13
SA - Arabia Saudita 13
PE - Perù 12
AE - Emirati Arabi Uniti 11
DK - Danimarca 11
NL - Olanda 11
TN - Tunisia 11
VE - Venezuela 11
DZ - Algeria 10
KZ - Kazakistan 10
UY - Uruguay 10
PK - Pakistan 9
CZ - Repubblica Ceca 8
TW - Taiwan 8
AT - Austria 7
KE - Kenya 7
KR - Corea 7
NP - Nepal 7
KG - Kirghizistan 6
PA - Panama 6
AU - Australia 5
AZ - Azerbaigian 5
BA - Bosnia-Erzegovina 5
BO - Bolivia 5
DO - Repubblica Dominicana 5
IR - Iran 5
LT - Lituania 5
AL - Albania 4
BG - Bulgaria 4
HN - Honduras 4
LB - Libano 4
MY - Malesia 4
OM - Oman 4
PS - Palestinian Territory 4
TT - Trinidad e Tobago 4
JM - Giamaica 3
KW - Kuwait 3
LK - Sri Lanka 3
NZ - Nuova Zelanda 3
SN - Senegal 3
SV - El Salvador 3
XK - ???statistics.table.value.countryCode.XK??? 3
BB - Barbados 2
BH - Bahrain 2
ET - Etiopia 2
GA - Gabon 2
GE - Georgia 2
HR - Croazia 2
JO - Giordania 2
LA - Repubblica Popolare Democratica del Laos 2
MK - Macedonia 2
PH - Filippine 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
AO - Angola 1
BW - Botswana 1
CG - Congo 1
CR - Costa Rica 1
CW - ???statistics.table.value.countryCode.CW??? 1
DJ - Gibuti 1
Totale 34.367
Città #
Fairfield 4.038
Woodbridge 1.889
Ashburn 1.660
Seattle 1.609
Houston 1.462
Cambridge 1.410
Dong Ket 1.406
Wilmington 1.380
Dallas 1.127
Dearborn 708
Ann Arbor 679
Chandler 673
Jacksonville 570
Nyköping 553
Singapore 386
Moscow 369
Boardman 362
Beijing 294
Lawrence 249
Princeton 249
Ho Chi Minh City 206
Ogden 163
Shanghai 149
Hanoi 122
San Diego 122
São Paulo 120
The Dalles 118
Helsinki 109
New York 94
Southend 78
Los Angeles 69
London 68
Chicago 65
Chieti 61
Yubileyny 55
Hong Kong 48
Ottawa 41
Norwalk 40
Des Moines 39
Atlanta 37
Nanjing 36
Rio de Janeiro 35
Jinan 34
Munich 34
Columbus 33
Haiphong 30
Hefei 29
Curitiba 28
Boydton 27
Da Nang 27
Brasília 25
Salvador 24
Guayaquil 23
Riga 23
Hounslow 22
Kilburn 22
Naples 22
Santa Clara 21
Kocaeli 20
Salt Lake City 20
Shenyang 19
Tampa 19
Biên Hòa 18
Kunming 18
Porto Alegre 18
San Mateo 18
Thái Bình 18
Belo Horizonte 17
Kyiv 17
Nanchang 17
New Bedfont 16
Ningbo 16
Baghdad 15
Bucharest 15
Council Bluffs 15
Redmond 15
Brussels 14
Campinas 14
Elk Grove Village 14
Johannesburg 14
Lauterbourg 14
Rome 14
Guangzhou 13
Guarulhos 13
Haikou 13
Jakarta 13
Quito 13
Redwood City 13
Ribeirão Preto 13
Tashkent 13
Buenos Aires 12
Dublin 12
Hangzhou 12
Juiz de Fora 12
St Petersburg 12
Zurich 12
Bauru 11
Boston 11
Chiswick 11
Goiânia 11
Totale 23.987
Nome #
A forensic analysis of images on Online Social Networks 253
Text Compression and Encryption through Smart Devices for Mobile Communication 252
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 250
A distributed approach to network anomaly detection based on independent component analysis 240
A novel anti-forensics technique for the Android OS 236
Exploiting mean field analysis to model performances of big data architectures 235
A botnet-based command and control approach relying on swarm intelligence 230
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 226
Welcome Message from IMIS 2013 Workshops co-Chairs 220
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 219
A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness 215
Biometric data on the edge for secure, smart and user tailored access to cloud services 212
3D Face 211
Biometrics in the Cloud: Challenges and Research Opportunities 209
A secure distributed video surveillance system based on portable devices 209
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 209
A multi-scheme and multi-channel framework for micropayment systems 207
A cluster-based data-centric model for network-aware task scheduling in distributed systems 206
Engineering a secure mobile messaging framework 206
A cloud-based architecture for emergency management and first responders localization in smart city environments 205
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 203
Message from BWCCA 2012 international Conference Organizers 202
Walking on the cloud: Gait recognition, a wearable solution 200
Message from the CWECS 2015 Workshop Organizers 199
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources 198
An intelligent security architecture for distributed firewalling environments 198
Hybrid indoor and outdoor location services for new generation mobile terminals 197
An asynchronous covert channel using spam 196
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 195
Network anomaly detection with the restricted Boltzmann machine 194
Welcome message from MCNCS-2012 international Workshop Organizers 194
Interconnecting Federated Clouds by Using Publish-Subscribe Service 193
How to forge a digital alibi on Mac OS X 192
An enhanced firewall scheme for dynamic and adaptive containment of emerging security threats 190
SPEECH: Secure personal end-to-end communication with handheld 190
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies 189
Message from MCNCS 2016 workshop co-chairs 188
Analyzing the Internet stability in presence of disasters 188
A secure file sharing service for distributed computing environments 187
Trustworthy opportunistic access to the internet of services 186
A triadic closure and homophily-based recommendation system for online social networks 186
An energy-aware framework for reliable and secure end-to-end ubiquitous data communications 185
Message from the NBiS 2015 workshops co-chairs 184
Welcome Message from MCNCS-2013 International Workshop Organizers 184
Creating and managing realism in the next-generation cyber range 184
Modeling performances of concurrent big data applications 182
Message from CWECS 2012 international workshop organizers 182
On the construction of a false digital alibi on the Android OS 181
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 181
Device tracking in private networks via NAPT log analysis 180
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 180
Countering browser fingerprinting techniques: Constructing a fake profile with google chrome 179
SECR3T: Secure end-to-end communication over 3G telecommunication networks 179
Welcome Message from NBiS 2014 Program Committee Co-Chairs 179
Dealing with Reliable Event-Based Communications by Means of Layered Multicast 178
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks 177
The forensic analysis of a false digital alibi 175
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 174
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata 174
The digital profiling techniques applied to the analysis of a GPS navigation device 174
Secure and distributed video surveillance via portable devices 173
GRASP-based resource re-optimization for effective big data access in federated clouds 172
Layered multicast for reliable event notification over large-scale networks 170
Automatic, selective and secure deletion of digital evidence 170
E-mail-based covert channels for asynchronous message steganography 169
Special issue on cloud, wireless and e-commerce security 169
Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond 168
FeelTrust: Providing trustworthy communications in Ubiquitous Mobile environment 167
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices 165
CHIS: A big data infrastructure to manage digital cultural items 165
Encryption-Based Solution for Data Sovereignty in Federated Clouds 164
A semantic-based methodology for digital forensics analysis 164
Steganography and secure communication on online social networks and online photo sharing 164
Distributed strategic learning and game theoretic formulation of network embedded coding 163
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 163
Foreword to the special issue on security, privacy, and social networks 162
Network profiling: Content analysis of users behavior in digital communication channel 161
Industrial Control System Cyber Threats Indicators in Smart Grid Technology 160
Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks 159
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace 159
Soft Computing for Security Services in Smart and Ubiquitous Environments 159
Do you trust your phone? 158
Healthcare-Related Data in the Cloud: Challenges and Opportunities 157
Message from the UbiSafe 2016 Symposium Chairs 157
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity 157
Towards a lawfully secure and privacy preserving video surveillance system 156
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 155
Cloud-based adaptive compression and secure management services for 3D healthcare data 155
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network 155
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 154
Human Continuous Activity Recognition Based on Energy-Efficient Schemes Considering Cloud Security Technology 154
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 154
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 153
On-board format-independent security of functional magnetic resonance images 151
Enhanced Network Support for Federated Cloud Infrastructures 151
A secure payment system for multimedia on demand on mobile VANET clouds 151
An Extensible Framework for Efficient Secure SMS 150
On Secure Data Management in Health-Care Environment 149
Experimentations with source camera identification and Online Social Networks 148
Forensically-Sound Methods to Collect Live Network Evidence 148
Totale 18.306
Categoria #
all - tutte 163.608
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 163.608


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20213.493 0 0 0 0 0 221 761 126 241 350 249 1.545
2021/20222.249 269 250 187 396 88 75 195 239 148 159 84 159
2022/20232.521 416 366 127 233 198 440 98 224 255 54 57 53
2023/2024989 79 55 82 39 45 86 41 26 264 36 21 215
2024/20255.609 47 380 26 106 57 483 1.710 1.736 405 198 238 223
2025/20264.561 461 965 1.262 1.565 289 19 0 0 0 0 0 0
Totale 34.736