GRANATA, Daniele
 Distribuzione geografica
Continente #
EU - Europa 494
AS - Asia 132
SA - Sud America 44
NA - Nord America 42
AF - Africa 2
Totale 714
Nazione #
RU - Federazione Russa 423
SG - Singapore 98
BR - Brasile 42
US - Stati Uniti d'America 39
IT - Italia 33
CN - Cina 21
DE - Germania 13
AT - Austria 7
IN - India 6
IE - Irlanda 4
NL - Olanda 4
FI - Finlandia 3
FR - Francia 2
GB - Regno Unito 2
IL - Israele 2
IQ - Iraq 2
EC - Ecuador 1
ET - Etiopia 1
HK - Hong Kong 1
KR - Corea 1
LT - Lituania 1
MX - Messico 1
NI - Nicaragua 1
PL - Polonia 1
TR - Turchia 1
TT - Trinidad e Tobago 1
UA - Ucraina 1
UY - Uruguay 1
ZA - Sudafrica 1
Totale 714
Città #
Singapore 44
Moscow 29
Naples 20
Shanghai 11
Falkenstein 6
Santa Clara 6
São Paulo 4
Ashburn 3
Brasília 3
Dublin 3
Helsinki 3
Albinea 2
Aversa 2
Beijing 2
Conversano 2
Gandhinagar 2
Innopolis 2
Nuremberg 2
Ribeirão Preto 2
Rosh Ha‘Ayin 2
St Petersburg 2
Triggiano 2
Turin 2
Vienna 2
Addis Ababa 1
Almirante Tamandaré 1
Alto Verê 1
Ananindeua 1
Araras 1
Athy 1
Belo Horizonte 1
Belo Jardim 1
Blumenau 1
Boston 1
Béziers 1
Cachoeira do Sul 1
Camaquã 1
Caruaru 1
Castro 1
Chaguanas 1
Charlotte 1
Chattanooga 1
Chennai 1
Ciudad López Mateos 1
Concórdia 1
Delray Beach 1
Erbil 1
Fresno 1
Goiânia 1
Hlobyne 1
Hong Kong 1
Honolulu 1
Ilhabela 1
Istanbul 1
Itapema 1
Jaú 1
Khagaria 1
London 1
Los Angeles 1
Managua 1
Maricá 1
Montevideo 1
Mosul 1
New Delhi 1
Nova Viçosa 1
Nowon-gu 1
Palermo 1
Paranavaí 1
Phoenix 1
Pindamonhangaba 1
Planalto 1
Porto Alegre 1
Quito 1
Rio Verde 1
Roccadaspide 1
Santiago 1
São Gonçalo 1
São José do Rio Preto 1
São José dos Pinhais 1
São João Nepomuceno 1
São Sebastião 1
The Dalles 1
Torres 1
Uberlândia 1
Ubá 1
Viseu 1
Warsaw 1
Totale 221
Nome #
Automated Threat Modeling Approaches: Comparison of Open Source Tools 45
Security in IoT pairing & authentication protocols, a threat model and a case study analysis 45
A Semantic Methodology for Security Controls Verification in Public Administration Business Processes 43
Systematic Threat Modelling of High-Performance Computing Systems: The V:HPCCRI Case Study 42
Threat Modeling of Edge-Based IoT Applications 42
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis 40
Attacking a packet Analyzer: Caronte case study 39
Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems 39
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach 38
Automated threat modelling and risk analysis in e-Government using BPMN 38
Risk Analysis Automation Process in IT Security for Cloud Applications 37
ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems 36
Advancing ESSecA: a step forward in Automated Penetration Testing 36
A methodology for vulnerability assessment and threat modelling of an e-voting platform based on Ethereum blockchain 35
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study 34
MetaSEnD: A Security Enabled Development Life Cycle Meta-Model 33
Navigating IoT Complexity: Developing Datasets for Smart-Home Device Interactions 32
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 31
Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security 30
Systematic analysis of automated threat modelling techniques: Comparison of open-source tools 30
Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing 27
Totale 772
Categoria #
all - tutte 2.649
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 2.649


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2024/2025772 0 0 0 133 18 81 203 201 64 17 21 34
Totale 772