SISTO, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 8.964
EU - Europa 6.994
AS - Asia 3.924
AF - Africa 241
SA - Sud America 108
OC - Oceania 60
Continente sconosciuto - Info sul continente non disponibili 3
Totale 20.294
Nazione #
US - Stati Uniti d'America 8.755
IT - Italia 2.160
CN - Cina 1.878
DE - Germania 1.549
FR - Francia 807
GB - Regno Unito 589
IN - India 562
JP - Giappone 360
RU - Federazione Russa 295
KR - Corea 272
IE - Irlanda 250
UA - Ucraina 228
CA - Canada 180
NL - Olanda 177
IR - Iran 166
VN - Vietnam 139
EU - Europa 123
SE - Svezia 104
TW - Taiwan 95
CZ - Repubblica Ceca 81
DZ - Algeria 76
BR - Brasile 72
ES - Italia 71
GR - Grecia 69
PK - Pakistan 69
SG - Singapore 65
AT - Austria 59
PL - Polonia 54
AU - Australia 51
RO - Romania 51
CH - Svizzera 50
HK - Hong Kong 43
TR - Turchia 43
BE - Belgio 39
ZA - Sudafrica 37
ID - Indonesia 36
TN - Tunisia 36
FI - Finlandia 28
SA - Arabia Saudita 28
IL - Israele 27
UZ - Uzbekistan 25
AP - ???statistics.table.value.countryCode.AP??? 24
PT - Portogallo 22
AL - Albania 21
EG - Egitto 21
MY - Malesia 21
NG - Nigeria 19
BG - Bulgaria 17
MX - Messico 16
TH - Thailandia 16
AE - Emirati Arabi Uniti 15
DK - Danimarca 15
ET - Etiopia 15
SI - Slovenia 15
LT - Lituania 13
PH - Filippine 13
BD - Bangladesh 12
CL - Cile 12
AR - Argentina 11
NO - Norvegia 11
HU - Ungheria 10
JO - Giordania 10
SD - Sudan 10
HR - Croazia 9
NZ - Nuova Zelanda 9
RS - Serbia 8
SK - Slovacchia (Repubblica Slovacca) 8
KE - Kenya 7
LU - Lussemburgo 7
CU - Cuba 6
JM - Giamaica 6
MK - Macedonia 6
QA - Qatar 6
VE - Venezuela 6
BY - Bielorussia 5
PS - Palestinian Territory 5
SY - Repubblica araba siriana 5
BW - Botswana 4
CO - Colombia 4
KZ - Kazakistan 4
MA - Marocco 4
TZ - Tanzania 4
KW - Kuwait 3
LV - Lettonia 3
MO - Macao, regione amministrativa speciale della Cina 3
MU - Mauritius 3
BA - Bosnia-Erzegovina 2
CY - Cipro 2
EC - Ecuador 2
IM - Isola di Man 2
KG - Kirghizistan 2
KH - Cambogia 2
LB - Libano 2
LY - Libia 2
MM - Myanmar 2
MT - Malta 2
SC - Seychelles 2
AM - Armenia 1
BT - Bhutan 1
BZ - Belize 1
Totale 20.288
Città #
Boardman 3.086
Beijing 717
Turin 673
Ashburn 631
Fairfield 499
Seattle 452
Houston 395
Hangzhou 377
Dublin 234
Mountain View 234
Woodbridge 220
Ann Arbor 215
Torino 212
Shenzhen 209
Höst 201
Buffalo 194
Cambridge 175
Southend 161
Wilmington 149
Santa Cruz 144
Bangalore 107
Southampton 104
Hanoi 99
University Park 89
Clarks Summit 86
San Jose 86
Seoul 82
Wuhan 78
Conroe 70
San Ramon 70
Milan 68
Chicago 66
Tokyo 65
Regensburg 63
Nanjing 61
Bengaluru 54
Los Angeles 54
Paris 53
Kansas City 51
Shanghai 51
Athens 50
Norwalk 49
San Diego 47
Ingolstadt 46
Toronto 46
Frankfurt 44
Moscow 44
Zhengzhou 42
Montréal 41
Miami 40
Munich 40
Dallas 38
Chennai 37
Hefei 37
San Donato Milanese 37
Taipei 37
Mumbai 35
Overberg 34
Pune 33
Tianjin 33
Guangzhou 32
London 32
Rome 32
Las Vegas 31
Padova 31
Singapore 31
New York 29
Tehran 29
Charlottesville 28
Fremont 28
Lake Forest 27
Phoenix 27
Dong Ket 26
Oran 26
Amsterdam 25
Kiev 25
Madrid 25
New Delhi 25
Nürnberg 25
Hartford 23
Hyderabad 23
Vienna 23
Scottsdale 22
Valdagno 22
Düsseldorf 21
Jakarta 21
Lviv 21
Ottawa 21
Chongqing 20
Herkenbosch 20
Muizenberg 20
Bremen 19
Genova 19
Istanbul 19
Batavia 18
Changsha 18
Oxford 18
Pisa 18
Berlin 17
Narzole 17
Totale 12.399
Nome #
An Overview of Software-based Support Tools for ISO 26262, file e384c42e-104b-d4b2-e053-9f05fe0a1d67 2.500
Formal Verification of Security Protocol Implementations: A Survey, file e384c42e-212f-d4b2-e053-9f05fe0a1d67 1.653
Formally based semi-automatic implementation of an open security protocol, file e384c42e-1092-d4b2-e053-9f05fe0a1d67 929
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access, file e384c42e-12a1-d4b2-e053-9f05fe0a1d67 862
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection, file e384c42e-1f24-d4b2-e053-9f05fe0a1d67 789
iNFAnt: NFA pattern matching on GPGPU devices, file e384c42e-1701-d4b2-e053-9f05fe0a1d67 781
Spi2Java: automatic cryptographic protocol java code generation from spi calculus, file e384c42d-fa67-d4b2-e053-9f05fe0a1d67 762
Automatic Configuration of Opaque Network Functions in CMS, file e384c42e-2f99-d4b2-e053-9f05fe0a1d67 615
An Efficient Data Exchange Algorithm for Chained Network Functions, file e384c42e-303f-d4b2-e053-9f05fe0a1d67 599
Formal Verification of LTE-UMTS Handover Procedures, file e384c42e-bb58-d4b2-e053-9f05fe0a1d67 569
A LOTOS Extension for the Performance Analysis of Distributed Systems, file e384c42d-fb01-d4b2-e053-9f05fe0a1d67 566
Visual Model-Driven Design, Verification and Implementation of Security Protocols, file e384c42e-2501-d4b2-e053-9f05fe0a1d67 565
Safe abstractions of data encodings in formal security protocol models, file e384c42e-2503-d4b2-e053-9f05fe0a1d67 551
The JavaSPI Framework for Security Protocol Implementation, file e384c42e-0faa-d4b2-e053-9f05fe0a1d67 546
Vehicle Navigation Service Based on Real-Time Traffic Information, file e384c42e-1f28-d4b2-e053-9f05fe0a1d67 531
Formal verification of Virtual Network Function graphs in an SP-DevOps context, file e384c42e-b44d-d4b2-e053-9f05fe0a1d67 528
SPAF: Stateless FSA-Based Packet Filters, file e384c42e-0e07-d4b2-e053-9f05fe0a1d67 514
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs, file e384c42e-3906-d4b2-e053-9f05fe0a1d67 492
PIT Overload Analysis in Content Centric Networks, file e384c42e-2e3f-d4b2-e053-9f05fe0a1d67 482
Integrating Performance Analysis in the Context of LOTOS-Based Design, file e384c42d-f46e-d4b2-e053-9f05fe0a1d67 464
An approach to refinement checking of SysML requirements, file e384c42e-1346-d4b2-e053-9f05fe0a1d67 463
Provably correct Java implementations of Spi Calculus security protocols specifications, file e384c42e-055e-d4b2-e053-9f05fe0a1d67 410
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation, file e384c42d-faf5-d4b2-e053-9f05fe0a1d67 347
Resource Management Policies for Cloud-based Interactive 3D Applications, file e384c42e-2e3c-d4b2-e053-9f05fe0a1d67 341
DynNav: Toward Open and Interoperable Navigation Services, file e384c42e-3b30-d4b2-e053-9f05fe0a1d67 339
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking, file e384c42e-bc77-d4b2-e053-9f05fe0a1d67 323
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code, file e384c42e-01c3-d4b2-e053-9f05fe0a1d67 316
Multipoint passive monitoring in packet networks, file e384c431-50d9-d4b2-e053-9f05fe0a1d67 247
Formally sound implementations of security protocols with JavaSPI, file e384c42f-e32d-d4b2-e053-9f05fe0a1d67 239
Formal verification of LTE-UMTS and LTE–LTE handover procedures, file e384c42f-7b42-d4b2-e053-9f05fe0a1d67 225
Seamless configuration of virtual network functions in data center provider networks, file e384c42f-9d82-d4b2-e053-9f05fe0a1d67 224
An efficient data exchange mechanism for chained network functions, file e384c42f-e53a-d4b2-e053-9f05fe0a1d67 156
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c431-fe5f-d4b2-e053-9f05fe0a1d67 152
Improving the formal verification of reachability policies in virtualized networks, file e384c432-e938-d4b2-e053-9f05fe0a1d67 124
Securing SOME/IP for In-Vehicle Service Protection, file e384c432-78c9-d4b2-e053-9f05fe0a1d67 122
Towards a fully automated and optimized network security functions orchestration, file e384c431-7705-d4b2-e053-9f05fe0a1d67 120
Automated firewall configuration in virtual networks, file e384c434-95d9-d4b2-e053-9f05fe0a1d67 119
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-a0a6-d4b2-e053-9f05fe0a1d67 89
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-7c62-d4b2-e053-9f05fe0a1d67 77
A novel approach for security function graph configuration and deployment, file e384c433-d411-d4b2-e053-9f05fe0a1d67 75
A VNF modeling approach for verification purposes, file e384c431-5af7-d4b2-e053-9f05fe0a1d67 74
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb6-d4b2-e053-9f05fe0a1d67 73
A Framework for Verification-Oriented User-Friendly Network Function Modeling, file e384c430-f5fb-d4b2-e053-9f05fe0a1d67 67
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-a0ab-d4b2-e053-9f05fe0a1d67 60
(User-friendly) formal requirements verification in the context of ISO26262, file e384c432-1da9-d4b2-e053-9f05fe0a1d67 55
Detecting Injection Attacks on Cooperative Adaptive Cruise Control, file e384c431-7bda-d4b2-e053-9f05fe0a1d67 50
A Formal Model of Network Policy Analysis, file e384c432-d63e-d4b2-e053-9f05fe0a1d67 42
Security Automation using Traffic Flow Modeling, file 71db8946-473b-49ed-997a-b3eb9b1e8b6b 39
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems, file e384c432-7caf-d4b2-e053-9f05fe0a1d67 34
Virtual Network Embedding with Formal Reachability Assurance, file e384c431-4579-d4b2-e053-9f05fe0a1d67 33
Multi-Objective Function Splitting and Placement of Network Slices in 5G Mobile Networks, file e384c431-46d1-d4b2-e053-9f05fe0a1d67 33
Performance measurements of QUIC communications, file e384c431-aea2-d4b2-e053-9f05fe0a1d67 26
Formally specifying and checking policies and anomalies in service function chaining, file e384c432-d388-d4b2-e053-9f05fe0a1d67 17
Formally verified latency-aware VNF placement in industrial Internet of things, file e384c431-6c14-d4b2-e053-9f05fe0a1d67 13
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-6712-d4b2-e053-9f05fe0a1d67 13
Detecting Injection Attacks on Cooperative Adaptive Cruise Control, file e384c431-7e7b-d4b2-e053-9f05fe0a1d67 10
Towards a fully automated and optimized network security functions orchestration, file e384c431-66b0-d4b2-e053-9f05fe0a1d67 9
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols, file f4a950d3-95fb-4a78-bcd8-a38866e61998 8
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking, file e384c42e-b44c-d4b2-e053-9f05fe0a1d67 7
Improving the formal verification of reachability policies in virtualized networks, file e384c433-0c82-d4b2-e053-9f05fe0a1d67 6
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-d4a1-d4b2-e053-9f05fe0a1d67 6
Multipoint passive monitoring in packet networks, file e384c431-742a-d4b2-e053-9f05fe0a1d67 5
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-c349-d4b2-e053-9f05fe0a1d67 5
Automation for network security configuration: state of the art and research trends, file 33c319e2-99b7-40f8-bbad-b50a295cbc7f 4
Detecting Chains of Vulnerabilities in Industrial Networks, file e384c42e-03f4-d4b2-e053-9f05fe0a1d67 4
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs, file e384c42f-0a6b-d4b2-e053-9f05fe0a1d67 4
Seamless configuration of virtual network functions in data center provider networks, file e384c430-1fc8-d4b2-e053-9f05fe0a1d67 4
An efficient data exchange mechanism for chained network functions, file e384c430-2134-d4b2-e053-9f05fe0a1d67 4
Formally specifying and checking policies and anomalies in service function chaining, file e384c431-849e-d4b2-e053-9f05fe0a1d67 4
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c432-5f61-d4b2-e053-9f05fe0a1d67 4
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-af52-d4b2-e053-9f05fe0a1d67 4
A Formal Model of Network Policy Analysis, file e384c432-d37e-d4b2-e053-9f05fe0a1d67 4
Automation for network security configuration: state of the art and research trends, file 560c63c5-0b9a-4cee-883f-7d62f2511edf 3
iNFAnt: NFA pattern matching on GPGPU devices, file e384c42e-16ad-d4b2-e053-9f05fe0a1d67 3
Formal verification of LTE-UMTS and LTE–LTE handover procedures, file e384c42f-7b43-d4b2-e053-9f05fe0a1d67 3
Formally sound implementations of security protocols with JavaSPI, file e384c42f-de70-d4b2-e053-9f05fe0a1d67 3
Performance measurements of QUIC communications, file e384c431-83ff-d4b2-e053-9f05fe0a1d67 3
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-3478-d4b2-e053-9f05fe0a1d67 3
Towards Security Automation in Virtual Networks, file 140de8ab-b9de-4edf-af0c-510d5cc9c17e 2
Formal verification of the FDO protocol, file 1db6e18d-c75a-461b-ac49-19169c0b6ba8 2
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file c4e8d61a-4ce5-480d-9769-d16f0409c4bd 2
Security Automation using Traffic Flow Modeling, file d63aa0d2-dd2e-4f3f-a5f9-8099f9a2a660 2
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb5-d4b2-e053-9f05fe0a1d67 2
Securing SOME/IP for In-Vehicle Service Protection, file e384c433-f2a8-d4b2-e053-9f05fe0a1d67 2
Detecting Chains of Vulnerabilities in Industrial Networks, file fa495c18-24ec-4adb-9adf-8c873508ed3b 2
Spi2Java: automatic cryptographic protocol java code generation from spi calculus, file 1026d7c6-7527-4e34-9baf-80be22a5c9c3 1
A new knowledge representation strategy for cryptographic protocol analysis, file 19390f17-6b7a-4087-a294-e38f223d7003 1
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 4ea0c5d6-2c43-41c3-b9b5-40f32ea58b09 1
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study, file 654bb606-67db-4e42-a3a7-e26e5dc29e34 1
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis, file 66ad65ad-5aea-4202-96fe-9d21bbc74987 1
Security automation for multi-cluster orchestration in Kubernetes, file 72d96cb6-eb18-48cd-a631-5238e4934df7 1
Exploiting Symmetries for Testing Equivalence in the Spi Calculus, file 7525785e-c702-4b09-9edd-5d8c645d452e 1
Towards Security Automation in Virtual Networks, file 7fc94ed1-0c9a-4df5-8c00-48444b10f4de 1
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 80477350-e367-4c3f-b3f2-51e77f69d37e 1
A novel abstraction for security configuration in virtual networks, file 858f6a8f-8e1f-4122-835b-8c12c83a509d 1
Security automation for multi-cluster orchestration in Kubernetes, file 984ea291-b990-4127-9bb1-a2af5dc6d946 1
Automating the configuration of firewalls and channel protection systems in virtual networks, file 9db1cd12-b012-4824-8020-6d08036b1a67 1
A Configurable Mobile Agent Data Protection Protocol, file ae141864-cad8-4d34-8a35-0396a1cb0cf7 1
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file b0a926fc-d210-4d66-b239-d0e29014727e 1
Automating the configuration of firewalls and channel protection systems in virtual networks, file d2bac964-c7fd-4116-903f-fb08117d736c 1
Totale 20.574
Categoria #
all - tutte 34.945
article - articoli 14.504
book - libri 0
conference - conferenze 20.433
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 8
Totale 69.890


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019486 0 0 0 0 0 0 0 0 0 124 192 170
2019/20201.434 106 74 74 131 182 148 142 217 153 53 84 70
2020/20211.410 108 158 97 110 141 95 104 128 106 137 118 108
2021/20221.745 69 87 93 307 253 148 223 96 70 108 203 88
2022/20231.137 94 93 223 103 81 114 98 93 109 57 71 1
2023/202464 2 13 17 9 4 4 0 12 1 2 0 0
Totale 20.582