SISTO, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 34.786
EU - Europa 18.227
AS - Asia 6.357
SA - Sud America 600
AF - Africa 149
OC - Oceania 21
Continente sconosciuto - Info sul continente non disponibili 16
Totale 60.156
Nazione #
US - Stati Uniti d'America 34.565
IT - Italia 4.318
DE - Germania 3.611
GB - Regno Unito 3.337
FR - Francia 3.269
SG - Singapore 2.304
CN - Cina 2.213
UA - Ucraina 803
RU - Federazione Russa 550
BR - Brasile 515
IE - Irlanda 443
TR - Turchia 435
KR - Corea 415
NL - Olanda 372
SE - Svezia 278
FI - Finlandia 218
BE - Belgio 211
AT - Austria 203
CH - Svizzera 189
CA - Canada 187
HK - Hong Kong 182
IN - India 175
VN - Vietnam 92
ID - Indonesia 86
JP - Giappone 84
MY - Malesia 69
IL - Israele 68
GR - Grecia 56
PL - Polonia 49
ES - Italia 45
JO - Giordania 38
ZA - Sudafrica 38
IR - Iran 35
UZ - Uzbekistan 35
TW - Taiwan 33
SN - Senegal 31
PK - Pakistan 30
RO - Romania 30
AP - ???statistics.table.value.countryCode.AP??? 29
AR - Argentina 26
EU - Europa 26
DK - Danimarca 25
CZ - Repubblica Ceca 24
CL - Cile 21
EG - Egitto 21
EE - Estonia 18
BD - Bangladesh 16
AU - Australia 15
BG - Bulgaria 15
DZ - Algeria 14
PT - Portogallo 13
CO - Colombia 12
IQ - Iraq 12
LT - Lituania 12
MX - Messico 12
MA - Marocco 11
TH - Thailandia 11
BY - Bielorussia 10
GH - Ghana 10
SA - Arabia Saudita 10
HR - Croazia 9
LU - Lussemburgo 9
PH - Filippine 9
KZ - Kazakistan 8
EC - Ecuador 7
KW - Kuwait 7
PE - Perù 7
CI - Costa d'Avorio 6
KE - Kenya 6
NO - Norvegia 6
NZ - Nuova Zelanda 6
AE - Emirati Arabi Uniti 5
GE - Georgia 5
HU - Ungheria 5
KG - Kirghizistan 5
PA - Panama 4
PY - Paraguay 4
VE - Venezuela 4
AL - Albania 3
BA - Bosnia-Erzegovina 3
JM - Giamaica 3
LV - Lettonia 3
ML - Mali 3
NP - Nepal 3
OM - Oman 3
QA - Qatar 3
SI - Slovenia 3
TT - Trinidad e Tobago 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AZ - Azerbaigian 2
BO - Bolivia 2
DO - Repubblica Dominicana 2
HN - Honduras 2
LC - Santa Lucia 2
MD - Moldavia 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
TN - Tunisia 2
UY - Uruguay 2
BB - Barbados 1
Totale 60.140
Città #
Ashburn 12.788
Boardman 6.397
Southend 2.868
Seattle 1.817
Fairfield 1.363
Turin 1.120
Fremont 1.095
Singapore 1.033
Chandler 983
Ann Arbor 807
Woodbridge 789
Houston 578
Cambridge 512
Wilmington 476
Dallas 467
Princeton 440
Torino 437
Dublin 423
Jacksonville 389
Beijing 383
Santa Clara 379
Milan 303
Berlin 269
Buffalo 266
San Ramon 254
Des Moines 242
Chicago 228
Izmir 215
Brussels 191
Council Bluffs 188
Helsinki 183
San Francisco 176
Shanghai 165
Bern 161
Tongling 151
Guangzhou 149
San Donato Milanese 144
Istanbul 136
Vienna 130
Seoul 124
Zhengzhou 123
Saint Petersburg 116
Amsterdam 103
Hong Kong 103
Baltimore 99
Wuhan 97
San Jose 96
Frankfurt 93
Pennsylvania Furnace 93
Toronto 92
Bologna 90
Overberg 90
Rome 89
Lecce 88
Zaporozhye 83
Jakarta 77
Los Angeles 75
Monopoli 72
Hefei 68
Mountain View 58
Norwalk 56
San Diego 56
Moscow 55
Nuremberg 54
London 52
Padua 51
Hangzhou 48
Shenzhen 48
Athens 47
Herkenbosch 47
Las Vegas 46
Munich 44
Nanjing 44
Kwai Chung 43
Redwood City 43
Frankfurt am Main 42
Malatya 40
Jerusalem 39
University Park 38
New York 37
Overland Park 37
Paris 34
São Paulo 34
Columbus 32
Naples 29
Tokyo 29
Falls Church 28
Osaka 28
Cupertino 27
Phoenix 27
Andover 26
Yubileyny 25
Bangalore 24
Austin 23
Hanoi 23
Muizenberg 23
Putian 23
Washington 23
Melun 22
Ottawa 22
Totale 42.493
Nome #
Formally based semi-automatic implementation of an open security protocol 752
Formal Verification of Security Protocol Implementations: A Survey 729
Automated Formal Verification of Application-specific Security Properties 728
Exploiting Symmetries for Testing Equivalence in the Spi Calculus 727
An Efficient Data Exchange Algorithm for Chained Network Functions 726
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study 721
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection 714
Formal verification of Virtual Network Function graphs in an SP-DevOps context 705
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis 698
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs 691
SPAF: Stateless FSA-Based Packet Filters 690
A new knowledge representation strategy for cryptographic protocol analysis 689
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code 668
A LOTOS Extension for the Performance Analysis of Distributed Systems 644
Integrating Performance Analysis in the Context of LOTOS-Based Design 642
The JavaSPI Framework for Security Protocol Implementation 641
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking 641
Visual Model-Driven Design, Verification and Implementation of Security Protocols 636
An approach to refinement checking of SysML requirements 631
Provably correct Java implementations of Spi Calculus security protocols specifications 630
Formal Verification of LTE-UMTS Handover Procedures 629
Automatic Configuration of Opaque Network Functions in CMS 627
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access 623
dSPIN: A Dynamic Extension of SPIN 618
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation 598
Using SPIN to Verify Security Properties of Cryptographic Protocols 595
Using Garbage Collection in Model Checking 595
An Overview of Software-based Support Tools for ISO 26262 582
PIT Overload Analysis in Content Centric Networks 572
Distributed-Memory Model Checking with SPIN 571
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols 569
A Deadlock Detection Tool for Concurrent Java Programs 567
On the Implementation of an Interface for a Multichannel Local Area Network 567
Resource Management Policies for Cloud-based Interactive 3D Applications 563
Safe abstractions of data encodings in formal security protocol models 556
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems 554
An Experience in Embedded Control Software Verification 551
A Formal Model of Network Policy Analysis 548
Vehicle Navigation Service Based on Real-Time Traffic Information 546
Parallel CRC Generation 544
Tools for cryptographic protocols analysis: A technical and experimental comparison 541
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study 538
Efficient Representation of the Attacker's Knowledge in Cryptographic Protocols Analysis 537
Vulnerability Modelling for the Analysis of Network Attacks 532
Detecting Chains of Vulnerabilities in Industrial Networks 530
A formal approach for network security policy validation 525
On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols 525
Using Data Flow Analysis to Infer Type Information in Java Bytecode 520
iNFAnt: NFA pattern matching on GPGPU devices 520
Using Binary Decision Diagrams for Representation and Analysis of Communication Protocols 513
A Java-based Formal Development Environment for Factory Communication Systems 508
Adaptive Bandwidth Balancing Mechanisms for DQDB Networks 508
A Protocol for Multirendezvous of LOTOS Processes 505
Spi2Java: automatic cryptographic protocol java code generation from spi calculus 504
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models 504
A Grid-Powered Framework to Support Courses on Distributed Programming 497
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture 496
Derivation of Executable Code from Formal Protocol Specifications Written in LOTOS 495
Rapid Prototyping of Protocols from LOTOS Specifications 493
Formal verification of LTE-UMTS and LTE–LTE handover procedures 491
Automated Formal Methods for Security Protocol Engineering 489
A Graphical Tool for Protocol Design with Estelle 485
Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models 484
A Lightweight Security Analyzer inside GCC 484
Seamless configuration of virtual network functions in data center provider networks 477
The use of Estelle to specify manufacturing systems 475
Temporal Logic Properties of Java Objects 473
Integration of Time Petri Nets and TE-LOTOS in the Design and Evaluation of Factory Communication Systems 472
Improving the Security of Industrial Networks by means of Formal Verification 471
An Abstract Execution Model for Basic LOTOS 463
Exploiting symmetries for testing equivalence verification in the SPI calculus 462
JavaSPI: A Framework for Security Protocol Implementation 461
DynNav: Toward Open and Interoperable Navigation Services 459
Formal Specification and Verification of the Real-time Scheduler in FIP 457
Temporal Logic Properties of Java Objects 452
Push applications and dynamic content generation over content-centric networking 447
Implementation of Static Semantic Analysis of LOTOS Specifications 441
A LOTOS Specification of the SERCOS Field-bus Protocol 438
Formally sound implementations of security protocols with JavaSPI 429
An efficient data exchange mechanism for chained network functions 424
A Temporal and Probabilistic LOTOS Extension Oriented to Performance Modelling of Distributed Systems 409
Applicability of Formal Methods for Safety-Critical Systems in the Context of ISO 26262 401
A framework for user-friendly verification-oriented VNF modeling 390
A Configurable Mobile Agent Data Protection Protocol 387
Throughput Analysis of Timed Token Protocols in Double Ring Networks 384
Wireless for the factory: The Wi-Fact analysis 359
Combining SysML modelling with refinement checking in Eclipse 357
Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software 357
A Formalization Of The FIP Protocol Using Estelle 356
A State-Exploration Technique for Spi-Calculus Testing-Equivalence Verification 353
Esercizi di Fondamenti di Informatica 353
SCARAB: Innovative Services Supporting User and Terminal Mobility 345
Modeling and Validation of Java Multi-threading applications using Spin 341
SRB Data Grid and Compute Grid integration via the EnginFrame Grid Portal 337
Automatic testing equivalence verification of spi calculus specifications 334
Comparison of Adaptive Fairness Control Mechanisms for DQDBMetropolitan Area Networks 334
A Static Semantic Analyzer for LOTOS Specifications 334
Static Analysis of Java Mutithreaded and Distributed Applications 322
Probabilistic Characterization of Algebraic Protocol Specifications 315
Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behaviour Expressions 310
Totale 51.881
Categoria #
all - tutte 132.703
article - articoli 48.773
book - libri 803
conference - conferenze 80.519
curatela - curatele 0
other - altro 0
patent - brevetti 1.026
selected - selezionate 0
volume - volumi 1.582
Totale 265.406


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.349 0 0 197 309 238 326 211 288 153 293 205 129
2021/20222.219 128 192 70 131 111 171 181 85 148 175 365 462
2022/20233.363 281 499 134 300 342 420 398 158 304 69 186 272
2023/20241.694 72 286 202 91 152 97 108 130 79 58 141 278
2024/20256.441 146 639 289 709 329 353 470 694 854 412 575 971
2025/20262.171 745 559 867 0 0 0 0 0 0 0 0 0
Totale 60.800