SISTO, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 32.039
EU - Europa 17.105
AS - Asia 2.437
AF - Africa 101
SA - Sud America 47
OC - Oceania 16
Continente sconosciuto - Info sul continente non disponibili 15
Totale 51.760
Nazione #
US - Stati Uniti d'America 31.878
IT - Italia 3.921
DE - Germania 3.457
GB - Regno Unito 3.283
FR - Francia 3.183
CN - Cina 1.153
UA - Ucraina 792
IE - Irlanda 432
RU - Federazione Russa 407
NL - Olanda 345
TR - Turchia 290
SE - Svezia 271
SG - Singapore 248
KR - Corea 201
CH - Svizzera 183
FI - Finlandia 183
BE - Belgio 174
CA - Canada 155
IN - India 140
AT - Austria 122
HK - Hong Kong 82
MY - Malesia 64
JP - Giappone 63
GR - Grecia 50
JO - Giordania 37
PL - Polonia 34
TW - Taiwan 33
SN - Senegal 31
IR - Iran 30
RO - Romania 30
AP - ???statistics.table.value.countryCode.AP??? 29
ES - Italia 28
UZ - Uzbekistan 28
ZA - Sudafrica 28
EU - Europa 26
DK - Danimarca 24
CZ - Repubblica Ceca 23
VN - Vietnam 23
CL - Cile 19
EE - Estonia 18
PK - Pakistan 18
IL - Israele 17
BR - Brasile 16
BG - Bulgaria 13
AU - Australia 11
DZ - Algeria 10
EG - Egitto 10
GH - Ghana 10
HR - Croazia 9
ID - Indonesia 9
LU - Lussemburgo 9
TH - Thailandia 9
SA - Arabia Saudita 8
AR - Argentina 7
PT - Portogallo 7
BY - Bielorussia 6
GE - Georgia 5
KW - Kuwait 5
NZ - Nuova Zelanda 5
CO - Colombia 4
KZ - Kazakistan 4
MA - Marocco 4
NO - Norvegia 4
CI - Costa d'Avorio 3
HU - Ungheria 3
LT - Lituania 3
MX - Messico 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AL - Albania 2
BD - Bangladesh 2
LC - Santa Lucia 2
LV - Lettonia 2
MD - Moldavia 2
PH - Filippine 2
QA - Qatar 2
SI - Slovenia 2
SK - Slovacchia (Repubblica Slovacca) 2
AE - Emirati Arabi Uniti 1
GT - Guatemala 1
KE - Kenya 1
LY - Libia 1
MT - Malta 1
NG - Nigeria 1
OM - Oman 1
PE - Perù 1
TN - Tunisia 1
ZW - Zimbabwe 1
Totale 51.760
Città #
Ashburn 12.480
Boardman 6.241
Southend 2.868
Seattle 1.816
Fairfield 1.363
Fremont 1.095
Chandler 983
Turin 896
Ann Arbor 807
Woodbridge 789
Houston 578
Cambridge 512
Wilmington 476
Princeton 440
Torino 437
Dublin 415
Jacksonville 389
Berlin 267
Milan 260
San Ramon 254
Beijing 252
Des Moines 241
Chicago 224
Izmir 215
Buffalo 214
Helsinki 169
San Francisco 168
Bern 161
Council Bluffs 155
Brussels 154
Shanghai 147
San Donato Milanese 144
Guangzhou 141
Singapore 129
Saint Petersburg 116
Zhengzhou 116
Vienna 113
Baltimore 99
San Jose 95
Wuhan 95
Frankfurt 93
Pennsylvania Furnace 93
Overberg 90
Bologna 89
Lecce 86
Amsterdam 85
Zaporozhye 83
Toronto 79
Monopoli 72
Rome 72
Mountain View 58
Norwalk 56
San Diego 56
Seoul 51
Padua 50
Moscow 49
Hangzhou 47
Herkenbosch 47
Athens 44
Kwai Chung 43
Redwood City 43
Shenzhen 43
Malatya 40
Las Vegas 39
London 38
Nanjing 38
University Park 38
Overland Park 37
Paris 32
Falls Church 28
Osaka 28
Cupertino 27
Andover 26
Dallas 26
Bangalore 24
Austin 23
Muizenberg 23
Los Angeles 22
Melun 22
Phoenix 22
Putian 22
Clearwater 21
Naples 21
Washington 21
Bremen 20
Imola 20
Columbus 19
Shaoxing 19
Frankfurt Am Main 18
Fuzhou 18
Indiana 18
Kansas City 18
Padova 18
Kiev 17
Ottawa 17
Phaltan 17
Piscataway 17
Sakarya 17
Taipei 17
Venaria Reale 17
Totale 38.848
Nome #
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study 687
Formally based semi-automatic implementation of an open security protocol 686
Exploiting Symmetries for Testing Equivalence in the Spi Calculus 684
Automated Formal Verification of Application-specific Security Properties 672
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis 661
A new knowledge representation strategy for cryptographic protocol analysis 661
An Efficient Data Exchange Algorithm for Chained Network Functions 655
Formal Verification of Security Protocol Implementations: A Survey 642
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection 628
SPAF: Stateless FSA-Based Packet Filters 622
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs 619
Formal verification of Virtual Network Function graphs in an SP-DevOps context 615
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code 606
A LOTOS Extension for the Performance Analysis of Distributed Systems 598
Integrating Performance Analysis in the Context of LOTOS-Based Design 591
An approach to refinement checking of SysML requirements 578
The JavaSPI Framework for Security Protocol Implementation 574
dSPIN: A Dynamic Extension of SPIN 567
Visual Model-Driven Design, Verification and Implementation of Security Protocols 565
Provably correct Java implementations of Spi Calculus security protocols specifications 563
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking 562
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access 559
Using Garbage Collection in Model Checking 556
Automatic Configuration of Opaque Network Functions in CMS 551
Using SPIN to Verify Security Properties of Cryptographic Protocols 548
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation 546
Formal Verification of LTE-UMTS Handover Procedures 543
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols 533
On the Implementation of an Interface for a Multichannel Local Area Network 532
Distributed-Memory Model Checking with SPIN 530
An Overview of Software-based Support Tools for ISO 26262 522
A Deadlock Detection Tool for Concurrent Java Programs 520
An Experience in Embedded Control Software Verification 509
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems 508
Parallel CRC Generation 507
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study 505
Tools for cryptographic protocols analysis: A technical and experimental comparison 500
Resource Management Policies for Cloud-based Interactive 3D Applications 499
PIT Overload Analysis in Content Centric Networks 497
Safe abstractions of data encodings in formal security protocol models 492
A Formal Model of Network Policy Analysis 489
Efficient Representation of the Attacker's Knowledge in Cryptographic Protocols Analysis 486
Using Data Flow Analysis to Infer Type Information in Java Bytecode 484
Adaptive Bandwidth Balancing Mechanisms for DQDB Networks 480
Using Binary Decision Diagrams for Representation and Analysis of Communication Protocols 478
On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols 477
Detecting Chains of Vulnerabilities in Industrial Networks 477
Vulnerability Modelling for the Analysis of Network Attacks 476
A Protocol for Multirendezvous of LOTOS Processes 474
A Java-based Formal Development Environment for Factory Communication Systems 466
Rapid Prototyping of Protocols from LOTOS Specifications 463
Vehicle Navigation Service Based on Real-Time Traffic Information 463
Derivation of Executable Code from Formal Protocol Specifications Written in LOTOS 461
A formal approach for network security policy validation 457
A Grid-Powered Framework to Support Courses on Distributed Programming 456
iNFAnt: NFA pattern matching on GPGPU devices 456
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture 455
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models 454
A Lightweight Security Analyzer inside GCC 449
Automated Formal Methods for Security Protocol Engineering 448
A Graphical Tool for Protocol Design with Estelle 446
Temporal Logic Properties of Java Objects 444
Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models 444
Formal verification of LTE-UMTS and LTE–LTE handover procedures 442
Integration of Time Petri Nets and TE-LOTOS in the Design and Evaluation of Factory Communication Systems 441
The use of Estelle to specify manufacturing systems 441
An Abstract Execution Model for Basic LOTOS 435
Formal Specification and Verification of the Real-time Scheduler in FIP 431
Improving the Security of Industrial Networks by means of Formal Verification 425
Spi2Java: automatic cryptographic protocol java code generation from spi calculus 424
Temporal Logic Properties of Java Objects 423
Seamless configuration of virtual network functions in data center provider networks 421
Exploiting symmetries for testing equivalence verification in the SPI calculus 421
JavaSPI: A Framework for Security Protocol Implementation 418
A LOTOS Specification of the SERCOS Field-bus Protocol 411
Implementation of Static Semantic Analysis of LOTOS Specifications 411
DynNav: Toward Open and Interoperable Navigation Services 400
A Temporal and Probabilistic LOTOS Extension Oriented to Performance Modelling of Distributed Systems 379
Push applications and dynamic content generation over content-centric networking 374
Formally sound implementations of security protocols with JavaSPI 369
An efficient data exchange mechanism for chained network functions 365
A framework for user-friendly verification-oriented VNF modeling 344
Applicability of Formal Methods for Safety-Critical Systems in the Context of ISO 26262 343
A Configurable Mobile Agent Data Protection Protocol 340
Throughput Analysis of Timed Token Protocols in Double Ring Networks 336
A Formalization Of The FIP Protocol Using Estelle 330
A State-Exploration Technique for Spi-Calculus Testing-Equivalence Verification 327
Combining SysML modelling with refinement checking in Eclipse 324
Esercizi di Fondamenti di Informatica 323
Wireless for the factory: The Wi-Fact analysis 323
Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software 321
SCARAB: Innovative Services Supporting User and Terminal Mobility 317
Comparison of Adaptive Fairness Control Mechanisms for DQDBMetropolitan Area Networks 304
A Static Semantic Analyzer for LOTOS Specifications 303
SRB Data Grid and Compute Grid integration via the EnginFrame Grid Portal 299
Automatic testing equivalence verification of spi calculus specifications 297
Modeling and Validation of Java Multi-threading applications using Spin 294
Static Analysis of Java Mutithreaded and Distributed Applications 282
Probabilistic Characterization of Algebraic Protocol Specifications 280
Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behaviour Expressions 279
Totale 47.073
Categoria #
all - tutte 103.038
article - articoli 37.111
book - libri 646
conference - conferenze 63.446
curatela - curatele 0
other - altro 0
patent - brevetti 671
selected - selezionate 0
volume - volumi 1.164
Totale 206.076


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20204.672 452 278 250 562 549 498 441 523 586 214 201 118
2020/20213.079 331 399 197 309 238 326 211 288 153 293 205 129
2021/20222.219 128 192 70 131 111 171 181 85 148 175 365 462
2022/20233.363 281 499 134 300 342 420 398 158 304 69 186 272
2023/20241.694 72 286 202 91 152 97 108 130 79 58 141 278
2024/2025136 136 0 0 0 0 0 0 0 0 0 0 0
Totale 52.324