SISTO, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 37.394
EU - Europa 20.643
AS - Asia 13.283
SA - Sud America 886
AF - Africa 228
OC - Oceania 25
Continente sconosciuto - Info sul continente non disponibili 17
Totale 72.476
Nazione #
US - Stati Uniti d'America 37.102
IT - Italia 4.830
SG - Singapore 4.143
DE - Germania 3.705
FR - Francia 3.563
GB - Regno Unito 3.383
CN - Cina 2.849
VN - Vietnam 2.793
RU - Federazione Russa 1.543
HK - Hong Kong 1.056
UA - Ucraina 812
BR - Brasile 707
KR - Corea 579
NL - Olanda 498
IE - Irlanda 455
TR - Turchia 446
IN - India 382
SE - Svezia 286
FI - Finlandia 279
AT - Austria 218
CA - Canada 218
BE - Belgio 216
CH - Svizzera 193
PT - Portogallo 175
JP - Giappone 166
ID - Indonesia 106
TH - Thailandia 92
MY - Malesia 79
TW - Taiwan 78
PH - Filippine 77
IL - Israele 70
AR - Argentina 67
ES - Italia 61
GR - Grecia 59
PL - Polonia 58
BD - Bangladesh 56
IQ - Iraq 54
ZA - Sudafrica 54
UZ - Uzbekistan 48
JO - Giordania 47
PK - Pakistan 47
IR - Iran 36
SN - Senegal 36
RO - Romania 34
CL - Cile 33
MX - Messico 31
AP - ???statistics.table.value.countryCode.AP??? 29
CZ - Repubblica Ceca 27
EG - Egitto 27
SA - Arabia Saudita 27
EU - Europa 26
DK - Danimarca 25
DZ - Algeria 21
BG - Bulgaria 20
CO - Colombia 20
EE - Estonia 20
AU - Australia 19
EC - Ecuador 18
MA - Marocco 18
KE - Kenya 15
KZ - Kazakistan 15
TN - Tunisia 14
HU - Ungheria 13
LT - Lituania 13
BY - Bielorussia 12
HR - Croazia 12
NP - Nepal 12
VE - Venezuela 12
PE - Perù 11
AE - Emirati Arabi Uniti 10
GH - Ghana 10
AL - Albania 9
AZ - Azerbaigian 9
LU - Lussemburgo 9
KW - Kuwait 8
PA - Panama 8
PY - Paraguay 8
SI - Slovenia 8
CI - Costa d'Avorio 7
GE - Georgia 7
NO - Norvegia 7
CR - Costa Rica 6
ET - Etiopia 6
NZ - Nuova Zelanda 6
OM - Oman 6
UY - Uruguay 6
JM - Giamaica 5
KG - Kirghizistan 5
MT - Malta 5
BO - Bolivia 4
DO - Repubblica Dominicana 4
LV - Lettonia 4
MU - Mauritius 4
QA - Qatar 4
SY - Repubblica araba siriana 4
TT - Trinidad e Tobago 4
BA - Bosnia-Erzegovina 3
ML - Mali 3
NG - Nigeria 3
RS - Serbia 3
Totale 72.431
Città #
Ashburn 13.156
Boardman 6.401
Southend 2.868
Singapore 2.216
Seattle 1.819
Turin 1.370
Fairfield 1.363
Fremont 1.096
Chandler 983
Hong Kong 896
Ann Arbor 807
Woodbridge 789
Ho Chi Minh City 699
San Jose 674
Hanoi 658
Dallas 615
Houston 583
Cambridge 512
Wilmington 476
Beijing 466
Princeton 440
Torino 437
Dublin 433
Santa Clara 425
Jacksonville 389
Milan 364
Los Angeles 303
Buffalo 298
Berlin 271
Des Moines 254
San Ramon 254
Hefei 252
Moscow 241
Seoul 240
Chicago 234
Helsinki 231
Council Bluffs 228
Lauterbourg 226
Izmir 215
Brussels 192
San Francisco 179
Shanghai 169
New York 165
Lisbon 162
Bern 161
Tongling 151
Guangzhou 149
San Donato Milanese 144
Vienna 138
Istanbul 137
Zhengzhou 123
Amsterdam 121
Da Nang 119
North Bergen 117
Saint Petersburg 116
Groningen 109
Toronto 104
Rome 101
Baltimore 99
Wuhan 97
Haiphong 94
Bologna 93
Frankfurt 93
Pennsylvania Furnace 93
Overberg 90
Frankfurt am Main 88
Lecce 88
Zaporozhye 83
Jakarta 79
Tokyo 78
Monopoli 72
Nuremberg 67
London 63
Mountain View 58
San Diego 57
Norwalk 56
São Paulo 54
Padua 51
Hangzhou 50
Shenzhen 49
Athens 48
Herkenbosch 47
Las Vegas 47
Munich 46
Paris 46
Nanjing 44
Kwai Chung 43
Redwood City 43
Jerusalem 40
Malatya 40
University Park 38
Overland Park 37
Columbus 36
Hải Dương 35
Naples 35
Bangkok 32
Orem 32
Phoenix 32
Osaka 31
Venaria Reale 29
Totale 49.272
Nome #
Formal Verification of Security Protocol Implementations: A Survey 844
Formally based semi-automatic implementation of an open security protocol 841
An Efficient Data Exchange Algorithm for Chained Network Functions 817
Formal verification of Virtual Network Function graphs in an SP-DevOps context 807
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection 806
Automated Formal Verification of Application-specific Security Properties 803
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs 785
SPAF: Stateless FSA-Based Packet Filters 784
Exploiting Symmetries for Testing Equivalence in the Spi Calculus 778
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study 776
A new knowledge representation strategy for cryptographic protocol analysis 755
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis 752
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking 751
Formal Verification of LTE-UMTS Handover Procedures 748
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code 744
A LOTOS Extension for the Performance Analysis of Distributed Systems 738
Automatic Configuration of Opaque Network Functions in CMS 735
Integrating Performance Analysis in the Context of LOTOS-Based Design 732
Visual Model-Driven Design, Verification and Implementation of Security Protocols 725
The JavaSPI Framework for Security Protocol Implementation 714
An approach to refinement checking of SysML requirements 710
Provably correct Java implementations of Spi Calculus security protocols specifications 704
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access 703
dSPIN: A Dynamic Extension of SPIN 694
An Overview of Software-based Support Tools for ISO 26262 693
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation 674
Safe abstractions of data encodings in formal security protocol models 674
PIT Overload Analysis in Content Centric Networks 667
Using SPIN to Verify Security Properties of Cryptographic Protocols 666
Using Garbage Collection in Model Checking 655
Vehicle Navigation Service Based on Real-Time Traffic Information 654
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols 654
Resource Management Policies for Cloud-based Interactive 3D Applications 636
Distributed-Memory Model Checking with SPIN 634
Tools for cryptographic protocols analysis: A technical and experimental comparison 632
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems 631
A Formal Model of Network Policy Analysis 628
On the Implementation of an Interface for a Multichannel Local Area Network 623
A Deadlock Detection Tool for Concurrent Java Programs 619
Vulnerability Modelling for the Analysis of Network Attacks 616
Efficient Representation of the Attacker's Knowledge in Cryptographic Protocols Analysis 615
An Experience in Embedded Control Software Verification 615
A formal approach for network security policy validation 615
Detecting Chains of Vulnerabilities in Industrial Networks 615
Parallel CRC Generation 614
iNFAnt: NFA pattern matching on GPGPU devices 612
On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols 605
Spi2Java: automatic cryptographic protocol java code generation from spi calculus 595
Formal verification of LTE-UMTS and LTE–LTE handover procedures 593
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study 588
Derivation of Executable Code from Formal Protocol Specifications Written in LOTOS 580
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models 577
A Graphical Tool for Protocol Design with Estelle 576
Using Data Flow Analysis to Infer Type Information in Java Bytecode 572
Using Binary Decision Diagrams for Representation and Analysis of Communication Protocols 569
Adaptive Bandwidth Balancing Mechanisms for DQDB Networks 561
Rapid Prototyping of Protocols from LOTOS Specifications 558
Integration of Time Petri Nets and TE-LOTOS in the Design and Evaluation of Factory Communication Systems 557
Seamless configuration of virtual network functions in data center provider networks 557
Automated Formal Methods for Security Protocol Engineering 556
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture 555
A Protocol for Multirendezvous of LOTOS Processes 553
A Java-based Formal Development Environment for Factory Communication Systems 550
A Lightweight Security Analyzer inside GCC 550
A Grid-Powered Framework to Support Courses on Distributed Programming 548
Improving the Security of Industrial Networks by means of Formal Verification 547
DynNav: Toward Open and Interoperable Navigation Services 542
Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models 540
An efficient data exchange mechanism for chained network functions 534
Exploiting symmetries for testing equivalence verification in the SPI calculus 527
The use of Estelle to specify manufacturing systems 525
Push applications and dynamic content generation over content-centric networking 525
JavaSPI: A Framework for Security Protocol Implementation 523
Temporal Logic Properties of Java Objects 521
An Abstract Execution Model for Basic LOTOS 519
Formally sound implementations of security protocols with JavaSPI 500
Temporal Logic Properties of Java Objects 499
Formal Specification and Verification of the Real-time Scheduler in FIP 496
Implementation of Static Semantic Analysis of LOTOS Specifications 491
A LOTOS Specification of the SERCOS Field-bus Protocol 486
A Temporal and Probabilistic LOTOS Extension Oriented to Performance Modelling of Distributed Systems 481
Applicability of Formal Methods for Safety-Critical Systems in the Context of ISO 26262 460
A framework for user-friendly verification-oriented VNF modeling 456
Throughput Analysis of Timed Token Protocols in Double Ring Networks 455
A Configurable Mobile Agent Data Protection Protocol 440
Automated firewall configuration in virtual networks 438
A Formalization Of The FIP Protocol Using Estelle 425
Combining SysML modelling with refinement checking in Eclipse 421
Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software 419
Wireless for the factory: The Wi-Fact analysis 418
A Static Semantic Analyzer for LOTOS Specifications 417
SRB Data Grid and Compute Grid integration via the EnginFrame Grid Portal 410
Esercizi di Fondamenti di Informatica 410
Probabilistic Characterization of Algebraic Protocol Specifications 405
Modeling and Validation of Java Multi-threading applications using Spin 399
A State-Exploration Technique for Spi-Calculus Testing-Equivalence Verification 396
SCARAB: Innovative Services Supporting User and Terminal Mobility 396
Modeling the Execution of LOTOS Specifications by Cooperating Extended Finite State Machines 395
Comparison of Adaptive Fairness Control Mechanisms for DQDBMetropolitan Area Networks 394
Automatic testing equivalence verification of spi calculus specifications 389
Totale 59.287
Categoria #
all - tutte 154.053
article - articoli 56.558
book - libri 909
conference - conferenze 93.469
curatela - curatele 0
other - altro 0
patent - brevetti 1.289
selected - selezionate 0
volume - volumi 1.828
Totale 308.106


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021334 0 0 0 0 0 0 0 0 0 0 205 129
2021/20222.219 128 192 70 131 111 171 181 85 148 175 365 462
2022/20233.363 281 499 134 300 342 420 398 158 304 69 186 272
2023/20241.694 72 286 202 91 152 97 108 130 79 58 141 278
2024/20256.441 146 639 289 709 329 353 470 694 854 412 575 971
2025/202614.527 745 559 956 1.109 1.201 900 2.351 1.517 3.045 1.992 152 0
Totale 73.156