SISTO, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 33.907
EU - Europa 18.039
AS - Asia 5.542
SA - Sud America 516
AF - Africa 143
OC - Oceania 21
Continente sconosciuto - Info sul continente non disponibili 16
Totale 58.184
Nazione #
US - Stati Uniti d'America 33.699
IT - Italia 4.264
DE - Germania 3.587
GB - Regno Unito 3.322
FR - Francia 3.219
SG - Singapore 2.076
CN - Cina 1.814
UA - Ucraina 802
RU - Federazione Russa 541
IE - Irlanda 443
BR - Brasile 438
TR - Turchia 435
NL - Olanda 364
KR - Corea 327
SE - Svezia 275
BE - Belgio 211
FI - Finlandia 210
AT - Austria 201
CH - Svizzera 189
CA - Canada 182
IN - India 164
HK - Hong Kong 154
ID - Indonesia 85
JP - Giappone 70
MY - Malesia 69
IL - Israele 68
VN - Vietnam 62
GR - Grecia 55
ES - Italia 43
PL - Polonia 42
JO - Giordania 37
ZA - Sudafrica 37
UZ - Uzbekistan 35
TW - Taiwan 33
IR - Iran 32
SN - Senegal 31
RO - Romania 30
AP - ???statistics.table.value.countryCode.AP??? 29
PK - Pakistan 28
EU - Europa 26
DK - Danimarca 25
CZ - Repubblica Ceca 24
AR - Argentina 22
CL - Cile 21
EG - Egitto 21
EE - Estonia 18
AU - Australia 15
BG - Bulgaria 15
DZ - Algeria 14
PT - Portogallo 13
CO - Colombia 12
TH - Thailandia 11
BD - Bangladesh 10
BY - Bielorussia 10
GH - Ghana 10
IQ - Iraq 10
MA - Marocco 10
SA - Arabia Saudita 10
HR - Croazia 9
LT - Lituania 9
LU - Lussemburgo 9
PH - Filippine 9
KZ - Kazakistan 8
MX - Messico 8
EC - Ecuador 7
KW - Kuwait 7
CI - Costa d'Avorio 6
NO - Norvegia 6
NZ - Nuova Zelanda 6
PE - Perù 6
GE - Georgia 5
HU - Ungheria 5
KE - Kenya 5
KG - Kirghizistan 5
AE - Emirati Arabi Uniti 4
PA - Panama 4
VE - Venezuela 4
AL - Albania 3
JM - Giamaica 3
LV - Lettonia 3
ML - Mali 3
NP - Nepal 3
OM - Oman 3
QA - Qatar 3
SI - Slovenia 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AZ - Azerbaigian 2
BA - Bosnia-Erzegovina 2
BO - Bolivia 2
LC - Santa Lucia 2
MD - Moldavia 2
PY - Paraguay 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
TN - Tunisia 2
TT - Trinidad e Tobago 2
UY - Uruguay 2
BS - Bahamas 1
CR - Costa Rica 1
DO - Repubblica Dominicana 1
Totale 58.173
Città #
Ashburn 12.537
Boardman 6.397
Southend 2.868
Seattle 1.816
Fairfield 1.363
Turin 1.102
Fremont 1.095
Chandler 983
Singapore 883
Ann Arbor 807
Woodbridge 789
Houston 578
Cambridge 512
Wilmington 476
Princeton 440
Torino 437
Dublin 423
Jacksonville 389
Santa Clara 378
Milan 284
Berlin 269
Beijing 263
San Ramon 254
Des Moines 241
Chicago 226
Buffalo 215
Izmir 215
Brussels 191
Council Bluffs 187
Helsinki 177
San Francisco 174
Bern 161
Shanghai 155
Tongling 151
San Donato Milanese 144
Guangzhou 143
Istanbul 136
Vienna 129
Zhengzhou 118
Saint Petersburg 116
Baltimore 99
Amsterdam 95
San Jose 95
Wuhan 95
Frankfurt 93
Pennsylvania Furnace 93
Toronto 92
Bologna 90
Overberg 90
Lecce 88
Rome 86
Zaporozhye 83
Jakarta 77
Hong Kong 75
Monopoli 72
Mountain View 58
Norwalk 56
San Diego 56
Nuremberg 53
Moscow 52
Seoul 51
Padua 50
Athens 47
Hangzhou 47
Herkenbosch 47
London 47
Las Vegas 46
Munich 44
Kwai Chung 43
Redwood City 43
Shenzhen 43
Nanjing 41
Los Angeles 40
Malatya 40
Hefei 39
Jerusalem 39
University Park 38
Overland Park 37
Paris 34
New York 33
Columbus 32
Naples 29
Dallas 28
Falls Church 28
Osaka 28
Cupertino 27
Andover 26
Phoenix 26
São Paulo 26
Yubileyny 25
Bangalore 24
Austin 23
Muizenberg 23
Putian 23
Melun 22
Ottawa 22
Washington 22
Clearwater 21
Bremen 20
Imola 20
Totale 41.164
Nome #
Formally based semi-automatic implementation of an open security protocol 739
Automated Formal Verification of Application-specific Security Properties 721
Exploiting Symmetries for Testing Equivalence in the Spi Calculus 718
An Efficient Data Exchange Algorithm for Chained Network Functions 718
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study 715
Formal Verification of Security Protocol Implementations: A Survey 704
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis 692
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection 686
A new knowledge representation strategy for cryptographic protocol analysis 685
Formal verification of Virtual Network Function graphs in an SP-DevOps context 682
SPAF: Stateless FSA-Based Packet Filters 676
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs 676
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code 653
A LOTOS Extension for the Performance Analysis of Distributed Systems 640
Integrating Performance Analysis in the Context of LOTOS-Based Design 638
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking 628
The JavaSPI Framework for Security Protocol Implementation 627
An approach to refinement checking of SysML requirements 622
Visual Model-Driven Design, Verification and Implementation of Security Protocols 617
Formal Verification of LTE-UMTS Handover Procedures 612
Provably correct Java implementations of Spi Calculus security protocols specifications 612
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access 609
dSPIN: A Dynamic Extension of SPIN 605
Automatic Configuration of Opaque Network Functions in CMS 603
Using Garbage Collection in Model Checking 588
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation 586
Using SPIN to Verify Security Properties of Cryptographic Protocols 580
An Overview of Software-based Support Tools for ISO 26262 571
Distributed-Memory Model Checking with SPIN 565
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols 563
On the Implementation of an Interface for a Multichannel Local Area Network 559
PIT Overload Analysis in Content Centric Networks 557
A Deadlock Detection Tool for Concurrent Java Programs 556
Resource Management Policies for Cloud-based Interactive 3D Applications 555
An Experience in Embedded Control Software Verification 543
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems 540
Safe abstractions of data encodings in formal security protocol models 539
Parallel CRC Generation 536
A Formal Model of Network Policy Analysis 535
Tools for cryptographic protocols analysis: A technical and experimental comparison 532
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study 531
Efficient Representation of the Attacker's Knowledge in Cryptographic Protocols Analysis 528
Vehicle Navigation Service Based on Real-Time Traffic Information 525
Detecting Chains of Vulnerabilities in Industrial Networks 518
Vulnerability Modelling for the Analysis of Network Attacks 516
On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols 515
Using Data Flow Analysis to Infer Type Information in Java Bytecode 509
iNFAnt: NFA pattern matching on GPGPU devices 503
Adaptive Bandwidth Balancing Mechanisms for DQDB Networks 502
Using Binary Decision Diagrams for Representation and Analysis of Communication Protocols 501
A formal approach for network security policy validation 500
A Protocol for Multirendezvous of LOTOS Processes 498
A Java-based Formal Development Environment for Factory Communication Systems 497
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models 493
A Grid-Powered Framework to Support Courses on Distributed Programming 491
Spi2Java: automatic cryptographic protocol java code generation from spi calculus 486
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture 486
Rapid Prototyping of Protocols from LOTOS Specifications 484
Derivation of Executable Code from Formal Protocol Specifications Written in LOTOS 484
Formal verification of LTE-UMTS and LTE–LTE handover procedures 480
Automated Formal Methods for Security Protocol Engineering 476
A Lightweight Security Analyzer inside GCC 475
A Graphical Tool for Protocol Design with Estelle 472
Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models 471
The use of Estelle to specify manufacturing systems 468
Integration of Time Petri Nets and TE-LOTOS in the Design and Evaluation of Factory Communication Systems 467
Temporal Logic Properties of Java Objects 466
Improving the Security of Industrial Networks by means of Formal Verification 461
Seamless configuration of virtual network functions in data center provider networks 458
An Abstract Execution Model for Basic LOTOS 457
Exploiting symmetries for testing equivalence verification in the SPI calculus 455
Formal Specification and Verification of the Real-time Scheduler in FIP 449
Temporal Logic Properties of Java Objects 448
DynNav: Toward Open and Interoperable Navigation Services 447
JavaSPI: A Framework for Security Protocol Implementation 444
Push applications and dynamic content generation over content-centric networking 437
Implementation of Static Semantic Analysis of LOTOS Specifications 434
A LOTOS Specification of the SERCOS Field-bus Protocol 430
Formally sound implementations of security protocols with JavaSPI 417
An efficient data exchange mechanism for chained network functions 411
A Temporal and Probabilistic LOTOS Extension Oriented to Performance Modelling of Distributed Systems 402
Applicability of Formal Methods for Safety-Critical Systems in the Context of ISO 26262 392
A framework for user-friendly verification-oriented VNF modeling 380
A Configurable Mobile Agent Data Protection Protocol 374
Throughput Analysis of Timed Token Protocols in Double Ring Networks 371
Wireless for the factory: The Wi-Fact analysis 354
A Formalization Of The FIP Protocol Using Estelle 352
Combining SysML modelling with refinement checking in Eclipse 350
A State-Exploration Technique for Spi-Calculus Testing-Equivalence Verification 349
Esercizi di Fondamenti di Informatica 348
Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software 348
SCARAB: Innovative Services Supporting User and Terminal Mobility 341
Modeling and Validation of Java Multi-threading applications using Spin 332
A Static Semantic Analyzer for LOTOS Specifications 328
SRB Data Grid and Compute Grid integration via the EnginFrame Grid Portal 327
Comparison of Adaptive Fairness Control Mechanisms for DQDBMetropolitan Area Networks 327
Automatic testing equivalence verification of spi calculus specifications 325
Static Analysis of Java Mutithreaded and Distributed Applications 311
Probabilistic Characterization of Algebraic Protocol Specifications 306
Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behaviour Expressions 304
Totale 50.794
Categoria #
all - tutte 125.762
article - articoli 46.109
book - libri 766
conference - conferenze 76.445
curatela - curatele 0
other - altro 0
patent - brevetti 959
selected - selezionate 0
volume - volumi 1.483
Totale 251.524


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20213.079 331 399 197 309 238 326 211 288 153 293 205 129
2021/20222.219 128 192 70 131 111 171 181 85 148 175 365 462
2022/20233.363 281 499 134 300 342 420 398 158 304 69 186 272
2023/20241.694 72 286 202 91 152 97 108 130 79 58 141 278
2024/20256.441 146 639 289 709 329 353 470 694 854 412 575 971
2025/2026189 189 0 0 0 0 0 0 0 0 0 0 0
Totale 58.818