LIOY, ANTONIO
 Distribuzione geografica
Continente #
EU - Europa 4.540
NA - Nord America 3.770
AS - Asia 1.818
AF - Africa 135
SA - Sud America 98
OC - Oceania 62
Totale 10.423
Nazione #
US - Stati Uniti d'America 3.664
IT - Italia 2.399
CN - Cina 897
DE - Germania 458
FR - Francia 406
GB - Regno Unito 363
IN - India 311
KR - Corea 107
IE - Irlanda 97
RU - Federazione Russa 95
CA - Canada 92
ES - Italia 86
NL - Olanda 82
JP - Giappone 79
IR - Iran 75
CZ - Repubblica Ceca 60
AT - Austria 58
BR - Brasile 57
AU - Australia 54
FI - Finlandia 52
PK - Pakistan 51
UA - Ucraina 41
GR - Grecia 33
CH - Svizzera 32
ID - Indonesia 32
TH - Thailandia 32
PT - Portogallo 30
PL - Polonia 29
NO - Norvegia 27
SE - Svezia 26
MY - Malesia 24
BE - Belgio 23
EU - Europa 23
PH - Filippine 22
TR - Turchia 22
TW - Taiwan 22
VN - Vietnam 22
RO - Romania 21
SG - Singapore 20
AE - Emirati Arabi Uniti 19
EG - Egitto 19
NG - Nigeria 19
MA - Marocco 17
HR - Croazia 16
ZA - Sudafrica 15
PE - Perù 14
CI - Costa d'Avorio 13
EC - Ecuador 13
HK - Hong Kong 13
BG - Bulgaria 12
DK - Danimarca 11
MX - Messico 11
SA - Arabia Saudita 11
AP - ???statistics.table.value.countryCode.AP??? 10
IL - Israele 10
IQ - Iraq 10
DZ - Algeria 9
BD - Bangladesh 8
CL - Cile 8
EE - Estonia 8
NZ - Nuova Zelanda 8
KE - Kenya 7
SI - Slovenia 7
LU - Lussemburgo 6
LV - Lettonia 6
MU - Mauritius 6
RS - Serbia 6
TN - Tunisia 6
BN - Brunei Darussalam 5
OM - Oman 5
QA - Qatar 5
CO - Colombia 4
ET - Etiopia 4
KZ - Kazakistan 4
MD - Moldavia 4
SN - Senegal 4
CY - Cipro 3
SD - Sudan 3
UG - Uganda 3
AL - Albania 2
AR - Argentina 2
BH - Bahrain 2
GH - Ghana 2
LK - Sri Lanka 2
LT - Lituania 2
MK - Macedonia 2
MM - Myanmar 2
MW - Malawi 2
PS - Palestinian Territory 2
YE - Yemen 2
AZ - Azerbaigian 1
BW - Botswana 1
BY - Bielorussia 1
CD - Congo 1
HU - Ungheria 1
KH - Cambogia 1
LS - Lesotho 1
MQ - Martinica 1
NE - Niger 1
PA - Panama 1
Totale 10.418
Città #
Boardman 708
Turin 478
Beijing 321
Ashburn 282
Seattle 265
Hangzhou 253
Fairfield 204
Torino 189
Houston 180
Milan 129
Rome 129
Mountain View 116
Ann Arbor 109
Shenzhen 109
Woodbridge 108
Southend 97
Wilmington 87
Buffalo 86
Tempe 81
Höst 80
Cambridge 79
Dublin 76
San Ramon 76
Palo Alto 68
Santa Cruz 68
London 58
Paris 50
Bangalore 48
Vienna 46
University Park 44
Southampton 32
Barcelona 31
San Donato Milanese 28
Naples 27
Los Angeles 26
Bangkok 25
Norwalk 25
Chicago 24
Montréal 23
San Diego 23
Guangzhou 22
Wuhan 22
Mumbai 21
San Francisco 21
Seoul 21
Kansas City 19
Munich 19
Zhengzhou 19
Bologna 18
Las Vegas 18
New Delhi 18
Chennai 17
Helsinki 17
Islamabad 17
Madrid 17
Taipei 17
Venice 17
West Lafayette 17
Shanghai 16
Dong Ket 15
Padova 15
Phoenix 15
Siena 15
Toronto 15
Amsterdam 14
Bengaluru 14
Hartford 14
Jakarta 14
Pune 14
Vancouver 14
Chandler 13
Heidelberg 13
Lake Forest 13
Palermo 13
Singapore 13
Abidjan 12
Brno 12
Carignano 12
Espoo 12
Herkenbosch 12
Karlsruhe 12
Lagos 12
Lawrenceville 12
Overberg 12
Porto 12
Valdagno 12
Washington 12
Ürümqi 12
Clearwater 11
Glasgow 11
Parma 11
San Jose 11
Baltimore 10
Genova 10
Kuala Lumpur 10
Oslo 10
Penza 10
Redmond 10
Rijswijk 10
Summit 10
Totale 5.745
Nome #
Virtualized Security at the Network Edge: A User-centric Approach, file e384c42e-39c4-d4b2-e053-9f05fe0a1d67 955
Dependability in wireless networks: can we rely on WiFi?, file e384c42d-f3a2-d4b2-e053-9f05fe0a1d67 847
Offloading personal security applications to a secure and trusted network node, file e384c42e-3b32-d4b2-e053-9f05fe0a1d67 806
Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT, file e384c42e-317b-d4b2-e053-9f05fe0a1d67 792
Anatomia del malware, file e384c42e-2d05-d4b2-e053-9f05fe0a1d67 698
Practical assessment of Biba integrity for TCG-enabled platforms, file e384c42e-2efe-d4b2-e053-9f05fe0a1d67 613
Analysis of application-layer filtering policies with application to HTTP, file e384c42e-3b8b-d4b2-e053-9f05fe0a1d67 484
Exploiting the network for securing personal devices, file e384c42e-3b3e-d4b2-e053-9f05fe0a1d67 448
Offloading security applications into the network, file e384c42e-3871-d4b2-e053-9f05fe0a1d67 429
Federating e-identities across Europe, or how to build cross-border e-services, file e384c42e-0a93-d4b2-e053-9f05fe0a1d67 411
Ontology-based policy translation, file e384c42e-04d4-d4b2-e053-9f05fe0a1d67 404
Modern standard-based access control in network services: XACML in action, file e384c42e-01da-d4b2-e053-9f05fe0a1d67 403
The ForwardDiffSig scheme for multicast authentication, file e384c42e-10af-d4b2-e053-9f05fe0a1d67 378
The trust problem in modern network infrastructures, file e384c42e-b987-d4b2-e053-9f05fe0a1d67 332
Network-level access control policy analysis and transformation, file e384c42e-1199-d4b2-e053-9f05fe0a1d67 317
A unified and flexible solution for integrating CRL and OCSP into PKI applications, file e384c42e-024d-d4b2-e053-9f05fe0a1d67 219
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c430-7912-d4b2-e053-9f05fe0a1d67 201
D7.1 - Project leaflet and portal, file e384c42f-1f15-d4b2-e053-9f05fe0a1d67 193
User-oriented Network Security Policy Specification, file e384c430-ba6d-d4b2-e053-9f05fe0a1d67 190
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment., file e384c42e-3969-d4b2-e053-9f05fe0a1d67 186
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach, file e384c432-496b-d4b2-e053-9f05fe0a1d67 145
Harmonised security across devices (interview with Prof. Antonio Lioy), file e384c42e-f922-d4b2-e053-9f05fe0a1d67 114
Inter-technology conflict analysis for communication protection policies, file e384c432-d3d9-d4b2-e053-9f05fe0a1d67 97
Towards Automatic Risk Analysis and Mitigation of Software Applications, file e384c42f-17f4-d4b2-e053-9f05fe0a1d67 95
Electronic identification for universities: Building cross-border services based on the eIDAS infrastructure, file e384c431-4ba2-d4b2-e053-9f05fe0a1d67 87
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions, file e384c431-3e17-d4b2-e053-9f05fe0a1d67 83
On the impossibility of effectively using likely-invariants for software attestation purposes, file e384c430-34d2-d4b2-e053-9f05fe0a1d67 81
Supporting authorize-then-authenticate for wi-fi access based on an electronic identity infrastructure, file e384c432-5e78-d4b2-e053-9f05fe0a1d67 69
Detection of encrypted cryptomining malware connections with machine and deep learning, file e384c432-6c17-d4b2-e053-9f05fe0a1d67 60
Towards a complete software stack to integrate Quantum Key Distribution in a cloud environment, file e384c433-f77e-d4b2-e053-9f05fe0a1d67 56
Classification and analysis of communication protection policy anomalies, file e384c432-b558-d4b2-e053-9f05fe0a1d67 45
A Formal Model of Network Policy Analysis, file e384c432-d63e-d4b2-e053-9f05fe0a1d67 42
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-d454-d4b2-e053-9f05fe0a1d67 38
Assessing network authorization policies via reachability analysis, file e384c432-b559-d4b2-e053-9f05fe0a1d67 32
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2ed-d4b2-e053-9f05fe0a1d67 28
Data set and machine learning models for the classification of network traffic originators, file e384c434-85aa-d4b2-e053-9f05fe0a1d67 21
On enabling additional natural person and domain-specific attributes in the eIDAS network, file e384c434-0304-d4b2-e053-9f05fe0a1d67 20
Using MACsec to protect a Network Functions Virtualisation Infrastructure, file 9b60f49d-a716-4f29-a031-a87307d25fc4 19
Online and offline security policy assessment, file e384c432-d997-d4b2-e053-9f05fe0a1d67 17
PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments, file 540635cb-1a69-4e38-a7a6-326172548eeb 15
Cybersecurity in ICT supply chains: key challenges and a relevant architecture, file e384c433-cf5c-d4b2-e053-9f05fe0a1d67 13
On the complexity of public-key certificate validation, file e384c42e-00a7-d4b2-e053-9f05fe0a1d67 10
Quantum Key Distribution in Kubernetes Clusters, file c54bd7da-94a6-4fc0-8219-74245ee0bf45 7
A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure, file e384c430-f5f3-d4b2-e053-9f05fe0a1d67 7
Integrity verification of Docker containers for a lightweight cloud environment, file e384c431-c9e7-d4b2-e053-9f05fe0a1d67 7
PALANTIR: Zero-trust architecture for Managed Security Service Provider, file f52ebaf7-ce6c-4b32-828f-4e0791e95423 6
Classification and analysis of communication protection policy anomalies, file e384c431-c9ed-d4b2-e053-9f05fe0a1d67 5
Inter-technology conflict analysis for communication protection policies, file e384c432-c039-d4b2-e053-9f05fe0a1d67 5
Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030, file 8fddd750-aa07-4296-a01d-4fe5e6aa69c6 4
A Model for Automated Cybersecurity Threat Remediation and Sharing, file d79010c0-0440-451c-97d9-408200cbd87b 4
Assessing network authorization policies via reachability analysis, file e384c431-867c-d4b2-e053-9f05fe0a1d67 4
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-c395-d4b2-e053-9f05fe0a1d67 4
A Formal Model of Network Policy Analysis, file e384c432-d37e-d4b2-e053-9f05fe0a1d67 4
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions, file 69998a62-2d7b-44fd-9fae-7db9b7229f18 3
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions, file c2341aef-998c-4889-8a1a-8a553749a97b 3
On the performance of secure vehicular communication systems, file e384c42e-ab45-d4b2-e053-9f05fe0a1d67 3
Towards Optimally Hiding Protected Assets in Software Applications, file e384c42f-9aa3-d4b2-e053-9f05fe0a1d67 3
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c431-8682-d4b2-e053-9f05fe0a1d67 3
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure, file e384c432-59ef-d4b2-e053-9f05fe0a1d67 3
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2eb-d4b2-e053-9f05fe0a1d67 3
Online and offline security policy assessment, file e384c432-a2f6-d4b2-e053-9f05fe0a1d67 3
A novel architecture to virtualise a hardware-bound trusted platform module, file 0a100c9b-4b5c-414e-b0cd-8f22c0b3d5fb 2
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection, file 761d196d-a135-40df-bf65-66dcedf46dda 2
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem, file 8935fca3-fee6-4b86-abe0-4d186981abc0 2
Network-level access control policy analysis and transformation, file e384c42e-1198-d4b2-e053-9f05fe0a1d67 2
Virtualized Security at the Network Edge: A User-centric Approach, file e384c42e-396d-d4b2-e053-9f05fe0a1d67 2
Analysis of application-layer filtering policies with application to HTTP, file e384c42e-3adf-d4b2-e053-9f05fe0a1d67 2
Efficient Attribute Management in a Federated Identity Management Infrastructure, file e384c42f-2967-d4b2-e053-9f05fe0a1d67 2
NFV-based network protection: The SHIELD approach, file 3f648f38-311b-4de8-b5cf-f8a790bca2cf 1
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures, file 5bc0ef41-41fe-4cdb-abb2-cf40d2916556 1
Using MACsec to protect a Network Functions Virtualisation Infrastructure, file 6bab94dd-bb21-4a5a-a7e9-79d940230cd0 1
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection, file 73e01ef0-a5ee-43f6-bd7e-6e800dde52a1 1
PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments, file 7c05b7c0-c46d-4513-af1a-885960e178ea 1
A model of capabilities of Network Security Functions, file 82502786-04ca-4946-985d-f2c469769054 1
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises, file 8c317746-6236-4622-ad63-3bbc8668879d 1
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures, file 9d33c5ba-fa84-4332-ab55-58f34a348063 1
Exploiting the DICE specification to ensure strong identity and integrity of IoT devices, file cb9fbd22-8881-4124-b92f-42e11803e91d 1
Exploiting the DICE specification to ensure strong identity and integrity of IoT devices, file dac8ca6b-71ed-4d9e-9093-18f1d0bd80e5 1
Improved reachability analysis for security management, file e384c42e-2581-d4b2-e053-9f05fe0a1d67 1
On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure, file e384c42f-26b5-d4b2-e053-9f05fe0a1d67 1
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems, file e384c42f-27a9-d4b2-e053-9f05fe0a1d67 1
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps, file e384c431-753d-d4b2-e053-9f05fe0a1d67 1
Towards a secure and lightweight Network Function Virtualisation environment, file e384c431-c385-d4b2-e053-9f05fe0a1d67 1
Totale 10.603
Categoria #
all - tutte 19.915
article - articoli 10.289
book - libri 0
conference - conferenze 6.750
curatela - curatele 0
other - altro 2.478
patent - brevetti 0
selected - selezionate 0
volume - volumi 398
Totale 39.830


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019176 0 0 0 0 0 0 0 0 0 0 98 78
2019/2020853 84 39 51 82 75 60 70 89 89 52 85 77
2020/20211.212 87 181 89 85 170 52 126 89 78 91 75 89
2021/20221.142 53 35 57 172 132 105 146 82 69 68 135 88
2022/2023869 56 61 90 115 77 127 93 82 76 48 44 0
2023/2024124 0 2 13 13 9 9 18 17 20 20 3 0
Totale 10.603