LIOY, ANTONIO
 Distribuzione geografica
Continente #
EU - Europa 25.927
NA - Nord America 22.688
AS - Asia 15.343
SA - Sud America 1.059
AF - Africa 301
OC - Oceania 91
Continente sconosciuto - Info sul continente non disponibili 10
Totale 65.419
Nazione #
US - Stati Uniti d'America 22.132
IT - Italia 7.931
SG - Singapore 4.213
DE - Germania 3.874
GB - Regno Unito 3.826
FR - Francia 3.484
VN - Vietnam 3.478
CN - Cina 3.181
RU - Federazione Russa 2.022
UA - Ucraina 1.050
HK - Hong Kong 1.001
BR - Brasile 851
KR - Corea 807
TR - Turchia 637
NL - Olanda 562
IN - India 503
IE - Irlanda 446
FI - Finlandia 406
AT - Austria 352
SE - Svezia 343
CH - Svizzera 281
JP - Giappone 274
CA - Canada 253
MX - Messico 228
BE - Belgio 227
IL - Israele 215
CZ - Repubblica Ceca 214
ES - Italia 167
PH - Filippine 139
ID - Indonesia 123
PL - Polonia 104
TH - Thailandia 99
TW - Taiwan 92
IQ - Iraq 90
AU - Australia 87
RO - Romania 87
BD - Bangladesh 78
MY - Malesia 67
PK - Pakistan 67
PT - Portogallo 65
BG - Bulgaria 64
JO - Giordania 58
GR - Grecia 57
AR - Argentina 54
ZA - Sudafrica 50
IR - Iran 46
SN - Senegal 41
DK - Danimarca 39
SA - Arabia Saudita 38
AP - ???statistics.table.value.countryCode.AP??? 36
EC - Ecuador 36
AE - Emirati Arabi Uniti 35
EU - Europa 35
CO - Colombia 32
EG - Egitto 29
VE - Venezuela 29
GT - Guatemala 25
HR - Croazia 25
HU - Ungheria 25
UZ - Uzbekistan 25
CI - Costa d'Avorio 24
LT - Lituania 24
MA - Marocco 24
AL - Albania 23
EE - Estonia 22
ET - Etiopia 20
SI - Slovenia 20
CL - Cile 19
TN - Tunisia 17
SC - Seychelles 15
KE - Kenya 14
LU - Lussemburgo 14
NG - Nigeria 14
UY - Uruguay 14
BA - Bosnia-Erzegovina 13
GH - Ghana 13
AZ - Azerbaigian 11
KZ - Kazakistan 11
NP - Nepal 11
RS - Serbia 11
MD - Moldavia 10
PY - Paraguay 10
YE - Yemen 10
BY - Bielorussia 9
DZ - Algeria 9
LV - Lettonia 9
NO - Norvegia 9
CR - Costa Rica 7
GE - Georgia 7
JM - Giamaica 7
KH - Cambogia 7
LB - Libano 7
PA - Panama 7
PE - Perù 7
SY - Repubblica araba siriana 7
DO - Repubblica Dominicana 6
SK - Slovacchia (Repubblica Slovacca) 6
HN - Honduras 5
KG - Kirghizistan 5
LK - Sri Lanka 5
Totale 65.318
Città #
Ashburn 5.037
Southend 3.241
Singapore 2.314
Turin 2.109
Seattle 1.787
Boardman 1.203
Fairfield 1.174
Chandler 1.016
Ho Chi Minh City 908
Torino 893
San Jose 836
Hong Kong 825
Hanoi 813
Woodbridge 683
Ann Arbor 643
Milan 606
Beijing 543
Houston 542
Princeton 513
Dallas 471
Jacksonville 462
Santa Clara 455
Wilmington 449
Hefei 435
Cambridge 434
Dublin 407
Seoul 366
San Ramon 361
Izmir 341
Berlin 334
Los Angeles 298
Vienna 274
Rome 273
Helsinki 267
Bern 240
Moscow 231
Lauterbourg 217
San Donato Milanese 210
Amsterdam 189
Brussels 185
Chicago 183
Tel Aviv 180
Tongling 179
Council Bluffs 178
Istanbul 175
Shanghai 170
Des Moines 152
Zhengzhou 151
Munich 149
Haiphong 144
Da Nang 143
Frankfurt am Main 136
Saint Petersburg 134
Bologna 131
San Francisco 128
Zaporozhye 127
Brno 119
Fremont 118
Baltimore 111
Redwood City 108
Tokyo 108
Buffalo 103
Pennsylvania Furnace 102
Paris 92
Overberg 91
Monopoli 89
North Bergen 79
Padua 79
New York 78
Changsha 77
São Paulo 77
Columbus 75
Hangzhou 75
Guangzhou 73
Jakarta 71
Lecce 70
Toronto 67
Mountain View 64
Madrid 63
San Diego 63
The Dalles 63
Turku 63
Frankfurt 62
London 60
Shenzhen 59
Lappeenranta 58
Naples 57
Borgosesia 52
Phoenix 52
Malatya 47
Washington 47
Groningen 46
Atlanta 45
Galati 45
Nuremberg 45
Bangkok 41
Hải Dương 40
Kwai Chung 40
Lisbon 40
Genoa 39
Totale 38.098
Nome #
Dependability in wireless networks: can we rely on WiFi? 2.504
Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT 2.338
Virtualized Security at the Network Edge: A User-centric Approach 820
Offloading personal security applications to a secure and trusted network node 717
On the complexity of public-key certificate validation 639
Anatomia del malware 638
Diagnosis Oriented Test Pattern Generation 631
Motivations for a theoretical approach to WYSIWYS 631
Exploiting proxy-based federated identity management in wireless roaming access 626
A Formal Model of Network Policy Analysis 623
Decentralised access control in 802.11 networks 618
Secure document management and distribution in an open network environment 615
A formal approach for network security policy validation 607
Analysis of application-layer filtering policies with application to HTTP 603
Federating e-identities across Europe, or how to build cross-border e-services 599
Fighting e-mail abuses: the EMPE approach 597
Offloading security applications into the network 585
The trust problem in modern network infrastructures 568
On the robustness of applications based on the SSL and TLS security protocols 561
Exploiting the network for securing personal devices 557
The ForwardDiffSig scheme for multicast authentication 539
Inter-function anomaly analysis for correct SDN/NFV deployment 532
Network-level access control policy analysis and transformation 527
A novel approach for integrating security policy enforcement with dynamic network virtualization 518
Towards privacy-by-design peer-to-peer cloud computing 514
The EuroPKI experience 509
Classification and analysis of communication protection policy anomalies 499
Practical assessment of Biba integrity for TCG-enabled platforms 496
Improved reachability analysis for security management 492
Inter-technology conflict analysis for communication protection policies 488
Ontology-based policy translation 481
A unified and flexible solution for integrating CRL and OCSP into PKI applications 481
Towards Automatic Risk Analysis and Mitigation of Software Applications 458
Building a trusted environment for security applications 443
D7.1 - Project leaflet and portal 436
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud 433
Security Plans for SaaS 425
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting 424
Algebraic Models to Detect and Solve Policy Conflicts 422
The Trusted Platform Agent 414
Assessing network authorization policies via reachability analysis 406
Automatic (re)configuration of IT systems for dependability 402
An estimation of attack surface to evaluate network (in)security 399
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 396
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 394
Privacy-by-design cloud computing through decentralization and real life trust 391
Modern standard-based access control in network services: XACML in action 389
Authentication 389
Online and offline security policy assessment 384
A generic overall framework for network security evaluation 382
Security issues in control, management, and routing protocols 376
A formal model of policy reconciliation 372
A flexible management framework for certificate status validation 368
Ontology-based Security Policy Translation 365
Metrics Gathering for AI-based Trust Assessment 362
Security of 802.11 wireless networks 362
Efficient and robust pseudonymous authentication in VANET 361
FcgiOCSP: a scalable OCSP-based Certificate Validation System exploitingthe FastCGI interface 360
Incremental trust: building trust from past experience 359
Trusted-Computing Technologies for the Protection of Critical Information Systems 357
On scalability of remote attestation 357
The wireless opaque channel to contrast information leakage 355
Digital certificates and public-key infrastructures 354
NFV-based network protection: the SHIELD approach 350
A wireless distributed intrusion detection system and a new attack model 348
Towards Optimally Hiding Protected Assets in Software Applications 347
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment. 346
Security issues in control, management and routing protocols 336
Trust in SDN/NFV environments 333
Public Key Infrastructure - theory and practice 332
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt 330
A Parallel Approach to Symbolic Traversal Based on Set Partitioning 322
On the impossibility of effectively using likely-invariants for software attestation purposes 317
Accurate entropy calculation for large logic circuits based on output clustering 316
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection 316
Harmonised security across devices (interview with Prof. Antonio Lioy) 315
Geometric Interpretation of Policy Specification 313
Automatic compaction of microcode 313
Data set and machine learning models for the classification of network traffic originators 313
On the performance of secure vehicular communication systems 312
POSITIF: un approccio olistico alla sicurezza basato su politiche formali 309
PKI past, present and future 308
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments 307
Synthesis of Power-Managed Sequential Components Based on Computational Kernel Extraction 307
Sicurezza dei sistemi informativi 305
Protezione dei sistemi informatici 302
On the establishment of trust in the cloud-based ETSI NFV framework 302
Verso applicazioni concrete della firma digitale (II parte) 300
Timed Supersetting and the Synthesis of Large Telescopic Units 300
Towards a complete software stack to integrate Quantum Key Distribution in a cloud environment 300
Why to adopt a security metric? A little survey 298
Towards a Network-Independent Policy Specification 298
MagicNET: XACML authorization policies for mobile agents 297
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps 295
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach 295
IKE-less IPsec for Centralized Management of Network Security 292
Wireless security: current status and future evolution 292
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions 292
Standard-Based Remote Attestation: The Veraison Project 291
Towards concrete application of electronic signature 290
Totale 45.787
Categoria #
all - tutte 153.994
article - articoli 49.364
book - libri 0
conference - conferenze 82.729
curatela - curatele 2.189
other - altro 6.629
patent - brevetti 0
selected - selezionate 0
volume - volumi 13.083
Totale 307.988


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021622 0 0 0 0 0 0 0 0 0 277 239 106
2021/20222.800 148 146 136 138 131 151 155 150 169 222 738 516
2022/20233.944 292 599 159 403 335 525 359 219 383 80 211 379
2023/20242.323 182 153 191 147 190 270 128 157 90 177 322 316
2024/20257.673 154 735 327 914 471 523 505 770 990 461 790 1.033
2025/202616.351 911 682 1.335 1.277 1.059 1.123 2.670 1.626 3.654 2.014 0 0
Totale 65.951