LIOY, ANTONIO
 Distribuzione geografica
Continente #
EU - Europa 23.563
NA - Nord America 20.900
AS - Asia 9.648
SA - Sud America 922
AF - Africa 257
OC - Oceania 70
Continente sconosciuto - Info sul continente non disponibili 10
Totale 55.370
Nazione #
US - Stati Uniti d'America 20.449
IT - Italia 7.551
DE - Germania 3.792
GB - Regno Unito 3.787
SG - Singapore 3.505
FR - Francia 3.251
CN - Cina 2.806
UA - Ucraina 1.034
BR - Brasile 759
RU - Federazione Russa 696
KR - Corea 625
TR - Turchia 618
NL - Olanda 492
HK - Hong Kong 450
IE - Irlanda 435
FI - Finlandia 345
SE - Svezia 336
AT - Austria 332
VN - Vietnam 312
IN - India 281
CH - Svizzera 279
BE - Belgio 223
CA - Canada 223
IL - Israele 214
CZ - Repubblica Ceca 211
JP - Giappone 201
MX - Messico 172
ES - Italia 144
ID - Indonesia 113
PL - Polonia 93
RO - Romania 81
AU - Australia 66
MY - Malesia 65
BG - Bulgaria 62
BD - Bangladesh 50
GR - Grecia 48
JO - Giordania 47
IR - Iran 46
AR - Argentina 45
PH - Filippine 45
PK - Pakistan 45
PT - Portogallo 43
IQ - Iraq 41
SN - Senegal 41
ZA - Sudafrica 41
DK - Danimarca 39
AP - ???statistics.table.value.countryCode.AP??? 36
EU - Europa 35
TW - Taiwan 34
SA - Arabia Saudita 33
EC - Ecuador 31
AE - Emirati Arabi Uniti 29
HU - Ungheria 25
CI - Costa d'Avorio 24
GT - Guatemala 24
CO - Colombia 22
EE - Estonia 22
EG - Egitto 22
MA - Marocco 20
VE - Venezuela 20
LT - Lituania 19
UZ - Uzbekistan 19
AL - Albania 18
ET - Etiopia 17
HR - Croazia 16
SC - Seychelles 15
TH - Thailandia 15
LU - Lussemburgo 14
SI - Slovenia 14
UY - Uruguay 14
BA - Bosnia-Erzegovina 13
CL - Cile 13
GH - Ghana 13
TN - Tunisia 13
NG - Nigeria 12
KZ - Kazakistan 11
RS - Serbia 10
AZ - Azerbaigian 9
KE - Kenya 9
MD - Moldavia 9
BY - Bielorussia 8
DZ - Algeria 8
NO - Norvegia 8
PY - Paraguay 8
GE - Georgia 7
KH - Cambogia 7
NP - Nepal 7
YE - Yemen 7
LB - Libano 6
LV - Lettonia 6
KG - Kirghizistan 5
PA - Panama 5
PE - Perù 5
SK - Slovacchia (Repubblica Slovacca) 5
DO - Repubblica Dominicana 4
HN - Honduras 4
JM - Giamaica 4
LK - Sri Lanka 4
MK - Macedonia 4
NZ - Nuova Zelanda 4
Totale 55.300
Città #
Ashburn 4.835
Southend 3.241
Turin 1.931
Seattle 1.787
Singapore 1.701
Boardman 1.203
Fairfield 1.174
Chandler 1.016
Torino 893
Woodbridge 676
Ann Arbor 643
Milan 577
Houston 536
Beijing 527
Princeton 513
Dallas 465
Jacksonville 461
Wilmington 449
Santa Clara 440
Cambridge 433
Dublin 396
San Ramon 361
Hong Kong 355
Izmir 338
Berlin 331
Rome 261
Vienna 256
Helsinki 243
Hefei 242
Bern 240
Seoul 237
San Donato Milanese 210
Brussels 182
Chicago 181
Tel Aviv 179
Tongling 179
Istanbul 167
Shanghai 167
Amsterdam 163
Council Bluffs 157
Des Moines 150
Zhengzhou 150
Saint Petersburg 134
Bologna 128
San Francisco 127
Zaporozhye 127
Brno 119
Fremont 118
Munich 115
Baltimore 111
Redwood City 108
Los Angeles 107
Frankfurt am Main 104
Pennsylvania Furnace 102
San Jose 101
Buffalo 94
Overberg 91
Hanoi 89
Ho Chi Minh City 89
Monopoli 89
Padua 79
Tokyo 79
North Bergen 77
Changsha 74
Hangzhou 73
Guangzhou 70
Lecce 70
Paris 70
Columbus 69
Jakarta 69
Mountain View 64
San Diego 63
Frankfurt 62
São Paulo 62
Toronto 58
Naples 57
Moscow 55
Lauterbourg 52
Shenzhen 52
Borgosesia 50
London 50
Lappeenranta 49
Malatya 47
Madrid 46
Phoenix 46
Washington 46
Galati 45
Nuremberg 43
Atlanta 41
New York 41
Kwai Chung 40
Herkenbosch 38
Cangzhou 37
Dearborn 37
Kraków 37
Overland Park 37
Palermo 37
The Dalles 36
Ottawa 35
Turku 35
Totale 32.727
Nome #
Dependability in wireless networks: can we rely on WiFi? 2.397
Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT 2.164
Virtualized Security at the Network Edge: A User-centric Approach 708
Offloading personal security applications to a secure and trusted network node 647
Diagnosis Oriented Test Pattern Generation 587
Exploiting proxy-based federated identity management in wireless roaming access 585
Secure document management and distribution in an open network environment 576
Motivations for a theoretical approach to WYSIWYS 575
Anatomia del malware 573
On the complexity of public-key certificate validation 570
Decentralised access control in 802.11 networks 565
A Formal Model of Network Policy Analysis 561
Analysis of application-layer filtering policies with application to HTTP 555
Fighting e-mail abuses: the EMPE approach 550
A formal approach for network security policy validation 542
Offloading security applications into the network 518
On the robustness of applications based on the SSL and TLS security protocols 516
The trust problem in modern network infrastructures 507
Federating e-identities across Europe, or how to build cross-border e-services 507
Exploiting the network for securing personal devices 505
The ForwardDiffSig scheme for multicast authentication 499
Network-level access control policy analysis and transformation 486
Towards privacy-by-design peer-to-peer cloud computing 473
Inter-function anomaly analysis for correct SDN/NFV deployment 472
The EuroPKI experience 466
A unified and flexible solution for integrating CRL and OCSP into PKI applications 448
Practical assessment of Biba integrity for TCG-enabled platforms 448
A novel approach for integrating security policy enforcement with dynamic network virtualization 447
Inter-technology conflict analysis for communication protection policies 435
Classification and analysis of communication protection policy anomalies 435
Improved reachability analysis for security management 434
Ontology-based policy translation 421
Towards Automatic Risk Analysis and Mitigation of Software Applications 417
Building a trusted environment for security applications 402
D7.1 - Project leaflet and portal 384
An estimation of attack surface to evaluate network (in)security 373
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting 371
Security Plans for SaaS 370
Algebraic Models to Detect and Solve Policy Conflicts 368
Automatic (re)configuration of IT systems for dependability 367
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud 365
The Trusted Platform Agent 362
Assessing network authorization policies via reachability analysis 353
A generic overall framework for network security evaluation 344
Authentication 343
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 337
Privacy-by-design cloud computing through decentralization and real life trust 335
Online and offline security policy assessment 335
Security issues in control, management, and routing protocols 331
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 329
A flexible management framework for certificate status validation 326
A formal model of policy reconciliation 324
Modern standard-based access control in network services: XACML in action 322
Ontology-based Security Policy Translation 322
The wireless opaque channel to contrast information leakage 320
Efficient and robust pseudonymous authentication in VANET 315
Trusted-Computing Technologies for the Protection of Critical Information Systems 315
Incremental trust: building trust from past experience 314
Security of 802.11 wireless networks 313
Digital certificates and public-key infrastructures 313
A wireless distributed intrusion detection system and a new attack model 312
On scalability of remote attestation 310
NFV-based network protection: the SHIELD approach 305
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment. 300
Security issues in control, management and routing protocols 298
Public Key Infrastructure - theory and practice 293
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt 292
FcgiOCSP: a scalable OCSP-based Certificate Validation System exploitingthe FastCGI interface 287
Towards Optimally Hiding Protected Assets in Software Applications 286
Trust in SDN/NFV environments 285
Automatic compaction of microcode 282
Geometric Interpretation of Policy Specification 275
A Parallel Approach to Symbolic Traversal Based on Set Partitioning 275
PKI past, present and future 273
On the performance of secure vehicular communication systems 273
Metrics Gathering for AI-based Trust Assessment 272
Timed Supersetting and the Synthesis of Large Telescopic Units 272
Synthesis of Power-Managed Sequential Components Based on Computational Kernel Extraction 269
Accurate entropy calculation for large logic circuits based on output clustering 267
Harmonised security across devices (interview with Prof. Antonio Lioy) 267
On the impossibility of effectively using likely-invariants for software attestation purposes 264
POSITIF: un approccio olistico alla sicurezza basato su politiche formali 262
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection 262
Sicurezza dei sistemi informativi 261
Towards a Policy System for IPsec: issues and an experimental implementation 261
Data set and machine learning models for the classification of network traffic originators 260
Protezione dei sistemi informatici 259
On the establishment of trust in the cloud-based ETSI NFV framework 258
Towards a Network-Independent Policy Specification 255
Verso applicazioni concrete della firma digitale (II parte) 254
Test Generation for Gate Level Sequential Machines: Algorithms and Implementation Issues 254
Efficient and Reliable Pseudonymous Authentication 252
MagicNET: XACML authorization policies for mobile agents 251
Why to adopt a security metric? A little survey 249
Exact Functional Redundancy Identification 248
Wireless security: current status and future evolution 248
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments 246
Verso applicazioni concrete della firma digitale (I parte) 246
Testing Hyperactive Faults in Asynchronous Circuits 246
Trust, Privacy and Security in Digital Business 245
Totale 40.616
Categoria #
all - tutte 140.152
article - articoli 44.868
book - libri 0
conference - conferenze 74.977
curatela - curatele 2.040
other - altro 6.182
patent - brevetti 0
selected - selezionate 0
volume - volumi 12.085
Totale 280.304


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.805 0 0 0 0 0 358 331 292 202 277 239 106
2021/20222.800 148 146 136 138 131 151 155 150 169 222 738 516
2022/20233.944 292 599 159 403 335 525 359 219 383 80 211 379
2023/20242.323 182 153 191 147 190 270 128 157 90 177 322 316
2024/20257.673 154 735 327 914 471 523 505 770 990 461 790 1.033
2025/20266.272 911 682 1.335 1.277 1.059 1.008 0 0 0 0 0 0
Totale 55.872