LIOY, ANTONIO
 Distribuzione geografica
Continente #
EU - Europa 22.896
NA - Nord America 19.984
AS - Asia 7.526
SA - Sud America 706
AF - Africa 204
OC - Oceania 63
Continente sconosciuto - Info sul continente non disponibili 10
Totale 51.389
Nazione #
US - Stati Uniti d'America 19.617
IT - Italia 7.266
GB - Regno Unito 3.760
DE - Germania 3.724
FR - Francia 3.120
CN - Cina 2.494
SG - Singapore 2.394
UA - Ucraina 1.022
RU - Federazione Russa 676
BR - Brasile 610
TR - Turchia 609
KR - Corea 580
NL - Olanda 477
IE - Irlanda 419
FI - Finlandia 339
AT - Austria 331
SE - Svezia 330
CH - Svizzera 276
IN - India 255
BE - Belgio 217
CA - Canada 213
IL - Israele 212
CZ - Repubblica Ceca 211
HK - Hong Kong 204
JP - Giappone 157
ES - Italia 117
MX - Messico 114
VN - Vietnam 114
ID - Indonesia 94
PL - Polonia 86
RO - Romania 81
MY - Malesia 60
AU - Australia 59
BG - Bulgaria 57
GR - Grecia 48
IR - Iran 46
JO - Giordania 40
SN - Senegal 40
PK - Pakistan 37
AP - ???statistics.table.value.countryCode.AP??? 36
DK - Danimarca 36
EU - Europa 35
PH - Filippine 33
BD - Bangladesh 30
TW - Taiwan 30
AE - Emirati Arabi Uniti 29
PT - Portogallo 29
SA - Arabia Saudita 26
CI - Costa d'Avorio 24
HU - Ungheria 23
IQ - Iraq 23
ZA - Sudafrica 23
EC - Ecuador 22
EE - Estonia 22
GT - Guatemala 20
AL - Albania 18
AR - Argentina 17
EG - Egitto 17
LT - Lituania 17
ET - Etiopia 15
HR - Croazia 15
SC - Seychelles 15
UZ - Uzbekistan 15
CO - Colombia 14
LU - Lussemburgo 14
SI - Slovenia 14
GH - Ghana 13
MA - Marocco 13
TH - Thailandia 13
NG - Nigeria 12
UY - Uruguay 11
VE - Venezuela 11
CL - Cile 10
RS - Serbia 10
TN - Tunisia 10
BA - Bosnia-Erzegovina 9
BY - Bielorussia 8
MD - Moldavia 8
GE - Georgia 7
KZ - Kazakistan 7
NO - Norvegia 7
PY - Paraguay 7
YE - Yemen 7
KE - Kenya 6
LV - Lettonia 6
KG - Kirghizistan 5
KH - Cambogia 5
NP - Nepal 5
SK - Slovacchia (Repubblica Slovacca) 5
AZ - Azerbaigian 4
DZ - Algeria 4
LB - Libano 4
NZ - Nuova Zelanda 4
BF - Burkina Faso 3
CR - Costa Rica 3
HN - Honduras 3
LK - Sri Lanka 3
PA - Panama 3
UG - Uganda 3
AF - Afghanistan, Repubblica islamica di 2
Totale 51.349
Città #
Ashburn 4.698
Southend 3.241
Turin 1.791
Seattle 1.785
Boardman 1.202
Fairfield 1.174
Singapore 1.097
Chandler 1.016
Torino 893
Woodbridge 676
Ann Arbor 643
Milan 541
Houston 531
Princeton 513
Jacksonville 461
Beijing 456
Wilmington 449
Cambridge 431
Santa Clara 418
Dublin 380
San Ramon 361
Izmir 338
Berlin 326
Vienna 255
Rome 245
Bern 240
Helsinki 239
Dallas 228
San Donato Milanese 210
Hefei 198
Seoul 196
Chicago 180
Tongling 179
Brussels 178
Tel Aviv 178
Shanghai 166
Istanbul 164
Amsterdam 154
Des Moines 149
Zhengzhou 147
Council Bluffs 144
Saint Petersburg 134
Bologna 128
Zaporozhye 127
San Francisco 126
Brno 119
Fremont 118
Munich 115
Hong Kong 112
Baltimore 110
Redwood City 108
Pennsylvania Furnace 102
Overberg 91
Monopoli 89
Padua 79
Hangzhou 73
Changsha 71
Lecce 70
Columbus 69
Jakarta 68
San Jose 67
Guangzhou 66
Paris 66
Frankfurt am Main 64
Mountain View 64
San Diego 63
Frankfurt 62
Toronto 57
Los Angeles 56
Shenzhen 52
Borgosesia 50
Naples 50
Lappeenranta 48
Moscow 48
Malatya 47
Phoenix 46
Washington 46
Galati 45
Hanoi 45
London 45
São Paulo 44
Buffalo 43
Nuremberg 41
Atlanta 40
Kwai Chung 40
Herkenbosch 38
Madrid 38
Tokyo 38
Dearborn 37
Kraków 37
Overland Park 37
Cangzhou 36
New York 35
Palermo 35
Turku 35
Menlo Park 34
Ottawa 34
Prague 33
Norwalk 32
The Dalles 32
Totale 30.606
Nome #
Dependability in wireless networks: can we rely on WiFi? 2.203
Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT 2.023
Virtualized Security at the Network Edge: A User-centric Approach 665
Offloading personal security applications to a secure and trusted network node 618
Diagnosis Oriented Test Pattern Generation 572
Exploiting proxy-based federated identity management in wireless roaming access 569
Secure document management and distribution in an open network environment 561
Motivations for a theoretical approach to WYSIWYS 557
On the complexity of public-key certificate validation 557
Decentralised access control in 802.11 networks 553
A Formal Model of Network Policy Analysis 543
Anatomia del malware 542
Fighting e-mail abuses: the EMPE approach 534
Analysis of application-layer filtering policies with application to HTTP 521
A formal approach for network security policy validation 517
On the robustness of applications based on the SSL and TLS security protocols 505
Offloading security applications into the network 490
The trust problem in modern network infrastructures 484
Exploiting the network for securing personal devices 483
Federating e-identities across Europe, or how to build cross-border e-services 478
The ForwardDiffSig scheme for multicast authentication 472
Network-level access control policy analysis and transformation 466
The EuroPKI experience 461
Towards privacy-by-design peer-to-peer cloud computing 456
Inter-function anomaly analysis for correct SDN/NFV deployment 452
A novel approach for integrating security policy enforcement with dynamic network virtualization 433
A unified and flexible solution for integrating CRL and OCSP into PKI applications 430
Practical assessment of Biba integrity for TCG-enabled platforms 429
Inter-technology conflict analysis for communication protection policies 419
Improved reachability analysis for security management 418
Ontology-based policy translation 405
Classification and analysis of communication protection policy anomalies 402
Towards Automatic Risk Analysis and Mitigation of Software Applications 399
Building a trusted environment for security applications 384
An estimation of attack surface to evaluate network (in)security 365
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting 359
D7.1 - Project leaflet and portal 358
Algebraic Models to Detect and Solve Policy Conflicts 356
Security Plans for SaaS 356
Automatic (re)configuration of IT systems for dependability 354
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud 344
The Trusted Platform Agent 344
Assessing network authorization policies via reachability analysis 335
A generic overall framework for network security evaluation 330
Authentication 328
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 324
Online and offline security policy assessment 318
Security issues in control, management, and routing protocols 316
Privacy-by-design cloud computing through decentralization and real life trust 315
A flexible management framework for certificate status validation 313
A formal model of policy reconciliation 312
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 306
Ontology-based Security Policy Translation 304
A wireless distributed intrusion detection system and a new attack model 303
Digital certificates and public-key infrastructures 303
Security of 802.11 wireless networks 302
Incremental trust: building trust from past experience 302
Efficient and robust pseudonymous authentication in VANET 301
Trusted-Computing Technologies for the Protection of Critical Information Systems 300
The wireless opaque channel to contrast information leakage 300
Modern standard-based access control in network services: XACML in action 297
On scalability of remote attestation 293
Security issues in control, management and routing protocols 286
NFV-based network protection: the SHIELD approach 286
Public Key Infrastructure - theory and practice 281
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt 280
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment. 276
Automatic compaction of microcode 271
Trust in SDN/NFV environments 270
Towards Optimally Hiding Protected Assets in Software Applications 268
A Parallel Approach to Symbolic Traversal Based on Set Partitioning 265
FcgiOCSP: a scalable OCSP-based Certificate Validation System exploitingthe FastCGI interface 264
Geometric Interpretation of Policy Specification 263
PKI past, present and future 257
Synthesis of Power-Managed Sequential Components Based on Computational Kernel Extraction 257
On the performance of secure vehicular communication systems 257
Timed Supersetting and the Synthesis of Large Telescopic Units 256
Accurate entropy calculation for large logic circuits based on output clustering 253
POSITIF: un approccio olistico alla sicurezza basato su politiche formali 253
Sicurezza dei sistemi informativi 252
Harmonised security across devices (interview with Prof. Antonio Lioy) 250
Protezione dei sistemi informatici 248
Towards a Policy System for IPsec: issues and an experimental implementation 248
Test Generation for Gate Level Sequential Machines: Algorithms and Implementation Issues 248
Verso applicazioni concrete della firma digitale (II parte) 245
On the impossibility of effectively using likely-invariants for software attestation purposes 245
Exact Functional Redundancy Identification 241
Towards a Network-Independent Policy Specification 241
Testing Hyperactive Faults in Asynchronous Circuits 240
MagicNET: XACML authorization policies for mobile agents 240
On the establishment of trust in the cloud-based ETSI NFV framework 240
Why to adopt a security metric? A little survey 240
Efficient and Reliable Pseudonymous Authentication 239
Wireless security: current status and future evolution 237
An Algebraic Approach to Test Generation for Sequential Circuits 237
Security Policy System: status and perspective 236
Verso applicazioni concrete della firma digitale (I parte) 234
Data set and machine learning models for the classification of network traffic originators 234
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection 231
Towards concrete application of electronic signature 230
Totale 38.638
Categoria #
all - tutte 129.786
article - articoli 41.205
book - libri 0
conference - conferenze 69.453
curatela - curatele 1.925
other - altro 5.805
patent - brevetti 0
selected - selezionate 0
volume - volumi 11.398
Totale 259.572


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.697 0 0 277 399 216 358 331 292 202 277 239 106
2021/20222.800 148 146 136 138 131 151 155 150 169 222 738 516
2022/20233.944 292 599 159 403 335 525 359 219 383 80 211 379
2023/20242.323 182 153 191 147 190 270 128 157 90 177 322 316
2024/20257.673 154 735 327 914 471 523 505 770 990 461 790 1.033
2025/20262.260 911 682 667 0 0 0 0 0 0 0 0 0
Totale 51.860