LIOY, ANTONIO
 Distribuzione geografica
Continente #
EU - Europa 21.919
NA - Nord America 18.703
AS - Asia 4.230
SA - Sud America 264
AF - Africa 163
OC - Oceania 57
Continente sconosciuto - Info sul continente non disponibili 10
Totale 45.346
Nazione #
US - Stati Uniti d'America 18.425
IT - Italia 6.896
GB - Regno Unito 3.723
DE - Germania 3.564
FR - Francia 3.053
CN - Cina 1.318
UA - Ucraina 1.009
SG - Singapore 873
RU - Federazione Russa 659
TR - Turchia 601
NL - Olanda 436
IE - Irlanda 394
KR - Corea 375
SE - Svezia 323
FI - Finlandia 294
CH - Svizzera 272
AT - Austria 249
IN - India 228
BR - Brasile 222
BE - Belgio 215
CZ - Repubblica Ceca 203
IL - Israele 203
CA - Canada 181
HK - Hong Kong 104
JP - Giappone 103
ES - Italia 98
ID - Indonesia 91
RO - Romania 78
PL - Polonia 67
MX - Messico 66
MY - Malesia 57
AU - Australia 54
BG - Bulgaria 49
IR - Iran 45
GR - Grecia 44
SN - Senegal 40
AP - ???statistics.table.value.countryCode.AP??? 36
JO - Giordania 36
EU - Europa 35
DK - Danimarca 34
PK - Pakistan 34
VN - Vietnam 34
TW - Taiwan 26
AE - Emirati Arabi Uniti 24
CI - Costa d'Avorio 24
PH - Filippine 23
EE - Estonia 21
GT - Guatemala 20
HU - Ungheria 18
LU - Lussemburgo 14
ZA - Sudafrica 14
GH - Ghana 13
HR - Croazia 13
LT - Lituania 13
SA - Arabia Saudita 13
SC - Seychelles 13
SI - Slovenia 13
TH - Thailandia 13
AL - Albania 12
ET - Etiopia 12
IQ - Iraq 11
NG - Nigeria 11
PT - Portogallo 10
BA - Bosnia-Erzegovina 9
CL - Cile 9
CO - Colombia 9
EC - Ecuador 9
EG - Egitto 9
BD - Bangladesh 8
MA - Marocco 8
MD - Moldavia 8
RS - Serbia 8
UZ - Uzbekistan 8
BY - Bielorussia 7
TN - Tunisia 7
UY - Uruguay 7
GE - Georgia 6
LV - Lettonia 6
NO - Norvegia 5
KZ - Kazakistan 4
SK - Slovacchia (Repubblica Slovacca) 4
AR - Argentina 3
DZ - Algeria 3
NP - Nepal 3
NZ - Nuova Zelanda 3
UG - Uganda 3
VE - Venezuela 3
AF - Afghanistan, Repubblica islamica di 2
AM - Armenia 2
AZ - Azerbaigian 2
BT - Bhutan 2
CR - Costa Rica 2
KE - Kenya 2
KH - Cambogia 2
MM - Myanmar 2
PA - Panama 2
QA - Qatar 2
TJ - Tagikistan 2
ZW - Zimbabwe 2
DO - Repubblica Dominicana 1
Totale 45.326
Città #
Ashburn 4.432
Southend 3.241
Seattle 1.781
Turin 1.669
Boardman 1.191
Fairfield 1.174
Chandler 1.016
Torino 893
Woodbridge 675
Ann Arbor 643
Houston 530
Princeton 513
Singapore 503
Milan 469
Jacksonville 460
Wilmington 449
Cambridge 430
Santa Clara 408
San Ramon 361
Dublin 355
Izmir 338
Berlin 326
Beijing 309
Bern 240
Vienna 238
Helsinki 235
Rome 211
San Donato Milanese 210
Tel Aviv 178
Brussels 176
Chicago 168
Istanbul 161
Shanghai 153
Des Moines 148
Zhengzhou 144
Saint Petersburg 134
Amsterdam 130
Zaporozhye 127
Bologna 124
Brno 119
Fremont 118
San Francisco 115
Council Bluffs 111
Baltimore 110
Redwood City 108
Pennsylvania Furnace 102
Overberg 91
Monopoli 89
Padua 79
Hangzhou 72
Lecce 70
Jakarta 68
San Jose 65
Mountain View 64
Changsha 63
San Diego 63
Frankfurt 62
Paris 61
Toronto 56
Guangzhou 54
Borgosesia 50
Seoul 50
Naples 48
Shenzhen 48
Malatya 47
Columbus 46
Frankfurt am Main 46
Galati 45
Moscow 45
Lappeenranta 42
Phoenix 41
Kwai Chung 40
Washington 40
Atlanta 39
Herkenbosch 38
London 38
Madrid 38
Dearborn 37
Kraków 37
Overland Park 37
Menlo Park 34
Ottawa 34
Palermo 34
Buffalo 32
Norwalk 32
Prague 31
Andover 28
Genoa 28
Sofia 28
Wuhan 28
Florence 27
Melun 27
Munich 27
Nanjing 27
Kansas City 26
Austin 25
New York 25
Madurai 24
Osaka 24
Cupertino 23
Totale 28.099
Nome #
Dependability in wireless networks: can we rely on WiFi? 1.960
Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT 1.727
Virtualized Security at the Network Edge: A User-centric Approach 609
Offloading personal security applications to a secure and trusted network node 571
Diagnosis Oriented Test Pattern Generation 548
Exploiting proxy-based federated identity management in wireless roaming access 538
Secure document management and distribution in an open network environment 531
On the complexity of public-key certificate validation 531
Decentralised access control in 802.11 networks 526
Motivations for a theoretical approach to WYSIWYS 523
Fighting e-mail abuses: the EMPE approach 512
A Formal Model of Network Policy Analysis 512
Anatomia del malware 510
Analysis of application-layer filtering policies with application to HTTP 488
On the robustness of applications based on the SSL and TLS security protocols 486
A formal approach for network security policy validation 478
The trust problem in modern network infrastructures 457
Offloading security applications into the network 454
Exploiting the network for securing personal devices 448
The ForwardDiffSig scheme for multicast authentication 442
The EuroPKI experience 438
Network-level access control policy analysis and transformation 437
Federating e-identities across Europe, or how to build cross-border e-services 435
Towards privacy-by-design peer-to-peer cloud computing 432
Inter-function anomaly analysis for correct SDN/NFV deployment 430
A unified and flexible solution for integrating CRL and OCSP into PKI applications 409
A novel approach for integrating security policy enforcement with dynamic network virtualization 407
Improved reachability analysis for security management 396
Inter-technology conflict analysis for communication protection policies 395
Practical assessment of Biba integrity for TCG-enabled platforms 393
Ontology-based policy translation 376
Classification and analysis of communication protection policy anomalies 370
Towards Automatic Risk Analysis and Mitigation of Software Applications 368
Building a trusted environment for security applications 353
An estimation of attack surface to evaluate network (in)security 343
Algebraic Models to Detect and Solve Policy Conflicts 339
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting 338
Automatic (re)configuration of IT systems for dependability 330
Security Plans for SaaS 328
D7.1 - Project leaflet and portal 323
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud 309
A generic overall framework for network security evaluation 309
Authentication 305
Assessing network authorization policies via reachability analysis 302
Security issues in control, management, and routing protocols 298
The Trusted Platform Agent 297
Online and offline security policy assessment 293
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 293
Privacy-by-design cloud computing through decentralization and real life trust 289
A flexible management framework for certificate status validation 288
A formal model of policy reconciliation 285
Efficient and robust pseudonymous authentication in VANET 284
Digital certificates and public-key infrastructures 284
Incremental trust: building trust from past experience 282
A wireless distributed intrusion detection system and a new attack model 280
The wireless opaque channel to contrast information leakage 280
Ontology-based Security Policy Translation 278
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 271
Trusted-Computing Technologies for the Protection of Critical Information Systems 266
Modern standard-based access control in network services: XACML in action 265
On scalability of remote attestation 263
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt 262
Public Key Infrastructure - theory and practice 257
Security of 802.11 wireless networks 257
Automatic compaction of microcode 255
Security issues in control, management and routing protocols 254
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment. 254
Trust in SDN/NFV environments 248
NFV-based network protection: the SHIELD approach 247
Geometric Interpretation of Policy Specification 244
Towards Optimally Hiding Protected Assets in Software Applications 242
POSITIF: un approccio olistico alla sicurezza basato su politiche formali 237
FcgiOCSP: a scalable OCSP-based Certificate Validation System exploitingthe FastCGI interface 237
Synthesis of Power-Managed Sequential Components Based on Computational Kernel Extraction 237
On the performance of secure vehicular communication systems 236
PKI past, present and future 234
Accurate entropy calculation for large logic circuits based on output clustering 234
A Parallel Approach to Symbolic Traversal Based on Set Partitioning 233
Timed Supersetting and the Synthesis of Large Telescopic Units 232
Protezione dei sistemi informatici 228
Test Generation for Gate Level Sequential Machines: Algorithms and Implementation Issues 228
Towards a Policy System for IPsec: issues and an experimental implementation 226
Harmonised security across devices (interview with Prof. Antonio Lioy) 226
Sicurezza dei sistemi informativi 225
An Algebraic Approach to Test Generation for Sequential Circuits 222
Wireless security: current status and future evolution 221
Testing Hyperactive Faults in Asynchronous Circuits 221
Exact Functional Redundancy Identification 220
Efficient and Reliable Pseudonymous Authentication 220
Why to adopt a security metric? A little survey 220
Towards a Network-Independent Policy Specification 220
Verso applicazioni concrete della firma digitale (II parte) 219
MagicNET: XACML authorization policies for mobile agents 218
Security Policy System: status and perspective 217
On the establishment of trust in the cloud-based ETSI NFV framework 215
On the impossibility of effectively using likely-invariants for software attestation purposes 213
Verso applicazioni concrete della firma digitale (I parte) 212
Security aspects in standard certificate revocation mechanisms: a case study for OCSP 211
Trust, Privacy and Security in Digital Business 210
A Hierarchical Multi-Level Test Generation System 209
Totale 35.513
Categoria #
all - tutte 111.625
article - articoli 35.268
book - libri 0
conference - conferenze 59.554
curatela - curatele 1.705
other - altro 5.031
patent - brevetti 0
selected - selezionate 0
volume - volumi 10.067
Totale 223.250


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.712 0 0 0 0 0 0 0 510 571 304 159 168
2020/20213.650 383 570 277 399 216 358 331 292 202 277 239 106
2021/20222.800 148 146 136 138 131 151 155 150 169 222 738 516
2022/20233.944 292 599 159 403 335 525 359 219 383 80 211 379
2023/20242.323 182 153 191 147 190 270 128 157 90 177 322 316
2024/20253.873 154 735 327 914 471 523 505 244 0 0 0 0
Totale 45.800