BASILE, CATALDO
 Distribuzione geografica
Continente #
EU - Europa 7.018
NA - Nord America 5.660
AS - Asia 1.193
SA - Sud America 19
AF - Africa 14
OC - Oceania 11
Continente sconosciuto - Info sul continente non disponibili 2
Totale 13.917
Nazione #
US - Stati Uniti d'America 5.585
IT - Italia 2.877
GB - Regno Unito 1.393
FR - Francia 878
DE - Germania 824
CN - Cina 478
UA - Ucraina 247
SG - Singapore 236
TR - Turchia 163
RU - Federazione Russa 138
KR - Corea 101
IE - Irlanda 88
CH - Svizzera 77
SE - Svezia 75
IN - India 74
FI - Finlandia 73
BE - Belgio 72
CA - Canada 70
AT - Austria 68
NL - Olanda 60
ID - Indonesia 30
ES - Italia 28
CZ - Repubblica Ceca 24
JP - Giappone 24
HK - Hong Kong 21
BG - Bulgaria 19
IR - Iran 16
VN - Vietnam 15
GR - Grecia 10
JO - Giordania 10
RO - Romania 10
AU - Australia 9
PK - Pakistan 9
MY - Malesia 8
AP - ???statistics.table.value.countryCode.AP??? 7
CL - Cile 7
HR - Croazia 7
PL - Polonia 7
EE - Estonia 6
EC - Ecuador 5
LV - Lettonia 5
BR - Brasile 4
EU - Europa 4
IL - Israele 4
NO - Norvegia 4
CI - Costa d'Avorio 3
LT - Lituania 3
LU - Lussemburgo 3
PT - Portogallo 3
YE - Yemen 3
ZA - Sudafrica 3
AE - Emirati Arabi Uniti 2
DZ - Algeria 2
EG - Egitto 2
GT - Guatemala 2
MX - Messico 2
NZ - Nuova Zelanda 2
SY - Repubblica araba siriana 2
TN - Tunisia 2
TW - Taiwan 2
UY - Uruguay 2
CR - Costa Rica 1
KH - Cambogia 1
MM - Myanmar 1
MT - Malta 1
PE - Perù 1
SA - Arabia Saudita 1
SC - Seychelles 1
TG - Togo 1
TH - Thailandia 1
Totale 13.917
Città #
Ashburn 1.254
Southend 1.233
Turin 813
Torino 785
Seattle 447
Fairfield 413
Boardman 371
Chandler 309
Ann Arbor 270
Woodbridge 254
Houston 210
Singapore 179
Princeton 150
Cambridge 146
Wilmington 143
Santa Clara 131
Jacksonville 114
San Ramon 112
Izmir 101
Berlin 88
Dublin 85
Beijing 81
Shanghai 77
Des Moines 76
Milan 68
Bern 67
Brussels 66
Vienna 60
Helsinki 59
Rome 59
San Donato Milanese 52
Zhengzhou 51
Fremont 50
Istanbul 43
Saint Petersburg 42
San Francisco 37
Bologna 34
Zaporozhye 31
Jakarta 30
Mountain View 29
Hangzhou 28
Redwood City 28
Genoa 27
Ottawa 27
Buffalo 26
Baltimore 24
San Diego 23
Seoul 23
Chicago 21
Council Bluffs 21
London 21
Piscataway 21
Guangzhou 20
Pennsylvania Furnace 20
Monopoli 19
Palermo 19
San Jose 19
Bari 18
Brno 18
Dearborn 18
Genova 18
Toronto 18
Almese 17
Frankfurt 17
Parabita 17
Pinerolo 17
Malatya 16
Falls Church 15
Sofia 15
Norwalk 14
Washington 14
Amsterdam 13
Dallas 13
Frankfurt am Main 13
Hanoi 13
Moscow 13
Paris 13
Shenzhen 13
Wuhan 13
Cuneo 12
Lappeenranta 12
Overberg 12
Lurate Caccivio 11
Cagliari 10
Cupertino 10
Phoenix 10
Piossasco 10
Settimo Torinese 10
Tokyo 10
Atlanta 9
Ceglie Messapica 9
Chivasso 9
Hong Kong 9
Pianezza 9
Sacramento 9
San Mateo 9
Torricella 9
Andover 8
Austin 8
Cameri 8
Totale 9.546
Nome #
FPGA based remote code integrity verification of programs in distributed embedded systems 785
Virtualized Security at the Network Edge: A User-centric Approach 603
Assessment of Source Code Obfuscation Techniques 507
A Formal Model of Network Policy Analysis 504
Analysis of application-layer filtering policies with application to HTTP 481
Towards the Dynamic Provision of Virtualized Security Services 452
Network-level access control policy analysis and transformation 433
Inter-function anomaly analysis for correct SDN/NFV deployment 418
Improved reachability analysis for security management 393
A novel approach for integrating security policy enforcement with dynamic network virtualization 391
Towards a unified software attack model to assess software protections 387
Inter-technology conflict analysis for communication protection policies 381
Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems 379
Ontology-based policy translation 366
Towards Automatic Risk Analysis and Mitigation of Software Applications 365
Classification and analysis of communication protection policy anomalies 362
Algebraic Models to Detect and Solve Policy Conflicts 337
Automatic discovery of software attacks via backward reasoning 324
How Professional Hackers Understand Protected Code while Performing Attack Tasks 323
Assessing network authorization policies via reachability analysis 293
Estimating Software Obfuscation Potency with Artificial Neural Networks 289
A formal model of policy reconciliation 283
Ontology-based Security Policy Translation 275
Detection of conflicts in security policies 273
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks 262
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 261
Modern standard-based access control in network services: XACML in action 257
Geometric Interpretation of Policy Specification 242
Policy-driven system management 240
Towards Optimally Hiding Protected Assets in Software Applications 235
A reference architecture for software protection 234
POSITIF: un approccio olistico alla sicurezza basato su politiche formali 231
Integrating Deployment Techniques with Monitoring: The Proactive Configuration Checker (PCC) 231
Towards a Network-Independent Policy Specification 218
A meta-model for software protections and reverse engineering attacks 204
On the impossibility of effectively using likely-invariants for software attestation purposes 199
Empirical assessment of the effort needed to attack programs protected with client/server code splitting 188
Towards an algebraic approach to solve policy conflicts 184
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge 177
Data set and machine learning models for the classification of network traffic originators 176
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection 169
Toward Cybersecurity Personalization in Smart Homes 169
Remotely assessing integrity of software applications by monitoring invariants: Present limitations and future directions 153
A model of capabilities of Network Security Functions 92
An expert system for automatic cyber risk assessment and its AI-based improvements 92
A Model for Automated Cybersecurity Threat Remediation and Sharing 89
Enhancing OT Threat Modelling: An Effective Rule-Based Approach for Attack Graph Generation 80
Security at the Edge for Resource-Limited IoT Devices 64
A Threat Analysis of Cooperative Intelligent Transport Systems: C-Roads scenarios 37
Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based Approach 34
Totale 14.122
Categoria #
all - tutte 31.091
article - articoli 12.324
book - libri 0
conference - conferenze 16.738
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 2.029
Totale 62.182


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020838 0 0 0 0 0 151 125 179 166 81 65 71
2020/20211.242 112 129 63 111 109 113 209 103 70 103 87 33
2021/20221.011 58 43 49 43 54 53 89 57 51 108 250 156
2022/20231.139 85 190 57 144 103 139 120 55 101 7 43 95
2023/2024644 30 37 49 30 26 46 79 66 18 68 64 131
2024/2025942 46 233 94 361 127 81 0 0 0 0 0 0
Totale 14.122