VALENZA, FULVIO
 Distribuzione geografica
Continente #
AS - Asia 2.269
EU - Europa 2.242
NA - Nord America 1.015
AF - Africa 150
SA - Sud America 16
OC - Oceania 11
Continente sconosciuto - Info sul continente non disponibili 5
Totale 5.708
Nazione #
IT - Italia 1.321
IN - India 1.281
US - Stati Uniti d'America 923
ID - Indonesia 455
GB - Regno Unito 272
DE - Germania 121
PK - Pakistan 97
CZ - Repubblica Ceca 92
CA - Canada 83
JP - Giappone 81
CN - Cina 68
RU - Federazione Russa 67
IE - Irlanda 62
AT - Austria 50
ET - Etiopia 48
IR - Iran 43
FR - Francia 42
HK - Hong Kong 35
UA - Ucraina 32
KR - Corea 29
NL - Olanda 25
VN - Vietnam 23
NG - Nigeria 22
SE - Svezia 22
SG - Singapore 19
BD - Bangladesh 18
GR - Grecia 18
RO - Romania 18
FI - Finlandia 16
GH - Ghana 14
TW - Taiwan 13
BE - Belgio 12
CY - Cipro 11
TH - Thailandia 11
AU - Australia 10
ES - Italia 10
KE - Kenya 10
UG - Uganda 10
UZ - Uzbekistan 10
TR - Turchia 9
DK - Danimarca 8
IQ - Iraq 8
EU - Europa 7
HU - Ungheria 7
MX - Messico 7
SA - Arabia Saudita 7
TN - Tunisia 7
BG - Bulgaria 6
BR - Brasile 6
DZ - Algeria 6
LT - Lituania 6
PL - Polonia 6
SY - Repubblica araba siriana 6
EG - Egitto 5
IL - Israele 5
MA - Marocco 5
MM - Myanmar 5
NO - Norvegia 5
NP - Nepal 5
PH - Filippine 5
SD - Sudan 5
ZA - Sudafrica 5
CH - Svizzera 4
KZ - Kazakistan 4
LK - Sri Lanka 4
PE - Perù 4
YE - Yemen 4
ZW - Zimbabwe 4
LV - Lettonia 3
LY - Libia 3
PT - Portogallo 3
RS - Serbia 3
SK - Slovacchia (Repubblica Slovacca) 3
AE - Emirati Arabi Uniti 2
AF - Afghanistan, Repubblica islamica di 2
BW - Botswana 2
CL - Cile 2
CO - Colombia 2
JO - Giordania 2
MN - Mongolia 2
MY - Malesia 2
AL - Albania 1
AM - Armenia 1
AR - Argentina 1
AZ - Azerbaigian 1
BN - Brunei Darussalam 1
BZ - Belize 1
EC - Ecuador 1
LA - Repubblica Popolare Democratica del Laos 1
LS - Lesotho 1
ME - Montenegro 1
MT - Malta 1
NI - Nicaragua 1
NZ - Nuova Zelanda 1
SI - Slovenia 1
SO - Somalia 1
SZ - Regno dello Swaziland 1
TJ - Tagikistan 1
TZ - Tanzania 1
Totale 5.708
Città #
Jakarta 444
Turin 264
Southend 221
Torino 215
Bangalore 110
Gurgaon 91
Suri 77
Mumbai 75
Bengaluru 71
Ashburn 70
Kundan 60
Dublin 58
Padova 56
Houston 52
Islamabad 48
Milan 47
Valdagno 46
Delhi 44
Northvale 41
Hyderabad 39
Wilmington 38
Fairfield 37
Chennai 36
Ann Arbor 34
Kumar 34
Brno 32
Norwalk 32
Durham 30
Kolkata 30
Beijing 28
Cambridge 28
New Delhi 28
Seattle 27
Narzole 24
Chandler 21
Lake Forest 20
Ottawa 20
University Park 20
Cervasca 19
Vancouver 19
Palo Alto 18
Tokyo 18
Buffalo 17
Pune 17
Council Bluffs 16
Nocera Inferiore 16
Santa Cruz 16
Basking Ridge 15
Fremont 15
Helsinki 15
Karlsruhe 15
Racconigi 15
Singapore 15
Gorle 14
Bremen 13
Hartford 13
London 13
Vienna 13
Augusta 12
Hanoi 12
Mountain View 12
San Donato Milanese 12
San Michele Mondovì 12
Seoul 12
Biella 11
Los Angeles 11
San Diego 11
Chicago 10
Kochi 10
Mangalore 10
Taipei 10
Toronto 10
Cadoneghe 9
Carignano 9
Palermo 9
Rome 9
San Jose 9
Ceska 8
Oita 8
San Mateo 8
Alimena 7
Central 7
Collegno 7
Dearborn 7
Milazzo 7
Saint-Lambert 7
Seriate 7
Taganrog 7
Accra 6
Andover 6
Boardman 6
Calgary 6
Coimbatore 6
Dong Ket 6
Lagos 6
San Ramon 6
Tavagnasco 6
Woodbridge 6
Aosta 5
Bucharest 5
Totale 3.310
Nome #
Modelling and Analysis of Network Security Policies, file e384c42f-883a-d4b2-e053-9f05fe0a1d67 3.202
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c430-7912-d4b2-e053-9f05fe0a1d67 201
User-oriented Network Security Policy Specification, file e384c430-ba6d-d4b2-e053-9f05fe0a1d67 190
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c431-fe5f-d4b2-e053-9f05fe0a1d67 152
Improving the formal verification of reachability policies in virtualized networks, file e384c432-e938-d4b2-e053-9f05fe0a1d67 124
Securing SOME/IP for In-Vehicle Service Protection, file e384c432-78c9-d4b2-e053-9f05fe0a1d67 122
Towards a fully automated and optimized network security functions orchestration, file e384c431-7705-d4b2-e053-9f05fe0a1d67 120
Automated firewall configuration in virtual networks, file e384c434-95d9-d4b2-e053-9f05fe0a1d67 119
Inter-technology conflict analysis for communication protection policies, file e384c432-d3d9-d4b2-e053-9f05fe0a1d67 97
A comprehensive approach to the automatic refinement and verification of access control policies, file e384c431-d778-d4b2-e053-9f05fe0a1d67 94
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-a0a6-d4b2-e053-9f05fe0a1d67 89
Towards the Dynamic Provision of Virtualized Security Services, file e384c432-b378-d4b2-e053-9f05fe0a1d67 84
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions, file e384c431-3e17-d4b2-e053-9f05fe0a1d67 83
On the impossibility of effectively using likely-invariants for software attestation purposes, file e384c430-34d2-d4b2-e053-9f05fe0a1d67 81
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-7c62-d4b2-e053-9f05fe0a1d67 77
A novel approach for security function graph configuration and deployment, file e384c433-d411-d4b2-e053-9f05fe0a1d67 75
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb6-d4b2-e053-9f05fe0a1d67 73
A Framework for Verification-Oriented User-Friendly Network Function Modeling, file e384c430-f5fb-d4b2-e053-9f05fe0a1d67 67
Automatic discovery of software attacks via backward reasoning, file e384c432-ca65-d4b2-e053-9f05fe0a1d67 66
Automated Security Management for Virtual Services, file e384c431-6572-d4b2-e053-9f05fe0a1d67 65
Leveraging SDN To Improve Security in Industrial Networks, file e384c432-b56e-d4b2-e053-9f05fe0a1d67 65
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-a0ab-d4b2-e053-9f05fe0a1d67 60
(User-friendly) formal requirements verification in the context of ISO26262, file e384c432-1da9-d4b2-e053-9f05fe0a1d67 55
An optimized firewall anomaly resolution, file e384c432-26ae-d4b2-e053-9f05fe0a1d67 55
Toward attribute-based access control policy in industrial networked systems, file e384c431-cded-d4b2-e053-9f05fe0a1d67 46
Classification and analysis of communication protection policy anomalies, file e384c432-b558-d4b2-e053-9f05fe0a1d67 45
A Formal Model of Network Policy Analysis, file e384c432-d63e-d4b2-e053-9f05fe0a1d67 42
Toward Cybersecurity Personalization in Smart Homes, file e384c434-5c1d-d4b2-e053-9f05fe0a1d67 41
Security Automation using Traffic Flow Modeling, file 71db8946-473b-49ed-997a-b3eb9b1e8b6b 39
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-d454-d4b2-e053-9f05fe0a1d67 38
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems, file e384c432-7caf-d4b2-e053-9f05fe0a1d67 34
Assessing network authorization policies via reachability analysis, file e384c432-b559-d4b2-e053-9f05fe0a1d67 32
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2ed-d4b2-e053-9f05fe0a1d67 28
Automated Fixing of Access Policy Implementation in Industrial Networked Systems, file e384c432-c682-d4b2-e053-9f05fe0a1d67 23
Toward Cybersecurity Personalization in Smart Homes, file e384c434-6d4b-d4b2-e053-9f05fe0a1d67 22
A Model for the Analysis of Security Policies in Service Function Chains, file e384c432-d992-d4b2-e053-9f05fe0a1d67 21
Formally specifying and checking policies and anomalies in service function chaining, file e384c432-d388-d4b2-e053-9f05fe0a1d67 17
Online and offline security policy assessment, file e384c432-d997-d4b2-e053-9f05fe0a1d67 17
A hybrid threat model for smart systems, file 40fc9f5d-6a90-4ee3-a59b-a38158bfdf7b 16
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-6712-d4b2-e053-9f05fe0a1d67 13
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning, file e384c432-8c69-d4b2-e053-9f05fe0a1d67 10
A twofold model for VNF embedding and time-sensitive network flow scheduling, file e384c434-b22a-d4b2-e053-9f05fe0a1d67 10
Next Generation of Hybrid Threats, file 9b0042a8-4b9f-4610-b509-173324ed275a 9
Towards a fully automated and optimized network security functions orchestration, file e384c431-66b0-d4b2-e053-9f05fe0a1d67 9
A twofold model for VNF embedding and time-sensitive network flow scheduling, file e384c434-89f5-d4b2-e053-9f05fe0a1d67 9
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols, file f4a950d3-95fb-4a78-bcd8-a38866e61998 8
Improving the formal verification of reachability policies in virtualized networks, file e384c433-0c82-d4b2-e053-9f05fe0a1d67 6
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-d4a1-d4b2-e053-9f05fe0a1d67 6
Classification and analysis of communication protection policy anomalies, file e384c431-c9ed-d4b2-e053-9f05fe0a1d67 5
Inter-technology conflict analysis for communication protection policies, file e384c432-c039-d4b2-e053-9f05fe0a1d67 5
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-c349-d4b2-e053-9f05fe0a1d67 5
Automation for network security configuration: state of the art and research trends, file 33c319e2-99b7-40f8-bbad-b50a295cbc7f 4
An Optimized Approach for Assisted Firewall Anomaly Resolution, file 3a011aa7-3c1c-4d37-ab9b-e35ff63a32ea 4
Formally specifying and checking policies and anomalies in service function chaining, file e384c431-849e-d4b2-e053-9f05fe0a1d67 4
Leveraging SDN To Improve Security in Industrial Networks, file e384c431-849f-d4b2-e053-9f05fe0a1d67 4
Assessing network authorization policies via reachability analysis, file e384c431-867c-d4b2-e053-9f05fe0a1d67 4
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c432-5f61-d4b2-e053-9f05fe0a1d67 4
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-af52-d4b2-e053-9f05fe0a1d67 4
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-c395-d4b2-e053-9f05fe0a1d67 4
A Formal Model of Network Policy Analysis, file e384c432-d37e-d4b2-e053-9f05fe0a1d67 4
An Optimized Approach for Assisted Firewall Anomaly Resolution, file 1ba93240-fcaf-4cf1-8dd0-6002568f38f6 3
Automation for network security configuration: state of the art and research trends, file 560c63c5-0b9a-4cee-883f-7d62f2511edf 3
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c431-8682-d4b2-e053-9f05fe0a1d67 3
A Model for the Analysis of Security Policies in Service Function Chains, file e384c431-c816-d4b2-e053-9f05fe0a1d67 3
A comprehensive approach to the automatic refinement and verification of access control policies, file e384c432-2c3f-d4b2-e053-9f05fe0a1d67 3
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-3478-d4b2-e053-9f05fe0a1d67 3
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2eb-d4b2-e053-9f05fe0a1d67 3
Online and offline security policy assessment, file e384c432-a2f6-d4b2-e053-9f05fe0a1d67 3
Towards the Dynamic Provision of Virtualized Security Services, file e384c432-b379-d4b2-e053-9f05fe0a1d67 3
Towards Security Automation in Virtual Networks, file 140de8ab-b9de-4edf-af0c-510d5cc9c17e 2
Formal verification of the FDO protocol, file 1db6e18d-c75a-461b-ac49-19169c0b6ba8 2
Optimizing distributed firewall reconfiguration transients, file 89619f4e-a365-488d-b5c0-bb06f7ff13ff 2
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file c4e8d61a-4ce5-480d-9769-d16f0409c4bd 2
Security Automation using Traffic Flow Modeling, file d63aa0d2-dd2e-4f3f-a5f9-8099f9a2a660 2
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management, file ded47a37-1bc4-4a3c-a865-8b1110eaa99f 2
Automated Fixing of Access Policy Implementation in Industrial Networked Systems, file e384c432-b4ba-d4b2-e053-9f05fe0a1d67 2
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb5-d4b2-e053-9f05fe0a1d67 2
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems, file e384c433-7246-d4b2-e053-9f05fe0a1d67 2
Securing SOME/IP for In-Vehicle Service Protection, file e384c433-f2a8-d4b2-e053-9f05fe0a1d67 2
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 4ea0c5d6-2c43-41c3-b9b5-40f32ea58b09 1
Security automation for multi-cluster orchestration in Kubernetes, file 72d96cb6-eb18-48cd-a631-5238e4934df7 1
Towards Security Automation in Virtual Networks, file 7fc94ed1-0c9a-4df5-8c00-48444b10f4de 1
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 80477350-e367-4c3f-b3f2-51e77f69d37e 1
A novel abstraction for security configuration in virtual networks, file 858f6a8f-8e1f-4122-835b-8c12c83a509d 1
A hybrid threat model for smart systems, file 892d9d8d-dc35-4aa4-9a37-4c78815cfa8c 1
Security automation for multi-cluster orchestration in Kubernetes, file 984ea291-b990-4127-9bb1-a2af5dc6d946 1
Automating the configuration of firewalls and channel protection systems in virtual networks, file 9db1cd12-b012-4824-8020-6d08036b1a67 1
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file b0a926fc-d210-4d66-b239-d0e29014727e 1
Automating the configuration of firewalls and channel protection systems in virtual networks, file d2bac964-c7fd-4116-903f-fb08117d736c 1
Automatic Firewalls’ Configuration Using Argumentation Reasoning, file e03932ab-b4b4-4044-adfb-93f48d47c109 1
Toward attribute-based access control policy in industrial networked systems, file e384c431-d773-d4b2-e053-9f05fe0a1d67 1
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems, file e384c432-5ad8-d4b2-e053-9f05fe0a1d67 1
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning, file e384c432-78f5-d4b2-e053-9f05fe0a1d67 1
Automatic discovery of software attacks via backward reasoning, file e384c432-ca66-d4b2-e053-9f05fe0a1d67 1
A novel approach for security function graph configuration and deployment, file e384c433-d410-d4b2-e053-9f05fe0a1d67 1
Totale 6.071
Categoria #
all - tutte 8.612
article - articoli 2.930
book - libri 0
conference - conferenze 2.122
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 155
Totale 13.819


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201981 0 0 0 0 0 0 0 0 0 0 31 50
2019/20201.736 127 161 123 159 161 200 223 198 168 79 61 76
2020/20211.351 67 108 56 78 105 70 206 139 140 130 135 117
2021/20221.212 66 66 111 139 124 133 123 117 87 97 76 73
2022/20231.158 99 74 102 85 103 97 124 179 149 65 80 1
2023/2024123 1 13 0 13 17 13 11 32 3 11 9 0
Totale 6.071