VALENZA, FULVIO
 Distribuzione geografica
Continente #
EU - Europa 5.725
NA - Nord America 5.621
AS - Asia 3.494
SA - Sud America 379
AF - Africa 76
OC - Oceania 14
Continente sconosciuto - Info sul continente non disponibili 3
Totale 15.312
Nazione #
US - Stati Uniti d'America 5.519
IT - Italia 2.727
SG - Singapore 1.407
GB - Regno Unito 965
CN - Cina 964
DE - Germania 537
FR - Francia 493
BR - Brasile 317
KR - Corea 222
HK - Hong Kong 177
VN - Vietnam 157
BE - Belgio 153
TR - Turchia 141
FI - Finlandia 135
UA - Ucraina 126
IE - Irlanda 124
RU - Federazione Russa 104
ID - Indonesia 75
CA - Canada 74
IN - India 74
CH - Svizzera 61
AT - Austria 56
NL - Olanda 56
SE - Svezia 46
ES - Italia 35
JP - Giappone 33
IL - Israele 30
PK - Pakistan 27
UZ - Uzbekistan 27
TW - Taiwan 26
EG - Egitto 24
IR - Iran 24
AR - Argentina 22
BD - Bangladesh 18
IQ - Iraq 18
MY - Malesia 17
GR - Grecia 16
JO - Giordania 15
MX - Messico 15
BG - Bulgaria 14
ZA - Sudafrica 14
EC - Ecuador 13
CZ - Repubblica Ceca 11
SA - Arabia Saudita 10
AU - Australia 9
PL - Polonia 8
DZ - Algeria 7
MA - Marocco 7
PH - Filippine 7
RO - Romania 7
CO - Colombia 6
PT - Portogallo 6
UY - Uruguay 6
VE - Venezuela 6
AL - Albania 5
BY - Bielorussia 5
CL - Cile 5
CY - Cipro 5
HR - Croazia 5
NZ - Nuova Zelanda 5
TH - Thailandia 5
TN - Tunisia 5
CI - Costa d'Avorio 4
DK - Danimarca 4
AE - Emirati Arabi Uniti 3
EE - Estonia 3
ET - Etiopia 3
GE - Georgia 3
JM - Giamaica 3
KE - Kenya 3
KG - Kirghizistan 3
KZ - Kazakistan 3
LT - Lituania 3
LU - Lussemburgo 3
LV - Lettonia 3
ML - Mali 3
NG - Nigeria 3
PE - Perù 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AZ - Azerbaigian 2
BA - Bosnia-Erzegovina 2
HN - Honduras 2
KH - Cambogia 2
LB - Libano 2
NO - Norvegia 2
SC - Seychelles 2
SK - Slovacchia (Repubblica Slovacca) 2
SV - El Salvador 2
BB - Barbados 1
BH - Bahrain 1
BS - Bahamas 1
CR - Costa Rica 1
DO - Repubblica Dominicana 1
EU - Europa 1
KY - Cayman, isole 1
LY - Libia 1
NP - Nepal 1
OM - Oman 1
PA - Panama 1
PY - Paraguay 1
Totale 15.310
Città #
Turin 1.008
Southend 817
Singapore 804
Ashburn 797
Dallas 442
Chandler 399
Torino 372
Boardman 352
Santa Clara 210
Ann Arbor 208
Beijing 180
Milan 172
Houston 171
Council Bluffs 169
Seattle 151
Brussels 149
Fairfield 148
Hong Kong 143
Princeton 142
Seoul 136
Woodbridge 127
Dublin 119
Hefei 111
Wilmington 107
Berlin 91
Helsinki 83
Tongling 69
Istanbul 65
Jakarta 64
Izmir 61
Cambridge 59
Ho Chi Minh City 59
Rome 58
Fremont 55
Bern 49
Jacksonville 49
Vienna 43
Lappeenranta 40
Los Angeles 39
San Ramon 39
Hanoi 37
San Donato Milanese 36
Frankfurt am Main 35
Des Moines 34
Nuremberg 33
Buffalo 32
Falls Church 31
Amsterdam 28
Palermo 27
São Paulo 26
New York 24
Tokyo 23
Shanghai 21
Toronto 21
Hangzhou 20
Padova 20
Redondo Beach 20
Chicago 18
Alpignano 17
Cangzhou 17
Columbus 16
Livorno Ferraris 16
Nanjing 16
Islamabad 15
London 15
Redwood City 15
The Dalles 15
Barcelona 14
Montréal 14
Tashkent 14
Tel Aviv 14
Washington 14
Yubileyny 14
Zhengzhou 14
Biella 13
Brooklyn 13
Rio de Janeiro 13
Bremen 12
Dearborn 12
Mcallen 12
Menlo Park 12
Piossasco 12
Piscataway 12
Sofia 12
Bologna 11
Cameri 11
Ottawa 11
Pinerolo 11
Porto Alegre 11
San Antonio 11
Savigliano 11
Settimo Milanese 11
Al Mansurah 10
Atlanta 10
Cervasca 10
Chennai 10
Cuneo 10
Da Nang 10
Frankfurt 10
Guangzhou 10
Totale 9.374
Nome #
Modelling and Analysis of Network Security Policies 583
A Formal Model of Network Policy Analysis 561
A formal approach for network security policy validation 539
Towards the Dynamic Provision of Virtualized Security Services 516
Inter-function anomaly analysis for correct SDN/NFV deployment 470
A novel approach for integrating security policy enforcement with dynamic network virtualization 447
Inter-technology conflict analysis for communication protection policies 433
Classification and analysis of communication protection policy anomalies 430
Automatic discovery of software attacks via backward reasoning 372
Leveraging SDN To Improve Security in Industrial Networks 358
Assessing network authorization policies via reachability analysis 352
Automated firewall configuration in virtual networks 330
Online and offline security policy assessment 329
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 327
(User-friendly) formal requirements verification in the context of ISO26262 299
Automated Fixing of Access Policy Implementation in Industrial Networked Systems 295
On the impossibility of effectively using likely-invariants for software attestation purposes 261
A Model for the Analysis of Security Policies in Service Function Chains 260
Securing SOME/IP for In-Vehicle Service Protection 260
Towards a fully automated and optimized network security functions orchestration 247
A comprehensive approach to the automatic refinement and verification of access control policies 234
Improving the formal verification of reachability policies in virtualized networks 224
Automation for network security configuration: state of the art and research trends 223
Toward Cybersecurity Personalization in Smart Homes 222
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions 220
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols 212
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks 203
Automated optimal firewall orchestration and configuration in virtualized networks 196
Automatic and optimized firewall reconfiguration 195
Autonomous attack mitigation through firewall reconfiguration 190
A novel abstraction for security configuration in virtual networks 190
Automating VPN Configuration in Computer Networks 188
An optimized firewall anomaly resolution 186
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks 179
A novel approach for security function graph configuration and deployment 178
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks 178
An intent-based solution for network isolation in Kubernetes 176
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware 175
Introducing programmability and automation in the synthesis of virtual firewall rules 174
Improvements in the transmission of data or messages on board a vehicle by means of a SOME/IP communication protocol 169
Perfezionamenti nella trasmissione di dati o messaggi a bordo di un veicolo mediante un protocollo di comunicazione SOME/IP 163
User-oriented Network Security Policy Specification 159
Toward attribute-based access control policy in industrial networked systems 159
A demonstration of VEREFOO: an automated framework for virtual firewall configuration 155
Security Automation in next-generation Networks and Cloud environments 153
Formally specifying and checking policies and anomalies in service function chaining 153
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif 151
A Framework for Verification-Oriented User-Friendly Network Function Modeling 150
Atomizing Firewall Policies for Anomaly Analysis and Resolution 144
A Two-Fold Traffic Flow Model for Network Security Management 142
Formal verification of the FDO protocol 140
Security Automation using Traffic Flow Modeling 138
A twofold model for VNF embedding and time-sensitive network flow scheduling 138
A demonstration of a network isolation solution for the computing continuum 136
Security automation for multi-cluster orchestration in Kubernetes 136
A looping process for cyberattack mitigation 133
Optimizing distributed firewall reconfiguration transients 129
Towards Security Automation in Virtual Networks 125
Automating the configuration of firewalls and channel protection systems in virtual networks 123
Automated Security Management for Virtual Services 122
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems 112
Toward the Optimization of Automated VPN Configuration 100
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems 99
Design and implementation of a tool to improve error reporting for eBPF code 98
Formal verification of a V2X scheme mixing traditional PKI and group signatures 97
Adaptive, Agile and Automated Cybersecurity Management 97
Analysis of the eBPF Vulnerabilities in the Linux Kernel 96
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning 96
An Optimized Approach for Assisted Firewall Anomaly Resolution 92
A demonstration of an autonomous approach for cyberattack mitigation 91
GreenShield: Optimizing Firewall Configuration for Sustainable Networks 89
Intent-driven network isolation for the cloud computing continuum 88
A hybrid threat model for smart systems 86
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management 64
Automatic Firewalls’ Configuration Using Argumentation Reasoning 63
Next Generation of Hybrid Threats 56
Toward Correctness by Construction for Network Security Configuration 22
Totale 15.876
Categoria #
all - tutte 44.430
article - articoli 21.701
book - libri 0
conference - conferenze 18.778
curatela - curatele 0
other - altro 0
patent - brevetti 1.120
selected - selezionate 0
volume - volumi 1.636
Totale 87.665


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021940 0 0 0 0 0 131 273 215 72 111 97 41
2021/20221.018 54 70 85 65 74 57 44 48 86 87 167 181
2022/20231.533 122 206 90 174 178 162 100 79 133 58 93 138
2023/20241.127 44 130 99 95 96 111 79 102 59 64 78 170
2024/20253.738 53 320 190 390 204 269 408 515 411 232 340 406
2025/20263.088 485 324 698 770 583 228 0 0 0 0 0 0
Totale 15.876