VALENZA, FULVIO
 Distribuzione geografica
Continente #
EU - Europa 6.938
NA - Nord America 6.618
AS - Asia 6.127
SA - Sud America 488
AF - Africa 111
OC - Oceania 15
Continente sconosciuto - Info sul continente non disponibili 3
Totale 20.300
Nazione #
US - Stati Uniti d'America 6.483
IT - Italia 3.017
SG - Singapore 1.710
VN - Vietnam 1.581
CN - Cina 1.103
GB - Regno Unito 987
RU - Federazione Russa 712
FR - Francia 587
DE - Germania 562
HK - Hong Kong 513
BR - Brasile 393
KR - Corea 321
IN - India 174
FI - Finlandia 165
BE - Belgio 156
TR - Turchia 143
UA - Ucraina 134
IE - Irlanda 127
CA - Canada 88
ID - Indonesia 83
PT - Portogallo 83
JP - Giappone 67
NL - Olanda 66
AT - Austria 64
CH - Svizzera 64
PH - Filippine 54
TW - Taiwan 51
SE - Svezia 48
TH - Thailandia 41
ES - Italia 39
BD - Bangladesh 38
IQ - Iraq 37
PK - Pakistan 33
AR - Argentina 32
UZ - Uzbekistan 32
IL - Israele 31
EG - Egitto 27
IR - Iran 25
MX - Messico 25
EC - Ecuador 19
GR - Grecia 19
JO - Giordania 19
ZA - Sudafrica 19
MY - Malesia 18
SA - Arabia Saudita 16
BG - Bulgaria 15
CO - Colombia 13
CZ - Repubblica Ceca 13
PL - Polonia 13
TN - Tunisia 12
AU - Australia 10
DZ - Algeria 10
MA - Marocco 9
PE - Perù 8
UY - Uruguay 8
AL - Albania 7
CL - Cile 7
CY - Cipro 7
RO - Romania 7
AE - Emirati Arabi Uniti 6
BY - Bielorussia 6
CI - Costa d'Avorio 6
ET - Etiopia 6
LT - Lituania 6
VE - Venezuela 6
DK - Danimarca 5
HR - Croazia 5
KE - Kenya 5
NZ - Nuova Zelanda 5
GE - Georgia 4
HN - Honduras 4
JM - Giamaica 4
KZ - Kazakistan 4
LB - Libano 4
ML - Mali 4
NP - Nepal 4
AZ - Azerbaigian 3
CR - Costa Rica 3
EE - Estonia 3
KG - Kirghizistan 3
LU - Lussemburgo 3
LV - Lettonia 3
NG - Nigeria 3
SI - Slovenia 3
SK - Slovacchia (Repubblica Slovacca) 3
A2 - ???statistics.table.value.countryCode.A2??? 2
BA - Bosnia-Erzegovina 2
HU - Ungheria 2
KH - Cambogia 2
LY - Libia 2
MT - Malta 2
NO - Norvegia 2
PA - Panama 2
PR - Porto Rico 2
SC - Seychelles 2
SV - El Salvador 2
SY - Repubblica araba siriana 2
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
Totale 20.283
Città #
Turin 1.106
Singapore 1.069
Ashburn 905
Southend 817
Dallas 444
Hong Kong 444
Ho Chi Minh City 405
Chandler 399
Hanoi 386
Torino 372
Boardman 361
San Jose 270
Santa Clara 218
Seoul 216
Ann Arbor 208
Milan 205
Hefei 192
Council Bluffs 190
Beijing 185
Houston 174
Los Angeles 169
Brussels 151
Seattle 151
Fairfield 148
Princeton 142
Woodbridge 127
Dublin 122
Moscow 110
Wilmington 107
Helsinki 105
Berlin 91
Lisbon 78
Lauterbourg 73
Tongling 69
Istanbul 65
Da Nang 64
Haiphong 64
Jakarta 64
Rome 64
Izmir 61
Cambridge 59
Fremont 55
Vienna 51
Venaria Reale 50
Bern 49
Jacksonville 49
New York 49
Frankfurt am Main 45
Lappeenranta 44
Buffalo 41
San Ramon 39
Nuremberg 36
San Donato Milanese 36
Amsterdam 35
Des Moines 34
São Paulo 33
Tokyo 33
Falls Church 31
Toronto 28
Palermo 27
Alessandria 23
Savigliano 23
Shanghai 23
Chicago 21
The Dalles 21
Columbus 20
Hangzhou 20
Padova 20
Redondo Beach 20
Hải Dương 19
Baghdad 18
Bangkok 18
London 18
Tashkent 18
Alpignano 17
Cangzhou 17
Livorno Ferraris 16
Nanjing 16
Biên Hòa 15
Islamabad 15
Munich 15
Redwood City 15
Tel Aviv 15
Zhengzhou 15
Barcelona 14
Brooklyn 14
Montréal 14
Piscataway 14
Rio de Janeiro 14
Washington 14
Yubileyny 14
Biella 13
Chennai 13
Johannesburg 13
Orem 13
Taichung 13
Atlanta 12
Bremen 12
Can Tho 12
Dearborn 12
Totale 12.064
Nome #
Modelling and Analysis of Network Security Policies 686
A Formal Model of Network Policy Analysis 623
A formal approach for network security policy validation 607
Towards the Dynamic Provision of Virtualized Security Services 571
Inter-function anomaly analysis for correct SDN/NFV deployment 532
A novel approach for integrating security policy enforcement with dynamic network virtualization 518
Classification and analysis of communication protection policy anomalies 499
Inter-technology conflict analysis for communication protection policies 488
Leveraging SDN To Improve Security in Industrial Networks 444
Automated firewall configuration in virtual networks 434
Automatic discovery of software attacks via backward reasoning 422
Assessing network authorization policies via reachability analysis 406
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 396
Online and offline security policy assessment 383
Automated Fixing of Access Policy Implementation in Industrial Networked Systems 359
(User-friendly) formal requirements verification in the context of ISO26262 356
Towards a fully automated and optimized network security functions orchestration 330
Securing SOME/IP for In-Vehicle Service Protection 325
On the impossibility of effectively using likely-invariants for software attestation purposes 316
A comprehensive approach to the automatic refinement and verification of access control policies 307
A Model for the Analysis of Security Policies in Service Function Chains 303
Automation for network security configuration: state of the art and research trends 292
Automatic and optimized firewall reconfiguration 291
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions 290
Automated optimal firewall orchestration and configuration in virtualized networks 285
Autonomous attack mitigation through firewall reconfiguration 282
Improving the formal verification of reachability policies in virtualized networks 280
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols 266
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks 264
A novel abstraction for security configuration in virtual networks 263
Toward Cybersecurity Personalization in Smart Homes 263
Automating VPN Configuration in Computer Networks 251
An intent-based solution for network isolation in Kubernetes 248
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks 241
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware 238
A novel approach for security function graph configuration and deployment 237
A demonstration of a network isolation solution for the computing continuum 235
Atomizing Firewall Policies for Anomaly Analysis and Resolution 233
An optimized firewall anomaly resolution 233
Introducing programmability and automation in the synthesis of virtual firewall rules 230
A demonstration of VEREFOO: an automated framework for virtual firewall configuration 224
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks 219
Security Automation in next-generation Networks and Cloud environments 218
Improvements in the transmission of data or messages on board a vehicle by means of a SOME/IP communication protocol 217
Perfezionamenti nella trasmissione di dati o messaggi a bordo di un veicolo mediante un protocollo di comunicazione SOME/IP 212
A Two-Fold Traffic Flow Model for Network Security Management 211
Formally specifying and checking policies and anomalies in service function chaining 211
A looping process for cyberattack mitigation 209
Toward attribute-based access control policy in industrial networked systems 207
User-oriented Network Security Policy Specification 205
Formal verification of the FDO protocol 197
A twofold model for VNF embedding and time-sensitive network flow scheduling 197
Optimizing distributed firewall reconfiguration transients 196
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif 193
Security automation for multi-cluster orchestration in Kubernetes 189
A Framework for Verification-Oriented User-Friendly Network Function Modeling 187
Automated Security Management for Virtual Services 187
Security Automation using Traffic Flow Modeling 181
Intent-driven network isolation for the cloud computing continuum 177
Adaptive, Agile and Automated Cybersecurity Management 169
Design and implementation of a tool to improve error reporting for eBPF code 169
Automating the configuration of firewalls and channel protection systems in virtual networks 169
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems 168
Towards Security Automation in Virtual Networks 166
Formal verification of a V2X scheme mixing traditional PKI and group signatures 164
Analysis of the eBPF Vulnerabilities in the Linux Kernel 163
Toward the Optimization of Automated VPN Configuration 160
A demonstration of an autonomous approach for cyberattack mitigation 158
An Optimized Approach for Assisted Firewall Anomaly Resolution 156
GreenShield: Optimizing Firewall Configuration for Sustainable Networks 155
A hybrid threat model for smart systems 132
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems 132
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning 129
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management 112
Automatic Firewalls’ Configuration Using Argumentation Reasoning 110
Next Generation of Hybrid Threats 83
Toward Correctness by Construction for Network Security Configuration 79
Toward a Query-Driven Approach for Formal Verification of Cloud Security Configuration 79
Homogeneous Control of Security Functions via Cross-Domain Delegation 69
Formal models for threat analysis in next-generation networks 60
GreenShield-E2C: A Sustainable Energy-Aware Firewall Configuration Mechanism for Edge-to-Cloud Continuum 44
Totale 20.890
Categoria #
all - tutte 51.557
article - articoli 24.876
book - libri 0
conference - conferenze 22.281
curatela - curatele 0
other - altro 0
patent - brevetti 1.274
selected - selezionate 0
volume - volumi 1.796
Totale 101.784


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021249 0 0 0 0 0 0 0 0 0 111 97 41
2021/20221.018 54 70 85 65 74 57 44 48 86 87 167 181
2022/20231.533 122 206 90 174 178 162 100 79 133 58 93 138
2023/20241.127 44 130 99 95 96 111 79 102 59 64 78 170
2024/20253.738 53 320 190 390 204 269 408 515 411 232 340 406
2025/20268.102 485 324 698 770 583 418 1.139 851 1.818 1.016 0 0
Totale 20.890