VALENZA, FULVIO
 Distribuzione geografica
Continente #
EU - Europa 5.531
NA - Nord America 5.391
AS - Asia 2.726
SA - Sud America 310
AF - Africa 59
OC - Oceania 13
Continente sconosciuto - Info sul continente non disponibili 2
Totale 14.032
Nazione #
US - Stati Uniti d'America 5.301
IT - Italia 2.629
SG - Singapore 966
GB - Regno Unito 954
CN - Cina 887
DE - Germania 521
FR - Francia 478
BR - Brasile 271
KR - Corea 201
BE - Belgio 153
TR - Turchia 138
UA - Ucraina 126
IE - Irlanda 121
FI - Finlandia 101
RU - Federazione Russa 101
HK - Hong Kong 97
CA - Canada 71
ID - Indonesia 71
VN - Vietnam 71
IN - India 70
CH - Svizzera 61
AT - Austria 55
NL - Olanda 53
SE - Svezia 42
ES - Italia 34
IL - Israele 30
PK - Pakistan 26
IR - Iran 24
TW - Taiwan 22
EG - Egitto 21
UZ - Uzbekistan 21
JP - Giappone 17
GR - Grecia 16
JO - Giordania 15
MY - Malesia 14
BG - Bulgaria 13
AR - Argentina 12
BD - Bangladesh 11
CZ - Repubblica Ceca 11
EC - Ecuador 10
IQ - Iraq 10
ZA - Sudafrica 10
MX - Messico 9
AU - Australia 8
PL - Polonia 8
RO - Romania 7
DZ - Algeria 6
PH - Filippine 6
SA - Arabia Saudita 6
BY - Bielorussia 5
CO - Colombia 5
CY - Cipro 5
HR - Croazia 5
NZ - Nuova Zelanda 5
TH - Thailandia 5
CI - Costa d'Avorio 4
DK - Danimarca 4
MA - Marocco 4
PT - Portogallo 4
VE - Venezuela 4
AE - Emirati Arabi Uniti 3
AL - Albania 3
CL - Cile 3
EE - Estonia 3
GE - Georgia 3
JM - Giamaica 3
KG - Kirghizistan 3
LT - Lituania 3
LU - Lussemburgo 3
LV - Lettonia 3
ML - Mali 3
PE - Perù 3
TN - Tunisia 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AZ - Azerbaigian 2
BA - Bosnia-Erzegovina 2
HN - Honduras 2
KE - Kenya 2
KH - Cambogia 2
KZ - Kazakistan 2
LB - Libano 2
NG - Nigeria 2
NO - Norvegia 2
SC - Seychelles 2
SK - Slovacchia (Repubblica Slovacca) 2
UY - Uruguay 2
BB - Barbados 1
BS - Bahamas 1
DO - Repubblica Dominicana 1
ET - Etiopia 1
EU - Europa 1
LY - Libia 1
NP - Nepal 1
OM - Oman 1
PA - Panama 1
SI - Slovenia 1
SV - El Salvador 1
Totale 14.032
Città #
Turin 985
Southend 817
Ashburn 729
Singapore 571
Dallas 442
Chandler 399
Torino 372
Boardman 351
Ann Arbor 208
Santa Clara 198
Houston 170
Council Bluffs 169
Milan 161
Seattle 151
Beijing 150
Brussels 149
Fairfield 148
Princeton 142
Woodbridge 127
Seoul 119
Dublin 116
Hefei 111
Wilmington 107
Berlin 91
Tongling 69
Hong Kong 65
Istanbul 64
Jakarta 64
Izmir 61
Helsinki 60
Cambridge 59
Fremont 55
Rome 55
Bern 49
Jacksonville 49
Vienna 42
San Ramon 39
San Donato Milanese 36
Lappeenranta 33
Los Angeles 33
Nuremberg 33
Des Moines 32
Falls Church 31
Amsterdam 25
Hanoi 25
Palermo 25
Buffalo 24
Frankfurt am Main 22
Ho Chi Minh City 22
Shanghai 21
Hangzhou 20
Padova 20
Toronto 20
São Paulo 19
Alpignano 17
Cangzhou 17
Chicago 17
New York 17
Columbus 16
Livorno Ferraris 16
Nanjing 16
London 15
Redwood City 15
The Dalles 15
Barcelona 14
Islamabad 14
Montréal 14
Tel Aviv 14
Washington 14
Yubileyny 14
Zhengzhou 14
Biella 13
Bremen 12
Dearborn 12
Mcallen 12
Menlo Park 12
Piossasco 12
Piscataway 12
Redondo Beach 12
Cameri 11
Ottawa 11
Pinerolo 11
Rio de Janeiro 11
San Antonio 11
Sofia 11
Al Mansurah 10
Bologna 10
Cervasca 10
Cuneo 10
Frankfurt 10
Jerusalem 10
Naples 10
Sacramento 10
Tashkent 10
Venaria Reale 10
Zaporozhye 10
Brooklyn 9
Cernusco sul Naviglio 9
Guangzhou 9
Lake Forest 9
Totale 8.723
Nome #
A Formal Model of Network Policy Analysis 549
Modelling and Analysis of Network Security Policies 546
A formal approach for network security policy validation 526
Towards the Dynamic Provision of Virtualized Security Services 502
Inter-function anomaly analysis for correct SDN/NFV deployment 457
A novel approach for integrating security policy enforcement with dynamic network virtualization 437
Inter-technology conflict analysis for communication protection policies 419
Classification and analysis of communication protection policy anomalies 413
Automatic discovery of software attacks via backward reasoning 362
Leveraging SDN To Improve Security in Industrial Networks 347
Assessing network authorization policies via reachability analysis 339
Online and offline security policy assessment 320
Adding Support for Automatic Enforcement of Security Policies in NFV Networks 314
Automated firewall configuration in virtual networks 300
(User-friendly) formal requirements verification in the context of ISO26262 285
Automated Fixing of Access Policy Implementation in Industrial Networked Systems 281
On the impossibility of effectively using likely-invariants for software attestation purposes 249
A Model for the Analysis of Security Policies in Service Function Chains 245
Securing SOME/IP for In-Vehicle Service Protection 231
Towards a fully automated and optimized network security functions orchestration 226
A comprehensive approach to the automatic refinement and verification of access control policies 217
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions 210
Improving the formal verification of reachability policies in virtualized networks 208
Toward Cybersecurity Personalization in Smart Homes 208
Automation for network security configuration: state of the art and research trends 206
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols 202
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks 187
Automatic and optimized firewall reconfiguration 182
Automated optimal firewall orchestration and configuration in virtualized networks 180
Autonomous attack mitigation through firewall reconfiguration 173
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks 172
An optimized firewall anomaly resolution 171
Automating VPN Configuration in Computer Networks 170
A novel approach for security function graph configuration and deployment 167
An intent-based solution for network isolation in Kubernetes 164
Introducing programmability and automation in the synthesis of virtual firewall rules 163
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks 163
A novel abstraction for security configuration in virtual networks 161
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware 159
Improvements in the transmission of data or messages on board a vehicle by means of a SOME/IP communication protocol 157
User-oriented Network Security Policy Specification 150
Perfezionamenti nella trasmissione di dati o messaggi a bordo di un veicolo mediante un protocollo di comunicazione SOME/IP 146
Toward attribute-based access control policy in industrial networked systems 145
Formally specifying and checking policies and anomalies in service function chaining 142
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif 139
A Framework for Verification-Oriented User-Friendly Network Function Modeling 136
A demonstration of VEREFOO: an automated framework for virtual firewall configuration 135
Formal verification of the FDO protocol 129
A twofold model for VNF embedding and time-sensitive network flow scheduling 129
Security Automation in next-generation Networks and Cloud environments 128
Security Automation using Traffic Flow Modeling 126
Security automation for multi-cluster orchestration in Kubernetes 126
A Two-Fold Traffic Flow Model for Network Security Management 126
Atomizing Firewall Policies for Anomaly Analysis and Resolution 126
Towards Security Automation in Virtual Networks 116
A looping process for cyberattack mitigation 115
Optimizing distributed firewall reconfiguration transients 115
Automated Security Management for Virtual Services 110
Automating the configuration of firewalls and channel protection systems in virtual networks 106
A demonstration of a network isolation solution for the computing continuum 103
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems 98
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning 88
An Optimized Approach for Assisted Firewall Anomaly Resolution 82
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems 81
Design and implementation of a tool to improve error reporting for eBPF code 80
A hybrid threat model for smart systems 79
Formal verification of a V2X scheme mixing traditional PKI and group signatures 78
GreenShield: Optimizing Firewall Configuration for Sustainable Networks 78
Toward the Optimization of Automated VPN Configuration 69
A demonstration of an autonomous approach for cyberattack mitigation 64
Adaptive, Agile and Automated Cybersecurity Management 62
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management 54
Automatic Firewalls’ Configuration Using Argumentation Reasoning 50
Next Generation of Hybrid Threats 46
Intent-driven network isolation for the cloud computing continuum 41
Analysis of the eBPF Vulnerabilities in the Linux Kernel 12
Totale 14.578
Categoria #
all - tutte 41.418
article - articoli 20.347
book - libri 0
conference - conferenze 17.338
curatela - curatele 0
other - altro 0
patent - brevetti 1.044
selected - selezionate 0
volume - volumi 1.571
Totale 81.718


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.089 0 0 0 89 60 131 273 215 72 111 97 41
2021/20221.018 54 70 85 65 74 57 44 48 86 87 167 181
2022/20231.533 122 206 90 174 178 162 100 79 133 58 93 138
2023/20241.127 44 130 99 95 96 111 79 102 59 64 78 170
2024/20253.738 53 320 190 390 204 269 408 515 411 232 340 406
2025/20261.790 485 324 698 283 0 0 0 0 0 0 0 0
Totale 14.578