CASTIGLIONE, Arcangelo
 Distribuzione geografica
Continente #
AS - Asia 11.108
NA - Nord America 3.468
EU - Europa 1.230
SA - Sud America 313
AF - Africa 31
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 3
Totale 16.159
Nazione #
HK - Hong Kong 9.762
US - Stati Uniti d'America 3.400
SG - Singapore 650
IT - Italia 454
CN - Cina 327
BR - Brasile 241
RU - Federazione Russa 206
DE - Germania 137
UA - Ucraina 94
IE - Irlanda 89
VN - Vietnam 89
TR - Turchia 69
KR - Corea 59
SE - Svezia 53
IN - India 45
GB - Regno Unito 42
CA - Canada 41
FI - Finlandia 40
AR - Argentina 35
PL - Polonia 28
JP - Giappone 20
MX - Messico 18
NL - Olanda 17
FR - Francia 15
ZA - Sudafrica 14
ES - Italia 13
BD - Bangladesh 12
EC - Ecuador 10
TW - Taiwan 10
AT - Austria 9
ID - Indonesia 9
IR - Iran 9
PH - Filippine 9
PK - Pakistan 9
PY - Paraguay 8
CO - Colombia 7
MY - Malesia 6
RO - Romania 6
AE - Emirati Arabi Uniti 5
AU - Australia 5
IQ - Iraq 5
LT - Lituania 5
JM - Giamaica 4
MA - Marocco 4
UZ - Uzbekistan 4
VE - Venezuela 4
BE - Belgio 3
BO - Bolivia 3
CL - Cile 3
EE - Estonia 3
NO - Norvegia 3
SA - Arabia Saudita 3
SC - Seychelles 3
BG - Bulgaria 2
CZ - Repubblica Ceca 2
EU - Europa 2
KE - Kenya 2
MD - Moldavia 2
OM - Oman 2
PT - Portogallo 2
UY - Uruguay 2
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
CI - Costa d'Avorio 1
CW - ???statistics.table.value.countryCode.CW??? 1
DM - Dominica 1
DO - Repubblica Dominicana 1
EG - Egitto 1
GH - Ghana 1
GT - Guatemala 1
HU - Ungheria 1
IL - Israele 1
JO - Giordania 1
LV - Lettonia 1
MK - Macedonia 1
NZ - Nuova Zelanda 1
PA - Panama 1
RS - Serbia 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
TH - Thailandia 1
TN - Tunisia 1
UG - Uganda 1
Totale 16.159
Città #
Hong Kong 9.748
Ann Arbor 825
Singapore 327
Chandler 278
Dallas 230
Wilmington 228
Princeton 221
Woodbridge 216
Houston 174
Ashburn 142
Jacksonville 141
Beijing 88
Salerno 83
Dublin 76
Izmir 60
Moscow 54
New York 47
Andover 37
Los Angeles 35
Munich 35
Naples 30
Dearborn 29
Boardman 28
Ho Chi Minh City 28
Pellezzano 28
Dong Ket 27
Nanjing 27
The Dalles 25
Fairfield 24
São Paulo 20
Tokyo 19
Boydton 18
Columbus 18
Council Bluffs 18
Mestre 18
Regensburg 18
Brooklyn 16
Düsseldorf 16
Warsaw 16
Denver 15
Helsinki 15
Nanchang 14
Nuremberg 14
Ottawa 14
Stockholm 14
Hanoi 13
Redwood City 13
Hebei 12
Amsterdam 11
Changsha 11
Jiaxing 11
Montreal 11
Santa Clara 11
Shenyang 11
Atlanta 10
Orem 10
Battipaglia 9
Boston 9
Johannesburg 9
Phoenix 9
Rome 9
Seattle 9
St Petersburg 9
Ankara 8
Belo Horizonte 8
Buenos Aires 8
Chennai 8
Fisciano 8
Milan 8
Napoli 8
Rio de Janeiro 8
Frankfurt am Main 7
London 7
Manchester 7
Poplar 7
Turku 7
Kraków 6
Montecorvino Rovella 6
Norwalk 6
Pune 6
Querétaro 6
Quito 6
San Francisco 6
Seoul 6
Shanghai 6
Toronto 6
Asunción 5
Campinas 5
Curitiba 5
Hyderabad 5
Joinville 5
Marigliano 5
San Diego 5
Tianjin 5
Buffalo 4
Charlotte 4
Chicago 4
Haiphong 4
Kolkata 4
Mexico City 4
Totale 13.964
Nome #
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications 886
DNS tunnels detection via DNS-images 849
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing 670
Secure and distributed video surveillance via portable devices 614
On the Protection of fMRI Images in Multi-domain Environments 569
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 543
High-precision linearized interpretation for fully connected neural network 522
Welcome Messages from IEEE BigDataSE 2020 Program Chairs 520
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 486
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 452
Cloud-based adaptive compression and secure management services for 3D healthcare data 414
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning 403
Format-Independent Protection of DNA Microarray Images 374
Text Compression and Encryption through Smart Devices for Mobile Communication 367
On-board format-independent security of functional magnetic resonance images 355
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 320
Quantum technique for access control in cloud computing II: Encryption and key distribution 285
Secure group communication schemes for dynamic heterogeneous distributed computing 262
Ethical AI Development and Deployment 253
A Secure Distributed Video Surveillance System Based on Portable Devices 229
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 227
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 220
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 194
Enhancing Autonomous System Security With AI and Secure Computation Technologies 193
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities 186
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment 177
An Efficient Protocol for Reliable Data Communication on Dataless Devices 174
Parallel low-complexity lossless coding of three-dimensional medical images 173
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 161
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images 156
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 153
A fuzzy logic based reputation system for E-markets 152
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 151
A machine learning‐based memory forensics methodology for TOR browser artifacts 149
A collaborative decision-support system for secure analysis of cranial disorders 147
An intrusion detection approach based on improved deep belief network 146
An efficient two-factor authentication scheme based on the Merkle tree 145
A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles 140
Compression-based steganography 139
On Secure Data Management in Health-Care Environment 136
Protection of microscopy images through digital watermarking techniques 134
Reversible Copyright Protection for DNA Microarray Images 132
Cryptographic Hierarchical Access Control for Dynamic Structures 129
On the protection of consumer genomic data in the Internet of Living Things 129
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 125
Building a network embedded FEC protocol by using game theory 122
Hierarchical and shared key assignment 120
On the File Recovery in Systems Infected by Ransomware 116
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 114
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 112
Effective classification of android malware families through dynamic features and neural networks 112
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement 109
A Systematic Review of Consensus Mechanisms in Blockchain 108
Hierarchical and Shared Access Control 106
Secure and reliable data communication in developing regions and rural areas 103
14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021 103
Data hiding using compressed archives 102
One-pass lossless data hiding and compression of remote sensing data 101
Improving Drone Security in Smart Cities via Lightweight Cryptography 88
Modeling and analysis of port supply chain system based on Fabric blockchain 84
The Future of Metaverse Security 76
Preface 75
A two-stage intrusion detection approach for software-defined IoT networks 75
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 73
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control 71
Secure weighted possibilistic c-means algorithm on cloud for clustering big data 70
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov) 63
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation 63
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks 61
COVID-19 data sharing and organization through blockchain and decentralized models 61
Securing the internet of vehicles through lightweight block ciphers 60
Preface 57
A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET) 57
A secure distributed video surveillance system based on portable devices 55
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey 52
On the impact of lightweight ciphers in automotive networks 48
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption 44
On the undetectability of payloads generated through automatic tools: A human-oriented approach 43
Safety, Ethics, and Regulation in Intelligent Drones 40
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation 39
Robust End Hopping for Secure Satellite Communication in Moving Target Defense 37
IoT-based health monitoring system to handle pandemic diseases using estimated computing 34
Zero Knowledge Proofs and Their Applications in Cryptography 33
DSTGCS: an intelligent dynamic spatial–temporal graph convolutional system for traffic flow prediction in ITS 30
A Modular and Scalable Framework for Effective Server-Side Forensic Analysis of XSS Attacks 22
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management 20
AI-Driven Intelligent Attack Detection for IoT Networks Using Big Data and Machine Learning 20
A Mobile Forensic Tool for Enhancing Cyber-Physical Security by Detecting XSS Attacks Through Web Server Access Log Analysis 15
Securing in-vehicle communications through post-quantum cryptography and network segmentation 12
Optimized Deep Learning Based Phishing Email Detection Using BERT and Hill Climbing Algorithm 7
PFLIC: A novel personalized federated learning-based iterative clustering 6
Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks 6
Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents 5
Fennec Fox Optimized Federated Learning for Phishing Detection in Next-Generation Smart Device Networks 4
Totale 16.375
Categoria #
all - tutte 38.548
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 38.548


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021248 0 0 0 0 0 19 30 7 71 29 41 51
2021/2022526 4 5 9 13 13 52 12 21 41 47 108 201
2022/2023645 67 60 12 77 80 134 16 58 97 3 25 16
2023/2024401 38 38 27 22 33 45 46 26 8 15 35 68
2024/20251.160 25 25 21 82 44 105 194 80 130 57 175 222
2025/202611.197 1.865 4.965 3.326 394 505 142 0 0 0 0 0 0
Totale 16.375