CASTIGLIONE, Arcangelo
 Distribuzione geografica
Continente #
AS - Asia 11.230
NA - Nord America 3.685
EU - Europa 1.251
SA - Sud America 323
AF - Africa 37
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 3
Totale 16.535
Nazione #
HK - Hong Kong 9.764
US - Stati Uniti d'America 3.614
SG - Singapore 727
IT - Italia 456
CN - Cina 343
BR - Brasile 246
RU - Federazione Russa 210
DE - Germania 137
VN - Vietnam 103
UA - Ucraina 94
IE - Irlanda 89
TR - Turchia 73
KR - Corea 59
SE - Svezia 53
IN - India 50
GB - Regno Unito 48
CA - Canada 42
FI - Finlandia 40
AR - Argentina 37
PL - Polonia 32
JP - Giappone 20
MX - Messico 20
NL - Olanda 19
FR - Francia 16
ZA - Sudafrica 15
ES - Italia 13
BD - Bangladesh 12
EC - Ecuador 10
ID - Indonesia 10
TW - Taiwan 10
AT - Austria 9
IR - Iran 9
PH - Filippine 9
PK - Pakistan 9
CO - Colombia 8
PY - Paraguay 8
IQ - Iraq 7
LT - Lituania 6
MY - Malesia 6
RO - Romania 6
AE - Emirati Arabi Uniti 5
AU - Australia 5
MA - Marocco 5
BO - Bolivia 4
JM - Giamaica 4
UZ - Uzbekistan 4
VE - Venezuela 4
BE - Belgio 3
CL - Cile 3
EE - Estonia 3
KE - Kenya 3
NO - Norvegia 3
SA - Arabia Saudita 3
SC - Seychelles 3
UY - Uruguay 3
BG - Bulgaria 2
CZ - Repubblica Ceca 2
EU - Europa 2
MD - Moldavia 2
OM - Oman 2
PT - Portogallo 2
SN - Senegal 2
AL - Albania 1
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
CI - Costa d'Avorio 1
CW - ???statistics.table.value.countryCode.CW??? 1
DM - Dominica 1
DO - Repubblica Dominicana 1
EG - Egitto 1
ET - Etiopia 1
GH - Ghana 1
GT - Guatemala 1
HU - Ungheria 1
IL - Israele 1
JO - Giordania 1
LV - Lettonia 1
MK - Macedonia 1
NG - Nigeria 1
NZ - Nuova Zelanda 1
PA - Panama 1
RS - Serbia 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TN - Tunisia 1
UG - Uganda 1
Totale 16.535
Città #
Hong Kong 9.750
Ann Arbor 825
Singapore 357
Chandler 278
Dallas 230
Wilmington 228
Princeton 221
Woodbridge 216
Houston 175
Ashburn 163
Jacksonville 141
San Jose 141
Beijing 90
Salerno 83
Dublin 76
Izmir 60
Moscow 54
New York 50
Andover 37
Los Angeles 35
Munich 35
Ho Chi Minh City 31
Naples 30
The Dalles 30
Dearborn 29
Boardman 28
Pellezzano 28
Dong Ket 27
Nanjing 27
Fairfield 24
Orem 23
São Paulo 21
Warsaw 20
Tokyo 19
Boydton 18
Columbus 18
Council Bluffs 18
Mestre 18
Regensburg 18
Hanoi 17
Brooklyn 16
Denver 16
Düsseldorf 16
Helsinki 15
Nanchang 14
Nuremberg 14
Ottawa 14
Stockholm 14
Redwood City 13
Santa Clara 13
Amsterdam 12
Hebei 12
London 12
Atlanta 11
Changsha 11
Jiaxing 11
Montreal 11
Shenyang 11
Ankara 10
Chennai 10
Johannesburg 10
St Petersburg 10
Battipaglia 9
Boston 9
Phoenix 9
Rome 9
Seattle 9
Belo Horizonte 8
Buenos Aires 8
Fisciano 8
Milan 8
Napoli 8
Poplar 8
Rio de Janeiro 8
Frankfurt am Main 7
Manchester 7
Querétaro 7
Turku 7
Kraków 6
Montecorvino Rovella 6
Norwalk 6
Pune 6
Quito 6
San Francisco 6
Seoul 6
Shanghai 6
Toronto 6
Asunción 5
Campinas 5
Curitiba 5
Hyderabad 5
Joinville 5
Marigliano 5
New Delhi 5
San Diego 5
Tianjin 5
Buffalo 4
Charlotte 4
Chicago 4
Haiphong 4
Totale 14.209
Nome #
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications 890
DNS tunnels detection via DNS-images 853
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing 672
Secure and distributed video surveillance via portable devices 619
On the Protection of fMRI Images in Multi-domain Environments 573
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 550
High-precision linearized interpretation for fully connected neural network 526
Welcome Messages from IEEE BigDataSE 2020 Program Chairs 523
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 490
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 457
Cloud-based adaptive compression and secure management services for 3D healthcare data 418
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning 407
Format-Independent Protection of DNA Microarray Images 377
Text Compression and Encryption through Smart Devices for Mobile Communication 369
On-board format-independent security of functional magnetic resonance images 357
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 326
Quantum technique for access control in cloud computing II: Encryption and key distribution 290
Secure group communication schemes for dynamic heterogeneous distributed computing 265
Ethical AI Development and Deployment 257
A Secure Distributed Video Surveillance System Based on Portable Devices 234
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 231
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 224
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 198
Enhancing Autonomous System Security With AI and Secure Computation Technologies 196
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities 191
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment 182
An Efficient Protocol for Reliable Data Communication on Dataless Devices 180
Parallel low-complexity lossless coding of three-dimensional medical images 177
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 162
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 162
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images 160
A fuzzy logic based reputation system for E-markets 158
A machine learning‐based memory forensics methodology for TOR browser artifacts 152
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 152
A collaborative decision-support system for secure analysis of cranial disorders 151
An intrusion detection approach based on improved deep belief network 149
An efficient two-factor authentication scheme based on the Merkle tree 149
A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles 145
Compression-based steganography 144
On Secure Data Management in Health-Care Environment 139
Protection of microscopy images through digital watermarking techniques 138
Reversible Copyright Protection for DNA Microarray Images 137
Cryptographic Hierarchical Access Control for Dynamic Structures 133
On the protection of consumer genomic data in the Internet of Living Things 133
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 130
Building a network embedded FEC protocol by using game theory 124
Hierarchical and shared key assignment 123
On the File Recovery in Systems Infected by Ransomware 122
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 121
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 116
Effective classification of android malware families through dynamic features and neural networks 115
A Systematic Review of Consensus Mechanisms in Blockchain 114
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement 113
14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021 110
Hierarchical and Shared Access Control 109
Data hiding using compressed archives 107
Secure and reliable data communication in developing regions and rural areas 106
One-pass lossless data hiding and compression of remote sensing data 105
Improving Drone Security in Smart Cities via Lightweight Cryptography 92
Modeling and analysis of port supply chain system based on Fabric blockchain 86
The Future of Metaverse Security 82
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 78
Preface 77
A two-stage intrusion detection approach for software-defined IoT networks 77
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control 76
Secure weighted possibilistic c-means algorithm on cloud for clustering big data 73
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks 67
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov) 66
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation 66
Securing the internet of vehicles through lightweight block ciphers 65
COVID-19 data sharing and organization through blockchain and decentralized models 64
A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET) 61
Preface 60
A secure distributed video surveillance system based on portable devices 58
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey 55
On the impact of lightweight ciphers in automotive networks 52
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption 48
On the undetectability of payloads generated through automatic tools: A human-oriented approach 47
Safety, Ethics, and Regulation in Intelligent Drones 45
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation 42
IoT-based health monitoring system to handle pandemic diseases using estimated computing 39
Robust End Hopping for Secure Satellite Communication in Moving Target Defense 39
Zero Knowledge Proofs and Their Applications in Cryptography 36
DSTGCS: an intelligent dynamic spatial–temporal graph convolutional system for traffic flow prediction in ITS 33
A Modular and Scalable Framework for Effective Server-Side Forensic Analysis of XSS Attacks 26
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management 25
AI-Driven Intelligent Attack Detection for IoT Networks Using Big Data and Machine Learning 23
A Mobile Forensic Tool for Enhancing Cyber-Physical Security by Detecting XSS Attacks Through Web Server Access Log Analysis 22
Securing in-vehicle communications through post-quantum cryptography and network segmentation 15
Optimized Deep Learning Based Phishing Email Detection Using BERT and Hill Climbing Algorithm 10
PFLIC: A novel personalized federated learning-based iterative clustering 9
Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks 9
Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents 8
Fennec Fox Optimized Federated Learning for Phishing Detection in Next-Generation Smart Device Networks 7
New Insights on cryptographic hierarchical access control: models, schemes and analysis 2
Totale 16.751
Categoria #
all - tutte 39.341
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 39.341


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021229 0 0 0 0 0 0 30 7 71 29 41 51
2021/2022526 4 5 9 13 13 52 12 21 41 47 108 201
2022/2023645 67 60 12 77 80 134 16 58 97 3 25 16
2023/2024401 38 38 27 22 33 45 46 26 8 15 35 68
2024/20251.160 25 25 21 82 44 105 194 80 130 57 175 222
2025/202611.573 1.865 4.965 3.326 394 505 260 258 0 0 0 0 0
Totale 16.751