CASTIGLIONE, Arcangelo
 Distribuzione geografica
Continente #
AS - Asia 11.172
NA - Nord America 3.498
EU - Europa 1.240
SA - Sud America 321
AF - Africa 31
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 3
Totale 16.271
Nazione #
HK - Hong Kong 9.763
US - Stati Uniti d'America 3.428
SG - Singapore 680
IT - Italia 454
CN - Cina 339
BR - Brasile 244
RU - Federazione Russa 208
DE - Germania 137
VN - Vietnam 101
UA - Ucraina 94
IE - Irlanda 89
TR - Turchia 72
KR - Corea 59
SE - Svezia 53
IN - India 50
GB - Regno Unito 46
CA - Canada 41
FI - Finlandia 40
AR - Argentina 37
PL - Polonia 29
JP - Giappone 20
MX - Messico 20
NL - Olanda 19
FR - Francia 16
ZA - Sudafrica 14
ES - Italia 13
BD - Bangladesh 12
EC - Ecuador 10
TW - Taiwan 10
AT - Austria 9
ID - Indonesia 9
IR - Iran 9
PH - Filippine 9
PK - Pakistan 9
CO - Colombia 8
PY - Paraguay 8
IQ - Iraq 6
MY - Malesia 6
RO - Romania 6
AE - Emirati Arabi Uniti 5
AU - Australia 5
LT - Lituania 5
BO - Bolivia 4
JM - Giamaica 4
MA - Marocco 4
UZ - Uzbekistan 4
VE - Venezuela 4
BE - Belgio 3
CL - Cile 3
EE - Estonia 3
NO - Norvegia 3
SA - Arabia Saudita 3
SC - Seychelles 3
UY - Uruguay 3
BG - Bulgaria 2
CZ - Repubblica Ceca 2
EU - Europa 2
KE - Kenya 2
MD - Moldavia 2
OM - Oman 2
PT - Portogallo 2
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
CI - Costa d'Avorio 1
CW - ???statistics.table.value.countryCode.CW??? 1
DM - Dominica 1
DO - Repubblica Dominicana 1
EG - Egitto 1
GH - Ghana 1
GT - Guatemala 1
HU - Ungheria 1
IL - Israele 1
JO - Giordania 1
LV - Lettonia 1
MK - Macedonia 1
NZ - Nuova Zelanda 1
PA - Panama 1
RS - Serbia 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
TH - Thailandia 1
TN - Tunisia 1
UG - Uganda 1
Totale 16.271
Città #
Hong Kong 9.749
Ann Arbor 825
Singapore 340
Chandler 278
Dallas 230
Wilmington 228
Princeton 221
Woodbridge 216
Houston 174
Ashburn 150
Jacksonville 141
Beijing 90
Salerno 83
Dublin 76
Izmir 60
Moscow 54
New York 47
Andover 37
Los Angeles 35
Munich 35
Ho Chi Minh City 30
Naples 30
The Dalles 30
Dearborn 29
Boardman 28
Pellezzano 28
Dong Ket 27
Nanjing 27
Fairfield 24
São Paulo 21
Tokyo 19
Boydton 18
Columbus 18
Council Bluffs 18
Mestre 18
Orem 18
Regensburg 18
Hanoi 17
Warsaw 17
Brooklyn 16
Düsseldorf 16
Denver 15
Helsinki 15
Nanchang 14
Nuremberg 14
Ottawa 14
Stockholm 14
Redwood City 13
Amsterdam 12
Hebei 12
Santa Clara 12
Changsha 11
Jiaxing 11
London 11
Montreal 11
Shenyang 11
Atlanta 10
Chennai 10
Ankara 9
Battipaglia 9
Boston 9
Johannesburg 9
Phoenix 9
Rome 9
Seattle 9
St Petersburg 9
Belo Horizonte 8
Buenos Aires 8
Fisciano 8
Milan 8
Napoli 8
Rio de Janeiro 8
Frankfurt am Main 7
Manchester 7
Poplar 7
Querétaro 7
Turku 7
Kraków 6
Montecorvino Rovella 6
Norwalk 6
Pune 6
Quito 6
San Francisco 6
San Jose 6
Seoul 6
Shanghai 6
Toronto 6
Asunción 5
Campinas 5
Curitiba 5
Hyderabad 5
Joinville 5
Marigliano 5
New Delhi 5
San Diego 5
Tianjin 5
Buffalo 4
Charlotte 4
Chicago 4
Haiphong 4
Totale 14.022
Nome #
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications 886
DNS tunnels detection via DNS-images 849
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing 671
Secure and distributed video surveillance via portable devices 614
On the Protection of fMRI Images in Multi-domain Environments 569
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 545
High-precision linearized interpretation for fully connected neural network 524
Welcome Messages from IEEE BigDataSE 2020 Program Chairs 520
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 487
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 457
Cloud-based adaptive compression and secure management services for 3D healthcare data 414
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning 403
Format-Independent Protection of DNA Microarray Images 374
Text Compression and Encryption through Smart Devices for Mobile Communication 367
On-board format-independent security of functional magnetic resonance images 355
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 321
Quantum technique for access control in cloud computing II: Encryption and key distribution 286
Secure group communication schemes for dynamic heterogeneous distributed computing 263
Ethical AI Development and Deployment 254
A Secure Distributed Video Surveillance System Based on Portable Devices 231
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 227
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 221
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 195
Enhancing Autonomous System Security With AI and Secure Computation Technologies 194
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities 187
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment 179
An Efficient Protocol for Reliable Data Communication on Dataless Devices 175
Parallel low-complexity lossless coding of three-dimensional medical images 175
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 161
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images 157
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 157
A fuzzy logic based reputation system for E-markets 156
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 151
A machine learning‐based memory forensics methodology for TOR browser artifacts 149
A collaborative decision-support system for secure analysis of cranial disorders 149
An intrusion detection approach based on improved deep belief network 147
An efficient two-factor authentication scheme based on the Merkle tree 147
A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles 141
Compression-based steganography 140
On Secure Data Management in Health-Care Environment 137
Protection of microscopy images through digital watermarking techniques 136
Reversible Copyright Protection for DNA Microarray Images 134
Cryptographic Hierarchical Access Control for Dynamic Structures 132
On the protection of consumer genomic data in the Internet of Living Things 129
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 127
Building a network embedded FEC protocol by using game theory 123
Hierarchical and shared key assignment 120
On the File Recovery in Systems Infected by Ransomware 118
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 117
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 114
Effective classification of android malware families through dynamic features and neural networks 113
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement 111
A Systematic Review of Consensus Mechanisms in Blockchain 110
Hierarchical and Shared Access Control 107
14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021 105
Secure and reliable data communication in developing regions and rural areas 103
Data hiding using compressed archives 102
One-pass lossless data hiding and compression of remote sensing data 102
Improving Drone Security in Smart Cities via Lightweight Cryptography 88
Modeling and analysis of port supply chain system based on Fabric blockchain 85
The Future of Metaverse Security 78
Preface 77
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 75
A two-stage intrusion detection approach for software-defined IoT networks 75
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control 71
Secure weighted possibilistic c-means algorithm on cloud for clustering big data 70
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation 65
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov) 63
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks 63
Securing the internet of vehicles through lightweight block ciphers 62
COVID-19 data sharing and organization through blockchain and decentralized models 61
A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET) 58
Preface 57
A secure distributed video surveillance system based on portable devices 56
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey 53
On the impact of lightweight ciphers in automotive networks 49
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption 45
On the undetectability of payloads generated through automatic tools: A human-oriented approach 45
Safety, Ethics, and Regulation in Intelligent Drones 42
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation 39
Robust End Hopping for Secure Satellite Communication in Moving Target Defense 37
Zero Knowledge Proofs and Their Applications in Cryptography 35
IoT-based health monitoring system to handle pandemic diseases using estimated computing 35
DSTGCS: an intelligent dynamic spatial–temporal graph convolutional system for traffic flow prediction in ITS 31
A Modular and Scalable Framework for Effective Server-Side Forensic Analysis of XSS Attacks 25
AI-Driven Intelligent Attack Detection for IoT Networks Using Big Data and Machine Learning 22
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management 21
A Mobile Forensic Tool for Enhancing Cyber-Physical Security by Detecting XSS Attacks Through Web Server Access Log Analysis 17
Securing in-vehicle communications through post-quantum cryptography and network segmentation 13
Optimized Deep Learning Based Phishing Email Detection Using BERT and Hill Climbing Algorithm 8
Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents 7
PFLIC: A novel personalized federated learning-based iterative clustering 7
Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks 7
Fennec Fox Optimized Federated Learning for Phishing Detection in Next-Generation Smart Device Networks 6
New Insights on cryptographic hierarchical access control: models, schemes and analysis 1
Totale 16.487
Categoria #
all - tutte 38.986
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 38.986


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021248 0 0 0 0 0 19 30 7 71 29 41 51
2021/2022526 4 5 9 13 13 52 12 21 41 47 108 201
2022/2023645 67 60 12 77 80 134 16 58 97 3 25 16
2023/2024401 38 38 27 22 33 45 46 26 8 15 35 68
2024/20251.160 25 25 21 82 44 105 194 80 130 57 175 222
2025/202611.309 1.865 4.965 3.326 394 505 254 0 0 0 0 0 0
Totale 16.487