CASTIGLIONE, Arcangelo
 Distribuzione geografica
Continente #
NA - Nord America 2.687
EU - Europa 1.018
AS - Asia 548
SA - Sud America 66
AF - Africa 8
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 2
Totale 4.335
Nazione #
US - Stati Uniti d'America 2.667
IT - Italia 422
CN - Cina 225
RU - Federazione Russa 198
SG - Singapore 166
UA - Ucraina 90
IE - Irlanda 89
DE - Germania 85
TR - Turchia 63
BR - Brasile 51
SE - Svezia 39
FI - Finlandia 33
VN - Vietnam 28
IN - India 23
CA - Canada 20
GB - Regno Unito 15
FR - Francia 12
AR - Argentina 11
PL - Polonia 11
NL - Olanda 7
TW - Taiwan 7
JP - Giappone 6
RO - Romania 6
AU - Australia 5
HK - Hong Kong 4
KR - Corea 4
PH - Filippine 4
ID - Indonesia 3
PK - Pakistan 3
SC - Seychelles 3
AT - Austria 2
BE - Belgio 2
CZ - Repubblica Ceca 2
EC - Ecuador 2
EU - Europa 2
IQ - Iraq 2
IR - Iran 2
MA - Marocco 2
MY - Malesia 2
NO - Norvegia 2
ZA - Sudafrica 2
AE - Emirati Arabi Uniti 1
BD - Bangladesh 1
BG - Bulgaria 1
CL - Cile 1
EE - Estonia 1
IL - Israele 1
MK - Macedonia 1
NZ - Nuova Zelanda 1
OM - Oman 1
SA - Arabia Saudita 1
SN - Senegal 1
TH - Thailandia 1
VE - Venezuela 1
Totale 4.335
Città #
Ann Arbor 825
Chandler 278
Wilmington 228
Princeton 221
Woodbridge 216
Houston 169
Jacksonville 140
Singapore 93
Salerno 83
Dublin 76
Beijing 62
Izmir 60
Moscow 54
Ashburn 53
Andover 37
Dearborn 29
Pellezzano 28
Dong Ket 27
Nanjing 27
Boardman 26
Fairfield 24
Mestre 18
Naples 18
Düsseldorf 16
Dallas 15
Helsinki 15
Nanchang 14
Ottawa 14
Redwood City 13
Hebei 12
Munich 12
Changsha 11
Jiaxing 11
Shenyang 11
Battipaglia 9
Rome 9
St Petersburg 9
Napoli 8
New York 8
Seattle 7
Frankfurt am Main 6
Kraków 6
Montecorvino Rovella 6
Norwalk 6
Nuremberg 6
Pune 6
Amsterdam 5
Boydton 5
Council Bluffs 5
Marigliano 5
San Diego 5
Tianjin 5
Tokyo 5
Buenos Aires 4
Chennai 4
Shanghai 4
Solofra 4
Yubileyny 4
Ankara 3
Berlin 3
Brisbane 3
Champaign 3
Edinburgh 3
Fisciano 3
Fremont 3
Giugliano In Campania 3
Jinan 3
Joinville 3
Lappeenranta 3
Marcon 3
Ningbo 3
Nocera Inferiore 3
Prata 3
San Prisco 3
Somma Vesuviana 3
Yogyakarta 3
Zhoukou 3
Aligarh 2
Angri 2
Ariano Irpino 2
Ascoli Piceno 2
Bangor 2
Bergen 2
Buffalo 2
Capriglia Irpina 2
Catania 2
Centro 2
Fort Worth 2
Gatchina 2
Guangzhou 2
Haikou 2
Hangzhou 2
Hong Kong 2
Hyderabad 2
Indiana 2
Ingolstadt 2
Kensington 2
Leawood 2
Los Angeles 2
Los Cardales 2
Totale 3.180
Nome #
Secure group communication schemes for dynamic heterogeneous distributed computing 124
Format-Independent Protection of DNA Microarray Images 122
Cloud-based adaptive compression and secure management services for 3D healthcare data 120
Parallel low-complexity lossless coding of three-dimensional medical images 117
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 116
Protection of microscopy images through digital watermarking techniques 110
On Secure Data Management in Health-Care Environment 110
Reversible Copyright Protection for DNA Microarray Images 109
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 105
Hierarchical and shared key assignment 104
Building a network embedded FEC protocol by using game theory 102
A fuzzy logic based reputation system for E-markets 101
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 99
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 99
An Efficient Protocol for Reliable Data Communication on Dataless Devices 98
Secure and distributed video surveillance via portable devices 98
A collaborative decision-support system for secure analysis of cranial disorders 98
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images 97
On-board format-independent security of functional magnetic resonance images 97
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 95
Secure and reliable data communication in developing regions and rural areas 94
A Secure Distributed Video Surveillance System Based on Portable Devices 89
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 89
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 88
Text Compression and Encryption through Smart Devices for Mobile Communication 86
On the Protection of fMRI Images in Multi-domain Environments 85
Hierarchical and Shared Access Control 82
On the protection of consumer genomic data in the Internet of Living Things 77
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 76
On the File Recovery in Systems Infected by Ransomware 75
Effective classification of android malware families through dynamic features and neural networks 75
Cryptographic Hierarchical Access Control for Dynamic Structures 72
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications 72
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 71
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 64
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 58
Preface 55
Data hiding using compressed archives 52
Compression-based steganography 49
One-pass lossless data hiding and compression of remote sensing data 49
Quantum technique for access control in cloud computing II: Encryption and key distribution 41
14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021 41
A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles 38
COVID-19 data sharing and organization through blockchain and decentralized models 38
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 36
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment 35
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey 35
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov) 34
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks 34
Secure weighted possibilistic c-means algorithm on cloud for clustering big data 33
A two-stage intrusion detection approach for software-defined IoT networks 33
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement 31
Securing the internet of vehicles through lightweight block ciphers 29
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 28
Improving Drone Security in Smart Cities via Lightweight Cryptography 27
DNS tunnels detection via DNS-images 27
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control 26
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities 26
An efficient two-factor authentication scheme based on the Merkle tree 24
A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET) 24
Welcome Messages from IEEE BigDataSE 2020 Program Chairs 24
A secure distributed video surveillance system based on portable devices 22
A machine learning‐based memory forensics methodology for TOR browser artifacts 22
On the impact of lightweight ciphers in automotive networks 22
On the undetectability of payloads generated through automatic tools: A human-oriented approach 22
An intrusion detection approach based on improved deep belief network 18
A Systematic Review of Consensus Mechanisms in Blockchain 17
Robust End Hopping for Secure Satellite Communication in Moving Target Defense 17
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 16
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning 16
DSTGCS: an intelligent dynamic spatial–temporal graph convolutional system for traffic flow prediction in ITS 15
IoT-based health monitoring system to handle pandemic diseases using estimated computing 15
High-precision linearized interpretation for fully connected neural network 15
Preface 13
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation 12
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation 11
Modeling and analysis of port supply chain system based on Fabric blockchain 8
The Future of Metaverse Security 7
Enhancing Autonomous System Security With AI and Secure Computation Technologies 6
Zero Knowledge Proofs and Their Applications in Cryptography 6
Safety, Ethics, and Regulation in Intelligent Drones 4
Ethical AI Development and Deployment 4
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing 4
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management 3
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption 3
Totale 4.541
Categoria #
all - tutte 17.667
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 17.667


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020158 0 0 0 0 0 0 0 7 15 37 81 18
2020/2021350 10 18 29 6 39 19 30 7 71 29 41 51
2021/2022526 4 5 9 13 13 52 12 21 41 47 108 201
2022/2023645 67 60 12 77 80 134 16 58 97 3 25 16
2023/2024401 38 38 27 22 33 45 46 26 8 15 35 68
2024/2025523 25 25 21 82 44 105 194 27 0 0 0 0
Totale 4.541