CASTIGLIONE, Arcangelo
 Distribuzione geografica
Continente #
AS - Asia 11.236
NA - Nord America 3.717
EU - Europa 1.252
SA - Sud America 325
AF - Africa 37
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 3
Totale 16.576
Nazione #
HK - Hong Kong 9.764
US - Stati Uniti d'America 3.646
SG - Singapore 732
IT - Italia 457
CN - Cina 343
BR - Brasile 247
RU - Federazione Russa 210
DE - Germania 137
VN - Vietnam 104
UA - Ucraina 94
IE - Irlanda 89
TR - Turchia 73
KR - Corea 59
SE - Svezia 53
IN - India 50
GB - Regno Unito 48
CA - Canada 42
FI - Finlandia 40
AR - Argentina 38
PL - Polonia 32
JP - Giappone 20
MX - Messico 20
NL - Olanda 19
FR - Francia 16
ZA - Sudafrica 15
ES - Italia 13
BD - Bangladesh 12
EC - Ecuador 10
ID - Indonesia 10
TW - Taiwan 10
AT - Austria 9
IR - Iran 9
PH - Filippine 9
PK - Pakistan 9
CO - Colombia 8
PY - Paraguay 8
IQ - Iraq 7
LT - Lituania 6
MY - Malesia 6
RO - Romania 6
AE - Emirati Arabi Uniti 5
AU - Australia 5
MA - Marocco 5
BO - Bolivia 4
JM - Giamaica 4
UZ - Uzbekistan 4
VE - Venezuela 4
BE - Belgio 3
CL - Cile 3
EE - Estonia 3
KE - Kenya 3
NO - Norvegia 3
SA - Arabia Saudita 3
SC - Seychelles 3
UY - Uruguay 3
BG - Bulgaria 2
CZ - Repubblica Ceca 2
EU - Europa 2
MD - Moldavia 2
OM - Oman 2
PT - Portogallo 2
SN - Senegal 2
AL - Albania 1
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
CI - Costa d'Avorio 1
CW - ???statistics.table.value.countryCode.CW??? 1
DM - Dominica 1
DO - Repubblica Dominicana 1
EG - Egitto 1
ET - Etiopia 1
GH - Ghana 1
GT - Guatemala 1
HU - Ungheria 1
IL - Israele 1
JO - Giordania 1
LV - Lettonia 1
MK - Macedonia 1
NG - Nigeria 1
NZ - Nuova Zelanda 1
PA - Panama 1
RS - Serbia 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TN - Tunisia 1
UG - Uganda 1
Totale 16.576
Città #
Hong Kong 9.750
Ann Arbor 825
Singapore 360
Chandler 278
Dallas 230
Wilmington 228
Princeton 221
Woodbridge 216
Houston 175
Ashburn 166
San Jose 165
Jacksonville 141
Beijing 90
Salerno 83
Dublin 76
Izmir 60
Moscow 54
New York 50
Andover 37
Los Angeles 35
Munich 35
The Dalles 35
Ho Chi Minh City 31
Naples 30
Dearborn 29
Boardman 28
Pellezzano 28
Dong Ket 27
Nanjing 27
Fairfield 24
Orem 23
São Paulo 21
Warsaw 20
Tokyo 19
Boydton 18
Columbus 18
Council Bluffs 18
Mestre 18
Regensburg 18
Hanoi 17
Brooklyn 16
Denver 16
Düsseldorf 16
Helsinki 15
Nanchang 14
Nuremberg 14
Ottawa 14
Stockholm 14
Redwood City 13
Santa Clara 13
Amsterdam 12
Hebei 12
London 12
Atlanta 11
Changsha 11
Jiaxing 11
Montreal 11
Shenyang 11
Ankara 10
Chennai 10
Johannesburg 10
St Petersburg 10
Battipaglia 9
Boston 9
Milan 9
Phoenix 9
Rome 9
Seattle 9
Belo Horizonte 8
Buenos Aires 8
Fisciano 8
Napoli 8
Poplar 8
Rio de Janeiro 8
Frankfurt am Main 7
Manchester 7
Querétaro 7
Turku 7
Kraków 6
Montecorvino Rovella 6
Norwalk 6
Pune 6
Quito 6
San Francisco 6
Seoul 6
Shanghai 6
Toronto 6
Asunción 5
Campinas 5
Curitiba 5
Hyderabad 5
Joinville 5
Marigliano 5
New Delhi 5
San Diego 5
Tianjin 5
Buffalo 4
Charlotte 4
Chicago 4
Haiphong 4
Totale 14.245
Nome #
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications 890
DNS tunnels detection via DNS-images 854
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing 674
Secure and distributed video surveillance via portable devices 619
On the Protection of fMRI Images in Multi-domain Environments 573
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 550
High-precision linearized interpretation for fully connected neural network 526
Welcome Messages from IEEE BigDataSE 2020 Program Chairs 523
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 491
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 457
Cloud-based adaptive compression and secure management services for 3D healthcare data 419
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning 409
Format-Independent Protection of DNA Microarray Images 377
Text Compression and Encryption through Smart Devices for Mobile Communication 370
On-board format-independent security of functional magnetic resonance images 357
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 326
Quantum technique for access control in cloud computing II: Encryption and key distribution 290
Secure group communication schemes for dynamic heterogeneous distributed computing 265
Ethical AI Development and Deployment 257
A Secure Distributed Video Surveillance System Based on Portable Devices 235
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 232
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 226
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 198
Enhancing Autonomous System Security With AI and Secure Computation Technologies 196
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities 191
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment 182
An Efficient Protocol for Reliable Data Communication on Dataless Devices 181
Parallel low-complexity lossless coding of three-dimensional medical images 177
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 163
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 162
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images 161
A fuzzy logic based reputation system for E-markets 159
A machine learning‐based memory forensics methodology for TOR browser artifacts 152
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 152
A collaborative decision-support system for secure analysis of cranial disorders 152
An efficient two-factor authentication scheme based on the Merkle tree 150
An intrusion detection approach based on improved deep belief network 149
Compression-based steganography 148
A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles 146
On Secure Data Management in Health-Care Environment 140
Protection of microscopy images through digital watermarking techniques 138
Reversible Copyright Protection for DNA Microarray Images 137
Cryptographic Hierarchical Access Control for Dynamic Structures 134
On the protection of consumer genomic data in the Internet of Living Things 133
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 132
Building a network embedded FEC protocol by using game theory 124
Hierarchical and shared key assignment 123
On the File Recovery in Systems Infected by Ransomware 122
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 121
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 116
A Systematic Review of Consensus Mechanisms in Blockchain 115
Effective classification of android malware families through dynamic features and neural networks 115
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement 114
14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021 110
Hierarchical and Shared Access Control 109
Data hiding using compressed archives 107
Secure and reliable data communication in developing regions and rural areas 106
One-pass lossless data hiding and compression of remote sensing data 105
Improving Drone Security in Smart Cities via Lightweight Cryptography 94
Modeling and analysis of port supply chain system based on Fabric blockchain 86
The Future of Metaverse Security 82
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 78
A two-stage intrusion detection approach for software-defined IoT networks 78
Preface 77
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control 76
Secure weighted possibilistic c-means algorithm on cloud for clustering big data 73
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks 68
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov) 66
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation 66
Securing the internet of vehicles through lightweight block ciphers 65
COVID-19 data sharing and organization through blockchain and decentralized models 64
A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET) 62
A secure distributed video surveillance system based on portable devices 60
Preface 60
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey 56
On the impact of lightweight ciphers in automotive networks 52
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption 48
On the undetectability of payloads generated through automatic tools: A human-oriented approach 47
Safety, Ethics, and Regulation in Intelligent Drones 45
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation 42
IoT-based health monitoring system to handle pandemic diseases using estimated computing 40
Robust End Hopping for Secure Satellite Communication in Moving Target Defense 39
Zero Knowledge Proofs and Their Applications in Cryptography 36
DSTGCS: an intelligent dynamic spatial–temporal graph convolutional system for traffic flow prediction in ITS 34
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management 26
A Modular and Scalable Framework for Effective Server-Side Forensic Analysis of XSS Attacks 26
A Mobile Forensic Tool for Enhancing Cyber-Physical Security by Detecting XSS Attacks Through Web Server Access Log Analysis 23
AI-Driven Intelligent Attack Detection for IoT Networks Using Big Data and Machine Learning 23
Securing in-vehicle communications through post-quantum cryptography and network segmentation 15
Optimized Deep Learning Based Phishing Email Detection Using BERT and Hill Climbing Algorithm 10
PFLIC: A novel personalized federated learning-based iterative clustering 9
Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks 9
Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents 8
Fennec Fox Optimized Federated Learning for Phishing Detection in Next-Generation Smart Device Networks 7
New Insights on cryptographic hierarchical access control: models, schemes and analysis 2
Totale 16.792
Categoria #
all - tutte 39.408
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 39.408


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021229 0 0 0 0 0 0 30 7 71 29 41 51
2021/2022526 4 5 9 13 13 52 12 21 41 47 108 201
2022/2023645 67 60 12 77 80 134 16 58 97 3 25 16
2023/2024401 38 38 27 22 33 45 46 26 8 15 35 68
2024/20251.160 25 25 21 82 44 105 194 80 130 57 175 222
2025/202611.614 1.865 4.965 3.326 394 505 260 299 0 0 0 0 0
Totale 16.792