CASTIGLIONE, Arcangelo
 Distribuzione geografica
Continente #
AS - Asia 10.846
NA - Nord America 3.393
EU - Europa 1.215
SA - Sud America 294
AF - Africa 25
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 3
Totale 15.782
Nazione #
HK - Hong Kong 9.761
US - Stati Uniti d'America 3.331
IT - Italia 454
SG - Singapore 429
CN - Cina 317
BR - Brasile 228
RU - Federazione Russa 205
DE - Germania 136
UA - Ucraina 94
IE - Irlanda 89
VN - Vietnam 69
TR - Turchia 68
KR - Corea 59
SE - Svezia 51
IN - India 44
FI - Finlandia 40
GB - Regno Unito 40
CA - Canada 39
AR - Argentina 33
PL - Polonia 27
JP - Giappone 18
FR - Francia 15
MX - Messico 15
NL - Olanda 14
ZA - Sudafrica 12
ES - Italia 11
BD - Bangladesh 10
EC - Ecuador 10
TW - Taiwan 10
AT - Austria 9
ID - Indonesia 9
IR - Iran 9
PK - Pakistan 8
PY - Paraguay 8
CO - Colombia 7
PH - Filippine 7
MY - Malesia 6
RO - Romania 6
AE - Emirati Arabi Uniti 5
AU - Australia 5
LT - Lituania 5
IQ - Iraq 4
UZ - Uzbekistan 4
BE - Belgio 3
CL - Cile 3
EE - Estonia 3
JM - Giamaica 3
NO - Norvegia 3
SA - Arabia Saudita 3
SC - Seychelles 3
VE - Venezuela 3
BG - Bulgaria 2
CZ - Repubblica Ceca 2
EU - Europa 2
MA - Marocco 2
OM - Oman 2
PT - Portogallo 2
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
BO - Bolivia 1
CI - Costa d'Avorio 1
CW - ???statistics.table.value.countryCode.CW??? 1
DM - Dominica 1
DO - Repubblica Dominicana 1
EG - Egitto 1
GH - Ghana 1
GT - Guatemala 1
HU - Ungheria 1
IL - Israele 1
JO - Giordania 1
MK - Macedonia 1
NZ - Nuova Zelanda 1
PA - Panama 1
RS - Serbia 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
TH - Thailandia 1
TN - Tunisia 1
UG - Uganda 1
UY - Uruguay 1
Totale 15.782
Città #
Hong Kong 9.747
Ann Arbor 825
Chandler 278
Dallas 228
Wilmington 228
Princeton 221
Woodbridge 216
Houston 174
Jacksonville 141
Singapore 131
Ashburn 113
Beijing 88
Salerno 83
Dublin 76
Izmir 60
Moscow 54
New York 38
Andover 37
Los Angeles 35
Munich 35
Naples 30
Dearborn 29
Boardman 28
Pellezzano 28
Dong Ket 27
Nanjing 27
Fairfield 24
The Dalles 23
Ho Chi Minh City 19
São Paulo 19
Boydton 18
Columbus 18
Council Bluffs 18
Mestre 18
Regensburg 18
Tokyo 17
Brooklyn 16
Düsseldorf 16
Helsinki 15
Warsaw 15
Nanchang 14
Nuremberg 14
Ottawa 14
Redwood City 13
Hebei 12
Stockholm 12
Changsha 11
Denver 11
Jiaxing 11
Santa Clara 11
Shenyang 11
Montreal 10
Atlanta 9
Battipaglia 9
Boston 9
Hanoi 9
Phoenix 9
Rome 9
Seattle 9
St Petersburg 9
Amsterdam 8
Buenos Aires 8
Fisciano 8
Milan 8
Napoli 8
Ankara 7
Belo Horizonte 7
Chennai 7
Johannesburg 7
London 7
Orem 7
Rio de Janeiro 7
Turku 7
Frankfurt am Main 6
Kraków 6
Manchester 6
Montecorvino Rovella 6
Norwalk 6
Poplar 6
Pune 6
Quito 6
San Francisco 6
Seoul 6
Toronto 6
Asunción 5
Campinas 5
Curitiba 5
Hyderabad 5
Joinville 5
Marigliano 5
San Diego 5
Shanghai 5
Tianjin 5
Buffalo 4
Charlotte 4
Kolkata 4
Mexico City 4
New Delhi 4
Solofra 4
Tashkent 4
Totale 13.682
Nome #
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications 885
DNS tunnels detection via DNS-images 846
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing 667
Secure and distributed video surveillance via portable devices 604
On the Protection of fMRI Images in Multi-domain Environments 564
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 540
High-precision linearized interpretation for fully connected neural network 519
Welcome Messages from IEEE BigDataSE 2020 Program Chairs 516
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 483
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 443
Cloud-based adaptive compression and secure management services for 3D healthcare data 408
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning 398
Format-Independent Protection of DNA Microarray Images 371
Text Compression and Encryption through Smart Devices for Mobile Communication 363
On-board format-independent security of functional magnetic resonance images 352
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 316
Quantum technique for access control in cloud computing II: Encryption and key distribution 282
Secure group communication schemes for dynamic heterogeneous distributed computing 258
Ethical AI Development and Deployment 248
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 225
A Secure Distributed Video Surveillance System Based on Portable Devices 220
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 214
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 190
Enhancing Autonomous System Security With AI and Secure Computation Technologies 187
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities 182
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment 170
Parallel low-complexity lossless coding of three-dimensional medical images 169
An Efficient Protocol for Reliable Data Communication on Dataless Devices 164
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 158
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images 151
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 151
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 149
A machine learning‐based memory forensics methodology for TOR browser artifacts 146
A fuzzy logic based reputation system for E-markets 146
An intrusion detection approach based on improved deep belief network 143
An efficient two-factor authentication scheme based on the Merkle tree 143
A collaborative decision-support system for secure analysis of cranial disorders 141
A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles 136
Compression-based steganography 134
On Secure Data Management in Health-Care Environment 132
Protection of microscopy images through digital watermarking techniques 131
On the protection of consumer genomic data in the Internet of Living Things 127
Reversible Copyright Protection for DNA Microarray Images 125
Cryptographic Hierarchical Access Control for Dynamic Structures 124
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 120
Building a network embedded FEC protocol by using game theory 118
Hierarchical and shared key assignment 115
On the File Recovery in Systems Infected by Ransomware 112
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 109
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 107
Effective classification of android malware families through dynamic features and neural networks 105
Hierarchical and Shared Access Control 104
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement 104
A Systematic Review of Consensus Mechanisms in Blockchain 102
Secure and reliable data communication in developing regions and rural areas 100
One-pass lossless data hiding and compression of remote sensing data 98
Data hiding using compressed archives 96
14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021 94
Improving Drone Security in Smart Cities via Lightweight Cryptography 86
Modeling and analysis of port supply chain system based on Fabric blockchain 82
Preface 73
The Future of Metaverse Security 72
A two-stage intrusion detection approach for software-defined IoT networks 72
Secure weighted possibilistic c-means algorithm on cloud for clustering big data 69
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 69
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control 66
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation 62
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks 58
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov) 57
Securing the internet of vehicles through lightweight block ciphers 56
COVID-19 data sharing and organization through blockchain and decentralized models 56
Preface 54
A secure distributed video surveillance system based on portable devices 52
A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET) 52
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey 48
On the impact of lightweight ciphers in automotive networks 46
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption 42
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation 38
On the undetectability of payloads generated through automatic tools: A human-oriented approach 38
Safety, Ethics, and Regulation in Intelligent Drones 36
Robust End Hopping for Secure Satellite Communication in Moving Target Defense 36
IoT-based health monitoring system to handle pandemic diseases using estimated computing 30
Zero Knowledge Proofs and Their Applications in Cryptography 29
DSTGCS: an intelligent dynamic spatial–temporal graph convolutional system for traffic flow prediction in ITS 28
A Modular and Scalable Framework for Effective Server-Side Forensic Analysis of XSS Attacks 18
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management 17
AI-Driven Intelligent Attack Detection for IoT Networks Using Big Data and Machine Learning 16
A Mobile Forensic Tool for Enhancing Cyber-Physical Security by Detecting XSS Attacks Through Web Server Access Log Analysis 9
Securing in-vehicle communications through post-quantum cryptography and network segmentation 8
PFLIC: A novel personalized federated learning-based iterative clustering 5
Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks 5
Fennec Fox Optimized Federated Learning for Phishing Detection in Next-Generation Smart Device Networks 3
Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents 3
Optimized Deep Learning Based Phishing Email Detection Using BERT and Hill Climbing Algorithm 2
Totale 15.998
Categoria #
all - tutte 37.505
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 37.505


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021287 0 0 0 0 39 19 30 7 71 29 41 51
2021/2022526 4 5 9 13 13 52 12 21 41 47 108 201
2022/2023645 67 60 12 77 80 134 16 58 97 3 25 16
2023/2024401 38 38 27 22 33 45 46 26 8 15 35 68
2024/20251.160 25 25 21 82 44 105 194 80 130 57 175 222
2025/202610.820 1.865 4.965 3.326 394 270 0 0 0 0 0 0 0
Totale 15.998