CASTIGLIONE, Aniello
 Distribuzione geografica
Continente #
AS - Asia 13.575
NA - Nord America 9.868
EU - Europa 2.964
SA - Sud America 644
AF - Africa 77
OC - Oceania 27
Continente sconosciuto - Info sul continente non disponibili 11
Totale 27.166
Nazione #
HK - Hong Kong 10.716
US - Stati Uniti d'America 9.737
SG - Singapore 1.011
CN - Cina 872
IT - Italia 844
BR - Brasile 553
UA - Ucraina 462
RU - Federazione Russa 460
VN - Vietnam 309
IE - Irlanda 306
DE - Germania 292
TR - Turchia 190
KR - Corea 176
SE - Svezia 147
FI - Finlandia 118
IN - India 105
CA - Canada 92
GB - Regno Unito 66
FR - Francia 44
EE - Estonia 42
NL - Olanda 41
AR - Argentina 36
PL - Polonia 31
ID - Indonesia 28
ZA - Sudafrica 27
MX - Messico 25
JP - Giappone 23
AT - Austria 22
BD - Bangladesh 21
AU - Australia 18
EC - Ecuador 18
UZ - Uzbekistan 18
ES - Italia 17
TW - Taiwan 14
IQ - Iraq 12
IR - Iran 11
CZ - Repubblica Ceca 10
CO - Colombia 9
EU - Europa 9
PK - Pakistan 9
AE - Emirati Arabi Uniti 8
EG - Egitto 7
LT - Lituania 7
MK - Macedonia 7
NZ - Nuova Zelanda 7
CH - Svizzera 6
CL - Cile 6
MA - Marocco 6
PH - Filippine 6
RO - Romania 6
BG - Bulgaria 5
BO - Bolivia 5
GR - Grecia 5
IL - Israele 5
PE - Perù 5
PT - Portogallo 5
VE - Venezuela 5
BE - Belgio 4
BY - Bielorussia 4
DZ - Algeria 4
KE - Kenya 4
KZ - Kazakistan 4
MY - Malesia 4
NG - Nigeria 4
PY - Paraguay 4
SA - Arabia Saudita 4
YE - Yemen 4
CG - Congo 3
JM - Giamaica 3
JO - Giordania 3
KG - Kirghizistan 3
OM - Oman 3
PS - Palestinian Territory 3
RS - Serbia 3
TN - Tunisia 3
UY - Uruguay 3
AL - Albania 2
BB - Barbados 2
BH - Bahrain 2
BW - Botswana 2
CW - ???statistics.table.value.countryCode.CW??? 2
GA - Gabon 2
GE - Georgia 2
HR - Croazia 2
HU - Ungheria 2
LY - Libia 2
MW - Malawi 2
NO - Norvegia 2
NP - Nepal 2
SN - Senegal 2
TT - Trinidad e Tobago 2
AZ - Azerbaigian 1
BN - Brunei Darussalam 1
CD - Congo 1
CM - Camerun 1
DO - Repubblica Dominicana 1
ET - Etiopia 1
GM - Gambi 1
GN - Guinea 1
GP - Guadalupe 1
Totale 27.148
Città #
Hong Kong 10.704
Ann Arbor 2.309
Dallas 847
Woodbridge 818
Chandler 770
Houston 671
Wilmington 598
Jacksonville 543
Princeton 539
Ashburn 500
Singapore 324
Dublin 299
Dong Ket 182
Beijing 173
Izmir 166
Moscow 162
Salerno 117
Andover 116
Nanjing 115
Boardman 110
Washington 101
Pellezzano 99
Los Angeles 84
Dearborn 82
Munich 74
Mestre 65
Nanchang 54
Düsseldorf 53
Fairfield 46
Shenyang 46
Ottawa 44
Ho Chi Minh City 43
Rome 43
Changsha 42
Tallinn 40
Hebei 39
São Paulo 38
Santa Clara 35
Naples 32
Columbus 31
Nuremberg 31
Jiaxing 30
Kyiv 30
New York 30
Norwalk 29
The Dalles 29
Pune 28
Hanoi 27
Amsterdam 26
Chicago 26
Brooklyn 25
Guangzhou 25
Council Bluffs 23
Fisciano 23
Napoli 22
San Francisco 22
Seoul 22
Seattle 21
Tianjin 21
Belo Horizonte 19
Redwood City 19
Milan 17
Tashkent 17
Tokyo 17
Montreal 16
Warsaw 16
London 15
Rio de Janeiro 15
Atlanta 13
Charlotte 13
Helsinki 13
Johannesburg 13
San Diego 13
Stockholm 13
Turku 13
Boston 12
Paris 12
Chennai 11
Dormagen 11
Vienna 11
Jinan 10
Shanghai 10
Ankara 9
Mexico City 9
Toronto 9
Bangalore 8
Brasília 8
Cambridge 8
Campinas 8
Joinville 8
Lappeenranta 8
Manaus 8
Marigliano 8
Nettuno 8
New Delhi 8
Phoenix 8
Spinea 8
Boscotrecase 7
Brno 7
Falls Church 7
Totale 22.107
Nome #
On the (in)Security and Weaknesses of Commonly Used Applications on Large-Scale Distributed Systems 683
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity 640
Secure and distributed video surveillance via portable devices 603
A Power Monitoring Framework of a Post-quantum Cryptography Web Server 593
On the Protection of fMRI Images in Multi-domain Environments 562
Biometric data on the edge for secure, smart and user tailored access to cloud services 554
DA-Net: Dual Attention Network for Flood Forecasting 495
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 482
Automatic, Selective and Secure Deletion of Digital Evidence 472
Layered multicast for reliable event notification over large-scale networks 453
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 426
Forensically-Sound Methods to Collect Live Network Evidence 405
Cloud-based adaptive compression and secure management services for 3D healthcare data 404
Advanced services for efficient management of smart farms 401
Security and Privacy for Cloud-Based Data Management in the Health Network Service Chain: A Microservice Approach 401
Fractal encoding uses and variations in contemporary biometrics applications 399
Format-Independent Protection of DNA Microarray Images 363
Text Compression and Encryption through Smart Devices for Mobile Communication 359
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 355
On-board format-independent security of functional magnetic resonance images 350
On data sovereignty in cloud-based computation offloading for smart cities applications 331
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 309
Encyclopedia of Cryptography, Security and Privacy 279
A cloud-based architecture for emergency management and first responders localization in smart city environments 250
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions 248
Waiting for Tactile: Robotic and Virtual Experiences in the Fog 238
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 222
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 213
A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services 206
A Secure Distributed Video Surveillance System Based on Portable Devices 203
The AVQ Algorithm: Watermarking and Compression Performances. 178
A botnet-based command and control approach relying on swarm intelligence 177
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 177
A secure file sharing service for distributed computing environments 160
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 157
Distributed Group Key Management for Event Notification Confidentiality among Sensors 154
A Forensic Analysis of Images on Online Social Networks 151
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 150
Biometrics in the Cloud: Challenges and Research Opportunities 149
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 148
Applying WBEM to heterogeneous TLC Network Management: an evaluation 144
Interconnecting Federated Clouds by Using Publish-Subscribe Service 142
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 137
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 137
A Novel Anti-Forensics Technique for the Android OS 136
An asynchronous covert channel using spam 135
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 133
Engineering a secure mobile messaging framework 131
Protection of microscopy images through digital watermarking techniques 127
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 127
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 125
On Secure Data Management in Health-Care Environment 125
On the Construction of a False Digital Alibi on the Android OS 124
GRIMD: distributed computing for chemists and biologists 124
A distributed approach to network anomaly detection based on independent component analysis 123
Reversible Copyright Protection for DNA Microarray Images 123
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks 122
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 120
Cryptographic Hierarchical Access Control for Dynamic Structures 120
Encryption-Based Solution for Data Sovereignty in Federated Clouds 120
A triadic closure and homophily-based recommendation system for online social networks 118
A honeypot system with honeyword-driven fake interactive sessions 117
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks 116
Challenges in Delivering Software in the Cloud as Microservices 114
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education 113
Automated Production of Predetermined Digital Evidence 112
Message from DASC 2024 General Chairs, General Executive Chairs and Program Chairs 111
Experimentations with source camera identification and Online Social Networks 111
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 110
On the protection of consumer genomic data in the Internet of Living Things 110
An HLA-based framework for simulation of large-scale critical systems 109
Using Screen Brightness to Improve Security in Mobile Social Network Access 109
Distributed strategic learning for effective gossiping in wireless networks 109
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 108
SPEECH: Secure Personal End-to-End Communication with Handheld 106
Automated Construction of a False Digital Alibi 106
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 106
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 106
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 106
Integrating Post-Quantum Cryptography and Blockchain to Secure Low-Cost IoT Devices 105
A semantic-based methodology for digital forensics analysis 105
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 105
GRASP-based resource re-optimization for effective big data access in federated clouds 105
Special issue on cloud, wireless and e-commerce security 104
Condensation-based routing in mobile ad-hoc networks 103
Hierarchical and Shared Access Control 103
CHIS: A big data infrastructure to manage digital cultural items 103
A Multi-scheme and Multi-channel Framework for Micropayment Systems 103
An Extensible Framework for Efficient Secure SMS 102
New Steganographic Techniques for the OOXML File Format 102
Hybrid indoor and outdoor location services for new generation mobile terminals 101
Automatic security assessment for next generation wireless mobile networks 101
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 101
A secure payment system for multimedia on demand on mobile VANET clouds 101
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 99
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 99
Secure and reliable data communication in developing regions and rural areas 99
3D Face 99
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 97
How to Forge a Digital Alibi on Mac OS X 96
Totale 20.305
Categoria #
all - tutte 88.135
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 88.135


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021894 0 0 0 11 111 54 115 22 230 18 106 227
2021/20221.027 8 3 4 5 24 18 13 45 138 116 193 460
2022/20232.043 187 163 27 208 207 545 20 192 286 10 144 54
2023/20241.438 86 130 138 79 145 289 66 74 15 105 87 224
2024/20252.871 75 76 46 182 108 301 383 268 525 178 274 455
2025/202612.695 1.235 5.833 5.355 272 0 0 0 0 0 0 0 0
Totale 27.785