CASTIGLIONE, Aniello
 Distribuzione geografica
Continente #
NA - Nord America 8.522
EU - Europa 2.672
AS - Asia 2.213
SA - Sud America 320
AF - Africa 27
OC - Oceania 20
Continente sconosciuto - Info sul continente non disponibili 9
Totale 13.783
Nazione #
US - Stati Uniti d'America 8.450
SG - Singapore 827
IT - Italia 778
CN - Cina 689
UA - Ucraina 457
RU - Federazione Russa 454
IE - Irlanda 303
BR - Brasile 288
DE - Germania 214
VN - Vietnam 192
TR - Turchia 178
SE - Svezia 138
KR - Corea 111
FI - Finlandia 106
IN - India 77
CA - Canada 65
HK - Hong Kong 47
EE - Estonia 41
FR - Francia 40
GB - Regno Unito 38
NL - Olanda 30
AT - Austria 18
AU - Australia 14
PL - Polonia 13
AR - Argentina 12
ID - Indonesia 10
TW - Taiwan 10
ZA - Sudafrica 10
CZ - Repubblica Ceca 9
EU - Europa 9
IR - Iran 9
UZ - Uzbekistan 9
EC - Ecuador 6
JP - Giappone 6
MX - Messico 6
NZ - Nuova Zelanda 6
PH - Filippine 6
CH - Svizzera 5
EG - Egitto 5
IQ - Iraq 5
PK - Pakistan 5
BD - Bangladesh 4
BO - Bolivia 4
BY - Bielorussia 4
MK - Macedonia 4
YE - Yemen 4
BE - Belgio 3
DZ - Algeria 3
IL - Israele 3
PS - Palestinian Territory 3
PT - Portogallo 3
RO - Romania 3
TN - Tunisia 3
VE - Venezuela 3
AE - Emirati Arabi Uniti 2
BG - Bulgaria 2
CL - Cile 2
ES - Italia 2
GR - Grecia 2
KG - Kirghizistan 2
LY - Libia 2
MA - Marocco 2
OM - Oman 2
PE - Perù 2
SA - Arabia Saudita 2
AZ - Azerbaigian 1
BH - Bahrain 1
BN - Brunei Darussalam 1
CM - Camerun 1
CO - Colombia 1
GE - Georgia 1
HR - Croazia 1
JM - Giamaica 1
JO - Giordania 1
KE - Kenya 1
KH - Cambogia 1
LT - Lituania 1
MO - Macao, regione amministrativa speciale della Cina 1
MY - Malesia 1
NO - Norvegia 1
NP - Nepal 1
PY - Paraguay 1
RS - Serbia 1
SK - Slovacchia (Repubblica Slovacca) 1
TH - Thailandia 1
UY - Uruguay 1
Totale 13.783
Città #
Ann Arbor 2.309
Woodbridge 818
Chandler 770
Houston 670
Wilmington 598
Jacksonville 542
Princeton 539
Ashburn 446
Dublin 297
Singapore 257
Dong Ket 182
Izmir 166
Moscow 162
Beijing 158
Salerno 117
Andover 116
Nanjing 115
Boardman 110
Washington 100
Pellezzano 99
Dearborn 82
Mestre 65
Nanchang 54
Düsseldorf 53
Fairfield 46
Shenyang 46
Los Angeles 45
Ottawa 44
Changsha 42
Hong Kong 42
Tallinn 40
Hebei 39
Rome 37
Dallas 35
Jiaxing 30
Kyiv 29
Norwalk 29
Naples 26
Guangzhou 25
Nuremberg 25
Pune 25
Napoli 22
Amsterdam 21
Tianjin 21
Council Bluffs 19
Redwood City 19
Seattle 17
São Paulo 16
Belo Horizonte 15
Milan 15
Helsinki 13
New York 13
San Diego 13
Chicago 12
Paris 12
Dormagen 11
Munich 11
Rio de Janeiro 11
Jinan 10
Shanghai 10
Fisciano 9
Santa Clara 9
Tashkent 9
Vienna 9
Bangalore 8
Cambridge 8
London 8
Marigliano 8
Nettuno 8
Spinea 8
Brno 7
Falls Church 7
Giugliano In Campania 7
Joinville 7
Lappeenranta 7
Padova 7
Sydney 7
Tappahannock 7
Boscotrecase 6
Delhi 6
Edinburgh 6
Espoo 6
Hangzhou 6
Kraków 6
Montecorvino Rovella 6
Montréal 6
Toronto 6
Whitechapel 6
Wuhan 6
Campinas 5
Hưng Yên 5
Manaus 5
Mugnano di Napoli 5
Omaha 5
Quito 5
Somma Vesuviana 5
The Dalles 5
Verona 5
Brisbane 4
Cairo 4
Totale 9.970
Nome #
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 158
The AVQ Algorithm: Watermarking and Compression Performances. 155
A botnet-based command and control approach relying on swarm intelligence 155
A secure file sharing service for distributed computing environments 141
Forensically-Sound Methods to Collect Live Network Evidence 133
Interconnecting Federated Clouds by Using Publish-Subscribe Service 131
Automatic, Selective and Secure Deletion of Digital Evidence 130
Format-Independent Protection of DNA Microarray Images 125
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 125
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 125
A Forensic Analysis of Images on Online Social Networks 124
Cloud-based adaptive compression and secure management services for 3D healthcare data 122
Applying WBEM to heterogeneous TLC Network Management: an evaluation 121
An asynchronous covert channel using spam 119
Engineering a secure mobile messaging framework 119
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 118
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 117
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 116
Protection of microscopy images through digital watermarking techniques 116
GRIMD: distributed computing for chemists and biologists 115
A Novel Anti-Forensics Technique for the Android OS 114
On Secure Data Management in Health-Care Environment 114
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 113
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks 112
Encryption-Based Solution for Data Sovereignty in Federated Clouds 111
Challenges in Delivering Software in the Cloud as Microservices 110
Reversible Copyright Protection for DNA Microarray Images 109
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 107
Using Screen Brightness to Improve Security in Mobile Social Network Access 107
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 106
A triadic closure and homophily-based recommendation system for online social networks 104
An HLA-based framework for simulation of large-scale critical systems 104
A honeypot system with honeyword-driven fake interactive sessions 104
On-board format-independent security of functional magnetic resonance images 102
Special issue on cloud, wireless and e-commerce security 101
Secure and distributed video surveillance via portable devices 101
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 101
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education 101
Condensation-based routing in mobile ad-hoc networks 100
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 100
A secure payment system for multimedia on demand on mobile VANET clouds 99
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 99
CHIS: A big data infrastructure to manage digital cultural items 99
Automatic security assessment for next generation wireless mobile networks 98
Distributed strategic learning for effective gossiping in wireless networks 97
Hybrid indoor and outdoor location services for new generation mobile terminals 96
A distributed approach to network anomaly detection based on independent component analysis 96
Automated Production of Predetermined Digital Evidence 96
SPEECH: Secure Personal End-to-End Communication with Handheld 95
On the Construction of a False Digital Alibi on the Android OS 95
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 95
Secure and reliable data communication in developing regions and rural areas 95
Device Tracking in Private Networks via NAPT Log Analysis 94
Automated Construction of a False Digital Alibi 93
New Steganographic Techniques for the OOXML File Format 93
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 93
The untrusted handover security of the S-PMIPv6 on LTE-A 92
Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata 91
GRASP-based resource re-optimization for effective big data access in federated clouds 91
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 91
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 90
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 90
A Secure Distributed Video Surveillance System Based on Portable Devices 90
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 89
Modeling security requirements for cloud-based system development 89
On the Protection of fMRI Images in Multi-domain Environments 89
An Extensible Framework for Efficient Secure SMS 88
How to Forge a Digital Alibi on Mac OS X 88
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 88
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System 87
Text Compression and Encryption through Smart Devices for Mobile Communication 87
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 86
Enhanced Network Support for Federated Cloud Infrastructures 86
Optimal data replica placement in large-scale federated architectures 86
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 85
Hierarchical and Shared Access Control 84
Biometrics in the Cloud: Challenges and Research Opportunities 84
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing 83
A cloud-based architecture for emergency management and first responders localization in smart city environments 83
On asynchronous enforcement of security policies in 'Nomadic' storage facilities 83
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 82
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 82
On the protection of consumer genomic data in the Internet of Living Things 81
A Multi-scheme and Multi-channel Framework for Micropayment Systems 81
E-mail-based Covert Channels for Asynchronous Message Steganography 81
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 80
Multimedia-based battery drain attacks for Android devices 80
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 80
Analyzing the Internet Stability in Presence of Disasters 78
Modeling performances of concurrent big data applications 78
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices 77
3D Face 77
Experimentations with source camera identification and Online Social Networks 76
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 76
An Intelligent Security Architecture for Distributed Firewalling Environments 76
Cryptographic Hierarchical Access Control for Dynamic Structures 75
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 75
Layered multicast for reliable event notification over large-scale networks 74
Exploiting mean field analysis to model performances of big data architectures 73
Do You Trust Your Phone? 73
Totale 9.874
Categoria #
all - tutte 59.646
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 59.646


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020253 0 0 0 0 0 0 0 0 0 0 204 49
2020/20211.067 10 76 87 11 111 54 115 22 230 18 106 227
2021/20221.027 8 3 4 5 24 18 13 45 138 116 193 460
2022/20232.043 187 163 27 208 207 545 20 192 286 10 144 54
2023/20241.438 86 130 138 79 145 289 66 74 15 105 87 224
2024/20252.162 75 76 46 182 108 301 383 268 525 178 20 0
Totale 14.381