CASTIGLIONE, Aniello
 Distribuzione geografica
Continente #
NA - Nord America 9.013
AS - Asia 7.046
EU - Europa 2.882
SA - Sud America 447
AF - Africa 44
OC - Oceania 21
Continente sconosciuto - Info sul continente non disponibili 9
Totale 19.462
Nazione #
US - Stati Uniti d'America 8.900
HK - Hong Kong 4.585
SG - Singapore 945
IT - Italia 802
CN - Cina 712
UA - Ucraina 460
RU - Federazione Russa 457
BR - Brasile 402
IE - Irlanda 304
DE - Germania 287
VN - Vietnam 216
TR - Turchia 188
KR - Corea 154
SE - Svezia 147
FI - Finlandia 118
IN - India 103
CA - Canada 89
GB - Regno Unito 64
FR - Francia 44
EE - Estonia 41
NL - Olanda 38
PL - Polonia 29
AT - Austria 22
ZA - Sudafrica 20
MX - Messico 19
JP - Giappone 18
AR - Argentina 17
ES - Italia 17
AU - Australia 15
BD - Bangladesh 12
TW - Taiwan 12
UZ - Uzbekistan 12
IR - Iran 11
CZ - Repubblica Ceca 10
ID - Indonesia 10
IQ - Iraq 10
EC - Ecuador 9
EU - Europa 9
PK - Pakistan 8
LT - Lituania 7
AE - Emirati Arabi Uniti 6
CH - Svizzera 6
NZ - Nuova Zelanda 6
PH - Filippine 6
EG - Egitto 5
IL - Israele 5
RO - Romania 5
VE - Venezuela 5
BO - Bolivia 4
BY - Bielorussia 4
MK - Macedonia 4
MY - Malesia 4
NG - Nigeria 4
YE - Yemen 4
BE - Belgio 3
CL - Cile 3
DZ - Algeria 3
JO - Giordania 3
MA - Marocco 3
OM - Oman 3
PS - Palestinian Territory 3
PT - Portogallo 3
SA - Arabia Saudita 3
TN - Tunisia 3
BB - Barbados 2
BG - Bulgaria 2
BH - Bahrain 2
CO - Colombia 2
GR - Grecia 2
JM - Giamaica 2
KE - Kenya 2
KG - Kirghizistan 2
LY - Libia 2
NP - Nepal 2
PE - Perù 2
PY - Paraguay 2
RS - Serbia 2
AL - Albania 1
AZ - Azerbaigian 1
BN - Brunei Darussalam 1
CM - Camerun 1
ET - Etiopia 1
GE - Georgia 1
HN - Honduras 1
HR - Croazia 1
KH - Cambogia 1
KZ - Kazakistan 1
MO - Macao, regione amministrativa speciale della Cina 1
NO - Norvegia 1
SK - Slovacchia (Repubblica Slovacca) 1
TH - Thailandia 1
UY - Uruguay 1
Totale 19.462
Città #
Hong Kong 4.576
Ann Arbor 2.309
Woodbridge 818
Chandler 770
Houston 671
Wilmington 598
Jacksonville 543
Princeton 539
Ashburn 493
Singapore 315
Dublin 297
Dong Ket 182
Beijing 172
Izmir 166
Moscow 162
Salerno 117
Andover 116
Nanjing 115
Boardman 110
Washington 100
Pellezzano 99
Dearborn 82
Los Angeles 78
Munich 74
Mestre 65
Dallas 64
Nanchang 54
Düsseldorf 53
Fairfield 46
Shenyang 46
Ottawa 44
Rome 43
Changsha 42
Tallinn 40
Hebei 39
Santa Clara 33
Columbus 31
Jiaxing 30
Kyiv 30
Nuremberg 30
Norwalk 29
New York 28
Pune 28
Naples 27
São Paulo 27
The Dalles 26
Chicago 25
Guangzhou 25
Amsterdam 24
Brooklyn 24
Council Bluffs 23
Napoli 22
Tianjin 21
Seattle 20
Redwood City 19
San Francisco 18
Belo Horizonte 17
London 15
Milan 15
Montreal 15
Warsaw 14
Charlotte 13
Helsinki 13
Rio de Janeiro 13
San Diego 13
Stockholm 13
Turku 13
Paris 12
Tashkent 12
Tokyo 12
Boston 11
Chennai 11
Dormagen 11
Vienna 11
Atlanta 10
Jinan 10
Johannesburg 10
Shanghai 10
Ankara 9
Fisciano 9
Bangalore 8
Cambridge 8
Hanoi 8
Lappeenranta 8
Marigliano 8
Mexico City 8
Nettuno 8
New Delhi 8
Spinea 8
Brno 7
Campinas 7
Falls Church 7
Giugliano In Campania 7
Ho Chi Minh City 7
Joinville 7
Padova 7
Phoenix 7
Sydney 7
Tappahannock 7
Toronto 7
Totale 15.019
Nome #
Forensically-Sound Methods to Collect Live Network Evidence 400
On the (in)Security and Weaknesses of Commonly Used Applications on Large-Scale Distributed Systems 371
A Power Monitoring Framework of a Post-quantum Cryptography Web Server 365
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity 325
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 322
On-board format-independent security of functional magnetic resonance images 321
Secure and distributed video surveillance via portable devices 307
On the Protection of fMRI Images in Multi-domain Environments 295
Biometric data on the edge for secure, smart and user tailored access to cloud services 277
Automatic, Selective and Secure Deletion of Digital Evidence 259
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 258
Cloud-based adaptive compression and secure management services for 3D healthcare data 246
DA-Net: Dual Attention Network for Flood Forecasting 228
Format-Independent Protection of DNA Microarray Images 213
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 208
Text Compression and Encryption through Smart Devices for Mobile Communication 207
A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services 194
Fractal encoding uses and variations in contemporary biometrics applications 174
The AVQ Algorithm: Watermarking and Compression Performances. 168
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 168
A botnet-based command and control approach relying on swarm intelligence 163
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 154
A secure file sharing service for distributed computing environments 148
A cloud-based architecture for emergency management and first responders localization in smart city environments 144
Biometrics in the Cloud: Challenges and Research Opportunities 143
Interconnecting Federated Clouds by Using Publish-Subscribe Service 138
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 137
Encyclopedia of Cryptography, Security and Privacy 134
A Forensic Analysis of Images on Online Social Networks 132
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 132
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 132
Applying WBEM to heterogeneous TLC Network Management: an evaluation 131
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 130
A Secure Distributed Video Surveillance System Based on Portable Devices 129
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 125
Engineering a secure mobile messaging framework 124
Protection of microscopy images through digital watermarking techniques 124
An asynchronous covert channel using spam 123
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 123
A Novel Anti-Forensics Technique for the Android OS 120
GRIMD: distributed computing for chemists and biologists 120
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks 119
On the Construction of a False Digital Alibi on the Android OS 119
Layered multicast for reliable event notification over large-scale networks 119
On Secure Data Management in Health-Care Environment 119
Encryption-Based Solution for Data Sovereignty in Federated Clouds 118
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 117
Reversible Copyright Protection for DNA Microarray Images 114
A triadic closure and homophily-based recommendation system for online social networks 113
Challenges in Delivering Software in the Cloud as Microservices 112
A honeypot system with honeyword-driven fake interactive sessions 111
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 108
Using Screen Brightness to Improve Security in Mobile Social Network Access 107
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education 106
Distributed strategic learning for effective gossiping in wireless networks 106
Automated Production of Predetermined Digital Evidence 105
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 105
An HLA-based framework for simulation of large-scale critical systems 104
Special issue on cloud, wireless and e-commerce security 103
A distributed approach to network anomaly detection based on independent component analysis 103
SPEECH: Secure Personal End-to-End Communication with Handheld 102
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 102
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 101
A secure payment system for multimedia on demand on mobile VANET clouds 101
Condensation-based routing in mobile ad-hoc networks 100
Automatic security assessment for next generation wireless mobile networks 100
CHIS: A big data infrastructure to manage digital cultural items 100
Integrating Post-Quantum Cryptography and Blockchain to Secure Low-Cost IoT Devices 99
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 99
Automated Construction of a False Digital Alibi 98
New Steganographic Techniques for the OOXML File Format 98
GRASP-based resource re-optimization for effective big data access in federated clouds 98
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions 98
Secure and reliable data communication in developing regions and rural areas 97
Hybrid indoor and outdoor location services for new generation mobile terminals 96
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 95
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 95
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 95
Waiting for Tactile: Robotic and Virtual Experiences in the Fog 94
An Extensible Framework for Efficient Secure SMS 94
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 94
Device Tracking in Private Networks via NAPT Log Analysis 94
The untrusted handover security of the S-PMIPv6 on LTE-A 93
Cryptographic Hierarchical Access Control for Dynamic Structures 93
How to Forge a Digital Alibi on Mac OS X 92
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 92
Optimal data replica placement in large-scale federated architectures 92
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 92
Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata 91
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 91
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 91
A Multi-scheme and Multi-channel Framework for Micropayment Systems 91
Hierarchical and Shared Access Control 90
On the protection of consumer genomic data in the Internet of Living Things 90
Modeling security requirements for cloud-based system development 89
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System 88
Experimentations with source camera identification and Online Social Networks 88
On asynchronous enforcement of security policies in 'Nomadic' storage facilities 88
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 87
Multimedia-based battery drain attacks for Android devices 86
Totale 13.994
Categoria #
all - tutte 73.453
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 73.453


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.057 0 76 87 11 111 54 115 22 230 18 106 227
2021/20221.027 8 3 4 5 24 18 13 45 138 116 193 460
2022/20232.043 187 163 27 208 207 545 20 192 286 10 144 54
2023/20241.438 86 130 138 79 145 289 66 74 15 105 87 224
2024/20252.871 75 76 46 182 108 301 383 268 525 178 274 455
2025/20264.984 1.235 3.749 0 0 0 0 0 0 0 0 0 0
Totale 20.074