CASTIGLIONE, Aniello
 Distribuzione geografica
Continente #
AS - Asia 16.460
NA - Nord America 12.514
EU - Europa 3.601
SA - Sud America 1.160
AF - Africa 187
OC - Oceania 28
Continente sconosciuto - Info sul continente non disponibili 11
Totale 33.961
Nazione #
US - Stati Uniti d'America 12.283
HK - Hong Kong 10.784
SG - Singapore 2.590
CN - Cina 1.159
IT - Italia 923
BR - Brasile 857
VN - Vietnam 826
RU - Federazione Russa 487
UA - Ucraina 474
DE - Germania 345
FR - Francia 331
IE - Irlanda 309
TR - Turchia 216
KR - Corea 188
IN - India 186
SE - Svezia 163
CA - Canada 132
GB - Regno Unito 131
AR - Argentina 130
FI - Finlandia 123
BD - Bangladesh 84
MX - Messico 65
NL - Olanda 56
PL - Polonia 56
ID - Indonesia 55
IQ - Iraq 54
ZA - Sudafrica 53
JP - Giappone 48
EC - Ecuador 42
EE - Estonia 42
CO - Colombia 39
ES - Italia 35
UZ - Uzbekistan 35
PK - Pakistan 34
MA - Marocco 29
PH - Filippine 25
AT - Austria 23
CL - Cile 23
VE - Venezuela 23
SA - Arabia Saudita 22
TN - Tunisia 22
MY - Malesia 21
AU - Australia 19
AE - Emirati Arabi Uniti 16
LT - Lituania 16
PY - Paraguay 15
TW - Taiwan 15
EG - Egitto 14
KE - Kenya 13
IR - Iran 12
UY - Uruguay 12
NP - Nepal 11
CZ - Repubblica Ceca 10
PE - Perù 10
EU - Europa 9
BG - Bulgaria 8
BO - Bolivia 8
MK - Macedonia 8
PT - Portogallo 8
CH - Svizzera 7
DZ - Algeria 7
ET - Etiopia 7
KZ - Kazakistan 7
LY - Libia 7
NZ - Nuova Zelanda 7
BY - Bielorussia 6
GE - Georgia 6
GR - Grecia 6
IL - Israele 6
JO - Giordania 6
RO - Romania 6
TH - Thailandia 6
BE - Belgio 5
JM - Giamaica 5
KG - Kirghizistan 5
KH - Cambogia 5
OM - Oman 5
PS - Palestinian Territory 5
RS - Serbia 5
SN - Senegal 5
AL - Albania 4
CR - Costa Rica 4
DO - Repubblica Dominicana 4
LB - Libano 4
NG - Nigeria 4
YE - Yemen 4
AZ - Azerbaigian 3
BW - Botswana 3
CG - Congo 3
GA - Gabon 3
HN - Honduras 3
KW - Kuwait 3
LK - Sri Lanka 3
PA - Panama 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
AO - Angola 2
BB - Barbados 2
BH - Bahrain 2
CM - Camerun 2
Totale 33.913
Città #
Hong Kong 10.762
Ann Arbor 2.309
Singapore 1.196
San Jose 1.161
Dallas 855
Ashburn 828
Woodbridge 818
Chandler 770
Houston 687
Wilmington 598
Jacksonville 543
Princeton 539
Council Bluffs 314
Dublin 302
Lauterbourg 261
The Dalles 239
Beijing 237
Ho Chi Minh City 217
Dong Ket 182
Izmir 167
Moscow 164
Hanoi 143
Los Angeles 132
Salerno 121
Nanjing 117
Andover 116
Boardman 113
Washington 101
Pellezzano 99
Dearborn 82
Munich 77
New York 75
São Paulo 71
Santa Clara 69
Mestre 65
Orem 57
Nanchang 55
Düsseldorf 53
Rome 53
Naples 48
Fairfield 46
Shenyang 46
Ottawa 44
Changsha 42
Tokyo 41
Tallinn 40
Hebei 39
Amsterdam 38
Montreal 38
Nuremberg 38
Frankfurt am Main 37
Warsaw 36
Chicago 35
Brooklyn 34
Columbus 32
Haiphong 32
Chennai 31
Fisciano 31
Kyiv 31
Tashkent 31
Jiaxing 30
Guangzhou 29
Norwalk 29
Stockholm 29
Da Nang 28
Pune 28
Johannesburg 26
Milan 26
London 24
Rio de Janeiro 24
Seattle 24
Seoul 23
Baghdad 22
Belo Horizonte 22
Napoli 22
Poplar 22
San Francisco 22
Tianjin 21
Denver 20
Atlanta 19
Manchester 19
Redwood City 19
Boston 18
Phoenix 18
Helsinki 17
Toronto 17
Brasília 16
Quito 16
Campinas 15
Charlotte 15
Curitiba 15
Mexico City 15
Ankara 14
Hải Dương 14
Shanghai 14
Biên Hòa 13
Kuala Lumpur 13
Medellín 13
New Delhi 13
Paris 13
Totale 26.335
Nome #
On the (in)Security and Weaknesses of Commonly Used Applications on Large-Scale Distributed Systems 717
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity 668
Secure and distributed video surveillance via portable devices 643
A Power Monitoring Framework of a Post-quantum Cryptography Web Server 634
On the Protection of fMRI Images in Multi-domain Environments 589
Biometric data on the edge for secure, smart and user tailored access to cloud services 586
DA-Net: Dual Attention Network for Flood Forecasting 517
Automatic, Selective and Secure Deletion of Digital Evidence 506
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 505
Layered multicast for reliable event notification over large-scale networks 489
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 473
Forensically-Sound Methods to Collect Live Network Evidence 439
Security and Privacy for Cloud-Based Data Management in the Health Network Service Chain: A Microservice Approach 435
Fractal encoding uses and variations in contemporary biometrics applications 434
Cloud-based adaptive compression and secure management services for 3D healthcare data 432
Advanced services for efficient management of smart farms 423
Format-Independent Protection of DNA Microarray Images 389
Text Compression and Encryption through Smart Devices for Mobile Communication 382
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 379
On-board format-independent security of functional magnetic resonance images 376
On data sovereignty in cloud-based computation offloading for smart cities applications 349
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 332
Encyclopedia of Cryptography, Security and Privacy 304
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions 291
A cloud-based architecture for emergency management and first responders localization in smart city environments 282
Waiting for Tactile: Robotic and Virtual Experiences in the Fog 263
A Secure Distributed Video Surveillance System Based on Portable Devices 252
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 244
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 241
A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services 235
A botnet-based command and control approach relying on swarm intelligence 212
The AVQ Algorithm: Watermarking and Compression Performances. 210
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 210
A Forensic Analysis of Images on Online Social Networks 197
A secure file sharing service for distributed computing environments 194
Applying WBEM to heterogeneous TLC Network Management: an evaluation 189
Biometrics in the Cloud: Challenges and Research Opportunities 188
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 185
GRIMD: distributed computing for chemists and biologists 182
Distributed Group Key Management for Event Notification Confidentiality among Sensors 176
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 176
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 174
A Novel Anti-Forensics Technique for the Android OS 172
Engineering a secure mobile messaging framework 170
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 168
Interconnecting Federated Clouds by Using Publish-Subscribe Service 167
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 166
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 165
A triadic closure and homophily-based recommendation system for online social networks 164
A honeypot system with honeyword-driven fake interactive sessions 160
An asynchronous covert channel using spam 159
On the Construction of a False Digital Alibi on the Android OS 159
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 157
On Secure Data Management in Health-Care Environment 155
Cryptographic Hierarchical Access Control for Dynamic Structures 153
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks 152
Reversible Copyright Protection for DNA Microarray Images 152
A distributed approach to network anomaly detection based on independent component analysis 151
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 151
Automated Production of Predetermined Digital Evidence 150
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 150
On the protection of consumer genomic data in the Internet of Living Things 147
Message from DASC 2024 General Chairs, General Executive Chairs and Program Chairs 145
Protection of microscopy images through digital watermarking techniques 145
A semantic-based methodology for digital forensics analysis 143
A Multi-scheme and Multi-channel Framework for Micropayment Systems 143
Automated Construction of a False Digital Alibi 140
SPEECH: Secure Personal End-to-End Communication with Handheld 139
Experimentations with source camera identification and Online Social Networks 139
Encryption-Based Solution for Data Sovereignty in Federated Clouds 139
Challenges in Delivering Software in the Cloud as Microservices 137
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education 137
3D Face 137
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks 137
CHIS: A big data infrastructure to manage digital cultural items 136
Integrating Post-Quantum Cryptography and Blockchain to Secure Low-Cost IoT Devices 135
An Extensible Framework for Efficient Secure SMS 135
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 135
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 133
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 132
Using Screen Brightness to Improve Security in Mobile Social Network Access 131
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 130
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 130
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 130
Distributed strategic learning for effective gossiping in wireless networks 130
New Steganographic Techniques for the OOXML File Format 129
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 129
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 129
An HLA-based framework for simulation of large-scale critical systems 129
GRASP-based resource re-optimization for effective big data access in federated clouds 127
Special issue on cloud, wireless and e-commerce security 126
How to Forge a Digital Alibi on Mac OS X 125
Hierarchical and Shared Access Control 125
Condensation-based routing in mobile ad-hoc networks 123
Automatic security assessment for next generation wireless mobile networks 121
Optimal data replica placement in large-scale federated architectures 121
Mel Spectrogram-Based CNN Framework for Explainable Audio Deepfake Detection 120
Hybrid indoor and outdoor location services for new generation mobile terminals 120
Device Tracking in Private Networks via NAPT Log Analysis 120
The untrusted handover security of the S-PMIPv6 on LTE-A 119
Totale 23.271
Categoria #
all - tutte 104.153
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 104.153


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021351 0 0 0 0 0 0 0 0 0 18 106 227
2021/20221.027 8 3 4 5 24 18 13 45 138 116 193 460
2022/20232.043 187 163 27 208 207 545 20 192 286 10 144 54
2023/20241.438 86 130 138 79 145 289 66 74 15 105 87 224
2024/20252.871 75 76 46 182 108 301 383 268 525 178 274 455
2025/202619.499 1.235 5.833 5.355 935 1.250 635 2.022 416 689 1.129 0 0
Totale 34.589