CASTIGLIONE, Aniello
 Distribuzione geografica
Continente #
NA - Nord America 8.798
EU - Europa 2.803
AS - Asia 2.491
SA - Sud America 406
AF - Africa 36
OC - Oceania 21
Continente sconosciuto - Info sul continente non disponibili 9
Totale 14.564
Nazione #
US - Stati Uniti d'America 8.705
SG - Singapore 912
IT - Italia 791
CN - Cina 704
UA - Ucraina 459
RU - Federazione Russa 457
BR - Brasile 367
IE - Irlanda 303
DE - Germania 268
VN - Vietnam 199
TR - Turchia 184
KR - Corea 154
SE - Svezia 140
HK - Hong Kong 135
FI - Finlandia 118
IN - India 88
CA - Canada 78
GB - Regno Unito 47
FR - Francia 42
EE - Estonia 41
NL - Olanda 36
AT - Austria 21
PL - Polonia 21
AR - Argentina 16
AU - Australia 15
ZA - Sudafrica 14
MX - Messico 13
UZ - Uzbekistan 12
TW - Taiwan 11
CZ - Repubblica Ceca 10
ES - Italia 10
ID - Indonesia 10
IR - Iran 10
BD - Bangladesh 9
EU - Europa 9
JP - Giappone 9
EC - Ecuador 7
IQ - Iraq 7
NZ - Nuova Zelanda 6
PH - Filippine 6
PK - Pakistan 6
CH - Svizzera 5
EG - Egitto 5
LT - Lituania 5
RO - Romania 5
VE - Venezuela 5
AE - Emirati Arabi Uniti 4
BO - Bolivia 4
BY - Bielorussia 4
MK - Macedonia 4
NG - Nigeria 4
YE - Yemen 4
BE - Belgio 3
DZ - Algeria 3
IL - Israele 3
JO - Giordania 3
OM - Oman 3
PS - Palestinian Territory 3
PT - Portogallo 3
TN - Tunisia 3
BG - Bulgaria 2
BH - Bahrain 2
CL - Cile 2
GR - Grecia 2
KE - Kenya 2
KG - Kirghizistan 2
LY - Libia 2
MA - Marocco 2
NP - Nepal 2
PE - Perù 2
RS - Serbia 2
SA - Arabia Saudita 2
AL - Albania 1
AZ - Azerbaigian 1
BB - Barbados 1
BN - Brunei Darussalam 1
CM - Camerun 1
CO - Colombia 1
GE - Georgia 1
HR - Croazia 1
JM - Giamaica 1
KH - Cambogia 1
MO - Macao, regione amministrativa speciale della Cina 1
MY - Malesia 1
NO - Norvegia 1
PY - Paraguay 1
SK - Slovacchia (Repubblica Slovacca) 1
TH - Thailandia 1
UY - Uruguay 1
Totale 14.564
Città #
Ann Arbor 2.309
Woodbridge 818
Chandler 770
Houston 671
Wilmington 598
Jacksonville 543
Princeton 539
Ashburn 457
Dublin 297
Singapore 286
Dong Ket 182
Beijing 168
Izmir 166
Moscow 162
Hong Kong 130
Salerno 117
Andover 116
Nanjing 115
Boardman 110
Washington 100
Pellezzano 99
Dearborn 82
Mestre 65
Los Angeles 60
Munich 57
Nanchang 54
Düsseldorf 53
Dallas 51
Fairfield 46
Shenyang 46
Ottawa 44
Changsha 42
Tallinn 40
Hebei 39
Rome 37
Jiaxing 30
Kyiv 29
Norwalk 29
Nuremberg 29
Columbus 28
Naples 27
São Paulo 26
The Dalles 26
Guangzhou 25
Pune 25
Santa Clara 24
Amsterdam 22
Napoli 22
New York 22
Tianjin 21
Chicago 20
Council Bluffs 19
Redwood City 19
Seattle 19
Belo Horizonte 17
Milan 15
San Francisco 15
Brooklyn 13
Helsinki 13
Rio de Janeiro 13
San Diego 13
Turku 13
Paris 12
Tashkent 12
Dormagen 11
Jinan 10
London 10
Shanghai 10
Vienna 10
Charlotte 9
Chennai 9
Fisciano 9
Bangalore 8
Cambridge 8
Lappeenranta 8
Marigliano 8
Montreal 8
Nettuno 8
Spinea 8
Warsaw 8
Brno 7
Campinas 7
Falls Church 7
Giugliano In Campania 7
Johannesburg 7
Joinville 7
Padova 7
Sydney 7
Tappahannock 7
Toronto 7
Boscotrecase 6
Delhi 6
Edinburgh 6
Espoo 6
Hangzhou 6
Kraków 6
Montecorvino Rovella 6
Montréal 6
Stockholm 6
Whitechapel 6
Totale 10.339
Nome #
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 165
The AVQ Algorithm: Watermarking and Compression Performances. 163
A botnet-based command and control approach relying on swarm intelligence 160
A secure file sharing service for distributed computing environments 145
Forensically-Sound Methods to Collect Live Network Evidence 138
Interconnecting Federated Clouds by Using Publish-Subscribe Service 135
Automatic, Selective and Secure Deletion of Digital Evidence 134
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 132
Format-Independent Protection of DNA Microarray Images 130
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 130
A Forensic Analysis of Images on Online Social Networks 129
Cloud-based adaptive compression and secure management services for 3D healthcare data 127
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 124
Applying WBEM to heterogeneous TLC Network Management: an evaluation 124
Engineering a secure mobile messaging framework 122
Protection of microscopy images through digital watermarking techniques 122
An asynchronous covert channel using spam 121
A Novel Anti-Forensics Technique for the Android OS 119
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 119
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 119
GRIMD: distributed computing for chemists and biologists 118
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks 117
On Secure Data Management in Health-Care Environment 117
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 116
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 113
Encryption-Based Solution for Data Sovereignty in Federated Clouds 113
Reversible Copyright Protection for DNA Microarray Images 113
Challenges in Delivering Software in the Cloud as Microservices 112
A triadic closure and homophily-based recommendation system for online social networks 109
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 108
Using Screen Brightness to Improve Security in Mobile Social Network Access 107
A honeypot system with honeyword-driven fake interactive sessions 107
On-board format-independent security of functional magnetic resonance images 106
Secure and distributed video surveillance via portable devices 105
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 105
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 104
An HLA-based framework for simulation of large-scale critical systems 104
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education 104
Special issue on cloud, wireless and e-commerce security 102
Automated Production of Predetermined Digital Evidence 102
Distributed strategic learning for effective gossiping in wireless networks 102
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 101
A secure payment system for multimedia on demand on mobile VANET clouds 101
Condensation-based routing in mobile ad-hoc networks 100
On the Construction of a False Digital Alibi on the Android OS 100
CHIS: A big data infrastructure to manage digital cultural items 100
A distributed approach to network anomaly detection based on independent component analysis 99
SPEECH: Secure Personal End-to-End Communication with Handheld 99
Automatic security assessment for next generation wireless mobile networks 99
A Secure Distributed Video Surveillance System Based on Portable Devices 99
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 97
Hybrid indoor and outdoor location services for new generation mobile terminals 96
Automated Construction of a False Digital Alibi 96
Secure and reliable data communication in developing regions and rural areas 96
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 95
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 95
New Steganographic Techniques for the OOXML File Format 94
Device Tracking in Private Networks via NAPT Log Analysis 94
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 94
Cloud Manufacturing: Security, Privacy, and Forensic Concerns 93
An Extensible Framework for Efficient Secure SMS 92
Text Compression and Encryption through Smart Devices for Mobile Communication 92
GRASP-based resource re-optimization for effective big data access in federated clouds 92
On the Protection of fMRI Images in Multi-domain Environments 92
The untrusted handover security of the S-PMIPv6 on LTE-A 92
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 92
Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata 91
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 90
How to Forge a Digital Alibi on Mac OS X 89
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 89
Modeling security requirements for cloud-based system development 89
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 89
Optimal data replica placement in large-scale federated architectures 89
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System 88
A cloud-based architecture for emergency management and first responders localization in smart city environments 88
Hierarchical and Shared Access Control 87
On the protection of consumer genomic data in the Internet of Living Things 87
Biometrics in the Cloud: Challenges and Research Opportunities 87
A Multi-scheme and Multi-channel Framework for Micropayment Systems 87
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 86
Enhanced Network Support for Federated Cloud Infrastructures 86
On asynchronous enforcement of security policies in 'Nomadic' storage facilities 86
Multimedia-based battery drain attacks for Android devices 85
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 85
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 84
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing 83
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 83
Cryptographic Hierarchical Access Control for Dynamic Structures 83
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 82
E-mail-based Covert Channels for Asynchronous Message Steganography 82
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 80
Experimentations with source camera identification and Online Social Networks 79
3D Face 79
Analyzing the Internet Stability in Presence of Disasters 78
Modeling performances of concurrent big data applications 78
Layered multicast for reliable event notification over large-scale networks 77
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices 77
An Intelligent Security Architecture for Distributed Firewalling Environments 77
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 76
Greedy probability-based routing protocol for incompletely predictable vehicular Ad-hoc network 75
Totale 10.193
Categoria #
all - tutte 63.331
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 63.331


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.067 10 76 87 11 111 54 115 22 230 18 106 227
2021/20221.027 8 3 4 5 24 18 13 45 138 116 193 460
2022/20232.043 187 163 27 208 207 545 20 192 286 10 144 54
2023/20241.438 86 130 138 79 145 289 66 74 15 105 87 224
2024/20252.871 75 76 46 182 108 301 383 268 525 178 274 455
2025/202684 84 0 0 0 0 0 0 0 0 0 0 0
Totale 15.174