FICCO, Massimo
 Distribuzione geografica
Continente #
AS - Asia 6.588
NA - Nord America 3.254
EU - Europa 1.212
SA - Sud America 248
AF - Africa 35
OC - Oceania 4
Continente sconosciuto - Info sul continente non disponibili 1
Totale 11.342
Nazione #
HK - Hong Kong 5.408
US - Stati Uniti d'America 3.195
SG - Singapore 575
IT - Italia 357
CN - Cina 276
BR - Brasile 201
RU - Federazione Russa 201
DE - Germania 147
IE - Irlanda 122
UA - Ucraina 99
VN - Vietnam 88
SE - Svezia 66
IN - India 50
GB - Regno Unito 45
TR - Turchia 45
CA - Canada 36
KR - Corea 33
FI - Finlandia 31
JP - Giappone 28
CZ - Repubblica Ceca 27
PL - Polonia 19
AR - Argentina 18
FR - Francia 17
NL - Olanda 17
AT - Austria 16
MX - Messico 16
ZA - Sudafrica 16
ID - Indonesia 15
ES - Italia 14
EC - Ecuador 10
BD - Bangladesh 9
IR - Iran 8
IQ - Iraq 7
PK - Pakistan 7
HU - Ungheria 6
LT - Lituania 6
IL - Israele 5
AE - Emirati Arabi Uniti 4
BO - Bolivia 4
CL - Cile 4
LK - Sri Lanka 4
MA - Marocco 4
TN - Tunisia 4
UZ - Uzbekistan 4
AU - Australia 3
EG - Egitto 3
GR - Grecia 3
KZ - Kazakistan 3
PY - Paraguay 3
UY - Uruguay 3
EE - Estonia 2
ET - Etiopia 2
HN - Honduras 2
NO - Norvegia 2
NP - Nepal 2
PA - Panama 2
PH - Filippine 2
QA - Qatar 2
RO - Romania 2
RS - Serbia 2
SA - Arabia Saudita 2
TL - Timor Orientale 2
TW - Taiwan 2
VE - Venezuela 2
AL - Albania 1
BE - Belgio 1
BG - Bulgaria 1
BH - Bahrain 1
BS - Bahamas 1
BW - Botswana 1
CO - Colombia 1
CR - Costa Rica 1
EU - Europa 1
GF - Guiana Francese 1
HR - Croazia 1
IM - Isola di Man 1
JO - Giordania 1
KH - Cambogia 1
LA - Repubblica Popolare Democratica del Laos 1
LB - Libano 1
LU - Lussemburgo 1
LV - Lettonia 1
MD - Moldavia 1
ME - Montenegro 1
MK - Macedonia 1
ML - Mali 1
MM - Myanmar 1
MR - Mauritania 1
MW - Malawi 1
MY - Malesia 1
NA - Namibia 1
NZ - Nuova Zelanda 1
PE - Perù 1
PT - Portogallo 1
SO - Somalia 1
VC - Saint Vincent e Grenadine 1
Totale 11.342
Città #
Hong Kong 5.405
Ann Arbor 500
Dallas 421
Princeton 398
Chandler 340
Ashburn 177
Singapore 177
Houston 156
Dublin 119
Wilmington 115
Woodbridge 106
Jacksonville 93
Munich 82
Beijing 79
Seattle 46
The Dalles 43
Moscow 41
New York 40
Izmir 37
Dong Ket 36
Naples 33
Los Angeles 29
Fisciano 28
Milan 27
Andover 25
Boardman 25
Brno 25
Columbus 24
Dearborn 24
Kyiv 24
Mestre 24
São Paulo 24
Nanjing 23
Washington 23
Pellezzano 21
Salerno 20
Ho Chi Minh City 19
Brooklyn 18
Stockholm 16
Tokyo 16
Nanchang 15
Rome 15
Chennai 14
Afragola 13
Johannesburg 13
Changsha 12
Fairfield 12
Montreal 12
San Francisco 12
Warsaw 12
Atlanta 11
Chicago 11
Council Bluffs 11
Nuremberg 11
Santa Clara 11
Turku 11
Düsseldorf 10
Norwalk 10
Toronto 10
Hanoi 9
Manchester 9
Phoenix 9
Shenyang 9
Edinburgh 8
Jiaxing 8
Tianjin 8
Amsterdam 7
Curitiba 7
Guangzhou 7
Karachi 7
Osaka 7
Redwood City 7
Shanghai 7
Ankara 6
Charlotte 6
Hanover 6
Hebei 6
London 6
Mexico City 6
Rio de Janeiro 6
Vienna 6
Belo Horizonte 5
Boston 5
Caserta 5
Colombo 5
Crispano 5
Denver 5
Dormagen 5
Helsinki 5
Poplar 5
Pune 5
Secaucus 5
Brasília 4
Budapest 4
Da Nang 4
Guayaquil 4
Kunming 4
Lappeenranta 4
Lusciano 4
Mumbai 4
Totale 9.349
Nome #
A Semantic Driven Approach for Requirements Verification 1.191
A semantic driven approach for consistency verification between requirements and FMEA 932
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 554
A Strategy for Application-transparent Integration of Nomadic Computing Domains 493
Achieving Security by Intrusion-Tolerance Based on Event Correlation 400
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks 396
A simulation model for localization of pervasive objects using heterogeneous wireless networks 327
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 325
A cloud-based architecture for emergency management and first responders localization in smart city environments 259
A scalable distributed machine learning approach for attack detection in edge computing environments 220
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 180
Distributed Group Key Management for Event Notification Confidentiality among Sensors 155
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study 151
A Correlation Approach to Intrusion Detection 150
Interconnecting Federated Clouds by Using Publish-Subscribe Service 143
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 138
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 126
Building a network embedded FEC protocol by using game theory 118
An uncertainty-managing batch relevance-based approach to network anomaly detection 116
2nd workshop on cyber security and resilience of large-scale systems 115
A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments 113
An HLA-based framework for simulation of large-scale critical systems 110
Distributed strategic learning for effective gossiping in wireless networks 110
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 107
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 107
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 107
Hybrid indoor and outdoor location services for new generation mobile terminals 102
On Reliability and Security in Knowledge Grids 99
An Association Rules-Based Approach for Anomaly Detection on CAN-bus 98
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 98
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 97
Modeling security requirements for cloud-based system development 96
Recent developments on security and reliability in large-scale data processing with MapReduce 94
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 91
Association rule-based malware classification using common subsequences of API calls 91
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners 90
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 90
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 89
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains 86
Live Migration in Emerging Cloud Paradigms 82
Supporting First Responders Localization during Crisis Management 75
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios 73
Blockchain-based authentication and authorization for smart city applications 70
A Positioning Service for Pervasive Objects in Dynamic Environments 70
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 69
Event-based sensor data exchange and fusion in the Internet of Things environments 66
An Advanced Intrusion Detection Framework for Cloud Computing 62
A semantic driven approach for requirements consistency verification 58
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent 57
Context-aware coverage path planning for a swarm of UAVs using mobile ground stations for battery-swapping 56
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 55
Malware Analysis By Combining Multiple Detectors and Observation Windows 49
An intrusion detection framework for supporting SLA assessment in Cloud Computing 48
Network Anomaly Detection Based on Burrows–Wheeler Transform and Variational Autoencoders 47
Aging-related performance anomalies in the apache storm stream processing system 45
Addressing Open Issues on Performances Evaluation in Cloud Computing 44
Advances on P2P, Parallel, Grid, Cloud and Internet Computing 44
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures 44
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach 43
Malware detection in mobile environments based on Autoencoders and API-images 43
Calibrating RSS-based Indoor Positioning Systems 39
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 38
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis 38
Calibrating Indoor Positioning Systems With Low Efforts 38
Agent-Based Intrusion Detection for Federated Clouds 38
Threat Modeling of Edge-Based IoT Applications 37
Internet of things reference architectures, security and interoperability: A survey 37
Welcome Message from SecureSysCom 2016 International Workshop Organizers 36
An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing 36
Comparing API Call Sequence Algorithms for Malware Detection 36
Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices 35
A Benchmark for DDoS Attacks Detection in Microservice Architectures 34
Deployment of RSS-Based Indoor Positioning Systems 33
Federated learning for IoT devices: Enhancing TinyML with on-board training 32
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks 32
Hybrid Positioning System for Technology-independent Location-aware Computing 32
Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud 31
Semantic Support for Log Analysis of Safety-Critical Embedded Systems 31
When explainability turns into a threat - using xAI to fool a fake news detection method 30
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers 30
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios 30
Hybrid Simulation of Distributed Large-Scale Critical Infrastructures 30
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 30
Security event correlation approach for cloud computing 29
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems 29
Message from SecureSysComm 2015 Workshop Chairs 28
CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures 28
Using multi-objective metaheuristics for the optimal selection of positioning systems 28
Calibration-less Indoor Location Systems Based on Wireless Sensors 28
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 28
Intrusion detection in federated clouds 27
Cloud evaluation: benchmarking and monitoring 27
Developing Secure Cloud Applications 27
Supporting ubiquitous location information in interworking 3G and wireless networks 27
Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage 27
Internet-of-Things and Fog-Computing as enablers of new security and privacy threats 27
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, 27
Sampling UAV Most Informative Diagnostic Signals 27
Privacy risk analysis and metrics in capturing and storing network traffic 26
Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks 26
Totale 10.813
Categoria #
all - tutte 41.086
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 41.086


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021179 0 0 0 0 19 17 19 3 46 4 20 51
2021/2022515 1 0 0 5 3 4 82 11 39 27 40 303
2022/2023828 116 73 9 110 80 186 1 88 100 4 44 17
2023/2024800 33 47 51 23 54 99 145 64 23 60 52 149
2024/20251.235 33 48 11 45 73 131 127 127 264 56 139 181
2025/20266.638 1.734 2.235 2.218 243 208 0 0 0 0 0 0 0
Totale 11.553