FICCO, Massimo
 Distribuzione geografica
Continente #
NA - Nord America 2.624
AS - Asia 1.179
EU - Europa 1.106
SA - Sud America 136
AF - Africa 14
OC - Oceania 4
Continente sconosciuto - Info sul continente non disponibili 1
Totale 5.064
Nazione #
US - Stati Uniti d'America 2.590
SG - Singapore 410
IT - Italia 324
HK - Hong Kong 306
CN - Cina 235
RU - Federazione Russa 200
DE - Germania 141
BR - Brasile 122
IE - Irlanda 122
UA - Ucraina 97
SE - Svezia 57
VN - Vietnam 41
TR - Turchia 40
IN - India 36
FI - Finlandia 31
KR - Corea 31
CZ - Repubblica Ceca 26
GB - Regno Unito 25
CA - Canada 22
JP - Giappone 20
NL - Olanda 15
AT - Austria 14
FR - Francia 14
PL - Polonia 12
MX - Messico 10
IR - Iran 8
ID - Indonesia 7
PK - Pakistan 7
ES - Italia 6
ZA - Sudafrica 6
AR - Argentina 5
BD - Bangladesh 5
AE - Emirati Arabi Uniti 4
HU - Ungheria 4
IL - Israele 4
IQ - Iraq 4
AU - Australia 3
BO - Bolivia 3
LT - Lituania 3
TN - Tunisia 3
UZ - Uzbekistan 3
CL - Cile 2
EE - Estonia 2
EG - Egitto 2
ET - Etiopia 2
KZ - Kazakistan 2
LK - Sri Lanka 2
NO - Norvegia 2
PH - Filippine 2
QA - Qatar 2
RO - Romania 2
SA - Arabia Saudita 2
TW - Taiwan 2
AL - Albania 1
BE - Belgio 1
BG - Bulgaria 1
BH - Bahrain 1
CO - Colombia 1
EC - Ecuador 1
EU - Europa 1
GR - Grecia 1
HN - Honduras 1
HR - Croazia 1
IM - Isola di Man 1
JO - Giordania 1
LB - Libano 1
LU - Lussemburgo 1
MA - Marocco 1
ME - Montenegro 1
MM - Myanmar 1
MY - Malesia 1
NP - Nepal 1
NZ - Nuova Zelanda 1
PA - Panama 1
RS - Serbia 1
UY - Uruguay 1
VE - Venezuela 1
Totale 5.064
Città #
Ann Arbor 500
Princeton 398
Chandler 340
Hong Kong 305
Singapore 154
Houston 152
Ashburn 134
Dublin 119
Wilmington 115
Woodbridge 106
Jacksonville 93
Munich 82
Beijing 70
Seattle 45
Moscow 41
The Dalles 41
Dallas 37
Izmir 37
Dong Ket 36
Naples 30
Milan 26
Andover 25
Brno 25
Boardman 24
Columbus 24
Dearborn 24
Kyiv 24
Mestre 24
Nanjing 23
Washington 23
New York 22
Pellezzano 21
Salerno 20
Nanchang 15
Afragola 13
Rome 13
Changsha 12
Fairfield 12
Fisciano 12
São Paulo 12
Nuremberg 11
Turku 11
Norwalk 10
Brooklyn 9
Council Bluffs 9
Düsseldorf 9
Los Angeles 9
San Francisco 9
Shenyang 9
Chennai 8
Edinburgh 8
Tianjin 8
Tokyo 8
Chicago 7
Guangzhou 7
Jiaxing 7
Karachi 7
Montreal 7
Osaka 7
Redwood City 7
Stockholm 7
Amsterdam 6
Hanover 6
Hebei 6
Shanghai 6
Toronto 6
Warsaw 6
Caserta 5
Charlotte 5
Crispano 5
Dormagen 5
Helsinki 5
Pune 5
Santa Clara 5
Secaucus 5
Vienna 5
Belo Horizonte 4
Johannesburg 4
Kunming 4
Lappeenranta 4
Lusciano 4
Manchester 4
Mexico City 4
Phoenix 4
Rio de Janeiro 4
San Diego 4
Alghero 3
Avellino 3
Barcelona 3
Cabiate 3
Colombo 3
Curitiba 3
Falls Church 3
Jinan 3
Järfälla Municipality 3
Kumar 3
La Paz 3
Maryville 3
Napoli 3
Nocera Inferiore 3
Totale 3.566
Nome #
A semantic driven approach for consistency verification between requirements and FMEA 196
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 166
Interconnecting Federated Clouds by Using Publish-Subscribe Service 135
A Semantic Driven Approach for Requirements Verification 115
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 114
Building a network embedded FEC protocol by using game theory 112
An HLA-based framework for simulation of large-scale critical systems 104
Distributed strategic learning for effective gossiping in wireless networks 103
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 101
An uncertainty-managing batch relevance-based approach to network anomaly detection 99
Hybrid indoor and outdoor location services for new generation mobile terminals 96
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 92
On Reliability and Security in Knowledge Grids 91
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 90
Modeling security requirements for cloud-based system development 89
A cloud-based architecture for emergency management and first responders localization in smart city environments 89
Recent developments on security and reliability in large-scale data processing with MapReduce 89
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 88
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 85
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 84
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 83
Association rule-based malware classification using common subsequences of API calls 79
An Association Rules-Based Approach for Anomaly Detection on CAN-bus 77
Live Migration in Emerging Cloud Paradigms 75
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains 72
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 72
Supporting First Responders Localization during Crisis Management 70
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 65
Distributed Group Key Management for Event Notification Confidentiality among Sensors 64
A scalable distributed machine learning approach for attack detection in edge computing environments 62
Blockchain-based authentication and authorization for smart city applications 60
An Advanced Intrusion Detection Framework for Cloud Computing 57
A Strategy for Application-transparent Integration of Nomadic Computing Domains 54
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent 50
A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments 48
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 46
A simulation model for localization of pervasive objects using heterogeneous wireless networks 45
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 44
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios 43
2nd workshop on cyber security and resilience of large-scale systems 43
Malware Analysis By Combining Multiple Detectors and Observation Windows 43
A Positioning Service for Pervasive Objects in Dynamic Environments 40
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 38
A semantic driven approach for requirements consistency verification 38
An intrusion detection framework for supporting SLA assessment in Cloud Computing 38
Aging-related performance anomalies in the apache storm stream processing system 37
Addressing Open Issues on Performances Evaluation in Cloud Computing 37
Advances on P2P, Parallel, Grid, Cloud and Internet Computing 34
A Correlation Approach to Intrusion Detection 33
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures 33
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners 32
Malware detection in mobile environments based on Autoencoders and API-images 32
Agent-Based Intrusion Detection for Federated Clouds 32
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 31
Threat Modeling of Edge-Based IoT Applications 31
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach 30
Calibrating Indoor Positioning Systems With Low Efforts 30
Calibrating RSS-based Indoor Positioning Systems 30
Event-based sensor data exchange and fusion in the Internet of Things environments 29
Comparing API Call Sequence Algorithms for Malware Detection 29
An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing 28
Achieving Security by Intrusion-Tolerance Based on Event Correlation 27
Internet of things reference architectures, security and interoperability: A survey 27
Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices 27
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis 24
Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud 23
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems 23
Deployment of RSS-Based Indoor Positioning Systems 23
Semantic Support for Log Analysis of Safety-Critical Embedded Systems 23
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers 22
Hybrid Positioning System for Technology-independent Location-aware Computing 22
Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage 22
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 22
Hybrid Simulation of Distributed Large-Scale Critical Infrastructures 22
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 22
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks 21
Intrusion detection in federated clouds 21
Cloud evaluation: benchmarking and monitoring 21
Using multi-objective metaheuristics for the optimal selection of positioning systems 21
Calibration-less Indoor Location Systems Based on Wireless Sensors 21
Security event correlation approach for cloud computing 20
Malware Detection for Secure Microgrids: CoSSMic Case Study 20
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios 20
Indoor and outdoor location based services for portable wireless devices 20
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks 19
Message from SecureSysComm 2015 Workshop Chairs 19
Welcome Message from SecureSysCom 2016 International Workshop Organizers 19
CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures 19
Developing Secure Cloud Applications 19
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, 19
Supporting Development of Certified Aeronautical Components by applying Text Analysis Techniques 19
Implementing positioning services over an ubiquitous infrastructure 19
Privacy risk analysis and metrics in capturing and storing network traffic 18
Internet-of-Things and Fog-Computing as enablers of new security and privacy threats 18
Intrusion detection in Cloud Computing 18
Federated learning for IoT devices: Enhancing TinyML with on-board training 17
Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks 17
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 17
Supporting ubiquitous location information in interworking 3G and wireless networks 17
Intrusion Tolerance of Stealth DoS Attacks to Web Services 17
Totale 4.857
Categoria #
all - tutte 27.001
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 27.001


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021205 0 11 15 0 19 17 19 3 46 4 20 51
2021/2022515 1 0 0 5 3 4 82 11 39 27 40 303
2022/2023828 116 73 9 110 80 186 1 88 100 4 44 17
2023/2024800 33 47 51 23 54 99 145 64 23 60 52 149
2024/20251.235 33 48 11 45 73 131 127 127 264 56 139 181
2025/2026347 347 0 0 0 0 0 0 0 0 0 0 0
Totale 5.262