FICCO, Massimo
 Distribuzione geografica
Continente #
NA - Nord America 2.427
EU - Europa 1.022
AS - Asia 831
SA - Sud America 86
AF - Africa 7
OC - Oceania 2
Continente sconosciuto - Info sul continente non disponibili 1
Totale 4.376
Nazione #
US - Stati Uniti d'America 2.408
SG - Singapore 383
IT - Italia 312
CN - Cina 232
RU - Federazione Russa 197
IE - Irlanda 121
DE - Germania 117
UA - Ucraina 95
BR - Brasile 77
SE - Svezia 56
TR - Turchia 39
HK - Hong Kong 37
VN - Vietnam 37
CZ - Repubblica Ceca 26
IN - India 21
FI - Finlandia 20
KR - Corea 20
JP - Giappone 18
GB - Regno Unito 17
CA - Canada 13
FR - Francia 12
NL - Olanda 11
AT - Austria 9
IR - Iran 8
ID - Indonesia 7
PL - Polonia 7
MX - Messico 6
PK - Pakistan 6
HU - Ungheria 4
IL - Israele 4
AE - Emirati Arabi Uniti 3
BO - Bolivia 3
ES - Italia 3
IQ - Iraq 3
TN - Tunisia 3
BD - Bangladesh 2
CL - Cile 2
NO - Norvegia 2
PH - Filippine 2
QA - Qatar 2
RO - Romania 2
TW - Taiwan 2
UZ - Uzbekistan 2
ZA - Sudafrica 2
AL - Albania 1
AR - Argentina 1
AU - Australia 1
BE - Belgio 1
BG - Bulgaria 1
BH - Bahrain 1
EC - Ecuador 1
EE - Estonia 1
EG - Egitto 1
EU - Europa 1
GR - Grecia 1
HR - Croazia 1
IM - Isola di Man 1
KZ - Kazakistan 1
LT - Lituania 1
LU - Lussemburgo 1
MA - Marocco 1
ME - Montenegro 1
MM - Myanmar 1
NZ - Nuova Zelanda 1
RS - Serbia 1
UY - Uruguay 1
VE - Venezuela 1
Totale 4.376
Città #
Ann Arbor 500
Princeton 398
Chandler 340
Houston 152
Singapore 130
Ashburn 129
Dublin 118
Wilmington 115
Woodbridge 106
Jacksonville 93
Beijing 69
Munich 59
Seattle 43
Moscow 41
Izmir 37
Dong Ket 36
Hong Kong 36
Naples 30
Dallas 26
Andover 25
Brno 25
Milan 25
Boardman 24
Dearborn 24
Kyiv 24
Mestre 24
Nanjing 23
Washington 23
Pellezzano 21
Salerno 20
Nanchang 15
Afragola 13
New York 13
Changsha 12
Fairfield 12
Fisciano 12
Rome 11
Norwalk 10
Nuremberg 10
Council Bluffs 9
Düsseldorf 9
Shenyang 9
The Dalles 9
Edinburgh 8
Tianjin 8
Guangzhou 7
Jiaxing 7
Osaka 7
Redwood City 7
Hanover 6
Hebei 6
Karachi 6
Shanghai 6
Stockholm 6
São Paulo 6
Tokyo 6
Caserta 5
Crispano 5
Dormagen 5
Helsinki 5
Los Angeles 5
Pune 5
Kunming 4
Lappeenranta 4
Lusciano 4
San Diego 4
Toronto 4
Vienna 4
Alghero 3
Amsterdam 3
Avellino 3
Belo Horizonte 3
Cabiate 3
Curitiba 3
Falls Church 3
Jinan 3
Järfälla Municipality 3
Kumar 3
La Paz 3
Maryville 3
Montreal 3
Napoli 3
Nocera Inferiore 3
Parma 3
Pisa 3
Santa Clara 3
Thiruvananthapuram 3
Vlaardingen 3
Barcelona 2
Bekasi 2
Bristol 2
Budapest 2
Cagliari 2
Casoria 2
Catania 2
Centrale 2
Chengdu 2
Cologne 2
Doha 2
El Cajon 2
Totale 3.084
Nome #
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 157
Interconnecting Federated Clouds by Using Publish-Subscribe Service 131
Building a network embedded FEC protocol by using game theory 106
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 105
An HLA-based framework for simulation of large-scale critical systems 104
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 100
Distributed strategic learning for effective gossiping in wireless networks 97
Hybrid indoor and outdoor location services for new generation mobile terminals 96
An uncertainty-managing batch relevance-based approach to network anomaly detection 93
On Reliability and Security in Knowledge Grids 90
Modeling security requirements for cloud-based system development 89
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 89
Recent developments on security and reliability in large-scale data processing with MapReduce 86
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 86
A cloud-based architecture for emergency management and first responders localization in smart city environments 83
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 82
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 80
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 79
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 74
Live Migration in Emerging Cloud Paradigms 73
Association rule-based malware classification using common subsequences of API calls 71
Supporting First Responders Localization during Crisis Management 69
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 69
An Association Rules-Based Approach for Anomaly Detection on CAN-bus 66
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains 64
Distributed Group Key Management for Event Notification Confidentiality among Sensors 61
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 61
A scalable distributed machine learning approach for attack detection in edge computing environments 53
Blockchain-based authentication and authorization for smart city applications 52
An Advanced Intrusion Detection Framework for Cloud Computing 50
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent 47
A semantic driven approach for consistency verification between requirements and FMEA 47
A Strategy for Application-transparent Integration of Nomadic Computing Domains 45
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios 42
Malware Analysis By Combining Multiple Detectors and Observation Windows 40
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 40
A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments 38
2nd workshop on cyber security and resilience of large-scale systems 36
A simulation model for localization of pervasive objects using heterogeneous wireless networks 36
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 35
Aging-related performance anomalies in the apache storm stream processing system 34
A Semantic Driven Approach for Requirements Verification 34
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 33
A semantic driven approach for requirements consistency verification 32
Addressing Open Issues on Performances Evaluation in Cloud Computing 32
Advances on P2P, Parallel, Grid, Cloud and Internet Computing 32
A Positioning Service for Pervasive Objects in Dynamic Environments 31
An intrusion detection framework for supporting SLA assessment in Cloud Computing 31
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 30
Malware detection in mobile environments based on Autoencoders and API-images 30
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures 30
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach 29
Threat Modeling of Edge-Based IoT Applications 29
Agent-Based Intrusion Detection for Federated Clouds 29
Event-based sensor data exchange and fusion in the Internet of Things environments 28
A Correlation Approach to Intrusion Detection 28
Calibrating Indoor Positioning Systems With Low Efforts 27
Calibrating RSS-based Indoor Positioning Systems 27
An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing 27
Comparing API Call Sequence Algorithms for Malware Detection 26
Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices 25
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners 24
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis 23
Achieving Security by Intrusion-Tolerance Based on Event Correlation 23
Internet of things reference architectures, security and interoperability: A survey 23
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 21
Deployment of RSS-Based Indoor Positioning Systems 21
Hybrid Simulation of Distributed Large-Scale Critical Infrastructures 21
Semantic Support for Log Analysis of Safety-Critical Embedded Systems 21
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers 20
Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud 20
Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage 20
Hybrid Positioning System for Technology-independent Location-aware Computing 19
Calibration-less Indoor Location Systems Based on Wireless Sensors 19
Malware Detection for Secure Microgrids: CoSSMic Case Study 19
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 19
Message from SecureSysComm 2015 Workshop Chairs 18
CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures 18
Intrusion detection in federated clouds 18
Cloud evaluation: benchmarking and monitoring 18
Using multi-objective metaheuristics for the optimal selection of positioning systems 18
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios 18
Implementing positioning services over an ubiquitous infrastructure 18
Privacy risk analysis and metrics in capturing and storing network traffic 17
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks 17
Security event correlation approach for cloud computing 17
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems 17
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, 17
Indoor and outdoor location based services for portable wireless devices 17
Intrusion detection in Cloud Computing 17
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks 16
Welcome Message from SecureSysCom 2016 International Workshop Organizers 16
Internet-of-Things and Fog-Computing as enablers of new security and privacy threats 16
Developing Secure Cloud Applications: A Case Study 16
Supporting Development of Certified Aeronautical Components by applying Text Analysis Techniques 16
Supporting ubiquitous location information in interworking 3G and wireless networks 15
Intrusion Tolerance of Stealth DoS Attacks to Web Services 15
Editorial: security and reliability of critical systems 15
Hybrid Localization for Ubiquitous Services 15
Intrusion Tolerance as a Service: A SLA-Based Solution 15
Totale 4.259
Categoria #
all - tutte 23.697
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 23.697


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202062 0 0 0 0 0 0 0 0 0 9 46 7
2020/2021205 0 11 15 0 19 17 19 3 46 4 20 51
2021/2022515 1 0 0 5 3 4 82 11 39 27 40 303
2022/2023828 116 73 9 110 80 186 1 88 100 4 44 17
2023/2024800 33 47 51 23 54 99 145 64 23 60 52 149
2024/2025892 33 48 11 45 73 131 127 127 264 33 0 0
Totale 4.572