FICCO, Massimo
 Distribuzione geografica
Continente #
AS - Asia 7.888
NA - Nord America 4.437
EU - Europa 1.536
SA - Sud America 418
AF - Africa 90
OC - Oceania 4
Continente sconosciuto - Info sul continente non disponibili 1
Totale 14.374
Nazione #
HK - Hong Kong 5.439
US - Stati Uniti d'America 4.332
SG - Singapore 1.208
CN - Cina 454
IT - Italia 444
VN - Vietnam 302
BR - Brasile 282
RU - Federazione Russa 205
DE - Germania 168
FR - Francia 149
IE - Irlanda 124
UA - Ucraina 103
IN - India 89
SE - Svezia 70
TR - Turchia 64
GB - Regno Unito 60
CA - Canada 57
AR - Argentina 50
JP - Giappone 48
BD - Bangladesh 41
KR - Corea 40
IQ - Iraq 34
FI - Finlandia 33
ZA - Sudafrica 33
NL - Olanda 31
ID - Indonesia 29
ES - Italia 28
CZ - Repubblica Ceca 27
MX - Messico 26
EC - Ecuador 23
PL - Polonia 22
PK - Pakistan 19
AT - Austria 18
CO - Colombia 17
MA - Marocco 13
MY - Malesia 13
SA - Arabia Saudita 12
UZ - Uzbekistan 12
VE - Venezuela 12
CL - Cile 11
PH - Filippine 11
IR - Iran 8
JO - Giordania 8
PY - Paraguay 8
TN - Tunisia 8
AE - Emirati Arabi Uniti 7
HU - Ungheria 7
IL - Israele 7
EG - Egitto 6
KZ - Kazakistan 6
LT - Lituania 6
NP - Nepal 6
UY - Uruguay 6
BO - Bolivia 5
CR - Costa Rica 5
ET - Etiopia 5
KE - Kenya 5
AL - Albania 4
DZ - Algeria 4
HN - Honduras 4
LK - Sri Lanka 4
PA - Panama 4
PT - Portogallo 4
RS - Serbia 4
SN - Senegal 4
AU - Australia 3
BA - Bosnia-Erzegovina 3
BH - Bahrain 3
CH - Svizzera 3
GR - Grecia 3
KG - Kirghizistan 3
LV - Lettonia 3
QA - Qatar 3
AZ - Azerbaigian 2
BE - Belgio 2
BG - Bulgaria 2
CU - Cuba 2
EE - Estonia 2
JM - Giamaica 2
KH - Cambogia 2
LB - Libano 2
ML - Mali 2
NO - Norvegia 2
PE - Perù 2
RO - Romania 2
RW - Ruanda 2
TL - Timor Orientale 2
TW - Taiwan 2
BN - Brunei Darussalam 1
BS - Bahamas 1
BW - Botswana 1
BY - Bielorussia 1
CG - Congo 1
DO - Repubblica Dominicana 1
EU - Europa 1
GA - Gabon 1
GE - Georgia 1
GF - Guiana Francese 1
HR - Croazia 1
IM - Isola di Man 1
Totale 14.354
Città #
Hong Kong 5.430
Singapore 601
San Jose 523
Ann Arbor 500
Dallas 425
Princeton 399
Chandler 341
Ashburn 319
Houston 158
Council Bluffs 155
Lauterbourg 122
The Dalles 122
Dublin 121
Wilmington 115
Beijing 114
Woodbridge 106
Ho Chi Minh City 94
Jacksonville 93
Munich 82
New York 55
Hanoi 49
Seattle 48
Los Angeles 45
Moscow 41
Fisciano 39
Naples 39
Izmir 37
Dong Ket 36
Tokyo 33
Milan 30
São Paulo 28
Boardman 27
Kyiv 26
Andover 25
Brno 25
Rome 25
Santa Clara 25
Columbus 24
Dearborn 24
Mestre 24
Washington 24
Nanjing 23
Brooklyn 22
Salerno 22
Johannesburg 21
Pellezzano 21
Chennai 20
Chicago 20
Da Nang 19
Montreal 18
Stockholm 18
Orem 17
Amsterdam 15
Nanchang 15
Atlanta 14
Baghdad 14
Nuremberg 14
San Francisco 14
Warsaw 14
Afragola 13
Toronto 13
Changsha 12
Fairfield 12
Frankfurt am Main 12
Tashkent 12
Dhaka 11
Turku 11
Ankara 10
Denver 10
Düsseldorf 10
Norwalk 10
Shanghai 10
Curitiba 9
Karachi 9
London 9
Manchester 9
Mumbai 9
Osaka 9
Phoenix 9
Rio de Janeiro 9
Shenyang 9
Biên Hòa 8
Edinburgh 8
Haiphong 8
Jakarta 8
Jiaxing 8
Mexico City 8
Poplar 8
Quito 8
Tianjin 8
Belo Horizonte 7
Brasília 7
Bến Tre 7
Charlotte 7
Guangzhou 7
Guayaquil 7
Redwood City 7
Vienna 7
Bogotá 6
Boston 6
Totale 11.237
Nome #
A Semantic Driven Approach for Requirements Verification 1.213
A semantic driven approach for consistency verification between requirements and FMEA 955
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 581
A Strategy for Application-transparent Integration of Nomadic Computing Domains 514
Achieving Security by Intrusion-Tolerance Based on Event Correlation 417
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks 416
A simulation model for localization of pervasive objects using heterogeneous wireless networks 353
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 345
A cloud-based architecture for emergency management and first responders localization in smart city environments 284
A scalable distributed machine learning approach for attack detection in edge computing environments 241
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 213
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study 183
Distributed Group Key Management for Event Notification Confidentiality among Sensors 176
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 175
A Correlation Approach to Intrusion Detection 170
Interconnecting Federated Clouds by Using Publish-Subscribe Service 168
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 155
2nd workshop on cyber security and resilience of large-scale systems 143
An uncertainty-managing batch relevance-based approach to network anomaly detection 138
A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments 138
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 133
Building a network embedded FEC protocol by using game theory 133
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 130
Distributed strategic learning for effective gossiping in wireless networks 130
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 129
An HLA-based framework for simulation of large-scale critical systems 129
An Association Rules-Based Approach for Anomaly Detection on CAN-bus 127
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners 125
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 125
On Reliability and Security in Knowledge Grids 124
Association rule-based malware classification using common subsequences of API calls 124
Hybrid indoor and outdoor location services for new generation mobile terminals 122
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 116
Recent developments on security and reliability in large-scale data processing with MapReduce 115
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 113
Modeling security requirements for cloud-based system development 112
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains 111
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 111
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 110
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios 98
Live Migration in Emerging Cloud Paradigms 97
A Positioning Service for Pervasive Objects in Dynamic Environments 97
Blockchain-based authentication and authorization for smart city applications 94
Supporting First Responders Localization during Crisis Management 91
Context-aware coverage path planning for a swarm of UAVs using mobile ground stations for battery-swapping 88
Event-based sensor data exchange and fusion in the Internet of Things environments 88
An Advanced Intrusion Detection Framework for Cloud Computing 86
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 84
A semantic driven approach for requirements consistency verification 79
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent 78
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 74
Network Anomaly Detection Based on Burrows–Wheeler Transform and Variational Autoencoders 74
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 71
Malware Analysis By Combining Multiple Detectors and Observation Windows 67
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis 65
Advances on P2P, Parallel, Grid, Cloud and Internet Computing 65
An intrusion detection framework for supporting SLA assessment in Cloud Computing 65
A Benchmark for DDoS Attacks Detection in Microservice Architectures 64
On-device training and pruning for energy saving and continuous learning in resource-constrained MCUs 62
TinyML-Based Intrusion Detection System for Handling Class Imbalance in IoT-Edge Domain Using Siamese Neural Network on MCU 62
Calibrating Indoor Positioning Systems With Low Efforts 62
Addressing Open Issues on Performances Evaluation in Cloud Computing 62
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks 61
Malware detection in mobile environments based on Autoencoders and API-images 61
Internet of things reference architectures, security and interoperability: A survey 61
Aging-related performance anomalies in the apache storm stream processing system 60
When explainability turns into a threat - using xAI to fool a fake news detection method 59
Federated learning for IoT devices: Enhancing TinyML with on-board training 59
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach 59
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios 59
Hybrid Positioning System for Technology-independent Location-aware Computing 57
Calibrating RSS-based Indoor Positioning Systems 57
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures 57
Security event correlation approach for cloud computing 55
An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing 55
Agent-Based Intrusion Detection for Federated Clouds 55
Comparing API Call Sequence Algorithms for Malware Detection 54
Semantic Support for Log Analysis of Safety-Critical Embedded Systems 54
Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud 53
Welcome Message from SecureSysCom 2016 International Workshop Organizers 52
Threat Modeling of Edge-Based IoT Applications 52
Deployment of RSS-Based Indoor Positioning Systems 50
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, 50
Hybrid Simulation of Distributed Large-Scale Critical Infrastructures 50
Intelligent data-centric critical systems: Security and resilience key challenges 49
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers 48
Message from SecureSysComm 2015 Workshop Chairs 48
Implementing positioning services over an ubiquitous infrastructure 48
Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks 47
Privacy risk analysis and metrics in capturing and storing network traffic 46
Supporting ubiquitous location information in interworking 3G and wireless networks 46
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems 46
Internet-of-Things and Fog-Computing as enablers of new security and privacy threats 46
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 46
Tiny Federated Learning with Blockchain for Privacy and Security Preservation of MCU-Based IoT Applications 45
Power Analysis of Post-quantum Cryptography NIST Algorithms in Resource-Constrained Microcontroller 45
CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures 45
Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices 45
Bug Localization in Test-Driven Development 44
Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments 43
Totale 13.037
Categoria #
all - tutte 47.865
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 47.865


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202171 0 0 0 0 0 0 0 0 0 0 20 51
2021/2022515 1 0 0 5 3 4 82 11 39 27 40 303
2022/2023828 116 73 9 110 80 186 1 88 100 4 44 17
2023/2024800 33 47 51 23 54 99 145 64 23 60 52 149
2024/20251.235 33 48 11 45 73 131 127 127 264 56 139 181
2025/20269.680 1.734 2.235 2.218 243 700 337 1.004 200 262 647 100 0
Totale 14.595