FICCO, Massimo
 Distribuzione geografica
Continente #
AS - Asia 7.084
NA - Nord America 3.407
EU - Europa 1.242
SA - Sud America 279
AF - Africa 44
OC - Oceania 4
Continente sconosciuto - Info sul continente non disponibili 1
Totale 12.061
Nazione #
HK - Hong Kong 5.415
US - Stati Uniti d'America 3.337
SG - Singapore 952
IT - Italia 365
CN - Cina 328
BR - Brasile 218
RU - Federazione Russa 202
DE - Germania 147
IE - Irlanda 122
VN - Vietnam 120
UA - Ucraina 99
SE - Svezia 67
IN - India 53
GB - Regno Unito 51
TR - Turchia 46
CA - Canada 42
KR - Corea 33
JP - Giappone 32
FI - Finlandia 31
CZ - Repubblica Ceca 27
AR - Argentina 25
PL - Polonia 21
MX - Messico 20
NL - Olanda 20
ES - Italia 19
AT - Austria 18
ID - Indonesia 18
ZA - Sudafrica 18
BD - Bangladesh 17
FR - Francia 17
EC - Ecuador 16
IQ - Iraq 10
IR - Iran 8
MA - Marocco 8
PK - Pakistan 7
HU - Ungheria 6
LT - Lituania 6
IL - Israele 5
AE - Emirati Arabi Uniti 4
BO - Bolivia 4
CL - Cile 4
EG - Egitto 4
JO - Giordania 4
LK - Sri Lanka 4
TN - Tunisia 4
UZ - Uzbekistan 4
AU - Australia 3
GR - Grecia 3
HN - Honduras 3
KZ - Kazakistan 3
PY - Paraguay 3
UY - Uruguay 3
VE - Venezuela 3
AL - Albania 2
BG - Bulgaria 2
EE - Estonia 2
ET - Etiopia 2
MY - Malesia 2
NO - Norvegia 2
NP - Nepal 2
PA - Panama 2
PH - Filippine 2
QA - Qatar 2
RO - Romania 2
RS - Serbia 2
SA - Arabia Saudita 2
TL - Timor Orientale 2
TW - Taiwan 2
BE - Belgio 1
BH - Bahrain 1
BS - Bahamas 1
BW - Botswana 1
CO - Colombia 1
CR - Costa Rica 1
DZ - Algeria 1
EU - Europa 1
GE - Georgia 1
GF - Guiana Francese 1
HR - Croazia 1
IM - Isola di Man 1
KE - Kenya 1
KH - Cambogia 1
LA - Repubblica Popolare Democratica del Laos 1
LB - Libano 1
LU - Lussemburgo 1
LV - Lettonia 1
MD - Moldavia 1
ME - Montenegro 1
MK - Macedonia 1
ML - Mali 1
MM - Myanmar 1
MR - Mauritania 1
MW - Malawi 1
NA - Namibia 1
NZ - Nuova Zelanda 1
PE - Perù 1
PT - Portogallo 1
SO - Somalia 1
VC - Saint Vincent e Grenadine 1
YE - Yemen 1
Totale 12.061
Città #
Hong Kong 5.412
Ann Arbor 500
Singapore 439
Dallas 421
Princeton 398
Chandler 340
Ashburn 227
Houston 157
Dublin 119
Wilmington 115
Woodbridge 106
Beijing 96
Jacksonville 93
Munich 82
The Dalles 50
New York 48
Seattle 48
Moscow 41
Izmir 37
Dong Ket 36
Los Angeles 36
Naples 35
Fisciano 28
Ho Chi Minh City 28
Milan 27
Andover 25
Boardman 25
Brno 25
São Paulo 25
Columbus 24
Dearborn 24
Kyiv 24
Mestre 24
Washington 24
Nanjing 23
Pellezzano 21
Brooklyn 20
Salerno 20
Tokyo 19
Stockholm 17
Chennai 15
Johannesburg 15
Nanchang 15
Rome 15
Chicago 14
Hanoi 14
Montreal 14
Warsaw 14
Afragola 13
Changsha 12
Fairfield 12
San Francisco 12
Atlanta 11
Council Bluffs 11
Nuremberg 11
Santa Clara 11
Toronto 11
Turku 11
Düsseldorf 10
Norwalk 10
Denver 9
Manchester 9
Orem 9
Phoenix 9
Shenyang 9
Amsterdam 8
Edinburgh 8
Jiaxing 8
London 8
Quito 8
Shanghai 8
Tianjin 8
Ankara 7
Charlotte 7
Curitiba 7
Guangzhou 7
Karachi 7
Mexico City 7
Osaka 7
Poplar 7
Redwood City 7
Rio de Janeiro 7
Vienna 7
Boston 6
Guayaquil 6
Hanover 6
Hebei 6
Secaucus 6
Belo Horizonte 5
Biên Hòa 5
Brasília 5
Caserta 5
Colombo 5
Crispano 5
Da Nang 5
Dormagen 5
Haiphong 5
Helsinki 5
Pune 5
Amman 4
Totale 9.777
Nome #
A Semantic Driven Approach for Requirements Verification 1.197
A semantic driven approach for consistency verification between requirements and FMEA 938
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 561
A Strategy for Application-transparent Integration of Nomadic Computing Domains 500
Achieving Security by Intrusion-Tolerance Based on Event Correlation 403
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks 399
A simulation model for localization of pervasive objects using heterogeneous wireless networks 334
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 330
A cloud-based architecture for emergency management and first responders localization in smart city environments 270
A scalable distributed machine learning approach for attack detection in edge computing environments 224
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 191
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study 167
Distributed Group Key Management for Event Notification Confidentiality among Sensors 159
A Correlation Approach to Intrusion Detection 158
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 153
Interconnecting Federated Clouds by Using Publish-Subscribe Service 149
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 134
An uncertainty-managing batch relevance-based approach to network anomaly detection 125
Building a network embedded FEC protocol by using game theory 122
A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments 121
2nd workshop on cyber security and resilience of large-scale systems 121
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 115
Distributed strategic learning for effective gossiping in wireless networks 115
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 114
An HLA-based framework for simulation of large-scale critical systems 113
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 111
An Association Rules-Based Approach for Anomaly Detection on CAN-bus 107
Hybrid indoor and outdoor location services for new generation mobile terminals 106
On Reliability and Security in Knowledge Grids 105
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 104
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 103
Modeling security requirements for cloud-based system development 102
Association rule-based malware classification using common subsequences of API calls 99
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners 97
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 96
Recent developments on security and reliability in large-scale data processing with MapReduce 96
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains 95
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 95
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 95
Live Migration in Emerging Cloud Paradigms 85
Supporting First Responders Localization during Crisis Management 81
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios 78
A Positioning Service for Pervasive Objects in Dynamic Environments 77
Blockchain-based authentication and authorization for smart city applications 74
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 73
Event-based sensor data exchange and fusion in the Internet of Things environments 69
An Advanced Intrusion Detection Framework for Cloud Computing 69
A semantic driven approach for requirements consistency verification 65
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent 63
Context-aware coverage path planning for a swarm of UAVs using mobile ground stations for battery-swapping 59
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 59
Malware Analysis By Combining Multiple Detectors and Observation Windows 55
An intrusion detection framework for supporting SLA assessment in Cloud Computing 54
Addressing Open Issues on Performances Evaluation in Cloud Computing 50
Malware detection in mobile environments based on Autoencoders and API-images 49
Advances on P2P, Parallel, Grid, Cloud and Internet Computing 49
Aging-related performance anomalies in the apache storm stream processing system 48
Network Anomaly Detection Based on Burrows–Wheeler Transform and Variational Autoencoders 48
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures 47
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach 46
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis 46
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 45
Calibrating RSS-based Indoor Positioning Systems 44
A Benchmark for DDoS Attacks Detection in Microservice Architectures 43
Calibrating Indoor Positioning Systems With Low Efforts 43
Internet of things reference architectures, security and interoperability: A survey 43
Agent-Based Intrusion Detection for Federated Clouds 42
An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing 41
Welcome Message from SecureSysCom 2016 International Workshop Organizers 40
Threat Modeling of Edge-Based IoT Applications 40
Comparing API Call Sequence Algorithms for Malware Detection 40
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks 39
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios 39
When explainability turns into a threat - using xAI to fool a fake news detection method 38
Hybrid Positioning System for Technology-independent Location-aware Computing 38
Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices 38
Deployment of RSS-Based Indoor Positioning Systems 38
Semantic Support for Log Analysis of Safety-Critical Embedded Systems 38
Federated learning for IoT devices: Enhancing TinyML with on-board training 36
Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud 36
Security event correlation approach for cloud computing 36
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems 34
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 34
CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures 33
Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage 33
Hybrid Simulation of Distributed Large-Scale Critical Infrastructures 33
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers 32
Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks 32
Supporting ubiquitous location information in interworking 3G and wireless networks 32
Calibration-less Indoor Location Systems Based on Wireless Sensors 32
Implementing positioning services over an ubiquitous infrastructure 32
Message from SecureSysComm 2015 Workshop Chairs 31
Using multi-objective metaheuristics for the optimal selection of positioning systems 31
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 31
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, 31
Sampling UAV Most Informative Diagnostic Signals 31
Intrusion detection in federated clouds 30
Cloud evaluation: benchmarking and monitoring 30
Developing Secure Cloud Applications 30
Internet-of-Things and Fog-Computing as enablers of new security and privacy threats 30
Totale 11.367
Categoria #
all - tutte 43.038
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 43.038


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021160 0 0 0 0 0 17 19 3 46 4 20 51
2021/2022515 1 0 0 5 3 4 82 11 39 27 40 303
2022/2023828 116 73 9 110 80 186 1 88 100 4 44 17
2023/2024800 33 47 51 23 54 99 145 64 23 60 52 149
2024/20251.235 33 48 11 45 73 131 127 127 264 56 139 181
2025/20267.357 1.734 2.235 2.218 243 700 227 0 0 0 0 0 0
Totale 12.272