FICCO, Massimo
 Distribuzione geografica
Continente #
AS - Asia 6.274
NA - Nord America 3.080
EU - Europa 1.143
SA - Sud America 162
AF - Africa 24
OC - Oceania 4
Continente sconosciuto - Info sul continente non disponibili 1
Totale 10.688
Nazione #
HK - Hong Kong 5.332
US - Stati Uniti d'America 3.029
SG - Singapore 419
IT - Italia 326
CN - Cina 259
RU - Federazione Russa 200
DE - Germania 146
BR - Brasile 141
IE - Irlanda 122
UA - Ucraina 98
SE - Svezia 64
VN - Vietnam 53
TR - Turchia 43
IN - India 40
GB - Regno Unito 35
CA - Canada 31
FI - Finlandia 31
KR - Corea 31
CZ - Repubblica Ceca 26
JP - Giappone 26
AT - Austria 16
FR - Francia 15
NL - Olanda 15
MX - Messico 14
PL - Polonia 14
ZA - Sudafrica 12
ES - Italia 10
ID - Indonesia 8
IR - Iran 8
AR - Argentina 7
BD - Bangladesh 7
PK - Pakistan 7
IQ - Iraq 6
AE - Emirati Arabi Uniti 4
BO - Bolivia 4
HU - Ungheria 4
IL - Israele 4
LK - Sri Lanka 4
LT - Lituania 4
UZ - Uzbekistan 4
AU - Australia 3
CL - Cile 3
TN - Tunisia 3
EC - Ecuador 2
EE - Estonia 2
EG - Egitto 2
ET - Etiopia 2
HN - Honduras 2
KZ - Kazakistan 2
MA - Marocco 2
NO - Norvegia 2
PA - Panama 2
PH - Filippine 2
QA - Qatar 2
RO - Romania 2
SA - Arabia Saudita 2
TL - Timor Orientale 2
TW - Taiwan 2
AL - Albania 1
BE - Belgio 1
BG - Bulgaria 1
BH - Bahrain 1
BS - Bahamas 1
BW - Botswana 1
CO - Colombia 1
EU - Europa 1
GF - Guiana Francese 1
GR - Grecia 1
HR - Croazia 1
IM - Isola di Man 1
JO - Giordania 1
LA - Repubblica Popolare Democratica del Laos 1
LB - Libano 1
LU - Lussemburgo 1
LV - Lettonia 1
ME - Montenegro 1
MK - Macedonia 1
MM - Myanmar 1
MY - Malesia 1
NA - Namibia 1
NP - Nepal 1
NZ - Nuova Zelanda 1
PY - Paraguay 1
RS - Serbia 1
SO - Somalia 1
UY - Uruguay 1
VC - Saint Vincent e Grenadine 1
VE - Venezuela 1
Totale 10.688
Città #
Hong Kong 5.329
Ann Arbor 500
Princeton 398
Chandler 340
Dallas 339
Singapore 163
Ashburn 156
Houston 152
Dublin 119
Wilmington 115
Woodbridge 106
Jacksonville 93
Munich 82
Beijing 71
Seattle 46
Moscow 41
The Dalles 41
Izmir 37
Dong Ket 36
New York 33
Naples 30
Milan 26
Andover 25
Brno 25
Boardman 24
Columbus 24
Dearborn 24
Kyiv 24
Los Angeles 24
Mestre 24
Nanjing 23
Washington 23
Pellezzano 21
Salerno 20
São Paulo 17
Brooklyn 16
Nanchang 15
Rome 15
Stockholm 14
Tokyo 14
Afragola 13
Changsha 12
Fairfield 12
Fisciano 12
San Francisco 12
Nuremberg 11
Turku 11
Chennai 10
Chicago 10
Düsseldorf 10
Johannesburg 10
Montreal 10
Norwalk 10
Council Bluffs 9
Shenyang 9
Edinburgh 8
Jiaxing 8
Santa Clara 8
Tianjin 8
Toronto 8
Warsaw 8
Atlanta 7
Guangzhou 7
Karachi 7
Manchester 7
Osaka 7
Phoenix 7
Redwood City 7
Amsterdam 6
Charlotte 6
Hanover 6
Hebei 6
Ho Chi Minh City 6
Mexico City 6
Shanghai 6
Vienna 6
Boston 5
Caserta 5
Colombo 5
Crispano 5
Dormagen 5
Helsinki 5
Pune 5
Secaucus 5
Ankara 4
Belo Horizonte 4
Curitiba 4
Kunming 4
Lappeenranta 4
London 4
Lusciano 4
Rio de Janeiro 4
San Diego 4
Tashkent 4
Alghero 3
Avellino 3
Barcelona 3
Cabiate 3
Denver 3
Dresden 3
Totale 9.029
Nome #
A Semantic Driven Approach for Requirements Verification 1.183
A semantic driven approach for consistency verification between requirements and FMEA 921
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 547
A Strategy for Application-transparent Integration of Nomadic Computing Domains 485
Achieving Security by Intrusion-Tolerance Based on Event Correlation 398
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks 395
A simulation model for localization of pervasive objects using heterogeneous wireless networks 319
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 303
A cloud-based architecture for emergency management and first responders localization in smart city environments 245
A scalable distributed machine learning approach for attack detection in edge computing environments 212
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 176
Distributed Group Key Management for Event Notification Confidentiality among Sensors 154
A Correlation Approach to Intrusion Detection 146
Interconnecting Federated Clouds by Using Publish-Subscribe Service 142
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study 140
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 125
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 124
Building a network embedded FEC protocol by using game theory 117
Distributed strategic learning for effective gossiping in wireless networks 109
An HLA-based framework for simulation of large-scale critical systems 108
2nd workshop on cyber security and resilience of large-scale systems 108
An uncertainty-managing batch relevance-based approach to network anomaly detection 107
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 106
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 106
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 103
Hybrid indoor and outdoor location services for new generation mobile terminals 101
A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments 97
On Reliability and Security in Knowledge Grids 96
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 96
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 95
Modeling security requirements for cloud-based system development 94
Recent developments on security and reliability in large-scale data processing with MapReduce 93
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 89
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 88
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 88
Association rule-based malware classification using common subsequences of API calls 87
An Association Rules-Based Approach for Anomaly Detection on CAN-bus 86
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners 82
Live Migration in Emerging Cloud Paradigms 81
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains 78
Supporting First Responders Localization during Crisis Management 74
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. 68
Blockchain-based authentication and authorization for smart city applications 68
A Positioning Service for Pervasive Objects in Dynamic Environments 64
An Advanced Intrusion Detection Framework for Cloud Computing 61
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent 55
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios 49
A semantic driven approach for requirements consistency verification 49
Malware Analysis By Combining Multiple Detectors and Observation Windows 48
An intrusion detection framework for supporting SLA assessment in Cloud Computing 46
Aging-related performance anomalies in the apache storm stream processing system 43
Addressing Open Issues on Performances Evaluation in Cloud Computing 43
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach 41
Event-based sensor data exchange and fusion in the Internet of Things environments 41
Malware detection in mobile environments based on Autoencoders and API-images 41
Advances on P2P, Parallel, Grid, Cloud and Internet Computing 41
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures 41
Loss-Tolerant Event Communications within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence 38
Calibrating RSS-based Indoor Positioning Systems 38
MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis 37
Calibrating Indoor Positioning Systems With Low Efforts 37
Agent-Based Intrusion Detection for Federated Clouds 37
Threat Modeling of Edge-Based IoT Applications 36
Comparing API Call Sequence Algorithms for Malware Detection 35
Internet of things reference architectures, security and interoperability: A survey 34
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 33
Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices 33
An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing 33
Welcome Message from SecureSysCom 2016 International Workshop Organizers 32
Deployment of RSS-Based Indoor Positioning Systems 32
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks 30
Hybrid Positioning System for Technology-independent Location-aware Computing 30
Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud 30
Semantic Support for Log Analysis of Safety-Critical Embedded Systems 30
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios 29
Hybrid Simulation of Distributed Large-Scale Critical Infrastructures 29
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers 28
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems 28
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 28
Federated learning for IoT devices: Enhancing TinyML with on-board training 27
Message from SecureSysComm 2015 Workshop Chairs 27
Using multi-objective metaheuristics for the optimal selection of positioning systems 27
Security event correlation approach for cloud computing 27
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 27
When explainability turns into a threat - using xAI to fool a fake news detection method 26
Context-aware coverage path planning for a swarm of UAVs using mobile ground stations for battery-swapping 26
CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures 26
Intrusion detection in federated clouds 26
Cloud evaluation: benchmarking and monitoring 26
Developing Secure Cloud Applications 26
Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage 26
Calibration-less Indoor Location Systems Based on Wireless Sensors 26
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, 26
Internet-of-Things and Fog-Computing as enablers of new security and privacy threats 25
Indoor and outdoor location based services for portable wireless devices 25
Privacy risk analysis and metrics in capturing and storing network traffic 24
Security Issues in Cloud Federations 24
Bug Localization in Test-Driven Development 24
Malware Detection for Secure Microgrids: CoSSMic Case Study 24
Supporting Development of Certified Aeronautical Components by applying Text Analysis Techniques 24
Totale 10.359
Categoria #
all - tutte 36.602
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 36.602


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021194 0 0 15 0 19 17 19 3 46 4 20 51
2021/2022515 1 0 0 5 3 4 82 11 39 27 40 303
2022/2023828 116 73 9 110 80 186 1 88 100 4 44 17
2023/2024800 33 47 51 23 54 99 145 64 23 60 52 149
2024/20251.235 33 48 11 45 73 131 127 127 264 56 139 181
2025/20265.971 1.734 2.235 2.002 0 0 0 0 0 0 0 0 0
Totale 10.886