PALMIERI, Francesco
 Distribuzione geografica
Continente #
AS - Asia 15.868
NA - Nord America 15.567
EU - Europa 6.583
SA - Sud America 1.338
AF - Africa 209
OC - Oceania 19
Continente sconosciuto - Info sul continente non disponibili 13
Totale 39.597
Nazione #
US - Stati Uniti d'America 15.329
HK - Hong Kong 8.945
SG - Singapore 3.023
FI - Finlandia 2.059
CN - Cina 1.470
IT - Italia 1.360
BR - Brasile 960
VN - Vietnam 949
UA - Ucraina 666
RU - Federazione Russa 583
DE - Germania 467
FR - Francia 358
TR - Turchia 355
IE - Irlanda 305
IN - India 243
KR - Corea 235
SE - Svezia 226
AR - Argentina 157
GB - Regno Unito 138
CA - Canada 116
BD - Bangladesh 109
JP - Giappone 78
IQ - Iraq 75
MX - Messico 74
PL - Polonia 70
ID - Indonesia 64
NL - Olanda 63
ZA - Sudafrica 56
EC - Ecuador 53
CO - Colombia 48
ES - Italia 48
PK - Pakistan 45
PH - Filippine 39
UZ - Uzbekistan 37
AT - Austria 36
MA - Marocco 36
CL - Cile 34
RO - Romania 33
MY - Malesia 26
VE - Venezuela 26
EG - Egitto 23
LV - Lettonia 22
PY - Paraguay 22
EE - Estonia 21
TN - Tunisia 19
SA - Arabia Saudita 18
JO - Giordania 16
TW - Taiwan 16
CZ - Repubblica Ceca 14
IR - Iran 14
UY - Uruguay 14
DZ - Algeria 13
AU - Australia 12
EU - Europa 12
IL - Israele 12
KE - Kenya 12
AE - Emirati Arabi Uniti 11
BE - Belgio 11
BG - Bulgaria 11
BO - Bolivia 11
RS - Serbia 10
AL - Albania 9
CH - Svizzera 9
JM - Giamaica 9
KZ - Kazakistan 9
LT - Lituania 9
NP - Nepal 9
OM - Oman 9
PE - Perù 9
ET - Etiopia 8
GR - Grecia 8
PT - Portogallo 8
DK - Danimarca 7
HU - Ungheria 7
SN - Senegal 7
TH - Thailandia 7
BY - Bielorussia 6
CR - Costa Rica 6
DO - Repubblica Dominicana 6
QA - Qatar 6
GE - Georgia 5
LB - Libano 5
NZ - Nuova Zelanda 5
PA - Panama 5
PS - Palestinian Territory 5
AZ - Azerbaigian 4
GH - Ghana 4
KH - Cambogia 4
LK - Sri Lanka 4
MK - Macedonia 4
SY - Repubblica araba siriana 4
TT - Trinidad e Tobago 4
AO - Angola 3
BB - Barbados 3
BH - Bahrain 3
CG - Congo 3
GT - Guatemala 3
HN - Honduras 3
KG - Kirghizistan 3
KW - Kuwait 3
Totale 39.533
Città #
Hong Kong 8.919
Ann Arbor 3.396
Helsinki 1.886
Singapore 1.518
San Jose 1.273
Woodbridge 1.038
Chandler 1.023
Dallas 916
Princeton 871
Houston 835
Jacksonville 811
Wilmington 735
Ashburn 679
Council Bluffs 352
Beijing 311
Izmir 306
Dublin 297
The Dalles 282
Lauterbourg 272
Ho Chi Minh City 251
Dong Ket 198
Andover 187
Salerno 183
Nanjing 171
Hanoi 158
Pellezzano 149
Dearborn 130
Boardman 129
Moscow 124
New York 109
Los Angeles 104
Munich 85
Fairfield 82
Naples 77
Nanchang 74
Santa Clara 74
São Paulo 73
Tokyo 71
Rome 69
Shenyang 67
Changsha 66
Orem 66
Hebei 64
Mestre 62
Frankfurt am Main 58
Jiaxing 56
Düsseldorf 51
Redwood City 50
Da Nang 45
Norwalk 45
Warsaw 45
Fisciano 44
Milan 42
Chennai 41
Seattle 40
Nuremberg 38
Columbus 36
Tashkent 36
Ottawa 35
Brooklyn 34
Haiphong 33
Montreal 33
Amsterdam 32
Pune 31
Tianjin 31
Rio de Janeiro 30
Boston 28
Baghdad 27
Belo Horizonte 27
Stockholm 27
Chicago 26
Curitiba 26
Denver 26
Turku 26
Buenos Aires 24
Manchester 24
Johannesburg 23
Washington 23
Napoli 20
Tallinn 20
Boydton 19
Charlotte 19
Dhaka 19
Edinburgh 19
Kyiv 19
Vienna 19
Atlanta 18
Brasília 18
Jakarta 18
Regensburg 18
Guayaquil 17
London 17
Mumbai 17
Porto Alegre 17
Shanghai 17
Lappeenranta 16
Poplar 16
San Diego 16
Guangzhou 15
Madrid 15
Totale 30.125
Nome #
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 2.054
DNS tunnels detection via DNS-images 866
Secure and distributed video surveillance via portable devices 643
On the Protection of fMRI Images in Multi-domain Environments 589
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 566
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 505
Layered multicast for reliable event notification over large-scale networks 489
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 473
A genetic programming-based approach for classifying pancreatic adenocarcinoma: the SICED experience 471
Cloud-based adaptive compression and secure management services for 3D healthcare data 432
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks 416
Format-Independent Protection of DNA Microarray Images 389
Text Compression and Encryption through Smart Devices for Mobile Communication 382
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 379
On-board format-independent security of functional magnetic resonance images 376
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 344
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 334
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions 293
Optimal control of system governed by nonlinear Volterra integral and fractional derivative equations 291
A cloud-based architecture for emergency management and first responders localization in smart city environments 284
A Secure Distributed Video Surveillance System Based on Portable Devices 252
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 244
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 242
A scalable distributed machine learning approach for attack detection in edge computing environments 240
Cloud Message Queueing and Notification: Challenges and Opportunities 234
A botnet-based command and control approach relying on swarm intelligence 213
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 211
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 211
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities 204
A secure file sharing service for distributed computing environments 196
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 190
An Artificial Intelligence-Based Trust Model for Pervasive Computing 187
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 177
Distributed Group Key Management for Event Notification Confidentiality among Sensors 176
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 175
Compression-based steganography 172
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 169
A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles 169
A machine learning‐based memory forensics methodology for TOR browser artifacts 168
Interconnecting Federated Clouds by Using Publish-Subscribe Service 167
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 167
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 165
A triadic closure and homophily-based recommendation system for online social networks 164
A honeypot system with honeyword-driven fake interactive sessions 160
An asynchronous covert channel using spam 159
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 159
A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures 157
On Secure Data Management in Health-Care Environment 157
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 157
Cryptographic Hierarchical Access Control for Dynamic Structures 155
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 155
A distributed approach to network anomaly detection based on independent component analysis 153
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 151
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 150
On the protection of consumer genomic data in the Internet of Living Things 148
A Galerkin approach for fractional delay differential equations using hybrid Chelyshkov basis functions 147
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment 145
An explainable model for predicting Worsening Heart Failure based on genetic programming 143
Time-delay fractional optimal control problems: a survey based on methodology 142
Audit-Based Access Control in Nomadic Wireless Environments 139
Saving Energy in Data Center Infrastructures 139
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 139
A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure 139
An uncertainty-managing batch relevance-based approach to network anomaly detection 138
CHIS: A big data infrastructure to manage digital cultural items 136
On the File Recovery in Systems Infected by Ransomware 135
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 133
Building a network embedded FEC protocol by using game theory 133
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 132
A nonlinear, recurrence-based approach to traffic classification 131
Using Screen Brightness to Improve Security in Mobile Social Network Access 131
A Minimum Cut Interference-based Integrated RWA Algorithm for Multi-constrained Optical Transport Networks 131
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 130
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 130
An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects 130
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 130
Distributed strategic learning for effective gossiping in wireless networks 130
Effective classification of android malware families through dynamic features and neural networks 130
New Steganographic Techniques for the OOXML File Format 129
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 129
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 129
An HLA-based framework for simulation of large-scale critical systems 129
A distributed scheduling framework based on selfish autonomous agents for federated cloud environments 128
A Converged Charging Framework for Mobile Voice and Data Applications 128
Effectiveness of Video-Classification in??Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders 127
GRASP-based resource re-optimization for effective big data access in federated clouds 127
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners 125
A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks 125
An Agent-Based Network-Aware Approach to Grid Resource Scheduling 125
Hierarchical and Shared Access Control 125
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 125
Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification 124
Association rule-based malware classification using common subsequences of API calls 124
Condensation-based routing in mobile ad-hoc networks 123
On Reliability and Security in Knowledge Grids 123
Automatic security assessment for next generation wireless mobile networks 122
Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam 122
Comparison Between Protein-Protein Interaction Networks CD4 + T and CD8 + T and a Numerical Approach for Fractional HIV Infection of CD4 + T Cells 122
Optimal data replica placement in large-scale federated architectures 121
Maximum Network Lifetime Problem with Time Slots and coverage constraints: heuristic approaches 121
Totale 22.796
Categoria #
all - tutte 117.754
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 117.754


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021451 0 0 0 0 0 0 0 0 0 46 126 279
2021/20221.670 20 11 28 19 37 37 27 76 212 191 267 745
2022/20232.498 290 190 42 276 297 522 17 276 352 17 149 70
2023/20241.366 141 165 86 73 99 137 109 115 35 99 101 206
2024/20253.156 133 67 62 211 138 326 485 395 466 142 327 404
2025/202620.990 1.437 4.512 4.713 940 1.523 747 2.318 669 2.669 1.462 0 0
Totale 40.451