PALMIERI, Francesco
 Distribuzione geografica
Continente #
NA - Nord America 11.525
AS - Asia 4.783
EU - Europa 3.870
SA - Sud America 450
AF - Africa 38
OC - Oceania 14
Continente sconosciuto - Info sul continente non disponibili 12
Totale 20.692
Nazione #
US - Stati Uniti d'America 11.420
HK - Hong Kong 1.763
IT - Italia 1.182
CN - Cina 998
SG - Singapore 989
UA - Ucraina 644
RU - Federazione Russa 554
BR - Brasile 406
DE - Germania 390
TR - Turchia 320
IE - Irlanda 295
VN - Vietnam 213
SE - Svezia 210
KR - Corea 209
FI - Finlandia 191
IN - India 122
GB - Regno Unito 76
CA - Canada 72
FR - Francia 67
NL - Olanda 39
PL - Polonia 39
RO - Romania 31
AT - Austria 28
MX - Messico 23
LV - Lettonia 22
AR - Argentina 21
JP - Giappone 21
BD - Bangladesh 20
EE - Estonia 20
ES - Italia 19
PK - Pakistan 17
ID - Indonesia 14
TW - Taiwan 14
EG - Egitto 13
EU - Europa 12
IQ - Iraq 11
IR - Iran 11
AU - Australia 9
IL - Israele 9
BE - Belgio 7
CZ - Repubblica Ceca 7
EC - Ecuador 7
PH - Filippine 7
UZ - Uzbekistan 7
BG - Bulgaria 6
RS - Serbia 6
ZA - Sudafrica 6
AL - Albania 5
DK - Danimarca 5
MA - Marocco 5
OM - Oman 5
TN - Tunisia 5
BO - Bolivia 4
GR - Grecia 4
HU - Ungheria 4
LT - Lituania 4
NZ - Nuova Zelanda 4
QA - Qatar 4
SA - Arabia Saudita 4
AE - Emirati Arabi Uniti 3
CH - Svizzera 3
CL - Cile 3
CO - Colombia 3
GH - Ghana 3
JM - Giamaica 3
JO - Giordania 3
MY - Malesia 3
NP - Nepal 3
PT - Portogallo 3
BB - Barbados 2
BH - Bahrain 2
BN - Brunei Darussalam 2
BY - Bielorussia 2
DZ - Algeria 2
ET - Etiopia 2
LB - Libano 2
MK - Macedonia 2
NO - Norvegia 2
PS - Palestinian Territory 2
TH - Thailandia 2
UY - Uruguay 2
VE - Venezuela 2
BA - Bosnia-Erzegovina 1
CM - Camerun 1
DM - Dominica 1
DO - Repubblica Dominicana 1
GE - Georgia 1
GY - Guiana 1
HN - Honduras 1
KE - Kenya 1
KZ - Kazakistan 1
LU - Lussemburgo 1
MO - Macao, regione amministrativa speciale della Cina 1
PA - Panama 1
PY - Paraguay 1
SK - Slovacchia (Repubblica Slovacca) 1
TO - Tonga 1
TT - Trinidad e Tobago 1
Totale 20.692
Città #
Ann Arbor 3.396
Hong Kong 1.753
Woodbridge 1.038
Chandler 1.023
Princeton 871
Houston 820
Jacksonville 809
Wilmington 735
Singapore 398
Izmir 305
Dublin 288
Ashburn 282
Beijing 236
Dong Ket 198
Andover 187
Salerno 181
Nanjing 170
Pellezzano 149
Dearborn 130
Boardman 122
Moscow 121
Munich 85
Fairfield 82
Nanchang 74
Shenyang 67
Changsha 65
Hebei 64
Mestre 62
Naples 61
Jiaxing 56
Düsseldorf 51
Redwood City 50
Rome 48
New York 46
The Dalles 46
Norwalk 45
Dallas 43
Seattle 36
Ottawa 34
Columbus 32
Los Angeles 32
Milan 32
Tianjin 31
Council Bluffs 29
Nuremberg 28
Pune 28
São Paulo 27
Turku 25
Brooklyn 24
Helsinki 23
Washington 21
Napoli 20
Santa Clara 20
Warsaw 20
Edinburgh 19
Tallinn 19
Boston 18
Regensburg 18
Amsterdam 16
Kyiv 16
San Diego 16
Tokyo 16
Vienna 15
Charlotte 14
Guangzhou 14
Lappeenranta 14
Belo Horizonte 13
Chicago 13
Parma 13
Shanghai 13
Chennai 12
Fisciano 12
Montreal 12
San Francisco 12
Stockholm 12
Cambridge 10
Frankfurt am Main 10
Manchester 10
Bari 9
Dormagen 9
Jinan 9
Pomigliano d'Arco 9
Rio de Janeiro 9
Sarno 9
St Petersburg 9
Afragola 8
Curitiba 8
Marigliano 8
Nocera Inferiore 8
Porto Alegre 8
Falls Church 7
Giugliano In Campania 7
Karachi 7
Madrid 7
Mexico City 7
Nettuno 7
San Nicola la Strada 7
Belgrade 6
Joinville 6
Kraków 6
Totale 15.126
Nome #
DNS tunnels detection via DNS-images 686
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 306
On-board format-independent security of functional magnetic resonance images 188
Secure and distributed video surveillance via portable devices 179
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 167
A botnet-based command and control approach relying on swarm intelligence 163
Format-Independent Protection of DNA Microarray Images 159
On the Protection of fMRI Images in Multi-domain Environments 158
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 158
Cloud-based adaptive compression and secure management services for 3D healthcare data 156
An Artificial Intelligence-Based Trust Model for Pervasive Computing 149
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 148
A secure file sharing service for distributed computing environments 147
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 146
A scalable distributed machine learning approach for attack detection in edge computing environments 140
Interconnecting Federated Clouds by Using Publish-Subscribe Service 136
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 132
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 125
An asynchronous covert channel using spam 123
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment 122
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 121
On Secure Data Management in Health-Care Environment 119
Text Compression and Encryption through Smart Devices for Mobile Communication 118
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 118
Audit-Based Access Control in Nomadic Wireless Environments 115
Saving Energy in Data Center Infrastructures 115
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 115
Building a network embedded FEC protocol by using game theory 113
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis 113
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 113
A triadic closure and homophily-based recommendation system for online social networks 112
A honeypot system with honeyword-driven fake interactive sessions 111
An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects 109
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 109
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 108
A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures 108
Using Screen Brightness to Improve Security in Mobile Social Network Access 107
A Secure Distributed Video Surveillance System Based on Portable Devices 106
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 105
An HLA-based framework for simulation of large-scale critical systems 104
A cloud-based architecture for emergency management and first responders localization in smart city environments 104
Distributed strategic learning for effective gossiping in wireless networks 104
A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure 104
A distributed approach to network anomaly detection based on independent component analysis 102
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 102
Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam 101
A secure payment system for multimedia on demand on mobile VANET clouds 101
Bayesian resource discovery in infrastructure-less networks 101
Condensation-based routing in mobile ad-hoc networks 100
Automatic security assessment for next generation wireless mobile networks 100
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 100
An uncertainty-managing batch relevance-based approach to network anomaly detection 100
CHIS: A big data infrastructure to manage digital cultural items 100
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 99
Analyzing the impact of Internet worms on global routing stability 98
VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches 98
GRASP-based resource re-optimization for effective big data access in federated clouds 98
Secure and reliable data communication in developing regions and rural areas 97
Hybrid indoor and outdoor location services for new generation mobile terminals 96
Providing true end-to-end security in converged voice over IP infrastructures 96
Insights into peer to peer traffic through nonlinear analysis 96
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 96
New Steganographic Techniques for the OOXML File Format 95
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 95
Quality of Service support in all-optical wavelength routed networks 95
Advances in Security and Privacy in Sensor Networks 95
Device Tracking in Private Networks via NAPT Log Analysis 94
Dynamic Network Optimization for Effective Qos Support in Large Grid Infrastructures 93
Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility 92
The untrusted handover security of the S-PMIPv6 on LTE-A 92
Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification 92
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 92
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 91
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 91
On Reliability and Security in Knowledge Grids 91
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 91
On the File Recovery in Systems Infected by Ransomware 91
A nonlinear, recurrence-based approach to traffic classification 90
An Agent-Based Network-Aware Approach to Grid Resource Scheduling 90
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 90
Optimal data replica placement in large-scale federated architectures 90
Effective classification of android malware families through dynamic features and neural networks 90
Transparent authentication across heterogeneous wireless network technologies: A minimum-impact architectural framework 89
Providing effective inter-domain traffic engineering in the Internet 89
Eco-sustainable routing in optical networks 89
Modeling security requirements for cloud-based system development 89
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 89
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System 88
A distributed scheduling framework based on selfish autonomous agents for federated cloud environments 88
Hierarchical and Shared Access Control 88
On the protection of consumer genomic data in the Internet of Living Things 88
An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks 87
A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks 87
Multimedia-based battery drain attacks for Android devices 86
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 86
Analyzing Local Strategies for Energy-Efficient Networking 86
Enhanced Network Support for Federated Cloud Infrastructures 86
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 86
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation 86
Towards Energy-Oriented Telecommunication Networks 85
Totale 11.532
Categoria #
all - tutte 77.906
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 77.906


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.657 0 127 153 24 187 96 194 25 400 46 126 279
2021/20221.670 20 11 28 19 37 37 27 76 212 191 267 745
2022/20232.498 290 190 42 276 297 522 17 276 352 17 149 70
2023/20241.366 141 165 86 73 99 137 109 115 35 99 101 206
2024/20253.156 133 67 62 211 138 326 485 395 466 142 327 404
2025/20262.059 1.437 622 0 0 0 0 0 0 0 0 0 0
Totale 21.520