PALMIERI, Francesco
 Distribuzione geografica
Continente #
NA - Nord America 11.072
EU - Europa 3.630
AS - Asia 2.842
SA - Sud America 316
AF - Africa 27
Continente sconosciuto - Info sul continente non disponibili 12
OC - Oceania 10
Totale 17.909
Nazione #
US - Stati Uniti d'America 11.006
IT - Italia 1.157
CN - Cina 990
SG - Singapore 906
UA - Ucraina 639
RU - Federazione Russa 549
TR - Turchia 315
DE - Germania 297
IE - Irlanda 295
BR - Brasile 279
VN - Vietnam 206
SE - Svezia 203
FI - Finlandia 166
KR - Corea 166
IN - India 96
FR - Francia 64
CA - Canada 53
GB - Regno Unito 46
HK - Hong Kong 44
RO - Romania 31
NL - Olanda 30
PL - Polonia 25
LV - Lettonia 22
AT - Austria 21
EE - Estonia 19
AR - Argentina 18
ID - Indonesia 14
JP - Giappone 13
EU - Europa 12
ES - Italia 11
IR - Iran 11
MX - Messico 11
PK - Pakistan 11
TW - Taiwan 11
EG - Egitto 9
IL - Israele 9
BE - Belgio 7
IQ - Iraq 7
PH - Filippine 7
AU - Australia 6
BD - Bangladesh 6
BG - Bulgaria 6
CZ - Repubblica Ceca 6
RS - Serbia 6
UZ - Uzbekistan 6
EC - Ecuador 5
TN - Tunisia 5
AL - Albania 4
BO - Bolivia 4
GR - Grecia 4
HU - Ungheria 4
NZ - Nuova Zelanda 4
QA - Qatar 4
ZA - Sudafrica 4
AE - Emirati Arabi Uniti 3
CH - Svizzera 3
CL - Cile 3
GH - Ghana 3
MA - Marocco 3
MY - Malesia 3
OM - Oman 3
PT - Portogallo 3
BN - Brunei Darussalam 2
BY - Bielorussia 2
CO - Colombia 2
DK - Danimarca 2
MK - Macedonia 2
NO - Norvegia 2
PS - Palestinian Territory 2
TH - Thailandia 2
UY - Uruguay 2
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
CM - Camerun 1
DZ - Algeria 1
GE - Georgia 1
GY - Guiana 1
JM - Giamaica 1
JO - Giordania 1
KE - Kenya 1
LT - Lituania 1
LU - Lussemburgo 1
MO - Macao, regione amministrativa speciale della Cina 1
PA - Panama 1
PY - Paraguay 1
SA - Arabia Saudita 1
SK - Slovacchia (Repubblica Slovacca) 1
VE - Venezuela 1
Totale 17.909
Città #
Ann Arbor 3.396
Woodbridge 1.038
Chandler 1.023
Princeton 871
Houston 820
Jacksonville 808
Wilmington 735
Singapore 321
Izmir 305
Dublin 288
Ashburn 245
Beijing 234
Dong Ket 198
Andover 187
Salerno 181
Nanjing 170
Pellezzano 149
Dearborn 130
Boardman 122
Moscow 120
Fairfield 82
Nanchang 74
Shenyang 67
Changsha 65
Hebei 64
Mestre 62
Naples 59
Jiaxing 55
Düsseldorf 51
Redwood City 50
Rome 46
Norwalk 45
Hong Kong 35
Ottawa 33
Seattle 33
Tianjin 31
Milan 30
Council Bluffs 28
Dallas 28
Pune 28
Nuremberg 25
New York 24
Helsinki 23
Washington 21
Napoli 20
Edinburgh 19
Tallinn 18
Kyiv 16
San Diego 16
Lappeenranta 14
São Paulo 14
Guangzhou 13
Los Angeles 13
Munich 13
Parma 13
Shanghai 13
Belo Horizonte 12
Fisciano 12
The Dalles 12
Vienna 12
Santa Clara 11
Amsterdam 10
Cambridge 10
Frankfurt am Main 10
Dormagen 9
Jinan 9
Pomigliano d'Arco 9
Sarno 9
Afragola 8
Marigliano 8
Nocera Inferiore 8
St Petersburg 8
Tokyo 8
Bari 7
Curitiba 7
Falls Church 7
Giugliano In Campania 7
Karachi 7
Madrid 7
Nettuno 7
Rio de Janeiro 7
San Nicola la Strada 7
Belgrade 6
Kraków 6
Kunming 6
Lissone 6
Maiori 6
Montecorvino Rovella 6
Paris 6
Porto Alegre 6
Taipei 6
Warsaw 6
Boydton 5
Brussels 5
Buenos Aires 5
Frattamaggiore 5
Genova 5
Maceió 5
Qina 5
Spinea 5
Totale 12.910
Nome #
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks 158
A botnet-based command and control approach relying on swarm intelligence 154
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 152
A secure file sharing service for distributed computing environments 141
An Artificial Intelligence-Based Trust Model for Pervasive Computing 140
Interconnecting Federated Clouds by Using Publish-Subscribe Service 131
Format-Independent Protection of DNA Microarray Images 125
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes 125
Cloud-based adaptive compression and secure management services for 3D healthcare data 122
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment 122
An asynchronous covert channel using spam 119
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 118
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 117
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment 116
Audit-Based Access Control in Nomadic Wireless Environments 114
On Secure Data Management in Health-Care Environment 114
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 113
Saving Energy in Data Center Infrastructures 111
An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects 109
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 107
Using Screen Brightness to Improve Security in Mobile Social Network Access 107
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 106
Building a network embedded FEC protocol by using game theory 106
A triadic closure and homophily-based recommendation system for online social networks 104
An HLA-based framework for simulation of large-scale critical systems 104
A honeypot system with honeyword-driven fake interactive sessions 104
A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures 103
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 102
On-board format-independent security of functional magnetic resonance images 102
Secure and distributed video surveillance via portable devices 101
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 101
Condensation-based routing in mobile ad-hoc networks 100
Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam 100
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 100
A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure 100
A secure payment system for multimedia on demand on mobile VANET clouds 99
Bayesian resource discovery in infrastructure-less networks 99
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 99
CHIS: A big data infrastructure to manage digital cultural items 99
Automatic security assessment for next generation wireless mobile networks 98
Analyzing the impact of Internet worms on global routing stability 98
VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches 98
Distributed strategic learning for effective gossiping in wireless networks 97
Hybrid indoor and outdoor location services for new generation mobile terminals 96
A distributed approach to network anomaly detection based on independent component analysis 96
Providing true end-to-end security in converged voice over IP infrastructures 96
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 95
Secure and reliable data communication in developing regions and rural areas 95
Insights into peer to peer traffic through nonlinear analysis 95
Quality of Service support in all-optical wavelength routed networks 95
Device Tracking in Private Networks via NAPT Log Analysis 94
New Steganographic Techniques for the OOXML File Format 93
An uncertainty-managing batch relevance-based approach to network anomaly detection 93
Advances in Security and Privacy in Sensor Networks 93
Dynamic Network Optimization for Effective Qos Support in Large Grid Infrastructures 92
Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility 92
The untrusted handover security of the S-PMIPv6 on LTE-A 92
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 92
GRASP-based resource re-optimization for effective big data access in federated clouds 91
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 91
On Reliability and Security in Knowledge Grids 90
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 90
A Secure Distributed Video Surveillance System Based on Portable Devices 90
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 89
Providing effective inter-domain traffic engineering in the Internet 89
Eco-sustainable routing in optical networks 89
Modeling security requirements for cloud-based system development 89
On the Protection of fMRI Images in Multi-domain Environments 89
Transparent authentication across heterogeneous wireless network technologies: A minimum-impact architectural framework 88
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices 88
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System 87
Text Compression and Encryption through Smart Devices for Mobile Communication 87
An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks 87
Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification 87
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks 86
Analyzing Local Strategies for Energy-Efficient Networking 86
An Agent-Based Network-Aware Approach to Grid Resource Scheduling 86
Enhanced Network Support for Federated Cloud Infrastructures 86
Optimal data replica placement in large-scale federated architectures 86
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks 86
A nonlinear, recurrence-based approach to traffic classification 85
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification 85
Towards Energy-Oriented Telecommunication Networks 84
Hierarchical and Shared Access Control 84
A cloud-based architecture for emergency management and first responders localization in smart city environments 83
A distributed scheduling framework based on selfish autonomous agents for federated cloud environments 82
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures 82
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 82
On the Optimization of GLite-Based Job Submission 82
A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks 82
Network-Aware Replica Optimization in the SCoPE Grid Infrastructure 82
A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness 82
Evolutionary passive optical ring architectures for user-empowered MANs 81
How the big data is leading the evolution of ICT technologies and processes 81
On the protection of consumer genomic data in the Internet of Living Things 81
A hybrid load-balancing and energy-aware RWA algorithm for telecommunication networks 81
E-mail-based Covert Channels for Asynchronous Message Steganography 81
An energy-aware dynamic RWA framework for next-generation wavelength-routed networks 80
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 80
Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective: New security issues in the coming green ICT area 80
Totale 9.821
Categoria #
all - tutte 68.508
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 68.508


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020350 0 0 0 0 0 0 0 0 0 0 293 57
2020/20211.674 17 127 153 24 187 96 194 25 400 46 126 279
2021/20221.670 20 11 28 19 37 37 27 76 212 191 267 745
2022/20232.498 290 190 42 276 297 522 17 276 352 17 149 70
2023/20241.366 141 165 86 73 99 137 109 115 35 99 101 206
2024/20252.429 133 67 62 211 138 326 485 395 466 142 4 0
Totale 18.734