FICCO, Massimo
 Distribuzione geografica
Continente #
EU - Europa 6.151
NA - Nord America 3.036
AS - Asia 2.442
SA - Sud America 395
AF - Africa 47
Continente sconosciuto - Info sul continente non disponibili 10
OC - Oceania 3
Totale 12.084
Nazione #
RU - Federazione Russa 3.699
US - Stati Uniti d'America 2.990
SG - Singapore 830
IE - Irlanda 710
CN - Cina 532
HK - Hong Kong 420
IT - Italia 395
UA - Ucraina 366
BR - Brasile 314
GB - Regno Unito 300
DE - Germania 186
VN - Vietnam 175
KR - Corea 155
FR - Francia 99
FI - Finlandia 95
GR - Grecia 79
SE - Svezia 74
TR - Turchia 73
IN - India 65
ID - Indonesia 47
AT - Austria 32
AR - Argentina 28
CA - Canada 25
BD - Bangladesh 24
BE - Belgio 23
JP - Giappone 23
EC - Ecuador 20
NL - Olanda 18
ZA - Sudafrica 18
PK - Pakistan 15
PL - Polonia 15
ES - Italia 14
CO - Colombia 12
IR - Iran 12
SA - Arabia Saudita 12
EU - Europa 9
IQ - Iraq 9
MX - Messico 8
RO - Romania 8
MA - Marocco 7
SK - Slovacchia (Repubblica Slovacca) 7
CL - Cile 6
KE - Kenya 6
UZ - Uzbekistan 6
HU - Ungheria 5
PA - Panama 5
PY - Paraguay 5
AE - Emirati Arabi Uniti 4
DZ - Algeria 4
EG - Egitto 4
MY - Malesia 4
NO - Norvegia 4
PH - Filippine 4
TW - Taiwan 4
UY - Uruguay 4
VE - Venezuela 4
BG - Bulgaria 3
CR - Costa Rica 3
CY - Cipro 3
EE - Estonia 3
KG - Kirghizistan 3
LK - Sri Lanka 3
AU - Australia 2
AZ - Azerbaigian 2
ET - Etiopia 2
IL - Israele 2
JO - Giordania 2
KZ - Kazakistan 2
LT - Lituania 2
LV - Lettonia 2
MK - Macedonia 2
NG - Nigeria 2
PE - Perù 2
PT - Portogallo 2
RS - Serbia 2
SI - Slovenia 2
SV - El Salvador 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AG - Antigua e Barbuda 1
AL - Albania 1
AM - Armenia 1
BF - Burkina Faso 1
BH - Bahrain 1
BN - Brunei Darussalam 1
CH - Svizzera 1
CZ - Repubblica Ceca 1
GD - Grenada 1
JM - Giamaica 1
LA - Repubblica Popolare Democratica del Laos 1
LB - Libano 1
LU - Lussemburgo 1
NP - Nepal 1
NZ - Nuova Zelanda 1
OM - Oman 1
PS - Palestinian Territory 1
SN - Senegal 1
SY - Repubblica araba siriana 1
TG - Togo 1
TH - Thailandia 1
TJ - Tagikistan 1
Totale 12.083
Città #
Moscow 1.382
Dublin 709
Jacksonville 538
Santa Clara 430
Hong Kong 414
Singapore 291
Chandler 204
San Jose 177
Ann Arbor 150
Seoul 147
Ashburn 120
Princeton 113
Roxbury 94
Beijing 76
Medford 69
Ho Chi Minh City 58
Caserta 54
Cambridge 47
Hanoi 43
Wilmington 43
Woodbridge 43
Bremen 42
Mountain View 40
Napoli 40
The Dalles 40
Des Moines 38
Redwood City 35
Boardman 32
Jakarta 32
Los Angeles 29
Dallas 27
San Mateo 27
Hefei 25
New York 24
Vienna 24
Houston 23
São Paulo 21
Brussels 20
Naples 18
Düsseldorf 17
Kyiv 17
Jinan 15
Johannesburg 14
Quito 14
Bengaluru 13
Istanbul 13
Rome 13
Atlanta 12
Boscoreale 12
Nanjing 12
Tianjin 12
Belo Horizonte 11
Venice 11
Zhengzhou 11
Anacapri 10
Chennai 10
Frankfurt am Main 10
Haiphong 10
Imola 10
Orem 10
Tokyo 10
Amsterdam 9
Nanchang 9
Rio de Janeiro 9
Shenyang 9
Brooklyn 8
Council Bluffs 8
Da Nang 8
Dhaka 8
Auburn Hills 7
Changsha 7
Columbus 7
Guangzhou 7
Islamabad 7
Kunming 7
London 7
Ottawa 7
Seattle 7
Chicago 6
Hangzhou 6
Hebei 6
Helsinki 6
Nairobi 6
Norwalk 6
Shanghai 6
St Petersburg 6
Baltimore 5
Brasília 5
Curitiba 5
Falkenstein 5
Goiânia 5
Haikou 5
Jeddah 5
Lucca 5
Manchester 5
Medellín 5
Munich 5
Nuremberg 5
Phủ Lý 5
Porto Alegre 5
Totale 6.255
Nome #
Intelligent agents for diffused cyber-physical museums 192
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 181
A simulation model for localization of pervasive objects using heterogeneous wireless networks 174
Intrusion detection in federated clouds 163
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios 163
Cloud evaluation: benchmarking and monitoring 159
A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments 152
Agent-Based Intrusion Detection for Federated Clouds 150
Comparing API Call Sequence Algorithms for Malware Detection 146
A cloud-based architecture for emergency management and first responders localization in smart city environments 143
Preface 142
A Positioning Service for Pervasive Objects in Dynamic Environments 141
Internet-of-Things and Fog-Computing as enablers of new security and privacy threats 141
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things 139
A coral-reefs and game theory-based approach for optimizing elastic cloud resource allocation 138
Achieving Security by Intrusion-Tolerance Based on Event Correlation 137
Intrusion detection in Cloud Computing 137
2nd workshop on cyber security and resilience of large-scale systems 137
Developing Secure Cloud Applications 134
Threat Modeling of Edge-Based IoT Applications 134
Stealthy Denial of Service Strategy in Cloud Computing 132
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, 131
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing 130
A Semantic Driven Approach for Requirements Verification 130
A semantic driven approach for requirements consistency verification 129
Internet of things reference architectures, security and interoperability: A survey 128
A semantic driven approach for consistency verification between requirements and FMEA 125
Advances on P2P, Parallel, Grid, Cloud and Internet Computing 122
Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers 120
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks 120
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing 120
An Advanced Intrusion Detection Framework for Cloud Computing 119
Calibrating Indoor Positioning Systems With Low Efforts 118
Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud 117
Interconnection of Federated Clouds 117
A Correlation Approach to Intrusion Detection 116
Bug Localization in Test-Driven Development 115
Distributed Group Key Management for Event Notification Confidentiality among Sensors 115
Welcome Message from SecureSysCom 2016 International Workshop Organizers 115
Blockchain-based authentication and authorization for smart city applications 115
Intrusion Tolerance as a Service: A SLA-Based Solution 113
Hosting mission-critical applications on cloud: Technical issues and challenges 113
A Strategy for Application-transparent Integration of Nomadic Computing Domains 112
A game-theoretic approach to network embedded FEC over large-scale networks 111
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures 111
CoSSMic smart grid migration in federated clouds 110
Preface 110
Supporting ubiquitous location information in interworking 3G and wireless networks 109
A scalable distributed machine learning approach for attack detection in edge computing environments 109
Building a network embedded FEC protocol by using game theory 109
Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage 109
Hybrid Simulation of Distributed Large-Scale Critical Infrastructures 108
Addressing Open Issues on Performances Evaluation in Cloud Computing 108
Intelligent data-centric critical systems: Security and resilience key challenges 108
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures 106
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures 105
Live Migration in Emerging Cloud Paradigms 105
Supporting First Responders Localization during Crisis Management 104
Preface 104
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 102
Economic Denial of Sustainability Mitigation in Cloud Computing 102
CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures 101
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) 101
Modeling Security Requirements for Cloud-based System Development 100
SLA-Oriented Security Provisioning for Cloud Computing 100
Malware Detection for Secure Microgrids: CoSSMic Case Study 100
Mobile Agent-Based Provision of Context-Awareness for Positioning 99
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios 99
Security SLAs for cloud services: Hadoop case study 99
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory 98
Security event correlation approach for cloud computing 98
Hybrid Localization for Ubiquitous Services 97
Calibration-less Indoor Location Systems Based on Wireless Sensors 96
Implementing positioning services over an ubiquitous infrastructure 96
Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices 95
mOSAIC-Based Intrusion Detection Framework for Cloud Computing 95
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design 95
Recent developments on security and reliability in large-scale data processing with MapReduce 94
Distributed strategic learning for effective gossiping in wireless networks 94
Calibrating RSS-based Indoor Positioning Systems 93
An intrusion detection framework for supporting SLA assessment in Cloud Computing 93
Hybrid indoor and outdoor location services for new generation mobile terminals 92
Developing Secure Cloud Applications: A Case Study 92
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems 92
Aging-related performance anomalies in the apache storm stream processing system 91
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 91
An uncertainty-managing batch relevance-based approach to network anomaly detection 90
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems 90
Hybrid Positioning System for Technology-independent Location-aware Computing 89
Intrusion Tolerance in Cloud Applications: the mOSAIC Approach 89
On Reliability and Security in Knowledge Grids 88
Intrusion Tolerance of Stealth DoS Attacks to Web Services 88
An HLA-based framework for simulation of large-scale critical systems 88
Editorial: security and reliability of critical systems 88
Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? 88
Semantic Support for Log Analysis of Safety-Critical Embedded Systems 87
Supporting Location-Aware Distributed Applications on Mobile Devices 86
Supporting Development of Certified Aeronautical Components by applying Text Analysis Techniques 86
An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing 83
Association rule-based malware classification using common subsequences of API calls 82
Totale 11.328
Categoria #
all - tutte 41.941
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 41.941


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021217 0 0 0 0 0 0 0 0 0 77 132 8
2021/2022766 39 16 18 24 275 17 20 30 27 15 60 225
2022/20231.118 132 17 15 66 107 61 4 41 622 13 16 24
2023/2024567 48 11 25 30 179 22 23 14 7 24 46 138
2024/20251.818 7 118 6 38 265 237 310 112 257 274 127 67
2025/20265.532 145 129 255 294 509 3.408 315 129 231 117 0 0
Totale 12.354