RAK, Massimiliano
 Distribuzione geografica
Continente #
EU - Europa 9.635
NA - Nord America 3.996
AS - Asia 3.262
SA - Sud America 683
AF - Africa 46
Continente sconosciuto - Info sul continente non disponibili 10
OC - Oceania 4
Totale 17.636
Nazione #
RU - Federazione Russa 5.907
US - Stati Uniti d'America 3.926
SG - Singapore 1.161
IE - Irlanda 1.094
HK - Hong Kong 660
CN - Cina 630
BR - Brasile 591
IT - Italia 572
UA - Ucraina 566
GB - Regno Unito 428
DE - Germania 391
TR - Turchia 280
VN - Vietnam 180
FI - Finlandia 156
KR - Corea 130
SE - Svezia 126
GR - Grecia 115
FR - Francia 109
IN - India 59
AR - Argentina 30
CA - Canada 30
RO - Romania 30
MX - Messico 28
NL - Olanda 25
PL - Polonia 24
BE - Belgio 23
JP - Giappone 21
BD - Bangladesh 20
AT - Austria 19
EC - Ecuador 19
ES - Italia 15
ID - Indonesia 14
IQ - Iraq 14
ZA - Sudafrica 12
SA - Arabia Saudita 11
CO - Colombia 9
EU - Europa 9
TN - Tunisia 9
VE - Venezuela 9
MA - Marocco 8
NP - Nepal 8
PK - Pakistan 8
PY - Paraguay 8
UZ - Uzbekistan 7
CL - Cile 6
EG - Egitto 6
IR - Iran 6
MY - Malesia 6
TW - Taiwan 6
EE - Estonia 5
HU - Ungheria 5
IL - Israele 5
KZ - Kazakistan 5
PE - Perù 5
AE - Emirati Arabi Uniti 4
CZ - Repubblica Ceca 4
DK - Danimarca 4
KE - Kenya 4
PH - Filippine 4
TH - Thailandia 4
AZ - Azerbaigian 3
CH - Svizzera 3
HN - Honduras 3
JO - Giordania 3
LB - Libano 3
LT - Lituania 3
UY - Uruguay 3
AU - Australia 2
BN - Brunei Darussalam 2
BO - Bolivia 2
DZ - Algeria 2
LV - Lettonia 2
NG - Nigeria 2
NO - Norvegia 2
NZ - Nuova Zelanda 2
PA - Panama 2
PT - Portogallo 2
QA - Qatar 2
RS - Serbia 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AL - Albania 1
AM - Armenia 1
BA - Bosnia-Erzegovina 1
BB - Barbados 1
BG - Bulgaria 1
CG - Congo 1
CI - Costa d'Avorio 1
CR - Costa Rica 1
CU - Cuba 1
CY - Cipro 1
DO - Repubblica Dominicana 1
ET - Etiopia 1
GT - Guatemala 1
GY - Guiana 1
KG - Kirghizistan 1
KW - Kuwait 1
NI - Nicaragua 1
OM - Oman 1
SV - El Salvador 1
TJ - Tagikistan 1
Totale 17.636
Città #
Moscow 2.101
Dublin 1.092
Jacksonville 853
Santa Clara 658
Hong Kong 655
Singapore 378
Chandler 333
Princeton 179
Roxbury 171
Ashburn 143
Ann Arbor 132
Seoul 127
Bremen 107
Cambridge 96
Istanbul 95
Medford 94
The Dalles 93
Wilmington 81
Boardman 70
Ho Chi Minh City 61
Naples 60
Woodbridge 57
Dallas 55
Caserta 51
Hefei 50
Beijing 47
Nanjing 46
Kocaeli 43
São Paulo 43
Des Moines 42
Mountain View 41
New York 41
Hanoi 38
Düsseldorf 35
Munich 33
Houston 23
Milan 23
Rio de Janeiro 23
Bengaluru 22
Norwalk 22
Los Angeles 21
Brasília 20
Brussels 20
Tianjin 20
Rome 19
Jinan 18
Nanchang 18
Napoli 18
Redmond 17
Helsinki 15
Redwood City 15
San Mateo 15
Shenyang 15
Anacapri 14
Belo Horizonte 14
Columbus 14
Da Nang 14
Nuremberg 13
Ottawa 13
Venice 12
Porto Alegre 11
St Petersburg 11
Chicago 10
Guangzhou 10
London 10
Timisoara 10
Nocera Inferiore 9
Pune 9
Dhaka 8
Fortaleza 8
Giugliano in Campania 8
Guayaquil 8
Haikou 8
Hanover 8
Kunming 8
Seattle 8
Shanghai 8
Torre Del Greco 8
Warsaw 8
Curitiba 7
Falkenstein 7
Galati 7
Hangzhou 7
Montesarchio 7
Speyer 7
Tashkent 7
Tokyo 7
Turku 7
Changsha 6
Frankfurt am Main 6
Hebei 6
Jeddah 6
Kraków 6
Liverpool 6
Palermo 6
Phoenix 6
Stockholm 6
Taiyuan 6
Vienna 6
Zhengzhou 6
Totale 8.942
Nome #
An Ontology for the Cloud in mOSAIC 209
Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques 170
A Methodology for Vulnerability Assessment and Threat Modelling of an e-Voting Platform based on Ethereum Blockchain 161
2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes 159
A Reference Model for Security Level Evaluation: Policy and Fuzzy Technique 156
SLA Negotiation and Brokering for Sky Computing 155
Cloud evaluation: benchmarking and monitoring 151
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 150
A Cloud Agency for SLA Negotiation and Management 148
Practical Guide to Cloud Service Level Agreements 147
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach 136
Special Issue on Information Assurance and Data Security 135
Negotiation Policies for Provisioning of Cloud Resources 134
A proposal of a cloud-oriented security and performance simulator provided as-a-service 134
A methodology for automated penetration testing of cloud applications 132
A Framework for Mobile Agent Platform performance Evaluation 131
Developing Secure Cloud Applications 124
Threat Modeling of Edge-Based IoT Applications 124
Security in IoT pairing & authentication protocols, a threat model and a case study analysis 124
A Portable Tool for Running MPI Applications in the Cloud 121
Internet of things reference architectures, security and interoperability: A survey 121
A Cloud Application for Security Service Level Agreement Evaluation 120
Providing security SLA in next generation Data Centers with SPECS: The EMC case study 120
An SLA-based Broker for Cloud Infrastructures 118
Stealthy Denial of Service Strategy in Cloud Computing 117
A Performance-Oriented Technique for Hybrid Application Development 117
A Conceptual Model for the General Data Protection Regulation 117
A security metric catalogue for cloud applications 116
A (in)Secure-by-Design IoT Protocol: The ESP Touch Protocol and a Case Study Analysis from the Real Market 115
A cloud-edge smart infrastructures for road safety 115
A Policy-based Design Methodology and Performance Evaluation framework for a secure VoIP Infrastructure 111
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications 111
WETICE 2019 - General Track 111
The mosaic benchmarking framework: Development and execution of custom cloud benchmarks 110
Intrusion Tolerance as a Service: A SLA-Based Solution 110
Systematic IoT penetration testing: ALEXA case study 110
A cloud secdevops methodology: From design to testing 110
Automated threat modelling and risk analysis in e-Government using BPMN 108
MetaPL: a Notation System for Parallel Program Description and Performance Analysis 108
QoS management in Cloud@Home infrastructures 108
A case study on the representativeness of public DoS network traffic data for cybersecurity research 108
Integration of Mobile Agents and OpenMP for programming clusters of Shared Memory 107
Web Services Resilience Evaluation using LDS (Load Dependent Server) Models 106
A proposal of a simulation-based approach for service level agreement in cloud 105
A SLA-based interface for Secure Authentication Negotiation in Cloud 105
Cluster systems and simulation: From benchmarking to off-line performance prediction 105
A framework for cloud-aware development of bag-of-tasks scientific applications 105
Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security 105
Addressing Open Issues on Performances Evaluation in Cloud Computing 104
Self-optimizing MPI Applications: A Simulation-Based Approach 103
Adding Dynamic Coscheduling support to PVM 103
Towards self-protective multi-cloud applications: MUSA-A holistic framework to support the security-intelligent lifecycle management of multi-cloud applications 103
Towards a proof-based SLA management framework the SPECS approach 103
An Architectural model for Trusted Domains in Web Services 102
Cloud Agency: A Mobile Agent Based Cloud System 102
The Cloud@Home Project: Towards a New Enhanced Computing Paradig 101
Economic Denial of Sustainability Mitigation in Cloud Computing 101
Security assurance of (multi-)cloud application with security SLA composition 101
CHASE: An Autonomic Service Engine for Cloud Environments 100
Message from the SQUEET Program Chairs: IC2E 2019 100
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach 99
The transition from a PVM Program Simulator toa Heterogeneous System Simulator: The HeSSE Project 99
Performance Simulation of a Hybrid OpenMP/MPI Application with HeSSE 98
Performance prediction through simulation of a hybrid MPI/OpenMP application 98
A SLA-based interface for security management in cloud and GRID integrations 98
Secure microGRID in Cloud: The CoSSMic Case Study 98
Malware Detection for Secure Microgrids: CoSSMic Case Study 98
Security-by-design in multi-cloud applications: An optimization approach 98
Simulation-based optimization of multiple-task GRID applications 97
Self-optimization of MPI Applications Within an Autonomic Framework 97
Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing 97
Sistemi Basati su agenti mobili per la gestione di terminali eterogenei operanti in sicurezza 96
Integration of Mobile Agents and OpenMP for programming clusters of Shared Memory Processors: a case study 96
On the next generations of infrastructure-as-a-services 96
Security SLAs for cloud services: Hadoop case study 96
Auto-scaling in the Cloud: Current Status and Perspectives 95
Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study 94
Early Prediction of the Cost of Cloud Usage for HPC Applications 94
Automated Threat Modeling Approaches: Comparison of Open Source Tools 93
SLA-Oriented Security Provisioning for Cloud Computing 93
Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal 93
Architecturing a Sky Computing Platform 93
mJADES: Concurrent Simulation in the Cloud 93
SLA-based negotiation and brokering of cloud resources 91
Mobile Agents Self-optimization with MAWeS 91
A Simulation-Based Framework for Autonomic Web Services 91
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services 91
An automatic tool for benchmark testing of cloud applications 91
Systematic analysis of automated threat modelling techniques: Comparison of open-source tools 90
Risk Analysis Automation Process in IT Security for Cloud Applications 90
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures 90
Static evaluation of Certificate Policies for GRID PKIs interoperability 90
Performance prediction of cloud applications through benchmarking and simulation 90
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems 90
Attacking a packet Analyzer: Caronte case study 89
An Interoperability System for Authentication and Authorization in VANETs" 89
A Service for Virtual Cluster Performance Evaluation 89
Security as a Service Using an SLA-Based Approach via SPECS 89
Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud 89
MetaSEnD: A Security Enabled Development Life Cycle Meta-Model 88
Totale 10.980
Categoria #
all - tutte 64.281
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 64.281


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021736 0 0 0 0 0 11 187 136 24 218 136 24
2021/20221.111 31 23 19 33 438 18 20 30 39 21 70 369
2022/20231.759 231 58 18 129 186 91 1 56 934 11 20 24
2023/2024844 45 21 35 47 274 43 44 35 8 25 92 175
2024/20252.791 31 37 15 130 365 422 457 199 362 404 234 135
2025/20267.913 259 227 448 531 811 5.637 0 0 0 0 0 0
Totale 17.858