DI PIETRO, ROBERTO
 Distribuzione geografica
Continente #
NA - Nord America 8.672
EU - Europa 3.810
AS - Asia 2.004
OC - Oceania 11
Continente sconosciuto - Info sul continente non disponibili 4
SA - Sud America 3
AF - Africa 2
Totale 14.506
Nazione #
US - Stati Uniti d'America 8.657
CN - Cina 1.632
GB - Regno Unito 1.624
UA - Ucraina 560
DE - Germania 397
SE - Svezia 376
IT - Italia 218
VN - Vietnam 176
FI - Finlandia 150
RU - Federazione Russa 145
AL - Albania 136
IE - Irlanda 131
SG - Singapore 110
TR - Turchia 65
NL - Olanda 27
FR - Francia 19
CA - Canada 15
IN - India 13
AU - Australia 11
GR - Grecia 5
PL - Polonia 5
BE - Belgio 4
EU - Europa 4
BR - Brasile 2
ES - Italia 2
HR - Croazia 2
HU - Ungheria 2
QA - Qatar 2
RO - Romania 2
TN - Tunisia 2
BD - Bangladesh 1
CH - Svizzera 1
CL - Cile 1
CZ - Repubblica Ceca 1
DK - Danimarca 1
IL - Israele 1
IR - Iran 1
MY - Malesia 1
NO - Norvegia 1
RS - Serbia 1
TW - Taiwan 1
YE - Yemen 1
Totale 14.506
Città #
Woodbridge 1.731
Southend 1.488
Fairfield 1.383
Houston 821
Ashburn 610
Seattle 565
Wilmington 469
Cambridge 467
Nanjing 434
Ann Arbor 404
Chandler 399
Jacksonville 349
Dearborn 326
Princeton 271
Dong Ket 176
Beijing 175
Nanchang 165
Shenyang 137
Dublin 131
Hebei 101
Redwood City 93
Tianjin 85
Changsha 84
Jiaxing 68
Singapore 68
Altamura 65
Izmir 65
Jinan 65
San Diego 54
Zhengzhou 45
San Paolo di Civitate 41
Hangzhou 40
Kunming 39
Shanghai 37
Orange 36
Ningbo 35
Plano 34
London 30
Guangzhou 21
Rome 21
Boardman 20
New York 14
Washington 14
Bari 13
Renton 13
Taizhou 13
Venezia 13
Changchun 12
Los Angeles 12
Alameda 10
Fort Worth 10
Garbsen 10
Ottawa 10
Flushing 9
Lanzhou 9
Lappeenranta 9
Milan 9
Mountain View 9
Eitensheim 8
Haikou 8
Hounslow 8
Dallas 7
Verona 7
Walnut 7
Chiswick 6
Kilburn 6
Norwalk 6
Pune 6
Stevenage 6
Fuzhou 5
Taiyuan 5
Bremen 4
Brussels 4
Hefei 4
Helsinki 4
New Bedfont 4
Acton 3
Atlanta 3
Chongqing 3
Düsseldorf 3
Groningen 3
North York 3
Polska 3
Portici 3
Saint Petersburg 3
Southwark 3
Baotou 2
Budapest 2
Chicago 2
Columbus 2
Doha 2
Enterprise 2
Eugene 2
Islington 2
Kielce 2
Mola Di Bari 2
Pazin 2
Prescot 2
Rovaniemi 2
Sheffield 2
Totale 12.000
Nome #
Epidemic Theory and Data Survivability in Unattended Wireless Sensor Networks: Models and Gaps. 182
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems 175
Titans' revenge: Detecting Zeus via its own flaws 173
A new role mining framework to elicit business roles and to mitigate enterprise risk 157
A Business-Driven Decomposition Methodology for Role Mining 156
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 152
A mechanism to enforce privacy in vehicle-to-infrastructure communication 149
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection 147
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems 147
Key Management for High Bandwidth Secure Multicast 146
Addressing the Shortcomings of One-Way Chains 144
Secure topology maintenance and events collection in WSNs 144
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets 143
Boosting Efficiency and Security in Proof of Ownership for Deduplication. 142
“Who counterfeited my Viagra?” Probabilistic item removal detection via RFID tag cooperation 141
A formal framework for the performance analysis of P2P networks protocols 141
COKE: Crypto-less Over-the-air Key Establishment 140
Secure Virtualization for Cloud Computing 140
A Probabilistic Bound on the Basic Role Mining Problem and its Applications 139
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks 139
Intrusion-Resilient Integrity in Data-Centric Unattended WSNs. 138
A formal framework to elicit roles with business meaning in RBAC systems 137
Hierarchies of Keys in Secure Multicast Communications 136
Preserving privacy against external and internal threats in WSN data aggregation 134
A Cost-Driven Approach to Role Engineering 134
A methodology for P2P file-sharing traffic detection 133
Windows Mobile LiveSD Forensics 132
eRIPP-FS: Enforcing Privacy and Security in RFID 132
Cross-border Co-operation and Education in Digital Investigations: an European Perspective 131
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions 130
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization 129
A Security Management Architecture for the protection of Kernel Virtual Machines 129
Redoubtable Sensor Networks 127
Catch Me (If You Can): Data Survival in Unattended Sensor Networks 126
Time in privacy preserving LBSs: an overlooked dimension 126
Maximizing service availability for secure satellite broadcasting 125
Visual Role Mining: A Picture Is Worth a Thousand Roles. 125
EXPEDITE: EXPress closED ITemset Enumeration 125
Event Handoff Unobservability in WSN 124
CUDACS: Securing the Cloud with CUDA-enabled Secure Virtualization 122
Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks 122
Data Security in Unattended Wireless Sensor Networks 122
CloRExPa: Cloud Resilience via Execution Path Analysis 121
Intrusion Detection Systems 121
Location privacy and resilience in wireless sensor networks querying 119
Preserving Query Privacy in Urban Sensing Systems 119
CONCISE: Compressed 'n' Composable Integer Set 118
Broadcast Authentication for resource constrained devices: a major pitfall and some solutions 118
PRISM—Privacy-Preserving Search in MapReduce. 117
Sensor Networks that Are Provably Resilient 116
Information Assurance in Critical Infrastructures via Wireless Sensor Networks 116
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN 116
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks 115
Data Confidentiality and Availability via Secret Sharing and Node Mobility in UWSN 115
Military secure communications over public cellular network infrastructure 115
Taming Role Mining Complexity in RBAC 115
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy 115
Authentication 114
Short paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy 114
Formal specification for fast automatic IDS training 114
Transparent Security for Cloud 112
Towards threat-adaptive dynamic fragment replication in large scale distributed systems 112
Wireless Sensor Replica Detection in Mobile Environments 112
Scalable and Efficient Provable Data Possession 110
Distributed Data Source Verification in Wireless Sensor Networks 109
Events Privacy in WSNs: a New Model and its Application 108
Optimal key scheduling for secure satellite broadcasting to mobile users 108
BaRT, Balanced Randomized Tree: A scalable and distributed protocol for look-up in peer-to-peer networks 108
Dependable and Secure Data Storage in Wireless Ad Hoc Networks: an Assessment of DS2 106
Intrusion-Resilience in Mobile Unattended WSNs 106
Efficient and Adaptive Threshold Signatures for Adhoc networks. 106
United We Stand: Intrusion-Resilience in Mobile Unattended WSNs 106
Secure k-Connectivity Properties of Wireless Sensor Networks 105
Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks 105
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation 105
Collaborative Authentication in Unattended WSNs 104
A methodology for computer forensic analysis 103
Time Warp: how time affects privacy in LBSs 103
A model with applications for data survivability in Critical Infrastructures 102
Efficient and Adaptive Threshold Signatures for Adhoc networks 102
Evaluating the Risk of Adopting RBAC Roles 102
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks 102
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks 102
Efficient and secure keys management for wireless mobile communications 101
Digital Forensics Techniques and tools 100
Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques 100
Information confinement, privacy, and security in RFID systems 99
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs 98
Providing secrecy in key management protocols for large wireless sensors networks 98
Taming Zeus leveraging its own crypto internals 98
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks 97
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System 97
Random Key Assignment for Secure Wireless Sensor Networks 96
Securing Mobile Unattended WSNs against a mobile adversary 95
Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring 95
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance 95
Distributed Detection of Clone Attacks in Wireless Sensor Networks 94
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 94
Leveraging Lattices to Improve Role Mining 93
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack 92
Totale 12.014
Categoria #
all - tutte 44.850
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 44.850


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20204.672 1.022 398 172 557 387 392 446 361 499 154 207 77
2020/20212.182 179 157 182 98 223 136 333 281 61 199 55 278
2021/20221.251 42 297 6 6 288 35 85 35 118 54 105 180
2022/20231.302 192 220 56 112 105 311 0 106 135 4 41 20
2023/2024473 21 37 42 23 36 68 46 63 0 20 16 101
2024/202516 16 0 0 0 0 0 0 0 0 0 0 0
Totale 14.642