DI PIETRO, ROBERTO
 Distribuzione geografica
Continente #
NA - Nord America 9.128
EU - Europa 5.004
AS - Asia 2.477
SA - Sud America 147
AF - Africa 14
OC - Oceania 12
Continente sconosciuto - Info sul continente non disponibili 4
Totale 16.786
Nazione #
US - Stati Uniti d'America 9.095
CN - Cina 1.709
GB - Regno Unito 1.642
RU - Federazione Russa 1.283
UA - Ucraina 561
SG - Singapore 415
DE - Germania 409
SE - Svezia 377
IT - Italia 224
VN - Vietnam 184
FI - Finlandia 155
BR - Brasile 139
AL - Albania 136
IE - Irlanda 131
TR - Turchia 69
HK - Hong Kong 40
NL - Olanda 30
CA - Canada 21
FR - Francia 20
IN - India 19
AU - Australia 11
PL - Polonia 8
IQ - Iraq 7
MX - Messico 7
BD - Bangladesh 6
ZA - Sudafrica 6
GR - Grecia 5
SA - Arabia Saudita 5
AR - Argentina 4
BE - Belgio 4
EU - Europa 4
AZ - Azerbaigian 3
ES - Italia 3
MA - Marocco 3
TN - Tunisia 3
AE - Emirati Arabi Uniti 2
AT - Austria 2
CZ - Repubblica Ceca 2
HR - Croazia 2
HU - Ungheria 2
JO - Giordania 2
OM - Oman 2
QA - Qatar 2
RO - Romania 2
UZ - Uzbekistan 2
VE - Venezuela 2
BB - Barbados 1
BY - Bielorussia 1
CH - Svizzera 1
CL - Cile 1
DK - Danimarca 1
EC - Ecuador 1
ET - Etiopia 1
ID - Indonesia 1
IL - Israele 1
IR - Iran 1
JM - Giamaica 1
JP - Giappone 1
KE - Kenya 1
KZ - Kazakistan 1
LT - Lituania 1
MY - Malesia 1
NO - Norvegia 1
NP - Nepal 1
NZ - Nuova Zelanda 1
PA - Panama 1
PK - Pakistan 1
RS - Serbia 1
SV - El Salvador 1
TT - Trinidad e Tobago 1
TW - Taiwan 1
YE - Yemen 1
Totale 16.786
Città #
Woodbridge 1.731
Southend 1.488
Fairfield 1.383
Houston 824
Ashburn 619
Seattle 565
Wilmington 469
Cambridge 467
Nanjing 434
Ann Arbor 404
Chandler 399
Jacksonville 349
Dearborn 326
Princeton 271
Boardman 254
Beijing 229
Dong Ket 176
Nanchang 165
Singapore 158
Shenyang 137
Dublin 131
Hebei 101
Redwood City 93
Tianjin 85
Changsha 84
Jiaxing 68
Altamura 65
Izmir 65
Jinan 65
Moscow 56
San Diego 54
Zhengzhou 46
San Paolo di Civitate 41
Hangzhou 40
Hong Kong 40
Kunming 39
Shanghai 38
Orange 36
Ningbo 35
Plano 34
The Dalles 34
London 32
Los Angeles 24
Dallas 22
Rome 22
Guangzhou 21
New York 17
Washington 14
Bari 13
Renton 13
Taizhou 13
Venezia 13
Changchun 12
Ottawa 12
Alameda 10
Fort Worth 10
Garbsen 10
Milan 10
Yubileyny 10
Flushing 9
Lanzhou 9
Lappeenranta 9
Mountain View 9
Eitensheim 8
Haikou 8
Hounslow 8
Munich 8
San Francisco 8
Brooklyn 7
Helsinki 7
São Paulo 7
Verona 7
Walnut 7
Chiswick 6
Kilburn 6
Manchester 6
Norwalk 6
Pune 6
Stevenage 6
Atlanta 5
Fuzhou 5
Taiyuan 5
Bremen 4
Brussels 4
Hefei 4
Ho Chi Minh City 4
New Bedfont 4
Acton 3
Amsterdam 3
Baghdad 3
Baku 3
Boston 3
Caruaru 3
Charlotte 3
Chicago 3
Chongqing 3
Columbus 3
Düsseldorf 3
Groningen 3
Hanoi 3
Totale 12.597
Nome #
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems 207
Epidemic Theory and Data Survivability in Unattended Wireless Sensor Networks: Models and Gaps. 201
Titans' revenge: Detecting Zeus via its own flaws 189
A new role mining framework to elicit business roles and to mitigate enterprise risk 188
A Business-Driven Decomposition Methodology for Role Mining 184
Addressing the Shortcomings of One-Way Chains 177
A mechanism to enforce privacy in vehicle-to-infrastructure communication 177
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection 169
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets 168
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 167
A Probabilistic Bound on the Basic Role Mining Problem and its Applications 166
A Cost-Driven Approach to Role Engineering 166
A formal framework for the performance analysis of P2P networks protocols 164
Secure Virtualization for Cloud Computing 162
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks 161
Key Management for High Bandwidth Secure Multicast 160
Secure topology maintenance and events collection in WSNs 160
“Who counterfeited my Viagra?” Probabilistic item removal detection via RFID tag cooperation 159
A formal framework to elicit roles with business meaning in RBAC systems 159
A methodology for P2P file-sharing traffic detection 159
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems 158
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions 158
A Security Management Architecture for the protection of Kernel Virtual Machines 158
Windows Mobile LiveSD Forensics 156
Preserving privacy against external and internal threats in WSN data aggregation 154
COKE: Crypto-less Over-the-air Key Establishment 153
Boosting Efficiency and Security in Proof of Ownership for Deduplication. 153
Intrusion-Resilient Integrity in Data-Centric Unattended WSNs. 152
Hierarchies of Keys in Secure Multicast Communications 149
eRIPP-FS: Enforcing Privacy and Security in RFID 148
Redoubtable Sensor Networks 145
Cross-border Co-operation and Education in Digital Investigations: an European Perspective 145
Visual Role Mining: A Picture Is Worth a Thousand Roles. 143
Data Security in Unattended Wireless Sensor Networks 142
Catch Me (If You Can): Data Survival in Unattended Sensor Networks 141
Maximizing service availability for secure satellite broadcasting 141
Time in privacy preserving LBSs: an overlooked dimension 141
Taming Role Mining Complexity in RBAC 140
EXPEDITE: EXPress closED ITemset Enumeration 140
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization 138
Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks 137
Authentication 136
Event Handoff Unobservability in WSN 136
Location privacy and resilience in wireless sensor networks querying 135
Scalable and Efficient Provable Data Possession 135
A methodology for computer forensic analysis 135
Information Assurance in Critical Infrastructures via Wireless Sensor Networks 135
CUDACS: Securing the Cloud with CUDA-enabled Secure Virtualization 134
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN 134
Intrusion Detection Systems 134
Broadcast Authentication for resource constrained devices: a major pitfall and some solutions 134
CloRExPa: Cloud Resilience via Execution Path Analysis 133
CONCISE: Compressed 'n' Composable Integer Set 133
PRISM—Privacy-Preserving Search in MapReduce. 130
Wireless Sensor Replica Detection in Mobile Environments 130
Data Confidentiality and Availability via Secret Sharing and Node Mobility in UWSN 129
Preserving Query Privacy in Urban Sensing Systems 129
Short paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy 129
Optimal key scheduling for secure satellite broadcasting to mobile users 129
A model with applications for data survivability in Critical Infrastructures 128
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks 128
Towards threat-adaptive dynamic fragment replication in large scale distributed systems 128
Sensor Networks that Are Provably Resilient 128
Formal specification for fast automatic IDS training 128
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy 127
Transparent Security for Cloud 126
Military secure communications over public cellular network infrastructure 126
BaRT, Balanced Randomized Tree: A scalable and distributed protocol for look-up in peer-to-peer networks 126
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation 125
Distributed Data Source Verification in Wireless Sensor Networks 124
Efficient and Adaptive Threshold Signatures for Adhoc networks. 124
United We Stand: Intrusion-Resilience in Mobile Unattended WSNs 124
Collaborative Authentication in Unattended WSNs 121
Dependable and Secure Data Storage in Wireless Ad Hoc Networks: an Assessment of DS2 121
Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks 120
A time driven methodology for keys dimensioning in secure multicast communications 119
Events Privacy in WSNs: a New Model and its Application 119
Taming Zeus leveraging its own crypto internals 119
Digital Forensics Techniques and tools 117
Time Warp: how time affects privacy in LBSs 117
Providing secrecy in key management protocols for large wireless sensors networks 117
Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques 117
Intrusion-Resilience in Mobile Unattended WSNs 116
Evaluating the Risk of Adopting RBAC Roles 116
A Live Digital Forensic system for Windows network 116
Secure k-Connectivity Properties of Wireless Sensor Networks 115
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks 115
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks 115
Efficient and secure keys management for wireless mobile communications 113
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks 113
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 113
Efficient and Adaptive Threshold Signatures for Adhoc networks 112
Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring 112
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System 111
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs 110
Securing Mobile Unattended WSNs against a mobile adversary 110
Random Key Assignment for Secure Wireless Sensor Networks 109
A reliable key authentication scheme for secure multicast communications 108
Information confinement, privacy, and security in RFID systems 108
Leveraging Lattices to Improve Role Mining 108
Totale 13.774
Categoria #
all - tutte 57.962
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 57.962


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.182 179 157 182 98 223 136 333 281 61 199 55 278
2021/20221.251 42 297 6 6 288 35 85 35 118 54 105 180
2022/20231.302 192 220 56 112 105 311 0 106 135 4 41 20
2023/2024473 21 37 42 23 36 68 46 63 0 20 16 101
2024/20252.200 18 36 252 19 31 90 747 388 266 56 152 145
2025/202698 98 0 0 0 0 0 0 0 0 0 0 0
Totale 16.924