DI PIETRO, ROBERTO
 Distribuzione geografica
Continente #
NA - Nord America 9.556
EU - Europa 5.060
AS - Asia 4.010
SA - Sud America 744
AF - Africa 47
OC - Oceania 12
Continente sconosciuto - Info sul continente non disponibili 4
Totale 19.433
Nazione #
US - Stati Uniti d'America 9.491
CN - Cina 2.127
GB - Regno Unito 1.651
RU - Federazione Russa 1.293
SG - Singapore 1.135
BR - Brasile 640
UA - Ucraina 568
VN - Vietnam 451
DE - Germania 410
SE - Svezia 378
IT - Italia 226
FI - Finlandia 155
AL - Albania 139
IE - Irlanda 133
TR - Turchia 71
AR - Argentina 48
HK - Hong Kong 45
CA - Canada 34
IN - India 34
KR - Corea 34
NL - Olanda 30
ID - Indonesia 28
ZA - Sudafrica 22
EC - Ecuador 21
FR - Francia 21
MX - Messico 18
PL - Polonia 17
BD - Bangladesh 16
IQ - Iraq 13
AU - Australia 11
MA - Marocco 10
JP - Giappone 9
CO - Colombia 8
CL - Cile 7
GR - Grecia 7
VE - Venezuela 7
ES - Italia 6
KZ - Kazakistan 6
PY - Paraguay 6
KE - Kenya 5
SA - Arabia Saudita 5
BE - Belgio 4
EU - Europa 4
AT - Austria 3
AZ - Azerbaigian 3
BO - Bolivia 3
IL - Israele 3
LB - Libano 3
PA - Panama 3
TN - Tunisia 3
UY - Uruguay 3
UZ - Uzbekistan 3
AE - Emirati Arabi Uniti 2
BG - Bulgaria 2
BY - Bielorussia 2
CH - Svizzera 2
CZ - Repubblica Ceca 2
DZ - Algeria 2
EG - Egitto 2
GT - Guatemala 2
HR - Croazia 2
HU - Ungheria 2
IR - Iran 2
JO - Giordania 2
LT - Lituania 2
OM - Oman 2
PK - Pakistan 2
QA - Qatar 2
RO - Romania 2
SV - El Salvador 2
SY - Repubblica araba siriana 2
BB - Barbados 1
DK - Danimarca 1
DO - Repubblica Dominicana 1
ET - Etiopia 1
HN - Honduras 1
JM - Giamaica 1
KG - Kirghizistan 1
KW - Kuwait 1
LA - Repubblica Popolare Democratica del Laos 1
LK - Sri Lanka 1
MN - Mongolia 1
MU - Mauritius 1
MY - Malesia 1
NI - Nicaragua 1
NO - Norvegia 1
NP - Nepal 1
NZ - Nuova Zelanda 1
PE - Perù 1
PH - Filippine 1
RS - Serbia 1
TT - Trinidad e Tobago 1
TW - Taiwan 1
YE - Yemen 1
YT - Mayotte 1
Totale 19.433
Città #
Woodbridge 1.731
Southend 1.488
Fairfield 1.383
Houston 826
Ashburn 713
Seattle 566
Singapore 473
Wilmington 469
Cambridge 467
Nanjing 434
Ann Arbor 404
Chandler 399
Jacksonville 349
Dearborn 326
Beijing 274
Princeton 271
Boardman 254
Dong Ket 176
Nanchang 165
Dallas 159
Hefei 153
Shenyang 137
Dublin 133
Hebei 101
Ho Chi Minh City 99
Redwood City 93
Tianjin 91
Changsha 88
Jiaxing 68
Jinan 67
Altamura 65
Izmir 65
Moscow 56
San Diego 54
Hanoi 52
São Paulo 52
Zhengzhou 50
Los Angeles 46
Hong Kong 45
Shanghai 43
Hangzhou 41
San Paolo di Civitate 41
Kunming 39
Ningbo 37
Orange 36
Plano 34
Seoul 34
The Dalles 34
London 33
Guangzhou 29
New York 29
Rome 24
Rio de Janeiro 19
Chicago 16
Brasília 14
Taizhou 14
Washington 14
Bari 13
Changchun 13
Renton 13
Venezia 13
Brooklyn 12
Ottawa 12
Da Nang 11
Guayaquil 11
Santa Clara 11
Alameda 10
Belo Horizonte 10
Biên Hòa 10
Curitiba 10
Fort Worth 10
Garbsen 10
Guarulhos 10
Johannesburg 10
Milan 10
Salvador 10
Warsaw 10
Yubileyny 10
Flushing 9
Haiphong 9
Lanzhou 9
Lappeenranta 9
Montreal 9
Mountain View 9
San Francisco 9
Tokyo 9
Atlanta 8
Eitensheim 8
Haikou 8
Hounslow 8
Hải Dương 8
Munich 8
Bắc Ninh 7
Chennai 7
Helsinki 7
Manaus 7
Manchester 7
Porto Alegre 7
Sorocaba 7
Verona 7
Totale 13.778
Nome #
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems 237
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection 215
A new role mining framework to elicit business roles and to mitigate enterprise risk 214
A Business-Driven Decomposition Methodology for Role Mining 212
Epidemic Theory and Data Survivability in Unattended Wireless Sensor Networks: Models and Gaps. 209
Titans' revenge: Detecting Zeus via its own flaws 205
A mechanism to enforce privacy in vehicle-to-infrastructure communication 204
Addressing the Shortcomings of One-Way Chains 202
A formal framework to elicit roles with business meaning in RBAC systems 195
A formal framework for the performance analysis of P2P networks protocols 191
A Cost-Driven Approach to Role Engineering 190
Secure Virtualization for Cloud Computing 190
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets 189
A Probabilistic Bound on the Basic Role Mining Problem and its Applications 188
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks 186
A methodology for P2P file-sharing traffic detection 184
ROLE MINING IN BUSINESS (Taming Role-Based Access Control Administration) 183
Intrusion Detection Systems 182
A Security Management Architecture for the protection of Kernel Virtual Machines 182
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN 181
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions 180
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 179
Information Assurance in Critical Infrastructures via Wireless Sensor Networks 178
Optimal key scheduling for secure satellite broadcasting to mobile users 178
“Who counterfeited my Viagra?” Probabilistic item removal detection via RFID tag cooperation 177
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems 176
Military secure communications over public cellular network infrastructure 176
Key Management for High Bandwidth Secure Multicast 174
Windows Mobile LiveSD Forensics 172
Secure topology maintenance and events collection in WSNs 172
Preserving privacy against external and internal threats in WSN data aggregation 171
Transparent Security for Cloud 171
Collaborative Authentication in Unattended WSNs 170
COKE: Crypto-less Over-the-air Key Establishment 167
Intrusion-Resilient Integrity in Data-Centric Unattended WSNs. 163
Hierarchies of Keys in Secure Multicast Communications 161
A methodology for computer forensic analysis 161
A model with applications for data survivability in Critical Infrastructures 159
Towards threat-adaptive dynamic fragment replication in large scale distributed systems 159
Secure k-Connectivity Properties of Wireless Sensor Networks 159
Boosting Efficiency and Security in Proof of Ownership for Deduplication. 159
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks 159
Efficient and Adaptive Threshold Signatures for Adhoc networks 158
Data Security in Unattended Wireless Sensor Networks 158
Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring 158
eRIPP-FS: Enforcing Privacy and Security in RFID 157
Redoubtable Sensor Networks 157
Visual Role Mining: A Picture Is Worth a Thousand Roles. 156
Cross-border Co-operation and Education in Digital Investigations: an European Perspective 156
Taming Role Mining Complexity in RBAC 154
Location privacy and resilience in wireless sensor networks querying 152
Secure selective exclusion in ad hoc wireless network 152
Sensor Networks that Are Provably Resilient 152
Catch Me (If You Can): Data Survival in Unattended Sensor Networks 152
Maximizing service availability for secure satellite broadcasting 151
Scalable and Efficient Provable Data Possession 150
EXPEDITE: EXPress closED ITemset Enumeration 150
CUDACS: Securing the Cloud with CUDA-enabled Secure Virtualization 149
Time in privacy preserving LBSs: an overlooked dimension 149
Wireless Sensor Replica Detection in Mobile Environments 149
Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks 148
Authentication 147
CONCISE: Compressed 'n' Composable Integer Set 146
CloRExPa: Cloud Resilience via Execution Path Analysis 145
Broadcast Authentication for resource constrained devices: a major pitfall and some solutions 145
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization 145
Event Handoff Unobservability in WSN 145
Random Key Assignment for Secure Wireless Sensor Networks 142
A Live Digital Forensic system for Windows network 142
A time driven methodology for keys dimensioning in secure multicast communications 141
Distributed Data Source Verification in Wireless Sensor Networks 140
PRISM—Privacy-Preserving Search in MapReduce. 140
Preserving Query Privacy in Urban Sensing Systems 140
Formal specification for fast automatic IDS training 139
BaRT, Balanced Randomized Tree: A scalable and distributed protocol for look-up in peer-to-peer networks 139
Data Confidentiality and Availability via Secret Sharing and Node Mobility in UWSN 138
Evaluating the Risk of Adopting RBAC Roles 138
United We Stand: Intrusion-Resilience in Mobile Unattended WSNs 138
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks 137
Short paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy 137
CED2: Communication Efficient Disjointness Decision 137
Un nuovo meccanismo per l’autenticazione dei dati basato su funzioni camaleontiche 136
Efficient and secure keys management for wireless mobile communications 136
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation 135
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy 134
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System 134
Taming Zeus leveraging its own crypto internals 134
Efficient and Adaptive Threshold Signatures for Adhoc networks. 133
Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks 133
Dependable and Secure Data Storage in Wireless Ad Hoc Networks: an Assessment of DS2 131
Intrusion-Resilience in Mobile Unattended WSNs 129
Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques 129
A reliable key authentication scheme for secure multicast communications 128
Computationally, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast 127
Providing secrecy in key management protocols for large wireless sensors networks 127
Events Privacy in WSNs: a New Model and its Application 126
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks 126
Time Warp: how time affects privacy in LBSs 125
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs 124
ABBA: Adaptive Bicluster-Based Approach to Impute Missing Values in Binary Matrices 124
Totale 15.860
Categoria #
all - tutte 66.869
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 66.869


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.343 0 0 0 0 0 136 333 281 61 199 55 278
2021/20221.251 42 297 6 6 288 35 85 35 118 54 105 180
2022/20231.302 192 220 56 112 105 311 0 106 135 4 41 20
2023/2024473 21 37 42 23 36 68 46 63 0 20 16 101
2024/20252.200 18 36 252 19 31 90 747 388 266 56 152 145
2025/20262.745 322 481 347 1.016 403 176 0 0 0 0 0 0
Totale 19.571