DI PIETRO, ROBERTO
 Distribuzione geografica
Continente #
NA - Nord America 9.946
EU - Europa 5.125
AS - Asia 4.642
SA - Sud America 846
AF - Africa 72
OC - Oceania 12
Continente sconosciuto - Info sul continente non disponibili 4
Totale 20.647
Nazione #
US - Stati Uniti d'America 9.871
CN - Cina 2.183
GB - Regno Unito 1.660
SG - Singapore 1.339
RU - Federazione Russa 1.298
BR - Brasile 685
VN - Vietnam 625
UA - Ucraina 573
DE - Germania 417
SE - Svezia 380
IT - Italia 235
FI - Finlandia 162
AL - Albania 140
IE - Irlanda 133
TR - Turchia 83
HK - Hong Kong 69
IN - India 65
AR - Argentina 60
BD - Bangladesh 45
CA - Canada 37
ID - Indonesia 35
KR - Corea 35
FR - Francia 34
IQ - Iraq 32
NL - Olanda 31
EC - Ecuador 29
ZA - Sudafrica 26
CO - Colombia 21
MA - Marocco 19
PL - Polonia 19
VE - Venezuela 19
MX - Messico 18
PK - Pakistan 17
SA - Arabia Saudita 16
JP - Giappone 13
AU - Australia 11
CL - Cile 11
KZ - Kazakistan 10
MY - Malesia 10
TN - Tunisia 10
PY - Paraguay 9
JO - Giordania 8
UZ - Uzbekistan 8
GR - Grecia 7
PH - Filippine 7
ES - Italia 6
KE - Kenya 6
BO - Bolivia 5
IL - Israele 5
LB - Libano 5
AZ - Azerbaigian 4
BE - Belgio 4
EU - Europa 4
PA - Panama 4
UY - Uruguay 4
AE - Emirati Arabi Uniti 3
AT - Austria 3
BY - Bielorussia 3
HR - Croazia 3
HU - Ungheria 3
NI - Nicaragua 3
OM - Oman 3
QA - Qatar 3
SY - Repubblica araba siriana 3
BG - Bulgaria 2
CH - Svizzera 2
CZ - Repubblica Ceca 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
EG - Egitto 2
GT - Guatemala 2
IR - Iran 2
JM - Giamaica 2
KG - Kirghizistan 2
LT - Lituania 2
MN - Mongolia 2
NP - Nepal 2
PE - Perù 2
RO - Romania 2
SV - El Salvador 2
BB - Barbados 1
BM - Bermuda 1
CR - Costa Rica 1
DK - Danimarca 1
ET - Etiopia 1
HN - Honduras 1
KW - Kuwait 1
LA - Repubblica Popolare Democratica del Laos 1
LK - Sri Lanka 1
ML - Mali 1
MM - Myanmar 1
MR - Mauritania 1
MU - Mauritius 1
NG - Nigeria 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
PS - Palestinian Territory 1
RS - Serbia 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
Totale 20.641
Città #
Woodbridge 1.731
Southend 1.488
Fairfield 1.383
Houston 826
Ashburn 748
Singapore 601
Seattle 566
Wilmington 469
Cambridge 467
Nanjing 434
Ann Arbor 404
Chandler 399
Jacksonville 349
Dearborn 326
San Jose 277
Beijing 275
Princeton 271
Boardman 254
Dong Ket 176
Nanchang 165
Dallas 160
Hefei 153
Ho Chi Minh City 150
Shenyang 137
Dublin 133
Hebei 101
Hanoi 97
Redwood City 93
Tianjin 91
Changsha 88
Jiaxing 68
Jinan 67
Altamura 65
Izmir 65
Hong Kong 59
Moscow 57
São Paulo 55
San Diego 54
Zhengzhou 50
Los Angeles 47
Hangzhou 43
Shanghai 43
San Paolo di Civitate 41
Kunming 39
Ningbo 37
Orange 36
Plano 34
Seoul 34
The Dalles 34
London 33
New York 31
Guangzhou 29
Rome 28
Da Nang 23
Rio de Janeiro 22
Council Bluffs 17
Chicago 16
Haiphong 16
Brasília 14
Helsinki 14
Taizhou 14
Washington 14
Baghdad 13
Bari 13
Changchun 13
Renton 13
Santa Clara 13
Venezia 13
Brooklyn 12
Guayaquil 12
Ottawa 12
Tokyo 12
Warsaw 12
Belo Horizonte 11
Biên Hòa 11
Curitiba 11
Guarulhos 11
Salvador 11
Alameda 10
Atlanta 10
Bắc Ninh 10
Fort Worth 10
Garbsen 10
Johannesburg 10
Milan 10
Quito 10
San Francisco 10
Yubileyny 10
Flushing 9
Hải Dương 9
Lanzhou 9
Lappeenranta 9
Montreal 9
Mountain View 9
Thái Nguyên 9
Chennai 8
Dhaka 8
Eitensheim 8
Haikou 8
Hounslow 8
Totale 14.407
Nome #
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems 253
A new role mining framework to elicit business roles and to mitigate enterprise risk 230
A Business-Driven Decomposition Methodology for Role Mining 226
Epidemic Theory and Data Survivability in Unattended Wireless Sensor Networks: Models and Gaps. 226
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection 225
A mechanism to enforce privacy in vehicle-to-infrastructure communication 222
Titans' revenge: Detecting Zeus via its own flaws 215
Addressing the Shortcomings of One-Way Chains 214
Secure Virtualization for Cloud Computing 211
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks 208
A formal framework to elicit roles with business meaning in RBAC systems 207
A formal framework for the performance analysis of P2P networks protocols 203
A Probabilistic Bound on the Basic Role Mining Problem and its Applications 201
A Cost-Driven Approach to Role Engineering 201
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets 201
A methodology for P2P file-sharing traffic detection 196
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions 194
ROLE MINING IN BUSINESS (Taming Role-Based Access Control Administration) 194
A Security Management Architecture for the protection of Kernel Virtual Machines 193
Military secure communications over public cellular network infrastructure 190
“Who counterfeited my Viagra?” Probabilistic item removal detection via RFID tag cooperation 189
Secure topology maintenance and events collection in WSNs 189
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 188
Preserving privacy against external and internal threats in WSN data aggregation 187
Intrusion Detection Systems 187
Key Management for High Bandwidth Secure Multicast 186
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems 186
Information Assurance in Critical Infrastructures via Wireless Sensor Networks 186
Windows Mobile LiveSD Forensics 185
Optimal key scheduling for secure satellite broadcasting to mobile users 185
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN 184
Transparent Security for Cloud 176
Collaborative Authentication in Unattended WSNs 176
COKE: Crypto-less Over-the-air Key Establishment 175
A methodology for computer forensic analysis 175
Hierarchies of Keys in Secure Multicast Communications 172
Boosting Efficiency and Security in Proof of Ownership for Deduplication. 172
Cross-border Co-operation and Education in Digital Investigations: an European Perspective 170
Intrusion-Resilient Integrity in Data-Centric Unattended WSNs. 170
Location privacy and resilience in wireless sensor networks querying 168
Visual Role Mining: A Picture Is Worth a Thousand Roles. 168
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks 168
A model with applications for data survivability in Critical Infrastructures 167
Efficient and Adaptive Threshold Signatures for Adhoc networks 167
Taming Role Mining Complexity in RBAC 167
Secure k-Connectivity Properties of Wireless Sensor Networks 166
eRIPP-FS: Enforcing Privacy and Security in RFID 166
Data Security in Unattended Wireless Sensor Networks 165
Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring 165
Towards threat-adaptive dynamic fragment replication in large scale distributed systems 163
Redoubtable Sensor Networks 163
Wireless Sensor Replica Detection in Mobile Environments 160
Scalable and Efficient Provable Data Possession 159
Secure selective exclusion in ad hoc wireless network 159
Catch Me (If You Can): Data Survival in Unattended Sensor Networks 159
A Live Digital Forensic system for Windows network 158
Maximizing service availability for secure satellite broadcasting 157
CONCISE: Compressed 'n' Composable Integer Set 156
CUDACS: Securing the Cloud with CUDA-enabled Secure Virtualization 156
Time in privacy preserving LBSs: an overlooked dimension 156
CloRExPa: Cloud Resilience via Execution Path Analysis 155
Authentication 155
Sensor Networks that Are Provably Resilient 155
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization 153
EXPEDITE: EXPress closED ITemset Enumeration 153
Broadcast Authentication for resource constrained devices: a major pitfall and some solutions 152
A time driven methodology for keys dimensioning in secure multicast communications 152
Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks 152
Event Handoff Unobservability in WSN 152
BaRT, Balanced Randomized Tree: A scalable and distributed protocol for look-up in peer-to-peer networks 151
PRISM—Privacy-Preserving Search in MapReduce. 150
United We Stand: Intrusion-Resilience in Mobile Unattended WSNs 148
CED2: Communication Efficient Disjointness Decision 147
Formal specification for fast automatic IDS training 146
Preserving Query Privacy in Urban Sensing Systems 145
Short paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy 145
Random Key Assignment for Secure Wireless Sensor Networks 145
Distributed Data Source Verification in Wireless Sensor Networks 144
Evaluating the Risk of Adopting RBAC Roles 144
Data Confidentiality and Availability via Secret Sharing and Node Mobility in UWSN 143
Un nuovo meccanismo per l’autenticazione dei dati basato su funzioni camaleontiche 143
Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks 143
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks 142
Events Privacy in WSNs: a New Model and its Application 142
Efficient and secure keys management for wireless mobile communications 142
Taming Zeus leveraging its own crypto internals 142
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation 142
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System 141
A reliable key authentication scheme for secure multicast communications 140
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy 140
Intrusion-Resilience in Mobile Unattended WSNs 138
Efficient and Adaptive Threshold Signatures for Adhoc networks. 137
Dependable and Secure Data Storage in Wireless Ad Hoc Networks: an Assessment of DS2 136
Providing secrecy in key management protocols for large wireless sensors networks 135
Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques 135
Computationally, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast 133
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs 133
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks 133
ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in WSN 132
Time Warp: how time affects privacy in LBSs 131
Totale 16.808
Categoria #
all - tutte 69.795
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 69.795


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021532 0 0 0 0 0 0 0 0 0 199 55 278
2021/20221.251 42 297 6 6 288 35 85 35 118 54 105 180
2022/20231.302 192 220 56 112 105 311 0 106 135 4 41 20
2023/2024473 21 37 42 23 36 68 46 63 0 20 16 101
2024/20252.200 18 36 252 19 31 90 747 388 266 56 152 145
2025/20263.959 322 481 347 1.016 403 275 415 81 323 296 0 0
Totale 20.785