MANCINI, Luigi Vincenzo
 Distribuzione geografica
Continente #
NA - Nord America 5.884
EU - Europa 1.775
AS - Asia 565
SA - Sud America 45
AF - Africa 21
OC - Oceania 12
Totale 8.302
Nazione #
US - Stati Uniti d'America 5.845
IT - Italia 1.004
IN - India 238
SE - Svezia 233
CN - Cina 230
UA - Ucraina 153
FI - Finlandia 108
SG - Singapore 70
GB - Regno Unito 67
CA - Canada 33
DE - Germania 32
AR - Argentina 31
RO - Romania 31
FR - Francia 30
IE - Irlanda 26
BE - Belgio 16
BR - Brasile 13
CH - Svizzera 13
AU - Australia 12
BG - Bulgaria 12
ES - Italia 11
NL - Olanda 8
TG - Togo 8
IR - Iran 7
ZA - Sudafrica 7
AL - Albania 6
LU - Lussemburgo 6
MX - Messico 6
TR - Turchia 6
DK - Danimarca 4
AT - Austria 3
EE - Estonia 3
HR - Croazia 3
NO - Norvegia 3
QA - Qatar 3
AE - Emirati Arabi Uniti 2
JP - Giappone 2
PK - Pakistan 2
SD - Sudan 2
CI - Costa d'Avorio 1
CO - Colombia 1
CZ - Repubblica Ceca 1
GR - Grecia 1
HK - Hong Kong 1
HU - Ungheria 1
IL - Israele 1
JO - Giordania 1
KE - Kenya 1
KR - Corea 1
SA - Arabia Saudita 1
TN - Tunisia 1
UG - Uganda 1
Totale 8.302
Città #
Fairfield 940
Seattle 468
Chandler 455
Woodbridge 454
Ashburn 427
Houston 400
Wilmington 346
Rome 295
Cambridge 288
Ann Arbor 207
Beijing 206
New York 139
Princeton 131
San Paolo di Civitate 122
Plano 103
Lawrence 79
Boston 73
Millbury 60
Jacksonville 59
San Diego 57
Corbetta 42
Andover 31
Federal 31
Singapore 30
Des Moines 28
Mountain View 28
Milan 25
Boardman 23
Southend 23
Bari 22
Norwalk 22
Naples 20
Toronto 20
Dublin 19
Boydton 18
Falls Church 18
Fairfax 15
Brussels 14
Padova 13
Ottawa 12
Bengaluru 11
Florence 11
Bühl 10
San Mateo 10
Indiana 9
Bilbao 8
João Pessoa 8
Lomé 8
Dearborn 7
Mannheim 7
Muizenberg 7
Ravenna 7
Sofia 7
Buffalo 6
Helsinki 6
Los Angeles 6
Palermo 6
Redwood City 6
Salerno 6
Turin 6
Vicenza 6
Vienna 6
Bologna 5
Istanbul 5
Yellow Springs 5
Adelaide 4
Anzio 4
Brisbane 4
Campobasso 4
Castelnuovo Magra 4
Chennai 4
Lappeenranta 4
London 4
Modena 4
Nanjing 4
Pars 4
Philadelphia 4
Portici 4
Redmond 4
Zurich 4
Ariccia 3
Belpasso 3
Bern 3
Castel Di Sangro 3
Catania 3
Chaoyang 3
Cividale del Friuli 3
Comiziano 3
Genova 3
Germantown 3
Kolkata 3
Licata 3
Livorno 3
Napoli 3
Pazin 3
Pistoia 3
Sassari 3
Soriano nel Cimino 3
Tallinn 3
Taranto 3
Totale 6.062
Nome #
Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici 458
AHEAD: A new architecture for active defense 149
The future of Cybersecurity in Italy: Strategic focus area 132
FedUp! cloud federation as a service 126
No place to hide that bytes won’t reveal: sniffing location-based encrypted traffic to track a user’s position 126
Increasing processor utilization in hard-real-time systems with checkpoints 116
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes 103
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone 101
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks 100
Obfuscation of Sensitive Data for Incremental Release of Network Flows 99
Violating consumer anonymity: geo-locating nodes in Named Data Networking 92
REMUS: a security-enhanced operating system 92
A Novel Stealthy Attack to Gather SDN Configuration-Information 91
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 89
Addressing interoperability issues in access control models 88
Advanced transaction processing in multilevel secure file store 86
CriSEs: Cybersecurity for small-Satellite ecosystem - state-of-the-art and open challenge 86
ASEP: A secure and flexible commit protocol for MLS distributed database systems 85
Unassailable sensor networks 85
Catch me (If you can): Data survival in unattended sensor networks 84
Distributed Detection of Clone Attacks in Wireless Sensor Networks 83
Redoubtable Sensor Networks 83
Analyzing Android Encrypted Network Traffic to Identify User Actions 83
Data Security in Unattended Wireless Sensor Networks 81
Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks 80
Boten ELISA: A novel approach for botnet CandC in Online Social Networks 79
Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets 77
Evasion attacks against watermarking techniques found in MLaaS systems 77
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks 76
A Graph based formalism for RBAC 76
BaRT, Balanced Randomized Tree: A Scalable and Distributed Protocol for Lookup in Peer-to-Peer Networks 76
Conflict Detection and Resolution in Access Control Policy Specifications 75
Key management for high bandwidth secure multicast 75
Secure topology maintenance and events collection in WSNs 75
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems 75
Distributed data source verification in wireless sensor networks 74
Administrative Scope in the Graph-based Framework 73
A robust watermarking system based on SVD compression 72
Robust RSA distributed signatures for large-scale long-lived ad hoc networks 72
Operating system enhancements to prevent the misuse of system calls 72
Securing Topology Maintenance Protocols for Sensor Networks 71
DDoS detection with information theory metrics and netflows: A real case 71
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements 71
Hierarchies of keys in secure multicast communications 70
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers 69
Scalable and efficient provable data possession 68
A Host Intrusion Prevention System for Windows Operating Systems 68
Obfuscation of sensitive data in network flows 68
Multi-covert channel attack in the cloud 68
On the Specification and Evolution of Access Control Policies 67
Preserving privacy against external and internal threats in WSN data aggregation 67
Mobility and cooperation to thwart node capture attacks in MANETs 67
Towards threat-adaptive dynamic fragment replication in large scale distributed systems 67
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks 66
FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronisation 65
Replication schemes in Unattended Wireless Sensor Networks 65
Reverse tree-based key routing: Robust data aggregation in wireless sensor networks 65
Addressing the shortcomings of one-way chains 64
Relieve internet routing security of public key infrastructure 64
RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy 64
Random key-assignment for secure wireless sensor networks 64
SOF on trial. the technical and legal value of battlefield digital forensics in court 64
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques 64
Intrusion Detection Systems 63
Two implementation relations and the correctness of communicating replicated processes 63
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture 63
Connectivity properties of secure wireless sensor networks 61
eRIPP-FS: Enforcing privacy and security in RFID 61
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis 61
Sensor networks that are provably resilient 61
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks 61
Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment 60
Towards a Formal Model for Security Policies Specification and Validation in the SELinux system 60
Privacy-preserving robust data aggregation in wireless sensor networks 60
Secure selective exclusion in ad hoc wireless network 59
Efficient and Adaptive Threshold Signatures for Ad hoc networks 59
A live digital forensic system for windows networks 59
A formal Model for Role-Based Access Control using Graph Transformations 58
Requirements and open issues in distributed detection of node identity replicas in WSN 58
Scheduling hard-real-time tasks with backup phasing delay 58
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks 58
A TECHNIQUE FOR SUBCLASSING AND ITS IMPLEMENTATION EXPLOITING POLYMORPHIC PROCEDURES 57
Know your enemy: Stealth configuration-information gathering in SDN 57
A reliable key authentication schema for secure multicast communications 56
A time driven methodology for key dimensioning in multicast communications 56
EnCoD: Distinguishing Compressed and Encrypted File Fragments 56
Decidability of Safety in Graph-based Models for Access Control 55
Providing secrecy in key management protocols for large wireless sensors networks 54
Formal Specification for Fast Automatic IDS Training 54
Securing Topology Maintainance Protocols for Sensor Network: Attacks and Countermeasures 54
Collecting garbage in multilevel secure object stores 53
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks 53
SARA: Secure Asynchronous Remote Attestation for IoT systems 52
RADIS: remote attestation of distributed IoT services 51
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks 51
The duality of fault-tolerant system structures 50
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks 50
Security and Privacy Issues of Handheld/Wearable Wireless Devices 48
Remote attestation as a service for IoT 48
Connectivity properties of secure sensor networks 47
Totale 7.544
Categoria #
all - tutte 21.578
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 91
selected - selezionate 0
volume - volumi 0
Totale 21.669


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019280 0 0 0 0 0 0 0 0 0 0 0 280
2019/20201.957 219 56 57 87 169 160 203 206 195 377 134 94
2020/2021798 54 128 35 37 16 26 11 183 146 97 51 14
2021/20221.702 34 84 152 33 202 68 43 134 132 97 441 282
2022/20231.564 246 314 72 182 172 146 26 86 182 41 67 30
2023/2024977 49 130 55 97 102 183 47 93 25 101 92 3
Totale 8.528