MANCINI, Luigi Vincenzo
 Distribuzione geografica
Continente #
NA - Nord America 5.894
EU - Europa 1.869
AS - Asia 661
SA - Sud America 45
AF - Africa 21
OC - Oceania 16
Totale 8.506
Nazione #
US - Stati Uniti d'America 5.855
IT - Italia 1.071
SE - Svezia 248
IN - India 238
CN - Cina 233
SG - Singapore 161
UA - Ucraina 153
FI - Finlandia 108
GB - Regno Unito 68
DE - Germania 40
CA - Canada 33
AR - Argentina 31
RO - Romania 31
FR - Francia 30
IE - Irlanda 26
AU - Australia 16
BE - Belgio 16
BR - Brasile 13
CH - Svizzera 13
BG - Bulgaria 12
ES - Italia 11
NL - Olanda 9
TG - Togo 8
IR - Iran 7
ZA - Sudafrica 7
AL - Albania 6
LU - Lussemburgo 6
MX - Messico 6
TR - Turchia 6
EE - Estonia 5
DK - Danimarca 4
AT - Austria 3
HR - Croazia 3
JP - Giappone 3
NO - Norvegia 3
QA - Qatar 3
AE - Emirati Arabi Uniti 2
HK - Hong Kong 2
PK - Pakistan 2
SD - Sudan 2
CI - Costa d'Avorio 1
CO - Colombia 1
CZ - Repubblica Ceca 1
GR - Grecia 1
HU - Ungheria 1
IL - Israele 1
JO - Giordania 1
KE - Kenya 1
KR - Corea 1
SA - Arabia Saudita 1
TN - Tunisia 1
UG - Uganda 1
Totale 8.506
Città #
Fairfield 940
Seattle 468
Chandler 455
Woodbridge 454
Ashburn 427
Houston 400
Wilmington 346
Rome 310
Cambridge 288
Ann Arbor 207
Beijing 206
New York 139
Princeton 131
San Paolo di Civitate 122
Plano 103
Singapore 86
Lawrence 79
Boston 73
Millbury 60
Jacksonville 59
San Diego 57
Corbetta 42
Milan 32
Andover 31
Federal 31
Mountain View 30
Des Moines 28
Bari 23
Boardman 23
Southend 23
Norwalk 22
Naples 21
Toronto 20
Dublin 19
Boydton 18
Falls Church 18
Stockholm 16
Fairfax 15
Brussels 14
Padova 14
Florence 12
Mannheim 12
Ottawa 12
Bengaluru 11
Bühl 10
Palermo 10
San Mateo 10
Turin 10
Indiana 9
Bilbao 8
João Pessoa 8
Lomé 8
Dearborn 7
Muizenberg 7
Ravenna 7
Sofia 7
Adelaide 6
Buffalo 6
Helsinki 6
Los Angeles 6
Redwood City 6
Salerno 6
Vicenza 6
Vienna 6
Bologna 5
Chieti 5
Istanbul 5
Yellow Springs 5
Anzio 4
Brisbane 4
Campobasso 4
Castelnuovo Magra 4
Chennai 4
Lappeenranta 4
London 4
Modena 4
Nanjing 4
Pars 4
Philadelphia 4
Portici 4
Redmond 4
Zurich 4
Ariccia 3
Belpasso 3
Bern 3
Castel Di Sangro 3
Catania 3
Chaoyang 3
Cividale del Friuli 3
Comiziano 3
Genoa 3
Genova 3
Germantown 3
Kolkata 3
Latina 3
Licata 3
Livorno 3
Melbourne 3
Napoli 3
Pazin 3
Totale 6.176
Nome #
Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici 506
AHEAD: A new architecture for active defense 149
The future of Cybersecurity in Italy: Strategic focus area 140
FedUp! cloud federation as a service 127
No place to hide that bytes won’t reveal: sniffing location-based encrypted traffic to track a user’s position 127
Increasing processor utilization in hard-real-time systems with checkpoints 119
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes 107
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone 102
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks 102
Obfuscation of Sensitive Data for Incremental Release of Network Flows 100
REMUS: a security-enhanced operating system 96
Violating consumer anonymity: geo-locating nodes in Named Data Networking 93
A Novel Stealthy Attack to Gather SDN Configuration-Information 92
Addressing interoperability issues in access control models 90
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 90
Advanced transaction processing in multilevel secure file store 87
CriSEs: Cybersecurity for small-Satellite ecosystem - state-of-the-art and open challenge 87
ASEP: A secure and flexible commit protocol for MLS distributed database systems 85
Redoubtable Sensor Networks 85
Unassailable sensor networks 85
Catch me (If you can): Data survival in unattended sensor networks 85
Distributed Detection of Clone Attacks in Wireless Sensor Networks 84
Analyzing Android Encrypted Network Traffic to Identify User Actions 84
Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks 81
Data Security in Unattended Wireless Sensor Networks 81
Boten ELISA: A novel approach for botnet CandC in Online Social Networks 80
A Graph based formalism for RBAC 78
Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets 78
Conflict Detection and Resolution in Access Control Policy Specifications 77
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks 77
Evasion attacks against watermarking techniques found in MLaaS systems 77
Secure topology maintenance and events collection in WSNs 76
BaRT, Balanced Randomized Tree: A Scalable and Distributed Protocol for Lookup in Peer-to-Peer Networks 76
Key management for high bandwidth secure multicast 75
Distributed data source verification in wireless sensor networks 75
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems 75
Administrative Scope in the Graph-based Framework 74
A robust watermarking system based on SVD compression 73
DDoS detection with information theory metrics and netflows: A real case 73
Securing Topology Maintenance Protocols for Sensor Networks 72
Robust RSA distributed signatures for large-scale long-lived ad hoc networks 72
Operating system enhancements to prevent the misuse of system calls 72
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements 71
Hierarchies of keys in secure multicast communications 70
Scalable and efficient provable data possession 70
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers 70
A Host Intrusion Prevention System for Windows Operating Systems 69
Obfuscation of sensitive data in network flows 69
Multi-covert channel attack in the cloud 69
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques 69
On the Specification and Evolution of Access Control Policies 68
Mobility and cooperation to thwart node capture attacks in MANETs 68
Towards threat-adaptive dynamic fragment replication in large scale distributed systems 68
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture 68
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks 67
Preserving privacy against external and internal threats in WSN data aggregation 67
Addressing the shortcomings of one-way chains 66
FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronisation 66
Replication schemes in Unattended Wireless Sensor Networks 66
RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy 66
Reverse tree-based key routing: Robust data aggregation in wireless sensor networks 65
Relieve internet routing security of public key infrastructure 64
Intrusion Detection Systems 64
Two implementation relations and the correctness of communicating replicated processes 64
Random key-assignment for secure wireless sensor networks 64
SOF on trial. the technical and legal value of battlefield digital forensics in court 64
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks 62
Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment 61
Towards a Formal Model for Security Policies Specification and Validation in the SELinux system 61
Connectivity properties of secure wireless sensor networks 61
eRIPP-FS: Enforcing privacy and security in RFID 61
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis 61
Sensor networks that are provably resilient 61
A formal Model for Role-Based Access Control using Graph Transformations 60
Privacy-preserving robust data aggregation in wireless sensor networks 60
Secure selective exclusion in ad hoc wireless network 60
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks 60
Efficient and Adaptive Threshold Signatures for Ad hoc networks 59
A live digital forensic system for windows networks 59
A TECHNIQUE FOR SUBCLASSING AND ITS IMPLEMENTATION EXPLOITING POLYMORPHIC PROCEDURES 58
Requirements and open issues in distributed detection of node identity replicas in WSN 58
Scheduling hard-real-time tasks with backup phasing delay 58
Know your enemy: Stealth configuration-information gathering in SDN 58
A reliable key authentication schema for secure multicast communications 57
A time driven methodology for key dimensioning in multicast communications 57
EnCoD: Distinguishing Compressed and Encrypted File Fragments 57
Formal Specification for Fast Automatic IDS Training 55
Collecting garbage in multilevel secure object stores 55
Securing Topology Maintainance Protocols for Sensor Network: Attacks and Countermeasures 55
Decidability of Safety in Graph-based Models for Access Control 55
Providing secrecy in key management protocols for large wireless sensors networks 54
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks 53
SARA: Secure Asynchronous Remote Attestation for IoT systems 53
RADIS: remote attestation of distributed IoT services 52
The duality of fault-tolerant system structures 51
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks 51
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks 51
Remote attestation as a service for IoT 50
Graph-based specification of access control policies 49
Security and Privacy Issues of Handheld/Wearable Wireless Devices 49
Totale 7.698
Categoria #
all - tutte 23.447
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 101
selected - selezionate 0
volume - volumi 0
Totale 23.548


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.738 0 56 57 87 169 160 203 206 195 377 134 94
2020/2021798 54 128 35 37 16 26 11 183 146 97 51 14
2021/20221.702 34 84 152 33 202 68 43 134 132 97 441 282
2022/20231.564 246 314 72 182 172 146 26 86 182 41 67 30
2023/20241.065 49 130 55 97 102 183 47 93 25 101 92 91
2024/2025116 84 32 0 0 0 0 0 0 0 0 0 0
Totale 8.732