SPOGNARDI, Angelo
 Distribuzione geografica
Continente #
NA - Nord America 3.018
EU - Europa 739
AS - Asia 211
SA - Sud America 10
AF - Africa 4
Continente sconosciuto - Info sul continente non disponibili 1
OC - Oceania 1
Totale 3.984
Nazione #
US - Stati Uniti d'America 2.991
IT - Italia 276
GR - Grecia 193
IN - India 103
CN - Cina 63
SE - Svezia 62
GB - Regno Unito 48
FI - Finlandia 41
UA - Ucraina 36
SG - Singapore 30
CA - Canada 25
BG - Bulgaria 22
DE - Germania 19
RO - Romania 12
AR - Argentina 9
NL - Olanda 9
IE - Irlanda 7
BE - Belgio 5
BD - Bangladesh 3
FR - Francia 3
LK - Sri Lanka 3
CH - Svizzera 2
HK - Hong Kong 2
JP - Giappone 2
MX - Messico 2
TG - Togo 2
TR - Turchia 2
ZA - Sudafrica 2
CL - Cile 1
ES - Italia 1
EU - Europa 1
IR - Iran 1
JO - Giordania 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
PK - Pakistan 1
PT - Portogallo 1
RU - Federazione Russa 1
Totale 3.984
Città #
Fairfield 512
Ashburn 310
Woodbridge 242
Chandler 217
Seattle 217
Houston 199
Cambridge 172
Wilmington 170
Athens 155
Rome 120
Ann Arbor 96
San Paolo di Civitate 67
New York 61
Princeton 61
Beijing 49
Millbury 47
Plano 47
Lawrence 43
San Diego 31
Southend 23
Sofia 22
Isernia 15
Andover 14
Norwalk 14
Aigaleo 13
Ottawa 13
Boston 11
Jacksonville 11
Toronto 10
Federal 9
Milan 9
Des Moines 8
Falls Church 8
Singapore 7
Dublin 6
Bloomington 5
Brussels 5
Bühl 5
Eindhoven 5
Genoa 5
Wuhan 5
Boardman 4
Buffalo 4
Los Angeles 4
Piraeus 4
Bolzano 3
Chennai 3
Freiburg 3
Grafing 3
Hatton 3
Hefei 3
Helsinki 3
London 3
Luton 3
Nabīnagar 3
Padova 3
Pune 3
Sacramento 3
San Mateo 3
Aldie 2
Auburn Hills 2
Bengaluru 2
Bern 2
Central 2
Dearborn 2
Dronten 2
Francavilla Al Mare 2
Giuliano Teatino 2
Irakleio 2
Linköping 2
Lomé 2
Mexico City 2
Modena 2
Monza 2
Phoenix 2
Pisa 2
Québec 2
Redmond 2
Santa Giusta 2
Teramo 2
Vienna 2
Aachen 1
Acton 1
Bangalore 1
Changsha 1
Dunshaughlin 1
Florence 1
Frosinone 1
Gazi 1
Guangzhou 1
Gunzenhausen 1
Hakusan Shi 1
Indiana 1
Johannesburg 1
Kilburn 1
Konya 1
Muizenberg 1
Nanjing 1
Narashino-shi 1
Paliano 1
Totale 3.160
Nome #
Analysis of DDoS-capable IoT malwares 266
A Formal Framework for the performance analysis of P2P networks protocols 118
A methodology for P2P file-sharing traffic detection 107
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone 101
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks 100
Security assessment of common open source MQTT brokers and clients 98
Maturity assessment of Wikipedia medical articles 85
Security and privacy issues in healthcare monitoring systems: a case study 84
Catch me (If you can): Data survival in unattended sensor networks 84
VISIO: a visual approach for singularity detection in recommendation systems 83
Data Security in Unattended Wireless Sensor Networks 80
Evaluation of professional cloud password management tools 79
A study on text-score disagreement in online reviews 78
DNA-inspired online behavioral modeling and its application to spambot detection 77
Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets 76
Bioinspired security analysis of wireless protocols 74
Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling 74
Exploiting digital DNA for the analysis of similarities in twitter behaviours 74
RoK: a Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks 73
Wireless sensor replica detection in mobile environments 73
Who counterfeited my viagra? Probabilistic item removal detection via RFID tag cooperation 72
A criticism to society (As seen by twitter analytics) 72
A language-based approach to modelling and analysis of Twitter interactions 72
DDoS detection with information theory metrics and netflows: A real case 71
Twitlang(er): Interactions modeling language (and Interpreter) for twitter 71
Experimental measures of news personalization in Google News 71
A lot of slots–outliers confinement in review-based systems 70
Domain-specific queries and Web search personalization: some investigations 69
A matter of words: NLP for quality evaluation of wikipedia medical articles 69
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation 69
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers 68
Visual detection of singularities in review platforms 67
FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronisation 65
Replication schemes in Unattended Wireless Sensor Networks 65
RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy 64
Relieve internet routing security of public key infrastructure 63
null 63
Intrusion-resilient integrity in data-centric unattended WSNs 61
Clone wars: Distributed detection of clone attacks in mobile WSNs 61
eRIPP-FS: Enforcing privacy and security in RFID 61
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks 61
Fame for sale: efficient detection of fake Twitter followers 60
TRAP: Using Targeted ads to unveil Google personal profiles 59
SafeDroid: a distributed malware detection service for android 59
Improved automatic maturity assessment of Wikipedia medical articles 58
Predicting online review scores across reviewer categories 57
Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications 56
Advanced Multimodal Frameworks to Support Human-Computer Interaction on Social Computing Environments 55
On the capability of evolved spambots to evade detection via genetic engineering 55
Mining implicit data association from Tripadvisor hotel reviews 44
Mind the tracker you wear - A security analysis of wearable health trackers 42
Better safe than sorry: an adversarial approach to improve social bot detection 40
From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots 39
From Online Behaviours to Images: A Novel Approach to Social Bot Detection 34
Adversarial machine learning for protecting against online manipulation 34
On the Robustness of Rating Aggregators Against Injection Attacks 32
DNA-inspired characterization and detection of novel social Twitter spambots 28
A taxonomy of distributed denial of service attacks 28
Emergent properties, models, and laws of behavioral similarities within groups of twitter users 25
Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems 15
A New Model for Testing IPv6 Fragment Handling 13
Collaborative authentication in unattended WSNs 10
Security flaws in OAuth 2.0 framework: A case study 4
Totale 4.136
Categoria #
all - tutte 9.261
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 9.261


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019371 0 0 0 0 0 0 0 0 0 0 211 160
2019/20201.021 109 31 6 44 97 88 129 114 126 151 72 54
2020/2021446 35 64 16 11 36 38 23 74 64 54 18 13
2021/2022824 1 33 89 21 69 36 20 59 49 42 283 122
2022/2023691 107 130 39 73 91 68 8 49 82 10 22 12
2023/2024457 59 43 34 74 32 103 18 25 1 67 1 0
Totale 4.136