CICCOTELLI, CLAUDIO
 Distribuzione geografica
Continente #
NA - Nord America 1.407
EU - Europa 1.158
AS - Asia 87
SA - Sud America 4
AF - Africa 2
Totale 2.658
Nazione #
US - Stati Uniti d'America 999
CA - Canada 408
GB - Regno Unito 404
DE - Germania 396
IT - Italia 193
SE - Svezia 70
IN - India 43
FI - Finlandia 32
CN - Cina 23
NL - Olanda 21
SG - Singapore 15
RO - Romania 10
UA - Ucraina 7
BG - Bulgaria 6
FR - Francia 6
LU - Lussemburgo 6
GR - Grecia 3
IE - Irlanda 3
BR - Brasile 2
IR - Iran 2
AE - Emirati Arabi Uniti 1
AR - Argentina 1
CL - Cile 1
IL - Israele 1
MA - Marocco 1
MY - Malesia 1
PH - Filippine 1
PL - Polonia 1
TG - Togo 1
Totale 2.658
Città #
Munich 389
Montréal 376
Mcallen 360
Fairfield 93
Chandler 79
Ashburn 59
Rome 53
Woodbridge 39
Seattle 36
Cambridge 35
Wilmington 34
Ottawa 29
Houston 28
San Paolo di Civitate 21
Princeton 17
Beijing 14
Lappeenranta 13
Lawrence 12
New York 12
Helsinki 11
Dronten 10
Ann Arbor 9
Milan 9
San Diego 9
Millbury 8
Plano 8
Boston 7
Dearborn 7
Andover 6
Sofia 6
Southend 6
Anzio 5
Singapore 5
Norwalk 4
Redwood City 4
Washington 4
Dublin 3
Pastorano 3
Pullman 3
San Mateo 3
San Paolo 3
San Vito Di Leguzzano 3
Toronto 3
Bari 2
Campagna 2
Eboli 2
Jacksonville 2
Jinan 2
La Spezia 2
Leawood 2
Meppel 2
Nanjing 2
Sabaudia 2
San Nicola la Strada 2
Thessaloniki 2
Abu Dhabi 1
Bournemouth 1
Bremen 1
Buffalo 1
Bühl 1
Casalbordino 1
Chiswick 1
Città Sant'Angelo 1
Deventer 1
Federal 1
Frankfurt am Main 1
Fuzhou 1
Garbagnate Milanese 1
Grassano 1
Hebei 1
Indiana 1
Jönköping 1
Kilburn 1
Krakow 1
La Loggia 1
Las Vegas 1
Lomé 1
London 1
Luxembourg 1
Mantova 1
Murfreesboro 1
Nanchang 1
Napoli 1
Nepi 1
Pars 1
Perugia 1
Phoenix 1
Quartu Sant'elena 1
Rio de Janeiro 1
San Benedetto del Tronto 1
Sapezal 1
Shaoxing 1
Sucat 1
Yellow Springs 1
Zanjan 1
Ziano Piacentino 1
Totale 1.903
Nome #
2013 Italian Cyber Security Report. Critical Infrastructure and Other Sensitive Sectors Readiness. 1.587
Toward a Context-Aware Methodology for Information Security Governance Assessment Validation 104
Cyber-attacks and threats for healthcare - A multi-layer thread analysis 96
Automatic Invariant Selection for Online Anomaly Detection 90
Android malware family classification based on resource consumption over time 82
Towards a non-intrusive recognition of anomalous system behavior in data centers 82
Towards the usage of invariant-based app behavioral fingerprinting for the detection of obfuscated versions of known malware 81
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection 76
AndroDFA: Android Malware Classification Based on Resource Consumption 74
Peel the Onion: Recognition of Android Apps Behind the Tor Network 71
FADa-CPS—Faults and Attacks Discrimination in Cyber Physical Systems 67
Italian National Framework for Cybersecurity and Data Protection 60
Peel the onion: Recognition of Android apps behind the Tor Network 55
Emerging and Established Trends to Support Secure Health Information Exchange 54
B-CoC: A blockchain-based chain of custody for evidences management in digital forensics 52
The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation 46
Big data in critical infrastructures security monitoring: challenges and opportunities 28
Totale 2.705
Categoria #
all - tutte 4.297
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 4.297


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019171 0 0 0 0 0 0 0 0 0 0 86 85
2019/2020816 67 52 36 60 66 72 89 67 78 83 77 69
2020/2021275 57 66 35 18 6 8 0 12 20 18 18 17
2021/2022281 1 10 20 36 33 26 6 24 12 13 67 33
2022/2023299 44 69 16 20 27 31 12 20 35 5 13 7
2023/2024121 3 13 8 6 18 28 2 17 0 26 0 0
Totale 2.705