COLAJANNI, Michele
 Distribuzione geografica
Continente #
NA - Nord America 26.020
AS - Asia 14.022
EU - Europa 10.952
SA - Sud America 1.735
AF - Africa 305
OC - Oceania 91
Continente sconosciuto - Info sul continente non disponibili 23
Totale 53.148
Nazione #
US - Stati Uniti d'America 25.599
SG - Singapore 4.142
CN - Cina 3.939
GB - Regno Unito 3.622
HK - Hong Kong 2.523
DE - Germania 1.883
IT - Italia 1.443
BR - Brasile 1.307
VN - Vietnam 1.198
SE - Svezia 1.038
UA - Ucraina 558
FR - Francia 534
RU - Federazione Russa 528
KR - Corea 501
FI - Finlandia 491
TR - Turchia 360
IN - India 280
CA - Canada 251
BG - Bulgaria 224
ID - Indonesia 159
BD - Bangladesh 135
AR - Argentina 132
JP - Giappone 114
NL - Olanda 113
IQ - Iraq 101
MX - Messico 96
ZA - Sudafrica 91
AU - Australia 88
IR - Iran 88
ES - Italia 77
PK - Pakistan 71
BE - Belgio 68
CO - Colombia 63
EC - Ecuador 63
SA - Arabia Saudita 59
PL - Polonia 51
MA - Marocco 47
CL - Cile 44
AT - Austria 43
TW - Taiwan 43
RO - Romania 42
VE - Venezuela 40
AE - Emirati Arabi Uniti 39
MY - Malesia 38
IE - Irlanda 35
LT - Lituania 35
PH - Filippine 34
EG - Egitto 32
KE - Kenya 30
PE - Perù 28
TN - Tunisia 25
UZ - Uzbekistan 23
DZ - Algeria 22
AZ - Azerbaigian 21
PY - Paraguay 21
BO - Bolivia 20
JO - Giordania 20
EU - Europa 17
GR - Grecia 17
NP - Nepal 17
TH - Thailandia 17
AL - Albania 16
CH - Svizzera 15
NO - Norvegia 15
ET - Etiopia 14
IL - Israele 14
UY - Uruguay 14
PA - Panama 13
PT - Portogallo 11
CZ - Repubblica Ceca 10
BY - Bielorussia 9
CR - Costa Rica 9
KW - Kuwait 9
SI - Slovenia 9
TT - Trinidad e Tobago 9
EE - Estonia 8
HU - Ungheria 8
JM - Giamaica 8
LB - Libano 8
PS - Palestinian Territory 8
SY - Repubblica araba siriana 8
DO - Repubblica Dominicana 7
GT - Guatemala 7
HN - Honduras 7
LK - Sri Lanka 7
LV - Lettonia 7
SK - Slovacchia (Repubblica Slovacca) 7
CI - Costa d'Avorio 6
CY - Cipro 6
DK - Danimarca 6
HR - Croazia 6
KG - Kirghizistan 6
KZ - Kazakistan 6
RS - Serbia 6
ZW - Zimbabwe 6
BH - Bahrain 5
NG - Nigeria 5
OM - Oman 5
AO - Angola 4
GA - Gabon 4
Totale 53.068
Città #
Fairfield 2.779
Southend 2.670
Singapore 2.555
Hong Kong 2.433
Santa Clara 2.174
Ashburn 2.170
Woodbridge 1.819
Houston 1.489
Chandler 1.427
Ann Arbor 1.172
Jacksonville 1.168
Hefei 1.077
Seattle 1.022
Wilmington 975
Cambridge 903
Dearborn 753
San Jose 680
Nyköping 562
Beijing 548
London 535
Seoul 452
Ho Chi Minh City 390
The Dalles 330
Los Angeles 299
Helsinki 291
Hanoi 285
Modena 280
San Diego 279
Council Bluffs 257
Princeton 237
Chicago 222
New York 220
Sofia 214
Eugene 202
Milan 187
Izmir 168
Lauterbourg 166
Redwood City 164
Buffalo 160
Bremen 142
Moscow 130
Des Moines 120
São Paulo 113
Shanghai 110
Dallas 106
Ottawa 106
Tokyo 98
Bologna 93
Salt Lake City 84
Frankfurt am Main 75
Boardman 67
Munich 65
Jakarta 61
Rome 61
Atlanta 59
Falls Church 58
Orem 57
Brussels 55
Norwalk 55
Columbus 53
Parma 52
Nuremberg 50
Guangzhou 47
Haiphong 47
Amsterdam 46
Baghdad 46
Kent 46
Nanjing 46
Chennai 45
Da Nang 45
Tehran 45
Tampa 44
Johannesburg 39
Rio de Janeiro 39
Belo Horizonte 37
Manchester 37
Gelsenkirchen 36
Denver 35
Stockholm 35
Elk Grove Village 34
Phoenix 34
Montreal 33
Warsaw 33
Dhaka 32
Perth 32
Toronto 32
Brasília 31
Dublin 31
Kunming 31
Brooklyn 30
Grafing 29
Jeddah 29
Mexico City 28
Nairobi 27
Surabaya 27
Biên Hòa 24
Falkenstein 24
Jinan 24
San Francisco 24
Dongguan 23
Totale 36.911
Nome #
Assessing the overhead and scalability of system monitors for large data centers 828
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection 548
Analysis of high volumes of network traffic for Advanced Persistent Threat detection 533
Detection and Threat Prioritization of Pivoting Attacks in Large Networks 526
CAINE: A new open-source live distribution for digital forensics 496
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises 495
A collaborative framework for intrusion detection in mobile networks 462
A software architecture for the analysis of large sets of data streams in cloud infrastructures 446
A symmetric cryptographic scheme for data integrity verification in cloud databases 440
Adaptive, scalable and reliable monitoring of big data on clouds 404
A Framework for Automating Security Assessments with Deductive Reasoning 402
Vehicle Safe-Mode, Limp-Mode in the Service of Cyber Security 388
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 380
Dynamic load balancing for network intrusion detection systems based on distributed architectures 373
A cluster-based Web system providing differentiated and guaranteed services 368
Security and Confidentality Solutions for Public Cloud Database Services 367
A scalable architecture for cooperative Web caching 356
Scalable architecture for multi-user encrypted SQL operations on cloud database services 352
Identifying malicious hosts involved in periodic communications 350
A distributed infrastructure supporting personalized services for the Mobile Web 349
Access control enforcement on query-aware encrypted cloud databases 349
Cybersecurity of Connected Autonomous Vehicles : A ranking based approach 348
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms 343
Distributed, concurrent and independent access to encrypted cloud databases 341
Supporting sense-making and decision-making through time evolution analysis of open sources 341
A scalable architecture for real-time monitoring of large information systems 339
On the effectiveness of machine and deep learning for cyber security 335
The problem of NIDS evasion in mobile networks 331
Adaptive traffic filtering for efficient and secure IP mobility 330
Exploratory security analytics for anomaly detection 329
Autonomic request management algorithms for geographically distributed Internet-based systems 325
A Novel Intermediary Framework for Dynamic Edge Service Composition 322
Benchmarking models and tools for distributed Web-server systems 319
Efficient detection of unauthorized data modification in cloud databases 319
Scalable architecture for online prioritization of cyber threats 319
Vehicle Safe-Mode, Concept to Practice Limp-Mode in the Service of Cybersecurity 318
Dynamic request management algorithms for Web-based services in cloud computing 316
Detecting attacks to internal vehicle networks through Hamming distance 313
A client-aware dispatching algorithm for Web clusters providing multiple services 311
Collaborative architecture for malware detection and analysis 305
A two-level distributed architecture for the support of content adaptation and delivery services 305
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 305
Design and testing of scalable Web-based systems with performance constraints 305
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 303
Fog-based secure communications for low-power IoT devices 302
Models and framework for supporting run-time decisions in Web-based systems 300
Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale 299
Real-time adaptive algorithm for resource monitoring 298
Real-time models supporting resource management decisions in highly variable systems 298
Dual time-scale distributed capacity allocation and load redirect algorithms for cloud systems 296
Guaranteeing correctness of bulk operations in outsourced databases 295
Fine grain performance evaluation of e-commerce sites 294
A performance study of robust load sharing strategies for distributed heterogeneous Web server systems 292
A cluster-based Web system providing differentiated and guaranteed services 291
Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems 291
Defeating NIDS evasion in Mobile IPv6 networks 291
Security and privacy of location-based services for in-vehicle device systems 291
Cooperative Architectures and Algorithms for Discovery and Transcoding of Multi-version Contents 290
A Distributed Cooperation Schemes for Document Lookup in Geographically Dispersed Cache Servers 288
Characteristics and evolution of content popularity and user relations in social networks 288
A Data-driven Characterization of Modern Android Spyware 287
Algorithms for Web Service Selection with Static and Dynamic Requirements 286
The state of the art in locally distributed Web-server systems 285
Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics 285
Kernel-based Web switches providing content-aware routing 284
Selective and early threat detection in large networked systems 281
Hybrid cooperative schemes for scalable and stable performance of Web content delivery 279
Selective alerts for run-time protection of distributed systems 278
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 276
Technological solutions to support Mobile Web 2.0 services 275
A distributed architecture of edge proxy servers for cooperative transcoding 274
Authorization transparency for accountable access to IoT services 274
Self-inspection mechanisms for the support of autonomic decisions in Internet-based systems 271
Runtime state change detector of computer system resources under non stationary conditions 269
Hot set identification for social network applications 268
Survivable zero trust for cloud computing environments 267
Runtime prediction models for Web-based system resources 266
DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems 263
Supporting security and consistency for cloud database 262
Web System Reliability and Performance 261
Resource Management Strategies for the Mobile Web 261
A Two-level Distributed Architecture for Web Content Adaptation and Delivery 260
A distributed architecture for gracefully degradable Web-based services 260
Distribution of adaptation services for Ubiquitous Web access driven by user profile 257
Performance study of dispatching algorithms in multi-tier Web architectures 257
Adaptive algorithms for efficient content management in social network services 256
Data clustering based on correlation analysis applied to highly variable domains 255
Cyber Attacks on Financial Critical Infrastructures 254
Collaborative Attack Detection Using Distributed Hash Tables 253
Performance comparison of distributed architectures for content adaptation and delivery of Web resources 253
Self-adaptive techniques for the load trend evaluation of internal system resources 252
Multistep attack detection and alert correlation in intrusion detection systems 251
Peer-to-Peer workload characterization: techniques and open issues 250
Dynamic load management of virtual machines in a cloud architecture 248
Impact of technology trends on performance of Web-based services 248
Distributed architectures for high performance and privacy-aware content generation and delivery 248
Performance Evolution of Mobile Web-Based Services 247
A hierarchical approach for bounding the completion time distribution of stochastic task graphs 247
PSBLAS: A library for parallel linear algebra computation on sparse matrices 246
Threshold-based reconfiguration strategies for gracefully degradable parallel computations 246
Totale 31.878
Categoria #
all - tutte 187.482
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 187.482


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021587 0 0 0 0 0 0 0 0 0 0 352 235
2021/20224.148 140 498 479 180 109 197 265 183 428 336 892 441
2022/20233.839 434 477 241 341 530 602 50 387 473 43 119 142
2023/20243.518 99 150 169 249 679 422 939 303 78 86 89 255
2024/20258.775 360 100 101 531 1.569 1.095 624 608 1.001 449 966 1.371
2025/202614.292 737 705 1.450 1.445 2.269 1.268 1.797 771 1.321 2.001 528 0
Totale 53.406