FERRETTI, LUCA
 Distribuzione geografica
Continente #
NA - Nord America 4.017
AS - Asia 3.317
EU - Europa 2.214
SA - Sud America 359
AF - Africa 73
OC - Oceania 32
Continente sconosciuto - Info sul continente non disponibili 6
Totale 10.018
Nazione #
US - Stati Uniti d'America 3.920
SG - Singapore 890
CN - Cina 849
IT - Italia 710
HK - Hong Kong 632
GB - Regno Unito 396
BR - Brasile 264
VN - Vietnam 257
SE - Svezia 250
DE - Germania 243
KR - Corea 123
RU - Federazione Russa 117
FR - Francia 116
FI - Finlandia 91
IN - India 91
IR - Iran 74
ID - Indonesia 71
JP - Giappone 64
TR - Turchia 59
CA - Canada 54
UA - Ucraina 47
BE - Belgio 43
NL - Olanda 33
BD - Bangladesh 29
BG - Bulgaria 29
AU - Australia 28
TW - Taiwan 28
MX - Messico 26
AR - Argentina 24
ZA - Sudafrica 24
SA - Arabia Saudita 23
ES - Italia 22
PH - Filippine 21
IE - Irlanda 19
IQ - Iraq 19
CO - Colombia 18
AT - Austria 16
PL - Polonia 16
MY - Malesia 13
VE - Venezuela 13
EC - Ecuador 12
EG - Egitto 11
MA - Marocco 11
CL - Cile 10
PE - Perù 10
AE - Emirati Arabi Uniti 9
LT - Lituania 9
PK - Pakistan 9
AZ - Azerbaigian 8
CZ - Repubblica Ceca 8
JO - Giordania 8
TN - Tunisia 8
SI - Slovenia 7
PY - Paraguay 6
BH - Bahrain 5
EE - Estonia 5
HR - Croazia 5
KE - Kenya 5
RO - Romania 5
RS - Serbia 5
TH - Thailandia 5
UZ - Uzbekistan 5
MN - Mongolia 4
NG - Nigeria 4
NZ - Nuova Zelanda 4
PA - Panama 4
PS - Palestinian Territory 4
PT - Portogallo 4
BY - Bielorussia 3
CR - Costa Rica 3
EU - Europa 3
GR - Grecia 3
HU - Ungheria 3
IL - Israele 3
LV - Lettonia 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
CH - Svizzera 2
CI - Costa d'Avorio 2
DK - Danimarca 2
ET - Etiopia 2
GT - Guatemala 2
HN - Honduras 2
LB - Libano 2
OM - Oman 2
XK - ???statistics.table.value.countryCode.XK??? 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
BO - Bolivia 1
CY - Cipro 1
DZ - Algeria 1
GA - Gabon 1
GN - Guinea 1
IS - Islanda 1
JM - Giamaica 1
KH - Cambogia 1
KZ - Kazakistan 1
LC - Santa Lucia 1
MR - Mauritania 1
MT - Malta 1
Totale 10.011
Città #
Singapore 604
Hong Kong 589
Santa Clara 451
Ashburn 414
Fairfield 341
Chandler 258
Southend 213
Woodbridge 205
Hefei 175
Ann Arbor 165
Los Angeles 160
Houston 157
San Jose 149
Seattle 139
Cambridge 137
Wilmington 125
Modena 124
Beijing 113
Seoul 105
London 97
Ho Chi Minh City 94
Nyköping 88
Bologna 82
Jacksonville 73
Dearborn 71
Helsinki 67
Hanoi 60
Tokyo 55
San Diego 48
Moscow 44
Tehran 44
The Dalles 41
Milan 40
New York 38
Boardman 37
Parma 34
Chicago 33
Buffalo 32
Izmir 32
Princeton 31
Council Bluffs 30
Munich 29
Bremen 28
Frankfurt am Main 27
Brussels 26
Reggio Emilia 26
Sofia 26
Lauterbourg 25
Shanghai 25
São Paulo 24
Surabaya 23
Amsterdam 21
Redwood City 21
Jeddah 20
Nuremberg 20
Eugene 18
Rome 18
Atlanta 17
Taipei 17
Dublin 16
Melbourne 16
Chennai 15
Orem 15
Dallas 14
Manchester 14
Salt Lake City 14
Jakarta 13
Guangzhou 12
Stockholm 12
Da Nang 11
Hangzhou 11
Ottawa 11
Wuhan 11
Bengaluru 10
Cape Town 10
Denver 10
Gothenburg 10
Montreal 10
Fremont 9
Hamburg 9
Liverpool 9
Paris 9
Toronto 9
Turin 9
Turku 9
Warsaw 9
Amman 8
Baghdad 8
Falkenstein 8
Leuven 8
Prague 8
Serralunga di Crea 8
Baku 7
Bari 7
Florence 7
Formigine 7
Haiphong 7
Istanbul 7
Johannesburg 7
Kent 7
Totale 6.617
Nome #
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection 544
A symmetric cryptographic scheme for data integrity verification in cloud databases 436
A Framework for Automating Security Assessments with Deductive Reasoning 400
A big data platform exploiting auditable tokenization to promote good practices inside local energy communities 378
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 377
Security and Confidentality Solutions for Public Cloud Database Services 366
Scalable architecture for multi-user encrypted SQL operations on cloud database services 350
Access control enforcement on query-aware encrypted cloud databases 348
How (Not) to Index Order Revealing Encrypted Databases 343
Distributed, concurrent and independent access to encrypted cloud databases 335
On the effectiveness of machine and deep learning for cyber security 335
Efficient detection of unauthorized data modification in cloud databases 314
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 302
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 302
Hardware limitations to secure C-ITS: experimental evaluation and solutions 302
Fog-based secure communications for low-power IoT devices 300
Guaranteeing correctness of bulk operations in outsourced databases 295
Analyses of secure automotive communication protocols and their impact on vehicles life-cycle 277
Authorization transparency for accountable access to IoT services 274
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 273
Supporting security and consistency for cloud database 260
DAGA: Detecting Attacks to in-vehicle networks via n-Gram Analysis 254
Survivable zero trust for cloud computing environments 253
Efficient License Management Based on Smart Contracts Between Software Vendors and Service Providers 239
An experimental analysis of ECQV implicit certificates performance in VANETs 214
Flexible and Survivable Single Sign-On 204
Accountable and privacy-aware flexible car sharing and rental services 200
Transparent access on encrypted data distributed over multiple cloud infrastructures 199
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things 189
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems 168
Scalable, Confidential and Survivable Software Updates 161
Evaluating Trainees in Large Cyber Exercises 152
Implementation of verified set operation protocols based on bilinear accumulators 150
WebDHT: browser-compatible distributed hash table for decentralized Web applications 147
Timing Side-Channel Attacks on USB Devices Using eBPF 111
Message from the siw 2018 workshop chairs 110
Message from the Program Chairs 108
Riservatezza e integrità su servizi database cloud 67
Network-efficient authenticated pseudonym-based V2X communications with constant revocation costs 28
That’s what you signed for: evaluating user perception about privacy data in infotainment systems 25
Practical and secure history-independent indexing for queryable-encrypted databases 17
Totale 10.107
Categoria #
all - tutte 36.418
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 36.418


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021246 0 0 0 0 0 0 0 0 0 143 54 49
2021/2022696 38 50 74 47 21 41 31 47 61 76 138 72
2022/2023726 70 90 50 72 87 101 21 76 79 8 29 43
2023/20241.344 25 41 40 83 254 113 374 160 26 64 60 104
2024/20252.073 93 37 58 143 345 253 130 135 204 131 235 309
2025/20263.218 198 135 285 284 591 253 479 207 333 453 0 0
Totale 10.107