CONTI, MAURO
 Distribuzione geografica
Continente #
NA - Nord America 432
EU - Europa 382
AS - Asia 324
AF - Africa 14
OC - Oceania 8
SA - Sud America 6
Continente sconosciuto - Info sul continente non disponibili 1
Totale 1.167
Nazione #
US - Stati Uniti d'America 417
IT - Italia 135
CN - Cina 98
IN - India 63
FR - Francia 57
DE - Germania 46
HK - Hong Kong 46
GB - Regno Unito 35
IR - Iran 29
RO - Romania 26
JP - Giappone 25
NL - Olanda 17
CA - Canada 12
FI - Finlandia 11
ID - Indonesia 11
IE - Irlanda 11
AU - Australia 8
KR - Corea 8
TR - Turchia 8
TW - Taiwan 8
SG - Singapore 7
BE - Belgio 6
BR - Brasile 6
MY - Malesia 6
GR - Grecia 5
RU - Federazione Russa 5
SE - Svezia 5
EG - Egitto 4
PH - Filippine 4
UA - Ucraina 4
AT - Austria 3
BD - Bangladesh 3
KE - Kenya 3
LT - Lituania 3
CH - Svizzera 2
CZ - Repubblica Ceca 2
LV - Lettonia 2
MX - Messico 2
NO - Norvegia 2
PT - Portogallo 2
ZA - Sudafrica 2
AD - Andorra 1
CI - Costa d'Avorio 1
CR - Costa Rica 1
CY - Cipro 1
EU - Europa 1
IQ - Iraq 1
LB - Libano 1
LU - Lussemburgo 1
MA - Marocco 1
MG - Madagascar 1
NP - Nepal 1
PK - Pakistan 1
RS - Serbia 1
SA - Arabia Saudita 1
SN - Senegal 1
TH - Thailandia 1
VN - Vietnam 1
ZW - Zimbabwe 1
Totale 1.167
Città #
Padova 50
Ashburn 45
Houston 37
Fairfield 35
Beijing 23
Ann Arbor 22
Buffalo 18
Woodbridge 18
Central 14
Milan 14
Seattle 13
Chicago 12
Santa Cruz 12
Bengaluru 11
Los Angeles 11
Bucharest 10
Tokyo 10
Aachen 9
Dublin 9
Helsinki 9
Paris 9
Stillwater 9
Cambridge 8
Coventry 8
Rome 8
Wilmington 8
Amsterdam 7
Istanbul 7
Kagoya 7
Taipei 7
Boardman 6
Changsha 6
Des Moines 6
Tehran 6
Bangalore 5
Brendola 5
Henderson 5
Jakarta 5
Lincolnton 5
Nanjing 5
San Jose 5
Suri 5
Berlin 4
Chennai 4
Cluj-Napoca 4
Elefsina 4
Genoa 4
Hangzhou 4
Hayward 4
Hong Kong 4
Kowloon 4
La Spezia 4
London 4
Melbourne 4
New York 4
San Diego 4
Sant'Elia Fiumerapido 4
Shanghai 4
Singapore 4
Stockholm 4
Wuhan 4
Brussels 3
Calgary 3
Camponogara 3
Council Bluffs 3
Depok 3
Falls Church 3
Frankfurt am Main 3
Hyderabad 3
Jinan 3
Kuala Lumpur 3
Kumar 3
Motomachi 3
Mumbai 3
Munich 3
Nairobi 3
Newcastle upon Tyne 3
Redmond 3
Rochester 3
San Francisco 3
Songpa-gu 3
Toronto 3
Verona 3
Xian 3
Agordo 2
Al Mansurah 2
Albuquerque 2
Arlington 2
Bandung 2
Boston 2
Bradenton 2
Buk-gu 2
Buzau 2
Cairo 2
Cheltenham 2
Chuadanga 2
Constanța 2
Delhi 2
Gurgaon 2
Heiligenhaus 2
Totale 701
Nome #
Privacy Aware Data Deduplication for Side Channel in Cloud Storage, file e14fb26a-ddf4-3de1-e053-1705fe0ac030 374
Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN, file e14fb26b-8199-3de1-e053-1705fe0ac030 196
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario, file e14fb26e-4d2e-3de1-e053-1705fe0ac030 172
Analyzing Android Encrypted Network Traffic to Identify User Actions, file e14fb26c-e562-3de1-e053-1705fe0ac030 84
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality, file 13120ef0-421a-46b5-a2b7-ed377d9e5c5d 48
Robust Smartphone App Identification via Encrypted Network Traffic Analysis, file e14fb26c-e293-3de1-e053-1705fe0ac030 43
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution, file ccdc0b8d-bc55-4bdf-bc31-eb1a11ab4403 36
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain, file 60fb0336-a378-4495-938b-5fe39ae0123d 23
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming, file b761018d-06b2-4f6c-88ef-ced31968bdfe 22
Context-based Co-presence detection techniques: A survey, file e14fb26e-82ef-3de1-e053-1705fe0ac030 22
Fast multi-hop broadcast of alert messages in VANETs: An analytical model, file e14fb26b-7bf9-3de1-e053-1705fe0ac030 17
Malingering Scraper: A novel framework to reconstruct honest profiles from malingerer psychopathological tests., file 6847ff4c-ce8f-45d5-9117-b13edfb6e8c8 14
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks., file e14fb26c-8a50-3de1-e053-1705fe0ac030 14
Poisoning Bearer Context Migration in O-RAN 5G Network, file d10f129f-6f8f-4816-a049-a5ad67b46e48 12
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets with Sparse Prior for Line-of-Sight Scenarios, file f083c984-57b7-4eb9-89c5-66ca7f982a9b 11
Data Security Awareness: metodi e strumenti per promuoverla nella scuola secondaria. Il caso del progetto Edu4Sec., file e14fb26e-11c8-3de1-e053-1705fe0ac030 10
Whac-A-Mole: Smart Node Positioning in Clone Attack in Wireless Sensor Networks, file e14fb26e-e57d-3de1-e053-1705fe0ac030 9
Adapting the system to users based on implicit data: Ethical risks and possible solutions, file 6546d0b0-ba8f-489d-96e0-91dd32301012 8
An ICN-Based Authentication Protocol for a Simplified LTE Architecture, file e14fb26a-7fcb-3de1-e053-1705fe0ac030 8
Fast multi-hop broadcast of alert messages in VANETs: An analytical model, file e14fb26e-7bdb-3de1-e053-1705fe0ac030 8
The impact of malicious nodes positioning on vehicular alert messaging system, file e14fb26e-b492-3de1-e053-1705fe0ac030 8
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum, file fda9d2b8-8a0c-455b-86d3-e6e26763d5d6 8
5G Security Challenges and Solutions: A Review by OSI Layers, file 53696b21-167b-44f7-9881-6b22f1014baf 7
QoE Degradation Attack in Dynamic Adaptive Streaming over ICN, file e14fb26b-7e9f-3de1-e053-1705fe0ac030 6
Efficient Physical Intrusion Detection in Internet of Things: A Node Deployment Approach, file e14fb26b-a8d7-3de1-e053-1705fe0ac030 6
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities, file e14fb26b-d119-3de1-e053-1705fe0ac030 6
Anonymous Federated Learning via Named-Data Networking, file 2cc08c67-dd2c-43f3-9acf-3e522131d5e9 5
COVID-19 infodemic on Facebook and containment measures in Italy, United Kingdom and New Zealand, file 468aeb55-69cc-43a9-8be8-4966e30c7cde 4
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing, file 617e46b0-df8e-4058-80b8-f3bdeb4edff8 3
Covert lie detection using keyboard dynamics, file cdd12827-26c6-4798-b1ab-f4de18046880 3
Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services., file e14fb269-d81f-3de1-e053-1705fe0ac030 3
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey, file 8253b305-6f26-4fd4-b0ba-40aaa9c82c19 2
Selfrando: Securing the Tor Browser against De-anonymization Exploits, file a3b6c20b-c65a-4389-b21a-d0c83d1f1980 2
Towards An Enhanced Reputation System for IOTA’s Coordicide, file a84960fd-3009-40fa-ac57-3b0f4747d18d 2
Privacy-Aware Caching in Information-Centric Networking., file e14fb26c-7e1b-3de1-e053-1705fe0ac030 2
A Survey on Security Challenges and Solutions in IOTA, file e14fb26f-c642-3de1-e053-1705fe0ac030 2
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective, file 0f11783c-2b6d-4233-8fc0-547ade3514c2 1
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones, file 3aa3c6c4-d39b-42a3-980f-0651043ff475 1
The online identity detection via keyboard dynamics, file 53027a4b-5e28-41b6-b13f-3d1d516ca232 1
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach, file 5775dabf-eb2b-4a87-9311-8baaeba4cbfc 1
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses, file 7a9fe52f-6c98-4b38-8736-57c1f37ddffb 1
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles, file 8e091ed1-baa3-4ab1-9fde-69741338590c 1
The Spread of Propaganda by Coordinated Communities on Social Media, file 9b5abbe9-fb15-416c-9a1d-76c66d9003e4 1
Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions, file a7138123-3744-4e47-bf4d-ff689e6e7a0b 1
Face the Truth: Interpretable Emotion Genuineness Detection, file a9a1a267-ca27-4558-8f4f-658f844f0b42 1
Tell me how you charge I will tell you where you drove to: Electric Vehicles Profiling Based on Charging-Current Demand, file c11714d6-8003-4338-9788-1e5799e6ede4 1
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks, file c25bf5c9-9769-48ec-9ff7-887d809219f6 1
Advertising in the IoT Era: Vision and Challenges, file e14fb26a-cc86-3de1-e053-1705fe0ac030 1
EnergIoT: A solution to improve network lifetime of IoT devices, file e14fb26a-ddf3-3de1-e053-1705fe0ac030 1
The impact of malicious nodes positioning on vehicular alert messaging system, file e14fb26e-b491-3de1-e053-1705fe0ac030 1
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks, file f5ca484d-dd5a-4621-9a6b-d358c0275d3d 1
Totale 1.215
Categoria #
all - tutte 3.345
article - articoli 2.381
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 94
Totale 5.820


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201923 0 0 0 0 0 0 0 0 0 6 11 6
2019/202085 8 2 5 3 3 6 9 10 21 8 6 4
2020/2021178 7 15 14 10 16 13 20 13 29 13 14 14
2021/2022208 16 10 25 47 26 20 11 14 4 3 24 8
2022/2023329 18 28 42 27 27 24 20 43 32 26 31 11
2023/2024381 12 24 13 19 23 31 18 49 84 108 0 0
Totale 1.215