DI PIETRO, ROBERTO
 Distribuzione geografica
Continente #
NA - Nord America 3.945
EU - Europa 457
AS - Asia 268
OC - Oceania 2
Totale 4.672
Nazione #
US - Stati Uniti d'America 3.943
CN - Cina 234
IT - Italia 182
FI - Finlandia 98
SE - Svezia 53
DE - Germania 40
GB - Regno Unito 37
UA - Ucraina 22
IN - India 14
VN - Vietnam 12
IE - Irlanda 11
NL - Olanda 7
FR - Francia 4
JP - Giappone 4
KR - Corea 3
AU - Australia 2
CA - Canada 2
GR - Grecia 2
CH - Svizzera 1
PK - Pakistan 1
Totale 4.672
Città #
Fairfield 651
Woodbridge 611
Ann Arbor 471
Houston 430
Seattle 258
Ashburn 245
Wilmington 239
Cambridge 208
Chandler 169
Jacksonville 146
Padova 87
Princeton 73
San Diego 70
Medford 48
Beijing 40
Helsinki 39
Nanjing 35
Sacile 34
Boardman 32
Des Moines 27
Mestre 26
Jinan 23
Shenyang 21
Hebei 16
Dong Ket 12
Pune 12
Changsha 11
Dublin 11
Nanchang 11
Zhengzhou 10
Jiaxing 9
Kilburn 9
Perugia 9
Roxbury 9
Hangzhou 8
Tianjin 8
Haikou 7
Lanzhou 6
London 6
Ningbo 6
Norwalk 6
Orange 6
Venice 6
Taiyuan 5
Taizhou 5
Trieste 5
Guangzhou 4
Acton 2
Battaglia Terme 2
Canberra 2
Chicago 2
Cittadella 2
Fuzhou 2
Indiana 2
Montemarciano 2
Ogden 2
Redwood City 2
The Hague 2
Atlanta 1
Auburn Hills 1
Bassano Del Grappa 1
Bietigheim-Bissingen 1
Bologna 1
Bradford 1
Chiswick 1
Eluru 1
Fremont 1
Geislingen an der Steige 1
Grazzanise 1
Gurgaon 1
Harrisonburg 1
Hounslow 1
Kharkiv 1
Los Angeles 1
Malmo 1
Milan 1
Montreal 1
Munich 1
New Bedfont 1
Purmerend 1
Qingdao 1
San Mateo 1
Seoul 1
Shanghai 1
Sialkot 1
Soka Shi 1
Southwark 1
Tappahannock 1
Terni 1
Toulouse 1
Tsukuba 1
Usingen 1
Venezia 1
Walnut 1
Zurich 1
Totale 4.239
Nome #
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. 140
ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in Wireless Sensor Networks. 131
Time Warp: How Time Affects Privacy in LBSs 119
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN. 114
eRIPP-FS: Enforcing Privacy and Security in RFID 99
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks 97
COKE: Crypto-less Over-the-air Key Establishment 96
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 96
CED2: Communication Efficient Disjointness Decision 93
Secure Cooperative Channel Establishment in Wireless Sensor Networks 93
A Survey on Computational Propaganda Detection 93
Events Privacy in WSNs: a New Model and its Application 92
CURE-Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments 92
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization. 91
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks 89
CASSANDRA: a probabilistic, efficient, and privacy preserving solution to compute set intersection 88
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 88
Fame for sale: Efficient detection of fake Twitter followers 88
To Docker or Not to Docker: A Security Perspective 88
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks 88
Intrusion-Resilient Integrity in Data-Centric Unattended WSNs. 85
Windows Mobile LiveSD Forensics 84
Wireless Sensor Replica Detection in Mobile Environments 82
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs 81
Time in privacy preserving LBSs: an overlooked dimension 80
Secure virtualization for cloud computing 80
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 80
Event Handoff Unobservability in WSN 79
CUDA leaks: A detailed hack for CUDA and a (Partial) fix 79
Privacy for LBSs: On Using a Footprint model to face the enemy 78
Secure Topology Maintenance and Events Collection in WSNs 78
Provable Storage Medium for Data Storage Outsourcing 78
Colonic metaplasia in the long-term follow-up of the ileal neobladder 77
Smart Health: A Context-Aware Health Paradigm within Smart Cities. 76
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions 76
Distributed Data Source Verification in Wireless Sensor Networks 76
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks 75
EXPEDITE: EXPress closED ITemset Enumeration 75
United We Stand: Intrusion Resilience in Mobile Unattended WSNs 75
Epidemic Theory and Data Survivability in Unattended Wireless Sensor Networks: Models and Gaps. 73
Distributed Detection of Clone Attacks in Wireless Sensor Networks 71
CREPUSCOLO: A collusion resistant privacy preserving location verification system 71
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy 70
ESC: An efficient, scalable, and crypto-less solution to secure wireless networks 69
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution 69
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware 67
Preserving privacy against external and internal threats in WSN data aggregation 66
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices 64
Who counterfeited my ViagraTM? (Probabilistic item removal detection via RFID tag cooperation) 64
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance 61
DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection 60
Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel 59
Visual Role Mining: A Picture Is Worth a Thousand Roles. 58
The impact of GPU-assisted malware on memory forensics: A case study 58
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack 54
PRISM—Privacy-Preserving Search in MapReduce. 50
Phenotypic changes in mucin-secreting cells in the ileal neobladder mucosa: a metaplastic or precancerous lesion? 49
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs 43
Silence is golden: Exploiting jamming and radio Silence to communicate 37
Self-Healing in Unattended Sensor Networks 27
Shedding light on typical species: Implications for habitat monitoring 3
Recommendations from the COST action CA17116 (SPRINT) for the standardization of perinatal derivative preparation and in vitro testing 1
Totale 4.713
Categoria #
all - tutte 14.489
article - articoli 8.936
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 200
Totale 23.625


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019437 0 0 0 0 0 0 0 0 0 89 196 152
2019/20201.054 147 26 18 69 117 70 96 109 98 216 60 28
2020/2021596 29 32 23 58 66 40 31 91 96 29 63 38
2021/2022782 4 67 157 63 43 15 33 118 36 7 102 137
2022/2023397 89 32 3 41 89 54 0 26 41 4 11 7
2023/2024134 7 50 17 21 4 13 13 1 4 4 0 0
Totale 4.713