SARACINO, ANDREA
 Distribuzione geografica
Continente #
AS - Asia 1.489
NA - Nord America 980
EU - Europa 364
SA - Sud America 362
AF - Africa 38
OC - Oceania 3
Continente sconosciuto - Info sul continente non disponibili 1
Totale 3.237
Nazione #
US - Stati Uniti d'America 934
SG - Singapore 665
CN - Cina 340
BR - Brasile 289
VN - Vietnam 198
HK - Hong Kong 141
NL - Olanda 88
FR - Francia 80
IT - Italia 70
AR - Argentina 33
KR - Corea 29
CA - Canada 24
BD - Bangladesh 22
DE - Germania 22
GB - Regno Unito 20
FI - Finlandia 18
ID - Indonesia 14
IN - India 14
EC - Ecuador 12
JP - Giappone 11
MX - Messico 11
ZA - Sudafrica 11
CO - Colombia 9
PK - Pakistan 9
IQ - Iraq 8
VE - Venezuela 8
KE - Kenya 7
EG - Egitto 6
SE - Svezia 6
AT - Austria 5
BE - Belgio 5
ES - Italia 5
PL - Polonia 5
RU - Federazione Russa 5
SA - Arabia Saudita 5
IE - Irlanda 4
IL - Israele 4
PE - Perù 4
RS - Serbia 4
TH - Thailandia 4
UA - Ucraina 4
AL - Albania 3
CL - Cile 3
MA - Marocco 3
PT - Portogallo 3
RO - Romania 3
TN - Tunisia 3
TR - Turchia 3
AE - Emirati Arabi Uniti 2
AU - Australia 2
BG - Bulgaria 2
CR - Costa Rica 2
DO - Repubblica Dominicana 2
GR - Grecia 2
JO - Giordania 2
KG - Kirghizistan 2
KH - Cambogia 2
MY - Malesia 2
NI - Nicaragua 2
NP - Nepal 2
PY - Paraguay 2
SK - Slovacchia (Repubblica Slovacca) 2
TT - Trinidad e Tobago 2
UY - Uruguay 2
UZ - Uzbekistan 2
AM - Armenia 1
BH - Bahrain 1
BN - Brunei Darussalam 1
BW - Botswana 1
BY - Bielorussia 1
CI - Costa d'Avorio 1
CZ - Repubblica Ceca 1
DK - Danimarca 1
ET - Etiopia 1
GA - Gabon 1
HN - Honduras 1
HU - Ungheria 1
IM - Isola di Man 1
LT - Lituania 1
LV - Lettonia 1
LY - Libia 1
MN - Mongolia 1
NA - Namibia 1
NZ - Nuova Zelanda 1
PA - Panama 1
PH - Filippine 1
PS - Palestinian Territory 1
SI - Slovenia 1
SN - Senegal 1
SV - El Salvador 1
TG - Togo 1
TW - Taiwan 1
XK - ???statistics.table.value.countryCode.XK??? 1
YE - Yemen 1
Totale 3.237
Città #
Santa Clara 399
Singapore 367
Hong Kong 134
Beijing 95
Ho Chi Minh City 89
San Jose 84
Ashburn 66
Lauterbourg 66
Dallas 42
Los Angeles 41
Hefei 38
Hanoi 31
Seoul 29
New York 27
São Paulo 22
Pisa 13
Rio de Janeiro 13
Belo Horizonte 10
Frankfurt am Main 10
Da Nang 9
Helsinki 9
Montreal 9
Guangzhou 8
Lappeenranta 8
Biên Hòa 7
Denver 7
Dhaka 7
Nairobi 7
Orem 7
Tokyo 7
Brasília 6
Buffalo 6
Chicago 6
Council Bluffs 6
Johannesburg 6
Atlanta 5
Can Tho 5
Houston 5
Hải Dương 5
Milan 5
Salvador 5
Stockholm 5
Bangkok 4
Brussels 4
Cairo 4
City of London 4
Ha Long 4
Marília 4
Nuremberg 4
Padua 4
Phoenix 4
Quito 4
Rome 4
Thái Nguyên 4
Warsaw 4
Amsterdam 3
Boston 3
Cabo Frio 3
Calgary 3
Campinas 3
Caracas 3
Cascina 3
Curitiba 3
Córdoba 3
Feira de Santana 3
Fort Worth 3
Fortaleza 3
Guarulhos 3
Haiphong 3
Jakarta 3
Lahore 3
Livorno 3
London 3
Marseille 3
Medellín 3
Mumbai 3
Palmas 3
Porto Alegre 3
Quận Bình Thạnh 3
Quận Phú Nhuận 3
Santo André 3
Shanghai 3
Sorocaba 3
São Carlos 3
The Dalles 3
Tirana 3
Toronto 3
Uberlândia 3
Vĩnh Tường 3
Amman 2
Aracaju 2
Araraquara 2
Araçatuba 2
Athens 2
Avellaneda 2
Bebedouro 2
Bengaluru 2
Betim 2
Bishkek 2
Blumenau 2
Totale 1.902
Nome #
A critical thermal transition driving spring phenology of Northern Hemisphere conifers 77
Introducing Usage Control in MQTT 72
A collaborative framework for generating probabilistic contracts 69
Exploiting usage control for implementation and enforcement of security by contract 57
Improving security in industry 4.0 by extending OPC-UA with usage control 55
On-device derivation of IoT usage control policies: Automating U-XACML policy generation from natural language with LLMs in smart homes environments 54
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns 53
Implementing Usage Control in Internet of Things: A Smart Home Use Case 52
Email spoofing attack detection through an end to end authorship attribution system 51
Trading-off Privacy, Utility, and Explainability in Deep Learning-based Image Data Analysis 51
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments 50
Digital Waste Disposal: an automated framework for analysis of spam emails 49
A Multi-Criteria-based Evaluation of Android Applications 49
Current Research Issues on Cyber security in Robotics 49
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes 48
Enforcing mobile application security through probabilistic contracts 48
Cybsersecurity issues in robotics 48
Behavioral analysis for a continuous user authentication 48
Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers 48
Response--a framework for enforcing risk-aware security policies in constrained dynamic environments 47
Addressing privacy issues in location-based collaborative and distributed environments 46
Phylogenetic Analysis for Ransomware Detection and Classification into Families 46
Multi-level distributed intrusion detection system for an IoT based smart home environment 46
Using recurrent neural networks for continuous authentication through gait analysis 46
Classifying Android Malware Through Subgraph Mining 45
Towards collaborative cyber threat intelligence for security management 44
Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems 44
Rapporto tecnico contenente i risultati ottenuti in merito allo studio di tecniche di crowd sourcing combinate con l'uso di droni 43
Enhancing security in ETSI open source MANO with usage control capability 43
Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things 43
Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability 43
Using the ACE Framework to Enforce Access and Usage Control with Notifications of Revoked Access Rights 42
Walking Through the Deep: Gait Analysis for User Authentication through Deep Learning 42
Improving MQTT by inclusion of usage control 41
A Framework for Probabilistic Contract Compliance 41
On Probabilistic Application Compliance 41
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices 41
Exploiting If This Then That and Usage Control obligations for Smart Home security and management 41
Fast and effective clustering of spam emails based on structural similarity 41
Using IFTTT to Express and Enforce UCON Obligations 41
Privacy preserving data sharing and analysis for edge-based architectures 40
A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing 40
A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware 40
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project 40
I Find Your Behavior Disturbing: Static and Dynamic App Behavioral Analysis for Detection of Android Malware 39
Privacy-Preserving Text Mining as a Service 39
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach 39
Risk analysis of Android applications: A user-centric solution 39
Introducing probabilities in contract-based approaches for mobile application security 39
Digital waste sorting: A goal-based, self-learning approach to label spam email campaigns 39
Enhancing Usage Control for Performance: An Architecture for Systems of Systems 39
Towards Enforcing On-The-Fly Policies in BYOD Environments 38
Managing QoS in Smart Buildings Through Software Defined Network and Usage Control 38
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments 37
A Multi-Criteria-Based Evaluation of Android Applications 36
Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control 36
Obligation Management in Usage Control Systems 36
Privacy preserving distributed computation of private attributes for collaborative privacy aware usage control systems 35
Detection of diversity and stand parameters in Mediterranean forests using leaf-off discrete return LiDAR data 35
Session-dependent usage control for big data 35
Probabilistic Contract Compliance for Mobile Applications 34
MADAM: a Multi-Level Anomaly Detector for Android Malware 34
Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach 34
Risk analysis of Android applications: A user-centric solution 33
Stateful Data Usage Control for Android Mobile Devices 31
Risk Analysis of Android Applications: A Multi-Criteria and Usable Approach 31
Enforcement of U-XACML History-Based Usage Control Policy 30
Stateful Usage Control for Android Mobile Devices 30
BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware 30
MADAM: A Multi-Level Anomaly Detector for Android Malware 29
Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots 29
Concurrent History-based Usage Control Policies 28
Not so Crisp, malware! Fuzzy classification of android malware classes 27
Detection of repackaged mobile applications through a collaborative approach 26
Madam: Effective and efficient behavior-based android malware detection and prevention 26
Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots 25
Data-Sluice: Fine-grained Traffic Control for Android Application 25
LVS: A WiFi-based system to tackle Location Spoofing in location-based services 24
D8.3_Period 2 Management Report – WP8-Project Management_SIFIS-Home "Secure Interoperable Full-Stack Internet of Things for Smart Home" _ GA n. 883135 (H2020-SU-DS-2019) 19
Enhancing Android permission through Usage control: A BYOD use-case 19
Totale 3.258
Categoria #
all - tutte 11.372
article - articoli 3.466
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 297
Totale 15.135


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202423 0 0 0 0 0 0 0 0 1 0 20 2
2024/20251.344 7 9 133 39 339 63 5 96 80 100 248 225
2025/20261.891 71 97 222 317 433 88 290 131 71 132 39 0
Totale 3.258