AIELLO, MAURIZIO
 Distribuzione geografica
Continente #
NA - Nord America 739
AS - Asia 423
EU - Europa 96
OC - Oceania 1
Totale 1.259
Nazione #
US - Stati Uniti d'America 739
SG - Singapore 380
IT - Italia 50
FI - Finlandia 24
CN - Cina 21
KR - Corea 14
NL - Olanda 7
PK - Pakistan 6
DE - Germania 4
IE - Irlanda 3
AT - Austria 2
SE - Svezia 2
AU - Australia 1
ES - Italia 1
FR - Francia 1
GB - Regno Unito 1
HK - Hong Kong 1
UA - Ucraina 1
VN - Vietnam 1
Totale 1.259
Città #
Santa Clara 658
Singapore 266
Helsinki 24
Rome 15
Seoul 14
Milan 9
Mansehra 4
Dublin 3
Frankfurt am Main 3
Phoenix 3
Aci Catena 2
Amsterdam 2
Pisa 2
Tradate 2
Vienna 2
Ashburn 1
Boardman 1
Florence 1
Forest City 1
Ho Chi Minh City 1
Hong Kong 1
London 1
Mardan 1
Naples 1
Nuremberg 1
Palmi 1
San Giorgio a Cremano 1
Sant Just Desvern 1
Sydney 1
Verona 1
Totale 1.024
Nome #
3D fluid-dynamic ovarian cancer model resembling systemic drug administration for efficacy assay 20
Perpetrate cyber-attacks using IoT devices as attack vector: The ESP8266 use case 19
SlowITe, a Novel Denial of Service Attack Affecting MQTT 18
SlowTT: A Slow Denial of Service Against IoT Networks 17
Innovative Protection System Against Remote AT Command Attacks on ZigBee Networks 14
MQTTset, a New Dataset for Machine Learning Techniques on MQTT 14
Web security and data dumping: The Cookidump case 13
In vitro demonstration of intestinal absorption mechanisms of different sugars using 3D organotypic tissues in a fluidic device 13
Relazione conclusiva del Gruppo di Lavoro incaricato di individuare soluzioni tecnologiche e normative per la decodifica delle comunicazioni telefonichee telematiche che utilizzano la tecnologia VOIP (Voice Over Internet Protocol) 13
Performance assessment and analysis of DNS tunneling tools 12
Controllo di una pompa peristaltica Marlow Watson 323du attraverso creazione di hardware e software ad-hoc 12
Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities 12
A combined low-frequency electromagnetic and fluidic stimulation for a controlled drug ... 12
Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures 11
THE INSIDER THREAT PROBLEM 10
Slow DoS attacks: definition and categorisation 10
Unsupervised learning and rule extraction for Domain Name Server tunneling detection 10
Detection of DoS Attacks through Fourier Transform and Mutual Information 10
Intelligent integrated networks for aged people 10
Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service 10
A 3D fluid-dynamic cancer model to resemble the in vivo drug administration as a new platform for drug testing 10
A comparative performance evaluation of DNS tunneling tools 10
Remotely Exploiting AT Command Attacks on ZigBee Networks 9
Perpetrate cyber-threats using IoT devices as attack vector: the ESP8266 use case 9
A taxonomy of WLAN attacks and coutermeasures 9
DNS tunneling detection through statistical fingerprints of protocol messages and machine learning 9
Analysis, Development and Deployment of Statistical Anomaly Detection Techniques for real e-mail Traffic 9
Analisi degli aspetti di sicurezza, affidabilità, riservatezza (SAR) negli Intelligent Transportation Systems (ITS) 9
E-village: a virtual solution for real relationships 9
Detection and classification of slow DoS attacks targeting network servers 9
Detection of Innovative Low-rate Denial of Service Attacks Against Critical Infrastructures 9
Processo di stampa 3D con Formlabs Form 2 9
Darknet security: A categorization of attacks to the tor network 8
Mobile executions of Slow DoS attacks 8
Profiling DNS tunneling attacks with PCA and mutual information 8
Mobile Botnets Development: Issues and Solutions 8
Slowcomm: Design, development and performance evaluation of a new slow DoS attack 8
A combined low-frequency electromagnetic and fluidic stimulation for a controlled drug release from superparamagnetic calcium phosphate nanoparticles: potential application for cardiovascular diseases 8
Tecnologie Wi-Fi ed Utilizzo nelle Reti Cittadine 8
FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures 8
Comparison Between Franz Diffusion Cell and a novel Micro-physiological System for In Vitro Penetration Assay Using Different Skin Models 8
DESIGN AND DEVELOPMENT OF AN INTRUSION DETECTION SYSTEM FOR DETECTING TUNNELING ATTACKS 8
PANORAMICA DELLE IMPLEMENTAZIONI DI ATTACCHI DI TIPO "SLOW DOS ATTACKS" E RELATIVI ALGORITMI DI INTRUSION DETECTION 8
Cell-Laden Hydrogel as a Clinical-Relevant 3D Model for Analyzing Neuroblastoma Growth, Immunophenotype, and Susceptibility to Therapies 8
Introduzione del mail-gateway ESVA nella rete ARiGe 8
Evaluating Security of Low-Power Internet of Things Networks 8
Security aspects about Internet of Things networks and devices 8
Analysis of the Shellshock bug 8
Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection 7
ESP-01 Programming Instructions Using the Arduino IDE 7
Esecuzione di attacchi Denial of Service su apparati per l'ufficio ed IoT 7
Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure 7
On the feasibility of covert channels through Short-Message-Service 7
Statistical anomaly detection on real e-mail traffic 7
Statistical anomaly detection on real e-mail traffic 7
Security Analysis and Architectural Requirements for the Deployment of Remote Instrumentation Services 7
"Plant Design as a Service (PDAaS)" su bando POR/FAS del Distretto Ligure Tecnologie Marine 7
"Plant Design as a Service (PDAaS)" su bando POR/FAS del Distretto Ligure Tecnologie Marine 7
Zimbra Collaboration Suite: problematiche d integrazione e metodologie di utilizzo come strumento di produttività 7
Mobile Botnets Development: Issues and Solutions 7
null 7
Performance Analysis of DNS Tunneling Methodologies 7
Understanding DDoS Attacks From Mobile Devices 7
IT COMMUNICATIONS SECURITY FUNDAMENTALS 7
New Easy Tool for Virtual Access Networking (NETVAN) 7
DDoS Botnets: Operations and Toolkits 7
Feature transformation and Mutual Information for DNS tunneling analysis 7
A Network Traffic Representation Model for Detecting Application Layer Attacks 7
Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone 7
SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, limits, performance, remediations 6
CMES- Studio di Manufacturing Execution Systems (MES) basati su tecnologia Cloud Computing, per lo sviluppo di una nuova generazione di sistemi evoluti di automazione di fabbrica - Progetto Regione Liguria 6
Improvements in physical intrusion detection on LAN. PRISE 2008 6
Role of electromagnetic stimulation on cardiac cells activity and on magnetic nanoparticles for drug delivery to the heart 6
Introducing the SlowDrop Attack 6
Taxonomy of Slow DoS Attacks to Web Applications 6
Users Authentication Security 6
Captive Portal with Radius Authentication for Wireless Users 6
Implementation of the isDown Federated Network 6
Validation Framework Report 6
Malware Development on Mobile Environments 6
An Innovative 0-Day Attack against ZigBee: Exploitation and Protection System Analysis 6
Designing and Modeling the Slow Next DoS Attack 6
Nomina di Ausiliario di Polizia Giudiziaria 6
Analisi delle problematiche di sicurezza in ambiente Cloud 6
An On-Line Intrusion Detection Approach to Identify Low-Rate DoS Attacks 6
A Similarity Based Approach for Application DoS Attacks Detection 6
Tunneling HTTP 6
Are mobile botnets a possible threat? The case of SlowBot Net 6
Progettazione e costruzione di un sito di gruppo IEIIT attraverso un approccio "dynamic-to-static" 6
Analysis of the Logjam attack 6
Infrastruttura Informatica Virtualizzata attraverso VMware 6
Impatto degli aspetti di sicurezza sul consumo energetico di apparati TLC 6
3D Cloud in Life Sciences: an innovative framework for remote 2D/3D Visualization and Collaboration 6
A tool for complete log mail analysis : LMA 6
LMA - Log Mail Analyzer 6
A Survey on Current Tunneling Techniques 6
Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection 6
Measuring the energy consumption of cyber security 6
Attacchi a Infrastrutture di Rete Enterprise: Dinamica e Difese 6
SCELTA DEI PROTOCOLLI DI RETE PER LA PROGETTAZIONE DI UNA RETE AFFIDABILE 6
Totale 831
Categoria #
all - tutte 6.390
article - articoli 1.329
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 172
Totale 7.891


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202446 0 0 0 0 0 0 0 0 7 0 33 6
2024/20251.254 43 26 273 149 589 174 0 0 0 0 0 0
Totale 1.300