LOMBARDI, FLAVIO
 Distribuzione geografica
Continente #
AS - Asia 74
EU - Europa 33
NA - Nord America 25
Totale 132
Nazione #
SG - Singapore 67
IT - Italia 26
US - Stati Uniti d'America 25
CN - Cina 6
NL - Olanda 4
IE - Irlanda 2
FR - Francia 1
KR - Corea 1
Totale 132
Città #
Singapore 55
Florence 11
Rome 8
Santa Clara 8
Amsterdam 4
Pisa 4
Altopascio 2
Dublin 2
Forest City 1
Milan 1
Seoul 1
Totale 97
Nome #
Exploring and analyzing the tor hidden services graph 31
A Java Architecture for Secure Reliable Multicast Data Transfer: Performance Evaluation 7
I seminari scientifici online e la loro promozione attraverso i social network. Il caso del ciclo di seminari AIM - Artificial Intelligence and Mathematics dell'Istituto per le Applicazioni del Calcolo "Mauro Picone" del CNR 6
Le diverse declinazioni della matematica per lo sviluppo dell'intelligenza artificiale nei seminari "AIM - Fundamentals and beyond". 5
A {J}ava Architecture for Secure Reliable Multicast Data Transfer: Performance Evaluation 3
A Reliable Multicast Approach To Replica Management for Grids 3
Processes for software development within the public administration 3
DruSiLa: an integrated, in-silico disease similarity-based approach for drug repurposing 3
Segment Routing v6 - Security Issues and Experimental Results 3
Some Results on Colored Network Contraction 3
Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues 3
AI-enabled bot and social media: A survey of tools, techniques, and platforms for the arms race 3
Onion under Microscope: An in-depth analysis of the Tor Web 3
A Java Implementation of a Reliable Multicast File Transfer Protocol: Design and Evaluation 2
CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix 2
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 2
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization 2
Virtualization and Cloud Security: Benefits, Caveats, and Future Developments 2
Graph Contraction on Attribute-Based Coloring 2
On SRv6 Security 2
Extending the UDDI API for service instance ranking 2
LENTO: Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments 2
Cyber risk management: technical and economic factors 2
Trusted, heterogeneous, and autonomic mobile cloud 2
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search 2
CURE-Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments 2
Traffic Data: Exploratory Data Analysis with Apache Accumulo 2
Security for Cloud Computing 2
AntiCheetah: an Autonomic Multi-round Approach for Reliable Computing 2
Secure Management of Virtualized Resources 2
Technology for Trusted Cloud Security: Survey and Open Issues 2
Traffic Data Classification for Police Activity 2
Transparent Java threads migration protocol over Peer2Peer 2
A system for predicting the run-time behavior of Web services 2
Spiders like Onions: on the Network of Tor Hidden Services 2
Thwarting Obfuscated Malware via Differential Fault Analysis 2
CoLLIDE: CLoud Latency-based IDEntification 2
Secure virtualization for cloud computing 1
Cost reduction and development speed-up through reusability: Evaluating experiences against a simplified model 1
HyBIS: Advanced introspection for effective windows guest protection 1
CloRExPa: Cloud resilience via execution path analysis 1
FRoDO: Fraud Resilient Device for Off-line micropayments 1
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset 1
Feasibility and benefits of migrating towards JEE: A real life case 1
CheR: Cheating resilience in the cloud via smart resource allocation 1
Leveraging the Grid for the Autonomic Management of Complex Infrastructures 1
GPU Algorithms for K-Anonymity in Microdata 1
A novel GPU-based implementation of the cube attack preliminary results against trivium 1
Analysing the Tor Web with High Performance Graph Algorithms 1
Jet-Lag Java Heterogeneous Log Analysis on the Grid: Architecture, Implementation and Performance Evaluation 1
Alterdroid: Differential fault analysis of obfuscated smartphone malware 1
A technical characterization of APTs by leveraging public resources 1
Assessment and Authorization in Private Cloud Security 1
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives 1
Totale 141
Categoria #
all - tutte 1.121
article - articoli 388
book - libri 15
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 163
Totale 1.687


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202439 0 0 0 0 0 0 0 0 2 2 24 11
2024/2025102 0 6 79 17 0 0 0 0 0 0 0 0
Totale 141