PRANDINI, MARCO
 Distribuzione geografica
Continente #
AS - Asia 5.155
NA - Nord America 4.831
EU - Europa 4.778
AF - Africa 354
SA - Sud America 228
OC - Oceania 15
Totale 15.361
Nazione #
US - Stati Uniti d'America 4.752
CN - Cina 1.477
IT - Italia 1.433
SG - Singapore 1.407
GB - Regno Unito 1.349
VN - Vietnam 1.112
DE - Germania 458
HK - Hong Kong 313
FR - Francia 254
SE - Svezia 239
IN - India 199
KR - Corea 179
BR - Brasile 161
RU - Federazione Russa 160
UA - Ucraina 154
NL - Olanda 133
IE - Irlanda 128
CI - Costa d'Avorio 116
JP - Giappone 98
TR - Turchia 91
FI - Finlandia 87
BG - Bulgaria 85
SC - Seychelles 68
JO - Giordania 58
ZA - Sudafrica 58
CH - Svizzera 55
EE - Estonia 50
TG - Togo 47
PH - Filippine 45
ES - Italia 44
CA - Canada 36
AT - Austria 35
BE - Belgio 35
MX - Messico 35
ID - Indonesia 32
AR - Argentina 26
TW - Taiwan 26
TH - Thailandia 23
PL - Polonia 21
BD - Bangladesh 19
IQ - Iraq 19
EG - Egitto 17
AU - Australia 15
PT - Portogallo 10
NO - Norvegia 9
PK - Pakistan 9
CL - Cile 8
CO - Colombia 8
MY - Malesia 8
UZ - Uzbekistan 8
DK - Danimarca 7
DZ - Algeria 7
EC - Ecuador 7
GR - Grecia 7
MA - Marocco 7
PE - Perù 7
TN - Tunisia 7
IL - Israele 6
NG - Nigeria 6
KE - Kenya 5
PY - Paraguay 5
RO - Romania 5
AO - Angola 4
BA - Bosnia-Erzegovina 4
CZ - Repubblica Ceca 4
ET - Etiopia 4
IR - Iran 4
SA - Arabia Saudita 4
VE - Venezuela 4
HR - Croazia 3
JM - Giamaica 3
LK - Sri Lanka 3
PS - Palestinian Territory 3
BH - Bahrain 2
CG - Congo 2
DO - Repubblica Dominicana 2
LB - Libano 2
LT - Lituania 2
NP - Nepal 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
AL - Albania 1
AM - Armenia 1
BO - Bolivia 1
BY - Bielorussia 1
CD - Congo 1
CY - Cipro 1
GH - Ghana 1
GT - Guatemala 1
KZ - Kazakistan 1
LY - Libia 1
MD - Moldavia 1
MU - Mauritius 1
NA - Namibia 1
NI - Nicaragua 1
OM - Oman 1
PA - Panama 1
QA - Qatar 1
SY - Repubblica araba siriana 1
TZ - Tanzania 1
Totale 15.360
Città #
Southend 1.196
Singapore 1.003
Ashburn 466
Hefei 422
Chandler 358
Fairfield 334
Santa Clara 321
Bologna 314
San Jose 314
Hong Kong 296
Ho Chi Minh City 253
Hanoi 228
Wilmington 199
Ann Arbor 184
Woodbridge 171
Seattle 158
Seoul 152
Beijing 143
Houston 139
Princeton 126
Boardman 125
Dallas 125
Dublin 125
Lucca 116
Cambridge 115
Abidjan 114
Jacksonville 85
Sofia 84
Dong Ket 79
Tokyo 79
Milan 78
Los Angeles 74
Istanbul 71
Lauterbourg 70
Nanjing 67
Amman 58
New York 55
Frankfurt am Main 54
Munich 52
Westminster 52
Padova 51
The Dalles 51
Haiphong 48
Helsinki 48
Lomé 47
Medford 42
Turin 42
Buffalo 41
Da Nang 40
Berlin 38
Bremen 37
Cesena 37
Rome 37
Saint Petersburg 37
Jinan 34
Council Bluffs 32
Como 31
Guangzhou 31
Bengaluru 29
São Paulo 29
Bern 27
Brussels 27
Chicago 27
Vienna 27
Redondo Beach 25
Shanghai 25
Paris 24
Amsterdam 23
Florence 22
Parma 22
San Diego 22
Shenyang 22
Changsha 21
Hangzhou 20
Fremont 19
Turku 19
Barletta 18
Olalla 18
Redmond 18
Lappeenranta 17
Rimini 17
Cairo 16
Hebei 16
Hải Dương 16
Tianjin 16
Phoenix 15
Settimo Milanese 15
Trieste 15
Brooklyn 14
Jakarta 14
Mülheim 14
San Francisco 14
Toronto 14
Forlì 13
London 13
Reggio Emilia 13
Taipei 13
Xi'an 13
Can Tho 12
Falkenstein 12
Totale 9.965
Nome #
Gamifying cultural experiences across the urban environment 344
Risk Analysis and Deployment Security Issues in a Multi-Agent System 273
ECSO Technical Paper on Digital Twin Security 271
A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems 268
GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs 266
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane 252
A Structured Approach to Insider Threat Monitoring for Offensive Security Teams 241
Splitting the HTTPS Stream to Attack Secure Web Connections 240
A Microservice Architecture Use Case for Persons with Disabilities 237
Federated Platooning: Insider Threats and Mitigations 225
A Policy Checker Approach for Secure Industrial SDN 222
P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA 221
Microservice security: a systematic literature review 216
Security network policy enforcement through a SDN framework 213
Public transportation, ioT, trust and urban habits 207
Insider Threats in Emerging Mobility-as-a-Service Scenarios 207
I want to ride my bicycle: A microservice-based use case for a MaaS architecture 206
Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation 206
A browser-based distributed system for the detection of HTTPS stripping attacks against web pages 203
When Operation Technology Meets Information Technology: Challenges and Opportunities 200
An Integrated Application of Security Testing Methodologies to e-voting Systems 200
Discovering the city: Crowdsourcing and Personalized Urban Paths across Cultural Heritage 197
Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs 193
Time sensitive networking security: issues of precision time protocol and its implementation 192
A Model for E-voting Systems Evaluation Based on International Standards: Definition and Experimental Validation 192
Reti Logiche 188
A Service-Oriented Approach to Crowdsensing for Accessible Smart Mobility Scenarios 188
A flexible approach to configuration of linux-based firewalls 184
Password Similarity Using Probabilistic Data Structures 184
Always the Same, Never the Same 183
Towards a practical and effective security testing methodology 182
Data Flooding against Ransomware: Concepts and Implementations 181
Redesigning remote system administration paradigms for enhanced security and flexibility 180
Security Considerations about the Adoption of Web 2.0 Technologies in Sensitive e-Government Processes 180
CrowdSensing for smart mobility through a service-oriented architecture 174
Mandatory Access Control applications to web hosting 173
Extending a Smart Home Multi-Agent System with Role-Based Access Control 170
Privacy-Preserving Design of Data Processing Systems in the Public Transport Context 169
Data security issues in MaaS-enabling platforms 169
TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies 169
Arguments against the Troll 167
Leveraging Data Plane Programmability to enhance service orchestration at the edge: A focus on industrial security 165
A sensitivity analysis of common operating systems to ROP attacks 165
A Systematic Literature Review of Offensive and Defensive Security Solutions with Software Defined Network 163
RoboAdmin: A Different Approach to Remote System Administration 162
Return-Oriented Programming 162
Sustainable Infrastructure Monitoring for Security-Oriented Purposes 162
A microservice-based architecture for the development of accessible, crowdsensing-based mobility platforms 160
SecIVo: a quantitative security evaluation framework for internet voting schemes 159
Unleashing Dynamic Pipeline Reconfiguration of P4 Switches for Efficient Network Monitoring 158
null 157
A Highly Configurable Packet Sniffer Based on Field-Programmable Gate Arrays for Network Security Applications 156
Ranflood: A mitigation tool based on the principles of data flooding against ransomware 156
Comment Spam Injection Made Easy 155
A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers 154
A messaging-based system for remote server administration 152
Confining the Insider Threat in Mass Virtual Hosting Systems 152
MalwareStats: Improving Static Analysis of Modern Malware through Statistical Characterization of Samples 152
Efficient authentication and verification of certificate status within public-key infrastructures 150
Rete e servizi: tra criticità e scenari futuri 150
P4DM: Measure the Link Delay with P4 148
Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays 143
Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics 143
Internet Voting: Fatally Torn Between Conflicting Goals? 142
Detection of Ladder Logic Bombs in PLC Control Programs: an Architecture based on Formal Verification 138
Design and Implementation of a New Public-Key Certificate Status Handling Scheme 136
Internet voting security in Europe: a process-oriented perspective 135
Integrating Personalized and Accessible Itineraries in MaaS Ecosystems Through Microservices 134
Choreography-Defined Networks: A Case Study on DoS Mitigation 132
null 129
Un approccio pratico di ‘legal design’: la Guida al regolamento UE Cyber Resilience Act. Metodo, obiettivi ed impatti 128
Why Electronic Voting? 128
RESEARCH DIRECTIONS IN E-VOTING 123
Securing a Linux-based Multi-User Web Server 121
Real-time Pipeline Reconfiguration of P4 Programmable Switches to Efficiently Detect and Mitigate DDoS Attacks 121
PRIVACY ISSUES IN A CLEARING SYSTEM FOR A REGIONAL-SCALE PUBLIC TRANSPORT NETWORK 120
Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective 113
A MULTI-PLATFORM TOOLKIT FOR THE CONFIGURATION OF PACKET-FILTERING FIREWALLS 112
Preface 111
Metrics for Cyber-Physical Security: A call to action 102
A Security Monitoring Architecture based on Data Plane Programmability 96
Security and Trust in the 6G Era: Risks and Mitigations 95
Investigating operational technology attacks as code 94
An efficient and secure alternative to OCSP for public-key certificate revocation 93
In-Network Encryption for Secure Industrial Control Systems Communications 93
On the Trade-off between Privacy and Information Quality in Location Based Services 92
Smart Mobility for All - A Global Federated Market for Mobility-as-a-Service Operators 84
Wi-Fi Sensing for Human Identification through ESP32 Devices: an Experimental Study 83
A flexible scheme for on-line public-key certificate status updating and verification 83
Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes 76
An application of efficient certificate status handling methods to high traffic authentication services 76
null 75
null 73
Efficient handling of certificates within public-key infrastructures 72
DEFENDING REALITY: HUMAN-AI COLLABORATION TO UNVEIL DEEPFAKE INFORMATION MANIPULATION 69
A novel approach to on-line status authentication of public-key certificates 65
Efficient certificate status handling within PKIs: An application to public administration services 58
Prefazione al volume "Man in the browser" 48
Empowering Operational Technology Cybersecurity with the Asset Administration Shell 45
Unraveling The Link Between Sociodemographics and Cybersecurity 41
Totale 15.593
Categoria #
all - tutte 40.459
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 40.459


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021541 0 0 0 0 0 0 0 0 0 106 88 347
2021/20221.506 99 51 68 104 142 114 60 149 129 38 288 264
2022/20231.790 146 248 93 188 95 191 56 124 320 74 143 112
2023/2024842 51 102 46 52 54 183 99 45 36 79 51 44
2024/20252.646 115 314 231 157 450 210 211 78 45 121 243 471
2025/20265.369 455 580 631 371 648 322 736 234 1.082 310 0 0
Totale 15.593