PRANDINI, MARCO
 Distribuzione geografica
Continente #
EU - Europa 3.595
NA - Nord America 3.133
AS - Asia 940
AF - Africa 184
OC - Oceania 12
SA - Sud America 5
Totale 7.869
Nazione #
US - Stati Uniti d'America 3.122
GB - Regno Unito 1.298
IT - Italia 966
DE - Germania 307
CN - Cina 279
SE - Svezia 231
SG - Singapore 221
UA - Ucraina 141
VN - Vietnam 137
IN - India 129
IE - Irlanda 117
FR - Francia 112
RU - Federazione Russa 101
BG - Bulgaria 82
TR - Turchia 78
CI - Costa d'Avorio 65
JO - Giordania 56
CH - Svizzera 53
TG - Togo 47
ZA - Sudafrica 46
EE - Estonia 44
BE - Belgio 32
FI - Finlandia 28
ES - Italia 20
NL - Olanda 18
AT - Austria 16
AU - Australia 12
SC - Seychelles 11
CA - Canada 9
PT - Portogallo 8
HK - Hong Kong 6
JP - Giappone 6
KR - Corea 6
DZ - Algeria 5
ID - Indonesia 5
PH - Filippine 5
PL - Polonia 5
DK - Danimarca 4
MY - Malesia 4
NG - Nigeria 4
NO - Norvegia 4
PE - Perù 4
CZ - Repubblica Ceca 3
IL - Israele 3
AO - Angola 2
GR - Grecia 2
RO - Romania 2
TW - Taiwan 2
AM - Armenia 1
BA - Bosnia-Erzegovina 1
CL - Cile 1
LB - Libano 1
LK - Sri Lanka 1
LY - Libia 1
MA - Marocco 1
MU - Mauritius 1
MX - Messico 1
PA - Panama 1
TN - Tunisia 1
Totale 7.869
Città #
Southend 1.196
Chandler 358
Fairfield 334
Ashburn 267
Bologna 217
Wilmington 199
Ann Arbor 184
Singapore 184
Woodbridge 171
Seattle 153
Houston 136
Princeton 126
Dublin 116
Lucca 116
Cambridge 114
Jacksonville 84
Sofia 82
Dong Ket 79
Istanbul 68
Abidjan 64
Nanjing 61
Amman 56
Westminster 52
Padova 50
Lomé 47
Milan 43
Medford 42
Santa Clara 40
Turin 39
Saint Petersburg 37
Berlin 36
Bremen 36
Como 31
New York 31
Boardman 29
Bern 27
Brussels 26
Jinan 26
Beijing 25
Shenyang 22
Helsinki 21
San Diego 21
Fremont 19
Barletta 18
Florence 18
Los Angeles 18
Olalla 18
Redmond 18
Cesena 17
Rimini 17
Hebei 16
Paris 16
Rome 15
Settimo Milanese 15
Trieste 15
Mülheim 14
Hangzhou 13
Vienna 13
Changsha 12
Falls Church 12
Nanchang 12
Amsterdam 11
Chicago 10
Des Moines 10
Forlì 10
Jiaxing 10
Mahé 10
Norwalk 10
Tianjin 10
Vicenza 10
Ravenna 9
Redwood City 9
Bergamo 8
Casalecchio di Reno 8
Hyderabad 8
Ningbo 8
Verona 8
Barcelona 7
Dearborn 7
Lappeenranta 7
Argelato 6
Dallas 6
Geneva 6
Haikou 6
Reggio Emilia 6
San Francisco 6
Shanghai 6
Zhengzhou 6
Belfast 5
Costa Mesa 5
Grizzana 5
Guangzhou 5
Hong Kong 5
Lanzhou 5
Madrid 5
Porto 5
Taiyuan 5
Taizhou 5
Abeokuta 4
Boydton 4
Totale 5.618
Nome #
Gamifying cultural experiences across the urban environment 235
Risk Analysis and Deployment Security Issues in a Multi-Agent System 188
Splitting the HTTPS Stream to Attack Secure Web Connections 185
A Microservice Architecture Use Case for Persons with Disabilities 183
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane 171
A Policy Checker Approach for Secure Industrial SDN 166
Federated Platooning: Insider Threats and Mitigations 166
Public transportation, ioT, trust and urban habits 160
null 157
A browser-based distributed system for the detection of HTTPS stripping attacks against web pages 156
Insider Threats in Emerging Mobility-as-a-Service Scenarios 153
I want to ride my bicycle: A microservice-based use case for a MaaS architecture 151
Security network policy enforcement through a SDN framework 150
Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs 149
A Model for E-voting Systems Evaluation Based on International Standards: Definition and Experimental Validation 140
Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation 139
An Integrated Application of Security Testing Methodologies to e-voting Systems 137
Towards a practical and effective security testing methodology 137
Discovering the city: Crowdsourcing and Personalized Urban Paths across Cultural Heritage 136
Redesigning remote system administration paradigms for enhanced security and flexibility 130
null 129
Microservice security: a systematic literature review 129
A Service-Oriented Approach to Crowdsensing for Accessible Smart Mobility Scenarios 128
Always the Same, Never the Same 126
Security Considerations about the Adoption of Web 2.0 Technologies in Sensitive e-Government Processes 124
A flexible approach to configuration of linux-based firewalls 122
Arguments against the Troll 121
CrowdSensing for smart mobility through a service-oriented architecture 120
A sensitivity analysis of common operating systems to ROP attacks 118
SecIVo: a quantitative security evaluation framework for internet voting schemes 117
Return-Oriented Programming 116
Data security issues in MaaS-enabling platforms 115
Extending a Smart Home Multi-Agent System with Role-Based Access Control 112
Reti Logiche 110
Mandatory Access Control applications to web hosting 109
Comment Spam Injection Made Easy 109
Privacy-Preserving Design of Data Processing Systems in the Public Transport Context 109
A microservice-based architecture for the development of accessible, crowdsensing-based mobility platforms 108
A messaging-based system for remote server administration 106
RoboAdmin: A Different Approach to Remote System Administration 105
Password Similarity Using Probabilistic Data Structures 105
MalwareStats: Improving Static Analysis of Modern Malware through Statistical Characterization of Samples 103
Rete e servizi: tra criticità e scenari futuri 100
ECSO Technical Paper on Digital Twin Security 99
Confining the Insider Threat in Mass Virtual Hosting Systems 99
TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies 95
Internet Voting: Fatally Torn Between Conflicting Goals? 92
Efficient authentication and verification of certificate status within public-key infrastructures 85
Sustainable Infrastructure Monitoring for Security-Oriented Purposes 84
Why Electronic Voting? 82
Internet voting security in Europe: a process-oriented perspective 80
RESEARCH DIRECTIONS IN E-VOTING 79
A Structured Approach to Insider Threat Monitoring for Offensive Security Teams 76
Design and Implementation of a New Public-Key Certificate Status Handling Scheme 76
A MULTI-PLATFORM TOOLKIT FOR THE CONFIGURATION OF PACKET-FILTERING FIREWALLS 76
When Operation Technology Meets Information Technology: Challenges and Opportunities 75
null 75
P4DM: Measure the Link Delay with P4 75
null 73
Securing a Linux-based Multi-User Web Server 72
PRIVACY ISSUES IN A CLEARING SYSTEM FOR A REGIONAL-SCALE PUBLIC TRANSPORT NETWORK 70
Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective 51
Data Flooding against Ransomware: Concepts and Implementations 50
Time sensitive networking security: issues of precision time protocol and its implementation 45
Integrating Personalized and Accessible Itineraries in MaaS Ecosystems Through Microservices 45
P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA 40
GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs 39
Metrics for Cyber-Physical Security: A call to action 39
A Security Monitoring Architecture based on Data Plane Programmability 38
A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems 35
Ranflood: A mitigation tool based on the principles of data flooding against ransomware 35
Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes 32
Real-time Pipeline Reconfiguration of P4 Programmable Switches to Efficiently Detect and Mitigate DDoS Attacks 29
Smart Mobility for All - A Global Federated Market for Mobility-as-a-Service Operators 28
A flexible scheme for on-line public-key certificate status updating and verification 25
A Highly Configurable Packet Sniffer Based on Field-Programmable Gate Arrays for Network Security Applications 24
Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics 22
Leveraging Data Plane Programmability to enhance service orchestration at the edge: A focus on industrial security 22
An application of efficient certificate status handling methods to high traffic authentication services 22
An efficient and secure alternative to OCSP for public-key certificate revocation 20
A Systematic Literature Review of Offensive and Defensive Security Solutions with Software Defined Network 19
Efficient handling of certificates within public-key infrastructures 19
A novel approach to on-line status authentication of public-key certificates 17
Prefazione al volume "Man in the browser" 14
Efficient certificate status handling within PKIs: An application to public administration services 13
A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers 12
Unleashing Dynamic Pipeline Reconfiguration of P4 Switches for Efficient Network Monitoring 9
On the Trade-off between Privacy and Information Quality in Location Based Services 6
Preface 5
Wi-Fi Sensing for Human Identification through ESP32 Devices: an Experimental Study 4
Security and Trust in the 6G Era: Risks and Mitigations 4
Totale 8.056
Categoria #
all - tutte 21.023
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 21.023


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.172 0 0 20 75 131 138 170 213 186 83 66 90
2020/20211.429 234 42 33 68 53 79 56 126 197 106 88 347
2021/20221.506 99 51 68 104 142 114 60 149 129 38 288 264
2022/20231.790 146 248 93 188 95 191 56 124 320 74 143 112
2023/2024842 51 102 46 52 54 183 99 45 36 79 51 44
2024/2025478 115 314 49 0 0 0 0 0 0 0 0 0
Totale 8.056