COLAJANNI, MICHELE
 Distribuzione geografica
Continente #
AS - Asia 1.876
NA - Nord America 1.803
EU - Europa 1.706
SA - Sud America 167
AF - Africa 158
OC - Oceania 10
Continente sconosciuto - Info sul continente non disponibili 1
Totale 5.721
Nazione #
US - Stati Uniti d'America 1.758
SG - Singapore 599
IT - Italia 506
GB - Regno Unito 479
CN - Cina 430
VN - Vietnam 284
DE - Germania 215
HK - Hong Kong 196
IN - India 148
BR - Brasile 116
CI - Costa d'Avorio 106
SE - Svezia 100
NL - Olanda 89
FR - Francia 81
RU - Federazione Russa 70
TR - Turchia 57
IE - Irlanda 51
CA - Canada 27
KR - Corea 26
ID - Indonesia 22
JO - Giordania 22
AT - Austria 20
JP - Giappone 20
FI - Finlandia 18
AR - Argentina 17
UA - Ucraina 16
MX - Messico 15
DZ - Algeria 12
PL - Polonia 12
ES - Italia 10
CO - Colombia 8
EC - Ecuador 8
TH - Thailandia 8
TW - Taiwan 8
PH - Filippine 7
ZA - Sudafrica 7
AU - Australia 6
CH - Svizzera 6
GR - Grecia 6
IQ - Iraq 6
NG - Nigeria 6
PY - Paraguay 6
BD - Bangladesh 5
IR - Iran 5
LK - Sri Lanka 5
MY - Malesia 5
PE - Perù 5
AE - Emirati Arabi Uniti 4
EG - Egitto 4
SA - Arabia Saudita 4
SM - San Marino 4
TG - Togo 4
TN - Tunisia 4
BG - Bulgaria 3
BH - Bahrain 3
CZ - Repubblica Ceca 3
HR - Croazia 3
IS - Islanda 3
MA - Marocco 3
NZ - Nuova Zelanda 3
OM - Oman 3
SC - Seychelles 3
VE - Venezuela 3
BY - Bielorussia 2
CL - Cile 2
CY - Cipro 2
IL - Israele 2
KE - Kenya 2
LB - Libano 2
LT - Lituania 2
MT - Malta 2
SZ - Regno dello Swaziland 2
ZW - Zimbabwe 2
A1 - Anonimo 1
AF - Afghanistan, Repubblica islamica di 1
AL - Albania 1
BB - Barbados 1
BE - Belgio 1
BW - Botswana 1
CR - Costa Rica 1
DO - Repubblica Dominicana 1
ET - Etiopia 1
FJ - Figi 1
GY - Guiana 1
KZ - Kazakistan 1
NA - Namibia 1
NO - Norvegia 1
PK - Pakistan 1
PT - Portogallo 1
RS - Serbia 1
UY - Uruguay 1
Totale 5.721
Città #
Southend 435
Singapore 379
Chandler 296
Hong Kong 183
Bologna 162
Santa Clara 158
Abidjan 106
Dong Ket 95
Ashburn 86
Princeton 86
Fairfield 76
Boardman 73
Beijing 68
Hefei 65
Ho Chi Minh City 58
Istanbul 52
Dublin 51
Hanoi 44
Milan 33
Seattle 33
Wilmington 32
Des Moines 29
Los Angeles 29
Berlin 27
Frankfurt am Main 27
Chicago 25
Medford 25
Redondo Beach 24
Amman 22
Hyderabad 22
Seoul 21
Cambridge 20
Modena 20
Rome 20
Houston 19
San Diego 19
Buffalo 17
New York 17
Ann Arbor 16
Dallas 15
Tokyo 15
Woodbridge 15
Bengaluru 12
Jakarta 12
Helsinki 11
Shanghai 11
São Paulo 11
Toronto 11
Olalla 10
Council Bluffs 9
Düsseldorf 9
Florence 9
Guangzhou 9
London 9
Paris 9
Amsterdam 8
Castelfidardo 8
Changsha 8
Ferrara 8
Sterling 8
Bloomfield Hills 7
Castel Guelfo di Bologna 7
Nuremberg 7
Orem 7
Qingdao 7
Turin 7
Vienna 7
Xi'an 7
Bangkok 6
Bexley 6
Feldkirch 6
Jacksonville 6
Lappeenranta 6
Mascalucia 6
Melbourne 6
Mumbai 6
Novate Milanese 6
Taipei 6
Worcester 6
Zhengzhou 6
Atlanta 5
Bogotá 5
Cesena 5
Chennai 5
Colombo 5
Detroit 5
Falls Church 5
Ferrara di Monte Baldo 5
Forlì 5
Haiphong 5
Moncton 5
Montreal 5
Nanjing 5
Trento 5
Warsaw 5
Anzola dell'Emilia 4
Asunción 4
Da Nang 4
Dals Långed 4
Fuzhou 4
Totale 3.410
Nome #
Vehicle Safe-Mode, Concept to Practice Limp-Mode in the Service of Cybersecurity 202
DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems 193
SWIMM: Servizi web interattivi e multimodali per la mobilità 185
FRAMH: A Federated Learning Risk-Based Authorization Middleware for Healthcare 170
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks 155
The Digital Girls Response to Pandemic: Impacts of in Presence and Online Extracurricular Activities on Girls Future Academic Choices 146
A Data-driven Characterization of Modern Android Spyware 141
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 141
Scalable, Confidential and Survivable Software Updates 130
Cybersecurity of Connected Autonomous Vehicles : A ranking based approach 130
A Fully Decentralized Architecture for Access Control Verification in Serverless Environments 129
Detection and Threat Prioritization of Pivoting Attacks in Large Networks 129
On the effectiveness of machine and deep learning for cyber security 128
Survivable zero trust for cloud computing environments 126
Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems 117
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises 117
Detecting attacks to internal vehicle networks through Hamming distance 116
A Zero Trust approach for the cybersecurity of Industrial Control Systems 115
Deep Reinforcement Adversarial Learning against Botnet Evasion Attacks 114
Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures 114
A collaborative framework for intrusion detection in mobile networks 113
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 113
Adaptive, scalable and reliable monitoring of big data on clouds 112
Identifying malicious hosts involved in periodic communications 110
Fog-based secure communications for low-power IoT devices 109
Analysis of high volumes of network traffic for Advanced Persistent Threat detection 108
Digital Forensics in Vessel Transportation Systems 103
Efficient detection of unauthorized data modification in cloud databases 103
Hardening Random Forest Cyber Detectors Against Adversarial Attacks 99
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors 98
Adversarial fingerprinting of cyber attacks based on stateful honeypots 98
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms 97
Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics 97
Guaranteeing correctness of bulk operations in outsourced databases 95
Security and privacy of location-based services for in-vehicle device systems 93
Autonomic request management algorithms for geographically distributed Internet-based systems 92
A symmetric cryptographic scheme for data integrity verification in cloud databases 89
Exploratory security analytics for anomaly detection 86
Distributed, concurrent and independent access to encrypted cloud databases 86
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators 84
Efficient License Management Based on Smart Contracts Between Software Vendors and Service Providers 84
Evaluating Tangle Distributed Ledger for Access Control Policy Distribution in Multi-region Cloud Environments 81
Detecting correlation between server resources for system management 81
Authorization transparency for accountable access to IoT services 80
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 76
Vehicle Safe-Mode, Limp-Mode in the Service of Cyber Security 75
Scalable architecture for online prioritization of cyber threats 75
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 74
Supporting sense-making and decision-making through time evolution analysis of open sources 73
Evading botnet detectors based on flows and random forest with adversarial samples 69
Flexible and Survivable Single Sign-On 68
Modeling realistic adversarial attacks against network intrusion detection systems 66
Scalable architecture for multi-user encrypted SQL operations on cloud database services 61
Cybersecurity Domains: A design pattern for creating Zero Trust Architectures through microsegmentation 48
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning 43
Totale 5.837
Categoria #
all - tutte 20.383
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 20.383


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021417 0 0 0 0 0 3 1 4 138 9 83 179
2021/20221.040 47 48 105 44 146 53 14 109 53 26 274 121
2022/20231.060 138 131 53 90 82 130 62 49 214 43 56 12
2023/2024433 23 51 30 48 37 37 22 17 12 44 71 41
2024/20251.429 45 209 131 116 227 75 65 45 42 148 51 275
2025/20261.408 105 249 269 281 364 140 0 0 0 0 0 0
Totale 5.837