COLAJANNI, Michele
 Distribuzione geografica
Continente #
NA - Nord America 25.577
AS - Asia 13.963
EU - Europa 10.822
SA - Sud America 1.733
AF - Africa 305
OC - Oceania 91
Continente sconosciuto - Info sul continente non disponibili 23
Totale 52.514
Nazione #
US - Stati Uniti d'America 25.175
SG - Singapore 4.101
CN - Cina 3.934
GB - Regno Unito 3.622
HK - Hong Kong 2.516
DE - Germania 1.882
IT - Italia 1.317
BR - Brasile 1.307
VN - Vietnam 1.198
SE - Svezia 1.038
UA - Ucraina 558
FR - Francia 534
RU - Federazione Russa 528
KR - Corea 498
FI - Finlandia 491
TR - Turchia 359
IN - India 280
CA - Canada 236
BG - Bulgaria 224
ID - Indonesia 159
BD - Bangladesh 135
AR - Argentina 132
JP - Giappone 112
NL - Olanda 112
IQ - Iraq 101
MX - Messico 94
ZA - Sudafrica 91
AU - Australia 88
IR - Iran 88
ES - Italia 77
PK - Pakistan 71
BE - Belgio 68
EC - Ecuador 63
CO - Colombia 61
SA - Arabia Saudita 59
PL - Polonia 51
MA - Marocco 47
CL - Cile 44
AT - Austria 43
TW - Taiwan 43
RO - Romania 42
VE - Venezuela 40
AE - Emirati Arabi Uniti 39
MY - Malesia 38
LT - Lituania 35
PH - Filippine 34
IE - Irlanda 33
EG - Egitto 32
KE - Kenya 30
PE - Perù 28
TN - Tunisia 25
UZ - Uzbekistan 23
DZ - Algeria 22
AZ - Azerbaigian 21
PY - Paraguay 21
BO - Bolivia 20
JO - Giordania 20
EU - Europa 17
GR - Grecia 17
NP - Nepal 17
TH - Thailandia 17
AL - Albania 16
CH - Svizzera 15
NO - Norvegia 15
ET - Etiopia 14
IL - Israele 14
UY - Uruguay 14
PA - Panama 13
PT - Portogallo 11
CZ - Repubblica Ceca 10
BY - Bielorussia 9
CR - Costa Rica 9
KW - Kuwait 9
SI - Slovenia 9
TT - Trinidad e Tobago 9
EE - Estonia 8
HU - Ungheria 8
LB - Libano 8
PS - Palestinian Territory 8
SY - Repubblica araba siriana 8
DO - Repubblica Dominicana 7
GT - Guatemala 7
HN - Honduras 7
LK - Sri Lanka 7
LV - Lettonia 7
SK - Slovacchia (Repubblica Slovacca) 7
CI - Costa d'Avorio 6
CY - Cipro 6
DK - Danimarca 6
HR - Croazia 6
JM - Giamaica 6
KG - Kirghizistan 6
KZ - Kazakistan 6
RS - Serbia 6
ZW - Zimbabwe 6
BH - Bahrain 5
NG - Nigeria 5
OM - Oman 5
AO - Angola 4
GA - Gabon 4
Totale 52.434
Città #
Fairfield 2.778
Southend 2.670
Singapore 2.531
Hong Kong 2.426
Santa Clara 2.159
Ashburn 2.011
Woodbridge 1.819
Houston 1.485
Chandler 1.427
Ann Arbor 1.172
Jacksonville 1.168
Hefei 1.077
Seattle 1.022
Wilmington 975
Cambridge 903
Dearborn 753
San Jose 587
Nyköping 562
Beijing 546
London 535
Seoul 451
Ho Chi Minh City 390
The Dalles 329
Los Angeles 293
Helsinki 291
Hanoi 285
Modena 280
San Diego 279
Council Bluffs 257
Princeton 237
Chicago 219
Sofia 214
New York 212
Eugene 202
Izmir 168
Lauterbourg 166
Redwood City 164
Buffalo 159
Bremen 142
Milan 133
Moscow 130
Des Moines 120
São Paulo 113
Shanghai 110
Ottawa 105
Dallas 101
Tokyo 96
Bologna 92
Salt Lake City 83
Frankfurt am Main 75
Boardman 67
Munich 65
Jakarta 61
Falls Church 58
Rome 56
Brussels 55
Norwalk 55
Orem 53
Columbus 52
Parma 52
Nuremberg 50
Atlanta 49
Guangzhou 47
Haiphong 47
Amsterdam 46
Baghdad 46
Kent 46
Nanjing 46
Chennai 45
Da Nang 45
Tehran 45
Tampa 44
Johannesburg 39
Rio de Janeiro 39
Belo Horizonte 37
Manchester 37
Gelsenkirchen 36
Denver 35
Stockholm 35
Elk Grove Village 34
Phoenix 34
Warsaw 33
Dhaka 32
Montreal 32
Perth 32
Brasília 31
Dublin 31
Kunming 31
Grafing 29
Jeddah 29
Nairobi 27
Surabaya 27
Brooklyn 26
Mexico City 26
Biên Hòa 24
Falkenstein 24
Jinan 24
Toronto 24
Dongguan 23
Lima 23
Totale 36.486
Nome #
Assessing the overhead and scalability of system monitors for large data centers 824
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection 542
Analysis of high volumes of network traffic for Advanced Persistent Threat detection 530
Detection and Threat Prioritization of Pivoting Attacks in Large Networks 520
CAINE: A new open-source live distribution for digital forensics 491
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises 491
A collaborative framework for intrusion detection in mobile networks 458
A software architecture for the analysis of large sets of data streams in cloud infrastructures 445
A symmetric cryptographic scheme for data integrity verification in cloud databases 436
Adaptive, scalable and reliable monitoring of big data on clouds 402
A Framework for Automating Security Assessments with Deductive Reasoning 400
Vehicle Safe-Mode, Limp-Mode in the Service of Cyber Security 387
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 377
Dynamic load balancing for network intrusion detection systems based on distributed architectures 371
Security and Confidentality Solutions for Public Cloud Database Services 365
A cluster-based Web system providing differentiated and guaranteed services 364
A scalable architecture for cooperative Web caching 354
Scalable architecture for multi-user encrypted SQL operations on cloud database services 350
Access control enforcement on query-aware encrypted cloud databases 348
Identifying malicious hosts involved in periodic communications 347
Cybersecurity of Connected Autonomous Vehicles : A ranking based approach 345
A distributed infrastructure supporting personalized services for the Mobile Web 343
Supporting sense-making and decision-making through time evolution analysis of open sources 341
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms 341
On the effectiveness of machine and deep learning for cyber security 335
A scalable architecture for real-time monitoring of large information systems 332
Distributed, concurrent and independent access to encrypted cloud databases 329
Adaptive traffic filtering for efficient and secure IP mobility 327
Exploratory security analytics for anomaly detection 326
The problem of NIDS evasion in mobile networks 325
Autonomic request management algorithms for geographically distributed Internet-based systems 321
A Novel Intermediary Framework for Dynamic Edge Service Composition 320
Scalable architecture for online prioritization of cyber threats 319
Benchmarking models and tools for distributed Web-server systems 315
Efficient detection of unauthorized data modification in cloud databases 314
Detecting attacks to internal vehicle networks through Hamming distance 312
Vehicle Safe-Mode, Concept to Practice Limp-Mode in the Service of Cybersecurity 312
A client-aware dispatching algorithm for Web clusters providing multiple services 309
Dynamic request management algorithms for Web-based services in cloud computing 309
A two-level distributed architecture for the support of content adaptation and delivery services 305
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 302
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 302
Design and testing of scalable Web-based systems with performance constraints 302
Collaborative architecture for malware detection and analysis 301
Fog-based secure communications for low-power IoT devices 300
Models and framework for supporting run-time decisions in Web-based systems 299
Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale 296
Real-time models supporting resource management decisions in highly variable systems 296
Real-time adaptive algorithm for resource monitoring 295
Guaranteeing correctness of bulk operations in outsourced databases 295
Dual time-scale distributed capacity allocation and load redirect algorithms for cloud systems 293
Fine grain performance evaluation of e-commerce sites 290
A performance study of robust load sharing strategies for distributed heterogeneous Web server systems 289
A cluster-based Web system providing differentiated and guaranteed services 288
Cooperative Architectures and Algorithms for Discovery and Transcoding of Multi-version Contents 288
Defeating NIDS evasion in Mobile IPv6 networks 288
Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems 287
Security and privacy of location-based services for in-vehicle device systems 287
A Data-driven Characterization of Modern Android Spyware 286
A Distributed Cooperation Schemes for Document Lookup in Geographically Dispersed Cache Servers 285
Algorithms for Web Service Selection with Static and Dynamic Requirements 284
Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics 282
The state of the art in locally distributed Web-server systems 280
Kernel-based Web switches providing content-aware routing 280
Selective and early threat detection in large networked systems 277
Hybrid cooperative schemes for scalable and stable performance of Web content delivery 276
Characteristics and evolution of content popularity and user relations in social networks 276
Authorization transparency for accountable access to IoT services 274
Technological solutions to support Mobile Web 2.0 services 273
Selective alerts for run-time protection of distributed systems 273
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 273
A distributed architecture of edge proxy servers for cooperative transcoding 272
Runtime state change detector of computer system resources under non stationary conditions 266
Self-inspection mechanisms for the support of autonomic decisions in Internet-based systems 265
Runtime prediction models for Web-based system resources 264
Hot set identification for social network applications 264
Resource Management Strategies for the Mobile Web 261
Supporting security and consistency for cloud database 260
A distributed architecture for gracefully degradable Web-based services 259
Web System Reliability and Performance 257
Performance study of dispatching algorithms in multi-tier Web architectures 256
A Two-level Distributed Architecture for Web Content Adaptation and Delivery 256
DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems 256
Adaptive algorithms for efficient content management in social network services 255
Data clustering based on correlation analysis applied to highly variable domains 253
Survivable zero trust for cloud computing environments 253
Multistep attack detection and alert correlation in intrusion detection systems 251
Distribution of adaptation services for Ubiquitous Web access driven by user profile 250
Cyber Attacks on Financial Critical Infrastructures 250
Self-adaptive techniques for the load trend evaluation of internal system resources 250
Collaborative Attack Detection Using Distributed Hash Tables 248
Peer-to-Peer workload characterization: techniques and open issues 248
Distributed architectures for high performance and privacy-aware content generation and delivery 248
Performance comparison of distributed architectures for content adaptation and delivery of Web resources 248
Impact of technology trends on performance of Web-based services 247
Detecting behavioral variations in system resources of large data centers 245
A hierarchical approach for bounding the completion time distribution of stochastic task graphs 245
Threshold-based reconfiguration strategies for gracefully degradable parallel computations 244
Performance Evolution of Mobile Web-Based Services 244
Dynamic load management of virtual machines in a cloud architecture 243
Totale 31.557
Categoria #
all - tutte 184.358
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 184.358


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.439 0 0 0 0 0 0 0 0 0 852 352 235
2021/20224.148 140 498 479 180 109 197 265 183 428 336 892 441
2022/20233.839 434 477 241 341 530 602 50 387 473 43 119 142
2023/20243.518 99 150 169 249 679 422 939 303 78 86 89 255
2024/20258.775 360 100 101 531 1.569 1.095 624 608 1.001 449 966 1.371
2025/202613.658 737 705 1.450 1.445 2.269 1.268 1.797 771 1.321 1.895 0 0
Totale 52.772