COLAJANNI, Michele
 Distribuzione geografica
Continente #
NA - Nord America 18.692
EU - Europa 8.347
AS - Asia 3.296
OC - Oceania 72
AF - Africa 46
SA - Sud America 44
Continente sconosciuto - Info sul continente non disponibili 20
Totale 30.517
Nazione #
US - Stati Uniti d'America 18.548
GB - Regno Unito 3.044
DE - Germania 1.641
HK - Hong Kong 1.282
IT - Italia 963
SE - Svezia 954
CN - Cina 827
UA - Ucraina 508
SG - Singapore 471
FI - Finlandia 380
FR - Francia 300
TR - Turchia 298
BG - Bulgaria 214
CA - Canada 134
IR - Iran 83
RU - Federazione Russa 81
IN - India 75
AU - Australia 71
ID - Indonesia 59
BE - Belgio 54
JP - Giappone 38
NL - Olanda 32
KR - Corea 31
RO - Romania 31
LT - Lituania 26
VN - Vietnam 25
SA - Arabia Saudita 24
IE - Irlanda 22
EU - Europa 17
MY - Malesia 16
TW - Taiwan 16
ES - Italia 15
GR - Grecia 12
PE - Perù 12
EC - Ecuador 9
NO - Norvegia 9
PK - Pakistan 9
ZA - Sudafrica 9
BR - Brasile 8
MX - Messico 8
PH - Filippine 8
PL - Polonia 8
AL - Albania 6
AT - Austria 6
CZ - Repubblica Ceca 6
DZ - Algeria 6
EG - Egitto 6
LK - Sri Lanka 6
IQ - Iraq 5
MA - Marocco 5
AZ - Azerbaigian 4
BY - Bielorussia 4
CH - Svizzera 4
HU - Ungheria 4
JO - Giordania 4
TH - Thailandia 4
TN - Tunisia 4
AE - Emirati Arabi Uniti 3
AR - Argentina 3
CL - Cile 3
CO - Colombia 3
EE - Estonia 3
HR - Croazia 3
IL - Israele 3
KE - Kenya 3
LV - Lettonia 3
MK - Macedonia 3
NG - Nigeria 3
RS - Serbia 3
VE - Venezuela 3
ZW - Zimbabwe 3
A2 - ???statistics.table.value.countryCode.A2??? 2
CM - Camerun 2
DK - Danimarca 2
PT - Portogallo 2
PY - Paraguay 2
UG - Uganda 2
A1 - Anonimo 1
AF - Afghanistan, Repubblica islamica di 1
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
CI - Costa d'Avorio 1
CR - Costa Rica 1
GN - Guinea 1
LB - Libano 1
LC - Santa Lucia 1
MD - Moldavia 1
MO - Macao, regione amministrativa speciale della Cina 1
MT - Malta 1
NP - Nepal 1
NZ - Nuova Zelanda 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SR - Suriname 1
Totale 30.517
Città #
Fairfield 2.777
Southend 2.670
Woodbridge 1.819
Houston 1.470
Chandler 1.426
Ashburn 1.385
Hong Kong 1.267
Ann Arbor 1.172
Jacksonville 1.166
Seattle 1.013
Wilmington 957
Cambridge 903
Dearborn 753
Nyköping 562
Singapore 327
San Diego 274
Beijing 266
Modena 251
Princeton 237
Sofia 213
Eugene 202
Helsinki 196
Izmir 164
Redwood City 164
Bremen 142
New York 125
Des Moines 119
Ottawa 97
London 74
Boardman 66
Bologna 65
Falls Church 58
Norwalk 54
Shanghai 52
Brussels 49
Milan 47
Parma 46
Tehran 44
Nanjing 40
Rome 37
Gelsenkirchen 36
Hefei 35
Perth 32
Kunming 30
Grafing 29
Tokyo 27
Jakarta 26
Dongguan 21
Jinan 21
Surabaya 21
Dublin 20
Indiana 20
Los Angeles 20
Jeddah 19
Dong Ket 18
Guangzhou 18
Mountain View 15
Horia 14
Hounslow 14
Phoenix 14
Amsterdam 13
Berlin 13
Chiswick 13
Kilburn 13
Verona 13
Lima 12
Taipei 12
Turin 12
Liverpool 11
Melbourne 11
Albuquerque 10
Ferrara 10
Hobart 10
Toronto 10
Tulsa 10
Wuhan 10
Acton 9
Catania 9
Manchester 9
Sassuolo 9
Zhengzhou 9
Fuzhou 8
Islington 8
Istanbul 8
Lund 8
Nanchang 8
Piacenza 8
Santa Clara 8
Shenzhen 8
Sydney 8
Auburn Hills 7
Augusta 7
Bari 7
Changsha 7
Hangzhou 7
Hanover 7
Hebei 7
Kuala Lumpur 7
Las Vegas 7
Nonnweiler 7
Totale 23.569
Nome #
Assessing the overhead and scalability of system monitors for large data centers 676
Analysis of high volumes of network traffic for Advanced Persistent Threat detection 408
Detection and Threat Prioritization of Pivoting Attacks in Large Networks 403
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises 346
CAINE: A new open-source live distribution for digital forensics 338
A collaborative framework for intrusion detection in mobile networks 308
A software architecture for the analysis of large sets of data streams in cloud infrastructures 304
A symmetric cryptographic scheme for data integrity verification in cloud databases 286
Security and Confidentality Solutions for Public Cloud Database Services 271
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection 270
Adaptive, scalable and reliable monitoring of big data on clouds 262
Vehicle Safe-Mode, Limp-Mode in the Service of Cyber Security 254
Supporting sense-making and decision-making through time evolution analysis of open sources 233
Cybersecurity of Connected Autonomous Vehicles : A ranking based approach 228
Vehicle Safe-Mode, Concept to Practice Limp-Mode in the Service of Cybersecurity 225
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 219
Exploratory security analytics for anomaly detection 216
The problem of NIDS evasion in mobile networks 215
Detecting attacks to internal vehicle networks through Hamming distance 215
Identifying malicious hosts involved in periodic communications 213
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms 209
On the effectiveness of machine and deep learning for cyber security 209
A cluster-based Web system providing differentiated and guaranteed services 208
Scalable architecture for multi-user encrypted SQL operations on cloud database services 204
A scalable architecture for real-time monitoring of large information systems 203
Dynamic load balancing for network intrusion detection systems based on distributed architectures 198
A scalable architecture for cooperative Web caching 196
Guaranteeing correctness of bulk operations in outsourced databases 194
Models and framework for supporting run-time decisions in Web-based systems 192
Dynamic request management algorithms for Web-based services in cloud computing 191
Access control enforcement on query-aware encrypted cloud databases 189
Scalable architecture for online prioritization of cyber threats 189
Fog-based secure communications for low-power IoT devices 186
Benchmarking models and tools for distributed Web-server systems 184
Design and testing of scalable Web-based systems with performance constraints 183
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 181
A two-level distributed architecture for the support of content adaptation and delivery services 181
Efficient detection of unauthorized data modification in cloud databases 180
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 179
Autonomic request management algorithms for geographically distributed Internet-based systems 178
Distributed, concurrent and independent access to encrypted cloud databases 178
Kernel-based Web switches providing content-aware routing 176
Adaptive traffic filtering for efficient and secure IP mobility 176
Performance study of dispatching algorithms in multi-tier Web architectures 176
Multistep attack detection and alert correlation in intrusion detection systems 175
A Novel Intermediary Framework for Dynamic Edge Service Composition 174
Algorithms for Web Service Selection with Static and Dynamic Requirements 174
Open Source Live Distributions for Computer Forensics 173
A distributed infrastructure supporting personalized services for the Mobile Web 172
Defeating NIDS evasion in Mobile IPv6 networks 172
Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics 172
Dual time-scale distributed capacity allocation and load redirect algorithms for cloud systems 172
A Data-driven Characterization of Modern Android Spyware 170
Supporting security and consistency for cloud database 169
Real-time adaptive algorithm for resource monitoring 169
A cluster-based Web system providing differentiated and guaranteed services 168
Adaptive algorithms for efficient content management in social network services 168
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 168
Dynamic load balancing on web-server systems 167
Web System Reliability and Performance 165
Authorization transparency for accountable access to IoT services 164
Fine grain performance evaluation of e-commerce sites 162
Peer-to-Peer workload characterization: techniques and open issues 162
Collaborative architecture for malware detection and analysis 161
Security and privacy of location-based services for in-vehicle device systems 161
Selective and early threat detection in large networked systems 160
Characteristics and evolution of content popularity and user relations in social networks 159
Runtime prediction models for Web-based system resources 159
Resource Management Strategies for the Mobile Web 159
An accurate model for the performance analysis of deterministic wormhole routing 157
Real-time models supporting resource management decisions in highly variable systems 157
Hybrid cooperative schemes for scalable and stable performance of Web content delivery 156
Hot set identification for social network applications 156
A distributed architecture of edge proxy servers for cooperative transcoding 155
Impact of memory technology trends on performance of Web systems 155
Technological solutions to support Mobile Web 2.0 services 154
Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems 153
Cyber Attacks on Financial Critical Infrastructures 153
Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale 153
Performance comparison of distributed architectures for content adaptation and delivery of Web resources 153
Self-inspection mechanisms for the support of autonomic decisions in Internet-based systems 152
Subcube matrix decomposition: A unifying view for LU factorization on multicomputers 152
Impact of technology trends on performance of Web-based services 152
A Distributed Cooperation Schemes for Document Lookup in Geographically Dispersed Cache Servers 150
Data clustering based on correlation analysis applied to highly variable domains 150
PSBLAS: A library for parallel linear algebra computation on sparse matrices 149
The state of the art in locally distributed Web-server systems 148
Distributed architectures for high performance and privacy-aware content generation and delivery 148
Detecting behavioral variations in system resources of large data centers 148
Distributed architectures for Web content adaptation and delivery 147
Analysis of task assignment policies in scalable distributed Web server systems 146
A client-aware dispatching algorithm for Web clusters providing multiple services 146
Selective alerts for run-time protection of distributed systems 145
Two-Tier Cooperation: A Scalable Protocol for Web Cache Sharing 145
Trend-based load balancer for a multi-tier distributed system 144
Collaborative Attack Detection Using Distributed Hash Tables 143
Identification of correlated network intrusion alerts 143
Content Delivery and Management 143
Runtime state change detector of computer system resources under non stationary conditions 142
Threshold-based reconfiguration strategies for gracefully degradable parallel computations 141
Totale 19.241
Categoria #
all - tutte 114.863
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 114.863


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20205.807 0 478 230 411 648 909 1.063 591 584 237 438 218
2020/20215.717 458 223 393 407 750 612 431 688 316 852 352 235
2021/20224.148 140 498 479 180 109 197 265 183 428 336 892 441
2022/20233.839 434 477 241 341 530 602 50 387 473 43 119 142
2023/20243.518 99 150 169 249 679 422 939 303 78 86 89 255
2024/2025421 360 61 0 0 0 0 0 0 0 0 0 0
Totale 30.760