MARCHETTI, Mirco
 Distribuzione geografica
Continente #
NA - Nord America 7.054
EU - Europa 3.368
AS - Asia 2.037
AF - Africa 31
SA - Sud America 25
OC - Oceania 22
Continente sconosciuto - Info sul continente non disponibili 8
Totale 12.545
Nazione #
US - Stati Uniti d'America 6.985
IT - Italia 967
HK - Hong Kong 911
GB - Regno Unito 887
SE - Svezia 419
DE - Germania 367
CN - Cina 352
SG - Singapore 238
FR - Francia 216
JP - Giappone 155
UA - Ucraina 127
FI - Finlandia 124
TR - Turchia 88
IR - Iran 79
BG - Bulgaria 69
CA - Canada 58
IN - India 52
ID - Indonesia 41
BE - Belgio 39
KR - Corea 29
RU - Federazione Russa 27
AU - Australia 22
SA - Arabia Saudita 17
RO - Romania 15
VN - Vietnam 15
GR - Grecia 14
IE - Irlanda 13
PH - Filippine 13
TW - Taiwan 13
NL - Olanda 12
LT - Lituania 11
EG - Egitto 10
ES - Italia 10
NO - Norvegia 10
MX - Messico 8
MY - Malesia 8
AT - Austria 7
PE - Perù 7
AL - Albania 6
BR - Brasile 6
CH - Svizzera 6
EU - Europa 6
CL - Cile 5
IQ - Iraq 5
LU - Lussemburgo 5
PK - Pakistan 5
CO - Colombia 4
PL - Polonia 4
TN - Tunisia 4
ZA - Sudafrica 4
AZ - Azerbaigian 3
EE - Estonia 3
LV - Lettonia 3
TH - Thailandia 3
ZW - Zimbabwe 3
AE - Emirati Arabi Uniti 2
EC - Ecuador 2
HR - Croazia 2
IL - Israele 2
JO - Giordania 2
KE - Kenya 2
MA - Marocco 2
NG - Nigeria 2
PR - Porto Rico 2
PT - Portogallo 2
UG - Uganda 2
A1 - Anonimo 1
A2 - ???statistics.table.value.countryCode.A2??? 1
AF - Afghanistan, Repubblica islamica di 1
AR - Argentina 1
BD - Bangladesh 1
BH - Bahrain 1
CM - Camerun 1
CZ - Repubblica Ceca 1
DK - Danimarca 1
GN - Guinea 1
LC - Santa Lucia 1
MD - Moldavia 1
MO - Macao, regione amministrativa speciale della Cina 1
Totale 12.545
Città #
Fairfield 1.009
Hong Kong 889
Southend 726
Chandler 647
Ashburn 641
Woodbridge 571
Houston 474
Ann Arbor 453
Seattle 418
Wilmington 379
Cambridge 350
Jacksonville 253
Modena 227
Nyköping 223
Dearborn 204
Singapore 179
Osaka 121
Beijing 102
San Diego 101
Los Angeles 87
Helsinki 82
Princeton 79
Bologna 68
Sofia 68
Bremen 65
New York 64
Eugene 59
Redwood City 59
Izmir 55
Milan 51
Boardman 45
Parma 45
Tehran 44
London 36
Rome 36
Brussels 35
Tokyo 28
Ottawa 25
Surabaya 21
Falls Church 19
Jakarta 19
Shanghai 16
Norwalk 14
Berlin 13
Catania 13
Jeddah 13
Melbourne 13
Turin 13
Fremont 12
Hefei 11
Kilburn 11
Liverpool 11
Nanjing 11
Tulsa 11
Albuquerque 10
Guangzhou 10
Horia 10
Jinan 10
Karlsruhe 10
Kunming 10
Bari 9
Des Moines 9
Dong Ket 9
Dublin 9
Formigine 9
Manchester 9
Sassuolo 9
Taipei 9
Chiswick 8
Las Vegas 8
Lund 8
Munich 8
Castellarano 7
Lima 7
Phoenix 7
Piacenza 7
Reggio Emilia 7
San Jose 7
Seoul 7
Shenzhen 7
Toronto 7
Viadana 7
Acton 6
Athens 6
Cairo 6
Gelsenkirchen 6
Gothenburg 6
Indiana 6
Manila 6
Montesarchio 6
Mountain View 6
Paris 6
Wuhan 6
Augusta 5
Carpi 5
Castelnuovo Rangone 5
Central 5
Darmstadt 5
Felino 5
Hangzhou 5
Totale 9.554
Nome #
Analysis of high volumes of network traffic for Advanced Persistent Threat detection 409
Detection and Threat Prioritization of Pivoting Attacks in Large Networks 404
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises 347
A collaborative framework for intrusion detection in mobile networks 311
A symmetric cryptographic scheme for data integrity verification in cloud databases 289
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection 287
Security and Confidentality Solutions for Public Cloud Database Services 272
Vehicle Safe-Mode, Limp-Mode in the Service of Cyber Security 265
Supporting sense-making and decision-making through time evolution analysis of open sources 234
Cybersecurity of Connected Autonomous Vehicles : A ranking based approach 230
Vehicle Safe-Mode, Concept to Practice Limp-Mode in the Service of Cybersecurity 225
Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults 224
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 221
READ: Reverse engineering of automotive data frames 221
Exploratory security analytics for anomaly detection 217
Detecting attacks to internal vehicle networks through Hamming distance 216
The problem of NIDS evasion in mobile networks 215
Identifying malicious hosts involved in periodic communications 214
On the effectiveness of machine and deep learning for cyber security 212
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms 210
Scalable architecture for multi-user encrypted SQL operations on cloud database services 207
The network perspective of cloud security 200
Dynamic load balancing for network intrusion detection systems based on distributed architectures 199
Guaranteeing correctness of bulk operations in outsourced databases 195
Scalable architecture for online prioritization of cyber threats 191
Access control enforcement on query-aware encrypted cloud databases 190
Fog-based secure communications for low-power IoT devices 187
Anomaly detection of CAN bus messages through analysis of ID sequences 183
Efficient detection of unauthorized data modification in cloud databases 183
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 182
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 181
Distributed, concurrent and independent access to encrypted cloud databases 179
Adaptive traffic filtering for efficient and secure IP mobility 178
Multistep attack detection and alert correlation in intrusion detection systems 175
Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics 173
Defeating NIDS evasion in Mobile IPv6 networks 172
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 170
Supporting security and consistency for cloud database 169
AppCon: Mitigating evasion attacks to ML cyber detectors 167
How (Not) to Index Order Revealing Encrypted Databases 164
Collaborative architecture for malware detection and analysis 162
Selective and early threat detection in large networked systems 160
Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems 153
Cyber Attacks on Financial Critical Infrastructures 153
Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale 153
A Framework for Automating Security Assessments with Deductive Reasoning 152
Hardware limitations to secure C-ITS: experimental evaluation and solutions 152
Selective alerts for run-time protection of distributed systems 145
Collaborative Attack Detection Using Distributed Hash Tables 144
Identification of correlated network intrusion alerts 144
BFT: The time is now 143
Analyses of secure automotive communication protocols and their impact on vehicles life-cycle 132
DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems 124
Detection of missing CAN messages through inter-arrival time analysis 120
Hardening Random Forest Cyber Detectors Against Adversarial Attacks 119
Transparent access on encrypted data distributed over multiple cloud infrastructures 116
Cooperative approaches to SIEM and Intrusion Detection 106
DAGA: Detecting Attacks to in-vehicle networks via n-Gram Analysis 97
A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks 94
FlightPath: obedience vs. choice in cooperative services 90
Framework and Models for Multistep Attack Detection 87
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks 86
Defending financial infrastructures through early warning systems: the intelligence cloud approach 85
Deep Reinforcement Adversarial Learning against Botnet Evasion Attacks 79
An experimental analysis of ECQV implicit certificates performance in VANETs 78
Analysis, prevention and detection of ransomware attacks on Industrial Control Systems 75
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems 74
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors 71
SixPack: Abusing ABS to avoid Misbehavior detection in VANETs 67
Accountable and privacy-aware flexible car sharing and rental services 66
Message from the program chairs 61
Towards the COSCA framework for “COnseptualing Secure CArs” 58
Message from the Program Chairs 55
Message from the siw 2018 workshop chairs 48
Cyber attacks and defenses: Current capabilities and future trends 42
Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario 40
SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs 39
ARGANIDS: A novel Network Intrusion Detection System based on adversarially Regularized Graph Autoencoder 35
Comparison of Machine Learning-based anomaly detectors for Controller Area Network 23
Implementation of verified set operation protocols based on bilinear accumulators 19
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning 18
Totale 12.733
Categoria #
all - tutte 51.332
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 51.332


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.782 0 0 0 103 230 343 346 262 225 102 107 64
2020/20212.518 162 72 163 148 247 236 174 294 224 491 195 112
2021/20221.693 110 100 175 84 60 99 88 100 194 171 348 164
2022/20231.798 175 239 130 171 232 232 26 199 200 25 60 109
2023/20242.504 56 85 83 157 396 202 932 225 48 74 88 158
2024/2025377 202 63 72 40 0 0 0 0 0 0 0 0
Totale 12.733