MARCHETTI, Mirco
 Distribuzione geografica
Continente #
NA - Nord America 10.685
AS - Asia 7.275
EU - Europa 5.051
SA - Sud America 802
AF - Africa 157
OC - Oceania 49
Continente sconosciuto - Info sul continente non disponibili 10
Totale 24.029
Nazione #
US - Stati Uniti d'America 10.458
SG - Singapore 2.146
CN - Cina 1.696
HK - Hong Kong 1.470
IT - Italia 1.321
GB - Regno Unito 1.158
BR - Brasile 607
DE - Germania 565
VN - Vietnam 543
SE - Svezia 483
FR - Francia 348
KR - Corea 313
RU - Federazione Russa 249
FI - Finlandia 225
JP - Giappone 207
IN - India 163
UA - Ucraina 151
CA - Canada 128
TR - Turchia 123
IR - Iran 82
NL - Olanda 81
BD - Bangladesh 79
ID - Indonesia 79
BG - Bulgaria 75
MX - Messico 66
IQ - Iraq 62
AR - Argentina 61
ES - Italia 60
BE - Belgio 53
PL - Polonia 47
ZA - Sudafrica 47
AU - Australia 46
TW - Taiwan 46
AT - Austria 38
PK - Pakistan 34
PH - Filippine 33
SA - Arabia Saudita 33
CO - Colombia 31
EC - Ecuador 27
IE - Irlanda 27
MA - Marocco 27
AE - Emirati Arabi Uniti 25
RO - Romania 24
EG - Egitto 22
MY - Malesia 22
CL - Cile 19
LT - Lituania 19
VE - Venezuela 17
GR - Grecia 16
PE - Perù 15
EE - Estonia 14
TH - Thailandia 14
TN - Tunisia 13
AZ - Azerbaigian 12
JO - Giordania 11
KE - Kenya 11
NO - Norvegia 11
PY - Paraguay 11
UZ - Uzbekistan 11
CZ - Repubblica Ceca 10
DZ - Algeria 10
AL - Albania 9
CH - Svizzera 9
NP - Nepal 8
BO - Bolivia 7
IL - Israele 7
LB - Libano 7
PT - Portogallo 7
SI - Slovenia 7
CR - Costa Rica 6
EU - Europa 6
HU - Ungheria 6
SK - Slovacchia (Repubblica Slovacca) 6
DK - Danimarca 5
HN - Honduras 5
HR - Croazia 5
KW - Kuwait 5
LU - Lussemburgo 5
LV - Lettonia 5
OM - Oman 5
SY - Repubblica araba siriana 5
TT - Trinidad e Tobago 5
UY - Uruguay 5
BH - Bahrain 4
BY - Bielorussia 4
ET - Etiopia 4
MO - Macao, regione amministrativa speciale della Cina 4
NG - Nigeria 4
PA - Panama 4
AM - Armenia 3
CY - Cipro 3
DO - Repubblica Dominicana 3
JM - Giamaica 3
KH - Cambogia 3
MD - Moldavia 3
NZ - Nuova Zelanda 3
PS - Palestinian Territory 3
SN - Senegal 3
UG - Uganda 3
ZW - Zimbabwe 3
Totale 23.987
Città #
Singapore 1.396
Hong Kong 1.354
Santa Clara 1.034
Fairfield 1.009
Ashburn 992
Southend 726
Chandler 647
Woodbridge 571
Houston 488
Ann Arbor 453
Seattle 432
San Jose 419
Hefei 417
Wilmington 385
Cambridge 350
Modena 269
Beijing 266
Seoul 266
Jacksonville 254
Los Angeles 241
Nyköping 223
London 222
Dearborn 204
Ho Chi Minh City 177
Helsinki 159
Hanoi 136
New York 130
Council Bluffs 124
Osaka 121
The Dalles 118
Chicago 105
San Diego 103
Bologna 101
Milan 100
Princeton 79
Moscow 74
Tokyo 71
Munich 70
Sofia 69
Bremen 65
Lauterbourg 64
Buffalo 61
Eugene 59
Izmir 59
Redwood City 59
Frankfurt am Main 58
São Paulo 58
Rome 56
Parma 53
Boardman 52
Tehran 44
Brussels 43
Nuremberg 43
Salt Lake City 41
Shanghai 40
Jakarta 38
Dallas 37
Orem 37
Atlanta 35
Ottawa 29
Reggio Emilia 29
Guangzhou 28
Da Nang 27
Taipei 26
Toronto 26
Amsterdam 25
Phoenix 25
Baghdad 24
Montreal 24
Warsaw 24
Columbus 23
Manchester 23
Chennai 22
Dublin 22
Hangzhou 22
Surabaya 22
Falkenstein 21
Melbourne 21
Mexico City 21
Rio de Janeiro 21
Stockholm 21
Dhaka 20
Ha Kwai Chung 20
Brasília 19
Elk Grove Village 19
Falls Church 19
Turin 18
Turku 18
Denver 17
Gothenburg 17
Haiphong 17
Jeddah 17
Johannesburg 17
Madrid 17
Belo Horizonte 16
Bengaluru 16
Berlin 16
Kent 16
Norwalk 15
Tampa 15
Totale 16.212
Nome #
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection 545
Analysis of high volumes of network traffic for Advanced Persistent Threat detection 532
Detection and Threat Prioritization of Pivoting Attacks in Large Networks 524
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises 493
A collaborative framework for intrusion detection in mobile networks 461
A symmetric cryptographic scheme for data integrity verification in cloud databases 438
A Framework for Automating Security Assessments with Deductive Reasoning 402
Vehicle Safe-Mode, Limp-Mode in the Service of Cyber Security 387
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 377
Dynamic load balancing for network intrusion detection systems based on distributed architectures 373
Security and Confidentality Solutions for Public Cloud Database Services 367
Scalable architecture for multi-user encrypted SQL operations on cloud database services 352
Access control enforcement on query-aware encrypted cloud databases 348
Identifying malicious hosts involved in periodic communications 347
Cybersecurity of Connected Autonomous Vehicles : A ranking based approach 347
READ: Reverse engineering of automotive data frames 347
How (Not) to Index Order Revealing Encrypted Databases 346
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms 343
Supporting sense-making and decision-making through time evolution analysis of open sources 341
Distributed, concurrent and independent access to encrypted cloud databases 340
Anomaly detection of CAN bus messages through analysis of ID sequences 337
The network perspective of cloud security 336
On the effectiveness of machine and deep learning for cyber security 335
Adaptive traffic filtering for efficient and secure IP mobility 330
The problem of NIDS evasion in mobile networks 329
Exploratory security analytics for anomaly detection 329
Scalable architecture for online prioritization of cyber threats 319
Vehicle Safe-Mode, Concept to Practice Limp-Mode in the Service of Cybersecurity 316
Efficient detection of unauthorized data modification in cloud databases 315
Detecting attacks to internal vehicle networks through Hamming distance 313
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 304
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 303
Collaborative architecture for malware detection and analysis 302
Hardware limitations to secure C-ITS: experimental evaluation and solutions 302
Fog-based secure communications for low-power IoT devices 301
Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale 299
Guaranteeing correctness of bulk operations in outsourced databases 295
Defeating NIDS evasion in Mobile IPv6 networks 291
Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults 291
Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems 289
Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics 285
Analyses of secure automotive communication protocols and their impact on vehicles life-cycle 280
AppCon: Mitigating evasion attacks to ML cyber detectors 280
Selective and early threat detection in large networked systems 278
Selective alerts for run-time protection of distributed systems 278
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 275
DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems 263
Supporting security and consistency for cloud database 262
BFT: The time is now 258
DAGA: Detecting Attacks to in-vehicle networks via n-Gram Analysis 255
Detection of missing CAN messages through inter-arrival time analysis 255
Cyber Attacks on Financial Critical Infrastructures 252
Multistep attack detection and alert correlation in intrusion detection systems 251
Collaborative Attack Detection Using Distributed Hash Tables 250
Evaluating Explainability of Graph Neural Networks for Network Intrusion Detection with Structural Attacks 246
Identification of correlated network intrusion alerts 244
ARGANIDS: A novel Network Intrusion Detection System based on adversarially Regularized Graph Autoencoder 231
Hardening Random Forest Cyber Detectors Against Adversarial Attacks 231
Analysis, prevention and detection of ransomware attacks on Industrial Control Systems 229
An experimental analysis of ECQV implicit certificates performance in VANETs 218
Hardening Machine Learning based Network Intrusion Detection Systems with Synthetic NetFlows 209
Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario 204
A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks 203
Accountable and privacy-aware flexible car sharing and rental services 201
Transparent access on encrypted data distributed over multiple cloud infrastructures 199
Defending financial infrastructures through early warning systems: the intelligence cloud approach 198
SixPack: Abusing ABS to avoid Misbehavior detection in VANETs 194
Deep Reinforcement Adversarial Learning against Botnet Evasion Attacks 190
Finding (and Exploiting) Vulnerabilities on IP Cameras: The Tenda CP3 Case Study 178
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks 173
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems 173
Cooperative approaches to SIEM and Intrusion Detection 172
Comparison of Machine Learning-based anomaly detectors for Controller Area Network 170
Framework and Models for Multistep Attack Detection 163
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning 160
SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs 157
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors 155
FlightPath: obedience vs. choice in cooperative services 154
Cyber attacks and defenses: Current capabilities and future trends 152
Evaluating Trainees in Large Cyber Exercises 152
Implementation of verified set operation protocols based on bilinear accumulators 151
RealCAN: Bringing real-time capabilities to canplayer 132
Message from the program chairs 129
Message from the Program Chairs 126
A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems 120
Towards the COSCA framework for “COnseptualing Secure CArs” 114
I know where you have been last summer: Extracting privacy-sensitive information via forensic analysis of the Mercedes-Benz NTG5*2 infotainment system 112
Message from the siw 2018 workshop chairs 112
Performance Comparison of Timing-Based Anomaly Detectors for Controller Area Network: A Reproducible Study 91
HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture 91
Cybersecurity Domains: A design pattern for creating Zero Trust Architectures through microsegmentation 41
Network-efficient authenticated pseudonym-based V2X communications with constant revocation costs 28
That’s what you signed for: evaluating user perception about privacy data in infotainment systems 25
RADAR: a Radio-based Analytics for Dynamic Association and Recognition of pseudonyms in VANETs 22
Defending Network Intrusion Detection Systems Based on Graph Neural Networks Against Structural Adversarial Attacks 21
Totale 24.239
Categoria #
all - tutte 84.655
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 84.655


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021307 0 0 0 0 0 0 0 0 0 0 195 112
2021/20221.693 110 100 175 84 60 99 88 100 194 171 348 164
2022/20231.798 175 239 130 171 232 232 26 199 200 25 60 109
2023/20242.504 56 85 83 157 396 202 932 225 48 74 88 158
2024/20254.519 202 63 72 259 742 574 317 360 502 181 582 665
2025/20267.364 424 302 652 637 1.429 640 1.029 348 793 961 149 0
Totale 24.239