FERRETTI, LUCA
 Distribuzione geografica
Continente #
NA - Nord America 4.101
AS - Asia 3.331
EU - Europa 2.232
SA - Sud America 363
AF - Africa 73
OC - Oceania 32
Continente sconosciuto - Info sul continente non disponibili 6
Totale 10.138
Nazione #
US - Stati Uniti d'America 4.002
SG - Singapore 894
CN - Cina 850
IT - Italia 724
HK - Hong Kong 635
GB - Regno Unito 396
BR - Brasile 265
VN - Vietnam 257
SE - Svezia 250
DE - Germania 244
KR - Corea 124
RU - Federazione Russa 117
FR - Francia 116
FI - Finlandia 91
IN - India 91
IR - Iran 74
ID - Indonesia 71
JP - Giappone 64
TR - Turchia 64
CA - Canada 55
UA - Ucraina 47
BE - Belgio 43
NL - Olanda 34
BD - Bangladesh 29
BG - Bulgaria 29
AU - Australia 28
TW - Taiwan 28
MX - Messico 26
AR - Argentina 24
ZA - Sudafrica 24
SA - Arabia Saudita 23
ES - Italia 22
IE - Irlanda 21
PH - Filippine 21
CO - Colombia 20
IQ - Iraq 19
AT - Austria 16
PL - Polonia 16
VE - Venezuela 14
MY - Malesia 13
EC - Ecuador 12
EG - Egitto 11
MA - Marocco 11
CL - Cile 10
PE - Perù 10
AE - Emirati Arabi Uniti 9
LT - Lituania 9
PK - Pakistan 9
AZ - Azerbaigian 8
CZ - Repubblica Ceca 8
JO - Giordania 8
TN - Tunisia 8
SI - Slovenia 7
PY - Paraguay 6
BH - Bahrain 5
EE - Estonia 5
HR - Croazia 5
KE - Kenya 5
RO - Romania 5
RS - Serbia 5
TH - Thailandia 5
UZ - Uzbekistan 5
MN - Mongolia 4
NG - Nigeria 4
NZ - Nuova Zelanda 4
PA - Panama 4
PS - Palestinian Territory 4
PT - Portogallo 4
BY - Bielorussia 3
CR - Costa Rica 3
EU - Europa 3
GR - Grecia 3
HN - Honduras 3
HU - Ungheria 3
IL - Israele 3
LV - Lettonia 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
CH - Svizzera 2
CI - Costa d'Avorio 2
DK - Danimarca 2
ET - Etiopia 2
GT - Guatemala 2
LB - Libano 2
OM - Oman 2
XK - ???statistics.table.value.countryCode.XK??? 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
BO - Bolivia 1
CY - Cipro 1
DZ - Algeria 1
GA - Gabon 1
GN - Guinea 1
IS - Islanda 1
JM - Giamaica 1
KH - Cambogia 1
KZ - Kazakistan 1
LC - Santa Lucia 1
MR - Mauritania 1
MT - Malta 1
Totale 10.131
Città #
Singapore 606
Hong Kong 592
Santa Clara 451
Ashburn 441
Fairfield 341
Chandler 258
Southend 213
Woodbridge 205
Hefei 175
San Jose 172
Ann Arbor 165
Los Angeles 161
Houston 157
Seattle 139
Cambridge 137
Wilmington 125
Modena 124
Beijing 113
Seoul 106
London 97
Ho Chi Minh City 94
Nyköping 88
Bologna 82
Jacksonville 73
Dearborn 71
Helsinki 67
Hanoi 60
Tokyo 55
San Diego 48
Milan 47
Moscow 44
Tehran 44
New York 42
The Dalles 41
Boardman 37
Chicago 34
Parma 34
Buffalo 32
Izmir 32
Princeton 31
Council Bluffs 30
Munich 29
Bremen 28
Frankfurt am Main 27
Brussels 26
Reggio Emilia 26
Sofia 26
Lauterbourg 25
Shanghai 25
São Paulo 24
Surabaya 23
Amsterdam 21
Redwood City 21
Jeddah 20
Nuremberg 20
Eugene 18
Rome 18
Atlanta 17
Taipei 17
Dublin 16
Melbourne 16
Orem 16
Chennai 15
Dallas 14
Manchester 14
Salt Lake City 14
Jakarta 13
Guangzhou 12
Stockholm 12
Da Nang 11
Hangzhou 11
Montreal 11
Ottawa 11
Wuhan 11
Bengaluru 10
Cape Town 10
Denver 10
Gothenburg 10
Fremont 9
Hamburg 9
Liverpool 9
Paris 9
Toronto 9
Turin 9
Turku 9
Warsaw 9
Amman 8
Baghdad 8
Bogotá 8
Falkenstein 8
Leuven 8
Prague 8
Serralunga di Crea 8
Baku 7
Bari 7
Florence 7
Formigine 7
Haiphong 7
Istanbul 7
Johannesburg 7
Totale 6.689
Nome #
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection 552
A symmetric cryptographic scheme for data integrity verification in cloud databases 440
A Framework for Automating Security Assessments with Deductive Reasoning 402
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases 380
A big data platform exploiting auditable tokenization to promote good practices inside local energy communities 379
Security and Confidentality Solutions for Public Cloud Database Services 367
Scalable architecture for multi-user encrypted SQL operations on cloud database services 352
Access control enforcement on query-aware encrypted cloud databases 349
How (Not) to Index Order Revealing Encrypted Databases 346
Distributed, concurrent and independent access to encrypted cloud databases 342
On the effectiveness of machine and deep learning for cyber security 335
Efficient detection of unauthorized data modification in cloud databases 319
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning 305
Performance and cost evaluation of an adaptive encryption architecture for cloud databases 303
Hardware limitations to secure C-ITS: experimental evaluation and solutions 303
Fog-based secure communications for low-power IoT devices 302
Guaranteeing correctness of bulk operations in outsourced databases 295
Analyses of secure automotive communication protocols and their impact on vehicles life-cycle 281
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 276
Authorization transparency for accountable access to IoT services 274
Survivable zero trust for cloud computing environments 268
Supporting security and consistency for cloud database 262
DAGA: Detecting Attacks to in-vehicle networks via n-Gram Analysis 258
Efficient License Management Based on Smart Contracts Between Software Vendors and Service Providers 240
An experimental analysis of ECQV implicit certificates performance in VANETs 219
Flexible and Survivable Single Sign-On 210
Accountable and privacy-aware flexible car sharing and rental services 202
Transparent access on encrypted data distributed over multiple cloud infrastructures 199
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things 192
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems 174
Scalable, Confidential and Survivable Software Updates 165
WebDHT: browser-compatible distributed hash table for decentralized Web applications 158
Evaluating Trainees in Large Cyber Exercises 154
Implementation of verified set operation protocols based on bilinear accumulators 151
Message from the siw 2018 workshop chairs 112
Timing Side-Channel Attacks on USB Devices Using eBPF 112
Message from the Program Chairs 110
Riservatezza e integrità su servizi database cloud 68
Network-efficient authenticated pseudonym-based V2X communications with constant revocation costs 29
That’s what you signed for: evaluating user perception about privacy data in infotainment systems 25
Practical and secure history-independent indexing for queryable-encrypted databases 17
Totale 10.227
Categoria #
all - tutte 37.027
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 37.027


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021103 0 0 0 0 0 0 0 0 0 0 54 49
2021/2022696 38 50 74 47 21 41 31 47 61 76 138 72
2022/2023726 70 90 50 72 87 101 21 76 79 8 29 43
2023/20241.344 25 41 40 83 254 113 374 160 26 64 60 104
2024/20252.073 93 37 58 143 345 253 130 135 204 131 235 309
2025/20263.338 198 135 285 284 591 253 479 207 333 462 111 0
Totale 10.227