RULLO, Antonino
 Distribuzione geografica
Continente #
NA - Nord America 711
EU - Europa 335
AS - Asia 92
AF - Africa 33
SA - Sud America 11
Continente sconosciuto - Info sul continente non disponibili 2
OC - Oceania 1
Totale 1.185
Nazione #
US - Stati Uniti d'America 705
IT - Italia 122
DE - Germania 69
UA - Ucraina 55
SE - Svezia 50
IN - India 31
SN - Senegal 30
CN - Cina 26
BE - Belgio 11
FI - Finlandia 9
EC - Ecuador 7
KR - Corea 7
SG - Singapore 7
CA - Canada 6
GB - Regno Unito 6
TR - Turchia 6
FR - Francia 5
IR - Iran 5
HU - Ungheria 3
JP - Giappone 3
CL - Cile 2
ES - Italia 2
EU - Europa 2
IE - Irlanda 2
NG - Nigeria 2
SY - Repubblica araba siriana 2
TH - Thailandia 2
AU - Australia 1
CY - Cipro 1
FK - Isole Falkland (Malvinas) 1
IL - Israele 1
KW - Kuwait 1
NL - Olanda 1
TN - Tunisia 1
UY - Uruguay 1
Totale 1.185
Città #
Chandler 214
San Mateo 72
Rende 52
Jacksonville 33
Dakar 30
Dearborn 24
Lawrence 23
Roxbury 23
Bremen 21
Brooklyn 21
Shanghai 20
Des Moines 16
Cambridge 15
Pune 15
Seattle 15
Ogden 13
Brussels 11
Spadola 11
Ann Arbor 10
Cosenza 9
Helsinki 9
Mumbai 9
Ashburn 7
Tosagua 7
Wilmington 7
Izmir 6
San Francisco 5
Seoul 5
Comiso 4
Miggiano 4
Milan 4
New York 4
Redwood City 4
Budapest 3
Osaka 3
San Jose 3
Singapore 3
Beijing 2
Berlin 2
Boardman 2
Bologna 2
Capri 2
Dublin 2
Falkenstein 2
Florence 2
Hamburg 2
Hyderabad 2
Lagos 2
London 2
Montreal 2
Munich 2
Ottawa 2
Rome 2
San Pietro a Maida 2
Santa Clara 2
Santiago 2
Saronno 2
Serra 2
Toronto 2
Turin 2
Woodbridge 2
Amsterdam 1
Andover 1
Ardabil 1
Banbridge 1
Bangkok 1
Bedford 1
Carlentini 1
Celico 1
Cetraro 1
Charleston 1
Chiang Mai 1
Cusano Milanino 1
Dipignano 1
Fairfield 1
Gangnam-gu 1
Grafing 1
Gunzenhausen 1
Halle 1
Hangzhou 1
Inglewood 1
Kuwait City 1
Leawood 1
Limassol 1
Los Angeles 1
Madrid 1
Mascalucia 1
Montevideo 1
Newark 1
Paris 1
Phoenix 1
Pohang 1
Redmond 1
San Diego 1
Sydney 1
Taizhou 1
Tel Aviv 1
Totale 819
Nome #
Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC 96
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications 78
PUF-based Smart Tags for Supply Chain Management 74
Malevolent Activity Detection with Hypergraph-Based Models 69
Process mining applications in the healthcare domain: A comprehensive review 59
Hypergraph-based attack models for network intrusion detection 58
Pareto-optimal adversarial defense of enterprise systems 57
Intrusion Detection with Hypergraph-Based Attack Models 57
PADUA: Parallel Architecture to Detect Unexplained Activities 55
The AC-Index: Fast online detection of correlated alerts 49
Process mining applications in the healthcare domain: A comprehensive review 47
Past: Protocol-adaptable security tool for heterogeneous iot ecosystems 46
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes 46
Optimal placement of security resources for the internet of things 44
A multi-perspective approach for the analysis of complex business processes behavior 43
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things 43
A game of things: Strategic allocation of security resources for IoT 38
Pareto optimal security resource allocation for Internet of Things 38
Machine learning methods for generating high dimensional discrete datasets 36
Shortfall-based optimal placement of security resources for mobile IoT scenarios 35
Shortfall-Based Optimal Security Provisioning for Internet of Things 35
Redundancy as a measure of fault-tolerance for the Internet of Things: A review 29
Multi-sorted inverse frequent itemsets mining for generating realistic no-SQL datasets 26
Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework 22
Strategic Security Resource Allocation for Internet of Things 19
Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques 16
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things 6
Security and privacy for the Internet of Things 6
Kalis2.0 -a SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for the IoT 4
Totale 1.231
Categoria #
all - tutte 8.556
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 8.556


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20197 0 0 0 0 0 0 0 0 0 1 6 0
2019/202084 6 6 0 7 7 25 4 7 4 2 8 8
2020/202176 7 0 6 7 0 9 0 14 4 7 11 11
2021/2022320 0 16 8 59 29 3 3 72 5 4 46 75
2022/2023487 68 66 13 57 51 47 0 57 58 23 32 15
2023/2024242 16 40 19 14 11 28 10 70 22 12 0 0
Totale 1.231