DINI, GIANLUCA
 Distribuzione geografica
Continente #
NA - Nord America 1.465
EU - Europa 1.176
AS - Asia 1.115
AF - Africa 97
SA - Sud America 74
OC - Oceania 30
Continente sconosciuto - Info sul continente non disponibili 1
Totale 3.958
Nazione #
US - Stati Uniti d'America 1.417
IT - Italia 403
CN - Cina 379
IN - India 221
DE - Germania 147
FR - Francia 110
GB - Regno Unito 109
RU - Federazione Russa 105
HK - Hong Kong 61
VN - Vietnam 58
SG - Singapore 51
JP - Giappone 50
IR - Iran 49
CO - Colombia 43
TW - Taiwan 43
CA - Canada 40
KR - Corea 30
NL - Olanda 29
CZ - Repubblica Ceca 27
AU - Australia 26
MY - Malesia 24
PK - Pakistan 24
SE - Svezia 24
ID - Indonesia 23
BE - Belgio 21
FI - Finlandia 20
UA - Ucraina 20
ZA - Sudafrica 20
BG - Bulgaria 19
IE - Irlanda 19
IL - Israele 19
EG - Egitto 18
ES - Italia 18
RS - Serbia 18
NG - Nigeria 17
TR - Turchia 17
SA - Arabia Saudita 14
DZ - Algeria 13
GR - Grecia 11
MA - Marocco 11
PH - Filippine 11
BR - Brasile 10
PL - Polonia 9
DK - Danimarca 8
LT - Lituania 8
RO - Romania 8
TN - Tunisia 8
NO - Norvegia 7
BD - Bangladesh 6
CL - Cile 6
KH - Cambogia 6
AT - Austria 5
EC - Ecuador 5
LK - Sri Lanka 5
MX - Messico 5
PT - Portogallo 5
CM - Camerun 4
IQ - Iraq 4
LU - Lussemburgo 4
NZ - Nuova Zelanda 4
PE - Perù 4
SK - Slovacchia (Repubblica Slovacca) 4
AR - Argentina 3
CH - Svizzera 3
KE - Kenya 3
LV - Lettonia 3
PS - Palestinian Territory 3
BA - Bosnia-Erzegovina 2
BH - Bahrain 2
BN - Brunei Darussalam 2
KW - Kuwait 2
MD - Moldavia 2
ME - Montenegro 2
MT - Malta 2
OM - Oman 2
PR - Porto Rico 2
TH - Thailandia 2
A1 - Anonimo 1
AF - Afghanistan, Repubblica islamica di 1
BF - Burkina Faso 1
BO - Bolivia 1
BY - Bielorussia 1
CU - Cuba 1
GH - Ghana 1
HR - Croazia 1
IM - Isola di Man 1
JO - Giordania 1
KG - Kirghizistan 1
KZ - Kazakistan 1
MN - Mongolia 1
MO - Macao, regione amministrativa speciale della Cina 1
MZ - Mozambico 1
QA - Qatar 1
SI - Slovenia 1
UY - Uruguay 1
VE - Venezuela 1
Totale 3.958
Città #
Ashburn 191
Houston 145
Serra 141
Ann Arbor 80
Santa Cruz 68
Fairfield 63
Saint Petersburg 63
Buffalo 60
Seattle 50
Guangzhou 44
Chicago 39
Shenyang 36
Beijing 34
Wilmington 33
Boardman 32
Changsha 31
Chennai 31
Florence 28
Hangzhou 28
Dallas 27
Woodbridge 26
Bengaluru 25
Taipei 25
Milan 24
Rome 23
Central 22
Shanghai 22
Tokyo 22
Cambridge 20
Dong Ket 20
Los Angeles 19
Dublin 18
Frankfurt am Main 18
Hyderabad 18
Kolkata 18
London 18
Paris 18
Singapore 17
Helsinki 16
Belgrade 14
Council Bluffs 14
Hanoi 14
Hong Kong 14
San Diego 14
Toronto 14
Mountain View 13
Sydney 13
Des Moines 12
Islamabad 12
Leuven 12
Bhopal 11
Nanjing 10
New York 10
Clearwater 9
Delhi 9
Gothenburg 9
Harbin 9
Davao City 8
Hebei 8
Kuala Lumpur 8
Madrid 8
Riyadh 8
San Jose 8
Seoul 8
Tehran 8
Tianjin 8
Berlin 7
Hefei 7
Muizenberg 7
San Francisco 7
Shenzhen 7
Thrissur 7
Wuhan 7
Changchun 6
Croydon 6
Henderson 6
Jerusalem 6
Lagos 6
Lucknow 6
Mandi 6
New Delhi 6
Ottawa 6
San Vincenzo 6
Asnaes 5
Atlanta 5
Chengdu 5
Grenoble 5
Ho Chi Minh City 5
Jeddah 5
Lake Forest 5
Mumbai 5
Pisa 5
Portland 5
Pune 5
Vienna 5
Warsaw 5
Xi'an 5
Xian 5
Belfast 4
Bethesda 4
Totale 2.090
Nome #
null, file e0d6c927-1a7a-fcf8-e053-d805fe0aa794 644
Mobile underwater sensor networks for protection and security: field experience at the UAN11 experiment, file e0d6c92d-0479-fcf8-e053-d805fe0aa794 348
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention, file e0d6c930-a9c7-fcf8-e053-d805fe0aa794 305
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c92e-3465-fcf8-e053-d805fe0aa794 284
Verifying data secure flow in AUTOSAR models, file e0d6c930-7d1d-fcf8-e053-d805fe0aa794 231
Drone Path Planning for Secure Positioning and Secure Position Verification, file e0d6c930-ab2b-fcf8-e053-d805fe0aa794 170
Key propagation in wireless sensor networks, file e0d6c92c-1dca-fcf8-e053-d805fe0aa794 167
null, file e0d6c92c-1f3b-fcf8-e053-d805fe0aa794 161
SAPIENT: enabling real-time monitoring and control in the Future Communication Infrastructure of Air Traffic Management, file e0d6c92e-dde6-fcf8-e053-d805fe0aa794 156
null, file e0d6c92c-3d22-fcf8-e053-d805fe0aa794 154
JAMMY: a Distributed and Dynamic Solution against Selective Jamming Attack in TDMA WSNs, file e0d6c926-fe0e-fcf8-e053-d805fe0aa794 137
Verifying Data Secure Flow in AUTOSAR Models by Static Analysis, file e0d6c92a-5193-fcf8-e053-d805fe0aa794 126
null, file e0d6c92c-1de0-fcf8-e053-d805fe0aa794 126
Risk analysis of Android applications: A user-centric solution, file e0d6c930-c71d-fcf8-e053-d805fe0aa794 110
A lightweight and scalable attribute-based encryption system for smart cities, file e0d6c930-a67c-fcf8-e053-d805fe0aa794 106
SESAR EXPLORATORY RESEARCH SAPIENT PROJECT OVERVIEW, file e0d6c929-e0b0-fcf8-e053-d805fe0aa794 90
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-a769-fcf8-e053-d805fe0aa794 70
Distributed storage protection in wireless sensor networks, file e0d6c930-ac4a-fcf8-e053-d805fe0aa794 57
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-962a-fcf8-e053-d805fe0aa794 49
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification, file e0d6c930-9690-fcf8-e053-d805fe0aa794 49
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks, file e0d6c930-9fe2-fcf8-e053-d805fe0aa794 47
BRUSCHETTA: An IoT blockchain-based framework for certifying extra virgin olive oil supply chain, file e0d6c930-a38d-fcf8-e053-d805fe0aa794 32
Localization with guaranteed bound on the position error using a drone, file e0d6c930-9205-fcf8-e053-d805fe0aa794 31
On Evaluating the Performance Impact of the IEEE 802.15.4 Security Sub-layer, file e0d6c92a-2469-fcf8-e053-d805fe0aa794 28
Protected pointers in wireless sensor networks, file e0d6c930-a44e-fcf8-e053-d805fe0aa794 23
On Designing Resilient Location-Privacy Obfuscators, file e0d6c930-acc6-fcf8-e053-d805fe0aa794 23
A uniformity-based approach to location privacy, file e0d6c930-7d32-fcf8-e053-d805fe0aa794 21
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols, file e0d6c930-b815-fcf8-e053-d805fe0aa794 21
An implementation and evaluation of the security features of RPL, file e0d6c931-0a80-fcf8-e053-d805fe0aa794 21
HUMsim: A Privacy-Oriented Human Mobility Simulator, file e0d6c930-2f40-fcf8-e053-d805fe0aa794 20
Indirect Revocable KP-ABE with Revocation Undoing Resistance, file e0d6c931-142a-fcf8-e053-d805fe0aa794 18
Password systems: design and implementation, file e0d6c930-ac47-fcf8-e053-d805fe0aa794 17
Virtual private ledgers: Embedding private distributed ledgers over a public blockchain by cryptography, file e0d6c930-64ea-fcf8-e053-d805fe0aa794 12
Assessing the Cost of Quantum Security for Automotive Over-the-Air Updates, file e0d6c931-7b0d-fcf8-e053-d805fe0aa794 12
On Improving SimBlock Blockchain Simulator, file e0d6c931-9da4-fcf8-e053-d805fe0aa794 12
On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding, file e0d6c930-8916-fcf8-e053-d805fe0aa794 11
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-c01a-fcf8-e053-d805fe0aa794 9
JAMMY: a Distributed and Dynamic Solution against Selective Jamming Attack in TDMA WSNs, file e0d6c930-c942-fcf8-e053-d805fe0aa794 9
Secure positioning in wireless sensor networks through enlargement miscontrol detection, file e0d6c930-ac7e-fcf8-e053-d805fe0aa794 8
null, file e0d6c926-407f-fcf8-e053-d805fe0aa794 7
Sensing the cities with social-aware unmanned aerial vehicles, file e0d6c92b-f132-fcf8-e053-d805fe0aa794 7
ABE-Cities: An attribute-based encryption system for smart cities, file e0d6c930-abad-fcf8-e053-d805fe0aa794 7
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols, file e0d6c930-6684-fcf8-e053-d805fe0aa794 6
An implementation and evaluation of the security features of RPL, file e0d6c930-6adf-fcf8-e053-d805fe0aa794 6
null, file e0d6c930-6ebd-fcf8-e053-d805fe0aa794 6
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks, file e0d6c930-938b-fcf8-e053-d805fe0aa794 6
A low-cost UAV-based secure location verification method, file e0d6c930-95d2-fcf8-e053-d805fe0aa794 6
FABElous: An attribute-based scheme for industrial internet of things, file e0d6c930-9ef5-fcf8-e053-d805fe0aa794 6
Secure positioning in wireless sensor networks through enlargement miscontrol detection, file e0d6c930-bfd4-fcf8-e053-d805fe0aa794 6
Graphical Design of Distributed Applications through Reusable Components, file e0d6c926-17d7-fcf8-e053-d805fe0aa794 5
Distributed motion misbehavior detection in teams of heterogeneous aerial robots, file e0d6c930-c812-fcf8-e053-d805fe0aa794 5
null, file e0d6c926-3daf-fcf8-e053-d805fe0aa794 4
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware, file e0d6c92f-818e-fcf8-e053-d805fe0aa794 4
Secure positioning with non-ideal distance bounding protocols, file e0d6c930-95dc-fcf8-e053-d805fe0aa794 4
Group rekeying based on member join history, file e0d6c930-9de5-fcf8-e053-d805fe0aa794 4
null, file e0d6c926-1b53-fcf8-e053-d805fe0aa794 3
null, file e0d6c926-39e7-fcf8-e053-d805fe0aa794 3
null, file e0d6c926-4a5e-fcf8-e053-d805fe0aa794 3
On Designing Resilient Location-Privacy Obfuscators, file e0d6c927-4d26-fcf8-e053-d805fe0aa794 3
A uniformity-based approach to location privacy, file e0d6c930-7acf-fcf8-e053-d805fe0aa794 3
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks, file e0d6c930-9ef0-fcf8-e053-d805fe0aa794 3
Verifying data secure flow in AUTOSAR models, file e0d6c930-a4e5-fcf8-e053-d805fe0aa794 3
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention, file e0d6c930-bb01-fcf8-e053-d805fe0aa794 3
Drone Path Planning for Secure Positioning and Secure Position Verification, file e0d6c930-be20-fcf8-e053-d805fe0aa794 3
Performance evaluation of attribute-based encryption in automotive embedded platform for secure software over-the-air update, file 02ef6f37-0a6a-4cd2-8fae-97fcde04dd6e 2
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification, file e0d6c927-51d3-fcf8-e053-d805fe0aa794 2
Using AUTOSAR high-level specifications for the synthesis of security components in automotive systems, file e0d6c92c-7239-fcf8-e053-d805fe0aa794 2
Secure positioning with non-ideal distance bounding protocols, file e0d6c92f-dde6-fcf8-e053-d805fe0aa794 2
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c92f-fa48-fcf8-e053-d805fe0aa794 2
Localization with guaranteed bound on the position error using a drone, file e0d6c930-9407-fcf8-e053-d805fe0aa794 2
ABE-Cities: An attribute-based encryption system for smart cities, file e0d6c930-b589-fcf8-e053-d805fe0aa794 2
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c930-bb63-fcf8-e053-d805fe0aa794 2
Risk analysis of Android applications: A user-centric solution, file e0d6c930-c93f-fcf8-e053-d805fe0aa794 2
Key propagation in wireless sensor networks, file e0d6c930-c940-fcf8-e053-d805fe0aa794 2
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks, file e0d6c931-71e3-fcf8-e053-d805fe0aa794 2
Exploring circular shipbuilding: A systematic review on circular economy business models and supporting technologies, file 16f300ad-7ed5-49c1-a7b9-f2f1e33f8ac8 1
Le implicazioni organizzative di una strategia di cybersecurity, file 67ed7756-f9df-4e30-86e9-516e992727e4 1
Smart-working e BYOD: quali rischi? Il ruolo di cyber-awareness e cyber organizational culture, file 6dcedf15-940c-44b3-a8be-0b07d7ead1fc 1
An overview of Ulisse, a distributed single address space system, file e0d6c926-1f9a-fcf8-e053-d805fe0aa794 1
A Solution to the GTS-Based Selective Jamming Attack on IEEE 802.15.4 Networks, file e0d6c926-416b-fcf8-e053-d805fe0aa794 1
Analysis of security attacks in wireless sensor networks: From UPPAAL to Castalia, file e0d6c92f-76e0-fcf8-e053-d805fe0aa794 1
FABElous: An attribute-based scheme for industrial internet of things, file e0d6c930-74f6-fcf8-e053-d805fe0aa794 1
A lightweight and scalable attribute-based encryption system for smart cities, file e0d6c930-a67b-fcf8-e053-d805fe0aa794 1
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c930-a684-fcf8-e053-d805fe0aa794 1
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-a97f-fcf8-e053-d805fe0aa794 1
Distributed motion misbehavior detection in teams of heterogeneous aerial robots, file e0d6c930-c811-fcf8-e053-d805fe0aa794 1
SAPIENT: enabling real-time monitoring and control in the Future Communication Infrastructure of Air Traffic Management, file e0d6c931-6a55-fcf8-e053-d805fe0aa794 1
A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things, file e0d6c932-1fa8-fcf8-e053-d805fe0aa794 1
A Rational Mining Strategy for Proof-of-Work Consensus Algorithms, file e78b43e0-6d51-4164-a80e-19f16dea1b98 1
Totale 4.067
Categoria #
all - tutte 8.339
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 8.339


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201938 0 0 0 0 0 0 0 0 0 12 14 12
2019/2020189 11 9 9 18 19 12 13 10 18 26 20 24
2020/2021629 17 28 13 25 13 40 47 31 178 103 72 62
2021/2022959 80 41 55 183 114 70 66 48 55 67 130 50
2022/20231.034 49 67 147 100 116 94 53 80 59 84 101 84
2023/20241.082 93 92 102 122 130 101 157 153 49 83 0 0
Totale 4.067